Skip to content

Latest commit

 

History

History
158 lines (102 loc) · 4.61 KB

README.md

File metadata and controls

158 lines (102 loc) · 4.61 KB

Image Description

MIT License

PassDIY

A personal password/token manager TUI for developers to generate various types of hash/salted secrets and store them in different cloud based vaults

Why PassDIY?

Because managing tokens, pins used in various dummy/dev apps require them to be generated first, and store them somewhere, I personally used 3 sites to generate random API dummy tokens, store them in other site. It become a big mess, and I thought there has to be a simple way where I can generate passwords and Do It mYself hence PassDIY.

Features

  • Generation of strong secrets like pins, passwords, API tokens, passphrases
  • Generate X multiple secrets at once and pick X and X password generation algorithms
  • Hash tokens/passwords with Argon2Id and Bcrypt
  • Salt tokens/passwords
  • Copy passwords to clipboard
  • Automatically config password/token lengths and other settings
  • Hashicorp Vault integration to connect to secure vault and store generated secrets on cloud
  • 1Password integration to connect to secure vault and store generated secrets on cloud
  • Custom vaults support via extend package in passdiy to allow you to connect to your own cloud vaults via passDiy UI

Hashicorp Vault Commands

  • hcpvaultconnect automatically connect to hcp vault via service principle
  • hcpvaultstore store secrets into the vault via name=value format
  • hcpvaultlist list log details about token created at, created by details

1Password Commands

  • 1passstore store secrets into the vault via name|password|url format
  • 1passwordlist list secret names for connected vault

Demo

passdiydemo6

Hashicorp Setup

To allow PassDIY to store and connect to your Hashicorp vault you must create a service principle with Vault Secrets App Manager permission. Also would need set below envs

export HCP_CLIENT_ID=<your-hcp-client-id> export HCP_CLIENT_SECRET=<your-hcp-client-secret>

more detailed in ./Setup.md

1Password Setup

To allow PassDIY to connect to your 1Password Vault you would need to set service principle anf the service account token

export OP_SERVICE_ACCOUNT_TOKEN=<your-service-account-token>

Config custom vault to use PassDIY TUI

to config custom vaults that are not currently supported by Passdiy all you have to do is edit the interface.go file and define your custom implementation of the functions, then you set export USE_PASDIY_CUSTOM_VAULT=true and PassDIY will automatically interface the custom vault

package extend

var (
	VAULT_PREFIX           = "pref"
	VAULT_MAIN_DESC        = "Manage token/password on " + VAULT_PREFIX
	VAULT_SUBCOMMAND_NAMES = []string{VAULT_PREFIX + "store", VAULT_PREFIX + "list"}
	VAULT_SUBCOMMAND_DESC  = []string{"store", "lists"}
	VAULT_DISPLAY_COLOR    = "#E2EAF4"
)

func ConnectUI() string {
	return Connect()
}

func StoreUI(userInput string) string {

	var parser string

	return Create(userInput, parser)
}

func ListUI() string {
	return List()
}

Installation

If you have make installed, follow these steps to build, run, and install passdiy:

  1. Build the project:

    make build
    
  2. Run the application:

    make run
    
  3. Install globally (optional):

    sudo make install
    

You can then run it from anywhere with: passdiy

If you do not have make you can build and run it traditionally with:

go run .

Uninstall

You can uninstall passdiy with:

sudo make uninstall

Roadmap

  • dynamically change config
  • add more vaults possibly vercel/Azure key vault
  • add more hashing algos

Acknowledgements

License

MIT

Discord

Invite

Authors

Contributor