You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With this change, we don't need the Go template hack anymore. The help
text for subcommands displays correctly without showing global options.
Signed-off-by: Hoang Nguyen <[email protected]>
Usage: "do check whether the current version is latest during --version",
1706
1693
},
1707
1694
&cli.StringFlag{
1708
1695
Name: "kms",
1709
1696
Aliases: []string{"k"},
1697
+
Local: true,
1710
1698
Usage: "comma separated list of KMS ARNs",
1711
1699
Sources: cli.EnvVars("SOPS_KMS_ARN"),
1712
1700
},
1713
1701
&cli.StringFlag{
1714
1702
Name: "aws-profile",
1703
+
Local: true,
1715
1704
Usage: "The AWS profile to use for requests to AWS",
1716
1705
},
1717
1706
&cli.StringFlag{
1718
1707
Name: "gcp-kms",
1708
+
Local: true,
1719
1709
Usage: "comma separated list of GCP KMS resource IDs",
1720
1710
Sources: cli.EnvVars("SOPS_GCP_KMS_IDS"),
1721
1711
},
1722
1712
&cli.StringFlag{
1723
1713
Name: "azure-kv",
1714
+
Local: true,
1724
1715
Usage: "comma separated list of Azure Key Vault URLs",
1725
1716
Sources: cli.EnvVars("SOPS_AZURE_KEYVAULT_URLS"),
1726
1717
},
1727
1718
&cli.StringFlag{
1728
1719
Name: "hc-vault-transit",
1720
+
Local: true,
1729
1721
Usage: "comma separated list of vault's key URI (e.g. 'https://vault.example.org:8200/v1/transit/keys/dev')",
1730
1722
Sources: cli.EnvVars("SOPS_VAULT_URIS"),
1731
1723
},
1732
1724
&cli.StringFlag{
1733
1725
Name: "pgp",
1734
1726
Aliases: []string{"p"},
1727
+
Local: true,
1735
1728
Usage: "comma separated list of PGP fingerprints",
1736
1729
Sources: cli.EnvVars("SOPS_PGP_FP"),
1737
1730
},
1738
1731
&cli.StringFlag{
1739
1732
Name: "age",
1740
1733
Aliases: []string{"a"},
1734
+
Local: true,
1741
1735
Usage: "comma separated list of age recipients",
1742
1736
Sources: cli.EnvVars("SOPS_AGE_RECIPIENTS"),
1743
1737
},
1744
1738
&cli.BoolFlag{
1745
1739
Name: "in-place",
1746
1740
Aliases: []string{"i"},
1741
+
Local: true,
1747
1742
Usage: "write output back to the same file instead of stdout",
1748
1743
},
1749
1744
&cli.StringFlag{
1750
1745
Name: "extract",
1746
+
Local: true,
1751
1747
Usage: "extract a specific key or branch from the input document. Decrypt mode only. Example: --extract '[\"somekey\"][0]'",
1752
1748
},
1753
1749
&cli.StringFlag{
1754
1750
Name: "input-type",
1751
+
Local: true,
1755
1752
Usage: "currently json, yaml, dotenv and binary are supported. If not set, sops will use the file's extension to determine the type",
1756
1753
},
1757
1754
&cli.StringFlag{
1758
1755
Name: "output-type",
1756
+
Local: true,
1759
1757
Usage: "currently json, yaml, dotenv and binary are supported. If not set, sops will use the input file's extension to determine the output format",
1760
1758
},
1761
1759
&cli.BoolFlag{
1762
1760
Name: "show-master-keys",
1763
1761
Aliases: []string{"s"},
1762
+
Local: true,
1764
1763
Usage: "display master encryption keys in the file during editing",
1765
1764
},
1766
1765
&cli.StringFlag{
1767
1766
Name: "add-gcp-kms",
1767
+
Local: true,
1768
1768
Usage: "add the provided comma-separated list of GCP KMS key resource IDs to the list of master keys on the given file",
1769
1769
},
1770
1770
&cli.StringFlag{
1771
1771
Name: "rm-gcp-kms",
1772
+
Local: true,
1772
1773
Usage: "remove the provided comma-separated list of GCP KMS key resource IDs from the list of master keys on the given file",
1773
1774
},
1774
1775
&cli.StringFlag{
1775
1776
Name: "add-azure-kv",
1777
+
Local: true,
1776
1778
Usage: "add the provided comma-separated list of Azure Key Vault key URLs to the list of master keys on the given file",
1777
1779
},
1778
1780
&cli.StringFlag{
1779
1781
Name: "rm-azure-kv",
1782
+
Local: true,
1780
1783
Usage: "remove the provided comma-separated list of Azure Key Vault key URLs from the list of master keys on the given file",
1781
1784
},
1782
1785
&cli.StringFlag{
1783
1786
Name: "add-kms",
1787
+
Local: true,
1784
1788
Usage: "add the provided comma-separated list of KMS ARNs to the list of master keys on the given file",
1785
1789
},
1786
1790
&cli.StringFlag{
1787
1791
Name: "rm-kms",
1792
+
Local: true,
1788
1793
Usage: "remove the provided comma-separated list of KMS ARNs from the list of master keys on the given file",
1789
1794
},
1790
1795
&cli.StringFlag{
1791
1796
Name: "add-hc-vault-transit",
1797
+
Local: true,
1792
1798
Usage: "add the provided comma-separated list of Vault's URI key to the list of master keys on the given file ( eg. https://vault.example.org:8200/v1/transit/keys/dev)",
1793
1799
},
1794
1800
&cli.StringFlag{
1795
1801
Name: "rm-hc-vault-transit",
1802
+
Local: true,
1796
1803
