Remix.run Logo
In praise of –dry-run(henrikwarne.com)
194 points by ingve 16 hours ago | 108 comments
Arbortheus a minute ago | parent | next [-]

I prefer “—really-do”, so the default behaviour of the tool is to do nothing. That’s more fault tolerant for the scenario you forget to add “—dry-run”.

muvlon 4 hours ago | parent | prev | next [-]

If you're interacting with stateful systems (which you usually are with this kind of command), --dry-run can still have a race condition.

The tool tells you what it would do in the current situation, you take a look and confirm that that's alright. Then you run it again without --dry-run, in a potentially different situation.

That's why I prefer Terraform's approach of having a "plan" mode. It doesn't just tell you what it would do but does so in the form of a plan it can later execute programmatically. Then, if any of the assumptions made during planning have changed, it can abort and roll back.

As a nice bonus, this pattern gives a good answer to the problem of having "if dry_run:" sprinkled everywhere: You have to separate the planning and execution in code anyway, so you can make the "just apply immediately" mode simply execute(plan()).

nlehuen 3 hours ago | parent | next [-]

And just like that, you find yourself implementing a compiler (specs to plan) and a virtual machine (plan to actions)!

lelanthran 2 hours ago | parent [-]

> And just like that, you find yourself implementing a compiler (specs to plan) and a virtual machine (plan to actions)!

Not just any compiler, but a non-typesafe, ad-hoc, informally specified grammar with a bunch of unspecified or under-specified behaviour.

Not sure if we can call this a win :-)

Jolter 4 hours ago | parent | prev | next [-]

I like that idea! For an application like Terraform, Ansible or the like, it seems ideal.

For something like in the article, I’m pretty sure a plan mode is overkill though.

Planning mode must involve making a domain specific language or data structure of some sort, which the execution mode will interpret and execute. I’m sure it would add a lot of complexity to a reporting tool where data is only collected once per day.

d7w 28 minutes ago | parent | next [-]

It's not strictly related to the original theme, but I want to mention this.

Ansible implementation is okay, but not perfect (plus, this is difficult to implement properly). For cases like file changes, it works, but if you install a package and rely on it later, the --check command will fail. So I am finding myself adding conditions like "is this a --check run?"

Ansible is treated as an idempotent tool, which it's not. If I delete a package from the list, then it will pollute the system until I create a set of "tearing-down" jobs.

Probably, Nix is a better alternative.

muvlon 4 hours ago | parent | prev [-]

No need to overthink it. In any semi-modern language you can (de)serialize anything to and from JSON, so it's really not that hard. The only thing you need to do is have a representation for the plan in your program. Which I will argue is probably the least error-prone way to implement --dry-run anyway (as opposed to sprinkling branches everywhere).

friendzis 3 hours ago | parent | next [-]

> you can (de)serialize anything to and from JSON, so it's really not that hard

First, it is hard, especially in at least somewhat portable manner.

Second, serialization only matters if you cannot (storage, IPC) pass data around in-memory anyway. That's not the problem raised, though. Whatever the backing implementation, the plan, ultimately, consists of some instructions (verbs in parent) over objects (arguments in parent). Serializing instructions any other way than dropping non-portable named references requires one to define execution language, which is not an easy feat.

> The only thing you need to do is have a representation for the plan in your program.

That "only" is doing lifting heavier than you probably realize. Such representation, which is by the way specified to be executable bidirectionally (roll back capabilities), is a full blown program, so you end up implementing language spec, godegen and execution engines. In cases of relatively simple business models that is going to be the majority of the engineering effort.

michaelmior an hour ago | parent [-]

> First, it is hard, especially in at least somewhat portable manner.

I'm curious what portability concerns you've run into with JSON serialization. Unless you need to deal with binary data for some reason, I don't immediately see an issue.

> Such representation, which is by the way specified to be executable bidirectionally (roll back capabilities), is a full blown program

Of course this depends on the complexity of your problem, but I'd imagine this could be as simple as a few configuration flags for some problems. You have a function to execute the process that takes the configuration and a function to roll back that takes the same configuration. This does tie the representation very closely to the program itself so it doesn't work if you want to be able to change the program and have previously generated "plans" continue to work.

