OO7

docs crates.io CI

James Bond went on a new mission and this time as a Secret Service provider.

The library consists of two modules:

Sandboxed applications should prefer using the file backend as it doesn't expose the application secrets to other sandboxed applications if they can talk to the org.freedesktop.Secrets service.

The library provides helper methods to store and retrieve secrets and uses either the DBus interface or the file backend based on whether the application is sandboxed or not.

Goals

Examples

Basic usage

```rust,ignore use std::collections::HashMap;

let keyring = oo7::Keyring::new().await?;

// Store a secret keyring.createitem( "Item Label", HashMap::from([("attribute", "attributevalue")]), b"secret", true, )?;

// Find a stored secret let items = keyring .searchitems(HashMap::from([("attribute", "attributevalue")])) .await?;

// Delete a stored secret keyring .delete(HashMap::from([("attribute", "attribute_value")])) .await?;

// Unlock the collection if the Secret Service is used keyring.unlock().await?;

// Lock the collection if the Secret Service is used keyring.lock().await?; ```

If your application makes heavy usage of the keyring like a password manager. You could store an instance of the Keyring in a OnceCell

```rust,ignore use once_cell::sync::OnceCell;

static KEYRING: OnceCell = OnceCell::new();

fn main() { // SOMERUNTIME could be a tokio/async-std/glib runtime SOMERUNTIME.block_on(async { let keyring = Keyring::new() .await .expect("Failed to start Secret Service"); KEYRING.set(keyring); });

// Then to use it
SOME_RUNTIME.spawn(async {
    let items = KEYRING
        .get()
        .unwrap()
        .search_items(HashMap::from([("attribute", "attribute_value")]))
        .await?;
});

} ```

Migrating your secrets to the file backend

The library also comes with API to migrate your secrets from the host Secret Service to the sandboxed file backend. Note that the items are removed from the host keyring if they are migrated successfully.

rust,ignore // SOME_RUNTIME could be a tokio/async-std/glib runtime SOME_RUNTIME.block_on(async { match oo7::migrate(vec![HashMap::from([("attribute", "attribute_value")])], true).await { Ok(_) => { // Store somewhere the migration happened, to avoid re-doing it at every startup } Err(err) => log::error!("Failed to migrate secrets {err}"), } });

Optional features

| Feature | Description | Default | | --- | ----------- | ------ | | tracing | Record various debug information using the tracing library | No | | async-std | Use async-std APIs for IO/filesystem operations | Yes | | tokio | Use tokio APIs for IO/Filesystem operations | No | | unstable | Unlock internal APIs | No |

How does it compare to other libraries?

License

The project is released under the MIT license.

Credits