Security News
Supply Chain Attack Detected in Solana's web3.js Library
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
Let's suppose you were running multiple http application servers, and all of these app servers need to connect to some sort of database. Well unfortunately(fortunately?) you're lazy like me and don't want to throw up another haproxy instance. So instead you setup node-tcp-proxy on each of the app servers to proxy database requests to multiple HA configured backends. The app server connects to its locally hosted node-tcp-proxy which watches the backend servers for availability and brokers the connection to a randomly chosen, available backend.
curl http://npmjs.org/install.sh | sh
If you don't plan on using the provided cli client, this is all you need:
npm install tcp-proxy
If you intend on using the provided cli client, then have to do the following: ```npm install -g tcp-proxy``
Then in the root of your application run:
npm link
There are several ways to use node-tcp-proxy; the library is designed to be flexible so that it can be used by itself, or in conjunction with other node.js libraries / tools.
See the examples for working sample code.
I have provided a functional LSB compliant init.d script that was tested on ubuntu 10.04 and 10.10. To use this script I highly recommend the use of forever.
npm -g install forever
Don't forget to copy the init script to /etc/init.d/
and make sure it's executable
When you install this package with npm, a node-tcp-proxy binary will become available to you. Using this binary is easy with some simple options:
Invoke it like so:
node-tcp-proxy --help
Remember, if you want to use this command globally, install the package globally
If you have a suggestion for a feature currently not supported, feel free to open a support issue. node-tcp-proxy is designed to just proxy tcp requests from one server to another.
(The MIT License)
Copyright (c) 2010 Charlie Robbins, Mikeal Rogers, Fedor Indutny, & Marak Squires
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
FAQs
A simple TCP proxy using node.js based on the work of node-http-proxy
The npm package tcp-proxy receives a total of 13 weekly downloads. As such, tcp-proxy popularity was classified as not popular.
We found that tcp-proxy demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.