2021-05-22

<{^_^}> [nixpkgs] @LeSuisse opened pull request #123985 → vault: 1.6.4 -> 1.6.5 → https://github.com/NixOS/nixpkgs/pull/123985
<{^_^}> [nixpkgs] @LeSuisse opened pull request #123983 → vault: 1.7.1 -> 1.7.2 → https://github.com/NixOS/nixpkgs/pull/123983

2021-04-30

<{^_^}> [nixpkgs] @SuperSandro2000 merged pull request #121155 → aws-vault: add wrapper and simple install check → https://github.com/NixOS/nixpkgs/pull/121155

2021-04-29

<{^_^}> [nixpkgs] @ymatsiuk opened pull request #121155 → aws-vault: add wrapper and simple install check → https://github.com/NixOS/nixpkgs/pull/121155

2021-04-24

<{^_^}> [nixpkgs] @lukegb merged pull request #120157 → [20.09] vault: 1.6.3 -> 1.6.4 → https://github.com/NixOS/nixpkgs/pull/120157
<{^_^}> [nixpkgs] @lukegb merged pull request #120155 → vault: 1.7.0 -> 1.7.1 → https://github.com/NixOS/nixpkgs/pull/120155

2021-04-23

<dhess> gchristensen: right, and the Vault token comes from where in this case? Is it an EC2 instance with {iam,ec2} auth?
<dhess> gchristensen: how do you deal with the sha256 Vault plugin bit in Nix?

2021-04-22

<{^_^}> [nixpkgs] @LeSuisse opened pull request #120157 → [20.09] vault: 1.6.3 -> 1.6.4 → https://github.com/NixOS/nixpkgs/pull/120157
<{^_^}> [nixpkgs] @LeSuisse opened pull request #120155 → vault: 0.7.0 -> 0.7.1 → https://github.com/NixOS/nixpkgs/pull/120155

2021-04-01

<{^_^}> [nixpkgs] @zimbatm merged pull request #118194 → aws-vault: 6.3.0 -> 6.3.1 → https://github.com/NixOS/nixpkgs/pull/118194
<{^_^}> [nixpkgs] @r-ryantm opened pull request #118194 → aws-vault: 6.3.0 -> 6.3.1 → https://github.com/NixOS/nixpkgs/pull/118194

2021-03-29

<{^_^}> [nixpkgs] @Munksgaard opened pull request #117932 → bitwarden_rs-vault: 2.18.1b -> 2.19.0 → https://github.com/NixOS/nixpkgs/pull/117932

2021-03-27

<{^_^}> [nixpkgs] @Ma27 merged pull request #117601 → vault: 1.6.3 -> 1.7.0 → https://github.com/NixOS/nixpkgs/pull/117601

2021-03-25

<{^_^}> [nixpkgs] @LeSuisse opened pull request #117601 → vault: 1.6.3 -> 1.7.0 → https://github.com/NixOS/nixpkgs/pull/117601

2021-03-22

<{^_^}> [nixpkgs] @zimbatm merged pull request #117006 → aws-vault: 6.2.0 -> 6.3.0 → https://github.com/NixOS/nixpkgs/pull/117006

2021-03-20

<{^_^}> [nixpkgs] @r-ryantm opened pull request #117006 → aws-vault: 6.2.0 -> 6.3.0 → https://github.com/NixOS/nixpkgs/pull/117006

2021-03-04

<{^_^}> [nixpkgs] @zimbatm merged pull request #115059 → aws-vault: install completions → https://github.com/NixOS/nixpkgs/pull/115059
<{^_^}> [nixpkgs] @markus1189 opened pull request #115059 → aws-vault: install completions → https://github.com/NixOS/nixpkgs/pull/115059

2021-03-03

<RyuKurisu[m]> E.g. Bitwarden_rs and Bitwarden_rs-vault 😎👍

2021-02-26

<{^_^}> [nixpkgs] @marsam pushed commit from @Chili-Man to release-20.09 « vault: 1.6.2 -> 1.6.3 »: https://git.io/JtbmA
<{^_^}> [nixpkgs] @marsam merged pull request #114390 → vault: 1.6.2 -> 1.6.3 → https://github.com/NixOS/nixpkgs/pull/114390

2021-02-25

<jkachmar> also i guess the point is kinda moot since 1Password doesn't support local vaults at all on linux lmao
<{^_^}> [nixpkgs] @Chili-Man opened pull request #114390 → vault: 1.6.2 -> 1.6.3 → https://github.com/NixOS/nixpkgs/pull/114390

2021-02-20

<{^_^}> [nixpkgs] @r-ryantm opened pull request #113811 → bitwarden_rs-vault: 2.18.1b -> 2.18.1d → https://github.com/NixOS/nixpkgs/pull/113811

2021-02-09

<{^_^}> [nixpkgs] @Mic92 merged pull request #112471 → bitwarden_rs-vault: 2.17.1 -> 2.18.1b → https://github.com/NixOS/nixpkgs/pull/112471
<{^_^}> [nixpkgs] @r-ryantm opened pull request #112471 → bitwarden_rs-vault: 2.17.1 -> 2.18.1b → https://github.com/NixOS/nixpkgs/pull/112471
<{^_^}> [nixpkgs] @bbigras closed pull request #111061 → bitwarden_rs-vault: 2.17.1 -> 2.18.1 → https://github.com/NixOS/nixpkgs/pull/111061

2021-02-06

<{^_^}> [nixpkgs] @dotlambda pushed commit from @LeSuisse to release-20.09 « vault: 1.6.1 -> 1.6.2 »: https://git.io/Jtak0
<{^_^}> [nixpkgs] @SuperSandro2000 merged pull request #112146 → vault: 1.6.1 -> 1.6.2 → https://github.com/NixOS/nixpkgs/pull/112146
<{^_^}> [nixpkgs] @LeSuisse opened pull request #112146 → vault: 1.6.1 -> 1.6.2 → https://github.com/NixOS/nixpkgs/pull/112146

