Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
c8osdkjscore
Advanced tools
This is the Convertigo provider for Angular
Convertigo Client SDK is a set of libraries used by mobile or Windows desktop applications to access Convertigo Server services. An application using the SDK can easily access Convertigo services such as Sequences and Transactions.
The Client SDK will abstract the programmer from handling the communication protocols, local cache, FullSync off line data managment, UI thread management and remote logging. So the developer can focus on building the application.
Client SDK is available for:
This current package is the Angular SDK. For others SDKs see official Convertigo Documentation.
In Angular dependency injection is used to create a C8o instance
import { C8o } from "c8osdkangular";
…
// You must declare C8o within your NgModules C8o as a provider.
// Then you will be able to get C8o object instancied thanks to Angular's dependency injection as the following example :
export class MyClass {
constructor(private c8o: C8o) {
}
}
The endpoint is the mandatory setting to get a C8o instance correctly initialized but there is additional settings through the C8oSettings class.
A C8oSettings instance should be passed after the endpoint. Settings are copied inside the C8o instance and a C8oSettings instance can be modified and reused.
Setters of C8oSettings always return its own instance and can be chained.
A C8oSettings can be instantiated from an existing C8oSettings or C8o instance.
In order to finish the c8o initialization you must use init method from c8o object with a c8oSettings parameters
import { C8o, C8oSettings } from "c8osdkangular";
…
// The only way
let settings: C8oSettings = new C8oSettings();
settings
.setEndPoint("https://demo.convertigo.net/cems/projects/sampleMobileCtfGallery")
.setDefaultDatabaseName("mydb_fullsync")
.setTimeout(30000);
//Then we need to assign C8oSettings object to our C8o object
c8o.init(settings);
// all settings can be retrieve from a C8o or C8oSettings instance
let timeout : number = c8o.timeout;
The call method expects the requester string of the following syntax:
The project name is optional, i.e. if not specified, the project specified in the endpoint will be used.
Convertigo requestables generally needs key/value parameters. The key is always a string and the value can be any object but a string is the standard case.
// the common way with parameters
c8o.callJson("getSimpleData",
"firstname", "John",
"lastname", "Do"
).then((response: any, parameters: Object) => {
//handle repsonse
return null;
});
// the verbose way
let parameters : Object = new Object({"firstname" : "John", "lastname": "Doe"});
c8o.callJsonObject("getSimpleData", parameters)
.then((response: any, parameters: Object) => {
//handle repsonse
return null;
});
FAQs
convertigo's sdk js core
The npm package c8osdkjscore receives a total of 1 weekly downloads. As such, c8osdkjscore popularity was classified as not popular.
We found that c8osdkjscore demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.