Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Enterprise-grade microservice architecture for NodeJS
========
floca is a complete solution to aid the development of enterprise-grade applications following the microservices architectural pattern. A proven stack used by numerous of systems in production for years now.
The basic idea of floca is to provide an abstraction level allowing your project to be freed of technical layers and unnecessary decoration. Your codebase will we required to define only pure CommonJS modules and all underlaying services will be set up by floca configured by a simple JSON object.
Of course, you can orchestrate your app the way you prefer, but please let us share a possible way to build up the codebase of an EE app using floca:
Each microservice
Your code is clean, pure and surprisingly simple.
$ npm install floca
let Floca = require('floca')
let floca = new Floca({
floca: {
appName: 'NameOfYourApp',
entityName: 'NameOfYourMicroService'
}
}, { noFiles: true })
await floca.start( )
Yes, it is that simple.
Note: by default floca is using in-memory bus to relay messages. Should you consider an enterprise-grade provider, should the AMQP or NSQ topic reviewed.
In either case, the app will
Each microservice must have a unique name and must belong to an application or domain. These names will be used in the message bus for routing and distinguish different fields of jurisdiction.
{
...
floca: {
folder: path.join( process.cwd(), 'bus'),
appName: 'APP_NAME_IS_MISSING',
entityName: 'ENTITY_NAME_IS_MISSING',
configurator: 'Tuner'
}
...
}
Microservices will be read from the folder defined by the attribute 'folder'. An inner entity, called 'Publisher' watches that folder and according to the changes at file-level, the micoservice entities will be republished or removed. The folder 'bus' in the root of your project is the default spot.
The attributes 'appName' and 'entityName' are used to identify the app and the microservice and to identify the constructs in the message bus.
if the attribute 'configurator' is present, the Publisher will use to get the initial configuration of the microservices before publishing. This way, you can have a centralised configuration microservice with a name identified by the attribute 'configurator' and all microservices within the same app can reach it and be configured by the object such microservices retrieves. The Publisher will send a message to the configurator microservice passing the appName and entityName and accept the JS object interpreted as configuration and passed to the microservice.
An enterprise-grade message bus is highly required for a microservice architecture. AMQP has been proven probably the most reliable message solution out there. A stunning wide range of features support your aims. If you generated your project using the CLI with the option --amqp, then your project is set. If not, please make sure you create and pass the provider to floca:
let Fuser = require('floca')
let FuserAMQP = require('floca-amqp')
...
let fuserAMQP = new FuserAMQP()
let fuser = new Fuser( {
channeller: fuserAMQP,
...
}, { noFiles: true } )
This will tell floca to use the AMQP provider instead of the default in-memory solution.
floca tries to access a running AMQP by default specified in the config file as below:
{
...
amqp: {
connectURL: 'amqp://localhost'
}
...
}
You can set an empty string to make floca work 'offline' or specify a valid connectionURL fitting your environment.
If the following environment variables are set, floca will respect them as configuration:
AMQP_CONN_URL
If you generated your project using the CLI with the option --nsq, then your project is set. If not, please make sure you create and pass the provider to floca:
let Fuser = require('floca')
let FuserNSQ = require('floca-nsq')
...
let fuserNSQ = new FuserNSQ()
let fuser = new Fuser( {
channeller: fuserNSQ,
...
}, { noFiles: true } )
This will tell floca to use the NSQ provider instead of the default in-memory solution.
floca checks for settings for NSQ messaging solution in the config file as below:
{
...
nsq: {
nsqdHost: '127.0.0.1'
nsqdPort: 4150
}
...
}
If the following environment variables are set, floca will respect them as configuration:
NSQ_HOST, NSQ_PORT
floca supports pino logging solution.
let logger = ...;
{
log: {
level: 'info'
}
...
}
JWT is an open industry standard method for representing claims securely between two parties. floca has built-in support for JWT. You can activate it by adding secret key to the configuration:
...
server: {
...
jwt: {
key: 'x-floca-jwt',
secret: '',
timeout: 2 * 24 * 60 * 60,
acquire: true
},
...
}
...
