keychain
Here are 153 public repositories matching this topic...
Describe the bug
Adding and encrypting a file with chezmoi add --encrypt requires two subsequent calls to chezmoi add for the unencrypted file to show as the source state.
To reproduce
printf "%s\n" test > myfile.config
chezmoi add --encrypt myfile.config
cat $(chezmoi source-path)/encrypted_myfile.config # encrypted as expected
chezmoi add myfile.config # added the As I was following the tutorials, I discovered that they Keywords screen has changed. Now there are two options for input: "with input as argv", "with input as {query}". The option "with input as argv" is selected by default.
Tutorial is written using "with input as {query}", so initially it doesn't match on the screen. There is no option to choose the Escaping options in the "with input as arg
In my code I call .clear() to remove everything during debugging.
it returns true, which denotes it succeeded. However when i call keychainSwift.getData() for a key that should no longer exist due to a clear, I get some data back, and not nil as I would expect for a key that shod have been deleted.
I'm using this on OS X 10.11
-
Updated
Jan 27, 2020 - Objective-C
Summary
I don't think this is a problem for Windows or Linux, but Keychain in macOS only allows applications to access credentials they set themselves by default. The OS does have an API that allows you to grant permission to other applications access to their credentials, but keytar has no way of doing that.
Motivation
It's very common for applications to communicate with other a
-
Updated
Jan 26, 2020 - C
It should be easy to configure for
- devices with SE & with passcode & with biometry
- devices with SE & with passcode & without biometry
- devices with SE & without passcode & with biometry (is this possible?)
- devices with SE & without passcode & without biometry
- devices without SE & with passcode
- devices without SE & without passcode
Fallback to .applicationPassword etc should b
-
Updated
Jan 30, 2020 - Swift
-
Updated
Jan 17, 2020 - Go
-
Updated
Jan 31, 2020 - Python
-
Updated
Dec 21, 2019 - JavaScript
-
Updated
Oct 17, 2019 - Objective-C
-
Updated
Jan 9, 2020 - Swift
Improve this page
Add a description, image, and links to the keychain topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the keychain topic, visit your repo's landing page and select "manage topics."
Currently if I "aws-vault foobar" and don't have a foobar profile in my aws config file, a profile section will be added and written to the file. However, if I then /remove/ the credentials, the profile section remains despite being empty. The expected behavior from me would be that if the profile were still empty (that is, never filled with extra data by the user), then it would be removed.