forked from TrueCloudLab/rclone
obscure: write more help as we are referencing it elsewhere
This commit is contained in:
parent
a4f1f3d4e8
commit
4c7f7582fd
1 changed files with 15 additions and 1 deletions
|
@ -14,7 +14,21 @@ func init() {
|
||||||
|
|
||||||
var commandDefinition = &cobra.Command{
|
var commandDefinition = &cobra.Command{
|
||||||
Use: "obscure password",
|
Use: "obscure password",
|
||||||
Short: `Obscure password for use in the rclone.conf`,
|
Short: `Obscure password for use in the rclone config file`,
|
||||||
|
Long: `In the rclone config file, human readable passwords are
|
||||||
|
obscured. Obscuring them is done by encrypting them and writing them
|
||||||
|
out in base64. This is **not** a secure way of encrypting these
|
||||||
|
passwords as rclone can decrypt them - it is to prevent "eyedropping"
|
||||||
|
- namely someone seeing a password in the rclone config file by
|
||||||
|
accident.
|
||||||
|
|
||||||
|
Many equally important things (like access tokens) are not obscured in
|
||||||
|
the config file. However it is very hard to shoulder surf a 64
|
||||||
|
character hex token.
|
||||||
|
|
||||||
|
If you want to encrypt the config file then please use config file
|
||||||
|
encryption - see [rclone config](/commands/rclone_config/) for more
|
||||||
|
info.`,
|
||||||
Run: func(command *cobra.Command, args []string) {
|
Run: func(command *cobra.Command, args []string) {
|
||||||
cmd.CheckArgs(1, 1, command, args)
|
cmd.CheckArgs(1, 1, command, args)
|
||||||
cmd.Run(false, false, command, func() error {
|
cmd.Run(false, false, command, func() error {
|
||||||
|
|
Loading…
Reference in a new issue