Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
@perspect3vism/ad4m-connect
Advanced tools
Lib for handling everything needed to setup a connection to a local or remote ad4m-executor
This package makes it easy for AD4M apps to connect to a local or remote AD4M executor by handling all the complex things like finding the local executor port, requesting and storing a capability token, creating and recreating an Ad4mClient.
npm install -s @perspect3vism/ad4m-connect
appName(required)
: Name of the application using ad4m-connect.appDesc(required)
: Description of the application using ad4m-connect.appDomain(required)
: Domain of the application using ad4m-connect.capabilities(required)
: Capabilities requested by the application.appIconPath
: Icon for the app using ad4m-connect.port
: Port that AD4M is running on.token
: JWT token if you have one.url
: The url that we should connect to.authstatechange
: authenticated
| unauthenticated
| locked
connectionstatechange
: connecting
| connected
| not_connected
| disconnected
| error
;configstatechange
: token
| url
| port
import Ad4mConnectUI from "@perspect3vism/ad4m-connect";
const ui = Ad4mConnect({
appName: "Example",
appDesc: "This is a sample app.",
appDomain: "ad4m.dev",
appIconPath: "https://i.ibb.co/GnqjPJP/icon.png",
capabilities: [{ with: { domain: "*", pointers: ["*"] }, can: ["*"] }],
});
ui.addEventListener("authstatechange", (e) => {
if (e.detail === "authenticated") {
// We are authenticated
}
});
// Open popup and save the client when we are done
ui.connect().then((client) => {
// Save the client
});
Call ad4mConnect with parameters of your app:
const { ad4mConnect } = require("@perspect3vism/ad4m-connect/electron");
ad4mConnect({
// Provide the name of your app to be displayed in the dialog
appName: "Perspect3ve",
// Provide an icon to be displayed in the dialog as well
appIconPath: path.join(__dirname, "graphics", "Logo.png"),
// Name the capabilities your app needs
// (this is an example with all capabilities)
capabilities: [{ with: { domain: "*", pointers: ["*"] }, can: ["*"] }],
// Provide a directory in which the capability token and the executor
// URL will be stored such that future calls won't even open a dialog
// but try the token against that URL and resolve immediately
// if it works.
dataPath: path.join(homedir(), ".perspect3ve"),
})
.then(({ client, capabilityToken, executorUrl }) => {
// Retrieved `capabilityToken` and selected `executorUrl` are returned
// but all that is really needed is `client` which is a fully setup
// (including capability token) and working Ad4mClient.
//
// Both, the URL and the token have already been stored on disk
// in the directory provided as `dataPath`.
//
// Consequetive calls
createWindow(client);
})
.catch(() => {
console.log("User closed AD4M connection wizard. Exiting...");
app.exit(0);
process.exit(0);
});
FAQs
Lib for handling everything needed to setup a connection to a local or remote ad4m-executor
We found that @perspect3vism/ad4m-connect demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.