Installations
npm install raw-body
Releases
Unable to fetch releases
Developer
stream-utils
Developer Guide
Module System
Unable to determine the module system for this package.
Min. Node Version
>= 0.8
Typescript Support
Yes
Node Version
18.18.2
NPM Version
9.8.1
Statistics
382 Stars
519 Commits
68 Forks
9 Watching
4 Branches
16 Contributors
Updated on 26 Nov 2024
Languages
JavaScript (100%)
Total Downloads
Cumulative downloads
Total Downloads
8,445,607,866
Last day
-9%
7,029,564
Compared to previous day
Last week
2%
42,013,349
Compared to previous week
Last month
7.1%
174,968,279
Compared to previous month
Last year
2.7%
1,949,685,455
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
raw-body
Gets the entire buffer of a stream either as a Buffer
or a string.
Validates the stream's length against an expected length and maximum limit.
Ideal for parsing request bodies.
Install
This is a Node.js module available through the
npm registry. Installation is done using the
npm install
command:
1$ npm install raw-body
TypeScript
This module includes a TypeScript
declaration file to enable auto complete in compatible editors and type
information for TypeScript projects. This module depends on the Node.js
types, so install @types/node
:
1$ npm install @types/node
API
1var getRawBody = require('raw-body')
getRawBody(stream, [options], [callback])
Returns a promise if no callback specified and global Promise
exists.
Options:
length
- The length of the stream. If the contents of the stream do not add up to this length, an400
error code is returned.limit
- The byte limit of the body. This is the number of bytes or any string format supported by bytes, for example1000
,'500kb'
or'3mb'
. If the body ends up being larger than this limit, a413
error code is returned.encoding
- The encoding to use to decode the body into a string. By default, aBuffer
instance will be returned when no encoding is specified. Most likely, you wantutf-8
, so settingencoding
totrue
will decode asutf-8
. You can use any type of encoding supported by iconv-lite.
You can also pass a string in place of options to just specify the encoding.
If an error occurs, the stream will be paused, everything unpiped,
and you are responsible for correctly disposing the stream.
For HTTP requests, you may need to finish consuming the stream if
you want to keep the socket open for future requests. For streams
that use file descriptors, you should stream.destroy()
or
stream.close()
to prevent leaks.
Errors
This module creates errors depending on the error condition during reading. The error may be an error from the underlying Node.js implementation, but is otherwise an error created by this module, which has the following attributes:
limit
- the limit in byteslength
andexpected
- the expected length of the streamreceived
- the received bytesencoding
- the invalid encodingstatus
andstatusCode
- the corresponding status code for the errortype
- the error type
Types
The errors from this module have a type
property which allows for the programmatic
determination of the type of error returned.
encoding.unsupported
This error will occur when the encoding
option is specified, but the value does
not map to an encoding supported by the iconv-lite
module.
entity.too.large
This error will occur when the limit
option is specified, but the stream has
an entity that is larger.
request.aborted
This error will occur when the request stream is aborted by the client before reading the body has finished.
request.size.invalid
This error will occur when the length
option is specified, but the stream has
emitted more bytes.
stream.encoding.set
This error will occur when the given stream has an encoding set on it, making it
a decoded stream. The stream should not have an encoding set and is expected to
emit Buffer
objects.
stream.not.readable
This error will occur when the given stream is not readable.
Examples
Simple Express example
1var contentType = require('content-type') 2var express = require('express') 3var getRawBody = require('raw-body') 4 5var app = express() 6 7app.use(function (req, res, next) { 8 getRawBody(req, { 9 length: req.headers['content-length'], 10 limit: '1mb', 11 encoding: contentType.parse(req).parameters.charset 12 }, function (err, string) { 13 if (err) return next(err) 14 req.text = string 15 next() 16 }) 17}) 18 19// now access req.text
Simple Koa example
1var contentType = require('content-type') 2var getRawBody = require('raw-body') 3var koa = require('koa') 4 5var app = koa() 6 7app.use(function * (next) { 8 this.text = yield getRawBody(this.req, { 9 length: this.req.headers['content-length'], 10 limit: '1mb', 11 encoding: contentType.parse(this.req).parameters.charset 12 }) 13 yield next 14}) 15 16// now access this.text
Using as a promise
To use this library as a promise, simply omit the callback
and a promise is
returned, provided that a global Promise
is defined.
1var getRawBody = require('raw-body') 2var http = require('http') 3 4var server = http.createServer(function (req, res) { 5 getRawBody(req) 6 .then(function (buf) { 7 res.statusCode = 200 8 res.end(buf.length + ' bytes submitted') 9 }) 10 .catch(function (err) { 11 res.statusCode = 500 12 res.end(err.message) 13 }) 14}) 15 16server.listen(3000)
Using with TypeScript
1import * as getRawBody from 'raw-body'; 2import * as http from 'http'; 3 4const server = http.createServer((req, res) => { 5 getRawBody(req) 6 .then((buf) => { 7 res.statusCode = 200; 8 res.end(buf.length + ' bytes submitted'); 9 }) 10 .catch((err) => { 11 res.statusCode = err.statusCode; 12 res.end(err.message); 13 }); 14}); 15 16server.listen(3000);
License
No vulnerabilities found.
Reason
security policy file detected
Details
- Info: security policy file detected: SECURITY.md:1
- Info: Found linked content: SECURITY.md:1
- Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
- Info: Found text in security policy: SECURITY.md:1
Reason
no binaries found in the repo
Reason
no dangerous workflow patterns detected
Reason
0 existing vulnerabilities detected
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
Found 2/17 approved changesets -- score normalized to 1
Reason
0 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/ci.yml:1
- Info: no jobLevel write permissions found
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:132: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:200: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:211: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:218: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:228: update your workflow using https://app.stepsecurity.io/secureworkflow/stream-utils/raw-body/ci.yml/master?enable=pin
- Warn: npmCommand not pinned by hash: .github/workflows/ci.yml:150
- Warn: npmCommand not pinned by hash: .github/workflows/ci.yml:166
- Info: 0 out of 4 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 1 third-party GitHubAction dependencies pinned
- Info: 0 out of 2 npmCommand dependencies pinned
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 16 are checked with a SAST tool
Score
4.2
/10
Last Scanned on 2024-11-18
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More