Skip to content

Conversation

@BetaFold3
Copy link
Contributor

Add --password-stdin flag to enable secure automation workflows while maintaining strong 2FA requirements:

  • Support providing password from stdin along with existing interactive prompt
  • Enforce U2F as second factor
  • Automatically disable TOTP and VIPAccess when using stdin
  • Add tests for new functionality

Example usage with various password managers:

$ op read "op://vault-name/item-name/password" | keymaster --password-stdin -configHost ${CONFIGHOST}
$ bw get password item-id | keymaster --password-stdin -configHost ${CONFIGHOST}
$ lpass show --password item-name | keymaster --password-stdin -configHost ${CONFIGHOST}

This approach ensures physical security token presence while enabling automation.

Add --password-stdin flag to read password from stdin while enforcing U2F
as second factor. This maintains security by requiring physical key presence
while enabling automation workflows.
@BetaFold3
Copy link
Contributor Author

Note: The GitHub Actions failures appear to be CI infrastructure related rather than code issues. All tests pass locally. Would appreciate a re-run of the checks when possible.

@BetaFold3
Copy link
Contributor Author

@rgooch @cviecco Friendly ping! Just checking if there's any feedback on this PR or if you'd like me to make any adjustments to the approach?

The CI failures from last time appear to be infrastructure-related as all tests pass locally. Happy to address any concerns or suggestions you might have.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant