-
Notifications
You must be signed in to change notification settings - Fork 80
Conversation
I think you should just support the pass extension pass-otp. To display the OTP, why don't you submit it like the extension does it with passwords and logins? Regarding the concerns about storing OTP secret in the same store as your password, it has been disputed in the |
Meaning the format they use in the encrypted file, or the actual pass-otp script? The latter would be difficult to use via the browserpass extension. |
It is not impossible to use However, I do think supporting the format of otp string that @qbit are you still interested in getting this PR merged? Could you add the support for |
Sure! I will get something re-pushed this week hopefully! |
OK, I have an update for this that makes it work with the |
Also - this disables the alert for the OTP - as I can't test :D |
So you decided to support only If we don't have alerts, how will users retrieve the OTP code? 🙂 I don't have any issues on master, could you try maybe to remove everything you have, and try again from scratch? |
@maximbaz how are you loading the extensions for testing? |
This is a clean set of installation steps:
|
Yep.. looks like I still haven't had enough coffee! |
OK, this is working - but I have found a few OTPs that are encoded oddly (they truncate the base32 padding stuff, which angers Go) |
chrome/inject.browserify.js
Outdated
@@ -80,6 +80,10 @@ | |||
update(field(PASSWORD_FIELDS), login.p); | |||
update(field(USERNAME_FIELDS), login.u); | |||
|
|||
if (login.digits !== "") { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe let's use a non-strict if (login.digits)
? don't want to deal with bugs in future if at some point absence of OTP makes login.digits
equal to undefined
or null
instead of an empty string :)
Do you have an example of such OTP url? I wonder if |
Looks like it's an issue with gokyle/twofactor#7 - I have submitted a PR that should fix it! Thanks for the suggestion re Also - this begs the question - do we want to vendor the go 3rd party libs? Anyone have a pref on the tool to use (I am for dep) |
I'm fine with |
This can be undone once gokyle/twofactor#7 is merged.
Done and done! |
So regarding And could you look at my question in the js file? |
Less strict check for digits and package deps using |
Thanks. Shouldn't the |
I realize we had vendor folder in the repo, but now that we have |
So the big reason to include the Package frameworks like OpenBSD's ports require a complete "tarball" for a given package and using external mechanisms to pull stuff down is forbidden. I know it adds extra clutter to the repo - but it makes the porting of the app dramatically easier. Also - I had improperly tested the previous uppercasing - had an old bin. Hence the "clean" target in this commit :P |
Interesting, but aren't they using browserpass-openbsd64.zip provided in the release? That archive has never contained vendor folder, because the binary is pre-build. Or there are some packages that don't use the release archive, and instead build from tarball? I'm fine with keeping vendor, just curious to understand this stuff :) I'll test this tomorrow morning and merge if all is okay. |
With OpenBSD specifically it's typically better to build ports from source, even if binaries are available (net/syncthing for example). This is particularly important because OpenBSD developers are running |
Thanks for the explanation! Tested, works great. I extended the |
I am making this a PR before it gets bitrot :D
As I mentioned in #69, this is likely not the best way to display the OTP - Also there are concerns to be had about storing your OTP secret in the same store as your password!