Skip to main content

How To Use Protocol Buffer in Javascript

We have understood a few advantages of protocol buffer like what I've explained in my other post. Now, let's look at how we can implement it in our code. The "transpiler" tool, named protoc, supports the generation of a helper class for managing the object instance in a variety of programming languages. In this post, we use Javascript as an example and run in a Linux environment.


Preparation

Before we develop our code, we should install protoc for generating the helper class.

  1. Download protoc binary from the release page.
  2. Extract the content and store the directories  (bin and includes) in /usr/local directory so that the executable binary can be accessed directly.
  3. Run protoc --help to check its manual.
  4. Install a required dependency globally to enable protoc to generate the Javascript files by running: npm i -g protoc-gen-js.

Create a proto file

First, we should create an empty directory to store everything. The first thing we will create is a proto file that contains the object schema. For instance, we just create a simple "User" message definition.

syntax="proto3";

package company.my;

message User {
    uint64 id = 1;
    string name = 2;
    repeated string hobbies = 3;
}
    

Generate the helper library

Still, in the same directory, we will generate the helper library for working with the object instance for tasks like setting and getting the values of some properties, serializing an object into binary, or deserializing binary into an object.

protoc user.proto --proto_path=./ --js_out=import_style=commonjs_strict,binary:./
    

In the command above we use commonjs_strict parameter to generate a CommonJS-styled library and prevent exposing the class to global scope. After running the command above, we will have a user_pb.js file.

Take a look at the generated file. We can see some setter and getter methods that already align with the object property names like getId, setName, addHobbies, getHobbiesList, and so on. In this case, hobbies property has different methods because the property stores an array value.


Create a sample code

We need to initialize a Javascript project and install a required library which is google-protobuf.

npm init
npm i google-protobuf
    

We can use the following script as an example. Let's create a index.js file.

const userProto = require('./user_pb');
const User = userProto.company.my.User;

// Create a User instance and set some values
const user = new User();
user.setId(123);
user.setName('John');
user.addHobbies('Skiing');
user.addHobbies('Hiking');

// Serializes to a binary (UInt8Array).
const bytes = user.serializeBinary();

// We can store the binary into a file 
// or send directly the bytes to other machines

// Deserialize to a JavaScript object.
const data = User.deserializeBinary(bytes);

console.log('ID:', data.getId());
console.log('Name:', data.getName());
console.log('Hobbies:', data.getHobbiesList());
    

Comments

  1. Browsing the red lobster menu with prices made meal planning easier. It provides all the necessary details to help customers choose delicious dishes without confusion about pricing.

    ReplyDelete
  2. I appreciate the simplicity of the pizza hut menu with prices. It helps customers explore meals easily, compare prices, choose combos, and enjoy tasty pizzas and sides while ensuring that every order is affordable, satisfying, and completely transparent.

    ReplyDelete

Post a Comment

Popular posts from this blog

Deploying a Web Server on UpCloud using Terraform Modules

In my earlier post , I shared an example of deploying UpCloud infrastructure using Terraform from scratch. In this post, I want to share how to deploy the infrastructure using available Terraform modules to speed up the set-up process, especially for common use cases like preparing a web server. For instance, our need is to deploy a website with some conditions as follows. The website can be accessed through HTTPS. If the request is HTTP, it will be redirected to HTTPS. There are 2 domains, web1.yourdomain.com and web2.yourdomain.com . But, users should be redirected to "web2" if they are visiting "web1". There are 4 main modules that we need to set up the environment. Private network. It allows the load balancer to connect with the server and pass the traffic. Server. It is used to host the website. Load balancer. It includes backend and frontend configuration. Dynamic certificate. It is requ...

How To Verify Phone Number for Free Using WhatsApp

If you have a product or business that maintains user information like phone numbers, verifying the validity or ownership of the phone number could become important, as the phone number can be used as an authentication method or targeted marketing channel. The typical phone verification procedure is by generating a code or OTP in our application, sending that OTP to the user's phone, and then the user should insert the OTP in our application for verification. The OTP can be sent to the users through services like SMS or WhatsApp that require a valid phone number. For internet-based communication, WhatsApp has become the de facto standard for sending the OTP. WhatsApp requires its users to have a valid phone number during account creation, and it already has a huge number of users, approximately 3 billion in 2025. Using that common procedure, WhatsApp will charge us for each OTP sent. The cost depends on the country of the target phone number. For Indonesia...

Increase of Malicious Activities and Implementation of reCaptcha

In recent time, I've seen the increase of malicious activities such as login attempts or phishing emails to some accounts I manage. Let me list some of them and the actions taken. SSH Access Attempts This happened on a server that host a Gitlab server. Because of this case, I started to limit the incoming traffic to the server using internal and cloud firewall provided by the cloud provider. I limit the exposed ports, connected network interfaces, and allowed protocols. Phishing Attempts This typically happened through email and messaging platform such as Whatsapp and Facebook Page messaging. The malicious actors tried to share a suspicious link lured as invoice, support ticket, or something else. Malicious links shared Spammy Bot The actors leverage one of public endpoint on my website to send emails. Actually, the emails won't be forwarded anywhere except to my own email so this just full my inbox. This bot is quite active, but I'm still not sure what...

What's Good About Strapi, a Headless CMS

Recently, I've been revisiting Strapi as a solution for building backend systems. I still think this headless CMS can be quite useful in certain cases, especially for faster prototyping or creating common websites like company profiles or e-commerce platforms . It might even have the potential to handle more complex systems. With the release of version 5, I'm curious to know what updates it brings. Strapi has launched a new documentation page, and it already feels like an improvement in navigation and content structure compared to the previous version. That said, there's still room for improvement, particularly when it comes to use cases and best practices for working with Strapi. In my opinion, Strapi stands out with some compelling features that could catch developers' attention. I believe three key aspects of Strapi offer notable advantages. First, the content-type builder feature lets us design the data structure of an entity or database model , including ...

Why Hashicorp Vault Can Be Important

As I have been working on many software projects and teams, I see that sharing credentials among developers is a common thing. Sometimes, developers store credentials in a file where everyone in the team can access them just to streamline the development process. But, I was also wondering how to maintain the security of the software or data managed while the credentials are accessible to everyone. How can we monitor the usage, make sure that no one in the team uses the credentials differently than they're supposed to be, or renew the credentials with ease? Hashicorp Vault is one of the solutions in the market that can answer that question. There are three main problems that Vault solves. The first is called secret sprawl where the credentials are spread everywhere to many individuals. Then, it becomes difficult when someone leave the team and we have to renew the existing credentials to secure the access. Vault can provide a mechanism to centralize the credentials storage, p...

Kenshin VS The Assassin

It is an assassin versus assassin.