From oraclecloud-pack
Installs OCI Python SDK/CLI, generates RSA keys, creates validated config file, and verifies authentication for Oracle Cloud integrations.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin oraclecloud-packThis skill is limited to using the following tools:
Configure API key authentication for Oracle Cloud Infrastructure (OCI). OCI auth requires a `~/.oci/config` file with **five mandatory fields** — user OCID, fingerprint, tenancy OCID, region, and the path to an RSA private key. One wrong field produces the cryptic `ConfigFileNotFound` or `InvalidKeyFilePath` error with no hint about which field failed.
Sets up local OCI CLI/SDK dev workflow with multi-profile config, shell aliases, and env vars for dev/staging/prod. Replaces slow web console for resource ops.
Expert guidance for Next.js Cache Components and Partial Prerendering (PPR). **PROACTIVE ACTIVATION**: Use this skill automatically when working in Next.js projects that have `cacheComponents: true` in their next.config.ts/next.config.js. When this config is detected, proactively apply Cache Components patterns and best practices to all React Server Component implementations. **DETECTION**: At the start of a session in a Next.js project, check for `cacheComponents: true` in next.config. If enabled, this skill's patterns should guide all component authoring, data fetching, and caching decisions. **USE CASES**: Implementing 'use cache' directive, configuring cache lifetimes with cacheLife(), tagging cached data with cacheTag(), invalidating caches with updateTag()/revalidateTag(), optimizing static vs dynamic content boundaries, debugging cache issues, and reviewing Cache Component implementations.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Share bugs, ideas, or general feedback.
Configure API key authentication for Oracle Cloud Infrastructure (OCI). OCI auth requires a ~/.oci/config file with five mandatory fields — user OCID, fingerprint, tenancy OCID, region, and the path to an RSA private key. One wrong field produces the cryptic ConfigFileNotFound or InvalidKeyFilePath error with no hint about which field failed.
Purpose: Produce a validated ~/.oci/config file, generate an RSA key pair, upload the public key to OCI, and verify connectivity with both the Python SDK and OCI CLI.
ocid1.user.oc1..aaaa...ocid1.tenancy.oc1..aaaa...us-ashburn-1, eu-frankfurt-1)pip install oci oci-cli
mkdir -p ~/.oci
openssl genrsa -out ~/.oci/oci_api_key.pem 2048
chmod 600 ~/.oci/oci_api_key.pem
openssl rsa -pubout -in ~/.oci/oci_api_key.pem -out ~/.oci/oci_api_key_public.pem
openssl rsa -pubout -outform DER -in ~/.oci/oci_api_key.pem | openssl md5 -c
# Output: ab:cd:ef:12:34:56:78:90:ab:cd:ef:12:34:56:78:90
Navigate to: Profile (top-right) > User Settings > API Keys > Add API Key > Paste Public Key
Paste the contents of ~/.oci/oci_api_key_public.pem. The console shows the fingerprint — it must match Step 3.
cat > ~/.oci/config << 'EOF'
[DEFAULT]
user=ocid1.user.oc1..aaaa_YOUR_USER_OCID
fingerprint=ab:cd:ef:12:34:56:78:90:ab:cd:ef:12:34:56:78:90
tenancy=ocid1.tenancy.oc1..aaaa_YOUR_TENANCY_OCID
region=us-ashburn-1
key_file=~/.oci/oci_api_key.pem
EOF
chmod 600 ~/.oci/config
All five fields are required. The key_file must point to the private key (not the public .pem).
import oci
config = oci.config.from_file("~/.oci/config")
oci.config.validate_config(config)
identity = oci.identity.IdentityClient(config)
user = identity.get_user(config["user"]).data
print(f"Authenticated as: {user.name} ({user.email})")
print(f"Tenancy: {config['tenancy']}")
print(f"Region: {config['region']}")
oci iam user get --user-id "$(grep ^user ~/.oci/config | cut -d= -f2)" \
--query 'data.name' --raw-output
Save this as validate_oci_config.py to catch common misconfigurations:
import oci
import os
def validate():
"""Validate OCI config file and key access."""
config_path = os.path.expanduser("~/.oci/config")
if not os.path.exists(config_path):
raise FileNotFoundError(f"Config not found: {config_path}")
config = oci.config.from_file(config_path)
oci.config.validate_config(config)
key_path = os.path.expanduser(config.get("key_file", ""))
if not os.path.exists(key_path):
raise FileNotFoundError(f"Private key not found: {key_path}")
perms = oct(os.stat(key_path).st_mode)[-3:]
if perms != "600":
print(f"WARNING: Key file permissions are {perms}, should be 600")
identity = oci.identity.IdentityClient(config)
identity.get_user(config["user"])
print("Config is valid. Authentication successful.")
validate()
Successful completion produces:
~/.oci/oci_api_key.pem (private) and ~/.oci/oci_api_key_public.pem (public)~/.oci/config with all five required fields| Error | Code | Cause | Solution |
|---|---|---|---|
| NotAuthenticated | 401 | Wrong fingerprint or key mismatch | Verify fingerprint matches: openssl rsa -pubout -outform DER -in ~/.oci/oci_api_key.pem | openssl md5 -c |
| ConfigFileNotFound | — | Missing ~/.oci/config | Run oci setup config or create manually per Step 5 |
| InvalidKeyFilePath | — | key_file points to wrong path or public key | Ensure key_file=~/.oci/oci_api_key.pem (private key, no _public) |
| InvalidPrivateKey | — | Key file is the public key, not private | The private key starts with -----BEGIN RSA PRIVATE KEY----- |
| NotAuthorizedOrNotFound | 404 | User OCID is wrong or IAM policy missing | Double-check user OCID in Console > Profile > User Settings |
| CERTIFICATE_VERIFY_FAILED | — | SSL cert issue behind corporate proxy | Set OCI_PYTHON_SDK_NO_SERVICE_IMPORTS=1 or install certifi |
Quick auth test with curl (no SDK needed):
# Verify the OCI CLI can reach the API
oci iam region list --output table
Multiple profiles for dev/staging/prod:
# ~/.oci/config
[DEFAULT]
user=ocid1.user.oc1..aaaa_PROD_USER
tenancy=ocid1.tenancy.oc1..aaaa_PROD
region=us-ashburn-1
fingerprint=ab:cd:...
key_file=~/.oci/oci_api_key.pem
[STAGING]
user=ocid1.user.oc1..aaaa_STAGING_USER
tenancy=ocid1.tenancy.oc1..aaaa_STAGING
region=us-phoenix-1
fingerprint=12:34:...
key_file=~/.oci/oci_api_key_staging.pem
# Load a specific profile
config = oci.config.from_file("~/.oci/config", profile_name="STAGING")
After authentication is working, proceed to oraclecloud-hello-world to launch your first compute instance, or see oraclecloud-common-errors if you hit authentication issues.