KosmoKrator

productivity

HashiCorp Vault CLI for CI

Use the HashiCorp Vault CLI for CI with headless JSON commands, schema discovery, credentials, and permission controls.

7 functions 5 read 2 write API token auth

HashiCorp Vault CLI for CI

Run integration calls from CI jobs with JSON output, explicit credentials, and predictable exit status.

Use this shape when a pipeline needs to read or update an external service. The HashiCorp Vault CLI uses the same integration registry as the TUI, Lua runtime, and MCP gateway, but returns predictable command output for automation.

Command Shape

# HashiCorp Vault CLI for CI
kosmokrator integrations:configure vault --set token="$VAULT_TOKEN" --enable --read allow --write ask --json
kosmo integrations:call vault.vault_list_secrets '{"engine_path":"example_engine_path","path":"example_path"}' --json

Discovery Before Execution

Agents and scripts can inspect HashiCorp Vault docs and schemas before choosing a function.

kosmo integrations:docs vault --json
kosmo integrations:docs vault.vault_list_secrets --json
kosmo integrations:schema vault.vault_list_secrets --json
kosmo integrations:search "HashiCorp Vault" --json
kosmo integrations:list --json

Useful HashiCorp Vault CLI Functions

FunctionTypeParametersDescription
vault.vault_list_secrets Read engine_path, path List secrets at a given path in a HashiCorp Vault KV v2 secrets engine. Returns the keys (directory entries) at the specified path.
vault.vault_get_secret Read path, engine_path, version Get the latest version of a secret from a HashiCorp Vault KV v2 secrets engine. Optionally specify a version number to retrieve a specific version.
vault.vault_create_secret Write path, data, engine_path Create or update a secret in a HashiCorp Vault KV v2 secrets engine. Provide the secret path and a key-value data object.
vault.vault_delete_secret Write path, engine_path Permanently delete all versions and metadata of a secret from a HashiCorp Vault KV v2 secrets engine. This action is irreversible.
vault.vault_list_policies Read none List all ACL policies configured in HashiCorp Vault. Returns an array of policy names.
vault.vault_get_policy Read name Get details of a specific ACL policy in HashiCorp Vault, including its name and HCL rules.
vault.vault_get_current_user Read none Look up the current Vault token's information, including display name, policies, TTL, and metadata.

Automation Notes

Related HashiCorp Vault CLI Pages