@toani/vault-cli
v0.0.3
Published
Toani Vault CLI
Readme
@toani/vault-cli
Toani Vault npm CLI package.
- Package:
@toani/vault-cli - Executable:
toani
Install
npm install -g @toani/vault-cliConfigure
Recommended CLI bootstrap:
- Sign in to the web app.
- Open
Profile -> Automation Access. - Create an automation token for your tenant scopes.
- Configure the CLI with that token:
toani config init --url https://dev-credbridge.bitkinetic.com/ --token <AUTOMATION_TOKEN>Config is stored at ~/.toani/config.json with fields:
baseUrltokencurrentTenantIdcurrentProfileprofilesoutput(tableorjson)timeout
Token resolution priority:
- explicit
--token - active profile
token - env
TOANI_VAULT_TOKEN
Base URL resolution priority:
- explicit
--base-url - env
TOANI_BASE_URL - env
CREDBRIDGE_BASE_URL config.baseUrl- default
https://dev-credbridge.bitkinetic.com/
Commands
toani auth status
toani auth use-tenant <tenant-id>
toani auth token create --name <name> --scope <scope1,scope2> [--ttl-seconds 900] [--save]
toani auth token list
toani auth token get <token-id>
toani auth token revoke <token-id>
toani auth access-token create --scope <scope1,scope2> [--ttl-seconds 900] [--store]
toani auth access-token revoke --token-id <id>
toani auth me
toani auth memberships
toani auth logout
toani credentials list [--service-id <id>] [--credential-type <type>]
toani credentials get <credentialId>
toani credentials create --service-id <id> --credential-type <type> --data '{"k":"v"}'
toani credentials delete <credentialId>
toani credentials decrypt <credentialId> [--reason <text>]
toani tokens create [--expires-in 3600] [--scope credential:read]
toani tokens list
toani tokens get <token-id>
toani tokens verify [--token <token>]
toani tokens stats
toani tokens revoke [--token-id <id>]
toani service-accounts create --name <name> --scope <scope1,scope2> [--description <text>]
toani service-accounts list
toani service-accounts get <id>
toani service-accounts update <id> [--name <name>] [--description <text>] [--status <active|disabled|deleted>] [--scope <scope1,scope2>]
toani service-accounts token create <service-account-id> --scope <scope1,scope2> [--ttl-seconds 3600] [--display-name <name>]
toani service-accounts token list <service-account-id>
toani sandbox create-session --service-id <service> --original-intent <intent> [--credential-id <id>] [--start-url <url>]
toani sandbox list-sessions
toani sandbox get-session <sessionId>
toani sandbox terminate <sessionId>
toani sandbox execute <sessionId> --operation-type <type> [--params '{"selector":"#btn"}']
toani sandbox get-operation <operationId>
toani sandbox stats
toani audit logs [--from <iso>] [--to <iso>] [--action <name>] [--service <name>] [--outcome <ok|error>] [--limit 50]
toani audit export [--format json|csv] [--from <iso>] [--to <iso>]
toani audit verify [--payload '{"log_id":"..."}']
toani config show
toani config set <key> <value>
toani config get <key>
toani config profile create <name>
toani config profile use <name>
toani config profile showNotes
auth logoutis local-only and clears the configured bearer token.auth token create --savewrites the created automation token into the active profile.- CLI integrations only use bearer tokens. Browser-side Privy/session flows are not exposed as CLI commands.
automation token,access token, andservice account tokenall use the sameBearercall pattern in the CLI.
