@@ -56,7 +56,7 @@ Add a custom env/environment beyond the standard ones (local, staging, productio
5656| ` --no-interaction ` | boolean | ` false ` | Run without prompts |
5757
5858** Arguments:**
59- - ` [name] ` - Stage name (prompted if not provided)
59+ - ` [name] ` - Environment name (prompted if not provided)
6060
6161** Examples:**
6262``` bash
@@ -75,7 +75,7 @@ keep env:add hotfix
7575keep env:add sandbox --no-interaction
7676```
7777
78- ** Stage Name Requirements:**
78+ ** Environment Name Requirements:**
7979- Must be lowercase
8080- Can contain letters, numbers, hyphens, and underscores
8181- Examples: ` qa ` , ` demo ` , ` integration ` , ` sandbox ` , ` dev2 ` , ` staging-eu `
@@ -231,7 +231,7 @@ Show all secrets from a vault and environment.
231231
232232| Option | Type | Default | Description |
233233| --------| ------| ---------| -------------|
234- | ` --env ` | string | * interactive* | Stage to list secrets from |
234+ | ` --env ` | string | * interactive* | Environment to list secrets from |
235235| ` --vault ` | string | * default vault* | Vault to list secrets from |
236236| ` --unmask ` | boolean | ` false ` | Show actual secret values instead of masked |
237237| ` --format ` | string | ` table ` | Output format: ` table ` , ` json ` , ` env ` |
@@ -266,7 +266,7 @@ Generate a template file from existing secrets in a environment.
266266| Option | Type | Default | Description |
267267| --------| ------| ---------| -------------|
268268| ` filename ` | string | * required* | Template filename to create |
269- | ` --env ` | string | * required* | Stage to generate template from |
269+ | ` --env ` | string | * required* | Environment to generate template from |
270270| ` --vault ` | string | * all vaults* | Specific vault to use |
271271| ` --overwrite ` | boolean | ` false ` | Overwrite existing template file |
272272
@@ -290,7 +290,7 @@ Validate template files for syntax and placeholder resolution.
290290| Option | Type | Default | Description |
291291| --------| ------| ---------| -------------|
292292| ` filename ` | string | * required* | Template file to validate |
293- | ` --env ` | string | * optional* | Stage to validate against |
293+ | ` --env ` | string | * optional* | Environment to validate against |
294294
295295### Examples
296296
@@ -374,7 +374,7 @@ Remove secrets from vaults.
374374
375375| Option | Type | Default | Description |
376376| --------| ------| ---------| -------------|
377- | ` --env ` | string | * interactive* | Stage to delete secret from |
377+ | ` --env ` | string | * interactive* | Environment to delete secret from |
378378| ` --vault ` | string | * default vault* | Vault to delete the secret from |
379379| ` --force ` | boolean | ` false ` | Delete without confirmation prompt |
380380
@@ -402,7 +402,7 @@ Rename a secret while preserving its value and metadata.
402402
403403| Option | Type | Default | Description |
404404| --------| ------| ---------| -------------|
405- | ` --env ` | string | * interactive* | Stage where the secret exists |
405+ | ` --env ` | string | * interactive* | Environment where the secret exists |
406406| ` --vault ` | string | * default vault* | Vault containing the secret |
407407| ` --force ` | boolean | ` false ` | Skip confirmation prompt |
408408
@@ -430,7 +430,7 @@ Search for text within secret values.
430430
431431| Option | Type | Default | Description |
432432| --------| ------| ---------| -------------|
433- | ` --env ` | string | * interactive* | Stage to search in |
433+ | ` --env ` | string | * interactive* | Environment to search in |
434434| ` --vault ` | string | * default vault* | Vault to search in |
435435| ` --unmask ` | boolean | ` false ` | Show actual secret values in results |
436436| ` --case-sensitive ` | boolean | ` false ` | Make the search case-sensitive |
@@ -603,7 +603,7 @@ Export secrets from vaults with optional template processing.
603603
604604| Option | Type | Default | Description |
605605| --------| ------| ---------| -------------|
606- | ` --env ` | string | * interactive* | Stage to export secrets from |
606+ | ` --env ` | string | * interactive* | Environment to export secrets from |
607607| ` --vault ` | string | * auto-discover* | Vault(s) to export from (comma-separated) |
608608| ` --format ` | string | ` env ` | Output format: ` env ` , ` json ` , ` csv ` |
609609| ` --template ` | string | | Optional template file with placeholders |
@@ -678,7 +678,7 @@ Execute subprocesses with secrets injected as environment variables (diskless).
678678| Option | Type | Default | Description |
679679| --------| ------| ---------| -------------|
680680| ` --vault ` | string | * interactive* | Vault to fetch secrets from |
681- | ` --env ` | string | * interactive* | Stage to use |
681+ | ` --env ` | string | * interactive* | Environment to use |
682682| ` --template ` | string | | Template file path, or auto-discover if empty |
683683| ` --only ` | string | | Include only matching keys (patterns) |
684684| ` --except ` | string | | Exclude matching keys (patterns) |
0 commit comments