@flowcore/cli 4.18.5 → 4.18.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -23,7 +23,7 @@ $ npm install -g @flowcore/cli
23
23
  $ flowcore COMMAND
24
24
  running command...
25
25
  $ flowcore (--version)
26
- @flowcore/cli/4.18.5 linux-x64 node-v24.13.0
26
+ @flowcore/cli/4.18.6 linux-x64 node-v24.13.0
27
27
  $ flowcore --help [COMMAND]
28
28
  USAGE
29
29
  $ flowcore COMMAND
@@ -33,6 +33,8 @@ USAGE
33
33
  # Commands
34
34
  <!-- commands -->
35
35
  * [`flowcore apply`](#flowcore-apply)
36
+ * [`flowcore assign policy POLICY_NAME`](#flowcore-assign-policy-policy_name)
37
+ * [`flowcore assign role ROLE_NAME`](#flowcore-assign-role-role_name)
36
38
  * [`flowcore auth delete key API_KEY_NAME`](#flowcore-auth-delete-key-api_key_name)
37
39
  * [`flowcore auth delete pat PAT`](#flowcore-auth-delete-pat-pat)
38
40
  * [`flowcore auth delete secret SECRET_KEY`](#flowcore-auth-delete-secret-secret_key)
@@ -46,6 +48,8 @@ USAGE
46
48
  * [`flowcore config ai`](#flowcore-config-ai)
47
49
  * [`flowcore config set`](#flowcore-config-set)
48
50
  * [`flowcore config show`](#flowcore-config-show)
51
+ * [`flowcore create policy NAME`](#flowcore-create-policy-name)
52
+ * [`flowcore create role NAME`](#flowcore-create-role-name)
49
53
  * [`flowcore data-core apply`](#flowcore-data-core-apply)
50
54
  * [`flowcore data-core generate event-type FLOWTYPE`](#flowcore-data-core-generate-event-type-flowtype)
51
55
  * [`flowcore data-core generate flow-type`](#flowcore-data-core-generate-flow-type)
@@ -58,10 +62,14 @@ USAGE
58
62
  * [`flowcore edit role NAME`](#flowcore-edit-role-name)
59
63
  * [`flowcore generate nextjs-entity NAME`](#flowcore-generate-nextjs-entity-name)
60
64
  * [`flowcore get adapter [ADAPTER]`](#flowcore-get-adapter-adapter)
65
+ * [`flowcore get key-policies KEY_ID`](#flowcore-get-key-policies-key_id)
66
+ * [`flowcore get key-roles KEY_ID`](#flowcore-get-key-roles-key_id)
61
67
  * [`flowcore get policy [NAME]`](#flowcore-get-policy-name)
62
68
  * [`flowcore get role [NAME]`](#flowcore-get-role-name)
63
69
  * [`flowcore get scenario [SCENARIO]`](#flowcore-get-scenario-scenario)
64
70
  * [`flowcore get tenant [NAME]`](#flowcore-get-tenant-name)
71
+ * [`flowcore get user-policies USER_ID`](#flowcore-get-user-policies-user_id)
72
+ * [`flowcore get user-roles USER_ID`](#flowcore-get-user-roles-user_id)
65
73
  * [`flowcore help [COMMAND]`](#flowcore-help-command)
66
74
  * [`flowcore info`](#flowcore-info)
67
75
  * [`flowcore login`](#flowcore-login)
@@ -89,7 +97,11 @@ USAGE
89
97
  * [`flowcore scenario local`](#flowcore-scenario-local)
90
98
  * [`flowcore stream STREAM`](#flowcore-stream-stream)
91
99
  * [`flowcore stream http STREAM`](#flowcore-stream-http-stream)
100
+ * [`flowcore unassign policy POLICY_NAME`](#flowcore-unassign-policy-policy_name)
101
+ * [`flowcore unassign role ROLE_NAME`](#flowcore-unassign-role-role_name)
92
102
  * [`flowcore update`](#flowcore-update)
103
+ * [`flowcore validate key KEY_ID`](#flowcore-validate-key-key_id)
104
+ * [`flowcore validate user USER_ID`](#flowcore-validate-user-user_id)
93
105
  * [`flowcore version`](#flowcore-version)
94
106
  * [`flowcore whoami`](#flowcore-whoami)
95
107
 
@@ -114,7 +126,73 @@ EXAMPLES
114
126
  $ flowcore apply -f ./path/to/manifest.yml
115
127
  ```
116
128
 
117
- _See code: [src/commands/apply.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.5/src/commands/apply.ts)_
129
+ _See code: [src/commands/apply.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/apply.ts)_
130
+
131
+ ## `flowcore assign policy POLICY_NAME`
132
+
133
+ Assign an IAM policy to a user, API key, or role. Exactly one of --user, --key, or --role must be specified
134
+
135
+ ```
136
+ USAGE
137
+ $ flowcore assign policy POLICY_NAME -t <value> [--profile <value>] [-j] [--key <value> | --user <value> | --role
138
+ <value>]
139
+
140
+ ARGUMENTS
141
+ POLICY_NAME The name of the policy to assign
142
+
143
+ FLAGS
144
+ -j, --json Output result as JSON
145
+ -t, --tenant=<value> (required) The tenant (organization slug) containing the policy
146
+ --key=<value> The API key ID to assign the policy to
147
+ --profile=<value> Specify the configuration profile to use
148
+ --role=<value> The role name to assign the policy to
149
+ --user=<value> The user ID to assign the policy to
150
+
151
+ DESCRIPTION
152
+ Assign an IAM policy to a user, API key, or role. Exactly one of --user, --key, or --role must be specified
153
+
154
+ EXAMPLES
155
+ $ flowcore iam assign policy read-access --user "auth0|abc123" -t my-org
156
+
157
+ $ flowcore iam assign policy read-access --key "550e8400-e29b-41d4-a716-446655440000" -t my-org
158
+
159
+ $ flowcore iam assign policy read-access --role data-reader -t my-org
160
+
161
+ $ flowcore iam assign policy read-access --user "auth0|abc123" -t my-org -j
162
+ ```
163
+
164
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/assign/policy.ts)_
165
+
166
+ ## `flowcore assign role ROLE_NAME`
167
+
168
+ Assign an IAM role to a user or API key. Exactly one of --user or --key must be specified
169
+
170
+ ```
171
+ USAGE
172
+ $ flowcore assign role ROLE_NAME -t <value> [--profile <value>] [-j] [--key <value> | --user <value>]
173
+
174
+ ARGUMENTS
175
+ ROLE_NAME The name of the role to assign
176
+
177
+ FLAGS
178
+ -j, --json Output result as JSON
179
+ -t, --tenant=<value> (required) The tenant (organization slug) containing the role
180
+ --key=<value> The API key ID to assign the role to
181
+ --profile=<value> Specify the configuration profile to use
182
+ --user=<value> The user ID to assign the role to
183
+
184
+ DESCRIPTION
185
+ Assign an IAM role to a user or API key. Exactly one of --user or --key must be specified
186
+
187
+ EXAMPLES
188
+ $ flowcore iam assign role data-reader --user "auth0|abc123" -t my-org
189
+
190
+ $ flowcore iam assign role data-reader --key "550e8400-e29b-41d4-a716-446655440000" -t my-org
191
+
192
+ $ flowcore iam assign role data-reader --user "auth0|abc123" -t my-org -j
193
+ ```
194
+
195
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/assign/role.ts)_
118
196
 
119
197
  ## `flowcore auth delete key API_KEY_NAME`
120
198
 
@@ -431,6 +509,68 @@ EXAMPLES
431
509
 
432
510
  _See code: [@flowcore/cli-plugin-config](https://github.com/flowcore/flowcore-cli-plugin-config/blob/v2.5.0/src/commands/config/show.ts)_
433
511
 
512
+ ## `flowcore create policy NAME`
513
+
514
+ Create a new IAM policy with the specified name, version, and policy documents defining resource access rules
515
+
516
+ ```
517
+ USAGE
518
+ $ flowcore create policy NAME --documents <value> -t <value> --version <value> [--profile <value>] [--description
519
+ <value>] [-j]
520
+
521
+ ARGUMENTS
522
+ NAME The name of the policy to create
523
+
524
+ FLAGS
525
+ -j, --json Output result as JSON
526
+ -t, --tenant=<value> (required) The tenant (organization slug) to create the policy in
527
+ --description=<value> A description of the policy
528
+ --documents=<value> (required) JSON array of policy documents, each with "resource" and "action" fields. Use
529
+ "-" to read from stdin
530
+ --profile=<value> Specify the configuration profile to use
531
+ --version=<value> (required) The version of the policy (e.g. 2024-01-01)
532
+
533
+ DESCRIPTION
534
+ Create a new IAM policy with the specified name, version, and policy documents defining resource access rules
535
+
536
+ EXAMPLES
537
+ $ flowcore iam create policy read-access -t my-org --version "2024-01-01" --documents '[{"resource":"frn::my-org:data-core/*","action":["read","fetch"]}]'
538
+
539
+ $ cat docs.json | flowcore iam create policy read-access -t my-org --version "2024-01-01" --documents -
540
+
541
+ $ flowcore iam create policy admin-access -t my-org --version "2024-01-01" --description "Full admin access" --documents '[{"resource":"frn::my-org:*","action":"*"}]' -j
542
+ ```
543
+
544
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/create/policy.ts)_
545
+
546
+ ## `flowcore create role NAME`
547
+
548
+ Create a new IAM role with the specified name and optional description
549
+
550
+ ```
551
+ USAGE
552
+ $ flowcore create role NAME -t <value> [--profile <value>] [--description <value>] [-j]
553
+
554
+ ARGUMENTS
555
+ NAME The name of the role to create
556
+
557
+ FLAGS
558
+ -j, --json Output result as JSON
559
+ -t, --tenant=<value> (required) The tenant (organization slug) to create the role in
560
+ --description=<value> A description of the role
561
+ --profile=<value> Specify the configuration profile to use
562
+
563
+ DESCRIPTION
564
+ Create a new IAM role with the specified name and optional description
565
+
566
+ EXAMPLES
567
+ $ flowcore iam create role data-reader -t my-org --description "Read-only data access"
568
+
569
+ $ flowcore iam create role admin -t my-org -j
570
+ ```
571
+
572
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/create/role.ts)_
573
+
434
574
  ## `flowcore data-core apply`
435
575
 
436
576
  Apply a manifest configuration for a Data Core to the Flowcore Platform
@@ -567,7 +707,7 @@ EXAMPLES
567
707
  cat ./path/to/manifest.yml | flowcore delete -f -
568
708
  ```
569
709
 
