@flowcore/cli 4.18.5 → 4.18.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +401 -12
- package/oclif.manifest.json +1 -1
- package/package.json +2 -2
package/README.md
CHANGED
|
@@ -23,7 +23,7 @@ $ npm install -g @flowcore/cli
|
|
|
23
23
|
$ flowcore COMMAND
|
|
24
24
|
running command...
|
|
25
25
|
$ flowcore (--version)
|
|
26
|
-
@flowcore/cli/4.18.
|
|
26
|
+
@flowcore/cli/4.18.6 linux-x64 node-v24.13.0
|
|
27
27
|
$ flowcore --help [COMMAND]
|
|
28
28
|
USAGE
|
|
29
29
|
$ flowcore COMMAND
|
|
@@ -33,6 +33,8 @@ USAGE
|
|
|
33
33
|
# Commands
|
|
34
34
|
<!-- commands -->
|
|
35
35
|
* [`flowcore apply`](#flowcore-apply)
|
|
36
|
+
* [`flowcore assign policy POLICY_NAME`](#flowcore-assign-policy-policy_name)
|
|
37
|
+
* [`flowcore assign role ROLE_NAME`](#flowcore-assign-role-role_name)
|
|
36
38
|
* [`flowcore auth delete key API_KEY_NAME`](#flowcore-auth-delete-key-api_key_name)
|
|
37
39
|
* [`flowcore auth delete pat PAT`](#flowcore-auth-delete-pat-pat)
|
|
38
40
|
* [`flowcore auth delete secret SECRET_KEY`](#flowcore-auth-delete-secret-secret_key)
|
|
@@ -46,6 +48,8 @@ USAGE
|
|
|
46
48
|
* [`flowcore config ai`](#flowcore-config-ai)
|
|
47
49
|
* [`flowcore config set`](#flowcore-config-set)
|
|
48
50
|
* [`flowcore config show`](#flowcore-config-show)
|
|
51
|
+
* [`flowcore create policy NAME`](#flowcore-create-policy-name)
|
|
52
|
+
* [`flowcore create role NAME`](#flowcore-create-role-name)
|
|
49
53
|
* [`flowcore data-core apply`](#flowcore-data-core-apply)
|
|
50
54
|
* [`flowcore data-core generate event-type FLOWTYPE`](#flowcore-data-core-generate-event-type-flowtype)
|
|
51
55
|
* [`flowcore data-core generate flow-type`](#flowcore-data-core-generate-flow-type)
|
|
@@ -58,10 +62,14 @@ USAGE
|
|
|
58
62
|
* [`flowcore edit role NAME`](#flowcore-edit-role-name)
|
|
59
63
|
* [`flowcore generate nextjs-entity NAME`](#flowcore-generate-nextjs-entity-name)
|
|
60
64
|
* [`flowcore get adapter [ADAPTER]`](#flowcore-get-adapter-adapter)
|
|
65
|
+
* [`flowcore get key-policies KEY_ID`](#flowcore-get-key-policies-key_id)
|
|
66
|
+
* [`flowcore get key-roles KEY_ID`](#flowcore-get-key-roles-key_id)
|
|
61
67
|
* [`flowcore get policy [NAME]`](#flowcore-get-policy-name)
|
|
62
68
|
* [`flowcore get role [NAME]`](#flowcore-get-role-name)
|
|
63
69
|
* [`flowcore get scenario [SCENARIO]`](#flowcore-get-scenario-scenario)
|
|
64
70
|
* [`flowcore get tenant [NAME]`](#flowcore-get-tenant-name)
|
|
71
|
+
* [`flowcore get user-policies USER_ID`](#flowcore-get-user-policies-user_id)
|
|
72
|
+
* [`flowcore get user-roles USER_ID`](#flowcore-get-user-roles-user_id)
|
|
65
73
|
* [`flowcore help [COMMAND]`](#flowcore-help-command)
|
|
66
74
|
* [`flowcore info`](#flowcore-info)
|
|
67
75
|
* [`flowcore login`](#flowcore-login)
|
|
@@ -89,7 +97,11 @@ USAGE
|
|
|
89
97
|
* [`flowcore scenario local`](#flowcore-scenario-local)
|
|
90
98
|
* [`flowcore stream STREAM`](#flowcore-stream-stream)
|
|
91
99
|
* [`flowcore stream http STREAM`](#flowcore-stream-http-stream)
|
|
100
|
+
* [`flowcore unassign policy POLICY_NAME`](#flowcore-unassign-policy-policy_name)
|
|
101
|
+
* [`flowcore unassign role ROLE_NAME`](#flowcore-unassign-role-role_name)
|
|
92
102
|
* [`flowcore update`](#flowcore-update)
|
|
103
|
+
* [`flowcore validate key KEY_ID`](#flowcore-validate-key-key_id)
|
|
104
|
+
* [`flowcore validate user USER_ID`](#flowcore-validate-user-user_id)
|
|
93
105
|
* [`flowcore version`](#flowcore-version)
|
|
94
106
|
* [`flowcore whoami`](#flowcore-whoami)
|
|
95
107
|
|
|
@@ -114,7 +126,73 @@ EXAMPLES
|
|
|
114
126
|
$ flowcore apply -f ./path/to/manifest.yml
|
|
115
127
|
```
|
|
116
128
|
|
|
117
|
-
_See code: [src/commands/apply.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.
|
|
129
|
+
_See code: [src/commands/apply.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/apply.ts)_
|
|
130
|
+
|
|
131
|
+
## `flowcore assign policy POLICY_NAME`
|
|
132
|
+
|
|
133
|
+
Assign an IAM policy to a user, API key, or role. Exactly one of --user, --key, or --role must be specified
|
|
134
|
+
|
|
135
|
+
```
|
|
136
|
+
USAGE
|
|
137
|
+
$ flowcore assign policy POLICY_NAME -t <value> [--profile <value>] [-j] [--key <value> | --user <value> | --role
|
|
138
|
+
<value>]
|
|
139
|
+
|
|
140
|
+
ARGUMENTS
|
|
141
|
+
POLICY_NAME The name of the policy to assign
|
|
142
|
+
|
|
143
|
+
FLAGS
|
|
144
|
+
-j, --json Output result as JSON
|
|
145
|
+
-t, --tenant=<value> (required) The tenant (organization slug) containing the policy
|
|
146
|
+
--key=<value> The API key ID to assign the policy to
|
|
147
|
+
--profile=<value> Specify the configuration profile to use
|
|
148
|
+
--role=<value> The role name to assign the policy to
|
|
149
|
+
--user=<value> The user ID to assign the policy to
|
|
150
|
+
|
|
151
|
+
DESCRIPTION
|
|
152
|
+
Assign an IAM policy to a user, API key, or role. Exactly one of --user, --key, or --role must be specified
|
|
153
|
+
|
|
154
|
+
EXAMPLES
|
|
155
|
+
$ flowcore iam assign policy read-access --user "auth0|abc123" -t my-org
|
|
156
|
+
|
|
157
|
+
$ flowcore iam assign policy read-access --key "550e8400-e29b-41d4-a716-446655440000" -t my-org
|
|
158
|
+
|
|
159
|
+
$ flowcore iam assign policy read-access --role data-reader -t my-org
|
|
160
|
+
|
|
161
|
+
$ flowcore iam assign policy read-access --user "auth0|abc123" -t my-org -j
|
|
162
|
+
```
|
|
163
|
+
|
|
164
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/assign/policy.ts)_
|
|
165
|
+
|
|
166
|
+
## `flowcore assign role ROLE_NAME`
|
|
167
|
+
|
|
168
|
+
Assign an IAM role to a user or API key. Exactly one of --user or --key must be specified
|
|
169
|
+
|
|
170
|
+
```
|
|
171
|
+
USAGE
|
|
172
|
+
$ flowcore assign role ROLE_NAME -t <value> [--profile <value>] [-j] [--key <value> | --user <value>]
|
|
173
|
+
|
|
174
|
+
ARGUMENTS
|
|
175
|
+
ROLE_NAME The name of the role to assign
|
|
176
|
+
|
|
177
|
+
FLAGS
|
|
178
|
+
-j, --json Output result as JSON
|
|
179
|
+
-t, --tenant=<value> (required) The tenant (organization slug) containing the role
|
|
180
|
+
--key=<value> The API key ID to assign the role to
|
|
181
|
+
--profile=<value> Specify the configuration profile to use
|
|
182
|
+
--user=<value> The user ID to assign the role to
|
|
183
|
+
|
|
184
|
+
DESCRIPTION
|
|
185
|
+
Assign an IAM role to a user or API key. Exactly one of --user or --key must be specified
|
|
186
|
+
|
|
187
|
+
EXAMPLES
|
|
188
|
+
$ flowcore iam assign role data-reader --user "auth0|abc123" -t my-org
|
|
189
|
+
|
|
190
|
+
$ flowcore iam assign role data-reader --key "550e8400-e29b-41d4-a716-446655440000" -t my-org
|
|
191
|
+
|
|
192
|
+
$ flowcore iam assign role data-reader --user "auth0|abc123" -t my-org -j
|
|
193
|
+
```
|
|
194
|
+
|
|
195
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/assign/role.ts)_
|
|
118
196
|
|
|
119
197
|
## `flowcore auth delete key API_KEY_NAME`
|
|
120
198
|
|
|
@@ -431,6 +509,68 @@ EXAMPLES
|
|
|
431
509
|
|
|
432
510
|
_See code: [@flowcore/cli-plugin-config](https://github.com/flowcore/flowcore-cli-plugin-config/blob/v2.5.0/src/commands/config/show.ts)_
|
|
433
511
|
|
|
512
|
+
## `flowcore create policy NAME`
|
|
513
|
+
|
|
514
|
+
Create a new IAM policy with the specified name, version, and policy documents defining resource access rules
|
|
515
|
+
|
|
516
|
+
```
|
|
517
|
+
USAGE
|
|
518
|
+
$ flowcore create policy NAME --documents <value> -t <value> --version <value> [--profile <value>] [--description
|
|
519
|
+
<value>] [-j]
|
|
520
|
+
|
|
521
|
+
ARGUMENTS
|
|
522
|
+
NAME The name of the policy to create
|
|
523
|
+
|
|
524
|
+
FLAGS
|
|
525
|
+
-j, --json Output result as JSON
|
|
526
|
+
-t, --tenant=<value> (required) The tenant (organization slug) to create the policy in
|
|
527
|
+
--description=<value> A description of the policy
|
|
528
|
+
--documents=<value> (required) JSON array of policy documents, each with "resource" and "action" fields. Use
|
|
529
|
+
"-" to read from stdin
|
|
530
|
+
--profile=<value> Specify the configuration profile to use
|
|
531
|
+
--version=<value> (required) The version of the policy (e.g. 2024-01-01)
|
|
532
|
+
|
|
533
|
+
DESCRIPTION
|
|
534
|
+
Create a new IAM policy with the specified name, version, and policy documents defining resource access rules
|
|
535
|
+
|
|
536
|
+
EXAMPLES
|
|
537
|
+
$ flowcore iam create policy read-access -t my-org --version "2024-01-01" --documents '[{"resource":"frn::my-org:data-core/*","action":["read","fetch"]}]'
|
|
538
|
+
|
|
539
|
+
$ cat docs.json | flowcore iam create policy read-access -t my-org --version "2024-01-01" --documents -
|
|
540
|
+
|
|
541
|
+
$ flowcore iam create policy admin-access -t my-org --version "2024-01-01" --description "Full admin access" --documents '[{"resource":"frn::my-org:*","action":"*"}]' -j
|
|
542
|
+
```
|
|
543
|
+
|
|
544
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/create/policy.ts)_
|
|
545
|
+
|
|
546
|
+
## `flowcore create role NAME`
|
|
547
|
+
|
|
548
|
+
Create a new IAM role with the specified name and optional description
|
|
549
|
+
|
|
550
|
+
```
|
|
551
|
+
USAGE
|
|
552
|
+
$ flowcore create role NAME -t <value> [--profile <value>] [--description <value>] [-j]
|
|
553
|
+
|
|
554
|
+
ARGUMENTS
|
|
555
|
+
NAME The name of the role to create
|
|
556
|
+
|
|
557
|
+
FLAGS
|
|
558
|
+
-j, --json Output result as JSON
|
|
559
|
+
-t, --tenant=<value> (required) The tenant (organization slug) to create the role in
|
|
560
|
+
--description=<value> A description of the role
|
|
561
|
+
--profile=<value> Specify the configuration profile to use
|
|
562
|
+
|
|
563
|
+
DESCRIPTION
|
|
564
|
+
Create a new IAM role with the specified name and optional description
|
|
565
|
+
|
|
566
|
+
EXAMPLES
|
|
567
|
+
$ flowcore iam create role data-reader -t my-org --description "Read-only data access"
|
|
568
|
+
|
|
569
|
+
$ flowcore iam create role admin -t my-org -j
|
|
570
|
+
```
|
|
571
|
+
|
|
572
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/create/role.ts)_
|
|
573
|
+
|
|
434
574
|
## `flowcore data-core apply`
|
|
435
575
|
|
|
436
576
|
Apply a manifest configuration for a Data Core to the Flowcore Platform
|
|
@@ -567,7 +707,7 @@ EXAMPLES
|
|
|
567
707
|
cat ./path/to/manifest.yml | flowcore delete -f -
|
|
568
708
|
```
|
|
569
709
|
|
|
570
|
-
_See code: [src/commands/delete.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.
|
|
710
|
+
_See code: [src/commands/delete.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/delete.ts)_
|
|
571
711
|
|
|
572
712
|
## `flowcore delete policy NAME`
|
|
573
713
|
|
|
@@ -590,7 +730,7 @@ DESCRIPTION
|
|
|
590
730
|
Delete a policy
|
|
591
731
|
```
|
|
592
732
|
|
|
593
|
-
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.
|
|
733
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/delete/policy.ts)_
|
|
594
734
|
|
|
595
735
|
## `flowcore delete role NAME`
|
|
596
736
|
|
|
@@ -613,7 +753,7 @@ DESCRIPTION
|
|
|
613
753
|
Delete a role
|
|
614
754
|
```
|
|
615
755
|
|
|
616
|
-
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.
|
|
756
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/delete/role.ts)_
|
|
617
757
|
|
|
618
758
|
## `flowcore diff`
|
|
619
759
|
|
|
@@ -634,7 +774,7 @@ EXAMPLES
|
|
|
634
774
|
$ flowcore diff -f ./path/to/manifest.yml
|
|
635
775
|
```
|
|
636
776
|
|
|
637
|
-
_See code: [src/commands/diff.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.
|
|
777
|
+
_See code: [src/commands/diff.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/diff.ts)_
|
|
638
778
|
|
|
639
779
|
## `flowcore edit policy NAME`
|
|
640
780
|
|
|
@@ -660,7 +800,7 @@ EXAMPLES
|
|
|
660
800
|
$ FC_EDITOR=code flowcore iam edit policy my-policy -t my-tenant
|
|
661
801
|
```
|
|
662
802
|
|
|
663
|
-
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.
|
|
803
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/edit/policy.ts)_
|
|
664
804
|
|
|
665
805
|
## `flowcore edit role NAME`
|
|
666
806
|
|
|
@@ -686,7 +826,7 @@ EXAMPLES
|
|
|
686
826
|
$ FC_EDITOR=code flowcore iam edit role my-role -t my-tenant
|
|
687
827
|
```
|
|
688
828
|
|
|
689
|
-
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.
|
|
829
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/edit/role.ts)_
|
|
690
830
|
|
|
691
831
|
## `flowcore generate nextjs-entity NAME`
|
|
692
832
|
|
|
@@ -738,6 +878,64 @@ EXAMPLES
|
|
|
738
878
|
|
|
739
879
|
_See code: [@flowcore/cli-plugin-scenario](https://github.com/flowcore/flowcore-cli-plugin-scenario/blob/v4.6.7/src/commands/get/adapter.ts)_
|
|
740
880
|
|
|
881
|
+
## `flowcore get key-policies KEY_ID`
|
|
882
|
+
|
|
883
|
+
List all IAM policies assigned to a specific API key
|
|
884
|
+
|
|
885
|
+
```
|
|
886
|
+
USAGE
|
|
887
|
+
$ flowcore get key-policies KEY_ID [--profile <value>] [-j] [-w]
|
|
888
|
+
|
|
889
|
+
ARGUMENTS
|
|
890
|
+
KEY_ID The API key ID to get policies for
|
|
891
|
+
|
|
892
|
+
FLAGS
|
|
893
|
+
-j, --json Output result as JSON
|
|
894
|
+
-w, --wide Show additional columns in table output
|
|
895
|
+
--profile=<value> Specify the configuration profile to use
|
|
896
|
+
|
|
897
|
+
DESCRIPTION
|
|
898
|
+
List all IAM policies assigned to a specific API key
|
|
899
|
+
|
|
900
|
+
EXAMPLES
|
|
901
|
+
$ flowcore iam get key-policies "550e8400-e29b-41d4-a716-446655440000"
|
|
902
|
+
|
|
903
|
+
$ flowcore iam get key-policies "550e8400-e29b-41d4-a716-446655440000" -j
|
|
904
|
+
|
|
905
|
+
$ flowcore iam get key-policies "550e8400-e29b-41d4-a716-446655440000" -w
|
|
906
|
+
```
|
|
907
|
+
|
|
908
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/key-policies.ts)_
|
|
909
|
+
|
|
910
|
+
## `flowcore get key-roles KEY_ID`
|