2021-01-28

<{^_^}> [nixpkgs] @r-ryantm opened pull request #111061 → bitwarden_rs-vault: 2.17.1 -> 2.18.1 → https://git.io/Jtlr6

2021-01-25

<{^_^}> [nixpkgs] @dotlambda merged pull request #110755 → [20.09] vault: 1.6.0 -> 1.6.1 → https://git.io/JtZhl
<{^_^}> [nixpkgs] @dotlambda opened pull request #110755 → [20.09] vault: 1.6.0 -> 1.6.1 → https://git.io/JtZhl

2021-01-24

<{^_^}> [nixpkgs] @roberth closed pull request #107323 → vault: Support secure config file → https://git.io/JtGxZ
<{^_^}> [nixpkgs] @roberth merged pull request #108411 → vault: Support multiple config files (no secrets in store) → https://git.io/JLFxn

2021-01-18

<{^_^}> [nixpkgs] @SuperSandro2000 merged pull request #106542 → bitwarden_rs-vault: 2.16.1 -> 2.17.1 → https://git.io/JIaFu

2021-01-15

<bbigras> gchristensen: yeah I might just use vault.
<gchristensen> bbigras: but, not so sure about sops. I think the good part of vault is ephemeral credentials
<gchristensen> I haven't deployed vault in AWS before, just on bare metal
<bbigras> gchristensen: do you use vault with aws kms?
<bbigras> Anyone using vault with aws kms to unseal it? When I reboot the vault service fails to start. I think maybe the kms key or whatever if not available right away. If I start the service a couple of minutes later it seems fine.

2021-01-06

<{^_^}> [nixpkgs] @marsam merged pull request #108364 → vault: 1.6.0 -> 1.6.1 → https://git.io/JLFmV
<{^_^}> [nixpkgs] @jonringer closed pull request #108535 → vault: 1.6.0 -> 1.6.1 → https://git.io/JLNEP
<{^_^}> [nixpkgs] @jonringer opened pull request #108535 → vault: 1.6.0 -> 1.6.1 → https://git.io/JLNEP

2021-01-04

<{^_^}> [nixpkgs] @roberth opened pull request #108411 → Vault multiple config files → https://git.io/JLFxn
<{^_^}> [nixpkgs] @Chili-Man opened pull request #108364 → vault: 1.6.0 -> 1.6.1 → https://git.io/JLFmV

2020-12-17

<sphalerite> gchristensen: since we've reached the topic: do you have (plans for) a blog post about how you use vault? I'd be very interested in reading about it :)
<Orbstheorem> The only vault I know it's ansible vault :D
<Orbstheorem> vault?
<sphalerite> Orbstheorem: if you want to go really fancy with secrets, you could use something like vault.

2020-12-10

<{^_^}> [nixpkgs] @r-ryantm opened pull request #106542 → bitwarden_rs-vault: 2.16.1 -> 2.17.1 → https://git.io/JIaFu

2020-11-27

<{^_^}> [nixpkgs] @Ma27 closed pull request #104011 → vault: 1.5.5 -> 1.6.0 → https://git.io/JkCuo

2020-11-22

<{^_^}> [nixpkgs] @Ma27 merged pull request #104525 → vault: 1.5.5 -> 1.6.0 → https://git.io/JkVAI

2020-11-21

<{^_^}> [nixpkgs] @marsam opened pull request #104525 → vault: 1.5.5 -> 1.6.0 → https://git.io/JkVAI

2020-11-17

<{^_^}> [nixpkgs] @r-ryantm opened pull request #104011 → vault: 1.5.5 -> 1.6.0 → https://git.io/JkCuo

2020-11-03

<{^_^}> [nixpkgs] @ryantm merged pull request #100865 → bitwarden_rs-vault: 2.16.0b -> 2.16.1 → https://git.io/JTC8g

2020-11-02

<{^_^}> [nixpkgs] @marsam merged pull request #102402 → vault: 1.5.4 -> 1.5.5 → https://git.io/JT7NH

2020-11-01

<{^_^}> [nixpkgs] @marsam opened pull request #102402 → vault: 1.5.4 -> 1.5.5 → https://git.io/JT7NH

2020-10-17

<{^_^}> [nixpkgs] @r-ryantm opened pull request #100865 → bitwarden_rs-vault: 2.16.0b -> 2.16.1 → https://git.io/JTC8g

2020-09-29

<pinpox> applications, is there some kind of "vault" or mechanism to store secrets and deploy them from there?

2020-09-28

<{^_^}> [nixpkgs] @LnL7 merged pull request #98984 → vault: 1.5.3 -> 1.5.4 → https://git.io/JUi4E
<{^_^}> [nixpkgs] @marsam opened pull request #98984 → vault: 1.5.3 -> 1.5.4 → https://git.io/JUi4E

2020-09-25

<{^_^}> [nixpkgs] @jonringer pushed commit from @ento to master « aws-vault: 6.0.0 -> 6.2.0 »: https://git.io/JUaNY
<{^_^}> [nixpkgs] @jonringer merged pull request #98775 → aws-vault: 6.0.0 -> 6.2.0 → https://git.io/JUaMR
<{^_^}> [nixpkgs] @ento opened pull request #98775 → aws-vault: 6.0.0 -> 6.2.0 → https://git.io/JUaMR

2020-09-24

<{^_^}> [nixpkgs] @zimbatm merged pull request #98675 → bitwarden_rs-vault: 2.15.1 -> 2.16.0b → https://git.io/JU2Qx
<{^_^}> [nixpkgs] @zimbatm pushed commit from @r-ryantm to master « bitwarden_rs-vault: 2.15.1 -> 2.16.0b (#98675) »: https://git.io/JU2As
<{^_^}> [nixpkgs] @r-ryantm opened pull request #98675 → bitwarden_rs-vault: 2.15.1 -> 2.16.0b → https://git.io/JU2Qx

2020-09-05

<{^_^}> [nixpkgs] @ryantm merged pull request #97072 → aws-vault: 5.4.4 -> 6.0.0 → https://git.io/JU3BF

