yinzerflow 0.4.4 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,21 +1,28 @@
1
1
  # YinzerFlow
2
2
 
3
- A lightweight, modular HTTP server framework for Node.js built with TypeScript. Features comprehensive security protections, Pittsburgh personality, and flexible configuration options.
3
+ A lightweight, modular HTTP server framework for Node.js and Bun built with TypeScript. This is a **framework project**, not an API or application. The code here is meant to be used by other developers to build their own applications.
4
4
 
5
- ## 🚀 Quick Start
6
5
 
7
- For complete documentation and examples, see **[docs/start-here.md](docs/start-here.md)**.
8
6
 
9
- ## 📦 Installation
7
+ ## Features
8
+
9
+ YinzerFlow is designed for developers who want:
10
+
11
+ - **Security-first** — Built-in protections against common web vulnerabilities
12
+ - **TypeScript-first** — Full type safety and IntelliSense support (JavaScript is supported natively)
13
+ - **Pittsburgh personality** — Witty logging and error messages
14
+ - **Flexible configuration** — Comprehensive options for different use cases
15
+ - **Modular architecture** — Scales from simple APIs to complex applications
16
+
17
+ ## 🚀 Quick Start
10
18
 
11
19
  ```bash
20
+ # Install
12
21
  npm install yinzerflow
13
22
  # or
14
23
  bun add yinzerflow
15
24
  ```
16
25
 
17
- ## 🔧 Basic Usage
18
-
19
26
  ```typescript
20
27
  import { YinzerFlow } from 'yinzerflow';
21
28
 
@@ -28,31 +35,29 @@ app.get('/hello', () => {
28
35
  await app.listen();
29
36
  ```
30
37
 
31
- ## Features
32
-
33
- - **Security-first** - Built-in protections against common web vulnerabilities
34
- - **TypeScript-first** - Full type safety and IntelliSense support
35
- - **Pittsburgh personality** - Witty logging and error messages
36
- - **Flexible configuration** - Comprehensive options for different use cases
37
- - **Modular architecture** - Scales from simple APIs to complex applications
38
+ YinzerFlow works right out of the box—no configuration required. However, plenty of configuration options are available.
38
39
 
39
40
  ## 📚 Documentation
40
41
 
41
- - **[Getting Started](docs/start-here.md)** - Complete guide and examples
42
- - **[Routes](docs/routes.md)** - Routing system and handlers
43
- - **[Request/Response](docs/request.md)** - Request and response objects
44
- - **[Logging](docs/core/logging.md)** - Logging configuration and customization
45
- - **[Advanced Configuration](docs/advanced-configuration-options.md)** - Detailed configuration options
42
+ For complete documentation, examples, and guides, see the **[docs/](docs/)** folder:
43
+
44
+ - **[Core Concepts](docs/core/core-concepts.md)** - Context, Request, Response, Routing, and Hooks
45
+ - **[Configuration](docs/configuration/configuration.md)** - All configuration options
46
+ - **[Modules](docs/modules/)** - Built-in modules (Rate Limiting, CORS, IP Security, Body Parsing)
47
+
48
+ **📖 [Official Documentation](https://redactdigital.notion.site/YinzerFlow-Web-Framework-Using-bun-and-typescript-293f97dd45ce80ea830deb5197ef7004)** - Published docs with interactive examples
49
+
50
+ ## 🛡️ Built-in Security
46
51
 
47
- ## 🛡️ Security
52
+ YinzerFlow includes comprehensive security features out of the box:
48
53
 
49
- YinzerFlow includes comprehensive security features:
50
- - IP security and rate limiting
51
- - CORS protection
52
- - Body parsing with security limits
53
- - Header validation and sanitization
54
- - Prototype pollution protection
54
+ - **Rate limiting** - Protection against DoS attacks (enabled by default)
55
+ - **IP security** - Advanced IP validation and spoofing detection
56
+ - **CORS protection** - Configurable cross-origin resource sharing
57
+ - **Body parsing limits** - Protection against payload attacks
58
+ - **Header validation** - Automatic sanitization and size limits
59
+ - **CRLF injection prevention** - Secure header handling
55
60
 
56
61
  ## 📄 License
57
62
 
58
- MIT License - see [LICENSE](LICENSE) for details.
63
+ MIT License - see [LICENSE](LICENSE) for details.