-
Notifications
You must be signed in to change notification settings - Fork 594
[linux keychain] new credential helper interfacing 99designs/keyring package #272
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[linux keychain] new credential helper interfacing 99designs/keyring package #272
Conversation
|
We need to see how this affects existing saved credentials in OSX. Last time i tried this it orphaned everything, interested in your thoughts on this? Cheers for doing such a neat PR and I REALLY want this at the moment. |
|
Yeah so this is going to use the "application password" kind of osx item (but the current helper is doing neat internet password) with a not ideal json content, I did not realize it is doing this compromise. I will look at maybe using it only for linux and keeping the current helpers instead. |
|
I'll spin a desktop linux vm when at work Monday to test this again. |
|
Alright this is still working fine, just ran with libsecret on gnome/unity |
|
Any updates on this? |
|
Apologies meant to post a comment on this a while back. The missing support is upstream now https://github.com/keybase/go-keychain/issues/36 The reason I have held off merging this is IF 99designs updates this library to support OSX correctly then this PR will merge and support both, removing a whole load of crufty c code. Interested on thoughts on this? |
|
Last I checked there was a lot of work to properly support this secClass with all its fields in go-keychain. Declaring the type is a first step, but there's more to do. |
|
@wolfeidau looks like this got merged in the day after a release. Any chance we can get another release soon? |
Keyring integration for linux (more specifically gnome as it was using secret-service) has already been tried in v2.8.0 but reverted for v2.8.1 because of linking issues with libsecret for people not having on their systems (maybe they were using kde, so kwallet integration would have worked) #217.
I would like to try this again because saml2aws works very well for us (except for okta doing weird things with mfa) and proper linux integration would be a major usability gain for our linux users.
I propose to replace every current credential helpers with a new one deferring to https://github.com/99designs/keyring for storage. We tested and confirmed this to work on osx's keychain, secret-service and kwallet, it does change the storage format so there would be a new password prompt for current users though.
Before this can be considered ready for anything more it probably needs tweaking on the
AllowedBackendssetting depending on if the fallback to encrypted file storage is desirable.Thanks for any comment you may have on this and your time for making this tool.
PS: I removed
credentials.List(), this is a lazy move but it was dead code, let me know if it must stay.fixes #266,#254