2020-09-04

<{^_^}> [nixpkgs] @r-ryantm opened pull request #97072 → aws-vault: 5.4.4 -> 6.0.0 → https://git.io/JU3BF

2020-09-01

<chiiba> To any Hashicorp Vault gurus here: Can I create a policy to allow reading a specific secret engine path? Or do I have to create new secret engine and seperate secrets between engines to mangage ACLs?
<{^_^}> [nixpkgs] @marsam merged pull request #96721 → vault: 1.5.2 -> 1.5.3 → https://git.io/JUqqq

2020-08-31

<{^_^}> [nixpkgs] @marsam opened pull request #96721 → vault: 1.5.2 -> 1.5.3 → https://git.io/JUqqq

2020-08-26

<bqv> Right, mutated in the secrets vault

2020-08-25

<{^_^}> [nixpkgs] @Lassulus merged pull request #96226 → vault: 1.5.0 -> 1.5.2 → https://git.io/JUJWF
<{^_^}> [nixpkgs] @marsam opened pull request #96226 → vault: 1.5.0 -> 1.5.2 → https://git.io/JUJWF

2020-08-10

<_habnabit> srhb, oh, i wouldn't upstream this anyway; it's very cluster-specific. nomad's vault token needs to be written out to somewhere on disk and doesn't change across reboots. i suppose /var/lib makes sense because it (presumably) won't get cleaned out

2020-07-29

<{^_^}> [nixpkgs] @LnL7 merged pull request #94182 → vault: 1.4.3 -> 1.5.0 → https://git.io/JJzEU
<{^_^}> [nixpkgs] @marsam opened pull request #94182 → vault: 1.4.3 -> 1.5.0 → https://git.io/JJzEU

2020-07-08

<{^_^}> [nixpkgs] @Ma27 merged pull request #92677 → bitwarden_rs-vault: 2.14.0 -> 2.15.1 → https://git.io/JJtjl
<{^_^}> [nixpkgs] @Ma27 merged pull request #92641 → vault: 1.4.2 -> 1.4.3 → https://git.io/JJtD9
<{^_^}> [nixpkgs] @r-ryantm opened pull request #92677 → bitwarden_rs-vault: 2.14.0 -> 2.15.1 → https://git.io/JJtjl

2020-07-07

<{^_^}> [nixpkgs] @r-ryantm opened pull request #92641 → vault: 1.4.2 -> 1.4.3 → https://git.io/JJtD9

2020-07-01

<{^_^}> [nixpkgs] @marsam merged pull request #91898 → [20.03] vault: 1.3.2 -> 1.3.6 → https://git.io/JJJnP

2020-06-30

<{^_^}> [nixpkgs] @maxeaubrey opened pull request #91898 → [20.03] vault: 1.3.2 -> 1.3.6 → https://git.io/JJJnP

2020-06-18

<sheeldotme> Makes sense to me cole-h, how do you currently handle secrets do you just have them in another git repo? Thinking about setting up something with vault.

2020-05-27

<{^_^}> [nixpkgs] @jonringer pushed commit from @r-ryantm to master « bitwarden_rs-vault: 2.13.2b -> 2.14.0 »: https://git.io/Jfri8
<{^_^}> [nixpkgs] @jonringer merged pull request #88795 → bitwarden_rs-vault: 2.13.2b -> 2.14.0 → https://git.io/JfVed

2020-05-24

<{^_^}> [nixpkgs] @r-ryantm opened pull request #88795 → bitwarden_rs-vault: 2.13.2b -> 2.14.0 → https://git.io/JfVed
<cole-h> The only times I drop a review and don't test /that/ in-depth are when they require some sort of infrastructure (e.g. if I wanted to test a Hashicorp Vault update -- I don't have a vault setup, so I can't really do much there)

2020-05-22

<cransom> using dhall to give me a list of packages to install seems like it would be analogous to having something like vault or a secret store telling me which packages to install. it's just not quite the right layer for it
<{^_^}> [nixpkgs] @Ma27 merged pull request #88562 → vault: 1.4.1 -> 1.4.2 → https://git.io/Jf2OF
<{^_^}> [nixpkgs] @marsam opened pull request #88562 → vault: 1.4.1 -> 1.4.2 → https://git.io/Jf2OF

2020-05-19

<{^_^}> [nixpkgs] @marsam merged pull request #88112 → aws-vault: 5.3.2 -> 5.4.4 → https://git.io/Jfuna
<{^_^}> [nixpkgs] @r-ryantm opened pull request #88112 → aws-vault: 5.3.2 -> 5.4.4 → https://git.io/Jfuna

2020-05-13

<taktoa[c]> dmj`, mitchellh: I believe there are derivations in nixpkgs for nomad, terraform, consul, and vault

2020-05-04

<{^_^}> [nixpkgs] @jonringer pushed commit from @r-ryantm to master « bitwarden_rs-vault: 2.13.2 -> 2.13.2b »: https://git.io/JfsHn
<{^_^}> [nixpkgs] @jonringer merged pull request #86521 → bitwarden_rs-vault: 2.13.2 -> 2.13.2

2020-05-03

<hyper_ch> like the one to access the vault ;)

2020-05-02

<{^_^}> [nixpkgs] @r-ryantm opened pull request #86521 → bitwarden_rs-vault: 2.13.2 -> 2.13.2

2020-05-01

<{^_^}> [nixpkgs] @LnL7 merged pull request #86434 → vault: 1.4.0 -> 1.4.1 → https://git.io/JfOip
<{^_^}> [nixpkgs] @marsam opened pull request #86434 → vault: 1.4.0 -> 1.4.1 → https://git.io/JfOip

2020-04-28

<gchristensen> just finished up a little module to glue buildkite to vault

2020-04-23

<thoughtpolice> jakobrs: I use Vault but only for some basic stuff -- SSH certificates have been on my "look at" for a little while tho, haven't made the jump for any automation yet

