
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
cql-ruby provides a common querly language (CQL) parser. CQL is a format frequently used in the library world. This parser was translated from the CQL-Java parser written by Mike Taylor available here http://zing.z3950.org/cql/java/
The parser builds a CQL parse tree suitable to serializing to various forms, built in are to_cql, to_xcql and to_solr (build a solr-lucene search query from cql)
sudo gem install cql_ruby
You have been asked to provide SRU access to your website, so that the dynamic and exciting library community can find and promote access to and awareness of your rich content. You discover that in order to support SRU, dang! you need a CQL parser. Well now you have one.
require 'cql_ruby' parser = CqlRuby::CqlParser.new puts parser.parse( 'dog and cat' ).to_solr
http://groups.google.com/group/cql_ruby
https://github.com/jrochkind/cql-ruby
This code is free to use under the terms of the LGPL license.
Comments are welcome. Best way to send them is to via the listserv
Chick Markley, from 9th April 2008 Jonathan Rochkind, from 14 June 2010
FAQs
Unknown package
We found that cql-ruby demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.