Security News
Cloudflare Adds Security.txt Setup Wizard
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.
@cloudbase/addon-cli
Advanced tools
@cloudbase/addon-cli
@cloudbase/cli 中 tcb addon
命令行的功能实现
请前往流水线发布
方式一:单元测试开发
需要自行提供相关 mock 数据。具体请参考
test/fixtures
的相关代码
$ yarn test [path/to/testFile]
举例:通过单元测试开发调试 pull
命令
$ yarn test test/tests/pull.test.ts
方式二:使用 tcb 开发调试
$ yarn run link
$ yarn run dev
$ cd path/to/cloud-base-cli
$ npm link
$ yarn run dev
tcb addon <command>
示例 1:运行 pull 命令
pull 插件
$ tcb addon pull wx_custom --envId lowcode-1gk9y5ik310a94df
pull 资源
$ tcb addon pull block1 --resource block --envId lowcode-1gk9y5ik310a94df
示例 2:运行 push 命令
push 插件
$ tcb addon push
push 资源
$ tcb addon push --resource block
需要提前安装 ncgen:
npm i ncgen -g
比如 pull, push 这种命令
$ yarn code:add-command
比如为 pull 命令增加 block 资源处理
$ yarn code:add-resource
FAQs
The npm package @cloudbase/addon-cli receives a total of 0 weekly downloads. As such, @cloudbase/addon-cli popularity was classified as not popular.
We found that @cloudbase/addon-cli demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.
Security News
The Socket Research team breaks down a malicious npm package targeting the legitimate DOMPurify library. It uses obfuscated code to hide that it is exfiltrating browser and crypto wallet data.
Security News
ENISA’s 2024 report highlights the EU’s top cybersecurity threats, including rising DDoS attacks, ransomware, supply chain vulnerabilities, and weaponized AI.