Security News
Cloudflare Adds Security.txt Setup Wizard
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.
@heroku-cli/plugin-run
Advanced tools
[![oclif](https://img.shields.io/badge/cli-oclif-brightgreen.svg)](https://oclif.io) [![Version](https://img.shields.io/npm/v/@heroku-cli/plugin-run.svg)](https://npmjs.org/package/@heroku-cli/plugin-run) [![CircleCI](https://circleci.com/gh/heroku/heroku
$ npm install -g @heroku-cli/plugin-run
$ heroku COMMAND
running command...
$ heroku (-v|--version|version)
@heroku-cli/plugin-run/7.67.1 darwin-x64 node-v16.0.0
$ heroku --help [COMMAND]
USAGE
$ heroku COMMAND
...
heroku logs
display recent log output
USAGE
$ heroku logs
OPTIONS
-a, --app=app (required) [default: z-test-app-1] app to run command against
-d, --dyno=dyno only show output from this dyno type (such as "web" or "worker")
-n, --num=num number of lines to display
-r, --remote=remote git remote of app to use
-s, --source=source only show output from this source (such as "app" or "heroku")
-t, --tail continually stream logs
--force-colors force use of colors (even on non-tty output)
DESCRIPTION
disable colors with --no-color, HEROKU_LOGS_COLOR=0, or HEROKU_COLOR=0
EXAMPLES
$ heroku logs --app=my-app
$ heroku logs --num=50
$ heroku logs --dyno=web --app=my-app
$ heroku logs --app=my-app --tail
See code: src/commands/logs.ts
heroku run
run a one-off process inside a heroku dyno
USAGE
$ heroku run
OPTIONS
-a, --app=app (required) [default: z-test-app-1] parent app used by review apps
-e, --env=env environment variables to set (use ';' to split multiple vars)
-r, --remote=remote git remote of app to use
-s, --size=size dyno size
-x, --exit-code passthrough the exit code of the remote command
--no-notify disables notification when dyno is up (alternatively use HEROKU_NOTIFICATIONS=0)
--no-tty force the command to not run in a tty
--type=type process type
DESCRIPTION
Shows a notification if the dyno takes more than 20 seconds to start.
EXAMPLES
$ heroku run bash
$ heroku run -s standard-2x -- myscript.sh -a arg1 -s arg2
See code: src/commands/run/index.ts
heroku run:detached
run a detached dyno, where output is sent to your logs
USAGE
$ heroku run:detached
OPTIONS
-a, --app=app (required) [default: z-test-app-1] app to run command against
-e, --env=env environment variables to set (use ';' to split multiple vars)
-r, --remote=remote git remote of app to use
-s, --size=size dyno size
-t, --tail continually stream logs
--type=type process type
EXAMPLE
$ heroku run:detached ls
See code: src/commands/run/detached.ts
7.67.1 (2022-11-30)
Note: Version bump only for package heroku
FAQs
[![oclif](https://img.shields.io/badge/cli-oclif-brightgreen.svg)](https://oclif.io) [![Version](https://img.shields.io/npm/v/@heroku-cli/plugin-run.svg)](https://npmjs.org/package/@heroku-cli/plugin-run) [![CircleCI](https://circleci.com/gh/heroku/heroku
The npm package @heroku-cli/plugin-run receives a total of 4,542 weekly downloads. As such, @heroku-cli/plugin-run popularity was classified as popular.
We found that @heroku-cli/plugin-run demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 27 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.
Security News
The Socket Research team breaks down a malicious npm package targeting the legitimate DOMPurify library. It uses obfuscated code to hide that it is exfiltrating browser and crypto wallet data.
Security News
ENISA’s 2024 report highlights the EU’s top cybersecurity threats, including rising DDoS attacks, ransomware, supply chain vulnerabilities, and weaponized AI.