Installations
npm install @d-fischer/raw-body
Developer Guide
Typescript
Yes
Module System
CommonJS, ESM
Min. Node Version
>= 0.8
Node Version
14.7.0
NPM Version
6.14.7
Score
72.5
Supply Chain
98.3
Quality
74.3
Maintenance
100
Vulnerability
100
License
Releases
Unable to fetch releases
Contributors
Unable to fetch Contributors
Languages
JavaScript (100%)
validate.email ๐
Verify real, reachable, and deliverable emails with instant MX records, SMTP checks, and disposable email detection.
Developer
stream-utils
Download Statistics
Total Downloads
158,328
Last Day
77
Last Week
902
Last Month
2,746
Last Year
32,106
GitHub Statistics
MIT License
388 Stars
519 Commits
70 Forks
8 Watchers
4 Branches
16 Contributors
Updated on Mar 11, 2025
Bundle Size
268.40 kB
Minified
152.79 kB
Minified + Gzipped
Package Meta Information
Latest Version
2.4.3
Package Id
@d-fischer/raw-body@2.4.3
Size
7.56 kB
NPM Version
6.14.7
Node Version
14.7.0
Published on
Oct 04, 2020
Oops! Something went wrong.
raw-body
Gets the entire buffer of a stream either as a Buffer
or a string.
Validates the stream's length against an expected length and maximum limit.
Ideal for parsing request bodies.
Install
This is a Node.js module available through the
npm registry. Installation is done using the
npm install
command:
1$ npm install raw-body
TypeScript
This module includes a TypeScript
declaration file to enable auto complete in compatible editors and type
information for TypeScript projects. This module depends on the Node.js
types, so install @types/node
:
1$ npm install @types/node
API
1var getRawBody = require('raw-body')
getRawBody(stream, [options], [callback])
Returns a promise if no callback specified and global Promise
exists.
Options:
length
- The length of the stream. If the contents of the stream do not add up to this length, an400
error code is returned.limit
- The byte limit of the body. This is the number of bytes or any string format supported by bytes, for example1000
,'500kb'
or'3mb'
. If the body ends up being larger than this limit, a413
error code is returned.encoding
- The encoding to use to decode the body into a string. By default, aBuffer
instance will be returned when no encoding is specified. Most likely, you wantutf-8
, so settingencoding
totrue
will decode asutf-8
. You can use any type of encoding supported by iconv-lite.
You can also pass a string in place of options to just specify the encoding.
If an error occurs, the stream will be paused, everything unpiped,
and you are responsible for correctly disposing the stream.
For HTTP requests, no handling is required if you send a response.
For streams that use file descriptors, you should stream.destroy()
or stream.close()
to prevent leaks.
Errors
This module creates errors depending on the error condition during reading. The error may be an error from the underlying Node.js implementation, but is otherwise an error created by this module, which has the following attributes:
limit
- the limit in byteslength
andexpected
- the expected length of the streamreceived
- the received bytesencoding
- the invalid encodingstatus
andstatusCode
- the corresponding status code for the errortype
- the error type
Types
The errors from this module have a type
property which allows for the progamatic
determination of the type of error returned.
encoding.unsupported
This error will occur when the encoding
option is specified, but the value does
not map to an encoding supported by the iconv-lite
module.
entity.too.large
This error will occur when the limit
option is specified, but the stream has
an entity that is larger.
request.aborted
This error will occur when the request stream is aborted by the client before reading the body has finished.
request.size.invalid
This error will occur when the length
option is specified, but the stream has
emitted more bytes.
stream.encoding.set
This error will occur when the given stream has an encoding set on it, making it
a decoded stream. The stream should not have an encoding set and is expected to
emit Buffer
objects.
Examples
Simple Express example
1var contentType = require('content-type') 2var express = require('express') 3var getRawBody = require('raw-body') 4 5var app = express() 6 7app.use(function (req, res, next) { 8 getRawBody(req, { 9 length: req.headers['content-length'], 10 limit: '1mb', 11 encoding: contentType.parse(req).parameters.charset 12 }, function (err, string) { 13 if (err) return next(err) 14 req.text = string 15 next() 16 }) 17}) 18 19// now access req.text
Simple Koa example
1var contentType = require('content-type') 2var getRawBody = require('raw-body') 3var koa = require('koa') 4 5var app = koa() 6 7app.use(function * (next) { 8 this.text = yield getRawBody(this.req, { 9 length: this.req.headers['content-length'], 10 limit: '1mb', 11 encoding: contentType.parse(this.req).parameters.charset 12 }) 13 yield next 14}) 15 16// now access this.text
Using as a promise
To use this library as a promise, simply omit the callback
and a promise is
returned, provided that a global Promise
is defined.
1var getRawBody = require('raw-body') 2var http = require('http') 3 4var server = http.createServer(function (req, res) { 5 getRawBody(req) 6 .then(function (buf) { 7 res.statusCode = 200 8 res.end(buf.length + ' bytes submitted') 9 }) 10 .catch(function (err) { 11 res.statusCode = 500 12 res.end(err.message) 13 }) 14}) 15 16server.listen(3000)
Using with TypeScript
1import * as getRawBody from 'raw-body'; 2import * as http from 'http'; 3 4const server = http.createServer((req, res) => { 5 getRawBody(req) 6 .then((buf) => { 7 res.statusCode = 200; 8 res.end(buf.length + ' bytes submitted'); 9 }) 10 .catch((err) => { 11 res.statusCode = err.statusCode; 12 res.end(err.message); 13 }); 14}); 15 16server.listen(3000);
License

No vulnerabilities found.
Reason
no binaries found in the repo
Reason
security policy file detected
Details
- Info: security policy file detected: SECURITY.md:1
- Info: Found linked content: SECURITY.md:1
- Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
- Info: Found text in security policy: SECURITY.md:1
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
0 existing vulnerabilities detected
Reason
Found 2/17 approved changesets -- score normalized to 1
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/ci.yml:1
- Info: no jobLevel write permissions found
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:132: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:200: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:211: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:218: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:228: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: npmCommand not pinned by hash: .github/workflows/ci.yml:150
- Warn: npmCommand not pinned by hash: .github/workflows/ci.yml:166
- Info: 0 out of 4 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 1 third-party GitHubAction dependencies pinned
- Info: 0 out of 2 npmCommand dependencies pinned
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 16 are checked with a SAST tool
Score
4.2
/10
Last Scanned on 2025-03-03
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More