Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
@getanthill/datastore
Advanced tools
getanthill
DatastoreThe goal of this project is to provide a system to easily access the full power of Event-Source / CQRS systems.
Manage every single entity of your Data as a simple Event-Source entity. Track atomic updates. Restores entities at a given version. Timetravel to know what was the exact state of an entity on a given date...
Every Data in the Datastore
is contractualized thanks to the json-schema
[^1] standard. This standard is allowing you to access a strict documentation in your RESTful API with OpenAPI 3.0 (ex-Swagger) [^2] or in your streamed events.
streams
to process your Data in realtimeStream your data with ease thanks to the stream
entrypoint of the Datastore
's API. You can use it to deploy workers easily with automatic reconnection, pattern matching and logging.
100% of the Data handled by the Datastore
is available through an compliant OpenAPI 3.0 [^2] specification. You can add as many event or business rule you need in your system and make it available to everyone.
Encrypt fields of your Data to make it inaccessible by users having access to your database. You can perform multiple keys encryption, keys rotation, on-demand document encryptionm etc.
READ
, DECRYPT
, WRITE
and ADMIN
Access to the Data is controlled with 4 different levels.
READ
tokens can only read Data, potentially encrypted Data.DECRYPT
tokens can read Data clearlyWRITE
tokens can write Data in the Datastore
ADMIN
tokens can create new models and indexesDatastores
In addition of the sdk
available to communicate with the Datastore
API easily, an aggregation
pipeline is made availabe to perform complex aggregations between different instances of the Datastore
to handle projections
, trigger specific branches of a business logic or keep track of some events.
FAQs
Event-Sourced Datastore
The npm package @getanthill/datastore receives a total of 501 weekly downloads. As such, @getanthill/datastore popularity was classified as not popular.
We found that @getanthill/datastore demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.