@geolonia/geonicdb-cli
v0.6.4
Published
A CLI client for the GeonicDB
Readme
@geolonia/geonicdb-cli
CLI tool for GeonicDB — a FIWARE Orion compatible Context Broker.
Supports the NGSI-LD API.
Install
npm install -g @geolonia/geonicdb-cliOr run directly with npx:
npx @geolonia/geonicdb-cli <command>The CLI is available as geonic.
Quick Start
# Set the server URL
geonic config set url http://localhost:3000
# Create an entity
geonic entities create '{"id":"Room1","type":"Room","temperature":{"value":23,"type":"Number"}}'
# List entities
geonic entities list
# Get an entity by ID
geonic entities get Room1
# Update attributes
geonic entities update Room1 '{"temperature":{"value":25,"type":"Number"}}'
# Delete an entity
geonic entities delete Room1Getting Help
The CLI provides built-in help in wp-cli style. Use geonic help to explore available commands:
# Show all available commands
geonic help
# Get help on a specific command
geonic help entities
# Get help on a subcommand
geonic help entities list
# Works with nested commands too
geonic help admin tenantsYou can also use --help on any command:
geonic entities --help
geonic entities list --helpGlobal Options
| Option | Description |
|---|---|
| -u, --url <url> | Base URL of the GeonicDB server |
| -s, --service <name> | NGSILD-Tenant header |
| --token <token> | Authentication token |
| -p, --profile <name> | Use a named profile |
| --api-key <key> | API key for authentication |
| -f, --format <fmt> | Output format: json, table, geojson |
| --no-color | Disable color output |
| -v, --verbose | Verbose output |
| --dry-run | Print the equivalent curl command without executing |
Options are resolved in this order (first wins):
- Command-line flags
- Config file (
~/.config/geonic/config.json) - Defaults (
format=json)
Commands
help — Get help on commands
geonic help [<command>] [<subcommand>]config — Manage CLI configuration
| Subcommand | Description |
|---|---|
| config set <key> <value> | Save a config value |
| config get <key> | Get a config value |
| config list | List all config values |
| config delete <key> | Delete a config value |
profile — Manage connection profiles
| Subcommand | Description |
|---|---|
| profile list | List all profiles |
| profile use <name> | Switch active profile |
| profile create <name> | Create a new profile |
| profile delete <name> | Delete a profile |
| profile show [name] | Show profile settings |
auth — Authentication
| Subcommand | Description |
|---|---|
| auth login | Authenticate and save token |
| auth logout | Clear saved authentication token |
| auth nonce | Get a nonce and PoW challenge for API key authentication |
| auth token-exchange | Exchange API key for a session JWT via nonce + PoW |
Email/Password Login
auth login uses interactive prompts for email and password. A TTY is required — credentials are never accepted via environment variables or command-line arguments to prevent leaking secrets in shell history.
geonic auth login| Option | Description |
|---|---|
| --tenant-id <id> | Log in to a specific tenant |
Multi-tenant support: When you belong to multiple tenants, auth login displays the list and lets you select one interactively. Use --tenant-id to skip the prompt.
$ geonic auth login
Email: [email protected]
Password: ********
Login successful. Token saved to config.
Available tenants:
* 1) my_city (tenant_admin) ← current
2) another_city (user)
Select tenant number (Enter to keep current):OAuth Client Credentials
For machine-to-machine authentication (CI/CD, scripts), use the OAuth Client Credentials flow:
geonic auth login --client-credentials --client-id MY_ID --client-secret MY_SECRET| Option | Description |
|---|---|
| --client-credentials | Use OAuth 2.0 Client Credentials flow |
| --client-id <id> | OAuth client ID (or GDB_OAUTH_CLIENT_ID env var) |
| --client-secret <secret> | OAuth client secret (or GDB_OAUTH_CLIENT_SECRET env var) |
| --scope <scopes> | OAuth scopes (space-separated) |
API Key Token Exchange
auth token-exchange performs a complete API key to JWT exchange:
- Requests a nonce from the server (
POST /auth/nonce) - Solves the Proof-of-Work challenge (SHA-256)
- Exchanges the API key + solved PoW for a session JWT (
POST /oauth/token)
# Exchange API key for JWT and save to config
geonic auth token-exchange --api-key gdb_abcdef... --save
# Just display the token without saving
geonic auth token-exchange --api-key gdb_abcdef...me — Current user and self-service resources
geonic meDisplays the current authenticated user, token expiry, and active profile.
