Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
deployd-cli
Advanced tools
npm install deployd-cli -g
The CLI requires Node 4 or higher.
Deployd requires MongoDB locally to start sucessfully. Check the Deployd Requirements
$ dpd create hello
$ cd hello
$ dpd
To start dpd with Database authentication:
dpd --host "127.0.0.1" -P '27017' -n "mymongodb" -u "myusername" -s "mypassword"
or
dpd --host "127.0.0.1" -P '27017' -n "mymongodb" -a "myusername:mypassword"
Usage: dpd [options] [command]
Options:
-V, --version output the version number
-m, --mongod [path] path to mongod executable (defaults to `mongod`)
-p, --port [port] port to host server (defaults to 2403)
-w, --wait wait for input before exiting
-d, --dashboard start the dashboard immediately
-o, --open open in a browser
-e, --environment [env] defaults to development
-H, --host [host] specify host for mongo server
-P, --mongoPort [mongoPort] mongodb port to connect to
-n, --dbname [dbname] name of the mongo database
-a, --auth <auth> usesrname:password mongo server credentials
-u, --username <username> The user to authenticate as
-s, --password <password> The user's password
-c, --dbconn <dbconnectionstring> The MongoDB Connection String
--deploydPath [deploydPath] allow overriding the path to deployd main script
-h, --help output usage information
Commands:
create [project-name] create a project in a new directory
eg. `dpd create my-app`
keygen generate a key for remote access (./.dpd/keys.json)
showkey shows current key for connecting to remote dashboard (./.dpd/keys.json)
* [default] start the server in the current project in development mode
with an interactive shell/repl for interacting with the running server
e.g. dpd (starts server in current directory),
dpd my-app/app.dpd (starts app from file)
Read the CONTRIBUTING document.
This project and everyone participating in it is governed by the Deployd Code of Conduct. By participating, you are expected to uphold this code. Please report unacceptable behavior to hello@deployd.com.
This project is licensed under the MIT License - see the LICENSE file for details
FAQs
The deployd command line interface
We found that deployd-cli demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.