A command-line client for managing SpiceDB.
zed features include:
- Context switching that stores credentials securely in your OS keychain
- Check, Expand, Lookup Resources, Lookup Subjects commands for Permissions
- Create, Read, Touch, Delete, Bulk-Delete commands for Relationships
- Read, Write, Validate, Import, Copy commands for Schemas
- Experimental Backup and Restore commands
Have questions? Ask in our Discord.
Looking to contribute? See CONTRIBUTING.md.
You can find issues by priority: Urgent, High, Medium, Low, Maybe. There are also good first issues.
Binary releases are available for Linux, macOS, and Windows on AMD64 and ARM64 architectures.
Homebrew users for both macOS and Linux can install the latest binary releases of zed using the official tap:
brew install authzed/tap/zed
Debian-based Linux users can install zed packages by adding a new APT source:
sudo apt update && sudo apt install -y curl ca-certificates gpg
curl https://apt.fury.io/authzed/gpg.key | sudo apt-key add -
sudo sh -c 'echo "deb https://apt.fury.io/authzed/ * *" > /etc/apt/sources.list.d/fury.list'
sudo apt update && sudo apt install -y zed
RPM-based Linux users can install zed packages by adding a new YUM repository:
sudo cat << EOF >> /etc/yum.repos.d/Authzed-Fury.repo
[authzed-fury]
name=AuthZed Fury Repository
baseurl=https://yum.fury.io/authzed/
enabled=1
gpgcheck=0
EOF
sudo dnf install -y zed
Contexts store connection credentials for accessing SpiceDB clusters securely in the OS keychain. Before performing most commands, a context must be set. Alternatively, you can provide context values via environment variables which will override the existing context for that execution.
The zed context
subcommand has operations for setting the current, creating, listing, deleting contexts:
zed context set prod grpc.authzed.com:443 tc_zed_my_laptop_deadbeefdeadbeefdeadbeefdeadbeef
zed context set dev localhost:80 testpresharedkey
zed context list
If you provide all context values (e.g. ZED_ENDPOINT
, ZED_TOKEN
) as environment variables or flags (e.g. --endpoint
, --token
), you do not need to set a context.
You can also provide the ZED_KEYRING_PASSWORD
environment variable to access an existing context in a non-interactive way.
zed schema read --endpoint grpc.authzed.com:443 --token tc_zed_my_laptop_deadbeefdeadbeef
ZED_ENDPOINT=grpc.authzed.com:443 ZED_TOKEN=tc_zed_my_laptop_deadbeefdeadbeef zed schema read
ZED_KEYRING_PASSWORD=redacted zed schema read
The --explain
flag can be used on permission check
to see a trace:
zed permission check document:firstdoc writer user:emilia --explain
zed is a community project fueled by contributions from both organizations and individuals. We appreciate all contributions, large and small, and would like to thank all those involved.
In addition, we'd like to highlight a few notable contributions:
- The GitHub Authorization Team for implementing the bulk-delete command