me oauth-clients
| Subcommand | Description |
|---|---|
| me oauth-clients list | List your OAuth clients |
| me oauth-clients create [json] | Create a new OAuth client |
| me oauth-clients delete <id> | Delete an OAuth client |
me api-keys
| Subcommand | Description |
|---|---|
| me api-keys list | List your API keys |
| me api-keys create [json] | Create a new API key |
| me api-keys delete <keyId> | Delete an API key |
me api-keys create supports flag options:
| Flag | Description |
|---|---|
| --name <name> | Key name |
| --scopes <scopes> | Allowed scopes (comma-separated) |
| --origins <origins> | Allowed origins (comma-separated, at least 1 required) |
| --entity-types <types> | Allowed entity types (comma-separated) |
| --rate-limit <n> | Rate limit (requests per minute) |
| --dpop-required | Require DPoP token binding (RFC 9449) |
| --save | Save the API key to profile config |
# Create an API key and save to config
geonic me api-keys create --name my-app --scopes read:entities --save
# Create from JSON
geonic me api-keys create '{"name":"my-app","allowedScopes":["read:entities"]}'me api-keys list output includes a dpopRequired field (boolean).
entities — Manage context entities
| Subcommand | Description |
|---|---|
| entities list | List entities |
| entities get <id> | Get an entity by ID |
| entities create [json] | Create a new entity |
| entities update <id> [json] | Update attributes (PATCH) |
| entities replace <id> [json] | Replace all attributes (PUT) |
| entities upsert [json] | Create or update entities |
| entities delete <id> | Delete an entity by ID |
entities list supports filtering options: --type, --id-pattern, --query, --attrs, --georel, --geometry, --coords, --spatial-id, --limit, --offset, --order-by, --count.
entities attrs — Manage entity attributes
| Subcommand | Description |
|---|---|
| entities attrs list <entityId> | List all attributes |
| entities attrs get <entityId> <attrName> | Get a specific attribute |
| entities attrs add <entityId> [json] | Add attributes |
| entities attrs update <entityId> <attrName> [json] | Update an attribute |
| entities attrs delete <entityId> <attrName> | Delete an attribute |
entityOperations (batch) — Batch operations
| Subcommand | Description |
|---|---|
| entityOperations create [json] | Batch create entities |
| entityOperations upsert [json] | Batch upsert entities |
| entityOperations update [json] | Batch update entities |
| entityOperations delete [json] | Batch delete entities |
| entityOperations query [json] | Batch query entities |
| entityOperations merge [json] | Batch merge entities |
batch is available as an alias for entityOperations.
subscriptions (sub) — Manage context subscriptions
| Subcommand | Description |
|---|---|
| sub list | List subscriptions |
| sub get <id> | Get a subscription by ID |
| sub create [json] | Create a subscription |
| sub update <id> [json] | Update a subscription |
| sub delete <id> | Delete a subscription |
registrations (reg) — Manage context registrations
| Subcommand | Description |
|---|---|
| reg list | List registrations |
| reg get <id> | Get a registration by ID |
| reg create [json] | Create a registration |
| reg update <id> [json] | Update a registration |
| reg delete <id> | Delete a registration |
types — Browse entity types
| Subcommand | Description |
|---|---|
| types list | List available entity types |
| types get <typeName> | Get details for a type |
temporal — Temporal entity operations
temporal entities
| Subcommand | Description |
|---|---|
| temporal entities list | List temporal entities |
| temporal entities get <id> | Get a temporal entity by ID |
| temporal entities create [json] | Create a temporal entity |
| temporal entities delete <id> | Delete a temporal entity |
Temporal entities list/get support: --time-rel, --time-at, --end-time-at, --last-n.
temporal entityOperations
| Subcommand | Description |
|---|---|
| temporal entityOperations query [json] | Query temporal entities (POST) |
Temporal entityOperations query supports: --aggr-methods, --aggr-period.
