
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
@digigov-oss/auditrecord-postgresql-engine
Advanced tools
PostgreSQL storage database for use with audit mechanism of GSIS
Complementary engine for AuditRecordDB module to use famous PostgreSQL DB for storage.
To work with Postgresql, you need to use PostgresqlEngine
instead of FileEngine
Moreover, have to install the native libpg
library for Postgresql.
To make it work, pass environment variables according to the documentation of the LIBPGSQL library. https://www.postgresql.org/docs/9.1/libpq-envars.html
Please remember that protocol and/or transaction id sequences will be created in the database if not provided.
You can set the reset protocol number type at "daily","monthly" or "yearly". By default, it is "innumerable", i.e. never resets.
If you select one of the reset types, a new sequence will be created in the database for protocol needs as protxxxxx_seq. So if you do not need to keep tracking on application, you may need to clean up those sequences from time to time using a cron job.
//you can use the PostgresSqlEngine via enviroment variables
import auditRecordDB from '@digigov-oss/gsis-audit-record-db';
import {PostgreSqlEngine} from '@digigov-oss/auditrecord-postgresql-engine';
const main = () =>{
process.env.PGHOST='localhost'
process.env.PGUSER='dbuser'
process.env.PGPASSWORD='secretpassword'
process.env.PGDATABASE='audit'
process.env.PGPORT='5432'
console.log(auditRecordDB({},new PostgresSqlEngine()))
}
//or via connection string
import auditRecordDB from '@digigov-oss/gsis-audit-record-db';
import {PostgreSqlEngine} from '@digigov-oss/auditrecord-postgresql-engine';
const connectionString = 'postgresql://dbuser:secretpassword@localhost:5432/audit'
const main = () =>{
console.log(auditRecordDB({},new PostgresSqlEngine(connectionString)))
}
//The postgresql engine asumes that you have already create the table `audit_records` in the database, and that the table has the following columns:
//auditUnit: text
//auditTransactionId: text
//auditProtocol: text
//auditTransactionDate: text
//auditUserIp: text
//auditUserId: text
//
//if you have already a table on Postgresql you can use it by mapping the columns to the AuditRecord
import auditRecordDB from '@digigov-oss/gsis-audit-record-db';
import {PostgreSqlEngine} from '@digigov-oss/auditrecord-postgresql-engine';
const connectionString = 'postgresql://dbuser:secretpassword@localhost:5432/audit'
const main = () =>{
console.log(auditRecordDB({},new PostgresSqlEngine(connectionString,{
tableName:'audit_records',
columns:{
auditUnit:'audit_unit',
auditTransactionId:'audit_transaction_id',
auditProtocol:'audit_protocol',
auditTransactionDate:'audit_transaction_date',
auditUserIp:'audit_user_ip',
auditUserId:'audit_user_id'
}
})))
}
FAQs
PostgreSQL storage database for use with audit mechanism of GSIS
The npm package @digigov-oss/auditrecord-postgresql-engine receives a total of 6 weekly downloads. As such, @digigov-oss/auditrecord-postgresql-engine popularity was classified as not popular.
We found that @digigov-oss/auditrecord-postgresql-engine demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.