2020-04-20

<bqv> vault as in the hashicorp thing?
<gchristensen> bqv: vault has nice SSH-CA support

2020-04-10

<{^_^}> [nixpkgs] @maxeaubrey closed pull request #84601 → vault: disable_mlock option → https://git.io/JvAK5

2020-04-08

<gchristensen> I've been thinking about playing with vault for signing host keys
<{^_^}> [nixpkgs] @jonringer pushed commit from @marsam to master « vault: 1.3.4 -> 1.4.0 »: https://git.io/JvxIV
<{^_^}> [nixpkgs] @jonringer merged pull request #84679 → vault: 1.3.4 -> 1.4.0 → https://git.io/JvxTK
<{^_^}> [nixpkgs] @marsam opened pull request #84679 → vault: 1.3.4 -> 1.4.0 → https://git.io/JvxTK

2020-04-07

<{^_^}> [nixpkgs] @maxeaubrey opened pull request #84601 → vault: disable_mlock option, setcap wrapper → https://git.io/JvAK5

2020-04-05

<{^_^}> [nixpkgs] @offlinehacker merged pull request #84298 → vault: 1.3.3 -> 1.3.4 → https://git.io/Jvbpm
<{^_^}> [nixpkgs] @marsam opened pull request #84298 → vault: 1.3.3 -> 1.3.4 → https://git.io/Jvbpm

2020-04-04

<{^_^}> [nixpkgs] @Ma27 merged pull request #83941 → bitwarden_rs-vault: 2.12.0e -> 2.13.2 → https://git.io/JvdIp

2020-04-01

<deni> have that I can create the certificates via terraform as well and then all that's needed is to modify the vault service file to fetch those after before starting the vault service. Hmm possibly I'll have to modify the nginx service as well. Anyway something along those lines. The downside of this is that there is no automatic refresh of certs and I would have to do it manually. Although I could
<deni> gchristensen: thanks! I'll check it out. I made a promise to myself to write as little bas as possible. :D I was thinking on using terraform to to configure Vault once it's up and running. That would mean creating the CA in terraform. Creating an intermediaty CA that get's imported into Vault and that's the one used for generating new certs. (I did this type of thing for work stuff). Anyway once I
<gchristensen> deni: you could use vault for certs still, and write a little bit of bash to get certs
<deni> edef: ah I see....I was kind of hoping you were using vault as a certificate provider. Damn! :D I have a private domain (zerotier) that I want to set up auto ssl certs for and I can't use acme becuase the domain verification is DNS based. I can whip something up with bash (puke) but I figured it would be better to use Vault for this. cc gchristensen
<deni> edef: hey. you once wrote "i have a fairly neat auto-ACME'd vault setup i should really share". I was searching the IRC logs for vault related converstaion I'm not stalking you I swear :D .... I'm curious if you wrote about this? Did you mean that you use vault as a cert provider in an acme fashion or that you're configuring the vault server with acme certificates?
<nix-build> [nixpkgs] @r-ryantm opened pull request #83941 → bitwarden_rs-vault: 2.12.0e -> 2.13.2 → https://git.io/JvdIp

2020-03-28

<deni> bhipple: was mostly researching old conversations about nix+nixops+vault .... the question comes up *a lot*
<deni> I quite enjoyed it for my non-vault-aware applications
<deni> evils: energizer thanks! I see gchristensen is playing around with it. I have some experience with vault auto unsealing ... albeit in the cloud setting (AWS and GCP mostly). I'd need to think if any of that is applicable to my current non-cloud setup
<deni> Somewhat relatedly...I asked on twitter a couple of days ago if anyone is playing around with Hashicorp vault and Nix/Nixops. Sadly I didn't get any response. I'm quite fond of Vault and have used it to great success before. But I'm at a lost how to integrate it with nixops other than with wrappers and what not

2020-03-26

<gchristensen> gustavderdrache: (kill me) I could have it request its unlock keys over the wireguard tunnel to my laptop's vault , which reuires a yubi-tap to allow :)
<gustavderdrache> i wonder... what if you did the slurp-and-unseal thing and then rekeyed vault afterwards?
<gchristensen> gustavderdrache: I want to deploy vault to a single server, using nixops. this is fine but after reboot, this creates a new step I have to run: unlocking vault. this is ... fine ... but nixops has no way to run the command from my machine over to Vault to unseal. I could transfer a key over to /run/keys and have service slurp it up and unseal, but then I'm sending a key over and just plopping it on
<gchristensen> gustavderdrache: I'm annoyed about some Vault trade-offs

2020-03-09

<{^_^}> [nixpkgs] @marsam merged pull request #82058 → bitwarden_rs-vault: fix directory structure → https://git.io/Jvrbq

2020-03-08

<{^_^}> [nixpkgs] @ajs124 opened pull request #82058 → bitwarden_rs-vault: fix directory structure → https://git.io/Jvrbq

2020-03-07

<{^_^}> [nixpkgs] @LnL7 merged pull request #81949 → vault: 1.3.2 -> 1.3.3 → https://git.io/Jvw96
<{^_^}> [nixpkgs] @marsam opened pull request #81949 → vault: 1.3.2 -> 1.3.3 → https://git.io/Jvw96

2020-03-05

<{^_^}> [nixpkgs] @jonringer pushed commit from @r-ryantm to master « bitwarden_rs-vault: 2.12.0c -> 2.12.0e »: https://git.io/JvVxk
<{^_^}> [nixpkgs] @jonringer merged pull request #81670 → bitwarden_rs-vault: 2.12.0c -> 2.12.0e → https://git.io/JvazX

2020-03-04

<{^_^}> [nixpkgs] @r-ryantm opened pull request #81670 → bitwarden_rs-vault: 2.12.0c -> 2.12.0e → https://git.io/JvazX

