Skip to content

cduongt/keyrod

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

57 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Keyrod

Keyrod

CLI for authorizing OIDC credentials against EGI Federated Cloud OpenNebula sites.

Keyrod allows to authorize either with access token or refresh token coupled with client id and client secret. After successful authentication, user receives OpenNebula login token.

Requirements

  • Ruby 2.2.6+
  • Rubygems

Installation

From Rubygems

gem install keyrod

From source

git clone https://github.com/cduongt/keyrod.git
cd keyrod
gem install bundler
bundle install

Configuration

Location

Configuration file can be saved in these paths:

  • ~/.keyrod/keyrod.yml
  • /etc/keyrod/keyrod.yml
  • PATH_TO_GEM/keyrod/keyrod.yml - this is default location

Usage

$ keyrod help token

Usage:
  keyrod token -p, --identity-provider=IDENTITY-PROVIDER -s, --site=SITE

Options:
      [--debug], [--no-debug]                                # Runs Keyrod in debug mode
      [--ca-dir=CA-DIR]                                      # CA directory
      [--verify-ssl], [--no-verify-ssl]                      # Check SSL certificate of FedCloud site
                                                             # Default: true
  -s, --site=SITE                                            # EGI FedCloud Site
                                                             # Default: http://localhost/
  -a, [--access-token=ACCESS-TOKEN]                          # Access token for authentication
  -g, [--group=GROUP]                                        # Group to join
  -f, [--interactive-fallback], [--no-interactive-fallback]  # Fallback to interactive mode if group is not set
  -p, --identity-provider=IDENTITY-PROVIDER                  # Identity provider for token
  -r, [--refresh-token=REFRESH-TOKEN]                        # Refresh token for creating access token
  -o, [--oidc-site=OIDC-SITE]                                # OIDC site for authenticating refresh token
                                                             # Default: http://localhost/token
  -i, [--client-id=CLIENT-ID]                                # OIDC client ID
  -t, [--client-secret=CLIENT-SECRET]                        # OIDC client secret

About

CLI application for OIDC authentication

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages