pass_secret_service icon indicating copy to clipboard operation
pass_secret_service copied to clipboard

Add some documentation

Open DamienCassou opened this issue 5 years ago • 6 comments

I've just discovered pass_secret_service. I think the following could be added to the README:

  1. some known users of the secret_service dbus API (is the API used at all?)
  2. other implementations of the secret_service dbus API (in case pass_secret_service doesn't work for someone)
  3. a way to test that everything is set up properly
  4. should users deactivate other implementations (if Gnome Keyring implements the API, should we uninstall it?)
  5. what files/folders does pass_secret_service use in my password store
  6. can I edit the files in secret_service/ folder myself?

DamienCassou avatar Apr 29 '21 06:04 DamienCassou

  1. some known users of the secret_service dbus API (is the API used at all?)

Any app that uses libsecret, which is probably most GNOME apps (those that have any secrets to store), some KDE apps, and various scripts and tools. KDE apps are supposed to be migrating to QtKeyChain, which supports both KWallet and libsecret backends.

  1. other implementations of the secret_service dbus API (in case pass_secret_service doesn't work for someone)

The main ones are Gnome Keyring, KWallet (as of the very recent 5.97.0), and KeePassXC. There is also mvdan/bitw for BitWarden.

  1. should users deactivate other implementations (if Gnome Keyring implements the API, should we uninstall it?)

Yes. Of the main three, Gnome Keyring is the most problematic, since it doesn't play nice with other Secret Service providers (gnome-keyring#86). You may need to uninstall it, unless they added a "Disable" option. If you don't uninstall it, make sure that gnome-keyring-daemon process is not running (and isn't getting respawned).

With KeePassXC and KWallet, you can disable Secret Service integration from their settings. You may need to restart the kwalletd5 process (or shut it down if you don't need KWallet).

On KDE, QtKeyChain currently prefers the KWallet API if it's available (qtkeychain#220, qtkeychain#171), so you may need to disable KWallet entirely.

  1. a way to test that everything is set up properly
  • busctl --user | grep secret should list org.freedesktop.secrets as either activatable or running. If running, it should list the process as pass_secret_service.
  • qdbus org.freedesktop.secrets should list all your collections and items (if there are any, and the service is running). This looks like a bunch of /org/freedesktop/secrets/collection/xxxx/iiii lines, where xxxx is the collection name, and iiii is the item index.
  • Use secret-tool (CLI) or Seahorse (GUI) clients to inspect and modify secrets via the Secret Service API.

See also https://github.com/mdellweg/pass_secret_service/issues/32#issuecomment-1239308966

michaelk83 avatar Sep 07 '22 13:09 michaelk83

Thank you very much for your detailed answers. My point was more about adding this information to the README so everyone can see it quickly.

DamienCassou avatar Sep 07 '22 16:09 DamienCassou

My point was more about adding this information to the README

That's up to the developer. But better here than nowhere.

michaelk83 avatar Sep 07 '22 17:09 michaelk83

I must confess, i cannot divert a lot of time to this project as of by now. But i'd be happy to see this as a contribution.

mdellweg avatar Sep 08 '22 08:09 mdellweg

I think this can be left here for now. Adding this to the readme would require some rearrangement into appropriate sections, and better formatting. The issue references wouldn't be appropriate there, either.

michaelk83 avatar Sep 08 '22 09:09 michaelk83

6. can I edit the files in secret_service/ folder myself?

I wonder the same like can I use existing keys that is already the in the same keyring/passwordstore. Often I already have similar keys that used by services that come from the same LDAP/Identity-Management.

Thaodan avatar Sep 08 '22 18:09 Thaodan