Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Before you begin, you should confirm that you have installed all the prerequisites below on the platform where you will be running AKC-Mamba.
If you have not installed pip3
, use the following command to install:
curl "https://bootstrap.pypa.io/get-pip.py" -o "get-pip.py"
python3 get-pip.py --user
For checking version :
pip3 --version
You can use the following command:
pip3 install akc-mamba
After install successfuly, you can get help by command:
mamba --help
Install required Python3 modules with
pip3 install -r requirements.txt
Use akc-mamba using python3 command:
python3 mamba.py --help
We now can use the Mamba tool to prepare required helm and k8s components
mamba environment
After running this command, the program will ask you to fill in some of the most necessary information of creating a blockchain network:
Cluster name
: The name of the cluster network you created in step Setup an AWS EKS cluster. Default: cluster-mamba-example
Kubenetes type
: Currently akc-mamba
is supporting kubenetes of two types: eks
and minikube
. The default is eks
EFS infomation
: After you have entered the Kubenetes type
, mamba
will automatically search your k8s network for information about efs
. If you have EFS
installed before, the system will automatically update the config file located at ~/.akachain/akc-mamba/mamba/config/.env
. If not, you need to fill in the information EFS SERVER
based on the installation step Setup a Network File System. If the k8s type is minikube
then you do not need to enter this information.~/.akachain/akc-mamba/mamba/config/.env
, the file content is pretty much self-explained.mamba start
The mamba start
command executes a series of sub commands that installs various network components. For more information on each command for individual components, please refer to help section
mamba --help
To terminate the network, just run
mamba terminate
Mamba makes use of Click_, an elegant python package for creating command line interfaces. The project structure is depicted in the tree below.
.
├── command_group_1
│ ├── commands.py
│ ├── __init__.py
│
├── utils
│ ├── __init__.py
│ ├── kube.py
├── settings
│ ├── settings.py
├── mamba.py
There are 4 main components:
Please follow PEP8 - Style guide for Python Code.
Another example can be found here
There are several notes that are different with other languages
Function names should be lowercase, with words separated by underscores as necessary to improve readability.
Camel case is for class name
A snake must know how hiss ... or sometimes rattle.
Normally we can just use echo to print out message during execution However:
hiss
when there is error.rattle
is needed when a snake meet something ... at the beginning or at the end of an execution.For more information about logging, please follow the standard convention in mamba/utils/hiss.py
FAQs
A production ready, complete experience in deploying a Hyperledger Fabric
We found that akc-mamba demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.