Cosmo Inspect
Cosmo Inspect allows you to inspect the properties of an actor or provider, also called their "claims." It accepts a URL or file path. Here are a couple examples of claims:
➜ cosmo inspect wasmcloud.azurecr.io/httpserver:0.17.0
HTTP Server - Provider Archive
Account ACOJJN6WUP4ODD75XEBKKTCCUJJCY5ZKQ56XVKYK4BEJWGVAOOQHZMCW
Service VAG3QITQQ2ODAOWB5TTQSDJ53XK3SHBEIFNK4AYJ5RKAX2UNSCAPHA5M
Capability Contract ID wasmcloud:httpserver
Vendor wasmCloud
Version 0.17.0
Revision 0
Supported Architecture Targets
x86_64-linux
armv7-linux
aarch64-macos
x86_64-windows
x86_64-macos
aarch64-linux
➜ cosmo inspect wasmcloud.azurecr.io/echo:0.3.7
Echo - Module
Account ACOJJN6WUP4ODD75XEBKKTCCUJJCY5ZKQ56XVKYK4BEJWGVAOOQHZMCW
Module MBCFOPM6JW2APJLXJD3Z5O4CN7CPYJ2B4FTKLJUR5YR5MITIU7HD3WD5
Expires never
Can Be Used immediately
Version 0.3.7 (4)
Call Alias (Not set)
Capabilities
HTTP Server
Logging
Tags
None
Usage
cosmo inspect wasmcloud.azurecr.io/echo:0.3.7
cosmo inspect wasmcloud.azurecr.io/httpserver:0.17.0
Options
--jwt-only
Extract the raw JWT from the file and print to standard output
--output
(Alias -o
) Specify output format (text
or json
) [default: text
]
--digest
(Alias -d
) Digest to verify artifact against (if OCI URL is provided for module or archive)
--allow-latest
Allow latest artifact tags (if OCI URL is provided for module or archive)
--user
(Alias -u
) OCI username, if omitted anonymous authentication will be used
--password
(Alias -p
) OCI password, if omitted anonymous authentication will be used
--insecure
Allow insecure (HTTP) registry connections
--no-cache
skip the local OCI cache