Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
A JavaScript wrapper for the Bugzilla REST API.
Although Travis tests are now working, test coverage is far from complete. Please report issues especially if you find problems running bz.js in the browser. Worst case scenario, please revert to 0.3 as it still basically works.
npm install bz
and use with var bz = require("bz")
For the browser, download the lastest bz-.js from the root directory.
gulp
- this will build node and browser files from the ./src directory. The node main entry now points to ./build/node/index
.Some tests are included. If you want to run the browser tests you need to copy the file config-test.json-sample
in the test/browser/files directory to a file called config-test.json
in the same directory, then fill in the placeholders with your bugzilla credentials.
var bugzilla = bz.createClient();
bugzilla.getBug(678223, function(error, bug) {
if (!error) {
alert(bug.summary);
}
});
bz.createClient(options)
creates a new Bugzilla API client, optionally takes options like the REST API url, username + password, and timeout in milliseconds:
var bugzilla = bz.createClient({
url: "https://api-dev.bugzilla.mozilla.org/rest/",
username: 'bugs@bugmail.com',
password: 'secret',
timeout: 30000
});
Each method takes a callback that takes an error message (if any kind of error occurs) as its first argument, and the expected return data as its second.
getBug(id, callback)
retrieves a bug given a bug id.
searchBugs(searchParams, callback)
searches with given search parameters and fetches an array of bugs.
countBugs(searchParams, callback)
searches with given search parameters and gets a integer count of bugs matching that query. this is not supported currently.
createBug(bug, callback)
creates a bug and returns the id of the newly created bug.
updateBug(id, bug, callback)
updates a bug with new bug info.
bugComments(id, callback)
retrieves the comments for a bug.
addComment(id, comment, callback)
adds a comment to a bug.
bugHistory(id, callback)
retrieves array of changes for a bug.
bugFlags(id, callback)
retrieves array of flags for a bug.
bugAttachments(id, callback)
retrieves array of attachments for a bug.
createAttachment(bugId, attachment, callback)
creates an attachment on a bug, and returns the id of the newly created attachment.
getAttachment(attachId, callback)
gets an attachment given an attachment id.
updateAttachment(attachId, attachment, callback)
updates the attachment.
searchUsers(match, callback)
searches for users by string, matching against users' names or real names.
getUser(userId, callback)
retrieves a user given a user id.
getSuggestedReviewers(id, callback)
retrieves a list of suggested reviewers for a bug.
getConfiguration(options, callback)
gets the configuration of this Bugzilla server. Note: this only works currently against Mozilla's production instance, the bugzilla 5.0 instance running on landfill has no equivalent call that can be run from the browser due to a lack of CORS headers.
FAQs
Bugzilla REST API wrapper
The npm package bz receives a total of 9 weekly downloads. As such, bz popularity was classified as not popular.
We found that bz demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.