|
911
|
+
|
|
912
|
+
List all IAM roles assigned to a specific API key
|
|
913
|
+
|
|
914
|
+
```
|
|
915
|
+
USAGE
|
|
916
|
+
$ flowcore get key-roles KEY_ID [--profile <value>] [-j] [-w]
|
|
917
|
+
|
|
918
|
+
ARGUMENTS
|
|
919
|
+
KEY_ID The API key ID to get roles for
|
|
920
|
+
|
|
921
|
+
FLAGS
|
|
922
|
+
-j, --json Output result as JSON
|
|
923
|
+
-w, --wide Show additional columns in table output
|
|
924
|
+
--profile=<value> Specify the configuration profile to use
|
|
925
|
+
|
|
926
|
+
DESCRIPTION
|
|
927
|
+
List all IAM roles assigned to a specific API key
|
|
928
|
+
|
|
929
|
+
EXAMPLES
|
|
930
|
+
$ flowcore iam get key-roles "550e8400-e29b-41d4-a716-446655440000"
|
|
931
|
+
|
|
932
|
+
$ flowcore iam get key-roles "550e8400-e29b-41d4-a716-446655440000" -j
|
|
933
|
+
|
|
934
|
+
$ flowcore iam get key-roles "550e8400-e29b-41d4-a716-446655440000" -w
|
|
935
|
+
```
|
|
936
|
+
|
|
937
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/key-roles.ts)_
|
|
938
|
+
|
|
741
939
|
## `flowcore get policy [NAME]`
|
|
742
940
|
|
|
743
941
|
Get a policy
|
|
@@ -759,7 +957,7 @@ DESCRIPTION
|
|
|
759
957
|
Get a policy
|
|
760
958
|
```
|
|
761
959
|
|
|
762
|
-
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.
|
|
960
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/policy.ts)_
|
|
763
961
|
|
|
764
962
|
## `flowcore get role [NAME]`
|
|
765
963
|
|
|
@@ -782,7 +980,7 @@ DESCRIPTION
|
|
|
782
980
|
Get a role
|
|
783
981
|
```
|
|
784
982
|
|
|
785
|
-
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.
|
|
983
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/role.ts)_
|
|
786
984
|
|
|
787
985
|
## `flowcore get scenario [SCENARIO]`
|
|
788
986
|
|
|
@@ -840,6 +1038,66 @@ EXAMPLES
|
|
|
840
1038
|
|
|
841
1039
|
_See code: [@flowcore/cli-plugin-tenant-management](https://github.com/flowcore-io/tenant-management/blob/v1.1.1/src/commands/get/tenant.ts)_
|
|
842
1040
|
|
|
1041
|
+
## `flowcore get user-policies USER_ID`
|
|
1042
|
+
|
|
1043
|
+
List all IAM policies assigned to a specific user, optionally scoped to a tenant
|
|
1044
|
+
|
|
1045
|
+
```
|
|
1046
|
+
USAGE
|
|
1047
|
+
$ flowcore get user-policies USER_ID [--profile <value>] [-j] [-t <value>] [-w]
|
|
1048
|
+
|
|
1049
|
+
ARGUMENTS
|
|
1050
|
+
USER_ID The user ID to get policies for (e.g. auth0|abc123)
|
|
1051
|
+
|
|
1052
|
+
FLAGS
|
|
1053
|
+
-j, --json Output result as JSON
|
|
1054
|
+
-t, --tenant=<value> Scope results to a specific tenant (organization slug)
|
|
1055
|
+
-w, --wide Show additional columns in table output
|
|
1056
|
+
--profile=<value> Specify the configuration profile to use
|
|
1057
|
+
|
|
1058
|
+
DESCRIPTION
|
|
1059
|
+
List all IAM policies assigned to a specific user, optionally scoped to a tenant
|
|
1060
|
+
|
|
1061
|
+
EXAMPLES
|
|
1062
|
+
$ flowcore iam get user-policies "auth0|abc123" -t my-org
|
|
1063
|
+
|
|
1064
|
+
$ flowcore iam get user-policies "auth0|abc123" -j
|
|
1065
|
+
|
|
1066
|
+
$ flowcore iam get user-policies "auth0|abc123" -t my-org -w
|
|
1067
|
+
```
|
|
1068
|
+
|
|
1069
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/user-policies.ts)_
|
|
1070
|
+
|
|
1071
|
+
## `flowcore get user-roles USER_ID`
|
|
1072
|
+
|
|
1073
|
+