snapshots — Snapshot operations
| Subcommand | Description |
|---|---|
| snapshots list | List snapshots |
| snapshots get <id> | Get a snapshot by ID |
| snapshots create | Create a new snapshot |
| snapshots delete <id> | Delete a snapshot |
| snapshots clone <id> | Clone a snapshot |
rules — Rule engine management
| Subcommand | Description |
|---|---|
| rules list | List all rules |
| rules get <id> | Get a rule by ID |
| rules create [json] | Create a new rule |
| rules update <id> [json] | Update a rule |
| rules delete <id> | Delete a rule |
| rules activate <id> | Activate a rule |
| rules deactivate <id> | Deactivate a rule |
custom-data-models (models) — Custom data model management
| Subcommand | Description |
|---|---|
| custom-data-models list | List all models |
| custom-data-models get <id> | Get a model by ID |
| custom-data-models create [json] | Create a new model |
| custom-data-models update <id> [json] | Update a model |
| custom-data-models delete <id> | Delete a model |
models is available as an alias for custom-data-models.
catalog — DCAT-AP catalog
| Subcommand | Description |
|---|---|
| catalog get | Get the catalog |
| catalog datasets list | List all datasets |
| catalog datasets get <id> | Get a dataset by ID |
| catalog datasets sample <id> | Get sample data for a dataset |
admin — Administration
admin tenants
| Subcommand | Description |
|---|---|
| admin tenants list | List all tenants |
| admin tenants get <id> | Get a tenant by ID |
| admin tenants create [json] | Create a new tenant |
| admin tenants update <id> [json] | Update a tenant |
| admin tenants delete <id> | Delete a tenant |
| admin tenants activate <id> | Activate a tenant |
| admin tenants deactivate <id> | Deactivate a tenant |
admin users
| Subcommand | Description |
|---|---|
| admin users list | List all users |
| admin users get <id> | Get a user by ID |
| admin users create [json] | Create a new user |
| admin users update <id> [json] | Update a user |
| admin users delete <id> | Delete a user |
| admin users activate <id> | Activate a user |
| admin users deactivate <id> | Deactivate a user |
| admin users unlock <id> | Unlock a user |
admin policies
| Subcommand | Description |
|---|---|
| admin policies list | List all policies |
| admin policies get <id> | Get a policy by ID |
| admin policies create [json] | Create a new policy |
| admin policies update <id> [json] | Update a policy |
| admin policies delete <id> | Delete a policy |
| admin policies activate <id> | Activate a policy |
| admin policies deactivate <id> | Deactivate a policy |
admin oauth-clients
| Subcommand | Description |
|---|---|
| admin oauth-clients list | List all OAuth clients |
| admin oauth-clients get <id> | Get an OAuth client by ID |
| admin oauth-clients create [json] | Create a new OAuth client |
| admin oauth-clients update <id> [json] | Update an OAuth client |
| admin oauth-clients delete <id> | Delete an OAuth client |
admin api-keys
| Subcommand | Description |
|---|---|
| admin api-keys list | List all API keys |
| admin api-keys get <keyId> | Get an API key by ID |
| admin api-keys create [json] | Create a new API key |
| admin api-keys update <keyId> [json] | Update an API key |
| admin api-keys delete <keyId> | Delete an API key |
admin api-keys list supports --tenant-id to filter by tenant. admin api-keys create supports flag options: --name, --scopes, --origins, --entity-types, --rate-limit, --dpop-required, --tenant-id, --save. admin api-keys update supports --name, --scopes, --origins, --entity-types, --rate-limit, --dpop-required / --no-dpop-required.
Note: allowedOrigins must contain at least 1 item when specified. Use * to allow all origins. allowedEntityTypes is enforced at runtime — API key holders can only access entities of the specified types. admin api-keys list / admin api-keys get output includes a dpopRequired field (boolean).
admin cadde
| Subcommand | Description |
|---|---|
| admin cadde get | Get CADDE configuration |
| admin cadde set [json] | Set CADDE configuration |
| admin cadde delete | Delete CADDE configuration |
health — Check server health
geonic healthversion — Display version info
geonic versionInput Formats
Commands that accept JSON data support multiple input methods. The [json] argument is optional — when omitted, the CLI auto-detects piped stdin or launches interactive mode.
