Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

client: add password-stdin flag with U2F enforcement #256

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

tuannh99
Copy link
Contributor

Add --password-stdin flag to enable secure automation workflows while maintaining strong 2FA requirements:

  • Support providing password from stdin along with existing interactive prompt
  • Enforce U2F as second factor
  • Automatically disable TOTP and VIPAccess when using stdin
  • Add tests for new functionality

Example usage with various password managers:

$ op read "op://vault-name/item-name/password" | keymaster --password-stdin -configHost ${CONFIGHOST}
$ bw get password item-id | keymaster --password-stdin -configHost ${CONFIGHOST}
$ lpass show --password item-name | keymaster --password-stdin -configHost ${CONFIGHOST}

This approach ensures physical security token presence while enabling automation.

Add --password-stdin flag to read password from stdin while enforcing U2F
as second factor. This maintains security by requiring physical key presence
while enabling automation workflows.
@tuannh99
Copy link
Contributor Author

Note: The GitHub Actions failures appear to be CI infrastructure related rather than code issues. All tests pass locally. Would appreciate a re-run of the checks when possible.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant