Gathering detailed insights and metrics for @stableness/basic-auth
Gathering detailed insights and metrics for @stableness/basic-auth
Gathering detailed insights and metrics for @stableness/basic-auth
Gathering detailed insights and metrics for @stableness/basic-auth
Generic basic auth Authorization header field parser
npm install @stableness/basic-auth
Typescript
Module System
Min. Node Version
Node Version
NPM Version
68.8
Supply Chain
98.7
Quality
74.8
Maintenance
100
Vulnerability
100
License
JavaScript (100%)
Total Downloads
15,146
Last Day
1
Last Week
6
Last Month
17
Last Year
2,949
MIT License
134 Commits
2 Branches
1 Contributors
Updated on Jul 02, 2020
Minified
Minified + Gzipped
Latest Version
102.0.1
Package Id
@stableness/basic-auth@102.0.1
Unpacked Size
9.35 kB
Size
3.97 kB
File Count
6
NPM Version
6.14.5
Node Version
12.18.1
Cumulative downloads
Total Downloads
Last Day
0%
1
Compared to previous day
Last Week
50%
6
Compared to previous week
Last Month
-29.2%
17
Compared to previous month
Last Year
-5.5%
2,949
Compared to previous year
Generic basic auth Authorization header field parser for whatever.
This is a Node.js module available through the
npm registry. Installation is done using the
npm install
command:
$ npm install basic-auth
1var auth = require('basic-auth')
Get the basic auth credentials from the given request. The Authorization
header is parsed and if the header is invalid, undefined
is returned,
otherwise an object with name
and pass
properties.
Parse a basic auth authorization header string. This will return an object
with name
and pass
properties, or undefined
if the string is invalid.
Pass a Node.js request object to the module export. If parsing fails
undefined
is returned, otherwise an object with .name
and .pass
.
1var auth = require('basic-auth') 2var user = auth(req) 3// => { name: 'something', pass: 'whatever' }
A header string from any other location can also be parsed with
auth.parse
, for example a Proxy-Authorization
header:
1var auth = require('basic-auth') 2var user = auth.parse(req.getHeader('Proxy-Authorization'))
1var http = require('http') 2var auth = require('basic-auth') 3var compare = require('tsscmp') 4 5// Create server 6var server = http.createServer(function (req, res) { 7 var credentials = auth(req) 8 9 // Check credentials 10 // The "check" function will typically be against your user store 11 if (!credentials || !check(credentials.name, credentials.pass)) { 12 res.statusCode = 401 13 res.setHeader('WWW-Authenticate', 'Basic realm="example"') 14 res.end('Access denied') 15 } else { 16 res.end('Access granted') 17 } 18}) 19 20// Basic function to validate credentials for example 21function check (name, pass) { 22 var valid = true 23 24 // Simple method to prevent short-circut and use timing-safe compare 25 valid = compare(name, 'john') && valid 26 valid = compare(pass, 'secret') && valid 27 28 return valid 29} 30 31// Listen 32server.listen(3000)
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
0 existing vulnerabilities detected
Reason
license file detected
Details
Reason
Found 0/30 approved changesets -- score normalized to 0
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no SAST tool detected
Details
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
branch protection not enabled on development/release branches
Details
Score
Last Scanned on 2025-04-28
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More