Skip to content
| Marketplace
Sign in
Azure DevOps>Azure Pipelines>Vault AWS Auth
Vault AWS Auth

Vault AWS Auth

chriswylim

|
40 installs
| (0) | Free
Extended from Fizcko Vault extension, this will find/replace token in files instead of variables, and enabled aws authentication. All credits goes to original author.
Get it free

Vault Interaction

This extension provide the ability to interact with HashiCorp Vault.

Authentication methods available

  • AppRole
  • Azure
  • Client Token
  • LDAP
  • Radius
  • Username & Password

Utilities

  • Vault - Read KV secrets

    Provide the ability to read KV secrets from HashiCorp Vault and load them into variables.

    Note

    The field « Secret path » have to ends with a « / » if you want to discover secrets across current folder and his subfolders. See Use case 2. In discovery mode if the « Prefix type » is set to « None » or « Custom » and you have secrets with the same name in different folder the last value read will be set in the variable (erasing previus values).

    Examples

    For the examples the following folder structure is created.

    Tree

    « ALM » is a KV v2 engine.

    KV v2

    « APP1 » and « APP2 » is two folders containing a subfolder « DEV » and two secret « key_1 » and « key_2 ».

    Secrets path

    Use case 1

    Read secrets from a KV v2 engine called « ALM » located at path « APP1/DEV ».

    Azure DevOps configuation 1

    Azure DevOps output log 1

    There is now two variables called « APP1_key_1 » and « APP1_key_2 » that you can used in your next tasks by using $(APP1_key_1) and/or $(APP1_key_2).

    Use case 2

    Read secrets from a KV v2 engine called « ALM » and browse recursively on sub folders.

    Azure DevOps configuation 2

    Azure DevOps configuation 2

    There is now four variables called « APP1_DEV_key_1 », « APP1_DEV_key_2 », « APP2_DEV_key_1 », « APP2_DEV_key_2 » that you can used in your next tasks by using $(APP1_DEV_key_1), $(APP1_DEV_key_2), $(APP2_DEV_key_1), $(APP2_DEV_key_2).

Release note

v2.3.0

  • Add possibility to replace carriage return by a token in secrets having multilines because Azure Devops do not manage multiline secrets.

v2.2.0

  • Add possibility to set a timeout value when requesting Vault's API.

v2.1.0

  • Add possibility to change the path of an authentication method.

v2.0.0

  • The task now can recursively load secrets from a folders and his subfolders. Or just load secrets from a specific path.

v1.1.0

  • Add Azure authentication method
  • Add Radius authentication method
  • Improvement of the errors management

v1.0.0

  • Read secret from a KV engine (v1 or v2) and load them into variables.
  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2025 Microsoft