A command-line client for managing SpiceDB.
zed features include:
Have questions? Ask in our Discord.
Looking to contribute? See CONTRIBUTING.md.
You can find issues by priority: Urgent, High, Medium, Low, Maybe. There are also good first issues.
Binary releases are available for Linux, macOS, and Windows on AMD64 and ARM64 architectures.
Homebrew users for both macOS and Linux can install the latest binary releases of zed using the official tap:
brew install authzed/tap/zed
Debian-based Linux users can install zed packages by adding a new APT source:
sudo apt update && sudo apt install -y curl ca-certificates gpg
curl https://apt.fury.io/authzed/gpg.key | sudo apt-key add -
sudo sh -c 'echo "deb https://apt.fury.io/authzed/ * *" > /etc/apt/sources.list.d/fury.list'
sudo apt update && sudo apt install -y zed
RPM-based Linux users can install zed packages by adding a new YUM repository:
sudo cat << EOF >> /etc/yum.repos.d/Authzed-Fury.repo
[authzed-fury]
name=AuthZed Fury Repository
baseurl=https://yum.fury.io/authzed/
enabled=1
gpgcheck=0
EOF
sudo dnf install -y zed
Contexts store connection credentials for accessing SpiceDB clusters securely in the OS keychain. Before performing most commands, a context must be set.
The zed context
subcommand has operations for setting the current, creating, listing, deleting contexts:
zed context set prod grpc.authzed.com:443 tc_zed_my_laptop_deadbeefdeadbeefdeadbeefdeadbeef
zed context set dev localhost:80 testpresharedkey --insecure
zed context list
You can also provide context values via environment variables or CLI flags. If values are provided this way, they override the context values in a piecemeal fashion:
zed context set prod grpc.authzed.com:443 tc_zed_my_laptop_deadbeefdeadbeefdeadbeefdeadbeef
# This will use the token and TLS values set above, but swap out the endpoint for the one provided.
zed permission check --endpoint my.authzed.domain:443 document:firstdoc writer user:emilia
If you provide all context values (e.g. ZED_ENDPOINT
, ZED_TOKEN
) as environment variables or flags (e.g. --endpoint
, --token
), you do not need to set a context.
You can also provide the ZED_KEYRING_PASSWORD
environment variable to access an existing context in a non-interactive way.
zed schema read --endpoint grpc.authzed.com:443 --token tc_zed_my_laptop_deadbeefdeadbeef
ZED_ENDPOINT=grpc.authzed.com:443 ZED_TOKEN=tc_zed_my_laptop_deadbeefdeadbeef zed schema read
ZED_KEYRING_PASSWORD=redacted zed schema read
The --explain
flag can be used on permission check
to see a trace:
zed permission check document:firstdoc writer user:emilia --explain
zed is a community project fueled by contributions from both organizations and individuals. We appreciate all contributions, large and small, and would like to thank all those involved.
In addition, we'd like to highlight a few notable contributions: