From 748d369e9bf6482588ad12456a013fcd6f5a9ff6 Mon Sep 17 00:00:00 2001 From: Sabuj Mondal Date: Thu, 21 Aug 2025 14:08:42 +0000 Subject: [PATCH 1/8] changed IBMVerifyApplications to IBMVerifyApplication --- pkg/cmd/create/application.go | 2 +- pkg/cmd/create/create.go | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/pkg/cmd/create/application.go b/pkg/cmd/create/application.go index cf6b745..7d858f9 100644 --- a/pkg/cmd/create/application.go +++ b/pkg/cmd/create/application.go @@ -101,7 +101,7 @@ func (o *applicationOptions) Run(cmd *cobra.Command, args []string) error { if o.boilerplate { if o.applicationType == "saml" || o.applicationType == "oidc" || o.applicationType == "aclc" || o.applicationType == "bookmark" || o.applicationType == "" { resourceObj := &resource.ResourceObject{ - Kind: resource.ResourceTypePrefix + "Applications", + Kind: resource.ResourceTypePrefix + "Application", APIVersion: "1.0", Data: applications.ApplicationExample(o.applicationType), } diff --git a/pkg/cmd/create/create.go b/pkg/cmd/create/create.go index 31db116..5e4ec35 100644 --- a/pkg/cmd/create/create.go +++ b/pkg/cmd/create/create.go @@ -165,7 +165,7 @@ func (o *options) Run(cmd *cobra.Command, args []string) error { options := &apiClientOptions{} err = options.createAPIClientFromDataMap(cmd, resourceObject.Data.(map[string]interface{})) - case resource.ResourceTypePrefix + "Applications": + case resource.ResourceTypePrefix + "Application": options := &applicationOptions{} err = options.createApplicationFromDataMap(cmd, resourceObject.Data.(map[string]interface{})) From 794c8c799f23e986f4247562241a095d48ca7ce4 Mon Sep 17 00:00:00 2001 From: Sabuj Mondal Date: Thu, 21 Aug 2025 15:37:20 +0000 Subject: [PATCH 2/8] remove = format for taking inputs --- pkg/cmd/auth/auth.go | 2 +- pkg/cmd/create/accesspolicy.go | 4 ++-- pkg/cmd/create/api_client.go | 4 ++-- pkg/cmd/create/application.go | 2 +- pkg/cmd/create/attribute.go | 2 +- pkg/cmd/create/create.go | 7 ++----- pkg/cmd/create/group.go | 2 +- pkg/cmd/create/identity_agent.go | 2 +- pkg/cmd/create/identity_provider.go | 4 ++-- pkg/cmd/create/password_policy.go | 2 +- pkg/cmd/create/personal_cert.go | 4 ++-- pkg/cmd/create/signer_cert.go | 4 ++-- pkg/cmd/create/user.go | 4 ++-- pkg/cmd/delete/accesspolicy.go | 2 +- pkg/cmd/delete/api_client.go | 4 ++-- pkg/cmd/delete/application.go | 2 +- pkg/cmd/delete/attribute.go | 2 +- pkg/cmd/delete/delete.go | 4 ++-- pkg/cmd/delete/group.go | 2 +- pkg/cmd/delete/identity_agent.go | 2 +- pkg/cmd/delete/identity_provider.go | 2 +- pkg/cmd/delete/password_policy.go | 2 +- pkg/cmd/delete/personal_cert.go | 2 +- pkg/cmd/delete/signer_cert.go | 2 +- pkg/cmd/delete/user.go | 2 +- pkg/cmd/get/accesspolicy.go | 4 ++-- pkg/cmd/get/api_client.go | 6 +++--- pkg/cmd/get/application.go | 2 +- pkg/cmd/get/attributes.go | 4 ++-- pkg/cmd/get/get.go | 4 ++-- pkg/cmd/get/group.go | 4 ++-- pkg/cmd/get/identity_agents.go | 4 ++-- pkg/cmd/get/identity_provider.go | 4 ++-- pkg/cmd/get/password_policy.go | 4 ++-- pkg/cmd/get/personal_cert.go | 4 ++-- pkg/cmd/get/signer_cert.go | 4 ++-- pkg/cmd/get/themes.go | 6 +++--- pkg/cmd/get/user.go | 4 ++-- pkg/cmd/replace/accesspolicy.go | 2 +- pkg/cmd/replace/api_client.go | 2 +- pkg/cmd/replace/application.go | 2 +- pkg/cmd/replace/attribute.go | 2 +- pkg/cmd/replace/group.go | 2 +- pkg/cmd/replace/identity_agent.go | 2 +- pkg/cmd/replace/identity_provider.go | 2 +- pkg/cmd/replace/personal_cert.go | 2 +- pkg/cmd/replace/replace.go | 2 +- pkg/cmd/replace/signInOptions.go | 2 +- pkg/cmd/replace/user.go | 2 +- pkg/cmd/set/set.go | 2 +- pkg/cmd/set/themes.go | 6 +++--- 51 files changed, 76 insertions(+), 79 deletions(-) diff --git a/pkg/cmd/auth/auth.go b/pkg/cmd/auth/auth.go index 4fa8d3b..eb8d31a 100644 --- a/pkg/cmd/auth/auth.go +++ b/pkg/cmd/auth/auth.go @@ -43,7 +43,7 @@ The auth resource file can be generated using: # # The connection created is permitted to perform actions based on the entitlements that # are configured on the OAuth client and the entitlements of the user based on assigned groups and roles. - verifyctl auth -f=login.yaml + verifyctl auth -f "login.yaml" `)) ) diff --git a/pkg/cmd/create/accesspolicy.go b/pkg/cmd/create/accesspolicy.go index 38b64d7..e7fa194 100644 --- a/pkg/cmd/create/accesspolicy.go +++ b/pkg/cmd/create/accesspolicy.go @@ -46,10 +46,10 @@ You can identify the entitlement required by running: verifyctl create accesspolicy --boilerplate # Create a accessPolicy using a YAML file. - verifyctl create -f=./accesspolicy.yaml + verifyctl create -f "accesspolicy.yaml" # Create a accessPolicy using a JSON file. - verifyctl create -f=./accesspolicy.json`)) + verifyctl create -f "accesspolicy.json"`)) ) type accessPolicyOptions struct { diff --git a/pkg/cmd/create/api_client.go b/pkg/cmd/create/api_client.go index a2fc450..fe493be 100644 --- a/pkg/cmd/create/api_client.go +++ b/pkg/cmd/create/api_client.go @@ -46,10 +46,10 @@ var ( verifyctl create apiclient --boilerplate # Create an API client using a YAML file. - verifyctl create -f=./apiclient.yaml + verifyctl create -f "apiclient.yaml" # Create an API client using a JSON file. - verifyctl create -f=./apiclient.json`)) + verifyctl create -f "apiclient.json"`)) ) type apiClientOptions struct { diff --git a/pkg/cmd/create/application.go b/pkg/cmd/create/application.go index 7d858f9..b7aa02f 100644 --- a/pkg/cmd/create/application.go +++ b/pkg/cmd/create/application.go @@ -36,7 +36,7 @@ var ( verifyctl create application --boilerplate # Create an application using a YAML file. - verifyctl create -f=./application.yaml`)) + verifyctl create -f "application.yaml"`)) ) type applicationOptions struct { diff --git a/pkg/cmd/create/attribute.go b/pkg/cmd/create/attribute.go index 2143e3f..8c69557 100644 --- a/pkg/cmd/create/attribute.go +++ b/pkg/cmd/create/attribute.go @@ -47,7 +47,7 @@ You can identify the entitlement required by running: verifyctl create attribute --boilerplate # Create an attribute using the API model in JSON format. - verifyctl create -f=./customEmail.json`)) + verifyctl create -f "customEmail.json"`)) ) type attributeOptions struct { diff --git a/pkg/cmd/create/create.go b/pkg/cmd/create/create.go index 5e4ec35..2c449a1 100644 --- a/pkg/cmd/create/create.go +++ b/pkg/cmd/create/create.go @@ -15,7 +15,7 @@ import ( ) const ( - usage = "create -f=FILENAME [options]" + usage = "create -f FILENAME [options]" messagePrefix = "Create" ) @@ -44,10 +44,7 @@ Certain resources may offer additional options and can be determined using: examples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Create an application - verifyctl create -f=./app-1098012.json`)) - - // # Create and get an attribute - // verifyctl create -f=./attribute.yml -o=yaml + verifyctl create -f "app.json"`)) entitlementsMessage = i18n.Translate("Choose any of the following entitlements to configure your application or API client:\n") ) diff --git a/pkg/cmd/create/group.go b/pkg/cmd/create/group.go index ed56a7e..9d332e5 100644 --- a/pkg/cmd/create/group.go +++ b/pkg/cmd/create/group.go @@ -47,7 +47,7 @@ You can identify the entitlement required by running: verifyctl create group --boilerplate # Create a group using a JSON file. - verifyctl create -f=./group.json`)) + verifyctl create -f "group.json"`)) ) type groupOptions struct { diff --git a/pkg/cmd/create/identity_agent.go b/pkg/cmd/create/identity_agent.go index 3bfe6ee..e3a6657 100644 --- a/pkg/cmd/create/identity_agent.go +++ b/pkg/cmd/create/identity_agent.go @@ -46,7 +46,7 @@ var ( verifyctl create identityagent --boilerplate # Create an Identity Agent using a JSON file. - verifyctl create identityagent -f=./identityagent.json`)) + verifyctl create identityagent -f "identityagent.json"`)) ) type identityAgentOptions struct { diff --git a/pkg/cmd/create/identity_provider.go b/pkg/cmd/create/identity_provider.go index 2025487..36f69f9 100644 --- a/pkg/cmd/create/identity_provider.go +++ b/pkg/cmd/create/identity_provider.go @@ -47,10 +47,10 @@ You can identify the entitlement required by running: verifyctl create identitysource --boilerplate # Create a identitySource using a YAML file. - verifyctl create -f=./identitysource.yaml + verifyctl create -f "identitysource.yaml" # Create a identitySource using a JSON file. - verifyctl create -f=./identitysource.json`)) + verifyctl create -f "identitysource.json"`)) ) type identitySourceOptions struct { diff --git a/pkg/cmd/create/password_policy.go b/pkg/cmd/create/password_policy.go index a2f5e89..b63ae66 100644 --- a/pkg/cmd/create/password_policy.go +++ b/pkg/cmd/create/password_policy.go @@ -50,7 +50,7 @@ You can identify the entitlement required by running: verifyctl create passwordpolicy --boilerplate # Create a password policy using the API model in YAML format. -verifyctl create -f=./password_Policy.yaml`, +verifyctl create -f "password_Policy.yaml"`, ), ) ) diff --git a/pkg/cmd/create/personal_cert.go b/pkg/cmd/create/personal_cert.go index 33215a1..cc7b9c6 100644 --- a/pkg/cmd/create/personal_cert.go +++ b/pkg/cmd/create/personal_cert.go @@ -45,9 +45,9 @@ var ( `# Create an empty personal certificate resource. verifyctl create personalCert --boilerplate # Create a personal certificate using a YAML file. - verifyctl create -f=./personal_cert.yaml + verifyctl create -f "personal_cert.yaml" # Create a personal certificate using a JSON file. - verifyctl create -f=./personal_cert.json`, + verifyctl create -f "personal_cert.json"`, ), ) ) diff --git a/pkg/cmd/create/signer_cert.go b/pkg/cmd/create/signer_cert.go index 7edfac6..a548c43 100644 --- a/pkg/cmd/create/signer_cert.go +++ b/pkg/cmd/create/signer_cert.go @@ -45,9 +45,9 @@ var ( `# Create an empty signer certificate resource. verifyctl create signerCert --boilerplate # Create a signer certificate using a YAML file. - verifyctl create -f=./signer_cert.yaml + verifyctl create -f "signer_cert.yaml" # Create a signer certificate using a JSON file. - verifyctl create -f=./signer_cert.json`, + verifyctl create -f "signer_cert.json"`, ), ) ) diff --git a/pkg/cmd/create/user.go b/pkg/cmd/create/user.go index 0989ebf..a8605a9 100644 --- a/pkg/cmd/create/user.go +++ b/pkg/cmd/create/user.go @@ -47,10 +47,10 @@ You can identify the entitlement required by running: verifyctl create user --boilerplate # Create a user using a YAML file. - verifyctl create -f "./user.yaml + verifyctl create -f "user.yaml" # Create a user using a JSON file. - verifyctl create -f "./user.json"`)) + verifyctl create -f "user.json"`)) ) type userOptions struct { diff --git a/pkg/cmd/delete/accesspolicy.go b/pkg/cmd/delete/accesspolicy.go index 8e12b2b..1ef82b7 100644 --- a/pkg/cmd/delete/accesspolicy.go +++ b/pkg/cmd/delete/accesspolicy.go @@ -32,7 +32,7 @@ You can identify the entitlement required by running: accessPoliciesExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Delete an accessPolicy - verifyctl delete accesspolicy --ID=accesspolicyID`, + verifyctl delete accesspolicy --ID "accesspolicyID"`, )) ) diff --git a/pkg/cmd/delete/api_client.go b/pkg/cmd/delete/api_client.go index 63b1042..a703ccd 100644 --- a/pkg/cmd/delete/api_client.go +++ b/pkg/cmd/delete/api_client.go @@ -33,10 +33,10 @@ You can identify the entitlement required by running: apiclientExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Delete an API client by name - verifyctl delete apiclient --clientName="clientName", + verifyctl delete apiclient --clientName "clientName", # Delete an API client by ID - verifyctl delete apiclient --clientID="12345"`, + verifyctl delete apiclient --clientID "12345"`, )) ) diff --git a/pkg/cmd/delete/application.go b/pkg/cmd/delete/application.go index bc3169c..a82b7fb 100644 --- a/pkg/cmd/delete/application.go +++ b/pkg/cmd/delete/application.go @@ -32,7 +32,7 @@ You can identify the entitlement required by running: applicationExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Delete an Application - verifyctl delete application --applicationID="applicationID"`, + verifyctl delete application --applicationID "applicationID"`, )) ) diff --git a/pkg/cmd/delete/attribute.go b/pkg/cmd/delete/attribute.go index b95804d..7357ee8 100644 --- a/pkg/cmd/delete/attribute.go +++ b/pkg/cmd/delete/attribute.go @@ -31,7 +31,7 @@ var ( attributeExamples = templates.Examples(cmdutil.TranslateExamples(attributeMessagePrefix, ` # Delete an attribute by ID - verifyctl delete attribute --id=some-attribute-id + verifyctl delete attribute --id "some-attribute-id" `)) ) diff --git a/pkg/cmd/delete/delete.go b/pkg/cmd/delete/delete.go index 11ff5ad..655e7d7 100644 --- a/pkg/cmd/delete/delete.go +++ b/pkg/cmd/delete/delete.go @@ -33,8 +33,8 @@ Certain resources may offer additional options and can be determined using: verifyctl delete [resource-type] -h`)) examples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` - # Delete an user - verifyctl delete [resource-type] --name=userName`)) + # Delete an application + verifyctl delete application --applicationID "applicationID"`)) entitlementsMessage = i18n.Translate("Choose any of the following entitlements to configure your application or API client:\n") ) diff --git a/pkg/cmd/delete/group.go b/pkg/cmd/delete/group.go index 57dece4..c36d7a2 100644 --- a/pkg/cmd/delete/group.go +++ b/pkg/cmd/delete/group.go @@ -32,7 +32,7 @@ You can identify the entitlement required by running: groupsExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Delete a group - verifyctl delete group --displayName=Sales`, + verifyctl delete group --displayName "Sales"`, )) ) diff --git a/pkg/cmd/delete/identity_agent.go b/pkg/cmd/delete/identity_agent.go index 7f77a63..9364026 100644 --- a/pkg/cmd/delete/identity_agent.go +++ b/pkg/cmd/delete/identity_agent.go @@ -33,7 +33,7 @@ You can identify the entitlement required by running: identityAgentExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Delete an Identity Agent by ID - verifyctl delete identityagent --identityAgentID="12345"`, + verifyctl delete identityagent --identityAgentID "12345"`, )) ) diff --git a/pkg/cmd/delete/identity_provider.go b/pkg/cmd/delete/identity_provider.go index b451c87..20d2cf9 100644 --- a/pkg/cmd/delete/identity_provider.go +++ b/pkg/cmd/delete/identity_provider.go @@ -32,7 +32,7 @@ You can identify the entitlement required by running: identitySourcesExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Delete an identitySource - verifyctl delete identitysource --identitySourceID=identitySourceID`, + verifyctl delete identitysource --identitySource "identitySourceID"`, )) ) diff --git a/pkg/cmd/delete/password_policy.go b/pkg/cmd/delete/password_policy.go index 9a87457..064394e 100644 --- a/pkg/cmd/delete/password_policy.go +++ b/pkg/cmd/delete/password_policy.go @@ -30,7 +30,7 @@ verifyctl delete passwordpolicy --entitlements`)) passwordPolicyExamples = templates.Examples(cmdutil.TranslateExamples(passwordPolicyMessagePrefix, ` # Delete a password policy by passwordPolicyID -verifyctl delete passwordpolicy --passwordPolicyID=passwordPolicyID +verifyctl delete passwordpolicy --passwordPolicyID "passwordPolicyID" `)) ) diff --git a/pkg/cmd/delete/personal_cert.go b/pkg/cmd/delete/personal_cert.go index 976d9f4..d5e4a32 100644 --- a/pkg/cmd/delete/personal_cert.go +++ b/pkg/cmd/delete/personal_cert.go @@ -27,7 +27,7 @@ var ( personalCertExamples = templates.Examples(cmdutil.TranslateExamples(personalCertMessagePrefix, ` # Delete a personal certificate by label - verifyctl delete personalCert --personalCertLabel=certificateLabel + verifyctl delete personalCert --personalCertLabel "certificateLabel" `)) ) diff --git a/pkg/cmd/delete/signer_cert.go b/pkg/cmd/delete/signer_cert.go index 7c530e4..04a3303 100644 --- a/pkg/cmd/delete/signer_cert.go +++ b/pkg/cmd/delete/signer_cert.go @@ -27,7 +27,7 @@ var ( signerCertExamples = templates.Examples(cmdutil.TranslateExamples(signerCertMessagePrefix, ` # Delete a signer certificate by label - verifyctl delete signerCert --signerCertLabel=certificateLabel + verifyctl delete signerCert --signerCertLabel "certificateLabel" `)) ) diff --git a/pkg/cmd/delete/user.go b/pkg/cmd/delete/user.go index fec63fa..65516fb 100644 --- a/pkg/cmd/delete/user.go +++ b/pkg/cmd/delete/user.go @@ -32,7 +32,7 @@ You can identify the entitlement required by running: usersExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Delete