Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
lightstep-tracer
Advanced tools
[![npm version](https://badge.fury.io/js/lightstep-tracer.svg)](https://badge.fury.io/js/lightstep-tracer) [![Circle CI](https://circleci.com/gh/lightstep/lightstep-tracer-javascript.svg?style=shield)](https://circleci.com/gh/lightstep/lightstep-tracer-ja
LightStep implementation of the OpenTracing API.
npm install --save lightstep-tracer opentracing
All modern browsers and Node versions >= 0.12 are supported.
To use LightStep as the OpenTracing binding, initialize the global tracer with the LightStep implementation:
var Tracer = require('opentracing');
var LightStep = require('lightstep-tracer');
Tracer.initGlobalTracer(LightStep.tracer({
access_token : '{your_access_token}',
group_name : '{your_service_or_app_name}',
}));
The browser version of the code can be explicitly included using the following, which can be helpful in some browserify
(or similar) setups:
var LightStep = require('lightstep-tracer/browser');
access_token
string
required - the project access tokengroup_name
string
required - the string identifier for the application, service, or process. (NOTE: this parameter is subject to renaming for consistency with other LightStep / OpenTracing libraries and maybe be optional in the future.)Browser-specific initialization options
xhr_instrumentation
bool
- if false, disables automatic instrumentation of XMLHttpRequests (XHRs). This must be set at initialization; changes after initialization will have no effect. Defaults to false.
xhr_url_inclusion_patterns
RegExp[]
- an array of regular expressions used to whitelist URLs for XMLHttpRequest
auto-instrumentation. The default value is wildcard matching all strings. For a given URL to be instrumented, it must match at least one regular expression in xhr_url_inclusion_patterns
and not match any regular expressions in xhr_url_exclusion_patterns
.
xhr_url_exclusion_patterns
RegExp[]
- an array of regular expressions used to exclude URLs from XMLHttpRequest
auto-instrumentation. The default value is an empty array. For a given URL to be instrumented, it must match at least one regular expression in xhr_url_inclusion_patterns
and not match any regular expressions in xhr_url_exclusion_patterns
.
Returns an absolute URL to the LightStep application for the trace containing this span. It is safe to call this method after finish()
.
...
span.finish();
var url = span.imp().generateTraceURL())
console.log('View the trace for this span at:', url);
Copyright (c) 2016, LightStep
FAQs
> ❗ **This instrumentation is no longer recommended**. Please review [documentation on setting up and configuring the OpenTelemetry Node.js Launcher](https://github.com/lightstep/otel-launcher-node) or [OpenTelemetry JS (Browser)](https://github.com/open-
The npm package lightstep-tracer receives a total of 38,921 weekly downloads. As such, lightstep-tracer popularity was classified as popular.
We found that lightstep-tracer demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.