@@ -68,8 +68,8 @@ The configuration file is in YAML format and has the following structure:
68
68
| ` argo_cd ` | | ArgoCD-related configuration | ✔️ |
69
69
| | ` application ` | The name of the application you'd like to synchronise inside ArgoCD | ✔️ |
70
70
| | ` base_url ` | The base URL of your ArgoCD instance | ✔️ |
71
- | | ` danger_accept_insecure ` | Whether to accept insecure/self-signed SSL certificates (not recommended for production) | ❌ |
72
- | | ` sync_timeout_seconds ` | The timeout in seconds for the synchronization process | ❌ |
71
+ | | ` danger_accept_insecure ` | Whether to accept insecure/self-signed SSL certificates (not recommended for production) | ❌ (default: ` false ` ) |
72
+ | | ` sync_timeout_seconds ` | The timeout in seconds for the synchronization process | ❌ (default: ` 60 ` ) |
73
73
| ` postgres ` | | PostgreSQL database configuration | |
74
74
| | ` host ` | The hostname or IP address of the PostgreSQL server | ✔️ (if ` postgres ` is used) |
75
75
| | ` port ` | The port number on which PostgreSQL is running | ✔️ (if ` postgres ` is used) |
@@ -92,7 +92,6 @@ Here's an example configuration file with explanations:
92
92
argo_cd :
93
93
application : ' propeller'
94
94
base_url : ' http://localhost:8080'
95
- danger_accept_insecure : false # Only use 'true' in non-production environments
96
95
sync_timeout_seconds : 60
97
96
98
97
# PostgreSQL configuration (required if using a PostgreSQL database)
@@ -163,6 +162,28 @@ propeller init-vault [OPTIONS]
163
162
164
163
# ### Options
165
164
165
+ ` ` ` shell
166
+ Initialize a Vault path with the necessary structure for secret management.
167
+
168
+ This command prepares the Vault backend for subsequent secret rotation operations.
169
+
170
+ Usage: propeller.exe init-vault [OPTIONS]
171
+
172
+ Options:
173
+ -c, --config-path <CONFIG_PATH>
174
+ Path to the configuration file (default: config.yml)
175
+
176
+ [default: config.yml]
177
+
178
+ -h, --help
179
+ Print help (see a summary with '-h')
180
+
181
+ -V, --version
182
+ Print version
183
+ ` ` `
184
+
185
+ Additionally, have a look at the ["Configuration"](#configuration) chapter.
186
+
166
187
# ### Result
167
188
168
189
After running the command, the specified Vault path will contain a JSON secret with the following structure :
@@ -198,6 +219,39 @@ propeller rotate [OPTIONS]
198
219
199
220
# ### Options
200
221
222
+ ` ` ` shell
223
+ Rotate PostgreSQL database secrets.
224
+
225
+ This command orchestrates the process of generating new secrets, updating the database, and storing the new secrets in Vault.
226
+
227
+ Usage: propeller.exe rotate [OPTIONS]
228
+
229
+ Options:
230
+ -c, --config-path <CONFIG_PATH>
231
+ Path to the configuration file (default: config.yml)
232
+
233
+ [default: config.yml]
234
+
235
+ -p, --password-length <PASSWORD_LENGTH>
236
+ The length of the randomly generated alphanumeric password
237
+
238
+ [default: 20]
239
+
240
+ -h, --help
241
+ Print help (see a summary with '-h')
242
+
243
+ -V, --version
244
+ Print version
245
+ ` ` `
246
+
247
+ Additionally, have a look at the ["Configuration"](#configuration) chapter.
248
+
249
+ # ### Result
250
+
251
+ If all goes well, the active user will have been switched.
252
+ The passwords of both the user 1 and 2 will have been rotated.
253
+ The binary makes sure that your running application is in sync at all times!
254
+
201
255
# ### Sequence Diagram "Switch"
202
256
203
257

0 commit comments