Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@driffel/universal-google-logger
Advanced tools
Log across Google Cloud (GCE VMs, Firebase Functions, etc.) using one library.
Use the same library to log across GCE VMs, Firebase Functions, etc.
Makes sharing common code across environments easier.
/**
* Import method directly from default logger instance.
*
* Available methods:
* alert, critical, debug, emergency, error, info, notice, warning
*
* Can also import default logger via the `logger` export.
*/
import { info } from "@driffel/universal-google-logger";
info("Text payload");
info({ someField: "JSON payload" });
import { UniversalGoogleLogger } from "@driffel/universal-google-logger";
const customLogger = new UniversalGoogleLogger("Custom logger name");
customLogger.info("Text payload");
customLogger.info({ someField: "JSON payload" });
import { attachContextWithTraceState } from "@driffel/universal-google-logger";
const app = express().use(
attachContextWithTraceState({ rethrowExceptions: false })
);
This library is not fully tested for all possible environment permutations. It is an MVP (minimum viable product) that has been tested under standard GCE VMs, as well as Firebase Functions (v2) configured under a Cloud Run-based deployment. It should work in various other enviroments, but feedback as well as PR's are welcome (also feel free to inform if any configs, etc. are inaccurate; this is the culmination of a "best effort" in bringing together multiple info sources of varying age).
When logging in Firebase/Google Cloud, you have three options, but none of them fulfill all requirements of propagating the correct metadata and log severity levels across environments. This makes developing for shared code across environments difficult when it comes to logging.
console.log
/ warn / error / etc...
Propagates entries to Logs Explorer and sets the correct metadata fields for discovery using default filters from a function or VM, but does not properly embed the correct severity based on the console method called.
@google-cloud/logging
library
Generally considered the more modern and preferred approach to logging. Works well with handling metadata and severity level in GCE VM environments, but does not populate most of the metadata when in Firebase Function environments, making log discovery difficult.
firebase-functions/logger
library
Works well with all required metadata and appropriate severity levels, but only works for Firebase Functions.
This library wraps functionality of the @google-cloud/logging
library and fills gaps in the metadata wherever available from google-provided environent variables or, if needed, the metadata server. It also propagates the correct severity levels, since it leverages google's logging library directly.
There are also helper functions for including the trace
metadata field which enables the "Show entries for this trace" feature that groups entries in the Logs Explorer. This is done by leveraging AsyncLocalStorage to retain trace state through the call stack.
LOGGER_NAME
: Used to set a name for the default logger instance. Default value: "node-app"PROJECT_STRING_ID
: Used to populate the projectId
parameter of the Logging service in @google-cloud/logging library. This parameter is often provided through built-in env vars, or as a last resort from the metadata server (if using a GCE VM environment).FUNCTION_REGION
: Used to populate the region/location field in Firebase Function logs. Default value: "us-central1"LOG_TO_CONSOLE
: Set this to "true" to route logs to console.log instead of using google logging library. Useful for localhost/dev logging.process.env
values:To ensure deterministic behavior, all environment variables are loaded only once, upon first import, to prevent potentially inconsistent behavior or configs due to something like a delayed dotenv config call.
A single synchronous (aka: blocking) API call, if necessary, is made in the very beginning upon file import. This is to load the project ID in the event that it's not provided by an expected environment variable (PROJECT_STRING_ID
, GCLOUD_PROJECT
, or GOOGLE_CLOUD_PROJECT
).
Although blocking requests are typically considered poor practice, this was preferred to the complexity of guaranteeing the required field is loaded asynchronously before it's needed. It should not cause any perfomance issues, as it only blocks a single time, in the very beginning on initial file import. The call can be entirely avoided as well, by manually populating the PROJECT_STRING_ID
environment variable.
FAQs
Log across Google Cloud (GCE VMs, Firebase Functions, etc.) using one library.
The npm package @driffel/universal-google-logger receives a total of 2 weekly downloads. As such, @driffel/universal-google-logger popularity was classified as not popular.
We found that @driffel/universal-google-logger demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.