Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
pg-validator
Advanced tools
Simple PostgreSQL database schema validation and creation.
#Overview
An alternative to using sql files to ensure a specific schema
Takes a yaml file as input and does a drop
validate
create
in that order, depending on command line flags.
#Installation
TODO: NPM
#Usage
Usage: pg_validate [options]
Options:
-h, --help output usage information
-V, --version output the version number
-f, --file [file name] schema definition file
-h, --host [host name] postgresql host name or ip
-u, --user [user name] postgresql user name
-p, --password [user password] postgresql password
-z, --validate validate schema
-d, --drop drop schema tables
-c, --create create schema
#Configuration files
Configuration files should be made one per database, consider the simple.yaml
example:
---
#####
#An example db specification
#####
db_name : testdb
tables :
neighbors :
columns :
id : increments
name : string
address :
type : string
unique : true
spouse_name :
type : string
defaultTo : No Spouse
primary_key : id
While relatively straightforward, pg-validator
is a simple wrapper around the Knex module. Database columns are either simple a string, denoting the type, or an object.
Columns that are defined as objects are required to have a type
. Other parameters must follow the Knex schema definition functions for columns. In case the knex
function does not have any parameters, the boolean value true
should be used. This is demonstrated in the example above with the column spouse_name
.
#License
MIT
FAQs
postgresql database schema validation and creation utility
The npm package pg-validator receives a total of 2 weekly downloads. As such, pg-validator popularity was classified as not popular.
We found that pg-validator demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.