akv-cli 0.10.1

The Azure Key Vault CLI (unofficial) can read secrets from Key Vault, securely pass secrets to other commands or inject them into configuration files, encrypt and decrypt secrets, and managed keys and secrets in Key Vault.
Documentation
# Azure Key Vault CLI (Unofficial)

[![releases](https://img.shields.io/github/v/release/heaths/akv-cli-rs.svg?logo=github)](https://github.com/heaths/akv-cli-rs/releases/latest)
[![ci](https://github.com/heaths/akv-cli-rs/actions/workflows/ci.yml/badge.svg?event=push)](https://github.com/heaths/akv-cli-rs/actions/workflows/ci.yml)

The Azure Key Vault CLI can be used to read and decrypt secrets, pass them securely to other commands, or inject them into configuration files.

## Installation

You can install prebuilt binaries or build from source.

### Linux and macOS

Use [Homebrew] to install binaries for most macOS and Linux platforms.
You first need to install the tap, but only the first time:

```bash
brew tap heaths/tap
```

Once the tap is installed, you can install or update the `akv` formula:

```bash
brew install akv
```

### Windows

Use [Winget] to install binaries for Windows:

```pwsh
winget install heaths.akv
```

### Build from source

If you have [Rust] installed, you can also build the CLI on nearly any platform:

```bash
cargo install --locked akv-cli
```

## Using

Inspired by the [1Password CLI], you can use similar commands to read and decrypt secrets and from [Azure Key Vault].
Though the crate is named `akv-cli`, note that the actual program is named `akv`.

Some arguments can read environment variables, e.g., `--vault` which reads from `AZURE_KEYVAULT_URL`.
This information can be found in `--help` for commands. This makes it easy to pass just the secret name e.g.,

```bash
export AZURE_KEYVAULT_URL=https://my-vault.vault.azure.net

akv secret list
akv read --name my-secret
```

Environment variables can be read from `.env` files created by the [Azure Developer CLI],
or from any `.env` file found in ancestor directories.

### Injecting secrets

You can read a templated file or from stdin to inject secrets into the stream.
Any secret ID e.g., `https://my-vault.vault.azure.net/secrets/my-secret` between `{{ }}` will be replaced, if it exists.

```bash
echo "my-secret: {{ https://my-vault.vault.azure.net/secrets/my-secret }}" | akv inject
```

You can also read from stdin, or from files using `--in-file` e.g.,

```bash
cat <<'EOF' | akv inject -o config.json
{
    "token": "{{ https://my-vault.vault.azure.net/secrets/my-secret/746984e474594896aad9aff48aca0849 }}"
}
EOF
```

### Reading a secret

You can pass secrets to terminal applications, though how exactly depends on your shell. For bash,

```bash
cargo login $(akv read https://my-vault.vault.azure.net/secrets/my-secret)
```

Note that secrets in Key Vault are versioned. The example above reads the latest version, but you can also read any version.
It's often important to refer to a specific version until you're ready to rotate to a new secret.

```bash
akv read https://my-vault.vault.azure.net/secrets/my-secret/746984e474594896aad9aff48aca0849
```

### Passing secrets to new processes

You can start a process that reads environment variables containing URLs to secrets or compact JSON Web Encryption (JWE) tokens instead of keeping secrets in environment variables that any process can read.

Environment variables can contain only a URL to a secret or compact JWE.
Secrets read or decrypted from Azure Key Vault will be masked in stdout and stderr unless you pass `--no-masking`.

```bash
export SECRET_VAR=https://my-vault.vault.azure.net/secrets/my-secret

akv run -- printenv SECRET_VAR
akv run --no-masking -- printenv SECRET_VAR
```

### Encrypting and decrypting secrets

You can encrypt secrets to store as compact JSON Web Encryption (JWE) tokens.
A content encryption key (CEK) is generated and encrypted (wrapped) by Key Vault.
The CEK is used to encrypt your secrets, and the encrypted CEK along with the full key ID including the version
are encoded within the compact JWE.

```bash
export AZURE_KEYVAULT_URL=https://my-vault.vault.azure.net

JWE=$(akv encrypt --name my-key 'plaintext')
akv decrypt $JWE
```

If you do not pass a `--version`, the latest key version is used to encrypt; however,
the full key ID including the version used is encoded to make sure that you can decrypt your data
even if your key has been rotated.

You can also encrypt files. Pass a path to `--in-file` or `-` to read from `stdin`.
Note that if you encrypt binary data, you cannot decrypt it to `stdout` but can write it to a file using `decrypt --out-file`.

### Managing secrets

You can create, get, edit, and list secrets e.g.,

```bash
akv secret list --vault https://my-vault.vault.azure.net
```

Read complete usage using `--help`:

```bash
akv secret --help
```

### Managing keys

You can create, get, edit, and list keys e.g.,

```bash
akv key list --vault https://my-vault.vault.azure.net
```

### Managing certificates

You can create, get, edit, and list certificates, as well as get and edit certificate policies e.g.,

```bash
akv certificate list --vault https://my-vault.vault.azure.net
```

To read and edit the certificate policy for the next rotation:

```bash
akv certificate get-policy --name my-cert --vault https://my-vault.vault.azure.net
akv certificate edit-policy --name my-cert --vault https://my-vault.vault.azure.net \
    --reuse-key --validity 3
```

### Output format

Commands that display resources such as `secret list`, `key get`, or `certificate list-versions` support `--output` to control the output format:

- `--output default` — displays a formatted table or key-value summary (the default).
- `--output json` — prints the raw JSON response for scripting or inspection.

For example:

```bash
akv secret list --vault https://my-vault.vault.azure.net --output json
akv key get --name my-key --vault https://my-vault.vault.azure.net --output json
```

### Colors

When the `color` feature is enabled (the default), JSON output and tables are colorized.
You can control color output with the `--color` flag (`always`, `never`, or `auto`).

JSON colors are configured using the `JQ_COLORS` environment variable, using the same format as [`jq`][jq-colors].
If you already have `JQ_COLORS` configured for `jq`, `akv` will use the same colors automatically.

The format is 8 colon-separated `style;color` pairs:

```text
null:false:true:number:string:array:object:object-key
```

For example, the default is equivalent to:

```bash
export JQ_COLORS="0;90:0;39:0;39:0;39:0;32:1;39:1;39:1;34"
```

[jq-colors]: https://jqlang.org/manual/#colors

## Background

Though still a work in progress, inspiration was derived from the [1Password CLI].
As the previous primary developer on the [Azure Key Vault SDK for .NET](https://github.com/Azure/azure-sdk-for-net)
and current primary developer on the [Azure SDK for Rust](https://github.com/Azure/azure-sdk-for-rust) - including Key Vault -
I wanted to make something useful to test our initial prerelease of the Rust class libraries.

## License

Licensed under the [MIT](LICENSE.txt) license.

[1Password CLI]: https://developer.1password.com/docs/cli/
[Azure Developer CLI]: https://aka.ms/azure-dev
[Azure Key Vault]: https://azure.microsoft.com/products/key-vault/
[Homebrew]: https://brew.sh
[Rust]: https://www.rust-lang.org/tools/install
[Winget]: https://github.com/microsoft/winget-cli