Socket
Socket
Sign inDemoInstall

autohost

Package Overview
Dependencies
71
Maintainers
2
Versions
110
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

    autohost

Resource-driven http server


Version published
Weekly downloads
58
increased by20.83%
Maintainers
2
Created
Weekly downloads
 

Readme

Source

autohost

Opinionated HTTP server lib based on express. Automatically configured based on convention driven resources.

Ripped from the guts of Anvil.

Features

  • Resource-based: define protocol-agnostic resources that interact via HTTP or WebSockets
  • Auto-reload resource on file change
  • WebSocket support (no fallback to other protocols)
  • UI dashboard to review resources' routes, topics and hosted paths

UI Dashboard

Simple navigate to /_autohost to review the current set of resources: An Example AutoHost Application's Dashboard

Quick Start

var host = require( 'autohost' )();
host.init();

Configuration

Configuration can be provided optionally to the init call or during instantiation after the require. The object literal follows the format:

{
	processes: 1, // # of processes to spawn - not currently in use
	static: './public', // where to host static resources from, default value shown
	resources: './resource', // where to load resource modules from, default value shown
	port: 8800, // what port to host at, default shown
	allowedOrigin: 'leankit.com', // used to filter incoming web socket connections based on origin
	websockets: true // enables websockets
}

Resources

Resources are expected to be simple modules that return a parameterless function resulting in a JS literal that follows the format:

	{
		name: 'resource-name',
		resources: '', // relative path to static assets for this resource
		actions: [ 
			{
				alias: 'send', // not presently utilized
				verb: 'get', // http verb
				topic: 'send', // topic segment appended the resource name
				path: '', // url pattern appended to the resource name
				handle: function( envelope ) {
					// envelope.data, envelope.headers and envelope.params may contain
					// information about the request/message received

					// envelope reply takes a object literal with data property for
					// http body|websocket message					
				}
			}
		]
	}

Authentication

Authentication support is supplied via Passport integration. Your application is expected to provide a strategy and authentication method. You can also provide a regex path to make part of your path open to anonymous access.

You must set this up BEFORE calling .init, calling it after initialization will probably cause 'splosions.

// Note: this is an over-simplification, typically you'd tie in auth store access inside the callback.
// Each passport strategy implementation will differ, please see those for details.
var passport = require( 'passport' );
var BasicStrategy = require( 'passport-http' ).BasicStrategy;
var host = require( '../src/autohost.js' )();

host.withPassportStrategy(
	new BasicStrategy({}, function( username, password, done ) {		
		if( username == 'anon' || ( username == 'admin' && password == 'admin' ) ) {
			done( null, username );
		} else {
			done( null, false );
		}
	} ),
	passport.authenticate( 'basic', { session: false } ),
	/^[\/]anon.*/ );

Authorization

The general approach is this:

  1. every action in the system is made available to the authorization strategy on start-up
  2. an action may be assigned to one or more roles in your authorization strategy
  3. a user may be assigned to one or more roles in your authorization strategy
  4. when a user attempts to activate an action, the action roles are checked against the user roles
  5. if a match is found in both lists, the action completes
  6. if the user has no roles that match any of the action's roles, the action is rejected (403)
  7. if the action has NO roles assigned to it, the user will be able to activate despite roles

This basically goes against least-priviledge. If this is a problem, assign a baseline 'authenticated' or 'user' role to every action returned to you during server start-up OR always return either of these during the 'getRolesFor' call.

The authorization strategy MUST implement 3 calls:

actionList( list, done )

Will recieve a hashmap of resources and resource action names. Action names follow a namespace convention of {resource name}.{alias}. The done call back MUST be called.

Here's an example of the format.

{
	'_autohost': [
		'_autohost.api', 
		'_autohost.resources', 
		'_autohost.actions', 
		'_autohost.connected-sockets'
	]
}

This is provided to your auth provider so that actions can automatically be updated (as in storage) on-the-fly when the server spins up.

getUserRoles( user, done ) -- done( err, roles )

Given a user's id, this must return any roles assigned to the user in the system. Done must be called with error or roles. An exception should never be allowed to bubble up through this call.

getRolesFor( action ) -- done( err, roles )

During activation, the action name ( resource.alias ) is passed to this call to determine what roles are able to activate the action. If you don't want actions to default to enabled despite user role, ALWAYS return at least some baseline role ( i.e. 'user', 'authenticated', etc. ).

Done must be called with error or roles. An exception should never be allowed to bubble up through this call.

Auth admin panel (Incomplete/Experimental)

In order to use this feature, you must provide an authorization strategy with several additional calls. It should go without saying that you're expected invoke the call back with either the result or an error.

getUserList( done ) -- done( err, users )

Returns the list of users in the authentication store. Necessary in order to map roles to users.

getRoleList( ) -- done( err, roles )

Returns the list of roles in the authorization store.

setActionRoles( action, roles ) -- done( err )

Sets the total list of roles for an action. (destructive update)

setUserRoles( user, roles ) -- done( err )

Sets the total list of roles for a user. (destructive update)

addRole( role ) -- done( err )

Remove a role from the authorization strategy.

removeRole( role ) -- done( err )

Remove a role from the authorization strategy.

Web Socket Stuff

Methods

  • sendToClient( id, topic, message ) - sends message to specific client via websocket (returns true if successful)
  • notifyClients( topic, message ) - sends message to all clients via web sockets

Events

  • 'socket.client.connected', { socket: socketConnection } - raised when a client connects
  • 'socket.client.identified', { socket: socketConnection, id: id } - raised when client reports unique id

TO DO

  • Add support for clustering (multiple listening processes)
  • Add support for user authentication and authorization (access) logging
  • Add support for rate limiting
  • Better logging
  • More thorough error handling
  • Support either Socket.IO or WebSockets via config

License

MIT License - http://opensource.org/licenses/MIT

FAQs

Last updated on 19 Mar 2014

Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Packages

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc