From dd4471697b0d23ee07f1100d943a0046dfc03b10 Mon Sep 17 00:00:00 2001 From: Vijay Pratap Date: Thu, 27 Jun 2024 00:00:05 +0530 Subject: [PATCH] Y2024 --- README.md | 53 +++++++++++++------------ package.json | 2 +- packages/create-mernjs-app/README.md | 53 +++++++++++++------------ packages/create-mernjs-app/package.json | 2 +- 4 files changed, 58 insertions(+), 52 deletions(-) diff --git a/README.md b/README.md index 6e9b06b2..786ff928 100755 --- a/README.md +++ b/README.md @@ -11,7 +11,7 @@ If you find this code useful, don't forget to 2. Library Boilerplates -Library boilerplates for building npm package. +Library boilerplates offer pre-configured templates for creating npm packages, enabling efficient and standardized development of reusable code libraries. | SN. | Boilerplates | Download | | ------ | ------ | ------ | @@ -75,7 +76,7 @@ Library boilerplates for building npm package.

3. Modules

-Explore a collection of sample projects organized by technology +Discover a collection of sample projects, organized by technology, to help you quickly implement specific features or functionalities in your applications. *NodeJS* @@ -92,68 +93,70 @@ Explore a collection of sample projects organized by technology

Key Features

+Effortlessly build secure and scalable MERN applications with automated setup, industry-standard coding practices, secure authentication, robust data handling, and proactive security measures. + 1. **Effortless Initialization:** - Quickly start your MERN project with a straightforward command-line interface that automates the setup process. + Start your MERN project quickly using a simple command-line interface that sets up everything automatically. 2. **Secure Coding Practices:** - Adopt industry standards for resilient code. Regular reviews and best practices minimize vulnerabilities and exploits in development. + Follow industry standards to write strong, resilient code. Regular reviews and best practices reduce vulnerabilities during development. 3. **Well-Defined Folder Structure:** - Benefit from a clean and organized project structure that promotes maintainability and scalability. + Use a clean and organized project layout that makes it easy to maintain and expand your application. 4. **Server & Client Code Separation:** - Easily manage server-side and client-side code in separate sections, ensuring modularity and ease of development. + Keep server-side and client-side code separate for easier management and development. 5. **Authentication Ready:** - Implement secure login/signup features effortlessly, following best practices to safeguard user data. + Easily add secure login/signup features using best practices to protect user data. 6. **Automatic Indentation:** - Ensure consistent code formatting with automatic indentation tools, improving code readability. + Automatically format code for consistency, making it easier to read and understand. 7. **ESLint Integration:** - Enhance code quality by incorporating ESLint, which identifies and helps rectify potential issues according to established coding standards. + Improve code quality by using ESLint to find and fix potential issues based on coding standards. 8. **Prettier Support:** - Utilize Prettier for automatic code formatting, maintaining a cohesive and visually appealing codebase. + Use Prettier to automatically format your code, keeping it neat and visually appealing. 9. **Tailwind CSS for Styling:** - Harness the power of Tailwind CSS to expedite the styling process, creating responsive and visually pleasing user interfaces. + Speed up styling with Tailwind CSS, creating responsive and attractive user interfaces. 10. **Data Encryption:** - Utilize encryption for secure data transmission and storage, safeguarding against unauthorized access and ensuring data integrity. + Encrypt data to secure it during storage and transmission, protecting against unauthorized access. 11. **Input Validation:** - Apply stringent input validation to prevent injection attacks and ensure safe user input. + Validate user inputs rigorously to prevent attacks and ensure safe usage. 12. **CORS:** - Configure Cross-Origin Resource Sharing policies to control domain access, preventing unauthorized cross-origin requests. + Control which domains can access your application to prevent unauthorized requests. 13. **Rate Limiting:** - Enforce API rate limits to prevent abuse, mitigating the risk of denial-of-service attacks. + Limit API usage to prevent abuse and protect against denial-of-service attacks. 14. **Error Handling:** - Develop secure error-handling mechanisms for developers and users, avoiding sensitive information exposure. + Implement effective error-handling mechanisms to keep sensitive information secure. 15. **Middleware Security:** - Strengthen middleware components against common threats, ensuring secure core functionalities and preventing vulnerabilities. + Secure middleware components to protect core functionalities from common threats. 16. **Dependency Scanning:** - Regularly scan and update dependencies to patch known vulnerabilities, reducing the risk of exploits. + Regularly check and update dependencies to fix known vulnerabilities and enhance security. 17. **Secure File Uploads:** - Implement secure file upload mechanisms, including type and size validation for enhanced application security. + Safely upload files with validation to ensure they are safe for your application. 18. **Environment Configuration:** - Securely manage environment configurations, protecting sensitive data like API keys and credentials. + Manage environment settings securely to protect sensitive data like API keys. 19. **Security Headers:** - Set HTTP security headers to enhance browser security, guarding against common web vulnerabilities. + Set HTTP security headers to make your web application more secure against common vulnerabilities. 20. **API Versioning:** - Implement API versioning for backward compatibility and smooth transitions during updates. + Implement versioning for your APIs to support smooth updates and compatibility. 21. **Monitoring:** - Establish robust monitoring for prompt detection and response to security incidents, ensuring continuous application integrity. + Set up robust monitoring to quickly detect and respond to security incidents, ensuring your application stays secure and reliable.

