passable
passable: password manager command line tool that's just good enough
Science Score: 44.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
✓CITATION.cff file
Found CITATION.cff file -
✓codemeta.json file
Found codemeta.json file -
✓.zenodo.json file
Found .zenodo.json file -
○DOI references
-
○Academic publication links
-
○Committers with academic emails
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (12.4%) to scientific vocabulary
Repository
passable: password manager command line tool that's just good enough
Basic Info
- Host: GitHub
- Owner: SixArm
- License: other
- Language: Shell
- Default Branch: main
- Size: 59.6 KB
Statistics
- Stars: 5
- Watchers: 2
- Forks: 1
- Open Issues: 0
- Releases: 0
Metadata Files
README.md
passable: password command that's secure and simple
This is passable, a password command line interface tool that is secure cryptogrpahically and simple to use.
Introdution
Purpose
The purpose of this tool is to do three simple things:
Create a new password.
Encrypt a file.
Decrypt a file.
Usage
Syntax:
sh
passable new
passable encrypt <file>
passable decrypt <file>
Installation
Download the program passable anywhere you want, and make it runnable.
Example on typical macOS and Linux:
sh
sudo curl -sSL "https://raw.githubusercontent.com/SixArm/passable/master/passable" -o /usr/local/bin/passable && sudo chmod +x $_
If you want to verify the download, then the SHA512 is:
7bb9049827c09123162c15c84a5af642b99da4460dba82da577829797d2abdae2d5f971f016f6af156c9b4a08fca0b34d6c945510a3a19426e4149789f9748b7
Examples
Create a new password
Command:
sh
passable new
Output is a new strong secure password:
txt
S&dw6[ysN@O9W5{5>^&RZ9pF
You can do anything you want with the new password.
For example, you can save the new password as a new file:
sh
echo 'S&dw6[ysN@O9W5{5>^&RZ9pF' > file.txt
Encrypt a file
Command:
sh
passable encrypt file.txt
Output is a new encrypted file file.txt.gpg.
You can do anything you want with the new encrypted file.
For example, you can add the new encrypted file to git version control:
sh
git add file.txt.gpg
Decrypt a file
Command:
sh
passable decrypt file.txt.gpg
Output is the decrypted text, such as the password you saved:
txt
S&dw6[ysN@O9W5{5>^&RZ9pF
You can do anything you want with the decrypted text.
For example, you can copy the decrypted text to your clipboard on macOS:
sh
echo 'S&dw6[ysN@O9W5{5>^&RZ9pF' | pbclip
Test
See the repository directory test for some example unit tests.
The test files need to prompt you for a password; you can use any password you want.
If a test succeeds, then it will be silent.
If a test fails, then it will print an "assert" error message.
To run all the test files:
sh
cd test
./test
To run one test file, for example to test the command passable new:
sh
cd test/new
./test
TODO
We welcome help with these todo areas:
[ ] Improve unit tests.
[ ] Add installation via package managers e.g. apt, brew, yum.
[ ] Add CI/CD build process.
[ ] Add GitHub release tags.
Documentation
- More examples
- FAQ inclusing comparisons with other password store managers
- Environment variables for customization
- Technical implementation including GPG options
- Troubleshooting help
Thanks
Thanks for all the comments on Hacker News, with special thanks to users vesinisa, twr, tptacek, txtutu, acqq, throwawayish, RMarcus, and latchkey.
See also
These commands are similar:
gpg-encrypt: use GPG to encrypt a file using our best settings.gpg-decrypt: use GPG to decrypt a file using our best settings.openssl-encrypt: use OpenSLL to encrypt a file using our best settings.openssl-decrypt: use OpenSSL to decrypt a file using our best settings.
Tracking
- Command: passable
- Website: https://sixarm.com/passable
- Cloning: https://github.com/sixarm/passable
- Version: 5.1.0
- Created: 2010-05-20
- Updated: 2023-01-22
- License: MIT or Apache-2.0 or GPL-2.0-or-later or contact us for custom
- Contact: Joel Parker Henderson (joel@joelparkerhenderson.com)
- Tracker: b48657369aada8deaffb880ae3486081
Owner
- Name: SixArm
- Login: SixArm
- Kind: organization
- Email: sixarm@sixarm.com
- Location: San Francisco
- Website: http://sixarm.com
- Twitter: sixarm
- Repositories: 580
- Profile: https://github.com/SixArm
SixArm Software
Citation (CITATION.cff)
cff-version: 1.2.0
title: passable: password command that's secure and simple
message: >-
If you use this work and you want to cite it,
then you can use the metadata from this file.
type: software
authors:
- given-names: Joel Parker
family-names: Henderson
email: joel@joelparkerhenderson.com
affiliation: joelparkerhenderson.com
orcid: 'https://orcid.org/0009-0000-4681-282X'
identifiers:
- type: url
value: 'https://github.com/SixArm/passable/'
description: passable: password command that's secure and simple
repository-code: 'https://github.com/SixArm/passable/'
abstract: >-
passable: password command that's secure and simple
license: See license file
GitHub Events
Total
- Push event: 1
Last Year
- Push event: 1
Committers
Last synced: 12 months ago
Top Committers
| Name | Commits | |
|---|---|---|
| Joel Parker Henderson | j****l@j****m | 35 |
Committer Domains (Top 20 + Academic)
Issues and Pull Requests
Last synced: 12 months ago
All Time
- Total issues: 0
- Total pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Total issue authors: 0
- Total pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0
Past Year
- Issues: 0
- Pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Issue authors: 0
- Pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0