
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
api-integrations-backend
Advanced tools
This repository contains the backend API which is responsible for managing access tokens, checking the heartbeats of deployments, and performing other operational tasks. The system manages tokens two type of tokens: Grafana Loki access tokens and signed A
This repository contains the backend API which is responsible for managing access tokens, checking the heartbeats of
deployments, and performing other operational tasks. The system manages tokens two type of tokens: Grafana Loki access
tokens and signed API access tokens. The former facilitates the authorization process for partner providers, empowering
them to send airnode-feed
logs. Meanwhile, the latter type of tokens is used to authorize partner providers to send
signed data to signed-api
deployed by Nodary and API3. Beyond token management, the system intelligently processes the
heartbeat logs from 'airnode-feed' deployments, offering a comprehensive mechanism to assess the status of these
deployments.
.env
from the example.env
file..env
file and update the environment variables:
HTTP_API_ID
: ID of the AWS HTTP API GatewayAPI_KEY_LIST
: List of API keys that are allowed to use the API in the format user1:key1,user2:key2
GF_CLOUD_REGION
: Region of the utilizied Grafana Cloud instanceGF_CLOUD_TOKEN
: Grafana Cloud token that is enabled to generate token and read logsGF_CLOUD_ACCESS_POLICY_ID
: Policy to be used while generating token, expected to be authorized to write logs onlyGF_LOKI_USER
: Grafana Loki user able to use endpoint GF_LOKI_ENDPOINT
GF_LOKI_ENDPOINT
: Grafana Loki HTTP API endpointTo deploy infrastructure to AWS:
pnpm run serverless:deploy --region us-east-2 --stage prod
To remove deployment:
pnpm run serverless:remove --region us-east-2 --stage prod
This service is publicly accessible at the following endpoint:
The API provides the following endpoints:
POST /grafanaLokiAccess
: Generate token that will be used to authorize partner providers to send Airnode feed logsGET /grafanaLokiAccess
: Get Grafana Loki access token for the given Airnode addressDELETE /grafanaLokiAccess
: Delete Grafana Loki access tokenPOST /signedApiAccess
: Generate token that will be used to authorize partner providers to send signed dataGET /signedApiAccess
: Get signed API access token for the given Airnode addressDELETE /signedApiAccess
: Delete signed API access tokenGET /deploymentStatus
: Get status for the deploymentStart local dynamodb server:
pnpm run local:db:up
Initialize tables:
pnpm run local:db:init
Spin up local express
server to mimic AWS API gateway:
pnpm run local:start
You can use following valid examples in the next section to test server.
# POST_/grafanaLokiAccess
curl --location --request POST 'https://api-integrations.nodary.io/grafanaLokiAccess?airnode=0x27f093777962Bb743E6cAC44cd724B84B7254aad' \
--header 'x-api-key: user1:pass1'
# Response will be:
# {
# "airnode": "0x27f093777962Bb743E6cAC44cd724B84B7254aad",
# "generatedBy": "user1",
# "lokiEndpoint": "logs-prod-012.grafana.net",
# "lokiToken": "EXAMPLE_eyJIjoW5nV2FzVl_TOKEN"
# "lokiTokenId": "EXAMPLE-ca5a-TOKEN-bfd0-ID",
# "lokiUser": "34567"
# }
# or
# {
# "message": "Grafana Loki access record for 0x27f093777962Bb743E6cAC44cd724B84B7254aad already exists"
# }
# GET_/grafanaLokiAccess
curl --location 'https://api-integrations.nodary.io/grafanaLokiAccess?airnode=0x27f093777962Bb743E6cAC44cd724B84B7254aad' \
