From patchwork Tue May 13 14:16:44 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sergey Trofimov X-Patchwork-Id: 42576 Return-Path: X-Original-To: patchwork@mira.cbaines.net Delivered-To: patchwork@mira.cbaines.net Received: by mira.cbaines.net (Postfix, from userid 113) id B195D27BC4A; Tue, 13 May 2025 15:18:55 +0100 (BST) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mira.cbaines.net X-Spam-Level: X-Spam-Status: No, score=-6.4 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_BLOCKED, RCVD_IN_VALIDITY_CERTIFIED,RCVD_IN_VALIDITY_RPBL,RCVD_IN_VALIDITY_SAFE, SPF_HELO_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mira.cbaines.net (Postfix) with ESMTPS id AF4A927BC49 for ; Tue, 13 May 2025 15:18:53 +0100 (BST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1uEqSn-0006O0-Ax; Tue, 13 May 2025 10:18:37 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1uEqSI-00065j-UP for guix-patches@gnu.org; Tue, 13 May 2025 10:18:05 -0400 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1uEqSI-0005pw-Fz for guix-patches@gnu.org; Tue, 13 May 2025 10:18:02 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debbugs.gnu.org; s=debbugs-gnu-org; h=MIME-Version:Date:From:To:Subject; bh=Udiv4v5OQ8uhRmKAjl9savel5Oi+CbJ3ce9Lc4j+ImE=; b=hp65cfHIS6WUQPYkfXT0InIM6859Op7EuWoTwdPkTQOAJ67Sg7WWzoJz6aPMvMLpt9URkSMlzopRmH5Y6qPlQqTWVFOoCi5pExTdexmoFTGAIgmkKWI3u9JWM8Ez+GqFtHNv/mW6WRbW1HhN+ziixw37KduPH4etetwZLeE90TSIOzWjCauGRPnfR3NGtslnRkyIN0rb+NDoHk+DhZMOrvEX1OU5KND3WTgdkA2f42gDFeaXEVm3mOUVpq+r/PDYh4IRsUOA9p68XKFVoXfjsE4zqNgx23NbnqgM+f01asvc6tDTcq/1i483oggBm4EhC7/zGSEs3kLzKPtYpS2c6w==; Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1uEqSI-0000bK-3i for guix-patches@gnu.org; Tue, 13 May 2025 10:18:02 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#78406] [PATCH] gnu: Add secretsd. Resent-From: Sergey Trofimov Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Tue, 13 May 2025 14:18:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 78406 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 78406@debbugs.gnu.org Cc: Sergey Trofimov X-Debbugs-Original-To: guix-patches@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.17471458422247 (code B ref -1); Tue, 13 May 2025 14:18:01 +0000 Received: (at submit) by debbugs.gnu.org; 13 May 2025 14:17:22 +0000 Received: from localhost ([127.0.0.1]:60747 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1uEqRe-0000aA-38 for submit@debbugs.gnu.org; Tue, 13 May 2025 10:17:22 -0400 Received: from lists.gnu.org ([2001:470:142::17]:59488) by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1uEqRb-0000Zq-VC for submit@debbugs.gnu.org; Tue, 13 May 2025 10:17:20 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1uEqRJ-0004mk-9w for guix-patches@gnu.org; Tue, 13 May 2025 10:17:02 -0400 Received: from mail-ed1-x52c.google.com ([2a00:1450:4864:20::52c]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1uEqRG-0005lB-U8 for guix-patches@gnu.org; Tue, 13 May 2025 10:17:00 -0400 Received: by mail-ed1-x52c.google.com with SMTP id 4fb4d7f45d1cf-5fca2805ca4so6736005a12.1 for ; Tue, 13 May 2025 07:16:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sarg.org.ru; s=google; t=1747145814; x=1747750614; darn=gnu.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=Udiv4v5OQ8uhRmKAjl9savel5Oi+CbJ3ce9Lc4j+ImE=; b=bIfhvlxv1PiT7cUQjdUsLg/dF5ud5wfZhkPi/SHBwuQ1mqxla9NF735i1+pwN5ks1P Q9p461B7JKhTieWgP1DcOU+wVjt1wS0idCE0A4ufIGEieoKNOAPv9j3BtgDRKqIdyOCF 20GspdpqtAVga+ACjnAOK/Kd3YF/UnEIILIv8rsphfL8xEIlIP5SldXaDpeZzG2zurl2 A1gK85w3J2AdT9ZUd5S8N3EPw/rikq0eqzVyqoFKHgze180kYBH+/NeL2EPbCG7JtylL 9Wn0DIZyA1vvTRnhNJqebfQQ0Y68swYkYtNb4YoNaOK0G7HClZL16mN9gAgoXtRsTh93 ZhJA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1747145814; x=1747750614; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Udiv4v5OQ8uhRmKAjl9savel5Oi+CbJ3ce9Lc4j+ImE=; b=LjWYB/rmObV0TUsEfPOgvQfGquKJJ46ksW2pAJ/uh4E66dw5aaba7C0dFUkPZ5ry+6 4hwnLvv8vUrAf7L4QiNYSvJNwXnkJnI018vFwSo9hvd30MgdkPZVIP5UoQho0PadORQm 