diff --git a/command/certificate/create.go b/command/certificate/create.go index 9494bdda5..ba6699c10 100644 --- a/command/certificate/create.go +++ b/command/certificate/create.go @@ -41,14 +41,15 @@ func createCommand() cli.Command { Action: command.ActionFunc(createAction), Usage: "create a certificate or certificate signing request", UsageText: `**step certificate create** -[**--kms**=] [**--csr**] [**--profile**=] -[**--template**=] [**--set**=] [**--set-file**=] -[**--not-before**=] [**--not-after**=] -[**--password-file**=] [**--ca**=] -[**--ca-key**=] [**--ca-password-file**=] -[**--ca-kms**=] [**--san**=] [**--bundle**] [**--key**=] [**--kty**=] [**--curve**=] [**--size**=] -[**--skip-csr-signature**] [**--no-password**] [**--insecure**]`, +[**--csr**] [**--profile**=] [**--template**=] +[**--set**=] [**--set-file**=] +[**--not-before**=] [**--not-after**=] [**--san**=] +[**--ca**=] [**--ca-kms**=] +[**--ca-key**=] [**--ca-password-file**=] +[**--kms**=] [**--key**=] [**--password-file**=] +[**--bundle**] [**--skip-csr-signature**] +[**--no-password**] [**--subtle**] [**--insecure**]`, Description: `**step certificate create** generates a certificate or a certificate signing request (CSR) that can be signed later using 'step certificate sign' (or some other tool) to produce a certificate. @@ -347,7 +348,7 @@ $ step certificate create \ --profile intermediate-ca \ --ca-kms 'pkcs11:module-path=/usr/local/lib/softhsm/libsofthsm2.so;token=smallstep?pin-value=password' --ca root_ca.crt --ca-key 'pkcs11:id=4000' \ - --kms 'pkcs11:module-path=/usr/local/lib/softhsm/libsofthsm2.so;token=smallstep?pin-value=password' \ + --kms 'pkcs11:module-path=/usr/local/lib/softhsm/libsofthsm2.so;token=smallstep?pin-value=password' \ --key 'pkcs11:id=4001' \ 'My KMS Intermediate' intermediate_ca.crt ''' @@ -355,27 +356,29 @@ $ step certificate create \ Create an intermediate certificate for an RSA decryption key in Google Cloud KMS, signed by a root stored on disk, using : ''' $ step certificate create \ - --profile intermediate-ca \ - --ca root_ca.crt --ca-key root_ca_key \ - --kms cloudkms: \ + --profile intermediate-ca \ + --ca root_ca.crt --ca-key root_ca_key \ + --kms cloudkms: \ --key 'projects/myProjectID/locations/global/keyRings/myKeyRing/cryptoKeys/myKey/cryptoKeyVersions/1' \ --skip-csr-signature \ - 'My RSA Intermediate' intermediate_rsa_ca.crt + 'My RSA Intermediate' intermediate_rsa_ca.crt ''' Create an intermediate certificate for an RSA signing key in Google Cloud KMS, signed by a root stored in an HSM, using : ''' $ step certificate create \ - --profile intermediate-ca \ + --profile intermediate-ca \ --ca-kms 'pkcs11:module-path=/usr/local/lib/softhsm/libsofthsm2.so;token=smallstep?pin-value=password' \ - --ca root_ca.crt --ca-key 'pkcs11:id=4000' \ - --kms cloudkms: \ + --ca root_ca.crt --ca-key 'pkcs11:id=4000' \ + --kms cloudkms: \ --key 'projects/myProjectID/locations/global/keyRings/myKeyRing/cryptoKeys/myKey/cryptoKeyVersions/1' \ - 'My RSA Intermediate' intermediate_rsa_ca.crt + 'My RSA Intermediate' intermediate_rsa_ca.crt ''' `, Flags: []cli.Flag{ - flags.KMSUri, + flags.KTY, + flags.Size, + flags.Curve, cli.BoolFlag{ Name: "csr", Usage: `Generate a certificate signing request (CSR) instead of a certificate.`, @@ -407,14 +410,34 @@ $ step certificate create \ flags.TemplateSet, flags.TemplateSetFile, cli.StringFlag{ - Name: "password-file", - Usage: `The path to the containing the password to -encrypt the new private key or decrypt the user submitted private key.`, + Name: "not-before", + Usage: `The set in the NotBefore property of the certificate. If a +