Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@decoupled/netlify-cli
Advanced tools
Interact with Netlify from the comfort of your CLI.
See the CLI command line reference to get started and the docs on using Netlify Dev to run your site locally.
Netlify CLI requires Node.js version 8 or above. To install, run the following command from any directory in your terminal:
npm install netlify-cli -g
Alternatively you may also use Homebrew: brew install netlify-cli
(thanks @cglong).
Installing the CLI globally provides access to the netlify
command.
netlify [command]
# Run `help` for detailed information about CLI commands
netlify [command] help
To learn how to log in to Netlify and start deploying sites, visit the documentation on Netlify.
For a full command reference, see the list below, or visit cli.netlify.com.
(Beta) Manage Netlify Add-ons
Subcommand | description |
---|---|
addons:auth | Login to add-on provider |
addons:config | Configure add-on settings |
addons:create | Add an add-on extension to your site |
addons:delete | Remove an add-on extension to your site |
addons:list | List currently installed add-ons for site |
Run any Netlify API method
(Beta) Build on your local machine
Create a new deploy from the contents of a folder
Local dev server
Subcommand | description |
---|---|
dev:exec | Exec command |
Manage netlify functions
Subcommand | description |
---|---|
functions:build | Build functions locally |
functions:create | Create a new function locally |
functions:invoke | Trigger a function while in netlify dev with simulated data, good for testing function calls including Netlify's Event Triggered Functions |
Configure continuous deployment for a new or existing site
Link a local repo or project folder to an existing site on Netlify
Login to your Netlify account
Open settings for the site linked to the current folder
Subcommand | description |
---|---|
open:admin | Opens current site admin UI in Netlify |
open:site | Opens current site url in browser |
Handle various site operations
Subcommand | description |
---|---|
sites:create | Create an empty site (advanced) |
sites:delete | Delete a site |
sites:list | List all sites you have access to |
Print status information
Subcommand | description |
---|---|
status:hooks | Print hook information of the linked site |
Switch your active Netlify account
Unlink a local folder from a Netlify site
Watch for site deploy to finish
See CONTRIBUTING.md for more info on how to make contributions to this project.
You'll need to follow these steps to run Netlify CLI locally:
uninstall any globally installed versions of netlify-cli
clone and install deps for https://github.com/netlify/cli
npm link from inside the cli folder
Now you're both ready to start testing and to contribute to the project!
MIT. See LICENSE for more details.
FAQs
Modified Netlify command line tool
The npm package @decoupled/netlify-cli receives a total of 0 weekly downloads. As such, @decoupled/netlify-cli popularity was classified as not popular.
We found that @decoupled/netlify-cli demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.