You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With this change, we don't need the Go template hack anymore. The help
text for subcommands displays correctly without showing global options.
Signed-off-by: Hoang Nguyen <[email protected]>
Usage: "do check whether the current version is latest during --version",
1698
1685
},
1699
1686
&cli.StringFlag{
1700
1687
Name: "kms",
1701
1688
Aliases: []string{"k"},
1689
+
Local: true,
1702
1690
Usage: "comma separated list of KMS ARNs",
1703
1691
Sources: cli.EnvVars("SOPS_KMS_ARN"),
1704
1692
},
1705
1693
&cli.StringFlag{
1706
1694
Name: "aws-profile",
1695
+
Local: true,
1707
1696
Usage: "The AWS profile to use for requests to AWS",
1708
1697
},
1709
1698
&cli.StringFlag{
1710
1699
Name: "gcp-kms",
1700
+
Local: true,
1711
1701
Usage: "comma separated list of GCP KMS resource IDs",
1712
1702
Sources: cli.EnvVars("SOPS_GCP_KMS_IDS"),
1713
1703
},
1714
1704
&cli.StringFlag{
1715
1705
Name: "azure-kv",
1706
+
Local: true,
1716
1707
Usage: "comma separated list of Azure Key Vault URLs",
1717
1708
Sources: cli.EnvVars("SOPS_AZURE_KEYVAULT_URLS"),
1718
1709
},
1719
1710
&cli.StringFlag{
1720
1711
Name: "hc-vault-transit",
1712
+
Local: true,
1721
1713
Usage: "comma separated list of vault's key URI (e.g. 'https://vault.example.org:8200/v1/transit/keys/dev')",
1722
1714
Sources: cli.EnvVars("SOPS_VAULT_URIS"),
1723
1715
},
1724
1716
&cli.StringFlag{
1725
1717
Name: "pgp",
1726
1718
Aliases: []string{"p"},
1719
+
Local: true,
1727
1720
Usage: "comma separated list of PGP fingerprints",
1728
1721
Sources: cli.EnvVars("SOPS_PGP_FP"),
1729
1722
},
1730
1723
&cli.StringFlag{
1731
1724
Name: "age",
1732
1725
Aliases: []string{"a"},
1726
+
Local: true,
1733
1727
Usage: "comma separated list of age recipients",
1734
1728
Sources: cli.EnvVars("SOPS_AGE_RECIPIENTS"),
1735
1729
},
1736
1730
&cli.BoolFlag{
1737
1731
Name: "in-place",
1738
1732
Aliases: []string{"i"},
1733
+
Local: true,
1739
1734
Usage: "write output back to the same file instead of stdout",
1740
1735
},
1741
1736
&cli.StringFlag{
1742
1737
Name: "extract",
1738
+
Local: true,
1743
1739
Usage: "extract a specific key or branch from the input document. Decrypt mode only. Example: --extract '[\"somekey\"][0]'",
1744
1740
},
1745
1741
&cli.StringFlag{
1746
1742
Name: "input-type",
1743
+
Local: true,
1747
1744
Usage: "currently json, yaml, dotenv and binary are supported. If not set, sops will use the file's extension to determine the type",
1748
1745
},
1749
1746
&cli.StringFlag{
1750
1747
Name: "output-type",
1748
+
Local: true,
1751
1749
Usage: "currently json, yaml, dotenv and binary are supported. If not set, sops will use the input file's extension to determine the output format",
1752
1750
},
1753
1751
&cli.BoolFlag{
1754
1752
Name: "show-master-keys",
1755
1753
Aliases: []string{"s"},
1754
+
Local: true,
1756
1755
Usage: "display master encryption keys in the file during editing",
1757
1756
},
1758
1757
&cli.StringFlag{
1759
1758
Name: "add-gcp-kms",
1759
+
Local: true,
1760
1760
Usage: "add the provided comma-separated list of GCP KMS key resource IDs to the list of master keys on the given file",
1761
1761
},
1762
1762
&cli.StringFlag{
1763
1763
Name: "rm-gcp-kms",
1764
+
Local: true,
1764
1765
Usage: "remove the provided comma-separated list of GCP KMS key resource IDs from the list of master keys on the given file",
1765
1766
},
1766
1767
&cli.StringFlag{
1767
1768
Name: "add-azure-kv",
1769
+
Local: true,
1768
1770
Usage: "add the provided comma-separated list of Azure Key Vault key URLs to the list of master keys on the given file",
1769
1771
},
1770
1772
&cli.StringFlag{
1771
1773
Name: "rm-azure-kv",
1774
+
Local: true,
1772
1775
Usage: "remove the provided comma-separated list of Azure Key Vault key URLs from the list of master keys on the given file",
1773
1776
},
1774
1777
&cli.StringFlag{
1775
1778
Name: "add-kms",
1779
+
Local: true,
1776
1780
Usage: "add the provided comma-separated list of KMS ARNs to the list of master keys on the given file",
1777
1781
},
1778
1782
&cli.StringFlag{
1779
1783
Name: "rm-kms",
1784
+
Local: true,
1780
1785
Usage: "remove the provided comma-separated list of KMS ARNs from the list of master keys on the given file",
1781
1786
},
1782
1787
&cli.StringFlag{
1783
1788
Name: "add-hc-vault-transit",
1789
+
Local: true,
1784
1790
Usage: "add the provided comma-separated list of Vault's URI key to the list of master keys on the given file ( eg. https://vault.example.org:8200/v1/transit/keys/dev)",
1785
1791
},
1786
1792
&cli.StringFlag{
1787
1793
Name: "rm-hc-vault-transit",
1794
+
Local: true,
1788
1795
Usage: "remove the provided comma-separated list of Vault's URI key from the list of master keys on the given file ( eg. https://vault.example.org:8200/v1/transit/keys/dev)",
1789
1796
},
1790
1797
&cli.StringFlag{
1791
1798
Name: "add-age",
1799
+
Local: true,
1792
1800
Usage: "add the provided comma-separated list of age recipients fingerprints to the list of master keys on the given file",
1793
1801
},
1794
1802
&cli.StringFlag{
1795
1803
Name: "rm-age",
1804
+
Local: true,
1796
1805
Usage: "remove the provided comma-separated list of age recipients from the list of master keys on the given file",
1797
1806
},
1798
1807
&cli.StringFlag{
1799
1808
Name: "add-pgp",
1809
+
Local: true,
1800
1810
Usage: "add the provided comma-separated list of PGP fingerprints to the list of master keys on the given file",
1801
1811
},
1802
1812
&cli.StringFlag{
1803
1813
Name: "rm-pgp",
1814
+
Local: true,
1804
1815
Usage: "remove the provided comma-separated list of PGP fingerprints from the list of master keys on the given file",
1805
1816
},
1806
1817
&cli.BoolFlag{
1807
1818
Name: "ignore-mac",
1819
+
Local: true,
1808
1820
Usage: "ignore Message Authentication Code during decryption",
1809
1821
},
1810
1822
&cli.BoolFlag{
1811
1823
Name: "mac-only-encrypted",
1824
+
Local: true,
1812
1825
Usage: "compute MAC only over values which end up encrypted",
1813
1826
},
1814
1827
&cli.StringFlag{
1815
1828
Name: "unencrypted-suffix",
1829
+
Local: true,
1816
1830
Usage: "override the unencrypted key suffix.",
1817
1831
},
1818
1832
&cli.StringFlag{
1819
1833
Name: "encrypted-suffix",
1834
+
Local: true,
1820
1835
Usage: "override the encrypted key suffix. When empty, all keys will be encrypted, unless otherwise marked with unencrypted-suffix.",
1821
1836
},
1822
1837
&cli.StringFlag{
1823
1838
Name: "unencrypted-regex",
1839
+
Local: true,
1824
1840
Usage: "set the unencrypted key regex. When specified, only keys matching the regex will be left unencrypted.",
1825
1841
},
1826
1842
&cli.StringFlag{
1827
1843
Name: "encrypted-regex",
1844
+
Local: true,
1828
1845
Usage: "set the encrypted key regex. When specified, only keys matching the regex will be encrypted.",
1829
1846
},
1830
1847
&cli.StringFlag{
1831
1848
Name: "unencrypted-comment-regex",
1849
+
Local: true,
1832
1850
Usage: "set the unencrypted comment suffix. When specified, only keys that have comment matching the regex will be left unencrypted.",
1833
1851
},
1834
1852
&cli.StringFlag{
1835
1853
Name: "encrypted-comment-regex",
1854
+
Local: true,
1836
1855
Usage: "set the encrypted comment suffix. When specified, only keys that have comment matching the regex will be encrypted.",
1837
1856
},
1838
1857
&cli.StringFlag{
1839
1858
Name: "config",
1859
+
Local: true,
1840
1860
Usage: "path to sops' config file. If set, sops will not search for the config file recursively.",
1841
1861
Sources: cli.EnvVars("SOPS_CONFIG"),
1842
1862
},
1843
1863
&cli.StringFlag{
1844
1864
Name: "encryption-context",
1865
+
Local: true,
1845
1866
Usage: "comma separated list of KMS encryption context key:value pairs",
1846
1867
},
1847
1868
&cli.StringFlag{
1848
1869
Name: "set",
1870
+
Local: true,
1849
1871
Usage: `set a specific key or branch in the input document. value must be a json encoded string. (edit mode only). eg. --set '["somekey"][0] {"somevalue":true}'`,
1850
1872
},
1851
1873
&cli.IntFlag{
1852
1874
Name: "shamir-secret-sharing-threshold",
1875
+
Local: true,
1853
1876
Usage: "the number of master keys required to retrieve the data key with shamir",
1854
1877
},
1855
1878
&cli.IntFlag{
1856
1879
Name: "indent",
1880
+
Local: true,
1857
1881
Usage: "the number of spaces to indent YAML or JSON encoded file",
1858
1882
},
1859
1883
&cli.BoolFlag{
1860
1884
Name: "verbose",
1885
+
Local: true,
1861
1886
Usage: "Enable verbose logging output",
1862
1887
},
1863
1888
&cli.StringFlag{
1864
1889
Name: "output",
1890
+
Local: true,
1865
1891
Usage: "Save the output after encryption or decryption to the file specified",
1866
1892
},
1867
1893
&cli.StringFlag{
1868
1894
Name: "filename-override",
1895
+
Local: true,
1869
1896
Usage: "Use this filename instead of the provided argument for loading configuration, and for determining input type and output type",
1870
1897
},
1871
1898
&cli.StringFlag{
1872
1899
Name: "decryption-order",
1900
+
Local: true,
1873
1901
Usage: "comma separated list of decryption key types",
1874
1902
Sources: cli.EnvVars("SOPS_DECRYPTION_ORDER"),
1875
1903
},
1876
-
}, keyserviceFlags...),
1904
+
// Repeat keyserviceFlags, with Local value set to true
Usage: "Specify the key services to use in addition to the local one. Can be specified more than once. Syntax: protocol://address. Example: tcp://myserver.com:5000",
0 commit comments