The attribute 'key' will be the key to be read from the header and will be added to the response as 'Access-Control-*' headers. To support token requests, the optional attribute 'acquireURI' will activate a REST request on the given URI allowing clients to acquire a token using a simple GET request.
floca allows you to insert extender functions to the setup process to extend, refine or overwrite the default behavior of floca. Extender functions have to be put to the config file. You might not need all of them, probably none of them. See an example config file below:
{
connectMiddlewares: function( ){ ... },
extendPureREST: function( config, app, pathToIgnore, harcon, tools ){ ... },
extendREST: function( config, rester, pathToIgnore, harcon, tools ){ ... },
developmentTest: async function( harcon ){ ... }
}
Connect delivers the HTTP server framework for floca, and when it is initiated, the function connectMiddlewares is searched for to extend the middleware list of connect. By default only middlewares compression and body-parser is used. Your neeed might evolve the presence of other middlewares like helmet if web pages must be provided. Your function connectMiddlewares should return an array of middlewares to be used.
connectMiddlewares: function( ){
return [ helmet.xframe('deny') ]
}
The very pure way to define REST middlewares for auth libraries like Passport and any kind of low-level solution.
extendPureREST: function( config, app, pathToIgnore, harcon, tools ){
app.get('/auth/provider', passport.authenticate('provider') )
}
The exceptionally featureful connect-rest is used as REST layer in floca. The default behavior of floca publishes the microservices - if needed - and might publish the JWT request function. Your project might require to extend it with new REST functions like login:
extendREST: function( config, rester, pathToIgnore, harcon, tools ){
rester.post( { path: '/login', context: '/sys', version: '1.0.0' }, function( request, content, callback ){
harcon.ignite( null, '', 'DBServices.login', content.email, content.password, function(err, user){
if( err ) return callback( err );
sendJWTBack( user[0].uid, user[0].roles, options, callback )
} );
}, { options: true } )
}
Tools is an object enlisting services like JWT used by the floca.
floca can be started in development mode using the '--development' switch in the command line. This activates a scheduled checkup function printing out the list of published microservices and the method 'developmentTest' if present.
developmentTest: async function( harcon ){
harcon.simpleIgnite( 'DBServices.addAdmin', function(err, res){ } )
}
You might want to create documents, user records at startup time for development purposes...
If you possess an own SSL key, you can specify the absolute path of the key,cert file pairs in the configuration file as below:
...
server: {
...
ssl: {
key: path.join( process.cwd(), 'ssh', 'sign.key' ),
cert: path.join( process.cwd(), 'ssh', 'sign.crt' ),
ca: path.join( process.cwd(), 'ssh', 'ca.pem' ),
requestCert: true || false,
rejectUnauthorized: true || false
},
...
}
...
floca has a built-in feature to read configurations files automatically. The reason in the previous examples, we passed the ', { noFiles: true }' to the constructor function is to disable the feature for the time being. floca tries to detect the environment the application is running based on the NODE_ENV or nodeEnv variable and reads the configuration file accordingly. As a best practise you are advised to have the followign config files: floca.config.js floca.config.dev.js ... floca.config.[env].js
So if any environment is set, an according configuration file is searched for, otherwise the 'floca.config.js' file will be read. This way you can distinguish the configuration of the system for each environment you are working with. QA, INT, PROD, DEV, etc...
An example configuration file:
module.exports = {
Alice: {
name: 'Miapálya?'
},
floca: {
appName: 'DemoApp',
entityName: 'DemoMicroEntity'
},
server: {
active: true
}
}
Note: notwithstanding that they are config files, they are JS files as well so you can "inherit" settings from other files, abstract out some settings, read some network resource, feel free to apply any orchestration necessary.
In a highly fragmented system, the configuration management should be centralised and accessed through service discovery.
...
floca: {
configurator: 'Tuner'
},
...
The attribute 'configurator' will activate the configuration management in floca and the microservice loader will call the function 'config' of it passing the name of the app and the service to require the configuration sent to the entity to initialise.
FAQs
Enterprise-grade microservice solution for NodeJS
We found that floca demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.