570
- _See code: [src/commands/delete.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.5/src/commands/delete.ts)_
710
+ _See code: [src/commands/delete.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/delete.ts)_
571
711
 
572
712
  ## `flowcore delete policy NAME`
573
713
 
@@ -590,7 +730,7 @@ DESCRIPTION
590
730
  Delete a policy
591
731
  ```
592
732
 
593
- _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.7.0/src/commands/delete/policy.ts)_
733
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/delete/policy.ts)_
594
734
 
595
735
  ## `flowcore delete role NAME`
596
736
 
@@ -613,7 +753,7 @@ DESCRIPTION
613
753
  Delete a role
614
754
  ```
615
755
 
616
- _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.7.0/src/commands/delete/role.ts)_
756
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/delete/role.ts)_
617
757
 
618
758
  ## `flowcore diff`
619
759
 
@@ -634,7 +774,7 @@ EXAMPLES
634
774
  $ flowcore diff -f ./path/to/manifest.yml
635
775
  ```
636
776
 
637
- _See code: [src/commands/diff.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.5/src/commands/diff.ts)_
777
+ _See code: [src/commands/diff.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/diff.ts)_
638
778
 
639
779
  ## `flowcore edit policy NAME`
640
780
 
@@ -660,7 +800,7 @@ EXAMPLES
660
800
  $ FC_EDITOR=code flowcore iam edit policy my-policy -t my-tenant
661
801
  ```
662
802
 
