Broken; being rewritten.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
This repo is archived. You can view files and clone it, but cannot push or open issues/pull-requests.
brent s. 7502b6a23b
this is kind of broken so it's being rewritten. just pushing some local changes first
1 year ago
docs this is kind of broken so it's being rewritten. just pushing some local changes first 1 year ago
testing just need to bind args to funcs and finish docs. meat is done. 2 years ago
vaultpass i think i might scrap it and re-do. it's kind of Broken(TM). 2 years ago
.gitignore more argument parsing 2 years ago
LICENSE oh yeah, i should probably offically license this 2 years ago
TODO some basics for VaultPass 2 years ago
example.vaultpass.xml finishing up some of the mount parsing. it now successfully builds a dictionary map at least. docs updated and print formatter done. 2 years ago just need to bind args to funcs and finish docs. meat is done. 2 years ago


VaultPass User Manual


What is Vault?

Vault by HashiCorp is a "secrets manager" - it securely protects various secrets with a very robust system of authentication and authorization.

It also provides an X.509 PKI system for certificates generation and a token/OTP generator.

What is Pass?

Pass ("The standard Unix password manager") is a password manager written entirely in bash and backed by GPG. It’s fairly barebones in terms of technology but does a decent enough job.

What is VaultPass?

VaultPass attempts to bridge the gap between the two. It aims to be a drop-in replacement for the pass CLI utility via subcommands and other operations, but obviously with Vault as a backend instead of GPG-encrypted flatfile hierarchy.

Obviously since the backends are vastly different, total parity is going to be impossible but I try to get it pretty close. Important deviations are documented below.


Unlike Pass, PassVault requires a persistent configuration. At the very least, the authentication method needs to be specified.

The default location for the configuration file is ~/.config/vaultpass.xml. It’s an XML document formatted with the following structure:

  1. The XML prolog, specifying the character encoding of the document and XML version.[1]

  2. The root element (vaultpass). This element contains attributes describing parsing/validation specifics as well, such as the namespace definitions and schema location.[1]

    1. The server element. This element is a container for connection and management of the Vault server and is required (even though it may not have any children). This consists of:

      1. A single uri element.[2] It should be the same as the base URL for your Vault server. If not specified, the default is to first check for a VAULT_ADDR environment variable and, if not found, to use http://localhost:8200/.

      2. An unseal element[2], which can be used to (attempt to) automatically unseal the server if it is sealed. This isn’t required, but can assist in automatic operation. One of either:[2]

        1. unseal, the unseal key shard (a Base64 string), or

        2. unsealGpg, the unseal key shard encrypted with GPG. See the section on GPG-Encrypted Elements.

      3. A required authentication directive which specifies how we should authenticate to Vault. It should be comprised of one of either:

        1. auth (see Auth section below), or

        2. authGpg, an Auth config snippet encrypted with GPG. See the section on GPG-Encrypted Elements.

      4. An optional mounts container.[2] See the section on Mounts.

If you would like to initialize Vault with VaultPass, use a self-enclosed Token auth stanza. It will automatically be replaced once a root token is generated.

Let’s look at an example configuration.

Example Configuration

~/.config/vaultpass.xml example:
<?xml version="1.0" encoding="UTF-8" ?>
<vaultpass xmlns:xsi=""

        <mount type="kv1">secret_legacy</mount>
        <mount type="kv2">secret</mount>
        <mount type="cubbyhole">cubbyhole</mount>


In the above, we can see that it would use the Vault server at http://localhost:8200/ using whatever token is either in the VAULT_TOKEN environment variable or, if empty, the ~/.vault-token file. Because an unseal shard was provided, it will be able to attempt to automatically unseal the Vault (assuming its shard will complete the threshold needed). Because we specify mounts, we do not need permissions in Vault to list /sys/mounts (but if our token has access to do so per its policy, then any automatically discovered will be added).


Vault itself supports a large number of authentication methods. However, in the interest if maintainability, this project has limited support to only the most common authentication methods. More authentication methods may be added in the future upon request.

All of these (except for Token) require configuration in Vault first. Configuration of those authentication methods is out of scope for this document and project. Please ensure that your authentication works as expected in the Vault CLI utility or via the Vault API first before submitting a bug report in VaultPass.


AppRole takes two required children elements:

  1. appRole (the container element)

    1. role, the AppRole’s RoleID, and

    2. secret, the AppRole’s SecretID.

Example Snippet
<!-- SNIP -->
<!-- SNIP -->


LDAP takes two required children elements and one optional child element:

  1. ldap (the container element)

    1. username, the username (as according to the userdn and userattr settings in the configuration)

    2. password, the password for the account object.

