Security News
New Python Packaging Proposal Aims to Solve Phantom Dependency Problem with SBOMs
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.
A light-weight module that brings window.fetch to Node.js (with HTTP_PROXY support).
A light-weight module that brings window.fetch
to Node.js (with HTTP_PROXY
support).
/**
* @see https://github.com/tim-kos/node-retry#retrytimeoutsoptions
*/
type RetryConfigurationType = {
factor?: number,
maxTimeout?: number,
minTimeout?: number,
randomize?: boolean,
retries?: number
};
type ValidateResponseType = (response: Object) => Promise<boolean>;
type ConfigurationType = {
+agent?: Object,
+body?: string | Buffer | Blob | ReadableStream,
+compress?: boolean,
+follow?: number,
+header?: {[key: string]: string | number},
+method?: string,
+redirect?: 'follow' | 'manual' | 'error',
+retry?: RetryConfigurationType,
+size?: number,
+timeout?: number,
+validateResponse?: ValidateResponseType
};
type fetch = (url: string, configuration?: ConfigurationType) => Promise<Object>;
Name | Value |
---|---|
retry | Used to retry requests that produce response that does not pass validation. Refer to Retry request and Validating response. |
validateResponse | Used to validate response. Refer to Validate response. |
For other configuration properties, refer to node-fetch
documentation.
Uses HTTP_PROXY
(http://host:port
) environment variable value to configure HTTP proxy.
Note: You must also configure
NODE_TLS_REJECT_UNAUTHORIZED=0
. This is a lazy workaround to enable the proxy to work with TLS.
Throws UnexpectedResponseCodeError
error if response code is non-2xx.
This behaviour can be overrode using validateResponse
configuration.
Requests that result in non-2xx response will be retried.
retry
option is used to configure request retry strategy.
The retry
configuration shape matches configuration of the retry
module.
Define a custom validator function to force use the request retry strategy.
A custom validator is configured using validateResponse
configuration, e.g.
import xfetch, {
UnexpectedResponseError
};
const validateResponse = async (response) => {
const body = await response.text();
if (body.includes('rate error')) {
throw new UnexpectedResponseError(response);
}
return true;
}
xfetch('http://gajus.com', {validateResponse});
A custom validator must return a boolean flag indicating whether the response is valid. A custom validator can throw an error that extends UnexpectedResponseError
error.
xfetch
default validator can be imported and used to extend a custom validator, e.g.
import xfetch, {
UnexpectedResponseError,
validateResponse as defaultValidateResponse
};
const validateResponse = async (response) => {
const responseIsValid = await defaultValidateResponse(response);
if (!responseIsValid) {
return responseIsValid;
}
const body = await response.text();
if (body.includes('rate error')) {
throw new UnexpectedResponseError(response);
}
return true;
}
xfetch('http://gajus.com', {validateResponse});
FAQs
A light-weight HTTP client for Node.js.
The npm package xfetch receives a total of 4 weekly downloads. As such, xfetch popularity was classified as not popular.
We found that xfetch demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.
Security News
Socket CEO Feross Aboukhadijeh discusses open source security challenges, including zero-day attacks and supply chain risks, on the Cyber Security Council podcast.
Security News
Research
Socket researchers uncover how threat actors weaponize Out-of-Band Application Security Testing (OAST) techniques across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.