2020-02-29

<LnL> hm, I just had an idea. I wonder if the vault agent could refresh the secret_id with secret_id_num_uses=1
<LnL> but with eg. secret_id_file -> agent -> .vault-token -> service you have the role secret on disk but the service can't interact with it directly
<gchristensen> no idea if this is the right thing, but in the past I've added an option like --vault-token-file ~/.vault-token
<manveru> yes, but if the service isn't vault-aware, there's not much one can do :P
<manveru> but i don't see any other options of integrating systemd with vault...
<manveru> LnL: i'm just wondering how you're using vault, i guess :)

2020-02-27

<manveru> i'm about to try vault, and thought this might come in handy, just wanted to know any gotchas :)

2020-02-24

<gchristensen> LnL: how do you add secret providers to vault with nixos configs? seems the sha256 hashing is a bit annoying
<{^_^}> [nixpkgs] @zimbatm merged pull request #80949 → aws-vault: 4.5.1 to 5.3.2 → https://git.io/JvE34
<{^_^}> [nixpkgs] @zimbatm pushed commit from @surajbarkale to master « aws-vault: 4.5.1 to 5.3.2 (#80949) »: https://git.io/JvEG9
<{^_^}> [nixpkgs] @surajbarkale opened pull request #80949 → aws-vault: 4.5.1 to 5.3.2 → https://git.io/JvE34

2020-02-19

<{^_^}> [nixpkgs] @marsam closed pull request #80494 → bitwarden_rs-vault: 2.12.0b -> 2.12.0c → https://git.io/Jv4hZ
<{^_^}> [nixpkgs] @marsam merged pull request #80533 → bitwarden_rs-vault: 2.12.0b -> 2.12.0c → https://git.io/JvBYc
<{^_^}> [nixpkgs] @msteen opened pull request #80533 → bitwarden_rs-vault: 2.12.0b -> 2.12.0c → https://git.io/JvBYc
<{^_^}> [nixpkgs] @r-ryantm opened pull request #80494 → bitwarden_rs-vault: 2.12.0b -> 2.12.0c → https://git.io/Jv4hZ

2020-02-18

<mdash> I wonder if I should just make the jump to Vault or Keywhiz and be done with it

2020-01-30

<{^_^}> [nixpkgs] @ryantm merged pull request #77865 → bitwarden_rs-vault: 2.12.0 -> 2.12.0b → https://git.io/JvT4g

2020-01-23

<{^_^}> [nixpkgs] @Ma27 merged pull request #78340 → vault: 1.3.1 -> 1.3.2 → https://git.io/JvLxL
<{^_^}> [nixpkgs] @marsam opened pull request #78340 → vault: 1.3.1 -> 1.3.2 → https://git.io/JvLxL

2020-01-17

<{^_^}> [nixpkgs] @r-ryantm opened pull request #77865 → bitwarden_rs-vault: 2.12.0 -> 2.12.0b → https://git.io/JvT4g

2020-01-01

<eoli3n___> is there any ansible-vault like on nix ?

2019-12-19

<{^_^}> [nixpkgs] @jonringer pushed commit from @marsam to master « vault: 1.3.0 -> 1.3.1 »: https://git.io/Je5u6
<{^_^}> [nixpkgs] @jonringer merged pull request #75918 → vault: 1.3.0 -> 1.3.1 → https://git.io/Je5B9
<{^_^}> [nixpkgs] @marsam opened pull request #75918 → vault: 1.3.0 -> 1.3.1 → https://git.io/Je5B9

2019-12-06

<yorick> gchristensen: https://github.com/NixOS/nixpkgs/pull/49165 is how we solved it for vault

2019-12-05

<betawaffle> is it possible to configure a vault agent (rather than a vault server) with the services.vault.* options?

2019-11-25

<{^_^}> [nixpkgs] @offlinehacker merged pull request #74168 → vault-bin: 1.1.3 -> 1.3.0 → https://git.io/JePEa
<{^_^}> [nixpkgs] @mkaito opened pull request #74168 → vault-bin: 1.1.3 -> 1.3.0 → https://git.io/JePEa

2019-11-17

<{^_^}> [nixpkgs] @marsam merged pull request #73450 → vault: 1.2.4 -> 1.3.0 → https://git.io/Jerh6

2019-11-15

<{^_^}> [nixpkgs] @LnL7 pushed commit from EEva (JPotier) to release-19.09 « vault: fix config when file backend is used »: https://git.io/JeoO0
<{^_^}> [nixpkgs] @marsam opened pull request #73450 → vault: 1.2.4 -> 1.3.0 → https://git.io/Jerh6

2019-11-14

<infinisil> "On February 2, 2020, GitHub will capture a snapshot of every active public repository, to be preserved in the GitHub Arctic Code Vault"

2019-11-08

<{^_^}> [nixpkgs] @offlinehacker merged pull request #73012 → vault: 1.2.3 -> 1.2.4 → https://git.io/JeVfl
<{^_^}> [nixpkgs] @marsam opened pull request #73012 → vault: 1.2.3 -> 1.2.4 → https://git.io/JeVfl

2019-11-05

<{^_^}> [nixpkgs] @flokli merged pull request #72787 → Vault: fix config when file backend is used → https://git.io/Je22T

2019-11-04

<{^_^}> [nixpkgs] @jpotier opened pull request #72787 → Vault: fix config when file backend is used → https://git.io/Je22T

2019-10-21

<{^_^}> [nixpkgs] @FRidh pushed commit from @r-ryantm to master « bitwarden_rs-vault: 2.11.0 -> 2.12.0 »: https://git.io/JeRIk
<{^_^}> [nixpkgs] @FRidh merged pull request #71502 → bitwarden_rs-vault: 2.11.0 -> 2.12.0 → https://git.io/JeRkz
<{^_^}> [nixpkgs] @r-ryantm opened pull request #71502 → bitwarden_rs-vault: 2.11.0 -> 2.12.0 → https://git.io/JeRkz

2019-10-18

<mdash> i've been trying to decide if i need something like vault
<edef> i have a fairly neat auto-ACME'd vault setup i should really share
<edef> i really need to see if i can configure vault with terraform or sth
<gchristensen> although, vault's rabbitmq support is nice

