dotenv-cli
Advanced tools
+6
| TEST_PASS= | ||
| TEST_URL=http://localhost:${TEST_PORT}/api/v1 | ||
| TEST_PORT_REVERSE=4000 | ||
| # Default value for port if no other specifies it | ||
| TEST_PORT=5000 |
| # This overrides TEST_PASS from .env | ||
| TEST_PASS=some\$pass | ||
| # This will use TEST_PORT_REVERSE from .env | ||
| TEST_URL_REVERSE=http://localhost:${TEST_PORT_REVERSE}/api/v1 | ||
| # I want this to contribute to TEST_URL in .env | ||
| TEST_PORT=3000 |
+8
-4
@@ -84,7 +84,11 @@ #!/usr/bin/env node | ||
| paths.forEach(function (env) { | ||
| const parsedFile = dotenv.config({ path: path.resolve(env), override }) | ||
| if (argv.expand !== false) { | ||
| dotenvExpand(parsedFile) | ||
| } | ||
| dotenv.config({ path: path.resolve(env), override }) | ||
| }) | ||
| // Expand when all path configs are loaded | ||
| if (argv.expand !== false) { | ||
| dotenvExpand({ | ||
| parsed: process.env | ||
| }); | ||
| } | ||
| Object.assign(process.env, parsedVariables) | ||
@@ -91,0 +95,0 @@ |
+1
-1
| { | ||
| "name": "dotenv-cli", | ||
| "description": "A global executable to run applications with the ENV variables loaded by dotenv", | ||
| "version": "7.4.4", | ||
| "version": "8.0.0", | ||
| "author": "entropitor", | ||
@@ -6,0 +6,0 @@ "bin": { |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
10589
4.05%6
50%106
2.91%4
33.33%