4aMS3H9fXr4Tm0hZmXuhVwo6dgZRCkJCXPLarYQ25B9JTDBi0TC5W/UmjmAGLwc9KG1o J6DbR3QWBqxojCNi4rqYOOwFNPAY+9KY/xb+x8TEv0Tg3FZtGwKXBkI4C8oXU9yiGHzJ I5GhmmyCMqYWW1LyHqFIXKWHEyjsw89ehWZ0SDH72vSApgaY4zVWzTqU7FfMZgiT7QmM S4tg== X-Gm-Message-State: AOJu0YwYA84fu6edqTx3E3jFaj+45be6fCcxBS1WgbQTWydQSOFig0Kx UdqPqyn4N7OUfOCx7r4YI+8j3wVfD+QnBbfAV3fAt2rflyn4tu621+kctg1vz4K8Sk7Tv9TS4A2 ORdhf+A== X-Gm-Gg: ASbGncvi4P3AuT0gPzlTLTz0Of4dQCrF8zoKT7sLnsd7JGFRRCDjoRlL4D7XUcFCMbI GTP+3hm/5TvSOVmlyxeSqajb2f0SBpbrJcuNSLhHdBtERLfAaTh5D1oCIdc96z3xk1tZkTqotry AISj8ryzOaRRQkKmMu+/ZwkfjS0vs9nj5kEC3Tmole4zaxLvP7XGGH9eY4dHtE1vVBI4VVsU0Un cINW0bCVMdskYgQx7kLRAccZ6gXgkAsd2lg2BiNHjeZsfNS7QuguJrx5bKzvKAD35jL4bKwoOPB T08Lmwzb8kHUQNQ+YN+Q/rhFrzOC6NUWbDwwloTqM9wRikJbnw== X-Google-Smtp-Source: AGHT+IHMwz2U/PVvj5iHynHHCQtAMTJ/6jddGHFJeLaC0st7CJwarE0NF5SskseMTb9jObwdnjj3Eg== X-Received: by 2002:a05:6402:210a:b0:5fd:d62b:6dc5 with SMTP id 4fb4d7f45d1cf-5fdd62b7050mr6455071a12.29.1747145814295; Tue, 13 May 2025 07:16:54 -0700 (PDT) Received: from localhost ([2a02:2454:a095:5600:a64e:31ff:fe38:fd6c]) by smtp.gmail.com with ESMTPSA id 4fb4d7f45d1cf-5ff8c6d9d9asm374019a12.39.2025.05.13.07.16.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 13 May 2025 07:16:53 -0700 (PDT) From: Sergey Trofimov Date: Tue, 13 May 2025 16:16:44 +0200 Message-ID: <8cc6bd5057dcd8ba6723ab7ff4a36293299a17f9.1747145787.git.sarg@sarg.org.ru> X-Mailer: git-send-email 2.49.0 MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::52c; envelope-from=sarg@sarg.org.ru; helo=mail-ed1-x52c.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org Sender: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org X-getmail-retrieved-from-mailbox: Patches * gnu/packages/password-utils.scm (secretsd): New variable. Change-Id: I9beb6b86ec4dae784146e7ce91210a85cf07ec7c --- gnu/packages/password-utils.scm | 44 +++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) base-commit: 364694773ef1c61d4c9ec73e24f73642786486ca diff --git a/gnu/packages/password-utils.scm b/gnu/packages/password-utils.scm index 548629c965..6e6403a898 100644 --- a/gnu/packages/password-utils.scm +++ b/gnu/packages/password-utils.scm @@ -1274,6 +1274,50 @@ (define-public argon2 ;; files are CC0 only; see README.md and LICENSE for details. (license (list license:cc0 license:asl2.0)))) +(define-public secretsd + (let ((commit "4ea56226b8f7c8739eea7fc8d1ffca8e18cf58c9") + (revision "0")) + (package + (name "secretsd") + (version (git-version "1.0" revision commit)) + (source + (origin + (method git-fetch) + (uri (git-reference + (url "https://github.com/grawity/secretsd") + (commit commit))) + (file-name (git-file-name name version)) + (sha256 + (base32 "0ka21vmvm25kal3sa8zmrifh4zac878hk24y7y3jj3ig8dkv0vfy")))) + (build-system python-build-system) + (arguments + '(#:phases + (modify-phases %standard-phases + (add-after 'unpack 'remove-deps-install + (lambda _ + (substitute* "setup.py" + ((".*install_requires.*") + "")))) + (add-after 'install 'wrap-program + (lambda* (#:key inputs outputs #:allow-other-keys) + (let* ((out (assoc-ref outputs "out"))) + (wrap-program (string-append out "/bin/secretsd") + `("GI_TYPELIB_PATH" ":" prefix + (,(getenv "GI_TYPELIB_PATH")))))))))) + (inputs (list python-dbus python-platformdirs python-cryptography + python-xdg python-pygobject)) + (native-inputs (list bash-minimal python-setuptools python-wheel)) + (home-page "https://github.com/grawity/secretsd") + (synopsis "Basic FreeDesktop.org Secret Service backend") + (description + "@code{secretsd} is a generic backend for the @code{libsecret} @acronym{API, +application programming interface} to use on headless systems or minimal desktop +environments. It stores secrets in a @code{sqlite} database, encrypted using a +@acronym{AES, Advanced Encryption Standard} key. The database key is stored in a +regular file next to the database by default, but can be read from an external +program.") + (license license:expat)))) + (define-public pass-git-helper (package (name "pass-git-helper")