in cmd/credentials.go [59:103]
func initCredentialsSubCommand(subCmd *cobra.Command) {
rootCmd.AddCommand(subCmd)
subCmd.PersistentFlags().StringVar(&roleArnStr, "role-arn", "", "Target role to assume")
subCmd.PersistentFlags().StringVar(&profileArnStr, "profile-arn", "", "Profile to pull policies from")
subCmd.PersistentFlags().StringVar(&trustAnchorArnStr, "trust-anchor-arn", "", "Trust anchor to use for authentication")
subCmd.PersistentFlags().IntVar(&sessionDuration, "session-duration", 3600, "Duration, in seconds, for the resulting session")
subCmd.PersistentFlags().StringVar(®ion, "region", "", "Signing region")
subCmd.PersistentFlags().StringVar(&endpoint, "endpoint", "", "Endpoint used to call CreateSession")
subCmd.PersistentFlags().BoolVar(&noVerifySSL, "no-verify-ssl", false, "To disable SSL verification")
subCmd.PersistentFlags().BoolVar(&withProxy, "with-proxy", false, "To make the CreateSession call with a proxy")
subCmd.PersistentFlags().BoolVar(&debug, "debug", false, "To print debug output")
subCmd.PersistentFlags().StringVar(&certificateId, "certificate", "", "Path to certificate file")
subCmd.PersistentFlags().StringVar(&privateKeyId, "private-key", "", "Path to private key file")
subCmd.PersistentFlags().StringVar(&certificateBundleId, "intermediates", "", "Path to intermediate certificate bundle file")
subCmd.PersistentFlags().StringVar(&certSelector, "cert-selector", "", "JSON structure to identify a certificate from a certificate store. "+
"Can be passed in either as string or a file name (prefixed by \"file://\")")
subCmd.PersistentFlags().StringVar(&systemStoreName, "system-store-name", "MY", "Name of the system store to search for within the "+
"CERT_SYSTEM_STORE_CURRENT_USER context. Note that this flag is only relevant for Windows certificate stores and will be ignored otherwise")
subCmd.PersistentFlags().BoolVar(&useLatestExpiringCertificate, "use-latest-expiring-certificate", false, "If multiple certificates match "+
"a given certificate selector, the one that expires the latest will be chosen (if more than one still fits this criteria, an arbitrary "+
"one is chosen from those that meet the criteria)")
subCmd.PersistentFlags().StringVar(&libPkcs11, "pkcs11-lib", "", "Library for smart card / cryptographic device (OpenSC or vendor specific)")
subCmd.PersistentFlags().BoolVar(&reusePin, "reuse-pin", false, "Use the CKU_USER PIN as the CKU_CONTEXT_SPECIFIC PIN for "+
"private key objects, when they are first used to sign. If the CKU_USER PIN doesn't work as the CKU_CONTEXT_SPECIFIC PIN "+
"for a given private key object, fall back to prompting the user")
subCmd.PersistentFlags().StringVar(&tpmKeyPassword, "tpm-key-password", "", "Password for TPM key, if applicable")
subCmd.PersistentFlags().BoolVar(&noTpmKeyPassword, "no-tpm-key-password", false, "Required if the TPM key has no password and"+
"a handle is used to refer to the key")
subCmd.PersistentFlags().StringVar(&roleSessionName, "role-session-name", "", "An identifier of a role session")
subCmd.MarkFlagsMutuallyExclusive("certificate", "cert-selector")
subCmd.MarkFlagsMutuallyExclusive("certificate", "system-store-name")
subCmd.MarkFlagsMutuallyExclusive("private-key", "cert-selector")
subCmd.MarkFlagsMutuallyExclusive("private-key", "system-store-name")
subCmd.MarkFlagsMutuallyExclusive("private-key", "use-latest-expiring-certificate")
subCmd.MarkFlagsMutuallyExclusive("use-latest-expiring-certificate", "intermediates")
subCmd.MarkFlagsMutuallyExclusive("use-latest-expiring-certificate", "reuse-pin")
subCmd.MarkFlagsMutuallyExclusive("cert-selector", "intermediates")
subCmd.MarkFlagsMutuallyExclusive("cert-selector", "reuse-pin")
subCmd.MarkFlagsMutuallyExclusive("system-store-name", "reuse-pin")
subCmd.MarkFlagsMutuallyExclusive("tpm-key-password", "cert-selector")
subCmd.MarkFlagsMutuallyExclusive("tpm-key-password", "reuse-pin")
subCmd.MarkFlagsMutuallyExclusive("no-tpm-key-password", "cert-selector")
subCmd.MarkFlagsMutuallyExclusive("no-tpm-key-password", "tpm-key-password")
}