List all IAM roles assigned to a specific user, optionally scoped to a tenant
|
|
1074
|
+
|
|
1075
|
+
```
|
|
1076
|
+
USAGE
|
|
1077
|
+
$ flowcore get user-roles USER_ID [--profile <value>] [-j] [-t <value>] [-w]
|
|
1078
|
+
|
|
1079
|
+
ARGUMENTS
|
|
1080
|
+
USER_ID The user ID to get roles for (e.g. auth0|abc123)
|
|
1081
|
+
|
|
1082
|
+
FLAGS
|
|
1083
|
+
-j, --json Output result as JSON
|
|
1084
|
+
-t, --tenant=<value> Scope results to a specific tenant (organization slug)
|
|
1085
|
+
-w, --wide Show additional columns in table output
|
|
1086
|
+
--profile=<value> Specify the configuration profile to use
|
|
1087
|
+
|
|
1088
|
+
DESCRIPTION
|
|
1089
|
+
List all IAM roles assigned to a specific user, optionally scoped to a tenant
|
|
1090
|
+
|
|
1091
|
+
EXAMPLES
|
|
1092
|
+
$ flowcore iam get user-roles "auth0|abc123" -t my-org
|
|
1093
|
+
|
|
1094
|
+
$ flowcore iam get user-roles "auth0|abc123" -j
|
|
1095
|
+
|
|
1096
|
+
$ flowcore iam get user-roles "auth0|abc123" -t my-org -w
|
|
1097
|
+
```
|
|
1098
|
+
|
|
1099
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/get/user-roles.ts)_
|
|
1100
|
+
|
|
843
1101
|
## `flowcore help [COMMAND]`
|
|
844
1102
|
|
|
845
1103
|
Display help for flowcore.
|
|
@@ -878,7 +1136,7 @@ EXAMPLES
|
|
|
878
1136
|
$ flowcore info
|
|
879
1137
|
```
|
|
880
1138
|
|
|
881
|
-
_See code: [src/commands/info.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.
|
|
1139
|
+
_See code: [src/commands/info.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/info.ts)_
|
|
882
1140
|
|
|
883
1141
|
## `flowcore login`
|
|
884
1142
|
|
|
@@ -1613,6 +1871,75 @@ EXAMPLES
|
|
|
1613
1871
|
|
|
1614
1872
|
_See code: [@flowcore/cli-plugin-core](https://github.com/flowcore/flowcore-cli-plugin-core/blob/v5.7.3/src/commands/stream/http.ts)_
|
|
1615
1873
|
|
|
1874
|
+
## `flowcore unassign policy POLICY_NAME`
|
|
1875
|
+
|
|
1876
|
+
Remove an IAM policy assignment from a user, API key, or role. Exactly one of --user, --key, or --role must be specified
|
|
1877
|
+
|
|
1878
|
+
```
|
|
1879
|
+
USAGE
|
|
1880
|
+
$ flowcore unassign policy POLICY_NAME -t <value> [--profile <value>] [-j] [--key <value> | --user <value> | --role
|
|
1881
|
+
<value>] [-y]
|
|
1882
|
+
|
|
1883
|
+
ARGUMENTS
|
|
1884
|
+
POLICY_NAME The name of the policy to unassign
|
|
1885
|
+
|
|
1886
|
+
FLAGS
|
|
1887
|
+
-j, --json Output result as JSON
|
|
1888
|
+
-t, --tenant=<value> (required) The tenant (organization slug) containing the policy
|
|
1889
|
+
-y, --yes Skip confirmation prompt
|
|
1890
|
+
--key=<value> The API key ID to unassign the policy from
|
|
1891
|
+
--profile=<value> Specify the configuration profile to use
|
|
1892
|
+
--role=<value> The role name to unassign the policy from
|
|
1893
|
+
--user=<value> The user ID to unassign the policy from
|
|
1894
|
+
|
|
1895
|
+
DESCRIPTION
|
|
1896
|
+
Remove an IAM policy assignment from a user, API key, or role. Exactly one of --user, --key, or --role must be
|
|
1897
|
+
specified
|
|
1898
|
+
|
|
1899
|
+
EXAMPLES
|
|
1900
|
+
$ flowcore iam unassign policy read-access --user "auth0|abc123" -t my-org -y
|
|
1901
|
+
|
|
1902
|
+
$ flowcore iam unassign policy read-access --key "550e8400-e29b-41d4-a716-446655440000" -t my-org -y
|
|
1903
|
+
|
|
1904
|
+