--header 'x-api-key: user1:pass1'
# Response will be:
# {
# "airnode": "0x27f093777962Bb743E6cAC44cd724B84B7254aad",
# "generatedBy": "user1",
# "lokiEndpoint": "logs-prod-012.grafana.net",
# "lokiToken": "EXAMPLE_eyJIjoW5nV2FzVl_TOKEN"
# "lokiTokenId": "EXAMPLE-ca5a-TOKEN-bfd0-ID",
# "lokiUser": "34567"
# }
# or
# {
# "message": "No Grafana Loki access record found for 0x27f093777962Bb743E6cAC44cd724B84B7254aad"
# }
# DELETE_/grafanaLokiAccess
curl --location --request DELETE 'https://api-integrations.nodary.io/grafanaLokiAccess?airnode=0x27f093777962Bb743E6cAC44cd724B84B7254aad' \
--header 'x-api-key: user1:pass1'
# Response will be:
# {
# "message": "Grafana Loki access record for 0x27f093777962Bb743E6cAC44cd724B84B7254aad has been deleted"
# }
# or
# {
# "message": "No Grafana Loki access record for 0x27f093777962Bb743E6cAC44cd724B84B7254aad found to delete"
# }
# POST_/signedApiAccess
curl --location --request POST 'https://api-integrations.nodary.io/signedApiAccess?airnode=0x27f093777962Bb743E6cAC44cd724B84B7254aad' \
--header 'x-api-key: user1:pass1'
# Response will be:
# {
# "airnode": "0x27f093777962Bb743E6cAC44cd724B84B7254aad",
# "bearerToken": {
# "api3": {
# "airnodeFeed": "EXAMPLETOKEN926461c16ce994846f9decc827f42e",
# "oev": "926461c16ce994846f9decc827f42eEXAMPLETOKEN"
# },
# "nodary": {
# "airnodeFeed": "926461c16ce994846f9decc827fEXAMPLETOKEN42e",
# "oev": "926461c16cEXAMPLETOKENe994846f9decc827f42e"
# }
# },
# "generatedBy": "user1"
# }
# or
# {
# "message": "Signed API access record for 0x27f093777962Bb743E6cAC44cd724B84B7254aad already exists"
# }
# GET_/signedApiAccess
curl --location 'https://api-integrations.nodary.io/signedApiAccess?airnode=0x27f093777962Bb743E6cAC44cd724B84B7254aad' \
--header 'x-api-key: user1:pass1'
# Response will be:
# {
# "airnode": "0x27f093777962Bb743E6cAC44cd724B84B7254aad",
# "bearerToken": {
# "api3": {
# "airnodeFeed": "EXAMPLETOKEN926461c16ce994846f9decc827f42e",
# "oev": "926461c16ce994846f9decc827f42eEXAMPLETOKEN"
# },
# "nodary": {
# "airnodeFeed": "926461c16ce994846f9decc827fEXAMPLETOKEN42e",
# "oev": "926461c16cEXAMPLETOKENe994846f9decc827f42e"
# }
# },
# "generatedBy": "user1"
# }
# or
# {
# "message": "No signed API access record found for 0x27f093777962Bb743E6cAC44cd724B84B7254aad"
# }
# DELETE_/signedApiAccess
curl --location --request DELETE 'https://api-integrations.nodary.io/signedApiAccess?airnode=0x27f093777962Bb743E6cAC44cd724B84B7254aad' \
--header 'x-api-key: user1:pass1'
# Response will be:
# {
# "message": "Signed API access record for 0x27f093777962Bb743E6cAC44cd724B84B7254aad has been deleted"
# }
# or
# {
# "message": "No signed API access record for 0x27f093777962Bb743E6cAC44cd724B84B7254aad found to delete"
# }
airnode-feed
with airnode address 0x6CFec029322bfb6f8f6a5A6662b4A3136eeD83A7
# GET_/deploymentStatus
curl --location 'https://api-integrations.nodary.io/deploymentStatus?airnode=0x27f093777962Bb743E6cAC44cd724B84B7254aad&app=airnode-feed'
FAQs
This repository contains the backend API which is responsible for managing access tokens, checking the heartbeats of deployments, and performing other operational tasks. The system manages tokens two type of tokens: Grafana Loki access tokens and signed A
We found that api-integrations-backend demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.