Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
@goodware/log
Advanced tools
Documentation TBD
It is possible for one nodeJS process to create multiple Loggers objects at the same time. This is useful if, say, independent libraries use Loggers with different logging levels and other settings. The only caveat is Winston's own flaw that results in the inability of two Loggers objects to associate different colors with the same level.
A Winston logger object for a particular category is acquired via new Loggers(...).loggers.get() or child(). Requesting a logger is optional since this class has logging methods (log(), error(), etc.), that accept an optional category name and use the default category if one is not provided.
Loggers do not use Winston's splat formatter. However, much more can be logged, such as objects, arrays, and errors including stack traces.
While a Loggers instance is active, uncaught exceptions and Promise rejections are logged using a category that is specified via the 'uncaughtCategory' options setting which defaults to 'uncaught.' The process is not terminated after logging uncaught exceptions.
Calling the asynchronous stop() method is recommended to flush log entries before the process exits.
When a log entry's level is 'error', the current stack trace is added to the to the 'stack' or 'logStack' meta key. This behavior is disabled via the 'logStack' meta tag.
An object provided to the constructor. Options are described by optionsObject.
A logger sends log entries to transports.
A logger has the following methods: manager, winstonLogger, ready, parent, child, get, ready, isLevelEnabled, log, default, and methods named for each level, such as info. Each logging-related method accepts four optional parameters: tags, message, extra, and category.
The name of a logger. The default category is specified via the 'defaultCategory' options setting and defaults to 'general.' Transport filtering (based on tags) is specified on a per-category basis.
An object that is sent to a transport. A log entry consists of meta and data.
The top-level keys of a log entry. Meta keys contain scalar values except for tags and logTransports which are arrays. Meta keys are: timestamp, ms (elpased time between log entries), level, message, error, tags, category, code, statusCode, logGroupId, logDepth, commitSha, correlationId, operationId, requestId, tenantId, hostId, stage, version, service, stack, logStack, and logTransports.
The keys remaining in 'both' after meta keys are removed (see 'both' below)
Levels are associated with natural numbers. Per Winston's convention, a lower value indicates greater severity. Therefore, 0 represents the highest severity.
Levels and their colors can be specified via the second argument provided to the constructor using the same object that is provided when creating a Winston logger.
By default, Loggers uses Winston's default levels (aka npm log levels with the addition of two levels:
When a level is not found in the provided tags, the default level, 'debug', is added to the tags. The default level is specified via the 'defaultLevel' options setting.
Methods that are named after levels, such as error(). The method log(tags, message, extra, category) is an alternative to the level methods. Level methods accept variant parameters. If the first parameter to a level method is an array, the parameter list is (tags, message, extra, category). Otherwise, it's (message, extra, category).
A log entry is sent to a transport only when its severity level is equal to or greater than the transport's level.
tags, extra, and category
Tags are logged as an array of strings. Tags are specified via a single string, an array of strings, or an object in which each key value is evaluated for truthiness. Tags are combined via the static method tags(a, b) where b's tags override a's tags.
Tags are a superset of levels. A log entry's level is, by default, set to the tag with the highest severity. Level methods override this behavior such that the level associated with the method is chosen. The level can be specified via the logLevel meta tag. The level can also be modified via tag configuration.
Some tags alter logging behavior. The tags' value (tags can be specified as an object) enables and disables the feature, based on their truthiness. Meta tags are not logged. Meta tag names start with 'log' and 'noLog.' Meta tags tags that start with noLog negate their corresponding meta tags. For example, {logStack: true} is identical to 'logStack'. {logStack: false} is identical to 'noLogStack.' Meta tag names are:
Use the meta tag's value as a log entry's logging level
Whether to add the current stack to meta. When true, populates the 'stack' or the 'logStack' meta key. This is the default behavior when a log entry's level is 'error.'
Tags can be used for additional filtering on a per-transport basis. Tags that are named after severity levels do not participate in tag filtering. All tags are enabled by default. When a log entry's level is 'warn' or 'error', tags are enabled. This behavior can be overidden by the 'allowLevel' setting. Tags are enabled and disabled on a per-category basis. The 'default' category specifies the default behavior for unlisted categories.
The following example enables the tag 'sql' for only two categories: one and two. Category 'one' changes the level to 'more' and sends log entries only to the file and console transports. Category 'two' sends log entries to all transports.
categories: {
default: {
tags: {
sql: 'off', // Disable for all transports for all categories. Log entries with warn and error levels are logged.
