Table of contents

SOMETIME

jamesmcparlane@youtube

youtubeuser

%3 cluster_167511eb_2136_458c_9a6c_be4e4f667423 jamesmcparlane@youtube cluster_f39b49f3_be6d_4ec8_b8bf_67944c8e06e2 I'm Re-Imagining the Command Line Interpreter _789b08df_1d84_459e_9858_380e9af0a225 Security Tartan _5a200366_9f9b_4cb9_8544_c1d2fa93a7d3 Security _789b08df_1d84_459e_9858_380e9af0a225->_5a200366_9f9b_4cb9_8544_c1d2fa93a7d3 _a12a4c3b_f350_4bcc_b7f2_f7ef16f49162 ux _789b08df_1d84_459e_9858_380e9af0a225->_a12a4c3b_f350_4bcc_b7f2_f7ef16f49162 _789b08df_1d84_459e_9858_380e9af0a225->__0:cluster_f39b49f3_be6d_4ec8_b8bf_67944c8e06e2 _cf5770f2_270f_43ac_bc81_405ce1536a69 I Have Undo and Redo Working in the Command Line _7a1d8c21_ec10_4a05_9f1d_82745f98c812 Forgiving behavior _72f44786_3f95_4d2c_a1b6_6dca6149529d Handling of secrets _72f44786_3f95_4d2c_a1b6_6dca6149529d->_789b08df_1d84_459e_9858_380e9af0a225 _58f2ce69_c75c_4ac0_a1bd_b9a0e94b4a8e Stack programming languages _72f44786_3f95_4d2c_a1b6_6dca6149529d->_58f2ce69_c75c_4ac0_a1bd_b9a0e94b4a8e _5538e905_bf33_4914_b3b7_242de4fc6d7a Automation _04b16be2_5fb3_482b_91cd_ed347dbc9eaa Immediate feedback

DONE

I'm Re-Imagining the Command Line Interpreter

video

Interestingly it works with a client-server architecture.

Handling of secrets

On this video, it describes how to improve the CLI handling of credentials and other secrets. To do this it integrates the handling of secrets with the CLI and not treating those as normal variables. By doing this it can properly hide the values of secrets (showing a "visually hashed form", as a Security Tartan).

Secrets can be manipulated with commands in a Stack-programming-language-like behavior.

secret.new
# This command created a secret, and pushed it into the secret stack
passphrase.from.secret
# This command took the secret fro mthe secret stack. It generates a passphrase (still "visually hashed") and pushes it to the passphrase stack

Immediate feedback

  • Described at

    08:54

Autocompletion of commands and their arguments, with an interactive description of the command (as it's being written)

  • Summary of what the command does and arguments expected.

  • When the cursor is in an argument, show more details for it.

  • Usage of color to show invalid syntax (while typing the command)

  • Hiding the values of secrets, or unexpected arguments, to avoid security leaks.

Automation

  • Described at

    10:14

Implemented as a macro recorder.

  • For commands and server requests done by a session.

Forgiving behavior

  • Described at

    10:54

Shows a way to do undo at a command-line interpreter level (not single line writing).

In the future, will attempt to implement undo-level work up to the server level.

Security Tartan

concepts