
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Outrigger is a juttle development environment that allows you develop, run, and view the output of Juttle programs in a browser. You use your editor of choice to edit juttles on your filesystem and run them in a browser from the filesystem using Outrigger.
Because most views in Juttle are data visualizations, they cannot be rendered in the Juttle CLI. Outrigger bridges this gap with a javascript charting library that receives streaming data from Juttle programs running server-side via a websocket. It also includes user-interface logic to implement Juttle input controls.
If you simply want to try running some basic juttle programs that output directly to the terminal, you can use the juttle
command line program included in the Juttle respository.
Make sure you have node (with npm) installed.
Use npm to install outrigger
$ npm install -g juttle
$ npm install -g outrigger
We've tested with nodejs 4.2.3 and npm 2.14.17. Other combinations of nodejs and npm likely work, but we haven't tested all combinations.
Start the daemon by running outriggerd:
$ outriggerd &
You can now run juttle programs against the outriggerd daemon via the outrigger-client:
$ outrigger-client browser --path my_juttle_file.juttle
This will open a browser window and display the output of the program. You can make edits to your juttle, save the file, and reload the browser window to get the updated output.
Here are the full command line options supported by the daemon and client programs:
usage: [--port <port>] [--root <path>]
--port <port>: Run outriggerd on specified port.
--root <path>: Use <path> as the root directory for juttle programs.
outriggerd
uses log4js for logging and by default logs to log/outrigger.log
.
usage: [--outrigger-juttle <hostname:port>] [--outrigger-app <hostname:port>] [--help] [COMMAND] [OPTIONS]
[COMMAND]: one of the following, with the following options:
list_jobs [--job <job-id>]
browser --path <path>
[OPTIONS]: one of the following:
--path <path-to-juttle-file>: Path to file relative to configured root directory.
Used by "browser".
--job <job-id>: Job id.
Used by "list_jobs".
--outrigger-juttle <hostname:port>: Hostname/port of outrigger juttle server
--outrigger-app <hostname:port>: Hostname/port of outrigger app server
--help: Print this help and exit
The Juttle compiler and runtime within outriggerd are also configured via the juttle configuration file, typically at $(HOME)/.juttle/config.json
. For more information on the juttle configuration file, see the juttle configuration documentation.
When outriggerd resolves module references in juttle programs while creating program bundles, it searches the following locations:
/home/user/program.juttle
and refers to a module module.juttle
, outriggerd looks in /home/user
for module.juttle
.Curious about how outrigger works? Check out the architecture page.
To run unit tests:
gulp test
To check code style and perform lint checks:
gulp lint
Both are run automatically by Travis.
FAQs
Juttle development environment
The npm package outrigger receives a total of 2 weekly downloads. As such, outrigger popularity was classified as not popular.
We found that outrigger demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.