2019-10-01

<{^_^}> [nixops] @PsyanticY closed pull request #1163 → Hashicorp Vault kv2 secret engine + policy resources → https://git.io/fjgs5

2019-09-23

<LnL> vault has bash completions

2019-08-29

<{^_^}> [nixpkgs] @offlinehacker merged pull request #67606 → vault: 1.0.2 -> 1.2.2 → https://git.io/fjxfQ

2019-08-28

<{^_^}> [nixpkgs] @endocrimes opened pull request #67606 → vault: 1.0.2 -> 1.2.2 → https://git.io/fjxfQ

2019-08-08

<damesca> Hi. Looking for help. I'm trying to install a newer version of aws-vault by overriding src/version in the nixpkgs 19.03 version, but getting a ton of build failures (see build config/errors here: https://pastebin.com/Gkh7SVyx ). Can anyone help? This is my first attempt at changing a package, and after reading the manual/googling around I've still

2019-08-07

<damesca> Hi. Looking for help. I'm trying to install a newer version of aws-vault by overriding src/version in the nixpkgs 19.03 version, but getting a ton of build failures (see build config/errors here: https://pastebin.com/Gkh7SVyx). Can anyone help? This is my first attempt at changing a package, and after reading the manual/googling around I've still n

2019-08-04

<{^_^}> [nixpkgs] @offlinehacker merged pull request #65166 → vault-bin: init at 1.1.3 → https://git.io/fjMlC

2019-07-24

<{^_^}> [nixpkgs] @PsyanticY reopened pull request #65166 → vault-bin: init at 1.1.3 → https://git.io/fjMlC
<{^_^}> [nixpkgs] @PsyanticY closed pull request #65166 → vault-bin: init at 1.1.3 → https://git.io/fjMlC

2019-07-23

<psyanticy> what about adding a package called vault-bin is that an option that we can go with ?
<{^_^}> #65166 (by PsyanticY, 3 days ago, open): [WIP] vault: update packaging to include the UI
<{^_^}> #65166 (by PsyanticY, 3 days ago, open): [WIP] vault: update packaging to include the UI

2019-07-20

<{^_^}> [nixpkgs] @PsyanticY opened pull request #65166 → [WIP] vault: update packaging to include the UI → https://git.io/fjMlC
<{^_^}> [nixpkgs] @PsyanticY closed pull request #65089 → Add dropPrivileges options for vault module → https://git.io/fjMIM

2019-07-19

<{^_^}> [nixpkgs] @PsyanticY opened pull request #65089 → Add dropPrivileges options for vault module → https://git.io/fjMIM

2019-07-18

<psyanticy> @arianvp please do add the vault ui stuff u mentioned to the wiki it would be helpful.
<arianvp> Maybe I should add that vault ui stuff to the wiki
<{^_^}> #49082 (by arianvp, 38 weeks ago, closed): [WIP] Enable Vault UI
<psyanticy> Hi @lnl7 . is there any reason hasicorp vault was packaged without the UI

2019-07-10

<eraserhd> I don't want to copy boiler plate to download the vault certificate and set VAULT_CACERT into all projects.
<eraserhd> So I made wrappers for vault that set VAULT_CACERT if it wasn't already set and so forth.
<eraserhd> Hey, can I solicit an opinion? I'm creating modules for work, and this does things like set $KUBECONFIG and $VAULT_CACERT. At first, I set environment.variables.VAULT_CACERT, but this seemed to have bootstrap issues (or at least I worried about it).

2019-07-07

<yorick> m1cr0man: vault does something similar, we made https://github.com/serokell/nix-npm-buildpackage for that

2019-06-20

<{^_^}> [nixpkgs] @marsam merged pull request #63453 → vault: 1.1.2 -> 1.1.3 → https://git.io/fjVf7

2019-06-18

<{^_^}> [nixpkgs] @r-ryantm opened pull request #63453 → vault: 1.1.2 -> 1.1.3 → https://git.io/fjVf7

2019-06-17

<{^_^}> [nixpkgs] @FRidh pushed commit from @r-ryantm to master « bitwarden_rs-vault: 2.10.0 -> 2.10.1 »: https://git.io/fjaw4
<{^_^}> [nixpkgs] @FRidh merged pull request #63221 → bitwarden_rs-vault: 2.10.0 -> 2.10.1 → https://git.io/fja3o

2019-06-16

<{^_^}> [nixpkgs] @r-ryantm opened pull request #63221 → bitwarden_rs-vault: 2.10.0 -> 2.10.1 → https://git.io/fja3o

2019-06-10

<{^_^}> [nixops] @PsyanticY opened pull request #1163 → Hashicorp Vault kv2 secret engine + policy resources → https://git.io/fjgs5

2019-06-04

<hyper_ch> and you just have to make sure that you backup the pool/encryption dataset to secure devices (e.g. 2-3 usb thumb drive that are stored in your bank's vault

2019-05-13

<{^_^}> [nixpkgs] @FRidh pushed commit from @r-ryantm to master « vault: 1.1.0 -> 1.1.2 »: https://git.io/fjWDs
<{^_^}> [nixpkgs] @FRidh merged pull request #61446 → vault: 1.1.0 -> 1.1.2 → https://git.io/fjWzU
<{^_^}> [nixpkgs] @r-ryantm opened pull request #61446 → vault: 1.1.0 -> 1.1.2 → https://git.io/fjWzU

2019-05-10

<{^_^}> [nixpkgs] @marsam merged pull request #60959 → bitwarden_rs-vault: 2.9.0 -> 2.10.0 → https://git.io/fjCaJ

2019-05-06

<arianvp> but if letsencrypt is security, I expect vault to be there too. which isn't

2019-04-26

<{^_^}> [nixops] @AmineChikhaoui merged pull request #1139 → vault: strip token of new line → https://git.io/fjs1p
<{^_^}> [nixops] @PsyanticY opened pull request #1139 → vault: strip token of new line → https://git.io/fjs1p

