diff --git a/cli/packages/cmd/secrets.go b/cli/packages/cmd/secrets.go index f2f6940751..305a1f0fd2 100644 --- a/cli/packages/cmd/secrets.go +++ b/cli/packages/cmd/secrets.go @@ -7,6 +7,7 @@ import ( "crypto/sha256" "encoding/base64" "fmt" + "os" "regexp" "sort" "strings" @@ -204,8 +205,10 @@ var secretsSetCmd = &cobra.Command{ // decrypt workspace key plainTextEncryptionKey := crypto.DecryptAsymmetric(encryptedWorkspaceKey, encryptedWorkspaceKeyNonce, encryptedWorkspaceKeySenderPublicKey, currentUsersPrivateKey) + infisicalTokenEnv := os.Getenv(util.INFISICAL_TOKEN_NAME) + // pull current secrets - secrets, err := util.GetAllEnvironmentVariables(models.GetAllSecretsParameters{Environment: environmentName, SecretsPath: secretsPath}, "") + secrets, err := util.GetAllEnvironmentVariables(models.GetAllSecretsParameters{Environment: environmentName, SecretsPath: secretsPath, InfisicalToken: infisicalTokenEnv}, "") if err != nil { util.HandleError(err, "unable to retrieve secrets") } diff --git a/cli/packages/util/secrets.go b/cli/packages/util/secrets.go index bedd775724..27f0636a90 100644 --- a/cli/packages/util/secrets.go +++ b/cli/packages/util/secrets.go @@ -307,10 +307,6 @@ func FilterSecretsByTag(plainTextSecrets []models.SingleEnvironmentVariable, tag } func GetAllEnvironmentVariables(params models.GetAllSecretsParameters, projectConfigFilePath string) ([]models.SingleEnvironmentVariable, error) { - if params.InfisicalToken == "" { - params.InfisicalToken = os.Getenv(INFISICAL_TOKEN_NAME) - } - isConnected := CheckIsConnectedToInternet() var secretsToReturn []models.SingleEnvironmentVariable // var serviceTokenDetails api.GetServiceTokenDetailsResponse