Skip to content

Commit

Permalink
Update readme
Browse files Browse the repository at this point in the history
  • Loading branch information
anssip committed May 12, 2024
1 parent a14d5d9 commit 981d793
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 3 deletions.
15 changes: 12 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,12 @@
# Passlane

A password manager CLI using Keepass as the storage backend. In addition to passwords, It supports secure saving and managing of
**payment cards** and **secure notes**. Passlane uses the Keepass encrypted file format for storing the data.
A password manager CLI using Keepass as the storage backend. In addition to passwords, it supports
**authenticator functionality** with Timed One Time Passwords (TOTP), secure saving and managing of
**payment cards** and **secure notes**.

Passlane CLI is written in Rust.
Passlane uses the Keepass encrypted file format for storing the data.

Passlane is written in Rust.

![Screenshot](https://i.imgur.com/TMB8DbS.webp)

Expand All @@ -15,6 +18,7 @@ Passlane CLI is written in Rust.
- Generate and save passwords
- Save and view payment card information
- Save and view secure notes
- Authenticator functionality with TOTP
- Import passwords from CSV files
- Export vault contents to CSV files

Expand All @@ -27,6 +31,7 @@ Passlane CLI is written in Rust.
- [Using saved credentials](#using-saved-credentials)
- [Payment cards](#payment-cards)
- [Secure notes](#secure-notes)
- [Authenticator functionality](#authenticator-functionality)
- [Migrating from 1Password, LastPass, Dashlane etc.](#migrating-from-1password-lastpass-dashlane-etc)
- [Export to CSV](#export-to-csv)
- [Syncing data to your devices](#syncing-data-to-your-devices)
Expand Down Expand Up @@ -208,6 +213,10 @@ To show secure notes:
passlane show -n
```

### Authenticator functionality

[//]: # (TODO)

### Migrating from 1Password, LastPass, Dashlane etc.

You can import credentials from a CSV file. With this approach, you can easily migrate from less elegant and often expensive commercial services.
Expand Down
1 change: 1 addition & 0 deletions src/actions/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,7 @@ fn get_vault(password: &str, filepath: &str, keyfile_path: Option<String>) -> an
pub trait UnlockingAction {
fn execute(&self) {
info!("Unlocking vault...");
// TODO: open both vaults at the same time and store the passwords in the keychain
let result = if self.is_totp_vault() {
unlock_totp_vault()
} else {
Expand Down

0 comments on commit 981d793

Please sign in to comment.