Synopsis
Description
Theconfig command manages:
- Paranoid modes - Ring-based schema governance (readonly/standard/privileged/emergency)
- Mode passwords - Authentication for mode upgrades
- Configuration values - Project settings
Subcommands
config get- Get configuration valueconfig set- Set configuration value (including mode)config auth set-password- Set mode password
config get
Get a configuration value.Synopsis
Arguments
Configuration key to retrieveCommon keys:
mode- Current paranoid modedatabase.driver- Database driverschema.paths- Schema file paths
Examples
Get Current Mode
Get Database Driver
config set
Set a configuration value.Synopsis
Arguments
Configuration assignmentFormat:
key=valueExample: mode=standardExamples
Upgrade Mode (Requires Password)
Downgrade Mode (No Password)
config auth set-password
Set or change the mode password.Synopsis
Examples
Set Password (First Time)
Change Password
Paranoid Modes
ChameleonDB uses Unix-style protection rings for schema governance:| Mode | Ring | Schema Changes | Password Required |
|---|---|---|---|
| readonly | R3 | ❌ Blocked | No (default) |
| standard | R2 | ✅ Controlled | Yes (upgrade) |
| privileged | R1 | ✅ Direct | Yes (upgrade) |
| emergency | R0 | ✅ No checks | Yes (upgrade) |
Mode Descriptions
Ring 3 - Production default
- Schema modifications blocked
- Migrations fail with error
- Introspection disabled
- No password needed to set (downgrade)
Ring 2 - Development mode
- Schema changes allowed
- Migrations validated and logged
- Integrity checks enforced
- Password required to upgrade from readonly
Ring 1 - DBA access
- Direct schema changes
- Reduced validation
- All operations logged
- Password required to upgrade
Ring 0 - Emergency recovery
- No integrity checks
- All operations allowed
- Full audit logging
- Password required to upgrade
Mode Workflow
Initial Setup (After Init)
Production Deployment
Emergency Recovery
Password Management
Password Storage
Passwords are hashed and stored in:Password Requirements
- Minimum length: 8 characters (recommended: 12+)
- No complexity requirements (use strong passwords)
- Stored as bcrypt hash
Lost Password Recovery
If you lose the mode password:-
Option 1: Reset password hash
- Option 2: Use privileged access Contact DBA or use emergency access if configured.
Configuration File
Configuration is stored in.chameleon.yml:
Edit Configuration
Direct editing:config set:
Mode Enforcement
Readonly Mode Blocks
Standard Mode Allows
Troubleshooting
Wrong Password
No Password Set
Cannot Read Config
.chameleon.yml:
Security Best Practices
1. Always Set a Password
2. Use Readonly in Production
3. Audit Mode Changes
4. Rotate Passwords Regularly
5. Document Emergency Procedures
Create runbook for mode upgrades:See Also
chameleon status- View current modechameleon migrate- Apply migrations (respects mode)chameleon verify- Verify vault integrity- Integrity Modes - Learn about paranoid modes
- Configuration Reference - All config options