kvault
v0.2.0
Published
CLI for HashiCorp Vault Key/Value V2 secret engines
Downloads
9
Maintainers
Readme
Vault CLI (kvault)
kvault is a CLI for managing HashiCorp Vault Key/Value V2 secret engines from the command line.
📦 Installation
npx kvault --help # Or bunx kvault --help
Make it global
npm install --global kvault
📖 Usage
Usage: kvault [options] [command]
Manage your HashiCorp Vault Key/Value v2 secret engines from the command line.
Author: Shahrad Elahi <[email protected]> (https://github.com/shahradelahi)
License: GPL-3.0
Options:
-v, --version display the version number
-h, --help display help for command
Commands:
make-profile [options] <name> Create a new vault profile
mount [options] <mount-path> Mount a new KV2 secret engine
pipe [options] <secrets-path> [command...] Pull an environment from Vault and pipe it to a command
push [options] <env-file> <secrets-path> Push an environment to Vault
pull [options] <secrets-path> Pull an environment from Vault
rm [options] <secrets-path> [versions...] Remove a secret from Vault
seal [options] Seal Vault
unmount [options] <mount-path> Unmount a secret engine
unseal [options] [keys...] Unseal Vault
help [command] display help for command
make-profile
This command will create a profile in your home directory. It will be used to store your Vault's address and token.
Options
Usage: kvault make-profile [options] <name>
Create a new vault profile
Options:
--endpoint-url <endpoint-url> Vault endpoint URL
--token <vault-token> Vault token
--force Overwrite existing profile (default: false)
-h, --help display help for command
Examples
# Create a new profile
kvault make-profile my-profile --endpoint-url https://vault.example.com --token my-token
push
This command will push a secret to your Vault.
Options
Usage: kvault push [options] <env-file> <secrets-path>
Push an environment to Vault
Options:
-P, --profile <name> Name of the profile to use.
--endpoint-url <endpoint-url> Vault endpoint URL
--token <vault-token> Vault token
--cwd <cwd> Current working directory (default: ".")
--force Write to Vault even if the secrets are in conflict (default: false)
-h, --help display help for command
Examples
# Push a .env.local file to Vault
kvault push --profile my-profile .env.local secret/my-app
# Use credentials instead of a profile
kvault push --endpoint-url https://vault.example.com --token my-token .env.local secret/my-app
pull
This command will pull a secret from your Vault.
Options
Usage: kvault pull [options] <secrets-path>
Pull an environment from Vault
Options:
-P, --profile <name> Name of the profile to use.
--endpoint-url <endpoint-url> Vault endpoint URL
--token <vault-token> Vault token
-O, --output-file <output-path> Path to write the environment file to
-F, --format <format> Format of the environment file (default: "dotenv")
--cwd <cwd> Current working directory (default: ".")
--force Write environment file even if it exists (default: false)
-h, --help display help for command
Examples
# Pull a secret from Vault
kvault pull --profile my-profile secret/my-app
# Pull a secret from Vault and save it to a .env file
kvault pull --profile my-profile secret/my-app --env-path .env
# Pull a secret from Vault and add them to shell environment
kvault pull --profile my-profile secret/my-app --format shell | grep -e '^export' | source /dev/stdin
pipe
This command will pull and pipe secrets from your Vault to another command.
Options
Usage: kvault pipe [options] <secrets-path> [command...]
Pull an environment from Vault and pipe it to a command
Arguments:
secrets-path
command Command to pipe to (default: [])
Options:
-P, --profile <name> Name of the profile to use.
--endpoint-url <endpoint-url> Vault endpoint URL
--token <vault-token> Vault token
--cwd <cwd> Current working directory (default: ".")
-h, --help display help for command
Examples
# Pull a secret from Vault and pipe it to a command
kvault pipe --profile my-profile secret/my-app env | grep -e '^MY_APP_'
# Pull a secret from Vault and pipe it to a node script
kvault pipe --profile my-profile secret/my-app "node -e 'console.log(process.env.MY_APP_SECRET)'"
rm
This command will remove a path or some versions of a secret.
Options
Usage: kvault rm [options] <secrets-path> [versions...]
Remove a secret from Vault
Arguments:
secrets-path
versions Versions to remove. By default, path will be removed. (default: [])
Options:
-P, --profile <name> Name of the profile to use
--endpoint-url <endpoint-url> Vault endpoint URL
--token <vault-token> Vault token
--force Remove the secret without confirmation (default: false)
-h, --help display help for command
Examples
# Remove a path secret from Vault
kvault rm --profile my-profile secret/my-app
# Remove a secret version from Vault
kvault rm --profile my-profile secret/my-app 3 4
🤝 Contributing
Want to contribute? Awesome! To show your support is to star the project, or to raise issues on GitHub.
Thanks again for your support, it is much appreciated!