Inline JSON / JSON5
# Standard JSON
geonic entities create '{"id":"Room1","type":"Room"}'
# JSON5 — unquoted keys, single quotes, trailing commas, comments
geonic entities create "{id: 'Room1', type: 'Room',}"JSON5 syntax is supported everywhere JSON is accepted (inline, files, stdin, interactive).
File input (prefix with @)
geonic entities create @payload.jsonStdin (auto-detect)
When no argument is given and stdin is piped, the CLI reads from stdin automatically — no - required:
cat payload.json | geonic entities create
echo '{"id":"Room1","type":"Room"}' | geonic entities createThe explicit - marker is still supported for backward compatibility:
cat payload.json | geonic entities create -Interactive mode
When no argument is given and the terminal is a TTY (no pipe), the CLI enters interactive mode with a json> prompt. Type or paste JSON and the input auto-submits when braces/brackets are balanced:
$ geonic entities create
Enter JSON (auto-submits when braces close, Ctrl+C to cancel):
json> {
... "id": "Room1",
... "type": "Room"
... }
Entity created.Output Formats
Specify the output format with --format or geonic config set format <fmt>.
| Format | Description |
|---|---|
| json | Pretty-printed JSON (default) |
| table | ASCII table |
| geojson | GeoJSON FeatureCollection |
Use --key-values on entities list and entities get to request simplified key-value format from the API.
Dry Run
Use --dry-run on any command to print the equivalent curl command instead of executing the request. The output can be copied and run directly in a terminal.
$ geonic entities list --type Sensor --dry-run
curl \
-H 'Content-Type: application/ld+json' \
-H 'Accept: application/ld+json' \
-H 'Authorization: Bearer <token>' \
'http://localhost:3000/ngsi-ld/v1/entities?type=Sensor'Works with all operations including POST with body:
$ geonic entities create '{"id":"Room1","type":"Room"}' --dry-run
curl \
-X POST \
-H 'Content-Type: application/ld+json' \
-H 'Accept: application/ld+json' \
-d '{"id":"Room1","type":"Room"}' \
'http://localhost:3000/ngsi-ld/v1/entities'Configuration
The CLI stores configuration in ~/.config/geonic/config.json.
# Set the default server
geonic config set url http://localhost:3000
# Set default output format
geonic config set format table
# View all settings
geonic config listOverride the config directory with the GEONIC_CONFIG_DIR environment variable:
GEONIC_CONFIG_DIR=/path/to/config geonic entities listAPI Key Authentication
API keys provide an alternative to JWT tokens for authentication. When configured, requests include the X-Api-Key header.
# Set API key in config
geonic config set api-key gdb_your_api_key_here
# Or pass via CLI flag
geonic entities list --api-key gdb_your_api_key_here
# Or use environment variable
GDB_API_KEY=gdb_your_api_key_here geonic entities listWhen both a Bearer token and an API key are configured, both headers are sent (the server determines precedence).
Valid Scopes
read:entities, write:entities, read:subscriptions, write:subscriptions, read:registrations, write:registrations, read:rules, write:rules, read:custom-data-models, write:custom-data-models, admin:users, admin:tenants, admin:policies, admin:oauth-clients, admin:api-keys, admin:metrics
write:X implies read:X. admin:X implies both read:X and write:X.
Special scopes: permanent (no token expiry), jwt (JWT format token).
Entity Type Restrictions
API keys with allowedEntityTypes are restricted to the specified entity types at runtime. Attempting to access entities of other types results in a 403 error with a descriptive message.
Development
Requires Node.js >= 20.
# Install dependencies
npm install
# Build
npm run build
# Run tests
npm test
# Lint
npm run lint
# Type check
npm run typecheck
# Watch mode (rebuild on change)
npm run devLocal testing
Use npm link to register the geonic command globally as a symlink:
npm linkAfter linking, rebuild to reflect code changes:
npm run build
geonic helpTo unlink:
npm unlink -g @geolonia/geonicdb-cliLicense
MIT
