Skip to content

Commit

Permalink
Update cli docs to be more clear and consistent
Browse files Browse the repository at this point in the history
  • Loading branch information
maidul98 committed Feb 6, 2023
1 parent 9f9273b commit 31df4a2
Show file tree
Hide file tree
Showing 3 changed files with 61 additions and 36 deletions.
6 changes: 4 additions & 2 deletions docs/cli/commands/init.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ infisical init

## Description

Link a local project to the platform
Link a local project to your Infisical project. Once connected, you can then access the secrets locally from the connected Infisical project.

The command creates a `infisical.json` file containing your Project ID.
<Info>
This command creates a `infisical.json` file containing your Project ID.
</Info>
61 changes: 53 additions & 8 deletions docs/cli/commands/run.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -25,13 +25,58 @@ description: "The command that injects your secrets into local environment"

## Description

Inject environment variables from the platform into an application process.
Inject secrets from Infisical into your application process.

## Options

| Option | Description | Default value |
| -------------- | ----------------------------------------------------------------------------------------------------------- | ------------- |
| `--env` | Used to set the environment that secrets are pulled from. Accepted values: `dev`, `staging`, `test`, `prod` | `dev` |
| `--expand` | Parse shell parameter expansions in your secrets (e.g., `${DOMAIN}`) | `true` |
| `--command` | Pass secrets into chained commands (e.g., `"first-command && second-command; more-commands..."`) | None |
| `--secret-overriding`| Prioritizes personal secrets with the same name over shared secrets | `true` |
## Subcommands & flags

<Accordion title="infisical run" defaultOpen="true">
Use this command to inject secrets into your applications process

```bash
$ infisical run -- <your application command>

# Example
$ infisical run -- npm run dev
```

### flags
<Accordion title="--command">
Pass secrets into multiple commands at once

```bash
# Example
infisical run --command="npm run build && npm run dev; more-commands..."
```
</Accordion>

<Accordion title="--token">
If you are using a [service token](../../getting-started/dashboard/token) to authenticate, you can pass the token as a flag

```bash
# Example
infisical run --token="st.63e03c4a97cb4a747186c71e.ed5b46a34c078a8f94e8228f4ab0ff97.4f7f38034811995997d72badf44b42ec" -- npm run start
```

You may also expose the token to the CLI by setting the environment variable `INFISICAL_TOKEN` before executing the run command. This will have the same effect as setting the token with `--token` flag
</Accordion>

<Accordion title="--expand">
Turn on or off the shell parameter expansion in your secrets. If you have used shell parameters in your secret(s), activating this feature will populate them before injecting them into your application process.

Default value: `true`
</Accordion>

<Accordion title="--env">
This is used to specify the environment from which secrets should be retrieved. The accepted values are the environment slugs defined for your project, such as `dev`, `staging`, `test`, and `prod`.

Default value: `dev`
</Accordion>

<Accordion title="--secret-overriding">
Prioritizes personal secrets with the same name over shared secrets

Default value: `true`
</Accordion>

</Accordion>
30 changes: 4 additions & 26 deletions docs/cli/commands/secrets.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -14,17 +14,8 @@ This command enables you to perform CRUD (create, read, update, delete) operatio
<Accordion title="infisical secrets" defaultOpen="true">
Use this command to print out all of the secrets in your project

```
$ infisical secrets
## Example
```bash
$ infisical secrets
┌─────────────┬──────────────┬─────────────┐
│ SECRET NAME │ SECRET VALUE │ SECRET TYPE │
├─────────────┼──────────────┼─────────────┤
│ DOMAIN │ example.com │ shared │
│ HASH │ jebhfbwe │ shared │
└─────────────┴──────────────┴─────────────┘
```

### flags
Expand All @@ -45,16 +36,11 @@ This command enables you to perform CRUD (create, read, update, delete) operatio
<Accordion title="infisical secrets get">
This command allows you selectively print the requested secrets by name

```
```bash
$ infisical secrets get <secret-name-a> <secret-name-b> ...

# Example
$ infisical secrets get DOMAIN
┌─────────────┬──────────────┬─────────────┐
│ SECRET NAME │ SECRET VALUE │ SECRET TYPE │
├─────────────┼──────────────┼─────────────┤
│ DOMAIN │ example.com │ shared │
└─────────────┴──────────────┴─────────────┘

```

Expand All @@ -70,18 +56,11 @@ This command enables you to perform CRUD (create, read, update, delete) operatio
This command allows you to set or update secrets in your environment. If the secret key provided already exists, its value will be updated with the new value.
If the secret key does not exist, a new secret will be created using both the key and value provided.

```
```bash
$ infisical secrets set <key1=value1> <key2=value2>...

## Example
$ infisical secrets set STRIPE_API_KEY=sjdgwkeudyjwe DOMAIN=example.com HASH=jebhfbwe
┌────────────────┬───────────────┬────────────────────────┐
│ SECRET NAME │ SECRET VALUE │ STATUS │
├────────────────┼───────────────┼────────────────────────┤
│ STRIPE_API_KEY │ sjdgwkeudyjwe │ SECRET VALUE UNCHANGED │
│ DOMAIN │ example.com │ SECRET VALUE MODIFIED │
│ HASH │ jebhfbwe │ SECRET CREATED │
└────────────────┴───────────────┴────────────────────────┘
```

### Flags
Expand All @@ -95,12 +74,11 @@ $ infisical secrets set STRIPE_API_KEY=sjdgwkeudyjwe DOMAIN=example.com HASH=jeb
<Accordion title="infisical secrets delete">
This command allows you to delete secrets by their name(s).

```
```bash
$ infisical secrets delete <keyName1> <keyName2>...

## Example
$ infisical secrets delete STRIPE_API_KEY DOMAIN HASH
secret name(s) [STRIPE_API_KEY, DOMAIN, HASH] have been deleted from your project
```

### Flags
Expand Down

0 comments on commit 31df4a2

Please sign in to comment.