Jolter 4 hours ago | parent | prev [-]

Right, but you still have to define every ”verb” your plan will have, their ”arguments”, etc. Not need to write a parser (even Java can serialize/deserialize stuff), as you say, but you have to meta-engineer the tool. Not just script a series of commands.

GeneralMaximus 3 hours ago | parent | prev [-]

Yes! I'm currently working on a script that modifies a bunch of sensitive files, and this the approach I'm taking to make sure I don't accidentally lose any important data.

I've split the process into three parts:

1. Walk the filesystem, capture the current state of the files, and write out a plan to disk.

2. Make sure the state of the files from step 1 has not changed, then execute the plan. Capture the new state of the files. Additionally, log all operations to disk in a journal.

3. Validate that no data was lost or unexpectedly changed using the captured file state from steps 1 and 2. Manually look at the operations log (or dump it into an LLM) to make sure nothing looks off.

These three steps can be three separate scripts, or three flags to the same script.

xavdid 5 hours ago | parent | prev | next [-]

I like this pattern a lot, but it's important that the code in the dry path is representative. I've been bitten a few too many times by dry code that just runs `print("would have updated ID: 123")`, but not actually running most of the code in the hot path. Then when I run it for real, some of the prep for the write operation has a bug / error, so my dry run didn't actually reveal much to me.

Put another way: your dry code should do everything up until the point that database writes / API calls / etc actually happen. Don't bail too early

marhee 5 hours ago | parent [-]

Doesn’t this conflate dry-running with integration testing? ASAIK the purpose of a dry-run is to understand what will happen, not to test what will happen. For the latter we have testing.

madeofpalk an hour ago | parent | next [-]

> ASAIK the purpose of a dry-run is to understand what will happen

Right - so the dry-run has to actually do as much of 'what will happen' as possible, except the actual things.

You want to put the check as far down, close to the 'action' as possible. You don't want any additional business logic gated by the dry run check.

friendzis 3 hours ago | parent | prev | next [-]

> ASAIK the purpose of a dry-run is to understand what will happen, not to test what will happen. For the latter we have testing.

Not really. Testing is a way to increase confidence that code does what it is specified to do, because it is cheaper than full-blown formal analysis :)

The problem raised by OP here is granularity. Operation like `update(record, field, value)` is itself a tree of smaller sub-operations that may do some permissions checking, locking, network calls, even checking for presence of record if it has upsert semantics, all of which could fail. A dry run with a plan that is too coarse can succeed while the actual operation fails over things left unchecked.

xavdid 5 hours ago | parent | prev | next [-]

Yes, but it depends on the context.

For little scripts, I'm not writing unit tests- running it is the test. But I want to be able to iterate without side effects, so it's important that the dry mode be as representative as possible for what'll happen when something is run for real.

AmbroseBierce 5 hours ago | parent [-]

You understand how subjective that is right? Someone might expect that the database doesn't do the last commit step while other people is perfectly happy that the database engine checks that it has enough writing permissions and is running as a user that can start the process without problems.

xavdid 5 hours ago | parent [-]

Sure, where you draw the line will vary between projects. As long as its exact placement doesn't matter too much.

For me personally, I tend to draw the line at write operations. So in your example, I'd want a dry run to verify the permissions that it can (if I expect those to be a problem). But if that can't easily be done without a write, then maybe it's not worth it. There are also situations where you want a dry run to be really fast, so you forego some checks (allowing for more surprises later). Really just depends.

lanyard-textile 4 hours ago | parent | prev [-]

I'd argue the dry run is a form of integration testing: Essentially the writes are mocked, but the reads are still functional.

mycall 11 hours ago | parent | prev | next [-]

I like the opposite too, -commit or -execute as it is assumed running it with defaults is immutable as the dry run, simplifying validation complexity and making the go live explicit.

Twirrim 10 hours ago | parent | next [-]

I've biased towards this heavily in the last 8 or so years now.

I've yet to have anyone mistakenly modify anything when they need to pass --commit, when I've repeatedly had people repeatedly accidentally modify stuff because they forgot --dry-run.

