|
Add this skill
npx mdskills install sickn33/azure-keyvault-secrets-rustComprehensive SDK reference with clear examples, but lacks agent-specific workflow guidance
Client library for Azure Key Vault Secrets — secure storage for passwords, API keys, and other secrets.
cargo add azure_security_keyvault_secrets azure_identity
AZURE_KEYVAULT_URL=https://.vault.azure.net/
use azure_identity::DeveloperToolsCredential;
use azure_security_keyvault_secrets::SecretClient;
let credential = DeveloperToolsCredential::new(None)?;
let client = SecretClient::new(
"https://.vault.azure.net/",
credential.clone(),
None,
)?;
let secret = client
.get_secret("secret-name", None)
.await?
.into_model()?;
println!("Secret value: {:?}", secret.value);
use azure_security_keyvault_secrets::models::SetSecretParameters;
let params = SetSecretParameters {
value: Some("secret-value".into()),
..Default::default()
};
let secret = client
.set_secret("secret-name", params.try_into()?, None)
.await?
.into_model()?;
use azure_security_keyvault_secrets::models::UpdateSecretPropertiesParameters;
use std::collections::HashMap;
let params = UpdateSecretPropertiesParameters {
content_type: Some("text/plain".into()),
tags: Some(HashMap::from([("env".into(), "prod".into())])),
..Default::default()
};
client
.update_secret_properties("secret-name", params.try_into()?, None)
.await?;
client.delete_secret("secret-name", None).await?;
use azure_security_keyvault_secrets::ResourceExt;
use futures::TryStreamExt;
let mut pager = client.list_secret_properties(None)?.into_stream();
while let Some(secret) = pager.try_next().await? {
let name = secret.resource_id()?.name;
println!("Secret: {}", name);
}
use azure_security_keyvault_secrets::models::SecretClientGetSecretOptions;
let options = SecretClientGetSecretOptions {
secret_version: Some("version-id".into()),
..Default::default()
};
let secret = client
.get_secret("secret-name", Some(options))
.await?
.into_model()?;
DeveloperToolsCredential for dev, ManagedIdentityCredential for productioninto_model()? — to deserialize responsesResourceExt trait — for extracting names from IDsAssign these Key Vault roles:
Key Vault Secrets User — get and listKey Vault Secrets Officer — full CRUDInstall via CLI
npx mdskills install sickn33/azure-keyvault-secrets-rustAzure Keyvault Secrets Rust is a free, open-source AI agent skill. |
Install Azure Keyvault Secrets Rust with a single command:
npx mdskills install sickn33/azure-keyvault-secrets-rustThis downloads the skill files into your project and your AI agent picks them up automatically.
Azure Keyvault Secrets Rust works with Claude Code, Claude Desktop, Cursor, Vscode Copilot, Windsurf, Continue Dev, Codex, Gemini Cli, Amp, Roo Code, Goose, Opencode, Trae, Qodo, Command Code. Skills use the open SKILL.md format which is compatible with any AI coding agent that reads markdown instructions.