Skip to content
This repository has been archived by the owner on May 6, 2024. It is now read-only.

Secret service #23

Merged
merged 5 commits into from
Sep 10, 2023
Merged

Secret service #23

merged 5 commits into from
Sep 10, 2023

Conversation

fsobolev
Copy link
Member

@fsobolev fsobolev commented Sep 9, 2023

Closes #20
Closes #22

Uses Ace4896.DBus.Services.Secrets instead of libsecret.
Unfortunately there are some bugs in this package, as workaround an item attribute (application with app ID as the value) is used to determine which item in keyring contains the password we need. Not a big deal really, but I find it less straightforward than using item label.
One more unusual (not really unusual: I noticed I have the same thing with items created by other apps) thing is that the data seems to be saved to keyring in some odd way that a password itself isn't shows in an entry in Seahorse. But I tried to print it out and so I'm totally sure a password is saved correctly, it's not empty. Reading a password that was manually typed in Seahorse also works, so it's still possible to migrate a Parabolic's keyring.

Parabolic unsandboxed was successfully tested, will test Flatpak and Snap later.

@fsobolev
Copy link
Member Author

Just tested flatpak - it works, only --talk-name=org.freedesktop.secrets is needed

@nlogozzo
Copy link
Member

Will merge and release when I get home

@nlogozzo nlogozzo merged commit bae6615 into main Sep 10, 2023
@nlogozzo nlogozzo deleted the secret-service branch September 10, 2023 21:13
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Make Keyring.Access and KeyringDialogController.EnableKeyring async Print errors on Keyring access failure
2 participants