IgorPartola 10 hours ago | parent | next [-]

I wouldn’t want most things to work this way:

    $ rm file.bin
    $ rm —-commit file.bin
    $ cat foo.txt > bar.txt
    $ cat foo.txt | tee —-write-for-real bar.txt
    $ cp balm.mp3 pow.mp3
    $ cp —-i-mean-it balm.mp3 pow.mp3
There is a time and a place for it but it should not be the majority of use cases.
Darfk 10 hours ago | parent | next [-]

Totally agree it shouldn't be for basic tools; but if I'm ever developing a script that performs any kind of logic before reaching out to a DB or vendor API and modifies 100k user records, creating a flag to just verify the sanity of the logic is a necessity.

Joker_vD 10 hours ago | parent | next [-]

    if [ -n "$DRY_RUN" ] ; then
        alias rm='echo rm'
        alias cp='echo cp'
    fi
Of course, output redirects will still overwrite the files, since the shell does it and IIRC this behaviour can't be changed.
digiown 9 hours ago | parent [-]

set -o noclobber

james_marks 10 hours ago | parent | prev [-]

Yep. First thing I do for this kind thing is make a preview=true flag so I don’t accidentally run destructive actions.

digiown 9 hours ago | parent | prev | next [-]

For most of these local data manipulation type of commands, I'd rather just have them behave dangerously, and rely on filesystems snapshots to rollback when needed. With modern filesystems like zfs or btrfs, you can take a full snapshot every minute and keep it for a while to negate the damage done by almost all of these scripts. They double as a backup solution too.

ronjakoi 7 hours ago | parent | prev | next [-]

I used to have alias rm='rm -i' for a few years to be careful, but I took it out once I realised that I had just begun adding -f all the time

wonger_ 44 minutes ago | parent [-]

See also rm -I (capital i), which only prompts when deleting >3 files or directories

hdjrudni 10 hours ago | parent | prev [-]

Even in those basic examples, it probably would be useful. `cp` to a blank file? No problem. `cp` over an existing file? Yeah, I want to be warned.

`rm` a single file? Fine. `rm /`? Maybe block that one.

Izkata 5 hours ago | parent [-]

That last one would error without doing anything anyway because it's not recursive.

__turbobrew__ 5 hours ago | parent | prev [-]

—dry-run should default to true

fainpul a few seconds ago | parent [-]

[delayed]

torstenvl 7 hours ago | parent | prev | next [-]

I have a parallel directory deduper that uses hard links and adopted this pattern exactly.

By default it'll only tell you which files are identical between the two parallel directory structures.

If you want it to actually replace the files with hard links, you have to use the --execute flag.

spike021 8 hours ago | parent | prev | next [-]

There was a tool I used some time ago that required typing in a word or phrase to acknowledge that you know it's doing the run for real.

Pros and cons to each but I did like that because it was much more difficult to fat finger or absentmindedly use the wrong parameter.

xyse53 10 hours ago | parent | prev | next [-]

Yeah I'm more of a `--wet-run` `-w` fan myself. But it does depend on how serious/annoying the opposite is.

aqme28 10 hours ago | parent [-]

I've done that, but I hate the term "wet run."

I use "live run" now, which I think gets the point across without being sort of uncomfortable.

bregma an hour ago | parent | next [-]

    --moisten
IgorPartola 10 hours ago | parent | prev | next [-]

--with-danger

--make-it-so

--do-the-thing

--go-nuts

--safety-off

So many fun options.

Darfk 10 hours ago | parent | next [-]

I'm a fan of --safety-off. It gives off a 'aim away from face' or 'mishandle me and I'll blow a chunk out of your DB' vibe.

tetha 4 hours ago | parent | prev | next [-]

I find it important to include system information in here as well, so just copy-pasting an invocation from system A to system B does not run.

