Skip to content

Commit c2b8bd4

Browse files
committed
docs: align instructions with current binary status
1 parent a4e34f2 commit c2b8bd4

File tree

2 files changed

+57
-7
lines changed

2 files changed

+57
-7
lines changed

README.md

+57-3
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,8 @@ The configuration file is in YAML format and has the following structure:
6868
| `argo_cd` | | ArgoCD-related configuration | ✔️ |
6969
| | `application` | The name of the application you'd like to synchronise inside ArgoCD | ✔️ |
7070
| | `base_url` | The base URL of your ArgoCD instance | ✔️ |
71-
| | `danger_accept_insecure` | Whether to accept insecure/self-signed SSL certificates (not recommended for production) | |
72-
| | `sync_timeout_seconds` | The timeout in seconds for the synchronization process | |
71+
| | `danger_accept_insecure` | Whether to accept insecure/self-signed SSL certificates (not recommended for production) |(default: `false`) |
72+
| | `sync_timeout_seconds` | The timeout in seconds for the synchronization process |(default: `60`) |
7373
| `postgres` | | PostgreSQL database configuration | |
7474
| | `host` | The hostname or IP address of the PostgreSQL server | ✔️ (if `postgres` is used) |
7575
| | `port` | The port number on which PostgreSQL is running | ✔️ (if `postgres` is used) |
@@ -92,7 +92,6 @@ Here's an example configuration file with explanations:
9292
argo_cd:
9393
application: 'propeller'
9494
base_url: 'http://localhost:8080'
95-
danger_accept_insecure: false # Only use 'true' in non-production environments
9695
sync_timeout_seconds: 60
9796

9897
# PostgreSQL configuration (required if using a PostgreSQL database)
@@ -163,6 +162,28 @@ propeller init-vault [OPTIONS]
163162

164163
#### Options
165164

165+
```shell
166+
Initialize a Vault path with the necessary structure for secret management.
167+
168+
This command prepares the Vault backend for subsequent secret rotation operations.
169+
170+
Usage: propeller.exe init-vault [OPTIONS]
171+
172+
Options:
173+
-c, --config-path <CONFIG_PATH>
174+
Path to the configuration file (default: config.yml)
175+
176+
[default: config.yml]
177+
178+
-h, --help
179+
Print help (see a summary with '-h')
180+
181+
-V, --version
182+
Print version
183+
```
184+
185+
Additionally, have a look at the ["Configuration"](#configuration) chapter.
186+
166187
#### Result
167188

168189
After running the command, the specified Vault path will contain a JSON secret with the following structure:
@@ -198,6 +219,39 @@ propeller rotate [OPTIONS]
198219

199220
#### Options
200221

222+
```shell
223+
Rotate PostgreSQL database secrets.
224+
225+
This command orchestrates the process of generating new secrets, updating the database, and storing the new secrets in Vault.
226+
227+
Usage: propeller.exe rotate [OPTIONS]
228+
229+
Options:
230+
-c, --config-path <CONFIG_PATH>
231+
Path to the configuration file (default: config.yml)
232+
233+
[default: config.yml]
234+
235+
-p, --password-length <PASSWORD_LENGTH>
236+
The length of the randomly generated alphanumeric password
237+
238+
[default: 20]
239+
240+
-h, --help
241+
Print help (see a summary with '-h')
242+
243+
-V, --version
244+
Print version
245+
```
246+
247+
Additionally, have a look at the ["Configuration"](#configuration) chapter.
248+
249+
#### Result
250+
251+
If all goes well, the active user will have been switched.
252+
The passwords of both the user 1 and 2 will have been rotated.
253+
The binary makes sure that your running application is in sync at all times!
254+
201255
#### Sequence Diagram "Switch"
202256

203257
!["switch" Workflow](https://www.plantuml.com/plantuml/png/nLGzJyCm4DtzAqxg0aDL6jHMT42gYc1XA1JOZNEabbpRs4uh_ZtEjvEc1Q5AP72aoxrxTy_legbnd75DfOELKHg5G0E3-sXnTJKZElZwHbFXMf6LiYunk7vwXC5YEfb4qzRdXKdKyguTqbfmHXrNaX2f78BQUReW38FnT7OzlI7Wdp2UMhJPOM1CKCQGeGcXpF4TzNNgtWbfnXZU5btFuHa_KxGEydpCwpJOOhByXA77r0Nc5M6CdUGsIG1uG8acopDKnceBcbgxLoRk8chfV6_APO2SAce0pMXrBWaKxpIwJXb3QyDE0rol9gywFibxGfOUjZvTIgBrdZks2RK7fqhUSz8LXfl3Y-59uaD62Q5Irr2KZYnUEQ8nc6VvaYp83QnQ0NxigYGWeN7_QC9MQwLMX_DtY49RBPMKo1nuyJS7OX_tL8kth95LzutJTy7j1kCZ9WjrECUUHy6U2wMqvn82KkcugAuMcDfgWLbzxoc-nUowUprHQLy1_JGkjKUjqRdfF1akj6-8osHaYviVVL0kCBxiSO1F_EN6Z_zfuyVdslYGl_u9VmC0)

src/cli.rs

-4
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,6 @@ pub(crate) struct RotateArgs {
4242
/// The length of the randomly generated alphanumeric password
4343
#[clap(short, long, default_value = "20")]
4444
pub(crate) password_length: usize,
45-
46-
/// Whether the CLI should write a recovery log (contains sensitive information!) or not
47-
#[clap(short, long)]
48-
pub(crate) write_recovery_log: bool,
4945
}
5046

5147
/// Arguments specific to the `init-vault` subcommand.

0 commit comments

Comments
 (0)