663
- _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.7.0/src/commands/edit/policy.ts)_
803
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/edit/policy.ts)_
664
804
 
665
805
  ## `flowcore edit role NAME`
666
806
 
@@ -686,7 +826,7 @@ EXAMPLES
686
826
  $ FC_EDITOR=code flowcore iam edit role my-role -t my-tenant
687
827
  ```
688
828
 
689
- _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.7.0/src/commands/edit/role.ts)_
829
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/edit/role.ts)_
690
830
 
691
831
  ## `flowcore generate nextjs-entity NAME`
692
832
 
@@ -738,6 +878,64 @@ EXAMPLES
738
878
 
739
879
  _See code: [@flowcore/cli-plugin-scenario](https://github.com/flowcore/flowcore-cli-plugin-scenario/blob/v4.6.7/src/commands/get/adapter.ts)_
740
880
 
881
+ ## `flowcore get key-policies KEY_ID`
882
+
883
+ List all IAM policies assigned to a specific API key
884
+
885
+ ```
886
+ USAGE
887
+ $ flowcore get key-policies KEY_ID [--profile <value>] [-j] [-w]
888
+
889
+ ARGUMENTS
890
+ KEY_ID The API key ID to get policies for
891
+
892
+ FLAGS
893
+ -j, --json Output result as JSON
894
+ -w, --wide Show additional columns in table output
895
+ --profile=<value> Specify the configuration profile to use
896
+
897
+ DESCRIPTION
898
+ List all IAM policies assigned to a specific API key
899
+
900
+ EXAMPLES
901
+ $ flowcore iam get key-policies "550e8400-e29b-41d4-a716-446655440000"
902
+
903
+ $ flowcore iam get key-policies "550e8400-e29b-41d4-a716-446655440000" -j
904
+
905
+ $ flowcore iam get key-policies "550e8400-e29b-41d4-a716-446655440000" -w
906
+ ```
907
+
908
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/key-policies.ts)_
909
+
910
+ ## `flowcore get key-roles KEY_ID`
911
+
912
+ List all IAM roles assigned to a specific API key
913
+
914
+ ```
915
+ USAGE
916
+ $ flowcore get key-roles KEY_ID [--profile <value>] [-j] [-w]
917
+
918
+ ARGUMENTS
919
+ KEY_ID The API key ID to get roles for
920
+
921
+ FLAGS
922
+ -j, --json Output result as JSON
923
+ -w, --wide Show additional columns in table output
924
+ --profile=<value> Specify the configuration profile to use
925
+
926
+ DESCRIPTION
927
+ List all IAM roles assigned to a specific API key
928
+
929
+ EXAMPLES
930
+ $ flowcore iam get key-roles "550e8400-e29b-41d4-a716-446655440000"
931
+
932
+ $ flowcore iam get key-roles "550e8400-e29b-41d4-a716-446655440000" -j
933
+
934
+ $ flowcore iam get key-roles "550e8400-e29b-41d4-a716-446655440000" -w
935
+ ```
936
+
937
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/key-roles.ts)_
938
+
741
939
  ## `flowcore get policy [NAME]`
742
940
 
743
941
  Get a policy
@@ -759,7 +957,7 @@ DESCRIPTION
759
957
  Get a policy
760
958
  ```
761
959
 
762
- _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.7.0/src/commands/get/policy.ts)_
960
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/policy.ts)_
763
961
 
764
962
  ## `flowcore get role [NAME]`
765
963
 
@@ -782,7 +980,7 @@ DESCRIPTION
782
980
  Get a role
783
981
  ```
784
982
 
785
- _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.7.0/src/commands/get/role.ts)_
983
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/role.ts)_
786
984
 
787
985
  ## `flowcore get scenario [SCENARIO]`
788
986
 
@@ -840,6 +1038,66 @@ EXAMPLES
840
1038
 
841
1039
  _See code: [@flowcore/cli-plugin-tenant-management](https://github.com/flowcore-io/tenant-management/blob/v1.1.1/src/commands/get/tenant.ts)_
842
1040
 
1041
+ ## `flowcore get user-policies USER_ID`
1042
+
1043
+ List all IAM policies assigned to a specific user, optionally scoped to a tenant
1044
+
1045
+ ```
1046
+ USAGE
1047
+ $ flowcore get user-policies USER_ID [--profile <value>] [-j] [-t <value>] [-w]
1048
+
1049
+ ARGUMENTS
1050
+ USER_ID The user ID to get policies for (e.g. auth0|abc123)
1051
+
1052
+ FLAGS
1053
+ -j, --json Output result as JSON
1054
+ -t, --tenant=<value> Scope results to a specific tenant (organization slug)
1055
+ -w, --wide Show additional columns in table output
1056
+ --profile=<value> Specify the configuration profile to use
1057
+
1058
+ DESCRIPTION
1059
+ List all IAM policies assigned to a specific user, optionally scoped to a tenant
1060
+
1061
+ EXAMPLES
1062
+ $ flowcore iam get user-policies "auth0|abc123" -t my-org
1063
+
1064
+ $ flowcore iam get user-policies "auth0|abc123" -j
1065
+
1066
+ $ flowcore iam get user-policies "auth0|abc123" -t my-org -w
1067
+ ```
1068
+
1069
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/user-policies.ts)_
1070
+
1071
+ ## `flowcore get user-roles USER_ID`
1072
+
1073
+ List all IAM roles assigned to a specific user, optionally scoped to a tenant
1074
+
1075
+ ```
1076
+ USAGE
1077
+ $ flowcore get user-roles USER_ID [--profile <value>] [-j] [-t <value>] [-w]
1078
+
1079
+ ARGUMENTS
1080
+ USER_ID The user ID to get roles for (e.g. auth0|abc123)
1081
+
1082
+ FLAGS
1083
+ -j, --json Output result as JSON
1084
+ -t, --tenant=<value> Scope results to a specific tenant (organization slug)
1085
+ -w, --wide Show additional columns in table output
1086
+ --profile=<value> Specify the configuration profile to use
1087
+
1088
+ DESCRIPTION
1089
+ List all IAM roles assigned to a specific user, optionally scoped to a tenant
1090
+
1091
+ EXAMPLES
1092
+ $ flowcore iam get user-roles "auth0|abc123" -t my-org
1093
+
1094
+ $ flowcore iam get user-roles "auth0|abc123" -j
1095
+
1096
+ $ flowcore iam get user-roles "auth0|abc123" -t my-org -w
1097
+ ```
1098
+
1099
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/user-roles.ts)_
1100
+
843
1101
  ## `flowcore help [COMMAND]`
844
1102
 
845
1103
  Display help for flowcore.
@@ -878,7 +1136,7 @@ EXAMPLES
878
1136
  $ flowcore info
879
1137
  ```
880
1138
 
881
- _See code: [src/commands/info.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.5/src/commands/info.ts)_
1139
+ _See code: [src/commands/info.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/info.ts)_
882
1140
 
883
1141
  ## `flowcore login`
884
1142
 
@@ -1613,6 +1871,75 @@ EXAMPLES
1613
1871
 
1614
1872
  _See code: [@flowcore/cli-plugin-core](https://github.com/flowcore/flowcore-cli-plugin-core/blob/v5.7.3/src/commands/stream/http.ts)_
1615
1873
 
