Skip to content
This repository was archived by the owner on Feb 16, 2023. It is now read-only.

Commit 5e40148

Browse files
Merge pull request #356 from secrethub/feature/service-desc-defaults
Fix service description flag explanation
2 parents 5f16ab8 + df823ab commit 5e40148

2 files changed

Lines changed: 2 additions & 2 deletions

File tree

internals/secrethub/service_aws_init.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ func (cmd *ServiceAWSInitCommand) Register(r command.Registerer) {
159159
clause.Flag("kms-key", "The ID or ARN of the KMS-key to be used for encrypting the service's account key.").StringVar(&cmd.kmsKeyID)
160160
clause.Flag("role", "The role name or ARN of the IAM role that should have access to this service account.").StringVar(&cmd.role)
161161
clause.Flag("region", "The AWS region that should be used for KMS.").StringVar(&cmd.region)
162-
clause.Flag("description", "A description for the service so others will recognize it. Defaults to the name of the role that is attached to the service.").StringVar(&cmd.description)
162+
clause.Flag("description", "A description for the service so others will recognize it. Defaults to `AWS role <role-name>`.").StringVar(&cmd.description)
163163
clause.Flag("descr", "").Hidden().StringVar(&cmd.description)
164164
clause.Flag("desc", "").Hidden().StringVar(&cmd.description)
165165
clause.Flag("permission", "Create an access rule giving the service account permission on a directory. Accepted permissions are `read`, `write` and `admin`. Use `--permission <permission>` to give permission on the root of the repo and `--permission <dir>[/<dir> ...]:<permission>` to give permission on a subdirectory.").StringVar(&cmd.permission)

internals/secrethub/service_gcp_init.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ func (cmd *ServiceGCPInitCommand) Register(r command.Registerer) {
159159
clause.Arg("repo", "The service account is attached to the repository in this path.").Required().PlaceHolder(repoPathPlaceHolder).SetValue(&cmd.repo)
160160
clause.Flag("kms-key", "The Resource ID of the KMS-key to be used for encrypting the service's account key.").StringVar(&cmd.kmsKeyResourceID)
161161
clause.Flag("service-account-email", "The email of the GCP Service Account that should have access to this service account.").StringVar(&cmd.serviceAccountEmail)
162-
clause.Flag("description", "A description for the service so others will recognize it. Defaults to the name of the role that is attached to the service.").StringVar(&cmd.description)
162+
clause.Flag("description", "A description for the service so others will recognize it. Defaults to `GCP Service Account <service-account-email>`.").StringVar(&cmd.description)
163163
clause.Flag("descr", "").Hidden().StringVar(&cmd.description)
164164
clause.Flag("desc", "").Hidden().StringVar(&cmd.description)
165165
clause.Flag("permission", "Create an access rule giving the service account permission on a directory. Accepted permissions are `read`, `write` and `admin`. Use `--permission <permission>` to give permission on the root of the repo and `--permission <dir>[/<dir> ...]:<permission>` to give permission on a subdirectory.").StringVar(&cmd.permission)

0 commit comments

Comments
 (0)