an user - verifyctl delete user --userName=userName`, + verifyctl delete user --userName "userName"`, )) ) diff --git a/pkg/cmd/get/accesspolicy.go b/pkg/cmd/get/accesspolicy.go index c955e4d..0bea4dc 100644 --- a/pkg/cmd/get/accesspolicy.go +++ b/pkg/cmd/get/accesspolicy.go @@ -33,10 +33,10 @@ You can identify the entitlement required by running: accessPoliciesExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Get an accessPolicy and print the output in yaml - verifyctl get accesspolicy -o=yaml --ID=testAccesspolicyID + verifyctl get accesspolicy -o "yaml" --ID "testAccesspolicyID" # Get 2 accessPolicies . - verifyctl get accesspolicies --limit=2 --page=1 -o=yaml`)) + verifyctl get accesspolicies --limit 2 --page 1 -o "yaml"`)) ) type accessPoliciesOptions struct { diff --git a/pkg/cmd/get/api_client.go b/pkg/cmd/get/api_client.go index d880d4a..f69919d 100644 --- a/pkg/cmd/get/api_client.go +++ b/pkg/cmd/get/api_client.go @@ -33,11 +33,11 @@ You can identify the entitlement required by running: apiclientsExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Get an apiclient and print the output in yaml - verifyctl get apiclient -o=yaml --clientName=testApiclient - verifyctl get apiclient -o=yaml --clientID=12345 + verifyctl get apiclient -o yaml --clientName "testApiclient" + verifyctl get apiclient -o yaml --clientID "12345" # Get 2 apiclients - verifyctl get apiclients --limit=2 --page=1 -o=yaml`)) + verifyctl get apiclients --limit 2 --page 1 -o "yaml"`)) ) type apiclientsOptions struct { diff --git a/pkg/cmd/get/application.go b/pkg/cmd/get/application.go index 9da1f89..623722e 100644 --- a/pkg/cmd/get/application.go +++ b/pkg/cmd/get/application.go @@ -28,7 +28,7 @@ var ( applicationExamples = templates.Examples(cmdutil.TranslateExamples(applicationsMessagePrefix, ` # Get an application and print the output in yaml - verifyctl get application -o=yaml --applicationID=testApplicationID + verifyctl get application -o=yaml --applicationID "testApplicationID" # Get 2 applications verifyctl get applications --limit=2 --page=1 -o=yaml`)) diff --git a/pkg/cmd/get/attributes.go b/pkg/cmd/get/attributes.go index 48b4cd6..c2e6feb 100644 --- a/pkg/cmd/get/attributes.go +++ b/pkg/cmd/get/attributes.go @@ -33,10 +33,10 @@ You can identify the entitlement required by running: attributesExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Get an attribute and print the output in yaml - verifyctl get attribute -o=yaml --id=work_email + verifyctl get attribute -o "yaml" --id "work_email" # Get 2 attributes based on a given search criteria and sort it in the ascending order by name. - verifyctl get attributes --search="tags=\"sso\"" --limit=10 --page=1 --sort=+name -o=yaml`)) + verifyctl get attributes --search "tags=\"sso\"" --limit 10 --page 1 --sort "name" -o "yaml"`)) ) type attributesOptions struct { diff --git a/pkg/cmd/get/get.go b/pkg/cmd/get/get.go index 3e13315..abc9288 100644 --- a/pkg/cmd/get/get.go +++ b/pkg/cmd/get/get.go @@ -33,10 +33,10 @@ The flags supported by each resource type may differ and can be determined using examples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Get an application - verifyctl get application -o=yaml --id=1098012 + verifyctl get application -o "yaml" --id "1098012" # Get all users that match department "2A". There may be limits introduced by the API. - verifyctl get users --filter="urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department eq \"2A\"" --attributes="userName,emails,urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager" -o yaml`)) + verifyctl get users --filter "urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department eq \"2A\"" --attributes "userName,emails,urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager" -o "yaml"`)) entitlementsMessage = i18n.Translate("Choose any of the following entitlements to configure your application or API client:\n") ) diff --git a/pkg/cmd/get/group.go b/pkg/cmd/get/group.go index 091ef35..debd13f 100644 --- a/pkg/cmd/get/group.go +++ b/pkg/cmd/get/group.go @@ -33,10 +33,10 @@ You can identify the entitlement required by running: groupsExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Get an group and print the output in yaml - verifyctl get group -o=yaml --displayName=admin + verifyctl get group -o "yaml" --displayName "admin" # Get 2 groups based on a given search criteria and sort it in the ascending order by name. - verifyctl get groups --count=2 --sort=groupName -o=yaml`)) + verifyctl get groups --count 2 --sort "groupName" -o "yaml"`)) ) type groupsOptions struct { diff --git a/pkg/cmd/get/identity_agents.go b/pkg/cmd/get/identity_agents.go index ccb89cf..a9ffb99 100644 --- a/pkg/cmd/get/identity_agents.go +++ b/pkg/cmd/get/identity_agents.go @@ -33,13 +33,13 @@ You can identify the entitlement required by running: identityAgentsExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Get an identityAgent and print the output in yaml - verifyctl get identityagent -o=yaml --identityAgentID=testIdentityAgent + verifyctl get identityagent -o "yaml" --identityAgentID "testIdentityAgent" #get all identityAgents verifyctl get identityagents # Get 2 identityAgents based on a given page and limit number. - verifyctl get identityagents --limit=2 --page=1 -o=yaml`)) + verifyctl get identityagents --limit 2 --page 1 -o "yaml"`)) ) type identityAgentsOptions struct { diff --git a/pkg/cmd/get/identity_provider.go