1874
+ ## `flowcore unassign policy POLICY_NAME`
1875
+
1876
+ Remove an IAM policy assignment from a user, API key, or role. Exactly one of --user, --key, or --role must be specified
1877
+
1878
+ ```
1879
+ USAGE
1880
+ $ flowcore unassign policy POLICY_NAME -t <value> [--profile <value>] [-j] [--key <value> | --user <value> | --role
1881
+ <value>] [-y]
1882
+
1883
+ ARGUMENTS
1884
+ POLICY_NAME The name of the policy to unassign
1885
+
1886
+ FLAGS
1887
+ -j, --json Output result as JSON
1888
+ -t, --tenant=<value> (required) The tenant (organization slug) containing the policy
1889
+ -y, --yes Skip confirmation prompt
1890
+ --key=<value> The API key ID to unassign the policy from
1891
+ --profile=<value> Specify the configuration profile to use
1892
+ --role=<value> The role name to unassign the policy from
1893
+ --user=<value> The user ID to unassign the policy from
1894
+
1895
+ DESCRIPTION
1896
+ Remove an IAM policy assignment from a user, API key, or role. Exactly one of --user, --key, or --role must be
1897
+ specified
1898
+
1899
+ EXAMPLES
1900
+ $ flowcore iam unassign policy read-access --user "auth0|abc123" -t my-org -y
1901
+
1902
+ $ flowcore iam unassign policy read-access --key "550e8400-e29b-41d4-a716-446655440000" -t my-org -y
1903
+
1904
+ $ flowcore iam unassign policy read-access --role data-reader -t my-org -y
1905
+
1906
+ $ flowcore iam unassign policy read-access --user "auth0|abc123" -t my-org -j -y
1907
+ ```
1908
+
1909
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/unassign/policy.ts)_
1910
+
1911
+ ## `flowcore unassign role ROLE_NAME`
1912
+
1913
+ Remove an IAM role assignment from a user or API key. Exactly one of --user or --key must be specified
1914
+
1915
+ ```
1916
+ USAGE
1917
+ $ flowcore unassign role ROLE_NAME -t <value> [--profile <value>] [-j] [--key <value> | --user <value>] [-y]
1918
+
1919
+ ARGUMENTS
1920
+ ROLE_NAME The name of the role to unassign
1921
+
1922
+ FLAGS
1923
+ -j, --json Output result as JSON
1924
+ -t, --tenant=<value> (required) The tenant (organization slug) containing the role
1925
+ -y, --yes Skip confirmation prompt
1926
+ --key=<value> The API key ID to unassign the role from
1927
+ --profile=<value> Specify the configuration profile to use
1928
+ --user=<value> The user ID to unassign the role from
1929
+
1930
+ DESCRIPTION
1931
+ Remove an IAM role assignment from a user or API key. Exactly one of --user or --key must be specified
1932
+
1933
+ EXAMPLES
1934
+ $ flowcore iam unassign role data-reader --user "auth0|abc123" -t my-org -y
1935
+
1936
+ $ flowcore iam unassign role data-reader --key "550e8400-e29b-41d4-a716-446655440000" -t my-org -y
1937
+
1938
+ $ flowcore iam unassign role data-reader --user "auth0|abc123" -t my-org -j -y
1939
+ ```
1940
+
1941
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/unassign/role.ts)_
1942
+
1616
1943
  ## `flowcore update`
1617
1944
 
