Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
@bigbinary/neeto-api-keys-frontend
Advanced tools
A repo acts as the source of truth for the new nano's structure, configs, data etc.
The neeto-api-keys-nano
facilitates the administration of API keys within neeto applications. The nano exports the @bigbinary/neeto-api-keys-frontend
NPM package and neeto-api-keys-engine
Rails engine for development.
The engine is used to manage API keys across neeto products. It also provides concerns to handle common logic related to NeetoApiKeysEngine::ApiKey
model.
source "NEETO_GEM_SERVER_URL" do
# ..existing gems
gem 'neeto-api-keys-engine'
end
bundle install
config/routes.rb
file:
mount NeetoApiKeysEngine::Engine => "/neeto_api_keys_engine"
bundle exec rails neeto_api_keys_engine:install:migrations
bundle exec rails db:migrate
Add NeetoApiKeysEngine::ApiKeysHandler
concern to organization model.
class Organization < ActiveRecord::Base
# Include the following concern
include NeetoApiKeysEngine::ApiKeysHandler
The NeetoApiKeysEngine::ApiKeysHandler
concern is a module that provides functionality related to API keys within the host application. It establishes associations, methods, and logic for working with API keys.
Add the NeetoApiKeysEngine::Authenticatable
concern to the controller that requires API key authentication. Utilize the neeto_api_keys_authenticate_using_api_key
method within a before_action callback to authenticate the necessary actions.
class Api::V1::PublicApiController < ActionController::Base
# Include the following concern and callback
include NeetoApiKeysEngine::Authenticatable
before_action :neeto_api_keys_authenticate_using_api_key
By default, this method expects the API key in the "X-Api-Key" key in the header. For different keys or implementations, define a token method in the controller that returns the token.
Example:
def token
request.headers["neeto-Api-Key"]
end
Install the latest NeetoApiKeysNano
package using the below command:
yarn add @bigbinary/neeto-api-keys-frontend
Check the Frontend package development guide for step-by-step instructions to develop the frontend package.
ApiKeys
(source code)This component is used for managing API keys in a web application. It provides functionality for viewing, creating, updating, and deleting API keys. The component includes a table for displaying API key data, as well as options to add new keys, edit existing ones, and delete keys. It also features a search bar for easily finding specific API keys.
noDataProps
: Props for handling scenarios when there is no data to display.headerProps
: Props for configuring the header section of the component.import React from "react";
import { ApiKeys } from "@bigbinary/neeto-api-keys-frontend";
const App = () => <ApiKeys />;
export default App;
Consult the building and releasing packages guide for details on how to publish.
FAQs
A repo acts as the source of truth for the new nano's structure, configs, data etc.
The npm package @bigbinary/neeto-api-keys-frontend receives a total of 944 weekly downloads. As such, @bigbinary/neeto-api-keys-frontend popularity was classified as not popular.
We found that @bigbinary/neeto-api-keys-frontend demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.