The Finterion platform command-line interface — a single static binary
for macOS, Linux, and Windows. See docs/design.md for
the full Phase 1 design.
brew install finterion/tap/finterionscoop bucket add finterion https://github.com/finterion/scoop-bucket
scoop install finterioncurl -sSL https://get.finterion.com/cli | shiwr https://get.finterion.com/cli.ps1 | iexdocker run --rm -e FINTERION_TOKEN=$FINTERION_TOKEN \
-v "$PWD":/work -w /work \
ghcr.io/finterion/cli:latest backtest upload ./run.iafbtfinterion login # paste your PAT (created in the web UI)
finterion whoami # confirm
finterion backtest upload ./run.iafbt # upload a study
finterion backtest list
finterion backtest get r-9f3a| Source | Example |
|---|---|
| Flag | --profile staging --api-url https://api.staging.finterion.com |
| Env | FINTERION_TOKEN, FINTERION_API_URL, FINTERION_PROFILE, FINTERION_OUTPUT, NO_COLOR, FINTERION_CONFIG_DIR |
| File | $XDG_CONFIG_HOME/finterion/config.yaml (Unix) · %APPDATA%\Finterion\config.yaml (Windows) |
Tokens are stored in the OS keyring (Keychain / Credential Manager /
Secret Service). On headless systems the CLI falls back to a 0600
credentials file in the same directory and prints a one-time warning.
go build ./cmd/finterion
./finterion --helpFor releases, GoReleaser drives the full matrix:
goreleaser release --cleancmd/finterion entrypoint
internal/cli cobra commands
internal/api HTTP client (will be OpenAPI-generated)
internal/auth PAT format + keyring/file storage
internal/config config.yaml + profile resolution
internal/iafbt .iafbt folder reader + manifest validator
internal/upload streaming, retrying, parallel artifact uploader
internal/ui progress bars, JSON/text output
install/ install.sh + install.ps1 served from get.finterion.com
.goreleaser.yaml brew tap, scoop bucket, deb/rpm, docker, cosign
Dockerfile distroless image
Apache-2.0