Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
globus-action-provider-tools
Advanced tools
Tools to help developers build services that implement the Action Provider specification.
This is an experimental toolkit to help developers build Action Providers for use in Globus Automate including for invocation via Globus Flows.
As this is experimental, no support is implied or provided for any sort of use of this package. It is published for ease of distribution among those planning to use it for its intended, experimental, purpose.
Install the base toolkit with pip install globus_action_provider_tools
You can then import the toolkit's standalone components from
globus_action_provider_tools
. This is useful in instances where you want to
use pieces of the library to perform a function (such as token validation via
the TokenChecker or API schema validation via the ActionStatus or ActionRequest)
and plug into other web frameworks.
.. code-block:: python
from flask import Flask
from globus_action_provider_tools import ActionProviderDescription
description = ActionProviderDescription(
globus_auth_scope="https://auth.globus.org/scopes/00000000-0000-0000-0000-000000000000/action_all",
title="My Action Provider",
admin_contact="support@example.org",
synchronous=True,
input_schema={
"$id": "whattimeisitnow.provider.input.schema.json",
"$schema": "http://json-schema.org/draft-07/schema#",
"title": "Example Action Provider",
"type": "object",
"properties": {"message": {"type": "string"}},
"required": ["message"],
"additionalProperties": False,
},
api_version="1.0",
subtitle="Just an example",
description="",
keywords=["example", "testing"],
visible_to=["public"],
runnable_by=["all_authenticated_users"],
administered_by=["support@example.org"],
)
To install the Flask helpers as well for use specifically in developing Flask
based Action Providers, install this library using pip install globus_action_provider_tools[flask]
If you're experiencing a problem using globus_action_provider_tools, or have an idea for how to improve the toolkit, please open an issue in the repository and share your feedback.
Welcome, and thank you for taking the time to contribute!
To get started, you'll need to clone the repository and run make install
to install the package and its dependencies locally in a virtual environment (.venv/
).
Next, activate the virtual environment:
.. code-block:: console
$ source .venv/bin/activate
And that's it, you're ready to dive in and make code changes.
Run make test
to validate there are no breaking changes introduced.
Once you feel your work is ready to be submitted, feel free to create a PR.
| Full Documentation: https://action-provider-tools.readthedocs.io | Rendered Redoc: https://globus.github.io/action-provider-tools/ | Source Code: https://github.com/globus/action-provider-tools | Release History + Changelog: https://github.com/globus/action-provider-tools/releases
FAQs
Tools to help developers build services that implement the Action Provider specification.
We found that globus-action-provider-tools demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.