For example, our database restore script has a parameter `--yes-delete-all-data-in` and it needs to be parametrized with the PostgreSQL cluster name. So a command with `--yes-delete-all-data-in=pg-accounting` works on exactly one system and not on other systems.

torstenvl 7 hours ago | parent | prev | next [-]

It's in the UI not the command line, but I like Chromium's thisisunsafe

JsonCameron 9 hours ago | parent | prev | next [-]

I've done a few --execute --i-know-what-im-doing for some more dangerous scripts

altairprime 8 hours ago | parent [-]

May I recommend --I-take-responsibility-for-the-outcome-of-proceeding and require a capital I?

altairprime 8 hours ago | parent | prev [-]

--commit is solid too

Quekid5 9 hours ago | parent | prev [-]

Moist run is the way.

lazide 8 hours ago | parent | prev [-]

Just don’t randomly mix and match the approaches or you are in for a bad time.

d7w 21 minutes ago | parent | prev | next [-]

Funny, I recalled a tool called "molly-guard" which solves the problem when you want to reboot a Unix server, but can be on the wrong one. It asks to type the server name.

Anybody who rebooted a wrong server can say that this tool is brilliant.

Like "--dry-run" but for "reboot."

arjie 12 hours ago | parent | prev | next [-]

In order to make it work without polluting the code-base I find that I have to move the persistence into injectable strategy, which makes it good anyway. If you keep passing in `if dry_run:` everywhere you're screwed.

Also, if I'm being honest, it's much better to use `--wet-run` for the production run than to ask people to run `--dry-run` for the test run. Less likely to accidentally fire off the real stuff.

wging 11 hours ago | parent | next [-]

One nice way to do things, if you can get away with it, is to model the actions your application takes explicitly, and pass them to a central thing that actually handles them. Then there can be one place in your code that actually needs to understand whether it's doing a dry run or not. Ideally this would be just returning them from your core logic, "functional core, imperative shell" style.

clawsyndicate 15 minutes ago | parent | next [-]

we rely on this separation for our agents. the llm outputs a declarative json plan that gets validated against security policies before the runtime executes any side effects. catching a bad command during validation is way cheaper than rolling back a container.

WCSTombs 11 hours ago | parent | prev [-]

I totally agree with both this and the comment you replied to. The common thread is that you can architect the application in such a way that dry vs. wet running can be handled transparently, and in general these are just good designs.

IgorPartola 10 hours ago | parent [-]

That’s what I prefer as well. A generation step and an execution step where the executor can be just a logger or the real deal.

ryandrake 11 hours ago | parent | prev | next [-]

I don't want to have to type rm --wet-run tempfile.tmp every time, or mkdir -p --yes-really-do-it /usr/local/bin

The program should default to actually doing whatever thing you're asking it to do.

On the other hand it would be great if every tool had an --undo argument that would undo the last thing that program did.

homebrewer 11 hours ago | parent | next [-]

That undo program is called nilfs2, which unfortunately never became popular. I'll simply quote the kernel docs:

> NILFS2 is a log-structured file system (LFS) supporting continuous snapshotting. In addition to versioning capability of the entire file system, users can even restore files mistakenly overwritten or destroyed just a few seconds ago.

https://docs.kernel.org/filesystems/nilfs2.html

https://wiki.archlinux.org/title/NILFS2

https://en.wikipedia.org/wiki/NILFS

arjie 4 hours ago | parent | prev | next [-]

No rule is ironclad. I think matching risk to functionality is usually a good idea. For example, most modern Linuxen carry `rm` protected against root removal with `--no-preserve-root`. That is indeed `rm --wet-run` by a different name in the dangerous case.

aappleby 11 hours ago | parent | prev [-]

Sure, in those cases - but if a command has a chance of nuking prod, you want some extra step in there. Preferably something that can't be muscle-memoried through.

sh-run 11 hours ago | parent | prev | next [-]

I don't like the sound of `--wet-run`, but on more than one occasion I've written tools (and less frequently services) that default to `dry-run` and require `--no-dry-run` to actually make changes.

For services, I prefer having them detect where they are running. Ie if it's running in a dev environment, it's going to use a dev db by default.

segmondy 12 hours ago | parent | prev [-]

this is where design patterns come in handy even tho folks roll their eyes at it.

nstart 10 hours ago | parent | next [-]

Design patterns are one of those things where you have to go through the full cycle to really use it effectively. It goes through the stages:

no patterns. -> Everything must follow the gang of four's patterns!!!! -> omg I can't read code anymore I'm just looking at factories. No more patterns!!! -> Patterns are useful as a response to very specific contexts.

I remember being religious about strategy patterns on an app I developed once where I kept the db layer separated from the code so that I could do data management as a strategy. Theoretically this would mean that if I ever switched DBs it would be effortless to create a new strategy and swap it out using a config. I could even do tests using in memory structures instead of DBs which made TDD ultra fast.

DB switchover never happened and the effort I put into maintaining the pattern was more than the effort it would have taken me to swap a db out later :,) .

tbossanova 7 hours ago | parent [-]

What about the productivity gains from in memory db for tests though? Hard to measure I guess

cake-rusk 12 hours ago | parent | prev [-]

Design patterns exist to paper over language deficiencies. Use a language which is not deficient.

WCSTombs 11 hours ago | parent | next [-]

There's some truth to this, since some design patterns can simply be implemented "for good" in a sufficiently powerful language, but I don't find it's true in general. Unfortunately, it has become something of a thought-terminating cliché. Some common design patterns are so flexible that if you really implemented them in full generality as, say, some library function, its interface would be so complex that it likely wouldn't be a net win.

cake-rusk 3 hours ago | parent [-]

> Some common design patterns are so flexible that if you really implemented them in full generality as, say, some library function, its interface would be so complex that it likely wouldn't be a net win

Then I would say you have not arrived at the optimal solution. Keep looking.

awesome_dude 10 hours ago | parent | prev | next [-]

Just my two cents - but a general purpose language is going to need to be coupled with design patterns in order to be useful for different tasks.

I'm using MVC design patterns for some codebases, I'm using DDD plus Event sourcing and Event Driven for others.

I suspect that you are thinking of a small subset of design patterns (eg. Gang of Four derived patterns like Visitor, Strategy, or Iterator )

cake-rusk 3 hours ago | parent [-]

> I'm using MVC design patterns for some codebases, I'm using DDD plus Event sourcing and Event Driven for others.

All examples of OO nonsense. There is only one pattern you need (functions) (tongue-in-cheek): https://fsharpforfunandprofit.com/fppatterns/

Edit: Also consider using the ELM architecture instead of MVC: https://guide.elm-lang.org/architecture/

antinomicus 11 hours ago | parent | prev [-]

Like what?

frogulis 5 hours ago | parent | next [-]

First class functions and iterators are probably examples of what they mean, in terms of language features that obsolete (GoF) design patterns

cake-rusk 3 hours ago | parent | prev [-]

Here you go: https://fsharpforfunandprofit.com/fppatterns/

ElevenLathe 13 hours ago | parent | prev | next [-]

I usually do the opposite and add a --really flag to my CLI utilities, so that they are read-only by default and extra effort is needed to screw things up.

eichin 12 hours ago | parent | next [-]

I've committed "--i-meant-that" (for a destroy-the-remote-machine command that normally (without the arg) gives you a message and 10s to hit ^C if you're not sure, for some particularly impatient coworkers. Never ended up being used inappropriately, which is luck (but we never quantified how much luck :-)

tkclough 9 hours ago | parent [-]

I like the timer idea. I do something kinda similar by prompting the user to enter some short random code to continue.

I guess the goal for both is to give the user a chance to get out of autopilot, and avoid up-arrowing and re-executing.

weikju 13 hours ago | parent | prev [-]

Came here to say the same

skissane 12 hours ago | parent | prev | next [-]

In one (internal) CLI I maintain, I actually put the `if not dry_run:` inside the code which calls the REST API, because I have a setting to log HTTP calls as CURL commands, and that way in dry-run mode I can get the HTTP calls it would have made without it actually making them.

And this works well if your CLI command is simply performing a single operation, e.g. call this REST API

But the moment it starts to do anything more complex: e.g. call API1, and then send the results of API1 to API2 – it becomes a lot more difficult

Of course, you can simulate what API1 is likely to have returned; but suddenly you have something a lot more complex and error-prone than just `if not dry_run:`

scruple 9 hours ago | parent | next [-]

Having 1 place (or just generally limiting them) that does the things keeps the dry_run check from polluting the entire codebase. I maintain a lot of CLI tooling that's run by headless VMs in automation pipelines and we do this with basically every single tool.

iberator 3 hours ago | parent | prev [-]

What's your obsession with REST AND HTTP for console tools?!