2019-04-19

<gchristensen> (I follow this model already, by using Vault to manage and maintain secrets)

2019-04-10

<{^_^}> [nixpkgs] @zimbatm pushed commit from @andrew-d to master « aws-vault: 4.3.0 -> 4.5.1 (#59254) »: https://git.io/fjqkB
<{^_^}> [nixpkgs] @zimbatm merged pull request #59254 → aws-vault: 4.3.0 -> 4.5.1 → https://git.io/fjqJL
<{^_^}> [nixpkgs] @andrew-d opened pull request #59254 → aws-vault: 4.3.0 -> 4.5.1 → https://git.io/fjqJL

2019-04-08

<{^_^}> [nixpkgs] @xeji pushed commit from @r-ryantm to master « vault: 1.0.3 -> 1.1.0 (#58909) »: https://git.io/fjtoX
<{^_^}> [nixpkgs] @xeji merged pull request #58909 → vault: 1.0.3 -> 1.1.0 → https://git.io/fjIoX

2019-04-03

<{^_^}> [nixpkgs] @r-ryantm opened pull request #58909 → vault: 1.0.3 -> 1.1.0 → https://git.io/fjIoX

2019-03-14

<{^_^}> [nixops] @AmineChikhaoui merged pull request #1112 → Vault Approle: fix default value of secretId → https://git.io/fjeYj

2019-03-13

<{^_^}> [nixops] @PsyanticY opened pull request #1112 → Vault Approle: fix default value of secretId → https://git.io/fjeYj

2019-02-23

<deltasquared> base-4.11.1.0 http-types-0.12.2-BvzRqBLz3NU4qnHCTxZUQN network-2.8.0.0-JgG270TblsEHkvPEAbLhLE text-1.2.3.0 vault-0.3.1.2-4TxhOTpz8MgFQmCdTtLfYL

2019-02-21

<ldlework> georgyo: Vault was going to be my recommendation.

2019-02-20

<dhess> Anyone around who knows about the new "Vault approle support" that just went into NixOps?

2019-02-15

<{^_^}> [nixpkgs] @offlinehacker merged pull request #55813 → vault: 1.0.2 -> 1.0.3 → https://git.io/fh7Fo
<{^_^}> [nixpkgs] @r-ryantm opened pull request #55813 → vault: 1.0.2 -> 1.0.3 → https://git.io/fh7Fo

2019-02-14

<{^_^}> [nixops] @AmineChikhaoui merged pull request #1087 → HashiCorp Vault AppRole support. → https://git.io/fhSf0

2019-02-10

<ToxicFrog> I've been using keepass, which has an android version, and using a separate sync app to keep the vault synced between my computer and my phone

2019-02-09

<ottidmes> mdash: I know its me finding an execuse to keep it (common practice of programmers after spending a lot of effort on a piece of code), but since the older version in the PR (due to Rocket 0.4 added to bitwarden_rs version 1.5 breaks with rustc 1.31) is build using the Web Vault 2.4.0 and that fork only starts at 2.5.0, I am keeping it for versions older than 2.5.0

2019-02-08

<mdash> ottidmes: hey guess what, i got bitwarden_rs and vault deployed

2019-02-07

<ottidmes> mdash: I see that you are online again, did you see the bitwarden PR? I managed to package the vault with a different approach

2019-02-06

<ottidmes> mdash: I managed to package the bitwarden vault, so I will be making a PR soon

2019-02-01

<LnL> but for proper vault integration you need something that rotates those
<fresheyeball> dhess: there is vault as a service in options already
<gchristensen> didn't you do some vault stuff?
<dhess> maybe I'll ask a different question: anyone around who's using something like Hashicorp Vault to deploy secrets to NixOS machines?
<{^_^}> [nixops] @PsyanticY opened pull request #1087 → [WIP] HashiCorp Vault AppRole support. → https://git.io/fhSf0

2019-01-21

<timclassic> If I install vault directly on the aarch64 system via nix-env, the correct arch gets installed.
<timclassic> I'm using nixops to deploy from x86_64 to aarch64 (and I have an aarch64 build host configured), and this generally works. However, when I deploy vault this way, the x86_64 binary gets installed instead of the aarch64 variant. Where should I look to debug this?

2019-01-16

<{^_^}> [nixpkgs] @worldofpeace merged pull request #54032 → vault: 1.0.1 -> 1.0.2 → https://git.io/fhWrU
<{^_^}> [nixpkgs] @r-ryantm opened pull request #54032 → vault: 1.0.1 -> 1.0.2 → https://git.io/fhWrU

2019-01-02

<jomik> Package the vault?
<ottidmes> mdash: if someone is willing to look at how to package the vault properly with Nix, then I can clean it up a bit and make a proper PR for it

2018-12-22

<{^_^}> [nixpkgs] @timokau pushed commit from @r-ryantm to master « vault: 1.0.0 -> 1.0.1 (#52664) »: https://git.io/fhJqM
<{^_^}> [nixpkgs] @timokau merged pull request #52664 → vault: 1.0.0 -> 1.0.1 → https://git.io/fhJtW
<{^_^}> [nixpkgs] @r-ryantm opened pull request #52664 → vault: 1.0.0 -> 1.0.1 → https://git.io/fhJtW

2018-12-05

<{^_^}> [nixpkgs] @zimbatm merged pull request #51524 → vault: 0.11.5 -> 1.0.0 → https://git.io/fpPNX
<{^_^}> [nixpkgs] @arianvp closed pull request #49082 → [WIP] Enable Vault UI → https://git.io/fxMoI

2018-12-04

<{^_^}> [nixpkgs] @zimbatm opened pull request #51524 → vault: 0.11.5 -> 1.0.0 → https://git.io/fpPNX
<{^_^}> [nixpkgs] @Mic92 merged pull request #51417 → vault: 0.11.2 -> 0.11.5 → https://git.io/fpKiU

2018-12-02

<{^_^}> [nixpkgs] @jvassev opened pull request #51417 → vault: 0.11.2 -> 0.11.5 → https://git.io/fpKiU

2018-11-27

<bbarker_home> in other news, none of the passwords I used to build NixOS VMs are working, not just this one. I saved them in a vault and history doesn't report changes. I think I may be going insane

2018-11-18

<steveeJ> hyper_ch: we have an OS module for it and I'm wondering how to integrate ACME (which I haven't used before either) with the vault module for certificate generation
<hyper_ch> what's vault?
<steveeJ> does anyone have an example config for letsencrypt + vault by chance?

