Installations
npm install @ory/client-fetch
Developer Guide
Typescript
No
Module System
CommonJS
Node Version
20.15.0
NPM Version
10.8.1
Score
83.2
Supply Chain
87.5
Quality
97.3
Maintenance
100
Vulnerability
100
License
Releases
Contributors
Languages
PHP (20%)
Java (19%)
C# (16.61%)
Python (12.67%)
Ruby (11.16%)
TypeScript (7.95%)
Dart (7.78%)
Rust (3.48%)
Elixir (1.25%)
Shell (0.05%)
Mustache (0.05%)
Dockerfile (0.01%)
Scala (0.01%)
Developer
ory
Download Statistics
Total Downloads
23,544
Last Day
451
Last Week
1,367
Last Month
5,432
Last Year
23,544
GitHub Statistics
147 Stars
1,669 Commits
84 Forks
11 Watching
25 Branches
31 Contributors
Bundle Size
481.86 kB
Minified
56.63 kB
Minified + Gzipped
Package Meta Information
Latest Version
1.16.2
Package Id
@ory/client-fetch@1.16.2
Unpacked Size
9.11 MB
Size
525.96 kB
File Count
1,488
NPM Version
10.8.1
Node Version
20.15.0
Publised On
16 Jan 2025
Total Downloads
Cumulative downloads
Total Downloads
23,544
Last day
19%
451
Compared to previous day
Last week
-14%
1,367
Compared to previous week
Last month
23.7%
5,432
Compared to previous month
Last year
0%
23,544
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dev Dependencies
1
@ory/client-fetch@v1.16.2
This generator creates TypeScript/JavaScript client that utilizes Fetch API. The generated Node module can be used in the following environments:
Environment
- Node.js
- Webpack
- Browserify
Language level
- ES5 - you must have a Promises/A+ library installed
- ES6
Module system
- CommonJS
- ES6 module system
It can be used in both TypeScript and JavaScript. In TypeScript, the definition will be automatically resolved via package.json
. (Reference)
Building
To build and compile the typescript sources to javascript use:
npm install
npm run build
Publishing
First build the package then run npm publish
Consuming
navigate to the folder of your consuming project and run one of the following commands.
published:
npm install @ory/client-fetch@v1.16.2 --save
unPublished (not recommended):
npm install PATH_TO_GENERATED_PACKAGE --save
![Empty State](/_next/static/media/empty.e5fae2e5.png)
No vulnerabilities found.
Reason
30 commit(s) and 4 issue activity found in the last 90 days -- score normalized to 10
Reason
no dangerous workflow patterns detected
Reason
security policy file detected
Details
- Info: security policy file detected: SECURITY.md:1
- Info: Found linked content: SECURITY.md:1
- Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
- Info: Found text in security policy: SECURITY.md:1
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0
Reason
packaging workflow detected
Details
- Info: Project packages its releases by way of GitHub Actions.: .github/workflows/docker-ci.yml:15
Reason
binaries present in source code
Details
- Warn: binary detected: clients/client/java/gradle/wrapper/gradle-wrapper.jar:1
- Warn: binary detected: clients/hydra/java/gradle/wrapper/gradle-wrapper.jar:1
- Warn: binary detected: clients/keto/java/gradle/wrapper/gradle-wrapper.jar:1
- Warn: binary detected: clients/kratos/java/gradle/wrapper/gradle-wrapper.jar:1
- Warn: binary detected: clients/oathkeeper/java/gradle/wrapper/gradle-wrapper.jar:1
Reason
Found 1/30 approved changesets -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/closed_references.yml:1
- Warn: no topLevel permission defined: .github/workflows/conventional_commits.yml:1
- Warn: no topLevel permission defined: .github/workflows/docker-ci.yml:1
- Warn: no topLevel permission defined: .github/workflows/docker-publish.yml:1
- Warn: no topLevel permission defined: .github/workflows/labels.yml:1
- Warn: no topLevel permission defined: .github/workflows/licenses.yml:1
- Warn: no topLevel permission defined: .github/workflows/stale.yml:1
- Info: no jobLevel write permissions found
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 3 are checked with a SAST tool
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/closed_references.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/closed_references.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/closed_references.yml:23: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/closed_references.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/closed_references.yml:26: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/closed_references.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/conventional_commits.yml:27: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/conventional_commits.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/conventional_commits.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/conventional_commits.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/conventional_commits.yml:49: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/conventional_commits.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:20: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/docker-ci.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:23: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/docker-ci.