Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@adobe/aio-cli-plugin-config
Advanced tools
Config Plugin for the Adobe I/O CLI
$ aio plugins:install -g @adobe/aio-cli-plugin-config
$ # OR
$ aio discover -i
$ aio config --help...
aio config
aio config clear
aio config delete KEYS...
aio config edit
aio config get KEY
aio config list
aio config set key 'a value' # set key to 'a value'
aio config
list, get, set, delete, and edit persistent configuration data
USAGE
$ aio config [-l | -g] [-e] [--verbose | | [-j | -y]]
FLAGS
-e, --env environment variables
-g, --global global config
-j, --json output in json
-l, --local local config
-y, --yaml output in yaml
--verbose show all config values
DESCRIPTION
list, get, set, delete, and edit persistent configuration data
ALIASES
$ aio config ls
EXAMPLES
$ aio config:list
$ aio config:get KEY
$ aio config:set KEY VALUE
$ aio config:delete KEY
$ aio config:clear
See code: src/commands/config/index.js
aio config clear
clears all persistent config values
USAGE
$ aio config clear [-l | -g] [-f]
FLAGS
-f, --force do not prompt for confirmation
-g, --global global config
-l, --local local config
DESCRIPTION
clears all persistent config values
See code: src/commands/config/clear.js
aio config delete KEYS...
deletes persistent config values
USAGE
$ aio config delete KEYS... [-l | -g]
FLAGS
-g, --global global config
-l, --local local config
DESCRIPTION
deletes persistent config values
ALIASES
$ aio config del
$ aio config rm
See code: src/commands/config/delete.js
aio config edit
edit config file
USAGE
$ aio config edit [-l | -g]
FLAGS
-g, --global global config
-l, --local local config
DESCRIPTION
edit config file
See code: src/commands/config/edit.js
aio config get KEY
gets a persistent config value
USAGE
$ aio config get KEY [-l | -g] [-j | -y] [-e]
FLAGS
-e, --env environment variables
-g, --global global config
-j, --json output in json
-l, --local local config
-y, --yaml output in yaml
DESCRIPTION
gets a persistent config value
See code: src/commands/config/get.js
aio config list
lists all persistent config values
USAGE
$ aio config list [-l | -g] [-e] [--verbose | | [-j | -y]]
FLAGS
-e, --env environment variables
-g, --global global config
-j, --json output in json
-l, --local local config
-y, --yaml output in yaml
--verbose show all config values
DESCRIPTION
lists all persistent config values
ALIASES
$ aio config ls
See code: src/commands/config/list.js
aio config set key 'a value' # set key to 'a value'
sets a persistent config value
USAGE
$ aio config set key 'a value' # set key to 'a value'
$ aio config set key -f value.json # set key to the json found in the file value.json
$ aio config set -j key < value.json # set key to the json found in the file value.json
FLAGS
-f, --file value is a path to a file
-g, --global global config
-i, --interactive prompt for value
-j, --json value is json
-l, --local local config
-y, --yaml value is yaml
DESCRIPTION
sets a persistent config value
See code: src/commands/config/set.js
FAQs
Config Plugin for the Adobe I/O CLI
The npm package @adobe/aio-cli-plugin-config receives a total of 3,129 weekly downloads. As such, @adobe/aio-cli-plugin-config popularity was classified as popular.
We found that @adobe/aio-cli-plugin-config demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 22 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.