Rest bloat is insane. Kidss nowadays wants EVERYTHING to run over IP/TCP/https. Why?!

Learn to write local tools first.

BrouteMinou 9 hours ago | parent | prev | next [-]

One of the kick-ass feature of PowerShell is you only need to add `[CmdletBinding(SupportsShouldProcess)] ` to have the `-whatIf` dry-run for your functions.

Quite handy.

debugnik 4 hours ago | parent [-]

Even better, it enables both -WhatIf and -Confirm, and provides a ShouldProcess function that interacts with both and with the user's impact threshold preferences. Really cool.

CGamesPlay 11 hours ago | parent | prev | next [-]

For me the ideal case is three-state. When run interactively with no flags, print a dry run result and prompt the user to confirm the action; and choose a default for non-interactive invocations. In both cases, accept either a --dry-run or a --yes flag that indicates the choice to be made.

This should always be included in any application that has a clear plan-then-execute flow, and it's definitely nice to have in other cases as well.

rook_line_sinkr 4 hours ago | parent | prev | next [-]

Dry run is great, but if you are using your script in a serious pipeline like that, you may want to go tho extra mile and write tests

https://github.com/shellspec/shellspec

gooseyman 10 hours ago | parent | prev | next [-]

https://news.ycombinator.com/item?id=27263136

Related

sixtram 6 hours ago | parent | prev | next [-]

I use a similar strategy for API design. Every API call is wrapped in a large database transaction, and I either roll back or commit the transaction based on dry-run or wet-run flags. This works well as long as you don’t need to touch the file system. I even wrap emails this way—emails are first written to a database queue, and an external process picks them up every few seconds.

sixtram 6 hours ago | parent [-]

To continue, this design has additional benefits:

The code is not littered with dry-run flag checks; the internal code doesn’t even know that a dry run is possible. Everything is rolled back at the end if needed.

All database referential integrity checks run correctly.

Some drawbacks: any audit logging should run in a separate transaction if you want to log dry runs.

zzo38computer 13 hours ago | parent | prev | next [-]

I think dry run mode is sometimes useful for many programs (and, I sometimes do use them). In some cases, you can use standard I/O so that it is not needed because you can control what is done with the output. Sometimes you might miss something especially if the code is messy, although security systems might help a bit. However, you can sometimes make the code less messy if the I/O is handled in a different way that makes this possible (e.g. by making the functions that make changes (the I/O parts of your program) to handle them in a way that the number of times you need to check for dry run is reduced if only a few functions need to); my ideas of a system with capability-based security would allow this (as well as many other benefits; a capability-based system has a lot of benefits beyond only the security system). Even with the existing security it can be done (e.g. with file permissions), although not as well as capability-based security.

cjonas 11 hours ago | parent | prev | next [-]

We have an internal framework for building migrations and the "dry run" it's a core part of the dev cycle. Allows you to test your replication plan and transformations without touching the target. Not to mention, a load that could take >24 hours completes in minutes

bikelang 13 hours ago | parent | prev | next [-]

I love `—-dry-run` flags for CLI tooling I build. If you plan your applications around this kind of functionality upfront - then I find it doesn’t have to pollute your code too much. In a language like Go or Rust - I’ll use a option/builder design pattern and whatever I’m ultimately writing to (remote file system, database, pubsub, etc) will instead write to a logger. I find this incredibly helpful in local dev - but it’s also useful in production. Even with high test coverage - it can be a bit spooky to turn on a new, consequential feature. Especially one that mutates data. I like to use dry run and enable this in our production envs just to ensure that things meet the functional and performance qualities we expect before actually enabling. This has definitely saved our bacon before (so many edge cases with prod data and request traffic).

bjt12345 5 hours ago | parent | prev | next [-]

I like to use the term "--no-clobber", so to set a script to not delete any information but re-use the previous configuration or files, otherwise error out if not possible.

tegiddrone 10 hours ago | parent | prev | next [-]

I’m interested to know the etymology and history of the term. Somehow I imagine an inked printing press as the “wet run.”