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/docker-ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-publish.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/docker-publish.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-publish.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/docker-publish.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/labels.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/labels.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/labels.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/labels.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/licenses.yml:20: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/licenses.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/licenses.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/licenses.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/licenses.yml:26: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/licenses.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/stale.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/ory/sdk/stale.yml/master?enable=pin
- Warn: containerImage not pinned by hash: Dockerfile:2: pin your Docker image by updating openjdk:21-bookworm to openjdk:21-bookworm@sha256:f3c2871187043c46f1053dbdbba456032624c9e3e328e760e09e744710127a0b
- Warn: downloadThenRun not pinned by hash: Dockerfile:56
- Warn: npmCommand not pinned by hash: Dockerfile:79
- Warn: npmCommand not pinned by hash: Dockerfile:80
- Warn: downloadThenRun not pinned by hash: Dockerfile:86-93
- Warn: downloadThenRun not pinned by hash: Dockerfile:103
- Warn: npmCommand not pinned by hash: scripts/release.sh:111
- Warn: npmCommand not pinned by hash: scripts/release.sh:120
- Warn: pipCommand not pinned by hash: scripts/release.sh:175
- Warn: npmCommand not pinned by hash: scripts/test.sh:13
- Warn: npmCommand not pinned by hash: scripts/test.sh:20
- Warn: pipCommand not pinned by hash: scripts/test.sh:41
- Warn: pipCommand not pinned by hash: scripts/test.sh:41
- Info: 0 out of 7 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 10 third-party GitHubAction dependencies pinned
- Info: 0 out of 1 containerImage dependencies pinned
- Info: 0 out of 3 downloadThenRun dependencies pinned
- Info: 0 out of 6 npmCommand dependencies pinned
- Info: 0 out of 3 pipCommand dependencies pinned
Reason
37 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-w33c-445m-f8w7
- Warn: Project is vulnerable to: GHSA-3vqj-43w4-2q58
- Warn: Project is vulnerable to: GHSA-4jq9-2xhw-jpx7
- Warn: Project is vulnerable to: GHSA-mr82-8j83-vxmv
- Warn: Project is vulnerable to: GHSA-cx63-2mw6-8hw5
- Warn: Project is vulnerable to: PYSEC-2022-43012 / GHSA-r9hx-vwmv-q579
- Warn: Project is vulnerable to: GHSA-34jh-p97f-mpxf
- Warn: Project is vulnerable to: PYSEC-2023-212 / GHSA-g4mx-q9vg-27p4
- Warn: Project is vulnerable to: PYSEC-2023-207 / GHSA-gwvm-45gx-3cf8
- Warn: Project is vulnerable to: PYSEC-2019-133 / GHSA-mh33-7rrq-662w
- Warn: Project is vulnerable to: PYSEC-2019-132 / GHSA-r64q-w8jr-g9qp
- Warn: Project is vulnerable to: PYSEC-2023-192 / GHSA-v845-jxx5-vc9f
- Warn: Project is vulnerable to: PYSEC-2020-148 / GHSA-wqvq-5m8c-6g24
- Warn: Project is vulnerable to: PYSEC-2018-32 / GHSA-www2-v7xj-xrc6
- Warn: Project is vulnerable to: PYSEC-2021-108
- Warn: Project is vulnerable to: PYSEC-2021-59
- Warn: Project is vulnerable to: GHSA-qq5c-677p-737q
- Warn: Project is vulnerable to: RUSTSEC-2024-0421 / GHSA-h97m-ww89-6jmq
- Warn: Project is vulnerable to: GHSA-q445-7m23-qrmw
- Warn: Project is vulnerable to: RUSTSEC-2024-0357
- Warn: Project is vulnerable to: GHSA-8hc4-vh64-cxmj
- Warn: Project is vulnerable to: GO-2023-1571 / GHSA-vvpx-j8f3-3w6h
- Warn: Project is vulnerable to: GO-2023-1988 / GHSA-2wrh-6pvc-2jm9
- Warn: Project is vulnerable to: GO-2023-2102 / GHSA-4374-p667-p6c8
- Warn: Project is vulnerable to: GHSA-qppj-fm5r-hxr3
- Warn: Project is vulnerable to: GO-2024-2687 / GHSA-4v7x-pqxf-cx7m
- Warn: Project is vulnerable to: GO-2024-3333 / GHSA-w32m-9786-jp63
- Warn: Project is vulnerable to: GO-2024-2611 / GHSA-8r3f-844c-mc37
- Warn: Project is vulnerable to: GHSA-wxmh-65f7-jcvw
- Warn: Project is vulnerable to: PYSEC-2020-149 / GHSA-hmv2-79q8-fv6g
- Warn: Project is vulnerable to: RUSTSEC-2023-0034 / GHSA-f8vr-r385-rh5r
- Warn: Project is vulnerable to: RUSTSEC-2024-0003 / GHSA-8r5v-vm4m-4g25
- Warn: Project is vulnerable to: RUSTSEC-2024-0332 / GHSA-q6cp-qfwq-4gcv
- Warn: Project is vulnerable to: RUSTSEC-2024-0019 / GHSA-r8w9-5wcg-vfj7
- Warn: Project is vulnerable to: GHSA-wf5p-g6vw-rhxx
- Warn: Project is vulnerable to: GHSA-jchw-25xp-jwwc
- Warn: Project is vulnerable to: GHSA-cxjh-pqwp-8mfp
Score
4.4
/10
Last Scanned on 2025-01-27
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn MoreOther packages similar to @ory/client-fetch
@dasprid/ory-client-fetch
OpenAPI client for @dasprid/ory-client-fetch
@sacramentix/ory-client-fetch
OpenAPI client for @sacramentix/ory-client-fetch
@ory/oathkeeper-client-fetch
OpenAPI client for @ory/oathkeeper-client-fetch
@ory/hydra-client-fetch
OpenAPI client for @ory/hydra-client-fetch