Support

diff --git a/package.json b/package.json index 1b775bda..ddf20348 100755 --- a/package.json +++ b/package.json @@ -3,7 +3,7 @@ "version": "1.0.0", "description": "The MERN App provides a versatile set of boilerplates that streamline the development process for various applications. Whether you're building a web app, mobile app, desktop app, Chrome extension, or an NPM package in JavaScript, our comprehensive templates will help you get started quickly and efficiently.", "scripts": { - "publish": "sh publish.sh", + "deploy": "sh publish.sh", "app-upgrade": "sh app-upgrade.sh", "app-stop": "sh app-stop.sh", "library-upgrade": "sh library-upgrade.sh", diff --git a/packages/create-mernjs-app/README.md b/packages/create-mernjs-app/README.md index 6e9b06b2..786ff928 100755 --- a/packages/create-mernjs-app/README.md +++ b/packages/create-mernjs-app/README.md @@ -11,7 +11,7 @@ If you find this code useful, don't forget to
2. Library Boilerplates -Library boilerplates for building npm package. +Library boilerplates offer pre-configured templates for creating npm packages, enabling efficient and standardized development of reusable code libraries. | SN. | Boilerplates | Download | | ------ | ------ | ------ | @@ -75,7 +76,7 @@ Library boilerplates for building npm package.

3. Modules

-Explore a collection of sample projects organized by technology +Discover a collection of sample projects, organized by technology, to help you quickly implement specific features or functionalities in your applications. *NodeJS* @@ -92,68 +93,70 @@ Explore a collection of sample projects organized by technology

