
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
storyboard-serverless
Advanced tools
Storyboard's set of serverless functionality utilizing the Serverless Framework
Storyboard's set of serverless functionality utilizing the Serverless Framework.
audio-pipeline
: our audio processing pipeline that's triggered by new episode uploads
us-east-2
us-east-1
The general folder structure is following the 'Microservices + Monorepo' architecture outlined here. Example below:
├── layers
│ └── ffmpeg-layer
│ ├── serverless.yml
│ └── layer
│ └── ffmpeg
│ └── ffmpeg (the actual static FFmpeg binary)
│ └── ffprobe (the actual static FFprobe binary)
│ └── sox-layer
│ ├── serverless.yml
│ └── layer
│ └── lib
│ └── libgomp.so.1 (a dependency the SoX binary depends on)
│ └── sox
│ └── sox (the actual static SoX binary)
│
├── services
│ └── audio-pipeline
│ ├── package.json
│ ├── quality-control.js
│ ├── sox.js
│ └── serverless.yml
│
│ └── service-2
│ ├── package.json
│ ├── some-handler.js
│ └── serverless.yml
│
│ └── service-3
│ ├── package.json
│ ├── etc-handler.js
│ └── serverless.yml
│
├── package.json
├── README.md
├── variables.yml // repo-wide variables can be set here
├── .gitignore
├── .npmignore
└── .npmrc
Use chan
to provide updates to CHANGELOG.md
as they're made. Some ease-of-use shortcuts are provided in package.json
.
Example:
npm run pipeline:added -- 'added some cool new stuff'
npm run pipeline:fixed -- 'fixed that weird bug'
npm run version
// marks the unreleased changes as a new release in your changelognpm run gh-release
// creates a github release at the root of the repoUse lerna
to bump version numbers of individual services
lerna publish
Install the Serverless CLI: npm install -g serverless
You'll first need to run serverless login
and provide the appropriate credentials for dev@storyboard.fm
. These are stored in the SSM Parameter Store under serverless-framework-login
.
Make sure your AWS CLI is configured properly before deploying. If you don't have any AWS profiles set locally, type aws configure
and provide the AWS Access Key ID and Secret Access Key for the ServerlessFrameworkAccount
IAM user. These are stored in the SSM Parameter Store under serverless-framework-iam-account
.
Once your CLI is configured properly and you're using the ServerlessFrameworkAccount
's AWS credentials, you can deploy the infrastructure.
Run serverless deploy --aws-profile {the serverless profile name in ~/.aws/credentials}
inside one of the services folders. You need to be at the same level as a serverless.yml
file.
Step-by-step example:
npm install -g serverless
serverless login
aws configure
serverless-framework-iam-account
cd services/audio-pipeline
serverless deploy --aws-profile storyboard-serverless
storyboard-serverless
aws-profile name here should be whatever you call your serverless profile name in ~/.aws/credentials
FAQs
Storyboard's set of serverless functionality utilizing the Serverless Framework
The npm package storyboard-serverless receives a total of 0 weekly downloads. As such, storyboard-serverless popularity was classified as not popular.
We found that storyboard-serverless demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.