
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
Explore the docs »
Slack
·
Website
·
Report Issues
·
Roadmap
Etl integrations is the collection of connectors built on top of Etl protocol.
Etl protocol is an open source standard for moving data between data sources to any third-part destinations. Anyone can build a connetor with basic ruby knowledge using the protocol.
Install the gem and add to the application's Gemfile by executing:
$ bundle add multiwoven-integrations
source = Etl::Integrations::Source::[CONNECTOR_NAME]::Client.new
source.read(sync_config)
destination = Etl::Integrations::Destination::[CONNECTOR_NAME]::Client.new
destination.write(sync_config, records)
Please refer Etl Protocol to understand more about the supported methods on source and destination
Install Dependencies
bin/setup
Run Tests
rake spec
Interactive Prompt
bin/console
Install Gem Locally
bundle exec rake install
Release New Version
rollout.rb
.bundle exec rake release
.gem
file to rubygems.org.Bug reports and pull requests are welcome on GitHub. This project aims to be a safe, welcoming space for collaboration.
Contributors are expected to adhere to the project's code of conduct
The gem is available as open source under the terms of the MIT License.
FAQs
Unknown package
We found that etl-integrations demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.