Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Scheduled, asynchronous JSON fetching for Node.js applications.
The classic request cycle for a web application follows a call from a client to the server, which in turn makes one or more further requests to some underlying service(s).
+---> Web service 1 --> Data
|
Client ---> Presentation tier --|---> Web service 2 --> Data
|
+---> Web service 3 --> Data
Once the data has been retrieved the response makes its way back through the various layers to the client.
This causes two problems.
Firstly, your response is dependent on the slowest service to respond. If every request is hanging around waiting for 'the slow one' your performance is pegged to the worst performing part of your application.
Secondly, by far the slowest thing in this type of architecture is the round-trip between the presentation tier and the service(s). The more of these open connections you have hanging around, waiting to close, the greater the burden you place on your server.
Often though, and this is especially true of News sites, the data doesn't change radically from second to second so this round trip is wasted effort.
It's much more efficient for each presentation tier server to periodically fetch the data it needs (or listen for a message to signal when new content is available), stash it in memory, then use that to service any incoming requests.
This suits a microservice architecture, where many discrete modules, APIs etc. need to be assembled by a presentation tier before being rendered out to the client (as HTML, JSON etc.).
This pattern (of asynchronous fetching) allows the presentation tier to focus on building a response from existing data (in memory) and sending it back out the front door as quickly as possible.
Install it,
npm install ft-poller
You can create an instance of Poller like so,
var Poller = require('ft-poller'),
response;
var p = new Poller({
url: 'http://www.example.com/foo',
options {}, //optional object compatible with isomorphic-fetch
refreshInterval: 2000,
parseData: function (data) {
response = data;
}
});
p.on('error', function (err) {
console.error(err)
})
This will fire a request every 2s to example.com/foo and cache the result in response.
You can start polling like so,
p.start()
And stop it like this,
p.stop()
Sometimes you don't want to wait the refreshInterval to have your data populated, so passing initialRequest: true will fire the first request as soon as the object is created, and then afterwards, at every refresh interval.
p.start({ initialRequest: true });
Under the hood ft-poller uses request
so you can specify an options
property instead of url
, which will be passed
straight to request
. This allows using e.g POST
instead of GET
.
Given the asynchronous nature of this library, events might provide a simple interface to attach other async code to.
This fires each time the polling mechanism has successfully received a repsonse from it's source. Eg,
var p = new Poller({ url: 'http://example.com/123' })
p.on('ok', function (response, latency) {
// ...
})
This fires each time the polling mechanism fails, passing the error as an argument. Eg,
p.on('error', function (response) {
// ...
})
FAQs
An http client to periodically fetch and cache data from web services
The npm package ft-poller receives a total of 1,635 weekly downloads. As such, ft-poller popularity was classified as popular.
We found that ft-poller demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.