Skip to content

Commit 3bbe2da

Browse files
Merge pull request #195 from brotskydotcom/linux-native-feature
Release v3.0.3 This fixes #194 and updates all dependencies.
2 parents 70ce2f9 + d663afd commit 3bbe2da

File tree

5 files changed

+9
-8
lines changed

5 files changed

+9
-8
lines changed

Cargo.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ keywords = ["password", "credential", "keychain", "keyring", "cross-platform"]
66
license = "MIT OR Apache-2.0"
77
name = "keyring"
88
repository = "https://github.com/hwchen/keyring-rs.git"
9-
version = "3.0.2"
9+
version = "3.0.3"
1010
rust-version = "1.75"
1111
edition = "2021"
1212
exclude = [".github/"]

README.md

+1
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,7 @@ Thanks to the following for helping make this library better, whether through co
9999
- @Alexei-Barnes
100100
- @benwr
101101
- @bhkaminski
102+
- @Brooooooklyn
102103
- @brotskydotcom
103104
- @complexspaces
104105
- @connor4312

src/keyutils.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ impl CredentialApi for KeyutilsCredential {
147147
// Add to the session keyring
148148
let key = self
149149
.session
150-
.add_key(&self.description, password)
150+
.add_key(&self.description, secret)
151151
.map_err(decode_error)?;
152152

153153
// Directly link to the persistent keyring as well

src/lib.rs

+5-5
Original file line numberDiff line numberDiff line change
@@ -169,8 +169,8 @@ pub mod mock;
169169
// no duplicate keystores on any platform
170170
//
171171
#[cfg(any(
172-
all(feature = "linux-keyutils", feature = "sync-secret-service"),
173-
all(feature = "linux-keyutils", feature = "async-secret-service"),
172+
all(feature = "linux-native", feature = "sync-secret-service"),
173+
all(feature = "linux-native", feature = "async-secret-service"),
174174
all(feature = "sync-secret-service", feature = "async-secret-service")
175175
))]
176176
compile_error!("You can enable at most one keystore per target architecture");
@@ -179,9 +179,9 @@ compile_error!("You can enable at most one keystore per target architecture");
179179
// Pick the *nix keystore
180180
//
181181

182-
#[cfg(all(target_os = "linux", feature = "linux-keyutils"))]
182+
#[cfg(all(target_os = "linux", feature = "linux-native"))]
183183
pub mod keyutils;
184-
#[cfg(all(target_os = "linux", feature = "linux-keyutils"))]
184+
#[cfg(all(target_os = "linux", feature = "linux-native"))]
185185
use keyutils as default;
186186

187187
#[cfg(all(
@@ -198,7 +198,7 @@ use secret_service as default;
198198
#[cfg(all(
199199
target_os = "linux",
200200
not(any(
201-
feature = "linux-keyutils",
201+
feature = "linux-native",
202202
feature = "sync-secret-service",
203203
feature = "async-secret-service"
204204
))

tests/basic.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ fn test_missing_entry() {
1414
}
1515

1616
#[test]
17-
#[cfg(all(target_os = "linux", not(feature = "linux-default-keyutils")))]
17+
#[cfg(all(target_os = "linux", not(feature = "linux-native")))]
1818
fn test_empty_password() {
1919
let name = generate_random_string();
2020
let entry = Entry::new(&name, &name).expect("Can't create entry");

0 commit comments

Comments
 (0)