},
},
one: {
tags: {
sql: {
// Fine-tune filtering for category 'one.' All of these keys are optional.
allowLevel: 'off', // Enable tag filtering for all log entries regardless of their levels. 'off' is needed
// because the default is 'warn' which causes all log entries with warn and error levels to be logged.
level: 'more', // Set the log entry's level to 'more'
// Log entries are sent to all transports by default (console, file, errorFile, cloudWatch). Each transport
// can be overridden:
file: 'verbose', // Send a log entry with the 'sql' tag to the file transport if the log entry's severity
// level is equal to or greater than 'verbose'
console: 'on', // Send a log entry with the 'sql' tag to the console transport
other: 'off', // Do not send a log entry with the 'sql' tag to CloudWatch
},
},
},
two: {
tags: {
sql: 'on', // Send all log entries with the 'sql' tag to all transports for category two
},
},
}
Uniquely identifies the system that is running node
Identifies the environment in which node is running, such as 'dev' or 'prod'
An optional string, array, or object to log with message. Two 'extra' objects are combined via the static method extra(a, b) in which b's keys override a's keys if they overlap.
A scalar, array, or object to log. If an object is provided, its 'message' property is moved to meta and other properties can be copied to meta. The list of keys to copy to meta is altered via the 'metaKeys' options setting. Properties are copied to meta if their values are scalar and their names are specified in metaKeys.
message and 'extra' are shallow copied and combined into a new object called 'both.' If message's keys overlap with those in 'extra,' 'extra' is logged separately; both log entries will have the same logGroupId meta key value.
Errors can be provided via both, both.error, both.cause, and both.originalError. Error objects may also have these keys. All error objects are logged separately such that each log entry has the same logGroupId meta key value. The values of the error, cause, and originalError are set to the Error objects' message property and therefore do not, for example, contain stack traces. As Error objects are traversed, embedded error objects are also traversed and logged recursively. The logDepth meta key contains a number, starting from 0, that indicates the recursion depth from both.
A transport sends log entries to one of the following destinations:
file
Writes log entries with level equal to or higher than a specified level (defaults to 'info') to a file named category-timestamp.log.
errorFile
Writes log entries with level equal to or higher than a specified level (defaults to 'error') to a file named category-error-timestamp.log. Log entries are also sent to the file transport.
cloudWatch
Sends log entries to CloudWatch AWS service
console
Writes log entries to the process's STDOUT filehandle
Use the 'categories' options setting to configure transports. It is not necessary to specify every category that is actually used. The 'default' category specifies the base configuration for all categories. For example:
categories: {
default: { console: 'on', cloudWatch: 'info',
file: 'default' },
api: { console: 'off' },
}
Level filtering for each transport is configured via a level name, 'default,' 'on,' or 'off.' 'off' is the default. Each transport type treats 'on' slightly differently:
The behavior of console transports is altered via the 'console' options setting.
When 'colors' is true, log entries sent to the console are colorized. To override the provided value, set the
CONSOLE_COLORS
environment variable such that blank, 0, and 'false' are false and all other values are true.
When 'data' is true, the maximum amount of information is sent to the console, including meta, data, embedded errors, overridden 'extra' properties objects, and stack traces. When it is false, a small set of meta keys are sent to the console with a log entry's message. To override the value for 'data', set the
CONSOLE_DATA
environment variable such that blank, 0, and 'false' are false and all other values are true.
Log entries are written to files as JSON strings to a directory specified via the 'file' options setting. If no directory in the provided array does not exist and can be created, the file-related transports are disabled. File names contain the category and the date and hour of the local time when this object was instantiated. For error log files, '-error' is appended to the category. Files have the extension .log. An example file name is: uncaught-error-2020-07-18-18.log. Files are rotated and zipped on an hourly basis. The maximum number of archived log files defaults to 14 days and can be specified via the 'file' options setting.
CloudWatch transports are configured with a log group name and an optional AWS region. Log entries are sent to CloudWatch as JSON strings. One Loggers instance uses the same stream name for all cloudWatch transports. The log group, on the other hand, can be specified on a per-category basis. The log stream name contains the date and time (including the millisecond) when Loggers was instantiated followed by the host id. Any errors that occur while sending log entries to CloudWatch are written to the console and to files named cloudwatch-error*.log if a file directory is specified.
If an AWS region is not specified, the environment variables are used in the following order:
Utility functions for logging 'begin' and 'end' for common operations (database, http, etc.). Begin log entries are tagged with 'begin.' End log entries are tagged with 'end.' The operationId property is set added to both entries with the same uuid generated for the operation. If an exception is thrown, an error is logged.
FAQs
Batteries-included Winston3-based loggger with console, file, and AWS CloudWatch Logs transports
We found that @goodware/log demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.