b/pkg/cmd/get/identity_provider.go index 3064b30..3881b7c 100644 --- a/pkg/cmd/get/identity_provider.go +++ b/pkg/cmd/get/identity_provider.go @@ -33,10 +33,10 @@ You can identify the entitlement required by running: identitySourcesExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Get an identitySource and print the output in yaml - verifyctl get identitysource -o=yaml --identitySourceID="identitySourceID" + verifyctl get identitysource -o "yaml" --identitySourceID "identitySourceID" # Get 2 identitySources - verifyctl get identitysources --limit=1 --page=1 -o=yaml`)) + verifyctl get identitysources --limit 1 --page 1 -o "yaml"`)) ) type identitySourcesOptions struct { diff --git a/pkg/cmd/get/password_policy.go b/pkg/cmd/get/password_policy.go index 46e4fde..014db6f 100644 --- a/pkg/cmd/get/password_policy.go +++ b/pkg/cmd/get/password_policy.go @@ -33,10 +33,10 @@ verifyctl get passwordpolicy --entitlements`)) passwordPolicyExamples = templates.Examples(cmdutil.TranslateExamples(passwordPolicyMessagePrefix, ` # Get a specific password policy by ID -verifyctl get passwordpolicy -o=yaml --passwordPolicyID=testPasswordPolicyID +verifyctl get passwordpolicy -o "yaml" --passwordPolicyID "testPasswordPolicyID" # Get all policies - verifyctl get passwordpolicies -o=yaml + verifyctl get passwordpolicies -o "yaml" `)) ) diff --git a/pkg/cmd/get/personal_cert.go b/pkg/cmd/get/personal_cert.go index 8271c75..91e59f7 100644 --- a/pkg/cmd/get/personal_cert.go +++ b/pkg/cmd/get/personal_cert.go @@ -30,10 +30,10 @@ var ( personalCertExamples = templates.Examples(cmdutil.TranslateExamples(personalCertMessagePrefix, ` # Get a specific personal certificate by lable - verifyctl get personalCert -o=yaml --personalCertLabel=testpersonalCert + verifyctl get personalCert -o "yaml" --personalCertLabel "testpersonalCert" # Get all certificates - verifyctl get personalCerts -o=yaml `)) + verifyctl get personalCerts -o "yaml"`)) ) type personalCertOptions struct { diff --git a/pkg/cmd/get/signer_cert.go b/pkg/cmd/get/signer_cert.go index f8be2b0..85eaee5 100644 --- a/pkg/cmd/get/signer_cert.go +++ b/pkg/cmd/get/signer_cert.go @@ -30,10 +30,10 @@ var ( signerCertExamples = templates.Examples(cmdutil.TranslateExamples(signerCertMessagePrefix, ` # Get a specific Signer certificate by lable - verifyctl get signerCert -o=yaml --signerCertLabel=testsignerCert + verifyctl get signerCert -o "yaml" --signerCertLabel "testsignerCert" # Get all certificates - verifyctl get signerCerts -o=yaml + verifyctl get signerCerts -o "yaml" `)) ) diff --git a/pkg/cmd/get/themes.go b/pkg/cmd/get/themes.go index e10043a..7c5d354 100644 --- a/pkg/cmd/get/themes.go +++ b/pkg/cmd/get/themes.go @@ -34,13 +34,13 @@ You can identify the entitlement required by running: themesExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # List themes - verifyctl get themes --outfile=./themes.yaml --page=1 --limit=100 + verifyctl get themes --outfile "themes.yaml" --page 1 --limit 100 # Download a single theme as a zip file - verifyctl get theme --id=mythemeid --outfile=./theme.zip + verifyctl get theme --id "mythemeid" --outfile "theme.zip" # Download a single theme and uncompress it to a directory - verifyctl get theme --id=mythemeid --unpack --outdir=./mythemeid`)) + verifyctl get theme --id "mythemeid" --unpack --outdir "mythemeid"`)) ) type themesOptions struct { diff --git a/pkg/cmd/get/user.go b/pkg/cmd/get/user.go index b73e851..03f72da 100644 --- a/pkg/cmd/get/user.go +++ b/pkg/cmd/get/user.go @@ -33,10 +33,10 @@ You can identify the entitlement required by running: usersExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Get an user and print the output in yaml - verifyctl get user -o=yaml --userName=testUser + verifyctl get user -o "yaml" --userName "testUser" # Get 2 users based on a given search criteria and sort it in the ascending order by name. - verifyctl get users --count=2 --sort=userName -o=yaml`)) + verifyctl get users --count 2 --sort "userName" -o "yaml"`)) ) type usersOptions struct { diff --git a/pkg/cmd/replace/accesspolicy.go b/pkg/cmd/replace/accesspolicy.go index 7c0ac8d..5a1eed5 100644 --- a/pkg/cmd/replace/accesspolicy.go +++ b/pkg/cmd/replace/accesspolicy.go @@ -45,7 +45,7 @@ You can identify the entitlement required by running: verifyctl replace accesspolicy --boilerplate # Update a accessPolicy from a YAML file - verifyctl replace -f=./accesspolicy-12345.yaml`)) + verifyctl replace -f "accesspolicy.yaml"`)) ) type accessPolicyOptions struct { diff --git a/pkg/cmd/replace/api_client.go b/pkg/cmd/replace/api_client.go index 2f6b1ad..1e7250b 100644 --- a/pkg/cmd/replace/api_client.go +++ b/pkg/cmd/replace/api_client.go @@ -43,7 +43,7 @@ var ( verifyctl replace apiclient --boilerplate # Update an apiclient from a YAML file - verifyctl replace -f=./apiclient.yml`)) + verifyctl replace -f "apiclient.yml"`)) ) type apiclientOptions struct { diff --git a/pkg/cmd/replace/application.go b/pkg/cmd/replace/application.go index 6bbf369..e21f09c 100644 --- a/pkg/cmd/replace/application.go +++ b/pkg/cmd/replace/application.go @@ -41,7 +41,7 @@ var ( verifyctl replace application --boilerplate # Update an application from a YAML file - verifyctl replace application --applicationID 98765 -f "application2.yaml" + verifyctl replace application --applicationID "98765" -f "application2.yaml" `)) ) diff --git a/pkg/cmd/replace/attribute.go b/pkg/cmd/replace/attribute.go index 