JSPM

  • Created
  • Published
  • Downloads 4
  • Score
    100M100P100Q27336F
  • License MIT

It's `.innerHTML = ''` for the modern world.

Package Exports

  • apply-html

This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (apply-html) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.

Readme

apply-html

NPM version Downloads Build Status Coverage Status

It's .innerHTML = '' for the modern world. Diffs and patches an existing DOM element by efficiently comparing it to a string.

Install

$ npm install --save apply-html

Usage

Patching

const { html, apply } = require('apply-html');

const content = html`
    <h1>Hello World</h1>
`;

apply(document.body, content);

Interpolation

const { html, raw, apply } = require('apply-html');

const salutation = '<em>Hello</em>';
const target = '<strong>World</strong>';

const content = html`
    <h1>${salutation} ${raw(target)}</h1>
`;

apply(document.body, content);

console.log(document.body.innerHTML);
// -> <h1>&lt;em&gt;Hello&lt;/em&gt; <strong>World</strong></h1>

Server-side rendering

The html and raw functions return SafeStrings which work great in Node.

const http = require('http');
const { html } = require('apply-html');

const content = html`
    <h1>Hello <em>World</em></h1>
`;

http.createServer((req, res) => {
    res.end(content.toString());
}).listen(3000);

Why?

I wanted the rendering simplicity of setting an element's innerHTML property coupled with the benefits of DOM diffing and patching. There are many libraries that do this sort of thing, so why another? Custom elements.

Most existing solutions for diffing and patching either replace the DOM with their own virtual representations (react, vdom, hyperscript) or by diffing two live DOM trees (bel, morphdom, diff-dom). Most of these libraries suffer the same issue in that they call a custom element's constructor before the elements are attached to the DOM leading to unexpected side effects and forcing constructor logic into the connectedCallback.

This library is a little bit different. It makes use of an HTML <template>'s unique ability to create an inert document fragment. These fragments are full, diffable, DOM trees, but have the added benefit of not triggering resource loading or custom element lifecycle callbacks. This inert document fragment is used to update the live DOM element with nanomorph, a tiny modern DOM diffing and patching utility.

Thus, apply-html ensures that things only start happening if and when they're supposed to. For more examples, see the original CodePen.

API

html`string`: SafeString

A template tag that creates a new SafeString containing a string of HTML. Interpolated values are serialized based on type:

  • Array - Items are serialized then joined with an empty string ('').
  • Boolean|null|undefined - Converted to an empty string ('').
  • Function - Throws a TypeError.
  • Object - Converted to an HTML-escaped JSON blob.
  • SafeString|Number - Inserted as-is.
  • String - Literal strings will be HTML-escaped to safeguard against XSS. To opt out of escaping, use raw().

raw(string): SafeString

  • string {String} String of safe HTML.

Wraps a string in a SafeString to indicate that it's safe to be inserted into the document. Only use on trusted strings to safeguard against XSS.

apply(element, string): element

  • element {Element} DOM element with children to be patched.
  • string {String|SafeString} String or SafeString containing safe HTML to render.

Updates the content of the given element, making the fewest possible changes required to match the given string of HTML. The string is converted into an HTML <template> and the DOM trees are compared. Returns the updated original element.

SafeString

new SafeString(string)

  • string {any} - The value to wrap. Will be coerced into a string with String().

Wraps a string to indicate that the string is safe to be inserted into the DOM. Only use on trusted strings to safeguard against XSS.

SafeString Properties

.raw {String}

The wrapped string.

.length {Number}

Length of the wrapped string. Read only.

SafeString Methods

.toJSON(): String

Returns the raw string.

.toString(): String

Returns the raw string.

Contribute

Standards for this project, including tests, code coverage, and semantics are enforced with a build tool. Pull requests must include passing tests with 100% code coverage and no linting errors.

Test

$ npm test

MIT © Shannon Moeller