@@ -222,8 +222,7 @@ Create or update secrets in vaults.
222222| --------| ------| ---------| -------------|
223223| ` --env ` | string | * interactive* | Target env (local, staging, production) |
224224| ` --vault ` | string | * default vault* | Vault to store the secret in |
225- | ` --secure ` | boolean | ` true ` | Whether to encrypt the secret |
226- | ` --force ` | boolean | ` false ` | Overwrite existing secrets without confirmation |
225+ | ` --plain ` | boolean | ` false ` | Do not encrypt the value |
227226
228227** Arguments:**
229228- ` [key] ` - Secret key name (prompted if not provided)
@@ -256,8 +255,8 @@ keep set
256255# Direct mode
257256keep set API_KEY " abc123" --env=local
258257
259- # Force overwrite
260- keep set API_KEY " new-value" --env=production --force
258+ # Store as plain text (not encrypted)
259+ keep set API_KEY " new-value" --env=production --plain
261260
262261# Specify vault
263262keep set STRIPE_KEY " sk_live_..." --env=production --vault=secretsmanager
@@ -327,26 +326,21 @@ keep show --env=production --vault=secretsmanager --format=env
327326
328327## ` keep template:add `
329328
330- Generate a template file from existing secrets in a environment.
329+ Generate a template file from existing secrets in an environment. The template is saved as ` {env}.env ` in the template directory .
331330
332331| Option | Type | Default | Description |
333332| --------| ------| ---------| -------------|
334- | ` filename ` | string | * required* | Template filename to create |
335- | ` --env ` | string | * required* | Environment to generate template from |
336- | ` --vault ` | string | * all vaults* | Specific vault to use |
337- | ` --overwrite ` | boolean | ` false ` | Overwrite existing template file |
333+ | ` --env ` | string | * interactive* | Environment to generate template from |
334+ | ` --path ` | string | * template directory* | Custom template directory path |
338335
339336### Examples
340337
341338``` bash
342- # Create template from production secrets
343- keep template:add .env.template --env=production
339+ # Create template from production secrets (saves as production.env)
340+ keep template:add --env=production
344341
345- # Create from specific vault
346- keep template:add api.template --env=production --vault=ssm
347-
348- # Overwrite existing template
349- keep template:add config.env --env=staging --overwrite
342+ # Specify custom template directory
343+ keep template:add --env=staging --path=./config/templates
350344```
351345
352346## ` keep template:validate `
@@ -355,7 +349,7 @@ Validate template files for syntax and placeholder resolution.
355349
356350| Option | Type | Default | Description |
357351| --------| ------| ---------| -------------|
358- | ` filename ` | string | * required * | Template file to validate |
352+ | ` [template] ` | string | * optional * | Template file to validate (prompted if not provided) |
359353| ` --env ` | string | * optional* | Environment to validate against |
360354
361355### Examples
@@ -389,27 +383,27 @@ The interactive shell provides:
389383
390384** Context Management:**
391385``` bash
392- keep > env production # Switch to production env (alias: e)
393- keep > vault ssm # Switch to ssm vault (alias: v)
394- keep > use ssm:production # Switch both at once (alias: u)
395- keep > context # Show current context (alias: ctx)
386+ ssm:local > env production # Switch to production env (alias: e)
387+ ssm:local > vault ssm # Switch to ssm vault (alias: v)
388+ ssm:local > use ssm:production # Switch both at once (alias: u)
389+ ssm:local > context # Show current context (alias: ctx)
396390```
397391
398392** Secret Operations:**
399393``` bash
400- keep > set API_KEY value # Set a secret
401- keep > get API_KEY # Get a secret (alias: g)
402- keep > delete API_KEY # Delete a secret (alias: d)
403- keep > show # List all secrets (aliases: ls, list , l)
404- keep > copy KEY --to=prod # Copy using current context as source
394+ ssm:local > set API_KEY value # Set a secret
395+ ssm:local > get API_KEY # Get a secret (alias: g)
396+ ssm:local > delete API_KEY # Delete a secret (alias: d)
397+ ssm:local > show # List all secrets (aliases: ls, l)
398+ ssm:local > copy KEY --to=prod # Copy using current context as source
405399```
406400
407401** Shell Control:**
408402``` bash
409- keep > help # Show available commands (alias: ?)
410- keep > history # Show command history (alias: h)
411- keep > clear # Clear screen (alias: cls)
412- keep > exit # Exit shell (aliases: quit, q)
403+ ssm:local > help # Show available commands (alias: ?)
404+ ssm:local > history # Show command history (alias: h)
405+ ssm:local > clear # Clear screen (alias: cls)
406+ ssm:local > exit # Exit shell (aliases: quit, q)
413407```
414408
415409### Examples
@@ -419,12 +413,12 @@ keep> exit # Exit shell (aliases: quit, q)
419413keep shell --env=production --vault=ssm
420414
421415# Interactive session
422- keep ( ssm:production) > show
423- keep ( ssm:production) > env development
416+ ssm:production> show
417+ ssm:production> env development
424418✓ Switched to env: development
425- keep ( ssm:development) > set API_KEY " dev-key"
426- keep ( ssm:development) > copy API_KEY --to=production
427- keep ( ssm:development) > exit
419+ ssm:development> set API_KEY " dev-key"
420+ ssm:development> copy API_KEY --to=production
421+ ssm:development> exit
428422Goodbye!
429423```
430424
0 commit comments