
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
@skyring/zmq-transport
Advanced tools
A ZMQ based transport for Skyring using PUSH or PUB zmq socket types.
Specify the type of socket for the connection with the method field when
creating a timer
$ npm install @skyring/zmq-transport --save
Skyring accepts an array property transports. Each entry can be a string or a named function.
If given a string, skyring will pass it to require which must resolve to a named function
const Skyring = require('skyring')
const server = new Skyring({
transports: ['@skyring/zmq-transport']
, seeds: ['localhost:3455']
})
server
.load()
.listen(3000)
'use strict'
const zmq = require('zmq')
let count = 0
const port = process.env.PORT || 5555
const socket = zmq.socket('pull')
socket.connect(`tcp://0.0.0.0:${port}`)
socket.on('message', (evt, chunk) => {
console.log(`${++count} ` + chunk)
})
process.once('SIGINT', onSignal)
process.once('SIGTERM', onSignal)
function onSignal() {
socket.disconnect(`tcp://0.0.0.0:${port}`)
socket.close()
}
$ curl -XPOST http://localhost:3000/timer -H 'Content-Type: application/json' -d '{
"timeout":3000
, "data":"hello world!"
, "callback": {
"transport": "zmq"
, "method":"push"
, "uri": "tcp://0.0.0.0:5555"
}
}'
>>> 1 hello world !
FAQs
ZeroMQ Transport for Skyring
We found that @skyring/zmq-transport demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.