Usage: "remove the provided comma-separated list of Vault's URI key from the list of master keys on the given file ( eg. https://vault.example.org:8200/v1/transit/keys/dev)",
1797
1804
},
1798
1805
&cli.StringFlag{
1799
1806
Name: "add-age",
1807
+
Local: true,
1800
1808
Usage: "add the provided comma-separated list of age recipients fingerprints to the list of master keys on the given file",
1801
1809
},
1802
1810
&cli.StringFlag{
1803
1811
Name: "rm-age",
1812
+
Local: true,
1804
1813
Usage: "remove the provided comma-separated list of age recipients from the list of master keys on the given file",
1805
1814
},
1806
1815
&cli.StringFlag{
1807
1816
Name: "add-pgp",
1817
+
Local: true,
1808
1818
Usage: "add the provided comma-separated list of PGP fingerprints to the list of master keys on the given file",
1809
1819
},
1810
1820
&cli.StringFlag{
1811
1821
Name: "rm-pgp",
1822
+
Local: true,
1812
1823
Usage: "remove the provided comma-separated list of PGP fingerprints from the list of master keys on the given file",
1813
1824
},
1814
1825
&cli.BoolFlag{
1815
1826
Name: "ignore-mac",
1827
+
Local: true,
1816
1828
Usage: "ignore Message Authentication Code during decryption",
1817
1829
},
1818
1830
&cli.BoolFlag{
1819
1831
Name: "mac-only-encrypted",
1832
+
Local: true,
1820
1833
Usage: "compute MAC only over values which end up encrypted",
1821
1834
},
1822
1835
&cli.StringFlag{
1823
1836
Name: "unencrypted-suffix",
1837
+
Local: true,
1824
1838
Usage: "override the unencrypted key suffix.",
1825
1839
},
1826
1840
&cli.StringFlag{
1827
1841
Name: "encrypted-suffix",
1842
+
Local: true,
1828
1843
Usage: "override the encrypted key suffix. When empty, all keys will be encrypted, unless otherwise marked with unencrypted-suffix.",
1829
1844
},
1830
1845
&cli.StringFlag{
1831
1846
Name: "unencrypted-regex",
1847
+
Local: true,
1832
1848
Usage: "set the unencrypted key regex. When specified, only keys matching the regex will be left unencrypted.",
1833
1849
},
1834
1850
&cli.StringFlag{
1835
1851
Name: "encrypted-regex",
1852
+
Local: true,
1836
1853
Usage: "set the encrypted key regex. When specified, only keys matching the regex will be encrypted.",
1837
1854
},
1838
1855
&cli.StringFlag{
1839
1856
Name: "unencrypted-comment-regex",
1857
+
Local: true,
1840
1858
Usage: "set the unencrypted comment suffix. When specified, only keys that have comment matching the regex will be left unencrypted.",
1841
1859
},
1842
1860
&cli.StringFlag{
1843
1861
Name: "encrypted-comment-regex",
1862
+
Local: true,
1844
1863
Usage: "set the encrypted comment suffix. When specified, only keys that have comment matching the regex will be encrypted.",
1845
1864
},
1846
1865
&cli.StringFlag{
1847
1866
Name: "config",
1867
+
Local: true,
1848
1868
Usage: "path to sops' config file. If set, sops will not search for the config file recursively.",
1849
1869
Sources: cli.EnvVars("SOPS_CONFIG"),
1850
1870
},
1851
1871
&cli.StringFlag{
1852
1872
Name: "encryption-context",
1873
+
Local: true,
1853
1874
Usage: "comma separated list of KMS encryption context key:value pairs",
1854
1875
},
1855
1876
&cli.StringFlag{
1856
1877
Name: "set",
1878
+
Local: true,
1857
1879
Usage: `set a specific key or branch in the input document. value must be a json encoded string. (edit mode only). eg. --set '["somekey"][0] {"somevalue":true}'`,
1858
1880
},
1859
1881
&cli.IntFlag{
1860
1882
Name: "shamir-secret-sharing-threshold",
1883
+
Local: true,
1861
1884
Usage: "the number of master keys required to retrieve the data key with shamir",
1862
1885
},
1863
1886
&cli.IntFlag{
1864
1887
Name: "indent",
1888
+
Local: true,
1865
1889
Usage: "the number of spaces to indent YAML or JSON encoded file",
1866
1890
},
1867
1891
&cli.BoolFlag{
1868
1892
Name: "verbose",
1893
+
Local: true,
1869
1894
Usage: "Enable verbose logging output",
1870
1895
},
1871
1896
&cli.StringFlag{
1872
1897
Name: "output",
1898
+
Local: true,
1873
1899
Usage: "Save the output after encryption or decryption to the file specified",
1874
1900
},
1875
1901
&cli.StringFlag{
1876
1902
Name: "filename-override",
1903
+
Local: true,
1877
1904
Usage: "Use this filename instead of the provided argument for loading configuration, and for determining input type and output type",
1878
1905
},
1879
1906
&cli.StringFlag{
1880
1907
Name: "decryption-order",
1908
+
Local: true,
1881
1909
Usage: "comma separated list of decryption key types",
1882
1910
Sources: cli.EnvVars("SOPS_DECRYPTION_ORDER"),
1883
1911
},
1884
-
}, keyserviceFlags...),
1912
+
// Repeat keyserviceFlags, with Local value set to true
Usage: "Specify the key services to use in addition to the local one. Can be specified more than once. Syntax: protocol://address. Example: tcp://myserver.com:5000",
0 commit comments