Skip to content

Releases: open-source-cooperative/keyring-rs

v4.0.0-alpha.5: add examples

20 Dec 06:05
fda7462

Choose a tag to compare

Pre-release

This release adds two example programs. The first just creates or deletes three credentials with known values so you can see what they look like in the platform native credential GUI. The second does scanning for "leaks" of secret values from the keyring-core and credential stores, to make sure that client supplied or retrieved secrets are not being left in released memory.

What's Changed

Full Changelog: v4.0.0-alpha.4...v4.0.0-alpha.5

v4.0.0-alpha.4: separate Rust and Python components

18 Dec 07:56
9814757

Choose a tag to compare

This is a cleanup release. The Rust and Python components have been separated, which makes the keyring crate very clean and the Python module a clean client of the keyring crate. It also provides the structure in which a Tauri app can be added.

What's Changed

Full Changelog: v4.0.0-alpha.3...v4.0.0-alpha.4

v4.0.0-alpha.3: better docs and tiny cleanups

30 Nov 06:50
03ea118

Choose a tag to compare

This looks like a good candidate for beta. Please try it out.

What's Changed

Full Changelog: v4.0.0-alpha.2...v4.0.0-alpha.3

v4.0.0-alpha.2: first pre-release of v4

29 Nov 21:45
8110f44

Choose a tag to compare

Pre-release

This release converts this crate to being a sample-code/demonstrator/inventory-of-credential-stores crate. It provides a super-simple Rust CLI and a far-more-useful Python module wrapper over the keyring-core functionality.

This first alpha has full functionality but the documentation is very light.

What's Changed

Full Changelog: v3.6.3-republish...v4.0.0-alpha.2

v3.6.3: Likely final release of v3

27 Jul 04:47
a796ed4

Choose a tag to compare

This release integrates a few important bug fixes (thanks @vermiculus, @unkcpz) that have come in since the release of v3.6.2, and is the last release expected for the v3 series. The release of v4 is expected in about a month, and it will bring significant changes:

  • the cross-platform API will become its own crate: keyring-core.
  • each credential store will become its own store.
  • this crate will become an example of how to write a keyring-based application.

PLEASE NOTE: with this release, the main branch has changed significantly. What was on the main branch has moved to be a v4 branch, and the main branch was reverted to v3.6.2 and then had bug fix commits added on. If you have an existing fork of this repository, you should immediately sync your repo by choosing the "discard commits" option, which will take your repo back to v3.6.2 and then pull the newer commits. Then, if you have development work on one of your other branches, you should rebase that work onto the updated main.

v3.6.2: better docs, lighter-weight tests

01 Mar 18:20
ee3f80d

Choose a tag to compare

Thanks to @unkcpz, this release fully documents all the platform-specific modules in each platform on docs.rs.

The dev dependencies (used for testing) have been switched from using rand to using the lighter-weight module fastrand.

There are no functional code changes in this release, only test changes.

v3.6.1: Update dependencies

27 Oct 19:57
779dfe0

Choose a tag to compare

Two of the dependencies (openssl and whoami) were discovered to have vulnerabilities which were fixed in minor or patch releases. This crate has been updated to insist that the minor/patch release number of these dependencies is high enough to ensure use of a patched version.

There is no reason to think that the vulnerabilities in these dependencies could have been exercised through this crate. In addition, builds of clients done after the dependencies were patched would have already picked up the non-vulnerable versions. So this change is simply to ensure that future builds cannot use the vulnerable versions.

There are no code changes in this release.

v3.6.0: Add new combination keystore

26 Oct 19:38
eb54c80

Choose a tag to compare

This release contains a new credential store for Linux: a combination of keyutils (for use by headless processes) and secret service (for persistence of credentials beyond reboot). Thanks very much to @soywod for the contribution!

v3.5.0: Add debug logging of internal operations

18 Oct 18:46
9a4184c

Choose a tag to compare

  • Add debug logging of internal operations (thanks to @soywod).
  • Revert iOS security-framework dependency to v2 (see #225).

v3.4.0: allow simultaneous use of secret-service and keyutils

12 Oct 21:33
900fd68

Choose a tag to compare

As pointed out in #214, it is possible to use both the secret-service and the keyutils credential stores at the same time, so this should be an allowed combination of specified features. This release allows that combination, selecting the secret-service as the default keystore but also loading the keyutils keystore.