GNU bug report logs - #78406
[PATCH] gnu: Add secretsd.

Please note: This is a static page, with minimal formatting, updated once a day.
Click here to see this page with the latest information and nicer formatting.

Package: guix-patches; Reported by: Sergey Trofimov <sarg@HIDDEN>; Keywords: patch; Done: Sergey Trofimov <sarg@HIDDEN>; Maintainer for guix-patches is guix-patches@HIDDEN.
bug closed, send any further explanations to 78406 <at> debbugs.gnu.org and Sergey Trofimov <sarg@HIDDEN> Request was from Sergey Trofimov <sarg@HIDDEN> to control <at> debbugs.gnu.org. Full text available.

Message received at submit <at> debbugs.gnu.org:


Received: (at submit) by debbugs.gnu.org; 13 May 2025 14:17:22 +0000
From debbugs-submit-bounces <at> debbugs.gnu.org Tue May 13 10:17:22 2025
Received: from localhost ([127.0.0.1]:60747 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>)
	id 1uEqRe-0000aA-38
	for submit <at> debbugs.gnu.org; Tue, 13 May 2025 10:17:22 -0400
Received: from lists.gnu.org ([2001:470:142::17]:59488)
 by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.84_2) (envelope-from <sarg@HIDDEN>) id 1uEqRb-0000Zq-VC
 for submit <at> debbugs.gnu.org; Tue, 13 May 2025 10:17:20 -0400
Received: from eggs.gnu.org ([2001:470:142:3::10])
 by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <sarg@HIDDEN>) id 1uEqRJ-0004mk-9w
 for guix-patches@HIDDEN; Tue, 13 May 2025 10:17:02 -0400
Received: from mail-ed1-x52c.google.com ([2a00:1450:4864:20::52c])
 by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
 (Exim 4.90_1) (envelope-from <sarg@HIDDEN>) id 1uEqRG-0005lB-U8
 for guix-patches@HIDDEN; Tue, 13 May 2025 10:17:00 -0400
Received: by mail-ed1-x52c.google.com with SMTP id
 4fb4d7f45d1cf-5fca2805ca4so6736005a12.1
 for <guix-patches@HIDDEN>; Tue, 13 May 2025 07:16:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=sarg.org.ru; s=google; t=1747145814; x=1747750614; darn=gnu.org;
 h=content-transfer-encoding:mime-version:message-id:date:subject:cc
 :to:from:from:to:cc:subject:date:message-id:reply-to;
 bh=Udiv4v5OQ8uhRmKAjl9savel5Oi+CbJ3ce9Lc4j+ImE=;
 b=bIfhvlxv1PiT7cUQjdUsLg/dF5ud5wfZhkPi/SHBwuQ1mqxla9NF735i1+pwN5ks1P
 Q9p461B7JKhTieWgP1DcOU+wVjt1wS0idCE0A4ufIGEieoKNOAPv9j3BtgDRKqIdyOCF
 20GspdpqtAVga+ACjnAOK/Kd3YF/UnEIILIv8rsphfL8xEIlIP5SldXaDpeZzG2zurl2
 A1gK85w3J2AdT9ZUd5S8N3EPw/rikq0eqzVyqoFKHgze180kYBH+/NeL2EPbCG7JtylL
 9Wn0DIZyA1vvTRnhNJqebfQQ0Y68swYkYtNb4YoNaOK0G7HClZL16mN9gAgoXtRsTh93
 ZhJA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20230601; t=1747145814; x=1747750614;
 h=content-transfer-encoding:mime-version:message-id:date:subject:cc
 :to:from:x-gm-message-state:from:to:cc:subject:date:message-id
 :reply-to;
 bh=Udiv4v5OQ8uhRmKAjl9savel5Oi+CbJ3ce9Lc4j+ImE=;
 b=LjWYB/rmObV0TUsEfPOgvQfGquKJJ46ksW2pAJ/uh4E66dw5aaba7C0dFUkPZ5ry+6
 4hwnLvv8vUrAf7L4QiNYSvJNwXnkJnI018vFwSo9hvd30MgdkPZVIP5UoQho0PadORQm
 4aMS3H9fXr4Tm0hZmXuhVwo6dgZRCkJCXPLarYQ25B9JTDBi0TC5W/UmjmAGLwc9KG1o
 J6DbR3QWBqxojCNi4rqYOOwFNPAY+9KY/xb+x8TEv0Tg3FZtGwKXBkI4C8oXU9yiGHzJ
 I5GhmmyCMqYWW1LyHqFIXKWHEyjsw89ehWZ0SDH72vSApgaY4zVWzTqU7FfMZgiT7QmM
 S4tg==
X-Gm-Message-State: AOJu0YwYA84fu6edqTx3E3jFaj+45be6fCcxBS1WgbQTWydQSOFig0Kx
 UdqPqyn4N7OUfOCx7r4YI+8j3wVfD+QnBbfAV3fAt2rflyn4tu621+kctg1vz4K8Sk7Tv9TS4A2
 ORdhf+A==
X-Gm-Gg: ASbGncvi4P3AuT0gPzlTLTz0Of4dQCrF8zoKT7sLnsd7JGFRRCDjoRlL4D7XUcFCMbI
 GTP+3hm/5TvSOVmlyxeSqajb2f0SBpbrJcuNSLhHdBtERLfAaTh5D1oCIdc96z3xk1tZkTqotry
 AISj8ryzOaRRQkKmMu+/ZwkfjS0vs9nj5kEC3Tmole4zaxLvP7XGGH9eY4dHtE1vVBI4VVsU0Un
 cINW0bCVMdskYgQx7kLRAccZ6gXgkAsd2lg2BiNHjeZsfNS7QuguJrx5bKzvKAD35jL4bKwoOPB
 T08Lmwzb8kHUQNQ+YN+Q/rhFrzOC6NUWbDwwloTqM9wRikJbnw==
X-Google-Smtp-Source: AGHT+IHMwz2U/PVvj5iHynHHCQtAMTJ/6jddGHFJeLaC0st7CJwarE0NF5SskseMTb9jObwdnjj3Eg==
X-Received: by 2002:a05:6402:210a:b0:5fd:d62b:6dc5 with SMTP id
 4fb4d7f45d1cf-5fdd62b7050mr6455071a12.29.1747145814295; 
 Tue, 13 May 2025 07:16:54 -0700 (PDT)
Received: from localhost ([2a02:2454:a095:5600:a64e:31ff:fe38:fd6c])
 by smtp.gmail.com with ESMTPSA id
 4fb4d7f45d1cf-5ff8c6d9d9asm374019a12.39.2025.05.13.07.16.53
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Tue, 13 May 2025 07:16:53 -0700 (PDT)
From: Sergey Trofimov <sarg@HIDDEN>
To: guix-patches@HIDDEN
Subject: [PATCH] gnu: Add secretsd.
Date: Tue, 13 May 2025 16:16:44 +0200
Message-ID: <8cc6bd5057dcd8ba6723ab7ff4a36293299a17f9.1747145787.git.sarg@HIDDEN>
X-Mailer: git-send-email 2.49.0
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Received-SPF: pass client-ip=2a00:1450:4864:20::52c;
 envelope-from=sarg@HIDDEN; helo=mail-ed1-x52c.google.com
X-Spam_score_int: -20
X-Spam_score: -2.1
X-Spam_bar: --
X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,
 DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,
 RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,
 SPF_PASS=-0.001 autolearn=ham autolearn_force=no
X-Spam_action: no action
X-Spam-Score: 1.0 (+)
X-Debbugs-Envelope-To: submit
Cc: Sergey Trofimov <sarg@HIDDEN>
X-BeenThere: debbugs-submit <at> debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
X-Spam-Score: -0.0 (/)

* gnu/packages/password-utils.scm (secretsd): New variable.

Change-Id: I9beb6b86ec4dae784146e7ce91210a85cf07ec7c
---
 gnu/packages/password-utils.scm | 44 +++++++++++++++++++++++++++++++++
 1 file changed, 44 insertions(+)

diff --git a/gnu/packages/password-utils.scm b/gnu/packages/password-utils.scm
index 548629c965..6e6403a898 100644
--- a/gnu/packages/password-utils.scm
+++ b/gnu/packages/password-utils.scm
@@ -1274,6 +1274,50 @@ (define-public argon2
     ;; files are CC0 only; see README.md and LICENSE for details.
     (license (list license:cc0 license:asl2.0))))
 
+(define-public secretsd
+  (let ((commit "4ea56226b8f7c8739eea7fc8d1ffca8e18cf58c9")
+        (revision "0"))
+    (package
+      (name "secretsd")
+      (version (git-version "1.0" revision commit))
+      (source
+       (origin
+         (method git-fetch)
+         (uri (git-reference
+               (url "https://github.com/grawity/secretsd")
+               (commit commit)))
+         (file-name (git-file-name name version))
+         (sha256
+          (base32 "0ka21vmvm25kal3sa8zmrifh4zac878hk24y7y3jj3ig8dkv0vfy"))))
+      (build-system python-build-system)
+      (arguments
+       '(#:phases
+         (modify-phases %standard-phases
+           (add-after 'unpack 'remove-deps-install
+             (lambda _
+               (substitute* "setup.py"
+                 ((".*install_requires.*")
+                  ""))))
+           (add-after 'install 'wrap-program
+             (lambda* (#:key inputs outputs #:allow-other-keys)
+               (let* ((out (assoc-ref outputs "out")))
+                 (wrap-program (string-append out "/bin/secretsd")
+                   `("GI_TYPELIB_PATH" ":" prefix
+                     (,(getenv "GI_TYPELIB_PATH"))))))))))
+      (inputs (list python-dbus python-platformdirs python-cryptography
+                    python-xdg python-pygobject))
+      (native-inputs (list bash-minimal python-setuptools python-wheel))
+      (home-page "https://github.com/grawity/secretsd")
+      (synopsis "Basic FreeDesktop.org Secret Service backend")
+      (description
+       "@code{secretsd} is a generic backend for the @code{libsecret} @acronym{API,
+application programming interface} to use on headless systems or minimal desktop
+environments.  It stores secrets in a @code{sqlite} database, encrypted using a
+@acronym{AES, Advanced Encryption Standard} key.  The database key is stored in a
+regular file next to the database by default, but can be read from an external
+program.")
+      (license license:expat))))
+
 (define-public pass-git-helper
   (package
     (name "pass-git-helper")

base-commit: 364694773ef1c61d4c9ec73e24f73642786486ca
-- 
2.49.0





Acknowledgement sent to Sergey Trofimov <sarg@HIDDEN>:
New bug report received and forwarded. Copy sent to guix-patches@HIDDEN. Full text available.
Report forwarded to guix-patches@HIDDEN:
bug#78406; Package guix-patches. Full text available.
Please note: This is a static page, with minimal formatting, updated once a day.
Click here to see this page with the latest information and nicer formatting.
Last modified: Fri, 6 Jun 2025 08:15:02 UTC

GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.