hydrox24 9 hours ago | parent | next [-]

It seems to have originated in the US with Fire Departments:

> These reports show that a dry run in the jargon of the fire service at this period [1880s–1890s] was one that didn’t involve the use of water, as opposed to a wet run that did.

https://www.worldwidewords.org/qa/qa-dry1.htm

jofzar 9 hours ago | parent | prev [-]

Interestingly the one place I have seen "dry run" to actually mean "dry run" is using a air compressor to check to see if a water loop (in a computer) doesn't leak by seeing if there no drop in pressure.

alexhans 8 hours ago | parent | prev | next [-]

Agreed. For me a good help, a dry run and a readme with good examples has been the norm for work tools for a while.

It's even more relevant now that you can get the LLMs/CLI agents to use your deterministic CLI tools.

giorgioz 5 hours ago | parent | prev | next [-]

I didn't know about --dry-run until last summer Claude Code added it to a script it had created.

mystifyingpoi 8 hours ago | parent | prev | next [-]

I like doing the same in CI jobs, like in Jenkins I'll add a DRY_RUN parameter, that makes the whole job readonly. A script that does the deployment would then only write what would be done.

taude 11 hours ago | parent | prev | next [-]

Funny enough, when creating CLIs with Claude Code (and Github Copilot), they've both added `--dry-run` to my CLIs without me even prompting it.

I prefer the inverse, better, though. Default off, and then add `--commit` or `--just-do-it` to make it actually run.

aappleby 10 hours ago | parent | prev | next [-]

What if the tool required an "un-safeword" to do destructive things?

"Do you really want to 'rm -rf /'? Type 'fiberglass' to proceed."

jabroni_salad 9 hours ago | parent | next [-]

There is a package called molly-guard that makes you type the computer's hostname when you are trying to do a shutdown or restart. I love it.

nthdeui 10 hours ago | parent | prev [-]

Like tarsnap's --nuke command:

  --nuke  Delete all of the archives stored.  To protect against accidental
          data loss, tarsnap will ask you to type the text "No Tomorrow"
          when using the --nuke command.
calebhwin 8 hours ago | parent | prev | next [-]

And it's more important than ever in the age of coding agents.

spwa4 2 hours ago | parent | prev | next [-]

I would love to have this available in git. I know if you make mistakes you can use the reflog, but if you need 5 tries to get something right reading the reflog quickly becomes impossible. Plus there are operations, like rebase or merge, that feel the need to make 50 entries in the reflog.

I've resorted to copying the entire directory (including the .git part) and then trying on the copy. The issue is that I'm working on a C++ program that has a few gigabytes of data.

throwaway314155 11 hours ago | parent | prev | next [-]

Sort of a strange article. You don't see that many people _not_ praising --dry-run (speaking of which, the author should really learn to use long options with a double dash).

CGamesPlay 11 hours ago | parent | next [-]

I'm not aware of any CLI arguments that accept emdash for long arguments–but I'm here for it. "A CLI framework for the LLM era"

analog31 9 hours ago | parent | prev [-]

I only saw the emdash in the thread link, but I do know that an iPad "wants" to turn a double dash into an emdash automatically. I have no idea how to disable that default.

xigoi 5 hours ago | parent [-]

If you’re using an iPad, the implicit assumption is that Apple knows better than you what you want to do.

TZubiri 10 hours ago | parent | prev | next [-]

I use --dry-run when I'm coding and I control the code.

Otherwise it's not very wise to trust the application on what should be a deputy responsibility.

Nowadays I'd probably use OverlayFS (or just Docker) to see what the changes would be, without ever risking the original FS.

throwaway290 9 hours ago | parent [-]

How do you easily diff what changed between Docker and host?

calvinmorrison 11 hours ago | parent | prev | next [-]

--dry-run

--really

--really-really

--yolo

homebrewer 10 hours ago | parent [-]

You'll like fontconfig then, which has both --force and --really-force

https://man.archlinux.org/man/fc-cache.1.en

awesome_dude 12 hours ago | parent | prev [-]

pffft, if you aren't dropping production databases first thing in the morning by accident, how are you going to wake yourself up :-)