1618
1945
  Update the Flowcore CLI to the latest version
@@ -1628,7 +1955,69 @@ EXAMPLES
1628
1955
  $ flowcore update
1629
1956
  ```
1630
1957
 
1631
- _See code: [src/commands/update.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.5/src/commands/update.ts)_
1958
+ _See code: [src/commands/update.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/update.ts)_
1959
+
1960
+ ## `flowcore validate key KEY_ID`
1961
+
1962
+ Validate whether an API key has permission to perform an action on one or more resources
1963
+
1964
+ ```
1965
+ USAGE
1966
+ $ flowcore validate key KEY_ID --action <value> --resource <value> -t <value> [--profile <value>] [-j]
1967
+
1968
+ ARGUMENTS
1969
+ KEY_ID The API key ID to validate access for
1970
+
1971
+ FLAGS
1972
+ -j, --json Output result as JSON
1973
+ -t, --tenant=<value> (required) The tenant (organization slug) to validate within
1974
+ --action=<value> (required) The action to validate (e.g. read, write, ingest, fetch)
1975
+ --profile=<value> Specify the configuration profile to use
1976
+ --resource=<value>... (required) The resource FRN to validate against (can be specified multiple times)
1977
+
1978
+ DESCRIPTION
1979
+ Validate whether an API key has permission to perform an action on one or more resources
1980
+
1981
+ EXAMPLES
1982
+ $ flowcore iam validate key "550e8400-e29b-41d4-a716-446655440000" -t my-org --action ingest --resource "frn::my-org:event-type/*"
1983
+
1984
+ $ flowcore iam validate key "550e8400-e29b-41d4-a716-446655440000" -t my-org --action read --resource "frn::my-org:data-core/my-core" -j
1985
+
1986
+ $ flowcore iam validate key "550e8400-e29b-41d4-a716-446655440000" -t my-org --action read --resource "frn::my-org:data-core/core1" --resource "frn::my-org:data-core/core2"
1987
+ ```
1988
+
1989
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/validate/key.ts)_
1990
+
1991
+ ## `flowcore validate user USER_ID`
1992
+
1993
+ Validate whether a user has permission to perform an action on one or more resources
1994
+
1995
+ ```
1996
+ USAGE
1997
+ $ flowcore validate user USER_ID --action <value> --resource <value> -t <value> [--profile <value>] [-j]
1998
+
1999
+ ARGUMENTS
2000
+ USER_ID The user ID to validate access for (e.g. auth0|abc123)
2001
+
2002
+ FLAGS
2003
+ -j, --json Output result as JSON
2004
+ -t, --tenant=<value> (required) The tenant (organization slug) to validate within
2005
+ --action=<value> (required) The action to validate (e.g. read, write, ingest, fetch)
2006
+ --profile=<value> Specify the configuration profile to use
2007
+ --resource=<value>... (required) The resource FRN to validate against (can be specified multiple times)
2008
+
2009
+ DESCRIPTION
2010
+ Validate whether a user has permission to perform an action on one or more resources
2011
+
2012
+ EXAMPLES
2013
+ $ flowcore iam validate user "auth0|abc123" -t my-org --action read --resource "frn::my-org:data-core/my-core"
2014
+
2015
+ $ flowcore iam validate user "auth0|abc123" -t my-org --action write --resource "frn::my-org:data-core/*" -j
2016
+
2017
+ $ flowcore iam validate user "auth0|abc123" -t my-org --action read --resource "frn::my-org:data-core/core1" --resource "frn::my-org:data-core/core2"
2018
+ ```
2019
+
2020
+ _See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/validate/user.ts)_
1632
2021
 
1633
2022
  ## `flowcore version`
1634
2023
 
@@ -196,5 +196,5 @@
196
196
  ]
197
197
  }
198
198
  },
199
- "version": "4.18.5"
199
+ "version": "4.18.6"
200
200
  }
package/package.json CHANGED
@@ -12,7 +12,7 @@
12
12
  "@flowcore/cli-plugin-core": "^5.7.3",
13
13
  "@flowcore/cli-plugin-data-core": "^3.4.0",
14
14
  "@flowcore/cli-plugin-generator": "^1.6.0",
15
- "@flowcore/cli-plugin-iam": "^1.7.0",
15
+ "@flowcore/cli-plugin-iam": "^1.8.0",
16
16
  "@flowcore/cli-plugin-scenario": "^4.6.7",
17
17
  "@flowcore/cli-plugin-tenant-management": "^1.1.1",
18
18
  "@flowcore/sdk": "^1.50.0",
@@ -119,7 +119,7 @@
119
119
  "prestart": "npm run build",
120
120
  "update-schema": "rover graph introspect https://graph.api.staging.flowcore.io/graphql -o schema.gql"
121
121
  },
122
- "version": "4.18.5",
122
+ "version": "4.18.6",
123
123
  "bugs": "https://github.com/flowcore-io/flowcore-cli/issues",
124
124
  "keywords": [
125
125
  "flowcore",