$ flowcore iam unassign policy read-access --role data-reader -t my-org -y
|
|
1905
|
+
|
|
1906
|
+
$ flowcore iam unassign policy read-access --user "auth0|abc123" -t my-org -j -y
|
|
1907
|
+
```
|
|
1908
|
+
|
|
1909
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/unassign/policy.ts)_
|
|
1910
|
+
|
|
1911
|
+
## `flowcore unassign role ROLE_NAME`
|
|
1912
|
+
|
|
1913
|
+
Remove an IAM role assignment from a user or API key. Exactly one of --user or --key must be specified
|
|
1914
|
+
|
|
1915
|
+
```
|
|
1916
|
+
USAGE
|
|
1917
|
+
$ flowcore unassign role ROLE_NAME -t <value> [--profile <value>] [-j] [--key <value> | --user <value>] [-y]
|
|
1918
|
+
|
|
1919
|
+
ARGUMENTS
|
|
1920
|
+
ROLE_NAME The name of the role to unassign
|
|
1921
|
+
|
|
1922
|
+
FLAGS
|
|
1923
|
+
-j, --json Output result as JSON
|
|
1924
|
+
-t, --tenant=<value> (required) The tenant (organization slug) containing the role
|
|
1925
|
+
-y, --yes Skip confirmation prompt
|
|
1926
|
+
--key=<value> The API key ID to unassign the role from
|
|
1927
|
+
--profile=<value> Specify the configuration profile to use
|
|
1928
|
+
--user=<value> The user ID to unassign the role from
|
|
1929
|
+
|
|
1930
|
+
DESCRIPTION
|
|
1931
|
+
Remove an IAM role assignment from a user or API key. Exactly one of --user or --key must be specified
|
|
1932
|
+
|
|
1933
|
+
EXAMPLES
|
|
1934
|
+
$ flowcore iam unassign role data-reader --user "auth0|abc123" -t my-org -y
|
|
1935
|
+
|
|
1936
|
+
$ flowcore iam unassign role data-reader --key "550e8400-e29b-41d4-a716-446655440000" -t my-org -y
|
|
1937
|
+
|
|
1938
|
+
$ flowcore iam unassign role data-reader --user "auth0|abc123" -t my-org -j -y
|
|
1939
|
+
```
|
|
1940
|
+
|
|
1941
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/unassign/role.ts)_
|
|
1942
|
+
|
|
1616
1943
|
## `flowcore update`
|
|
1617
1944
|
|
|
1618
1945
|
Update the Flowcore CLI to the latest version
|
|
@@ -1628,7 +1955,69 @@ EXAMPLES
|
|
|
1628
1955
|
$ flowcore update
|
|
1629
1956
|
```
|
|
1630
1957
|
|
|
1631
|
-
_See code: [src/commands/update.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.
|
|
1958
|
+
_See code: [src/commands/update.ts](https://github.com/flowcore-io/flowcore-cli/blob/v4.18.6/src/commands/update.ts)_
|
|
1959
|
+
|
|
1960
|
+
## `flowcore validate key KEY_ID`
|
|
1961
|
+
|
|
1962
|
+
Validate whether an API key has permission to perform an action on one or more resources
|
|
1963
|
+
|
|
1964
|
+
```
|
|
1965
|
+
USAGE
|
|
1966
|
+
$ flowcore validate key KEY_ID --action <value> --resource <value> -t <value> [--profile <value>] [-j]
|
|
1967
|
+
|
|
1968
|
+
ARGUMENTS
|
|
1969
|
+
KEY_ID The API key ID to validate access for
|
|
1970
|
+
|
|
1971
|
+
FLAGS
|
|
1972
|
+
-j, --json Output result as JSON
|
|
1973
|
+
-t, --tenant=<value> (required) The tenant (organization slug) to validate within
|
|
1974
|
+
--action=<value> (required) The action to validate (e.g. read, write, ingest, fetch)
|
|
1975
|
+
--profile=<value> Specify the configuration profile to use
|
|
1976
|
+
--resource=<value>... (required) The resource FRN to validate against (can be specified multiple times)
|
|
1977
|
+
|
|
1978
|
+
DESCRIPTION
|
|
1979
|
+
Validate whether an API key has permission to perform an action on one or more resources
|
|
1980
|
+
|
|
