New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

@getholo/apps

Package Overview
Dependencies
Maintainers
1
Versions
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@getholo/apps

This repository contains two example apps which use the **@getholo/framework** under the hood.

latest
npmnpm
Version
0.1.0
Version published
Maintainers
1
Created
Source

@getholo/apps

This repository contains two example apps which use the @getholo/framework under the hood.

Usage

Before importing @getholo/apps in your code, you should initialise the framework first. Within the initialisation you should set a couple of parameters for Traefik: domain, email and provider.

Afterwards you need to import the config first before importing @getholo/apps.

Initialisation example

// config.ts

import config from '@getholo/framework/config';

// Your domain name
config.traefik.domain = 'domain.tld';

// Your email address for letsencrypt
config.traefik.email = 'user@domain.tld';

// Any Traefik V2 provider
config.traefik.provider = {
  name: 'cloudflare',
  env: {
    CF_DNS_API_TOKEN: 'DNS:Edit token',
    CF_ZONE_API_TOKEN: 'Zone:Read token'
  }
};

Using the apps

// index.ts

import './config';

import apps from '@getholo/apps';

async function main() {
  const { sonarr, traefik } = apps;

  await traefik.remove();
  await sonarr.remove();

  await traefik.pull();
  await sonarr.pull();

  await traefik.create();
  await sonarr.create();

  await traefik.start();
  await sonarr.start();
}

main();

Notes

This is just an example on how to use the @getholo/framework. I recommend you to fork this repository and add your own apps to explore the full capabilities of the framework.

FAQs

Package last updated on 03 Feb 2020

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts