Use the Hubstaff CLI from KosmoKrator to call Hubstaff tools headlessly, return JSON, inspect schemas, and automate workflows from coding agents, scripts, and CI.
Hubstaff can be configured headlessly with `kosmokrator integrations:configure hubstaff`.
# Install KosmoKrator first if it is not available on PATH.curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash# Configure and verify this integration.kosmokrator integrations:configure hubstaff --set access_token="$HUBSTAFF_ACCESS_TOKEN" --enable --read allow --write ask --jsonkosmokrator integrations:doctor hubstaff --jsonkosmokrator integrations:status --json
Credentials
Authentication type: Bearer tokenbearer_token. Configure credentials once, then use the same stored profile from
scripts, coding CLIs, Lua code mode, and the MCP gateway.
Key
Env var
Type
Required
Label
access_token
HUBSTAFF_ACCESS_TOKEN
Secret secret
yes
Access Token
url
HUBSTAFF_URL
URL url
no
API Base URL
Call Hubstaff Headlessly
Use the generic call form when another coding CLI or script needs a stable universal interface.
Every function below can be called headlessly. The generic form is stable across all integrations;
the provider shortcut is shorter but specific to Hubstaff.
hubstaff.hubstaff_list_time_entries
Read read
List time entries from Hubstaff. Supports filtering by date range, user IDs, and project ID. Returns tracked time entries with duration, notes, and associated project/user information.
Use these parameter tables when building CLI payloads without calling integrations:schema first.
hubstaff.hubstaff_list_time_entries
List time entries from Hubstaff. Supports filtering by date range, user IDs, and project ID. Returns tracked time entries with duration, notes, and associated project/user information.
Headless calls still follow the integration read/write permission policy. Configure read/write defaults
with integrations:configure. Add --force only for trusted automation that should bypass that policy.