    3. mountPoint [2], the mount point for the LDAP authentication in Vault. The default, if not provided, is ldap.

Example Snippet
<!-- SNIP -->
<!-- SNIP -->


Token auth is the most basic supported authentication in Vault and can be used without any further configuration.

It consists of, at its most basic (and "automagic") configuration, a single elementbut this can be configured more in-depth/explicitly.

  1. token (the container element)

    1. The token itself or content/source of the token.[2]

It has one optional attribute: source.[2]. It can be one of the following:

  • env:MY_TOKEN_VAR, in which environmental token MY_TOKEN_VAR will be sourced.

  • A filesystem path, in which the file is assumed to contain the token (and ONLY the token).

To determine the behaviour of how this behaves, please refer to the below table.

Table 1. Determining token behaviour
No. If… Then…


self-enclosed, no source

The VAULT_TOKEN environment variable is checked. If not defined, the file ~/.vault-token will be checked. If that file doesn’t exist, a RuntimeError will be raised.


self-enclosed, source given

The source is assumed to be the only source and no automatic detection will occur.


token contained in tags, no source

The specified token will be used and no automatic detection will occur.


token contained in tags, source given

Same as 3; source is ignored.

If the Vault instance is not initialized and a vaultpass init is called, the configuration file will be updated to use token auth, populated with the new root token, and populated with the new unseal shard. (The previous configuration file will be backed up first!).

Example Snippet
<!-- SNIP -->
        <!-- "Automagic" (#1).
             First $VAULT_TOKEN environment variable is checked,
             then ~/.vault-token is checked. -->

        <!-- Source is considered the only place to fetch token from (#2). -->
            <!-- This would check the environment variable $SOMEVAR -->
        <!-- <token source="env:SOMEVAR"/> -->
            <!-- This would use the contents of ~/.vault-token.alt -->
        <!-- <token source="~/.vault-token.alt"/> -->

        <!-- Token explicitly given is the only one used. -->
        <!-- <token>s.Lp4ix1CKBtJOfA46Ks4b4cs6</token> -->

        <!-- Token explicitly given is the only one used; source attribute is ignored. -->
        <!-- <token source="env:THIS_IS_IGNORED">s.Lp4ix1CKBtJOfA46Ks4b4cs6</token> -->
<!-- SNIP -->


Vault’s userpass authentication method must be configured beforehand, but it’s a relatively simple configuration.

VaultPass user/password authentication takes two required children elements and one optional element.

  1. userpass (the container element)

    1. username, the username of the account.

    2. password, the password for the account.

    3. mountPoint [2], the mount point for the auth. If not specified, the default is userpass.

Example Snippet
<!-- SNIP -->
<!-- SNIP -->


VaultPass has the ability to automatically detect (some) mounts and their paths.

So why, then, should you specify them in the configuration file? Simple: because you might not have permission to list them! Even if you can see the mounts in the web UI that you have permission to, that doesn’t guarantee that they’re accessible/viewable via the API (which is how VaultPass, and even the upstream Vault binary client, operates). So by specifying them in the configuration file, you’re able to "bootstrap" the process.

The optional mounts [2] container contains one or more mount child elements, with the name of the mountpoint as the content.

Each mount element has one optional attribute, type [2], which can be one of:

More mount types may be added upon popular demand and technical feasability.

GPG-Encrypted Elements

Understandably, in order to have a persistent configuration, that means storing on disk. That also means that they need to be able to be accessed with no or minimal user interruption. Pass used GPG natively, so it didn’t have an issue with this; since gpg-agent is typically spawned on first use of a GPG homedir (usually ~/.gnupg/ by default) and keeps an authenticated session open for 10 minutes (by default).

To get around needing to store plaintext credentials on-disk in any form, VaultPass has unsealGpg and authGpg elements. These elements are of the same composition (described below) and allow you to use GPG to encrypt that sensitive information.

While this does increase security, it breaks compatibility with other XML parsers - they won’t be able to decrypt and parse the encrypted snippet unless explicitly coded to do so.

*Gpg elements

*Gpg elements (authGpg, unsealGpg) have the same structure:

  1. unsealGpg/authGpg, the container element.

    1. The path to the encrypted file as the contained text.

It has one optional attribute, gpgHome [2]the GPG home directory to use. If not specified, VaultPass will first check the GNUPGHOME environment variable. If that isn’t defined, we’ll default to ~/.gnupg/ (or whatever the compiled-in default is).

The contents of the encrypted file should match the unencrypted XML content it’s replacing.

Note that if you use namespaces in your vaultpass.xml config file, you MUST use matching declarations in your encrypted file. You MAY exclude the xsi:schemaLocation specification, however, if it’s the same as your vaultpass.xml. It is highly recommended that you use the same xsi:shemaLocation, however (or leave it out entirely).