54a3a3e..d5970c3 100644 --- a/pkg/cmd/replace/attribute.go +++ b/pkg/cmd/replace/attribute.go @@ -46,7 +46,7 @@ You can identify the entitlement required by running: verifyctl replace attribute --boilerplate # Create an attribute using the API model in JSON format. - verifyctl replace -f=./customEmail.json`)) + verifyctl replace -f "customEmail.json"`)) ) type attributeOptions struct { diff --git a/pkg/cmd/replace/group.go b/pkg/cmd/replace/group.go index b01a14c..9ffca2a 100644 --- a/pkg/cmd/replace/group.go +++ b/pkg/cmd/replace/group.go @@ -46,7 +46,7 @@ You can identify the entitlement required by running: verifyctl replace group --boilerplate # Update a group from a JSON file - verifyctl replace -f=./group-12345.json`)) + verifyctl replace -f "group-12345.json"`)) ) type groupOptions struct { diff --git a/pkg/cmd/replace/identity_agent.go b/pkg/cmd/replace/identity_agent.go index effddea..397b6a7 100644 --- a/pkg/cmd/replace/identity_agent.go +++ b/pkg/cmd/replace/identity_agent.go @@ -46,7 +46,7 @@ You can identify the entitlement required by running: verifyctl replace identityagent --boilerplate # Update a identity agent from a YAML file - verifyctl replace -f=./identity_agent.yaml`)) + verifyctl replace -f "identity_agent.yaml"`)) ) type identityAgentOptions struct { diff --git a/pkg/cmd/replace/identity_provider.go b/pkg/cmd/replace/identity_provider.go index e2ecc0b..727eb53 100644 --- a/pkg/cmd/replace/identity_provider.go +++ b/pkg/cmd/replace/identity_provider.go @@ -47,7 +47,7 @@ You can identify the entitlement required by running: verifyctl replace identitysource --boilerplate # Update a identitySource from a JSON file - verifyctl replace identitysource --identitySourceID 1234 -f "identitySource.yaml"`)) + verifyctl replace identitysource --identitySourceID "1234" -f "identitySource.yaml"`)) ) type identitySourceOptions struct { diff --git a/pkg/cmd/replace/personal_cert.go b/pkg/cmd/replace/personal_cert.go index 077fecb..618d3ca 100644 --- a/pkg/cmd/replace/personal_cert.go +++ b/pkg/cmd/replace/personal_cert.go @@ -36,7 +36,7 @@ var ( # Generate an empty personalCert resource template verifyctl replace personalCert --boilerplate # Update a personal certificate from a YAML file - verifyctl replace -f=./personal_cert.yaml + verifyctl replace -f "personal_cert.yaml" `)) ) diff --git a/pkg/cmd/replace/replace.go b/pkg/cmd/replace/replace.go index 24eac7a..0048039 100644 --- a/pkg/cmd/replace/replace.go +++ b/pkg/cmd/replace/replace.go @@ -44,7 +44,7 @@ Certain resources may offer additional options and can be determined using: examples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Update an application - verifyctl replace -f=./app-1098012.json`)) + verifyctl replace -f "app.json"`)) entitlementsMessage = i18n.Translate("Choose any of the following entitlements to configure your application or API client:\n") ) diff --git a/pkg/cmd/replace/signInOptions.go b/pkg/cmd/replace/signInOptions.go index d3902e3..7fe9d33 100644 --- a/pkg/cmd/replace/signInOptions.go +++ b/pkg/cmd/replace/signInOptions.go @@ -38,7 +38,7 @@ var ( verifyctl replace --boilerplate # Update sign-in options for an identity provider from a YAML file - verifyctl replace -f=./signin-options.yaml`)) + verifyctl replace -f "signin-options.yaml"`)) ) type signInOptions struct { diff --git a/pkg/cmd/replace/user.go b/pkg/cmd/replace/user.go index 80e11ae..73ae2f9 100644 --- a/pkg/cmd/replace/user.go +++ b/pkg/cmd/replace/user.go @@ -46,7 +46,7 @@ You can identify the entitlement required by running: verifyctl replace user --boilerplate # Update a user from a JSON file - verifyctl replace -f=./user-12345.json`)) + verifyctl replace -f "user-12345.json"`)) ) type userOptions struct { diff --git a/pkg/cmd/set/set.go b/pkg/cmd/set/set.go index bf900ec..5cb0f0c 100644 --- a/pkg/cmd/set/set.go +++ b/pkg/cmd/set/set.go @@ -34,7 +34,7 @@ The flags supported by each resource type may differ and can be determined using examples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Set an application and write it to a file - verifyctl set application --file ./app-1098012.yaml`)) + verifyctl set application --file "app-1098012.yaml"`)) entitlementsMessage = i18n.Translate("Choose any of the following entitlements to configure your application or API client:\n") ) diff --git a/pkg/cmd/set/themes.go b/pkg/cmd/set/themes.go index a676dff..44e0b52 100644 --- a/pkg/cmd/set/themes.go +++ b/pkg/cmd/set/themes.go @@ -34,14 +34,14 @@ You can identify the entitlement required by running: themesExamples = templates.Examples(cmdutil.TranslateExamples(messagePrefix, ` # Update theme using a zip file - verifyctl set theme --id=mythemeid --file=./mytheme.zip + verifyctl set theme --id "mythemeid" --file "mytheme.zip" # Update theme by pointing at a directory with the theme directory structure, starting # with 'templates' directory - verifyctl set theme --id=mythemeid --dir=./mytheme + verifyctl set theme --id "mythemeid" --dir "mytheme" # Upload a theme template file - verifyctl set theme --id=mythemeid --file=./mylogo.png --path=common/logo/default/logo.png`)) + verifyctl set theme --id "mythemeid" --file "mylogo.png" --path "common/logo/default/logo.png"`)) ) type themesOptions struct { From 782cd06a7b3b06857810e335a0b9eaf0560d7a54 Mon Sep 17 00:00:00 2001 From: Sabuj Mondal Date: Fri, 22 Aug 2025 06:38:03 +0000 Subject: [PATCH 3/8] accepting case in sensitive application type --- pkg/cmd/create/application.go | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/pkg/cmd/create/application.go b/pkg/cmd/create/application.go index b7aa02f..0ed7392 100644 --- a/pkg/cmd/create/application.go +++ b/pkg/cmd/create/application.go @@ -4,6 +4,7 @@ import ( "encoding/json" "io" "os" + "strings" "github.com/ibm-verify/verify-sdk-go/pkg/config/applications" contextx "github.com/ibm-verify/verify-sdk-go/pkg/core/context" @@ -73,7 +74,7 @@ func newApplicationCommand(config *config.CLIConfig, streams io.ReadWriter) *cob func (o *applicationOptions) AddFlags(cmd *cobra.Command) { o.addCommonFlags(cmd, applicationResourceName) cmd.Flags().StringVarP(&o.file, "file", "f", "", i18n.Translate("Path to the yaml file containing application data")) - cmd.Flags().StringVarP(&o.applicationType, "applicationType", "t", "", i18n.Translate("Application type [OIDC, ACLC, SAML, BOOKMARK]")) + cmd.Flags().StringVarP(&o.applicationType, "applicationType", "t", "", i18n.Translate("Application type [oidc, aclc, saml, bookmark]")) } func (o *applicationOptions) Complete(cmd *cobra.Command, args []string) error { @@ -93,6 +94,7 @@ func (o *applicationOptions) Validate(cmd *cobra.Command, args []string) error { } func (o *applicationOptions) Run(cmd *cobra.Command, args []string) error { + o.applicationType = strings.ToLower(o.applicationType) if o.entitlements { cmdutil.WriteString(cmd, entitlementsMessage+" "+applicationEntitlements) return nil From 46c193af557dbff9d33da70464f754dde5ab609b Mon Sep 17 00:00:00 2001 From: Sabuj Mondal Date: Fri, 22 Aug 2025 07:31:11 +0000 Subject: [PATCH 4/8] updated help --- pkg/cmd/get/application.go | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/pkg/cmd/get/application.go b/pkg/cmd/get/application.go index 623722e..cd6fb44 100644 --- a/pkg/cmd/get/application.go +++ b/pkg/cmd/get/application.go @@ -31,7 +31,10 @@ var ( verifyctl get application -o=yaml --applicationID "testApplicationID" # Get 2 applications - verifyctl get applications --limit=2 --page=1 -o=yaml`)) + verifyctl get applications --limit=2 --page=1 -o=yaml + + # To sort applications [To sort results, supported values are 'name' and 'entityid'. Prepend the attribute with '+' or '-' sign for ascending and descending sorted order respectively. If not specified, sorted in ascending order on entityid. The entity id corresponds to application id] + verifyctl get applications --sort "-name"`)) ) type applicationsOptions struct { From cd3356ed774bdd75f6382474941e6dbc409b8ec7 Mon Sep 17 00:00:00 2001 From: Sabuj Mondal Date: Fri, 22 Aug 2025 10:55:01 +0000 Subject: [PATCH 5/8] added boilerplate for updating user --- pkg/cmd/replace/user.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkg/cmd/replace/user.go b/pkg/cmd/replace/user.go index 73ae2f9..3560f64 100644 --- a/pkg/cmd/replace/user.go +++ b/pkg/cmd/replace/user.go @@ -112,9 +112,9 @@ func (o *userOptions) Run(cmd *cobra.Command, args []string) error { resourceObj := &resource.ResourceObject{ Kind: resource.ResourceTypePrefix + "User", APIVersion: "2.0", - Data: &directory.User{ - ID: "", - UserName: "", + Data: &directory.UserPatchRequest{ + UserName: "", + SCIMPatchRequest: directory.UserPatchExample(), }, } From 263b9802c456fa8092422bd83305cd33a070238e Mon Sep 17 00:00:00 2001 From: Sabuj Mondal Date: Fri, 22 Aug 2025 17:15:46 +0000 Subject: [PATCH 6/8] user sorting changes --- pkg/cmd/get/get.go | 6 ++++-- pkg/cmd/get/user.go | 9 +++++---- 2 files changed, 9 insertions(+), 6 deletions(-) diff --git a/pkg/cmd/get/get.go b/pkg/cmd/get/get.go index abc9288..f3c33a3 100644 --- a/pkg/cmd/get/get.go +++ b/pkg/cmd/get/get.go @@ -51,8 +51,10 @@ type options struct { search string count string //properties string - id string - name string + id string + name string + sortBy string + sortOrder string config *config.CLIConfig } diff --git a/pkg/cmd/get/user.go b/pkg/cmd/get/user.go index 03f72da..c52cc2f 100644 --- a/pkg/cmd/get/user.go +++ b/pkg/cmd/get/user.go @@ -35,8 +35,8 @@ You can identify the entitlement required by running: # Get an user and print the output in yaml verifyctl get user -o "yaml" --userName "testUser" - # Get 2 users based on a given search criteria and sort it in the ascending order by name. - verifyctl get users --count 2 --sort "userName" -o "yaml"`)) + # Get 2 users and sort it in the [descending/ascending] order by userName. + verifyctl get users --count 2 --sortBy userName --sortOrder descending`)) ) type usersOptions struct { @@ -76,7 +76,8 @@ func NewUsersCommand(config *config.CLIConfig, streams io.ReadWriter) *cobra.Com func (o *usersOptions) AddFlags(cmd *cobra.Command) { o.addCommonFlags(cmd, userResourceName) cmd.Flags().StringVar(&o.name, "userName", o.name, i18n.Translate("userName to get details")) - o.addSortFlags(cmd, userResourceName) + cmd.Flags().StringVar(&o.sortBy, "sortBy", o.name, i18n.Translate("fieldName on which sorting would be applied")) + cmd.Flags().StringVar(&o.sortOrder, "sortOrder", o.name, i18n.Translate("sorting order")) o.addCountFlags(cmd, userResourceName) } @@ -152,7 +153,7 @@ func (o *usersOptions) handleSingleUser(cmd *cobra.Command, _ []string) error { func (o *usersOptions) handleUserList(cmd *cobra.Command, _ []string) error { c := directory.NewUserClient() - usrs, uri, err := c.GetUsers(cmd.Context(), o.sort, o.count) + usrs, uri, err := c.GetUsers(cmd.Context(), o.sortBy, o.sortOrder, o.count) if err != nil { return err } From ee73b78a4cb49dda1da694de130a3db1386994ae Mon Sep 17 00:00:00 2001 From: Sabuj Mondal Date: Fri, 22 Aug 2025 17:30:00 +0000 Subject: [PATCH 7/8] groups sorting changes --- pkg/cmd/get/group.go | 9 +++++---- pkg/cmd/get/user.go | 2 +- 2 files changed, 6 insertions(+), 5 deletions(-) diff --git a/pkg/cmd/get/group.go b/pkg/cmd/get/group.go index debd13f..d50ebaf 100644 --- a/pkg/cmd/get/group.go +++ b/pkg/cmd/get/group.go @@ -35,8 +35,8 @@ You can identify the entitlement required by running: # Get an group and print the output in yaml verifyctl get group -o "yaml" --displayName "admin" - # Get 2 groups based on a given search criteria and sort it in the ascending order by name. - verifyctl get groups --count 2 --sort "groupName" -o "yaml"`)) + # Get 2 groups and sort it in the [ascending/descending] order by id. + verifyctl get groups --count 2 --sortBy id --sortOrder descending`)) ) type groupsOptions struct { @@ -76,7 +76,8 @@ func NewGroupsCommand(config *config.CLIConfig, streams io.ReadWriter) *cobra.Co func (o *groupsOptions) AddFlags(cmd *cobra.Command) { o.addCommonFlags(cmd, groupResourceName) cmd.Flags().StringVar(&o.name, "displayName", o.name, i18n.Translate("Group displayName to get details")) - o.addSortFlags(cmd, groupResourceName) + cmd.Flags().StringVar(&o.sortBy, "sortBy", o.name, i18n.Translate("fieldName on which sorting would be applied")) + cmd.Flags().StringVar(&o.sortOrder, "sortOrder", o.name, i18n.Translate("sorting order")) o.addCountFlags(cmd, groupResourceName) } @@ -149,7 +150,7 @@ func (o *groupsOptions) handleSingleGroup(cmd *cobra.Command, _ []string) error func (o *groupsOptions) handleGroupList(cmd *cobra.Command, _ []string) error { c := directory.NewGroupClient() - grps, uri, err := c.GetGroups(cmd.Context(), o.sort, o.count) + grps, uri, err := c.GetGroups(cmd.Context(), o.sortBy, o.sortOrder, o.count) if err != nil { return err } diff --git a/pkg/cmd/get/user.go b/pkg/cmd/get/user.go index c52cc2f..9bbc8ee 100644 --- a/pkg/cmd/get/user.go +++ b/pkg/cmd/get/user.go @@ -35,7 +35,7 @@ You can identify the entitlement required by running: # Get an user and print the output in yaml verifyctl get user -o "yaml" --userName "testUser" - # Get 2 users and sort it in the [descending/ascending] order by userName. + # Get 2 users and sort it in the [ascending/descending] order by userName. verifyctl get users --count 2 --sortBy userName --sortOrder descending`)) ) From 56f10db661c5c66dc4207d2a759bfd17424b6934 Mon Sep 17 00:00:00 2001 From: Sabuj Mondal Date: Mon, 25 Aug 2025 06:56:20 +0000 Subject: [PATCH 8/8] help related changes --- pkg/cmd/create/create.go | 2 +- pkg/cmd/get/application.go | 7 ++++++- pkg/cmd/get/group.go | 2 +- pkg/cmd/replace/replace.go | 2 +- 4 files changed, 9 insertions(+), 4 deletions(-) diff --git a/pkg/cmd/create/create.go b/pkg/cmd/create/create.go index 2c449a1..93fee5d 100644 --- a/pkg/cmd/create/create.go +++ b/pkg/cmd/create/create.go @@ -15,7 +15,7 @@ import ( ) const ( - usage = "create -f FILENAME [options]" + usage = "create -f FILENAME" messagePrefix = "Create" ) diff --git a/pkg/cmd/get/application.go b/pkg/cmd/get/application.go index cd6fb44..9d029b4 100644 --- a/pkg/cmd/get/application.go +++ b/pkg/cmd/get/application.go @@ -33,7 +33,7 @@ var ( # Get 2 applications verifyctl get applications --limit=2 --page=1 -o=yaml - # To sort applications [To sort results, supported values are 'name' and 'entityid'. Prepend the attribute with '+' or '-' sign for ascending and descending sorted order respectively. If not specified, sorted in ascending order on entityid. The entity id corresponds to application id] + # To sort applications [To sort results, supported values are 'name' and 'applicationID'. Prepend the attribute with '+' or '-' sign for ascending and descending sorted order respectively. If not specified, sorted in ascending order on applicationID.] verifyctl get applications --sort "-name"`)) ) @@ -139,6 +139,11 @@ func (o *applicationsOptions) handleSingleApplicationClient(cmd *cobra.Command, func (o *applicationsOptions) handleApplicationClientList(cmd *cobra.Command, _ []string) error { c := applications.NewApplicationClient() + if o.sort == "+applicationID" { + o.sort = "+entityid" + } else if o.sort == "-applicationID" { + o.sort = "-entityid" + } appls, uri, err := c.GetApplications(cmd.Context(), o.search, o.sort, o.page, o.limit) if err != nil { return err diff --git a/pkg/cmd/get/group.go b/pkg/cmd/get/group.go index d50ebaf..ca2497c 100644 --- a/pkg/cmd/get/group.go +++ b/pkg/cmd/get/group.go @@ -77,7 +77,7 @@ func (o *groupsOptions) AddFlags(cmd *cobra.Command) { o.addCommonFlags(cmd, groupResourceName) cmd.Flags().StringVar(&o.name, "displayName", o.name, i18n.Translate("Group displayName to get details")) cmd.Flags().StringVar(&o.sortBy, "sortBy", o.name, i18n.Translate("fieldName on which sorting would be applied")) - cmd.Flags().StringVar(&o.sortOrder, "sortOrder", o.name, i18n.Translate("sorting order")) + cmd.Flags().StringVar(&o.sortOrder, "sortOrder", o.name, i18n.Translate("sorting order [ascending/descending]")) o.addCountFlags(cmd, groupResourceName) } diff --git a/pkg/cmd/replace/replace.go b/pkg/cmd/replace/replace.go index 0048039..9113b66 100644 --- a/pkg/cmd/replace/replace.go +++ b/pkg/cmd/replace/replace.go @@ -15,7 +15,7 @@ import ( ) const ( - usage = "replace -f=FILENAME [options]" + usage = "replace -f=FILENAME" messagePrefix = "Replace" )