Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Chawk is a database agnostic time-series database written in Ruby.
It tracks points (Integers) and will eventually provide statistical and aggregate tools for numeric data.
This is the gem that powers the server, Chawkolate.
Docs at Queuetue.com
Add this line to your application's Gemfile:
gem 'chawk'
And then execute:
$ bundle
Or install it yourself as:
$ gem install chawk
Setup
require 'chawk'
ActiveRecord::Base.logger = Logger.new(STDOUT)
ActiveRecord::Base.establish_connection adapter: "sqlite3", database: ":memory:"
The first time using a new database (Like this sqlite memory one that is destroyed at program exit) you should call:
require "chawk/migration"
CreateChawkBase.migrate :up
File.open('./test/schema.rb', "w") do |file|
ActiveRecord::SchemaDumper.dump(ActiveRecord::Base.connection, file)
end
Or, setup activerecord and manage migrations however you usually do. (Rails will handle this for you, using the chawk-rails gem)
Chawk has a permissions model, which provides a framework for implementors to build a robust security model around, but it does not prevent implementors from overriding it.
Chawk's permissions begin with the Agent. All Chawk data operations require an Agent. This can be used as the main actor in your implementation code, or can be a proxy for your own User, etc through the foreign_id property.
agent = Chawk::Models::Agent.where(name:"Steve Austin").first || Chawk::Models::Agent.new(name:"Steve Austin")
All data operations are performed through an Node object, which requires an agent.
node = Chawk.node(agent,"inventory:popcorn")
Chawk.add assumes you are requesting full permissions, but you can specifically request :read, :write, :admin, or :full, which will allow specific operations and deny others. If a node does not exist when requested, it will be created and the current agen will be given full (read write and admin) permissions.
node = Chawk.node(agent,"inventory:popcorn", :read)
Giving (or taking) permissions from an Node can be done with the set_permissions method:
node.set_permissions(agent, read, write, admin)
Setting all three to false removes the Node from the list of the agent's nodes.
Nodes can also be given public read and write permissions, which allow agents without relationships to the Node to manipulate it. The methods set_public_read(bool) and set_public_write(bool) set and remove these public permissions.
The Node object stores and protects points. Points are integers and allow mathematical and statistical operations.
node.add_points [10,9,8,7,6,5]
node.points.last
=> #<Chawk::Models::Point ... @value=5>
node.points.last(2)
=> [#<Chawk::Models::Point ... @value=6>, #<Chawk::Models::Point ... @value=5>]
Points can also use the increment and decrement operators
node.points.last
=> #<Chawk::Models::Point ... @value=5>
node.points + 10
node.pointslast
=> #<Chawk::Models::Point ... @value=15>
Node can also return ranges from the past using the range method or the last method:
ts = Time.now
node._insert_point(0,ts-1000)
node._insert_point(1,ts-1000)
node._insert_point(2,ts-1000)
node._insert_point(5,ts-800)
node._insert_point(8,ts-200)
node._insert_point(9,ts-10)
node.points_range(ts-1001,ts).length
=> 6
node.points_range(ts-801,ts).length
=>3
node.points_range(ts-201,ts).length
=> 2
node.points_range(ts-11,ts).length
=> 1
node.points_range(ts-1001,ts-999).length
=> 3
A Chawk::Models::Range object, (soon to be merged with the Chawk.range command) produces time-limited, quantized data sets prepared for viewing, with resolution to the quarter second (one beat).
range = Chawk::Models::Range.create(start_ts:1085.0,stop_ts:1140.0,beats:1,parent_node:node1)
This will return all data from the Node parent_node in the range from timestamp 1085 to 1140, resampled to the quarter beat. (220 data points, no matter how many are actually present in the sample) This will become a stable hidden node (accessable via Node.ranges) and will automatically rebuild itself if data within it's range changes.
range = Chawk::Models::Range.create(start_ts:1088.0,stop_ts:8100.0,beats:14400,parent_node:node1)
This will return all data from the Node parent_node in the range from timestamp 1085 to 8100, resampled to the quarter beat. (2 data points, no matter how many are actually present in the sample)
Chawk::Models::Range also accepts a "strategy" field which indicates how it builds it's data points.
The default is "recent_point", which constructs timestamps and fills them with the most recent value for that timestamp.
"cluster" creates clustered group timestamps and fills them with a sum of all values within the timeframe from one timestamp to another.
"tally" creates timestamps and fills them with a sum of all values from the beginning of the range to the timestamp.
The NodeAggregator is a (currently expensive) object for aggregate calculations on a Node. It's intended ot be use on a Range's data_node property, since doing aggregate math on an entire datase can be prohibitively expensive.
In the future, the NodeAggregator will be replaced with a nonblocking concurrent object, paving the way for something like a distributed MapReduce solution.
git checkout -b my-new-feature
git commit -am 'Add some feature'
git push origin my-new-feature
Limor Fried, also known as Ladayada of adafruit industries has suggested these rights for Internet of Things creators. They are published here to support fair and honest practices for data collection initiatives. Original Link
Open is better than closed; this ensures portability between Internet of Things devices.
Consumers, not companies, own the data collected by Internet of Things devices.
Internet of Things devices that collect public data must share that data.
Users have the right to keep their data private.
Users can delete or back up data collected by Internet of Things devices.
Chawk is designed with these ideals in mind.
Copyright (c) 2014 Scott Russell (queuetue@gmail.com / queuetue.com)
MIT License
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
FAQs
Unknown package
We found that chawk demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.