[15:03:38] o/ [15:42:03] \o [15:43:26] o/ [15:44:00] )o) [15:47:21] \o- -o- -o/ [18:05:05] at some point we should really find the time to work on secrets and go next pwstore... I want to add a file and my people chasing counter is already at 3... [18:09:31] what exacly is the issue? [18:09:35] volans: including puppet secret() as well? [18:09:54] herron: those are two different problems, but potentially yes [18:10:07] are they? [18:10:08] chaomodus: gpg expirations [18:10:21] ah surely we could .. alert on that? [18:10:46] not really, the list of users that have access to it is not public [18:10:54] Mh [18:10:56] yah [18:10:56] not to mention their GPGs [18:10:58] huh [18:11:05] I mean, ofc they are public [18:11:07] the keys [18:11:19] but one could have multiple potentially [18:11:51] could possibly walk .users and bark if one is expiring soon [18:12:48] herron: I think they are related but have different angles, secret() is to deploy secrets to hosts, via our cfg mgmt software of choice, pwstore is for human secrets, they have slightly different requirements [18:13:03] but I'm not excluding that one tool could fit both needs, if that's what you meant [18:14:28] yeah that’s what I was thinking, of course a large effort, but managed secrets should be consumable by humans and programs [18:14:46] IMO [18:15:39] I've ideas for the requirements part, ETOOLONG/ETOOLATE to put them here now, but happy to chat about them next week if you remind me ;) [18:16:27] nice, sounds good [18:17:19] cool