-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrate with git support #14
Comments
Could you elaborate on this issue - how would it work in difference compared to how it's working today? Does it refer to the password-store folder being a git repo? Just like for pass/gopass, that should already work fine, managed outside of pass_secret_service. What is the requirement for this feature to be considered done? |
This tool creates supplemental file to the usual pass operation (.aliases; *.properties). We need to ensure that these are part of git commits created by pypass for the corresponding password entries. |
Ah, right. Would the below be an accurate description of desired behavior?
|
It should be autodetected based on the password store in use being "git aware". |
Should those go into the password metadata? Similar things were done for browser extensions. |
Aliases are not associated with any particular password, so can't go there. Properties, assuming he means Secret Service's lookup attributes, may fit into metadata, but they're usually not meant to be encrypted (I'm not sure if metadata is or not). They're primarily intended for password lookups. |
Aliases are not associated with any particular password, so can't go there.
Properties, assuming he means Secret Service's lookup attributes, may fit
into metadata, but they're usually not meant to be encrypted (I'm not sure
if metadata is or not). They're primarily intended for password lookups.
https://specifications.freedesktop.org/secret-service/latest/ch04.html
https://specifications.freedesktop.org/secret-service/latest/ch05.html
Hm I'm not exactly sure but was such meta data not resolved via the filesystem
path to the key file.
Even aliases are usually just symlinks to the password file.
|
The Secret Service API allows an arbitrary set of lookup attributes to be associated with each password, where each attribute is a key-value pair. So I don't think the filesystem path is enough for this. But this begins to enter implementation details specific to this particular adapter service, which I'm less familiar with. Keep in mind that client applications talking to the Secret Service API are not aware which backend is being used, or how it works. They only know the API specification. |
Secrets, as well as metadata should be subject to git operation if configured.
The text was updated successfully, but these errors were encountered: