
Security News
Rust RFC Proposes a Security Tab on crates.io for RustSec Advisories
Rust’s crates.io team is advancing an RFC to add a Security tab that surfaces RustSec vulnerability and unsoundness advisories directly on crate pages.
confabulous-vault-loader
Advanced tools
Confabulous-Vault-Loader is an Vault Loader for Confabulous - a hierarchical, asynchronous config loader and post processor.
const confabulous = require('confabulous')
const Confabulous = confabulous.Confabulous
const vault = require('confabulous-vault-loader')
const processors = confabulous.processors
new Confabulous()
.add((config) => vault({ url: 'http://localhost:8200', path: 'secret/live/demo', method: 'app-id', appId: 'svc-demo-api' , userId: 'demo-live' }))
.on('loaded', (config) => console.log('Loaded', JSON.stringify(config, null, 2)))
.on('reloaded', (config) => console.log('Reloaded', JSON.stringify(config, null, 2)))
.on('error', (err) => console.error('Error', err))
.on('reload_error', (err) => console.error('Reload Error', err))
.end()
| Option | Type | Default | Notes |
|---|---|---|---|
| url | string | URL of the vault server | |
| path | string | Path to the encrypted config | |
| method | string | Authentication method (currently only app-id is supported) | |
| appId | string | Application Id (required for authentication when using app-id method) | |
| userId | string | User Id (required for authentication when using app-id method) | |
| mandatory | boolean | true | Causes an error/reload_error to be emitted if the configuration does not exist |
| watch | object | Polls the vault server for changes. Requires an interval, e.g. { interval: '5m'} | |
| request | object | see here | options that will be passed to the underlying http client. |
Setting up a vault environment is no easy task. The following might help...
docker run -d -p 8200:8200 --hostname vault --name vault sjourdan/vault
docker logs vault
export VAULT_ADDR=http://vault:8200
export VAULT_TOKEN=<INSERT_TOKEN_HERE>
alias vaultcmd="docker run --volume $(pwd)/tests/vault:/tmp --link vault --rm -e VAULT_ADDR -e VAULT_TOKEN sjourdan/vault"
vaultcmd unseal <INSERT_UNSEAL_KEY>
vaultcmd policy-write demo-live /tmp/policies/live/demo.json
vaultcmd auth-enable app-id
vaultcmd write auth/app-id/map/app-id/svc-demo-api value=demo-live display_name=svc-demo-api
vaultcmd write auth/app-id/map/user-id/demo-live value=svc-demo-api
vaultcmd policy-write demo-live /tmp/policies/live/demo.json
You should now be able to run tests. Hoorah!
FAQs
A confabulous vault loader
The npm package confabulous-vault-loader receives a total of 2 weekly downloads. As such, confabulous-vault-loader popularity was classified as not popular.
We found that confabulous-vault-loader demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Rust’s crates.io team is advancing an RFC to add a Security tab that surfaces RustSec vulnerability and unsoundness advisories directly on crate pages.

Security News
/Research
Socket found a Rust typosquat (finch-rust) that loads sha-rust to steal credentials, using impersonation and an unpinned dependency to auto-deliver updates.

Research
/Security Fundamentals
A pair of typosquatted Go packages posing as Google’s UUID library quietly turn helper functions into encrypted exfiltration channels to a paste site, putting developer and CI data at risk.