Displaying 1 to 15 from 15 results

jailed - execute untrusted code with custom permissions

  •    Javascript

Jailed is a small JavaScript library for running untrusted code in a sandbox. The library is written in vanilla-js and has no dependencies. Export a set of external functions into the sandbox.

path-exists - Check if a path exists

  •    Javascript

NOTE: fs.existsSync has been un-deprecated in Node.js since 6.8.0. If you only need to check synchronously, this module is not needed.While fs.exists() is being deprecated, there's still a genuine use-case of being able to check if a path exists for other purposes than doing IO with it.




control-access - Easy CORS handling

  •    Javascript

Access-Control-Allow-Credentials indicates whether or not the response to the request can be exposed when the credentials flag is true.Can be set globally with the ACCESS_ALLOW_CREDENTIALS environment variable. Possible values are 1 and 0.

known - Allow only access to known object properties using ES2015 Proxy

  •    Javascript

Proxies are objects for which the programmer has to define the semantics in JavaScript. The default object semantics are implemented in the JavaScript engine, often written in lower-level languages like C++. Proxies let the programmer define most of the behavior of an object in JavaScript. They are said to provide a meta-programming API.

fs-access - Node.js 0.12 fs.access() & fs.accessSync() ponyfill

  •    Javascript

See the fs.access() & fs.accessSync() docs.Mode flags are on the fsAccess instance instead of fs. Only the F_OK mode is supported.


node-access-log - Add simple access logs to any http or https server

  •    Javascript

This will automatically log requests as they come in to the web server that look like... Opts is an object that can contain a format identifier and userID func (both optional).

fs-exists-sync - Drop-in replacement for `fs

  •    Javascript

Drop-in replacement for fs.existsSync with zero dependencies. Other libs I found either have crucial differences from fs.existsSync, or unnecessary dependencies. See README.md for more info. Pull requests and stars are always welcome. For bugs and feature requests, please create an issue.

udaru - Open source Access Manager for node.js

  •    Javascript

Udaru is a Policy Based Access Control (PBAC) authorization module. It supports Organizations, Teams and User entities that are used to build the access model. The policies attached to these entities define the 'Actions' that can be performed by an entity on various 'Resources'. See the Udaru website for complete documentation on Udaru.

json-path-processor - JsonPathProcessor (JPP) - A common data processor target to process data without running try catch hell, and get/set properties of nested objects

  •    Javascript

JsonPathProcessor (JPP) - A common data processor target to process data without running try catch hell, and get/set properties of nested objects. Now JPP stop using lodash and move to ES5. For none ES5 browsers/enviromnent, you should use polyfills to ensure JPP works well. You can try polyfill.io or polyfills.io.

ember-unauthorized - Ember Mixins for handling unauthorized access to application content

  •    Javascript

Then import RouteAccessMixin from 'my-app-name/mixins/route-access'; instead of taking it directly from the addon. Sometimes access to routes isn't solely determined by feature flags, such as through user role access control. To address this, Ember-Unauthorized allows you to optionally implement an authorize method that returns true if the content is authorized for the user.

oauth_reverse_proxy - A proxy that can sign outbound traffic as well as a reverse proxy capable of enforcing that callers present the correct OAuth credentials

  •    Javascript

Layer to add authentication to APIs by checking caller credentials, reverse-proxying inbound traffic to your API, and then signing outbound traffic back to callers. Authentication for web applications, particularly applications created for machine-to-machine use, is often an afterthought or implemented in an insecure or incompatible fashion. We want a robust implementation of OAuth that can run on Windows or Unix systems in front of any HTTP-serving application and support clients written in any language. These are two-party connections, so we can use the simplest form of OAuth: zero-legged OAuth 1.0a.