Skip to content

Commit 9a0ade9

Browse files
committed
fix: do not intercept the org command line flag
This flag is handled by the platform (GAF). Declaring it here intercepts it and prevents the configuration from being initialized properly.
1 parent 29c7d0e commit 9a0ade9

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

internal/flags/flags.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,6 @@ func OSTestFlagSet() *pflag.FlagSet {
106106
flagSet.Bool(FlagFailFast, false, "Stop scanning after the first vulnerability is found when used with --all-projects.")
107107
flagSet.Bool(FlagPrintDeps, false, "Print the dependency tree before sending it for analysis.")
108108
flagSet.Bool(FlagPrintDepPaths, false, "Display dependencies. Shows what files contributed to each dependency.")
109-
flagSet.String(FlagOrg, "", "Specify the <ORG_ID> to run Snyk commands tied to a specific organization.")
110109
flagSet.Bool(FlagIgnorePolicy, false, "Ignore all set policies, the current policy in the .snyk file, Org level ignores, and the project policy on snyk.io.")
111110
flagSet.Bool(FlagTrustPolicies, false, "Apply and use ignore rules from the Snyk policies in your dependencies.")
112111
flagSet.String(FlagShowVulnerablePaths, "", "Display the dependency paths from the top level dependencies down to the vulnerable packages.")

0 commit comments

Comments
 (0)