Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
hono-ronin
Advanced tools
A Hono middleware for querying data from RONIN with ease.
First, install the package with a package manager of your choice:
# Bun
bun add hono-ronin
# npm
npm install hono-ronin
Next, create a new app token on the RONIN dashboard (under "Apps" in the sidebar), and add it as a environment variable named RONIN_TOKEN
to your Hono context.
Once added, you can import and use the middleware in your Hono app:
import { Hono } from "hono";
import { ronin } from "hono-ronin";
const app = new Hono();
app.use("*", ronin());
app.get("/", async (c) => {
const posts = await c.var.ronin.get.posts();
return c.json(posts);
});
That's it! 🎉
You can now start inserting records with the RONIN query syntax, or add them on the RONIN dashboard. Everything you can do with the RONIN Hono client, you can also do on the dashboard (creating records, retrieving them, filtering them, updating them, etc).
Out of the box, we also export the required Bindings
and Variables
types, which you can use to extend the Hono context and get full auto-completion:
import { Hono } from "hono";
import { ronin, type Bindings, type Variables } from "hono-ronin";
const app = new Hono<{
Bindings: Bindings;
Variables: Variables;
}>();
app.use("*", ronin());
We would be excited to welcome your suggestions for the RONIN Hono client!
To start contributing code, first make sure you have Bun installed, which is a JavaScript runtime.
Next, clone the repo and install its dependencies:
bun install
Once that's done, link the package to make it available to all of your local projects:
bun link
Inside your project, you can then run the following command, which is similar to bun add hono-ronin
or npm install hono-ronin
, except that it doesn't install hono-ronin
from npm, but instead uses your local clone of the package:
bun link hono-ronin
If your project is not yet compatible with Bun, feel free to replace all of the occurances of the word bun
in the commands above with npm
instead.
You will just need to make sure that, once you create a pull request on the current repo, it will not contain a package-lock.json
file, which is usually generated by npm. Instead, we're using the bun.lockb
file for this purpose (locking sub dependencies to a certain version).
In order to be compatible with a wide range of projects, the source code of the hono-ronin
repo needs to be compiled (transpiled) whenever you make changes to it. To automate this, you can keep this command running in your terminal:
bun run dev
Whenever you make a change to the source code, it will then automatically be transpiled again.
The RONIN Hono client has 100% test coverage, which means that every single line of code is tested automatically, to ensure that any change to the source code doesn't cause a regression.
Before you create a pull request on the hono-ronin
repo, it is therefore advised to run those tests in order to ensure everything works as expected:
# Run all tests
bun test
# Alternatively, run a single test
bun test -t 'your test name'
FAQs
Access the RONIN data platform via Hono.
The npm package hono-ronin receives a total of 76 weekly downloads. As such, hono-ronin popularity was classified as not popular.
We found that hono-ronin demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.