Some checks failed
Build SimApp / build (amd64) (push) Waiting to run
Build SimApp / build (arm64) (push) Waiting to run
CodeQL / Analyze (push) Waiting to run
Build & Push / build (push) Waiting to run
Run Gosec / Gosec (push) Waiting to run
Lint / golangci-lint (push) Waiting to run
Checks dependencies and mocks generation / Check go mod tidy (push) Waiting to run
Checks dependencies and mocks generation / Check up to date mocks (push) Waiting to run
System Tests / setup (push) Waiting to run
System Tests / test-system (push) Blocked by required conditions
System Tests / test-system-legacy (push) Blocked by required conditions
Tests / Code Coverage / split-test-files (push) Waiting to run
Tests / Code Coverage / tests (00) (push) Blocked by required conditions
Tests / Code Coverage / tests (01) (push) Blocked by required conditions
Tests / Code Coverage / tests (02) (push) Blocked by required conditions
Tests / Code Coverage / tests (03) (push) Blocked by required conditions
Tests / Code Coverage / test-integration (push) Waiting to run
Tests / Code Coverage / test-e2e (push) Waiting to run
Tests / Code Coverage / repo-analysis (push) Blocked by required conditions
Tests / Code Coverage / test-sim-nondeterminism (push) Waiting to run
Tests / Code Coverage / test-clientv2 (push) Waiting to run
Tests / Code Coverage / test-core (push) Waiting to run
Tests / Code Coverage / test-depinject (push) Waiting to run
Tests / Code Coverage / test-errors (push) Waiting to run
Tests / Code Coverage / test-math (push) Waiting to run
Tests / Code Coverage / test-schema (push) Waiting to run
Tests / Code Coverage / test-collections (push) Waiting to run
Tests / Code Coverage / test-cosmovisor (push) Waiting to run
Tests / Code Coverage / test-confix (push) Waiting to run
Tests / Code Coverage / test-store (push) Waiting to run
Tests / Code Coverage / test-log (push) Waiting to run
Tests / Code Coverage / test-x-tx (push) Waiting to run
Tests / Code Coverage / test-x-nft (push) Waiting to run
Tests / Code Coverage / test-x-circuit (push) Waiting to run
Tests / Code Coverage / test-x-feegrant (push) Waiting to run
Tests / Code Coverage / test-x-evidence (push) Waiting to run
Tests / Code Coverage / test-x-upgrade (push) Waiting to run
Tests / Code Coverage / test-tools-benchmark (push) Waiting to run
Build & Push SDK Proto Builder / build (push) Has been cancelled
42 lines
2.3 KiB
Go
42 lines
2.3 KiB
Go
// Package keyring provides common key management API.
|
|
//
|
|
// # The Keyring interface
|
|
//
|
|
// The Keyring interface defines the methods that a type needs to implement to be used
|
|
// as key storage backend. This package provides a few implementations out-of-the-box.
|
|
//
|
|
// # NewInMemory
|
|
//
|
|
// The NewInMemory constructor returns an implementation backed by an in-memory, goroutine-safe
|
|
// map that has historically been used for testing purposes or on-the-fly key generation as the
|
|
// generated keys are discarded when the process terminates or the type instance is garbage
|
|
// collected.
|
|
//
|
|
// # New
|
|
//
|
|
// The New constructor returns an implementation backed by a keyring library
|
|
// (https://github.com/99designs/keyring), whose aim is to provide a common abstraction and uniform
|
|
// interface between secret stores available for Windows, macOS, and most GNU/Linux distributions
|
|
// as well as operating system-agnostic encrypted file-based backends.
|
|
//
|
|
// The backends:
|
|
//
|
|
// os The instance returned by this constructor uses the operating system's default
|
|
// credentials store to handle keys storage operations securely. It should be noted
|
|
// that the keyring may be kept unlocked for the whole duration of the user
|
|
// session.
|
|
// file This backend more closely resembles the previous keyring storage used prior to
|
|
// v0.38.1. It stores the keyring encrypted within the app's configuration directory.
|
|
// This keyring will request a password each time it is accessed, which may occur
|
|
// multiple times in a single command resulting in repeated password prompts.
|
|
// kwallet This backend uses KDE Wallet Manager as a credentials management application:
|
|
// https://github.com/KDE/kwallet
|
|
// pass This backend uses the pass command line utility to store and retrieve keys:
|
|
// https://www.passwordstore.org/
|
|
// keyctl This backend leverages the Linux's kernel security key management system
|
|
// to store cryptographic keys securely in memory. This is available on Linux only.
|
|
// test This backend stores keys insecurely to disk. It does not prompt for a password to
|
|
// be unlocked and it should be used only for testing purposes.
|
|
// memory Same instance as returned by NewInMemory. This backend uses a transient storage. Keys
|
|
// are discarded when the process terminates or the type instance is garbage collected.
|
|
package keyring
|