Let’s look at an example of GPG-encrypted elements.

GPG-Encrypted Elements Example

<?xml version="1.0" encoding="UTF-8" ?>
<vaultpass xmlns:xsi=""

        <unsealGpg gpgHome="~/.gnupg">~/.private/vaultpass/unseal.asc</unsealGpg>
    <authGpg gpgHome="~/.gnupg">~/.private/vaultpass/auth.gpg</unsealGpg>

As shown, it supports both ASCII-Armored and Binary encryption formats.


~/.private/vaultpass/unseal.asc contents:

<unseal xmlns:xsi=""


~/.private/vaultpass/auth.gpg contents:
<auth xmlns:xsi=""



Known Incompatibilities with Pass

PASSWORD_STORE_ENABLE_EXTENSIONS,.extensions/COMMAND.bash, and Default Subcommands

Issue Description

Per the Pass man page:

If no COMMAND is specified, COMMAND defaults to either show or ls, depending on the type of specifier in ARGS. Alternatively, if PASSWORD_STORE_ENABLE_EXTENSIONS is set to "true", and the file .extensions/COMMAND.bash exists inside the password store and is executable, then it is sourced into the environment, passing any arguments and environment variables. Extensions existing in a system-wide directory, only installable by the administrator, are always enabled.

Due to this being Python, we lose some of this compatibility. It may be possible to add this functionality in the future, but it’s lower priority currently.

Similarly, we cannot set a default subcommand as of yet in Python via argparse (the library that VaultPass uses to parse command-line arguments).


You can set an alias in your ~/.bashrc that will:

  1. Execute show by default

  2. Provide a direct command for ls operations

  3. Specify default options for a command

Via the following:

# ...

# 1
alias pass='vaultpass show'

# 2
alias lpass='vaultpass ls'

# 3
alias vaultpass='vaultpass -c ~/.config/alternate.vaultpass.xml'

To use the non-aliased command in Bash, you can either invoke the full path:

/usr/local/bin/vaultpass edit path/to/secret

Or, alternatively, prefix with a backslash:

\vaultpass edit path/to/secret

Finally, you can always use VaultPass by specifying the subcommand and disregard aliases entirely.

find/search Subcommand Searching

Issue Description

Pass used find(1) to search secret paths. Because we use Vault and not a filesystem hierarchy, this isn’t applicable. As such, the normal find globbing language is not supported…


What is supported, however, is regular expressions' ("regex") match patterns.

If you haven’t used regexes before, here are some helpful starters/tools:

Regular expressions are MUCH more powerful than the find globbing language, but do have a slight learning curve. You will be thankful to learn their syntax, however, as they are very widely applicable.

Environment Variables

Issue Description

Pass (and to a slightly lesser extent, Vault) relies almost entirely/exclusively upon environment variables for configuration. VaultPass does not.


Relying entirely on environment variables for configuration is dumb, so I don’t do on that. All persistent configuration can be either specified in the configuration file or can be overridden by flags/switches to subcommands. Some configuration directives/behaviour may be overridden by environment variables where supported by Vault/Pass upstream configuration.

Vault Paths Don’t Match VaultPass' Paths

Issue Description

Pass and Vault have fundamentally different storage ideas. Pass secrets/passwords are, once decrypted, just plaintext blobs. Vault, on the other hand, uses a key/value type of storage. As a result, this means two things:

  • The last item in a path in VaultPass is the key name (e.g. the path foo/bar/baz in VaultPass would be a Vault path of foo/bar, which would then have a key named baz), and

  • The line-number sub-argument is completely irrelevant for things like copying to the clipboard and generating a QR code (e.g. as in pass show --clip=line-number).


None, aside from not using the line-number sub-argument since it’s no longer relevant. (You’ll get an error if you do.)

Unable to specify line-number

See above (Vault Paths Don’t Match VaultPass' Paths).

Deleting Secrets in KV2

Issue Description

In Pass, because it doesn’t have versioning (unless you’re using git with your Pass instance). Vault’s kv2 engine, however, does have versioning. As a result, once a secret is "deleted", it can still be recovered via an undelete method. If you are deleting a secret for security reasons, you may want to destroy it instead. VaultPass' delete method uses a delete rather than a destroy.


VaultPass has a new subcommand, destroy, which will remove versioned secrets permanently. Use with caution, obviously. If called on a non-KV2 mount’s path, it will be the same as the delete subcommand.

1. These aren’t strictly necessary, but will make cross-parsing and validation MUCH easier. It’s highly recommended to use them.
2. This element/attribute/text content is optional. See the item’s description for how default values/behaviour are determined.