security/rbw - The NetBSD Packages Collection

Unofficial bitwarden cli

This is an unofficial command line client for Bitwarden.
Although it does come with its own command line client, this client is
limited by being stateless - to use it, you're required to manually lock and
unlock the client, and pass the temporary keys around in environment variables,
which makes it very difficult to use. This client avoids this problem by
maintaining a background process which is able to hold the keys in memory,
similar to the way that ssh-agent or gpg-agent work. This allows the client
to be used in a much simpler way, with the background agent taking care of
maintaining the necessary state.

I consider rbw to be essentially feature-complete for me at this point. While
I still use it on a daily basis, and will continue to fix regressions as they
occur, I am unlikely to spend time implementing new features on my own. If you
would like to see new functionality in rbw, I am more than happy to review
and merge pull requests implementing those features.

Build dependencies

lang/rust x11/xcb-proto x11/xorgproto x11/xcb-proto pkgtools/mktools devel/pkgconf pkgtools/cwrappers

Runtime dependencies

x11/libxcb security/pinentry x11/libxcb security/pinentry

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64rbw-1.9.0.tgz
NetBSD 10.0earmv7hfrbw-1.9.0.tgz
NetBSD 10.0i386rbw-1.9.0.tgz
NetBSD 10.0x86_64rbw-1.9.0.tgz
NetBSD 9.0earmv7hfrbw-1.9.0.tgz
NetBSD 9.0i386rbw-1.9.0.tgz
NetBSD 9.0x86_64rbw-1.9.0.tgz
NetBSD 9.3x86_64rbw-1.9.0.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.