1981
|
+
EXAMPLES
|
|
1982
|
+
$ flowcore iam validate key "550e8400-e29b-41d4-a716-446655440000" -t my-org --action ingest --resource "frn::my-org:event-type/*"
|
|
1983
|
+
|
|
1984
|
+
$ flowcore iam validate key "550e8400-e29b-41d4-a716-446655440000" -t my-org --action read --resource "frn::my-org:data-core/my-core" -j
|
|
1985
|
+
|
|
1986
|
+
$ flowcore iam validate key "550e8400-e29b-41d4-a716-446655440000" -t my-org --action read --resource "frn::my-org:data-core/core1" --resource "frn::my-org:data-core/core2"
|
|
1987
|
+
```
|
|
1988
|
+
|
|
1989
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/validate/key.ts)_
|
|
1990
|
+
|
|
1991
|
+
## `flowcore validate user USER_ID`
|
|
1992
|
+
|
|
1993
|
+
Validate whether a user has permission to perform an action on one or more resources
|
|
1994
|
+
|
|
1995
|
+
```
|
|
1996
|
+
USAGE
|
|
1997
|
+
$ flowcore validate user USER_ID --action <value> --resource <value> -t <value> [--profile <value>] [-j]
|
|
1998
|
+
|
|
1999
|
+
ARGUMENTS
|
|
2000
|
+
USER_ID The user ID to validate access for (e.g. auth0|abc123)
|
|
2001
|
+
|
|
2002
|
+
FLAGS
|
|
2003
|
+
-j, --json Output result as JSON
|
|
2004
|
+
-t, --tenant=<value> (required) The tenant (organization slug) to validate within
|
|
2005
|
+
--action=<value> (required) The action to validate (e.g. read, write, ingest, fetch)
|
|
2006
|
+
--profile=<value> Specify the configuration profile to use
|
|
2007
|
+
--resource=<value>... (required) The resource FRN to validate against (can be specified multiple times)
|
|
2008
|
+
|
|
2009
|
+
DESCRIPTION
|
|
2010
|
+
Validate whether a user has permission to perform an action on one or more resources
|
|
2011
|
+
|
|
2012
|
+
EXAMPLES
|
|
2013
|
+
$ flowcore iam validate user "auth0|abc123" -t my-org --action read --resource "frn::my-org:data-core/my-core"
|
|
2014
|
+
|
|
2015
|
+
$ flowcore iam validate user "auth0|abc123" -t my-org --action write --resource "frn::my-org:data-core/*" -j
|
|
2016
|
+
|
|
2017
|
+
$ flowcore iam validate user "auth0|abc123" -t my-org --action read --resource "frn::my-org:data-core/core1" --resource "frn::my-org:data-core/core2"
|
|
2018
|
+
```
|
|
2019
|
+
|
|
2020
|
+
_See code: [@flowcore/cli-plugin-iam](https://github.com/flowcore-io/cli-plugin-iam/blob/v1.8.0/src/commands/validate/user.ts)_
|
|
1632
2021
|
|
|
1633
2022
|
## `flowcore version`
|
|
1634
2023
|
|
package/oclif.manifest.json
CHANGED
package/package.json
CHANGED
|
@@ -12,7 +12,7 @@
|
|
|
12
12
|
"@flowcore/cli-plugin-core": "^5.7.3",
|
|
13
13
|
"@flowcore/cli-plugin-data-core": "^3.4.0",
|
|
14
14
|
"@flowcore/cli-plugin-generator": "^1.6.0",
|
|
15
|
-
"@flowcore/cli-plugin-iam": "^1.
|
|
15
|
+
"@flowcore/cli-plugin-iam": "^1.8.0",
|
|
16
16
|
"@flowcore/cli-plugin-scenario": "^4.6.7",
|
|
17
17
|
"@flowcore/cli-plugin-tenant-management": "^1.1.1",
|
|
18
18
|
"@flowcore/sdk": "^1.50.0",
|
|
@@ -119,7 +119,7 @@
|
|
|
119
119
|
"prestart": "npm run build",
|
|
120
120
|
"update-schema": "rover graph introspect https://graph.api.staging.flowcore.io/graphql -o schema.gql"
|
|
121
121
|
},
|
|
122
|
-
"version": "4.18.
|
|
122
|
+
"version": "4.18.6",
|
|
123
123
|
"bugs": "https://github.com/flowcore-io/flowcore-cli/issues",
|
|
124
124
|
"keywords": [
|
|
125
125
|
"flowcore",
|