2018-11-06

<elvishjerricco> Yea vault is a good answer. Maybe I'll move toward stuff like that
<srhb> elvishjerricco: Yeah. What I did at $oldjob was essentially delegate all this to vault and friends

2018-11-04

<ottidmes> Could anybody help me with packaging Bitwarden Vault (the web interface)? I got it working outside of Nix, so for my own use case I can workaround it by just reusing my local build, but if I want to make a pull request for Bitwarden, the web interface really should be included

2018-10-26

<arianvp> nh2: I've asked hashicorp if they can do the same for the vault package. that'd make my life 1000x easier
<arianvp> I'm gonna open an issue on the vault repo if they can vendor it too for vault
<{^_^}> #49082 (by arianvp, 1 day ago, open): Enable Vault UI

2018-10-25

<{^_^}> [nixpkgs] @arianvp opened pull request #49082 → Enable Vault UI → https://git.io/fxMoI

2018-10-24

<arianvp> vault, consul, terraform etc

2018-10-11

<{^_^}> [nixpkgs] @zimbatm pushed to release-18.09 « vault: 0.11.1 -> 0.11.2 »: https://git.io/fxlNE

2018-10-09

<{^_^}> [nixpkgs] @LnL7 merged pull request #47933 → vault: 0.11.1 -> 0.11.2 → https://git.io/fx33R

2018-10-05

<{^_^}> [nixpkgs] @zimbatm opened pull request #47933 → vault: 0.11.1 -> 0.11.2 → https://git.io/fx33R

2018-09-28

<{^_^}> [nixpkgs] @zimbatm pushed to master « vault: add completion deprecation notice »: https://git.io/fxvvj

2018-09-26

<elvishjerricco> LnL: Hardening Vault doesn't make it invincible. I'm just saying it's adding a single point of failure where there previously may not have been one. But again, I'm willing to concede that key rotation might make up for it, especially since it's probably easy to make Vault insanely hard to penetrate.
<elvishjerricco> LnL: True, but the damage is scoped to only what that machine has access to. And Vault doesn't prevent that; if the weakest link is compromised, the attacker has all the same access as without Vault.
<elvishjerricco> ixxie: If the vault is compromised, then sending a private key does no good, since the attacker can just retain the key
<LnL> if you restart vault you can't access anything until it's unlocked by an admin
<ixxie> I don't know for sure, I am just speculating - but if it encrypts something and knows microservice X owns it, it can send the private key to X through a networking service like Consul and then X can open the resource but Vault can't
<elvishjerricco> LnL: How does Vault have no access if it's the one doing all the issuing?
<LnL> vault can't read it's own secrets and the code is reviewed by security people every nth release
<elvishjerricco> Doesn't really sound inherently more secure. If that machine is compromised, the attacker still gets the same level of access. Except now you've got this single Vault that, if compromised, compromises everything
<ixxie> LnL so how does vault make it better?
<LnL> ixxie: no, but I think the vault approach is much better then whatever supporting secret files in nix would be
<ixxie> LnL: have you setup vault with NixOps?
<gchristensen> lnl likes Vault for secrets, it'd be interesting to explore nixos + nixops + vault

2018-09-14

<LnL> nix-build -A vault --option allow-import-from-derivation false works fine
<zimbatm> > Vault UI is not available in this binary
<zimbatm> isn't the vault UI packaged with vault nowadays?
<LnL> hey, since you've used both vault and yarn2nix I was wondering if you ever tried to get the new vault ui working

2018-09-12

<{^_^}> [nixpkgs] @LnL7 pushed commit from @zimbatm to release-18.09 « vault: 0.10.4 -> 0.11.1 »: https://git.io/fAKd8
<{^_^}> [nixpkgs] @LnL7 merged pull request #46580 → vault: 0.10.4 -> 0.11.1 → https://git.io/fAK1O
<{^_^}> [nixpkgs] @zimbatm opened pull request #46580 → vault: 0.10.4 -> 0.11.1 → https://git.io/fAK1O

2018-09-11

<{^_^}> [nixpkgs] @srhb merged pull request #46503 → aws-vault: 4.1.0 -> 4.3.0, pass linker flag for specifying app version → https://git.io/fAwn1
<{^_^}> [nixpkgs] @ento opened pull request #46503 → aws-vault: 4.1.0 -> 4.3.0, pass linker flag for specifying app version → https://git.io/fAwn1

2018-08-25

<jD91mZM2> btw good thing the installation media struggled, I just remembered I forgot to copy my password manager vault. Jeez :P

2018-08-12

<{^_^}> [nixpkgs] @srhb merged pull request #44898 → vault: 0.10.3 -> 0.10.4 → https://git.io/fN54R

2018-08-11

<{^_^}> [nixpkgs] @LnL7 opened pull request #44898 → vault: 0.10.3 -> 0.10.4 → https://git.io/fN54R

2018-08-10

<{^_^}> [nixpkgs] @srhb merged pull request #44848 → vault: make package configurable → https://git.io/fNQZg

2018-08-09

<{^_^}> [nixpkgs] @LnL7 opened pull request #44848 → vault: make package configurable → https://git.io/fNQZg

2018-07-11

<{^_^}> [nixpkgs] @xeji pushed commit from @bricewge to master « vault: 0.9.5 -> 0.10.3 (#43355) »: https://git.io/fNIlb
<{^_^}> [nixpkgs] @xeji merged pull request #43355 → vault: 0.9.5 -> 0.10.3 → https://git.io/fNk1d