roddhjav / pass-tomb

A pass extension that helps you keep the whole tree of passwords encrypted inside a Tomb.
https://www.passwordstore.org
GNU General Public License v3.0
381 stars 30 forks source link

Open with timer #8

Closed Nalum closed 7 years ago

Nalum commented 7 years ago

Possible bug or am I missing some configuration?

Here is the output of a timed open with verbose and debug options:

ウ pass open -t 60s -v -d
  .  pass Opening the password tomb ~/.password.tomb using the key ~/.password.tomb.key
  .  tomb [D] Identified caller: user (1000:1000)
  .  tomb [D] Tomb command: open ~/.password.tomb
  .  tomb [D] Caller: uid[1000], gid[1000], tty[/dev/pts/0].
  .  tomb [D] Temporary directory: /tmp/zsh
  .  tomb  .  Commanded to open tomb ~/.password.tomb
  .  tomb  .  An active swap partition is detected...
  .  tomb (*) The undertaker found that all swap partitions are encrypted. Good.
  .  tomb [D] is_valid_tomb ~/.password.tomb
  .  tomb [D] tomb file is readable
  .  tomb [D] tomb file is a regular file
  .  tomb [D] tomb file is not empty
  .  tomb [D] tomb file is not currently in use
  .  tomb  .  Valid tomb file found: ~/.password.tomb
  .  tomb [D] load_key argument: ~/.password.tomb.key
  .  tomb [D] load_key: ~/.password.tomb.key
  .  tomb [D] is_valid_key
  .  tomb  .  Key is valid.
  .  tomb (*) Opening .password on ~/.password-store/
  .  tomb  .  This tomb is a valid LUKS encrypted device.
  .  tomb  .  Cipher is "aes" mode "xts-plain64:sha256" hash "sha1"
  .  tomb [D] dev mapper device: tomb..password.1497360684.loop0
  .  tomb [D] Tomb key: ~/.password.tomb.key
  .  tomb [D] Tomb name: .password (to be engraved)
  .  tomb [D] no password needed, using GPG key
  .  tomb [D] get_lukskey
  .  tomb [D] Created tempfile: /tmp/zsh/2029029091984619440
  .  tomb [D] [GNUPG:] ENC_TO 2CE736FDCCD9FC47 1 0
  .  tomb [D] [GNUPG:] GOOD_PASSPHRASE
  .  tomb [D] gpg: encrypted with 4096-bit RSA key, ID 0x..., created 2014-12-05
  .  tomb [D]       "..."
  .  tomb [D] [GNUPG:] BEGIN_DECRYPTION
  .  tomb [D] [GNUPG:] DECRYPTION_INFO 2 9
  .  tomb [D] [GNUPG:] PLAINTEXT 62 1497267931 
  .  tomb [D] [GNUPG:] DECRYPTION_OKAY
  .  tomb [D] [GNUPG:] GOODMDC
  .  tomb [D] [GNUPG:] END_DECRYPTION
  .  tomb [D] get_lukskey returns 0
  .  tomb [D] lo_preserve on /dev/loop0
  .  tomb (*) Success unlocking tomb .password
  .  tomb [D] Key size is 512 for cipher aes-xts-plain64:sha256
  .  tomb  .  Checking filesystem via /dev/loop0
  .  fsck from util-linux 2.25.2
  .  .password: clean, 253/2048 files, 1646/8192 blocks
  .  tomb [D] Tomb engraved as .password
  .  tomb (*) Success opening .password.tomb on ~/.password-store/
  .  tomb  .  Last visit by user(1000) from /dev/pts/0 on computer
  .  tomb  .  on date Tue 13 Jun 2017 14:30:54 IST
  .  tomb [D] bind-hooks not found in ~/.password-store/
  .  pass Setting user permissions on ~/.password-store/
  .  pass systemd-run: unrecognized option '--on-active=60s'
  w  Unable to set the timer to close the password tomb in 60s.
 (*) Your password tomb has been opened in ~/.password-store/.
  .  You can now use pass as usual.
  .  When finished, close the password tomb using 'pass close'.
roddhjav commented 7 years ago

This is a not a bug as of today pass-tomb requires at least systemd 218 because it uses the --on-active option of the systemd-run tool to create the timer.

Nalum commented 7 years ago

Thanks for the info. I'll have to look into updating my install of systemd