Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
hadouken-js-adapter
Advanced tools
Allows the use of the Hadouken API from node.js.
$ npm install -S hadouken-js-adapter
Connecting to an already running runtime
const { connect, Identity } = require("hadouken-js-adapter");
async function launchApp() {
const fin = await connect({
address: "ws://localhost:9696",
uuid: "my-uuid-123"
});
const version = await fin.System.getVersion();
console.log("Connected to Hadouken version", version);
await fin.Application.start({
name: "adapter-test-app",
url: 'http://hadouken.io/',
uuid: "adapter-test-app",
autoShow: true,
nonPersistent : true
});
}
launchApp().then(() => {
console.log("success");
}).catch((err) => {
console.log("Error trying to connect,", err.message);
console.log(err.stack);
});
Launching a runtime and connecting
const { connect, Identity } = require("hadouken-js-adapter");
async function launchApp() {
const fin = await connect({
uuid: "my-uuid-123",
runtime: {
version: 'stable'
}
});
const version = await fin.System.getVersion();
console.log("Connected to Hadouken version", version);
await fin.Application.start({
name: "adapter-test-app",
url: 'http://hadouken.io/',
uuid: "adapter-test-app",
autoShow: true,
nonPersistent : true
});
}
launchApp().then(() => {
console.log("success");
}).catch((err) => {
console.log("Error trying to connect,", err.message);
console.log(err.stack);
});
Note that either an address or a runtime object with version are required to connect
In order to configure system policies, the js adapter respects the following group policy settings when set as environment variables on Mac and Linux:
npm run build
npm test -- --ver=alpha
Only executing tests that pattern match "Application"
npm test -- --ver=alpha --grep="Application"
Executing tests that do not pattern match "System"
npm test -- --ver=alpha --invert --grep="System"
npm test -- --ver=alpha --build-core --core=~/core
or without specifying the core path (core will be cloned from GH into core
directory):
npm test -- --ver=alpha --build-core
To start the read-eval-print loop:
npm run repl -- --ver=alpha
We use JSDoc for documentation and generating the documentation will require our custom JSDoc template. Use the following commands to execute the docs task:
git submodule init
git submodule update
npm run doc
git checkout -b feature/fooBar
)git commit -am 'Add some fooBar'
)git push origin feature/fooBar
)The code in this repository is distributed under the Apache License, Version 2.0
However, if you run this code, it may call on the OpenFin RVM or OpenFin Runtime, which are covered by OpenFin's Developer, Community, and Enterprise licenses. You can learn more about OpenFin licensing at the links listed below or just email us at support@openfin.co with questions.
Copyright 2018-2019 OpenFin
FAQs
Allows the use of the Hadouken API from node.js.
The npm package hadouken-js-adapter receives a total of 563 weekly downloads. As such, hadouken-js-adapter popularity was classified as not popular.
We found that hadouken-js-adapter demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 23 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.