Italian Translation Report: Node.js [Part 41 - 1164 words]

Oct 9th, 2018
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  3. The value tested for being truthy.
  4. All arguments besides are used as error message.
  5. A simple assertion test that verifies whether is truthy.
  6. If it is not, is logged.
  7. If provided, the error is formatted using by passing along all message arguments.
  8. The output is used as the error message.
  9. Assertion failed:
  10. Calling with a falsy assertion will only cause the to be printed to the console without interrupting execution of subsequent code.
  11. When is a TTY, calling will attempt to clear the TTY.
  12. When is not a TTY, this method does nothing.
  13. The specific operation of can vary across operating systems and terminal types.
  14. For most Linux operating systems, operates similarly to the shell command.
  15. On Windows, will clear only the output in the current terminal viewport for the Node.js binary.
  16. The display label for the counter.
  17. Maintains an internal counter specific to and outputs to the number of times has been called with the given
  18. Resets the internal counter specific to
  19. The function is an alias for
  20. If then the object's non-enumerable and symbol properties will be shown too.
  21. Tells how many times to recurse while formatting the object.
  22. This is useful for inspecting large complicated objects.
  23. To make it recurse indefinitely, pass
  24. If, then the output will be styled with ANSI color codes.
  25. Colors are customizable; see
  26. Uses on and prints the resulting string to
  27. This function bypasses any custom function defined on
  28. This method calls passing it the arguments received.
  29. Please note that this method does not produce any XML formatting.
  30. Prints to with newline.
  31. Multiple arguments can be passed, with the first used as the primary message and all additional used as substitution values similar to (the arguments are all passed to
  32. Prints
  33. If formatting elements are not found in the first string then is called on each argument and the resulting string values are concatenated.
  34. See for more information.
  35. Increases indentation of subsequent lines by two spaces.
  36. If one or more are provided, those are printed first without the additional indentation.
  37. An alias for
  38. Decreases indentation of subsequent lines by two spaces.
  39. Alternate properties for constructing the table.
  40. Try to construct a table with the columns of the properties of (or use) and rows of and log it.
  41. Falls back to just logging the argument if it can’t be parsed as tabular.
  42. These can't be parsed as tabular data
  43. Starts a timer that can be used to compute the duration of an operation.
  44. Timers are identified by a unique
  45. Use the same when calling to stop the timer and output the elapsed time in milliseconds to
  46. Timer durations are accurate to the sub-millisecond.
  47. Stops a timer that was previously started by calling and prints the result to
  48. Prints to the string, followed by the formatted message and stack trace to the current position in the code.
  49. Inspector only methods
  50. The following methods are exposed by the V8 engine in the general API but do not display anything unless used in conjunction with the
  51. This method does not display anything unless used in the inspector.
  52. The method is the deprecated form of
  53. The method starts a JavaScript CPU profile with an optional label until is called.
  54. The profile is then added to the Profile panel of the inspector.
  55. Some code
  56. Adds the profile to the Profiles panel of the inspector.
  57. Stops the current JavaScript CPU profiling session if one has been started and prints the report to the Profiles panel of the inspector.
  58. The method adds an event with the label to the Timeline panel of the inspector.
  64. The module provides cryptographic functionality that includes a set of wrappers for OpenSSL's hash, HMAC, cipher, decipher, sign, and verify functions.
  65. Use to access this module.
  66. Determining if crypto support is unavailable
  67. It is possible for Node.js to be built without including support for the module.
  68. In such cases, calling will result in an error being thrown.
  69. SPKAC is a Certificate Signing Request mechanism originally implemented by Netscape and was specified formally as part of
  70. Note that is deprecated since and new projects should not use this element anymore.
  71. The module provides the class for working with SPKAC data.
  72. The most common usage is handling output generated by the HTML5 element.
  73. Node.js uses OpenSSL's SPKAC implementation internally.
  74. The challenge component of the data structure, which includes a public key and a challenge.
  75. the challenge as a UTF8 string
  76. the public key as
  77. if the given data structure is valid, otherwise.
  78. As a still supported legacy interface, it is possible (but not recommended) to create new instances of the class as illustrated in the examples below.
  79. Instances of the class can be created using the keyword or by calling as a function:
  80. Instances of the class are used to encrypt data.
  81. The class can be used in one of two ways:
  82. As a stream that is both readable and writable, where plain unencrypted data is written to produce encrypted data on the readable side, or
  83. Using the and methods to produce the encrypted data.
  84. The or methods are used to create instances.
  85. objects are not to be created directly using the keyword.
  86. Example: Using objects as streams:
  87. Using and piped streams:
  88. Using the and methods:
  89. Any remaining enciphered contents.
  90. If is one of or, a string is returned.
  91. If an is not provided, a is returned.
  92. Once the method has been called, the object can no longer be used to encrypt data.
  93. Attempts to call more than once will result in an error being thrown.
  94. for method chaining.
  95. When using an authenticated encryption mode (only and are currently supported), the method sets the value used for the additional authenticated data (AAD) input parameter.
  96. The argument is optional for
  97. When using, the option must be specified and its value must match the length of the plaintext in bytes.
  98. See CCM mode
  99. The method must be called before
  100. the method returns a containing the authentication tag that has been computed from the given data.
  101. The method should only be called after encryption has been completed using the method.
  102. When using block encryption algorithms, the class will automatically add padding to the input data to the appropriate block size.
  103. To disable the default padding call
  104. When is, the length of the entire input data must be a multiple of the cipher's block size or will throw an error.
  105. Disabling automatic padding is useful for non-standard padding, for instance using instead of PKCS padding.
  106. Updates the cipher with
  107. If the argument is given, its value must be one of or and the argument is a string using the specified encoding.
  108. If the argument is not given, must be a or
  109. If is a or, then is ignored.
  110. The specifies the output format of the enciphered data, and can be or
  111. If the is specified, a string using the specified encoding is returned.
  112. The method can be called multiple times with new data until is called.
  113. Calling after will result in an error being thrown.
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add to your ad blocker whitelist or disable your adblocking software.