Key Features

+Effortlessly build secure and scalable MERN applications with automated setup, industry-standard coding practices, secure authentication, robust data handling, and proactive security measures. + 1. **Effortless Initialization:** - Quickly start your MERN project with a straightforward command-line interface that automates the setup process. + Start your MERN project quickly using a simple command-line interface that sets up everything automatically. 2. **Secure Coding Practices:** - Adopt industry standards for resilient code. Regular reviews and best practices minimize vulnerabilities and exploits in development. + Follow industry standards to write strong, resilient code. Regular reviews and best practices reduce vulnerabilities during development. 3. **Well-Defined Folder Structure:** - Benefit from a clean and organized project structure that promotes maintainability and scalability. + Use a clean and organized project layout that makes it easy to maintain and expand your application. 4. **Server & Client Code Separation:** - Easily manage server-side and client-side code in separate sections, ensuring modularity and ease of development. + Keep server-side and client-side code separate for easier management and development. 5. **Authentication Ready:** - Implement secure login/signup features effortlessly, following best practices to safeguard user data. + Easily add secure login/signup features using best practices to protect user data. 6. **Automatic Indentation:** - Ensure consistent code formatting with automatic indentation tools, improving code readability. + Automatically format code for consistency, making it easier to read and understand. 7. **ESLint Integration:** - Enhance code quality by incorporating ESLint, which identifies and helps rectify potential issues according to established coding standards. + Improve code quality by using ESLint to find and fix potential issues based on coding standards. 8. **Prettier Support:** - Utilize Prettier for automatic code formatting, maintaining a cohesive and visually appealing codebase. + Use Prettier to automatically format your code, keeping it neat and visually appealing. 9. **Tailwind CSS for Styling:** - Harness the power of Tailwind CSS to expedite the styling process, creating responsive and visually pleasing user interfaces. + Speed up styling with Tailwind CSS, creating responsive and attractive user interfaces. 10. **Data Encryption:** - Utilize encryption for secure data transmission and storage, safeguarding against unauthorized access and ensuring data integrity. + Encrypt data to secure it during storage and transmission, protecting against unauthorized access. 11. **Input Validation:** - Apply stringent input validation to prevent injection attacks and ensure safe user input. + Validate user inputs rigorously to prevent attacks and ensure safe usage. 12. **CORS:** - Configure Cross-Origin Resource Sharing policies to control domain access, preventing unauthorized cross-origin requests. + Control which domains can access your application to prevent unauthorized requests. 13. **Rate Limiting:** - Enforce API rate limits to prevent abuse, mitigating the risk of denial-of-service attacks. + Limit API usage to prevent abuse and protect against denial-of-service attacks. 14. **Error Handling:** - Develop secure error-handling mechanisms for developers and users, avoiding sensitive information exposure. + Implement effective error-handling mechanisms to keep sensitive information secure. 15. **Middleware Security:** - Strengthen middleware components against common threats, ensuring secure core functionalities and preventing vulnerabilities. + Secure middleware components to protect core functionalities from common threats. 16. **Dependency Scanning:** - Regularly scan and update dependencies to patch known vulnerabilities, reducing the risk of exploits. + Regularly check and update dependencies to fix known vulnerabilities and enhance security. 17. **Secure File Uploads:** - Implement secure file upload mechanisms, including type and size validation for enhanced application security. + Safely upload files with validation to ensure they are safe for your application. 18. **Environment Configuration:** - Securely manage environment configurations, protecting sensitive data like API keys and credentials. + Manage environment settings securely to protect sensitive data like API keys. 19. **Security Headers:** - Set HTTP security headers to enhance browser security, guarding against common web vulnerabilities. + Set HTTP security headers to make your web application more secure against common vulnerabilities. 20. **API Versioning:** - Implement API versioning for backward compatibility and smooth transitions during updates. + Implement versioning for your APIs to support smooth updates and compatibility. 21. **Monitoring:** - Establish robust monitoring for prompt detection and response to security incidents, ensuring continuous application integrity. + Set up robust monitoring to quickly detect and respond to security incidents, ensuring your application stays secure and reliable.

Support

diff --git a/packages/create-mernjs-app/package.json b/packages/create-mernjs-app/package.json index 83d11f8b..c6a1a2e4 100644 --- a/packages/create-mernjs-app/package.json +++ b/packages/create-mernjs-app/package.json @@ -1,6 +1,6 @@ { "name": "create-mernjs-app", - "version": "21.0.23", + "version": "21.0.24", "description": "The MERN App provides a versatile set of boilerplates that streamline the development process for various applications. Whether you're building a web app, mobile app, desktop app, Chrome extension, or an NPM package in JavaScript, our comprehensive templates will help you get started quickly and efficiently.", "main": "./index.js", "scripts": {