summaryrefslogtreecommitdiff
path: root/python-acid-vault.spec
blob: 5b6908ad6f77080ead1334333f2e3ed61e250320 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
%global _empty_manifest_terminate_build 0
Name:		python-acid-vault
Version:	2.1.0
Release:	1
Summary:	Python Password Vault
License:	GNU Affero General Public License v3
URL:		https://github.com/svavelsyra/PyVault
Source0:	https://mirrors.aliyun.com/pypi/web/packages/a2/05/8d3d36604764d7ced7f4e002734a20f76ca5a248ddc60dd64fee24ed1aa8/acid_vault-2.1.0.tar.gz
BuildArch:	noarch

Requires:	python3-cryptography
Requires:	python3-paramiko
Requires:	python3-pillow

%description
# Python password vault.

Python password vault to keep track of password either locally or centralized in your own cloud.
As this is a hobby project I cannot guarantee any functionality or that no data loss will occur, but as I use it personally I will do my best to avoid it.
Currently development is done on Python 3.9 and the client runs on Win10 while the cloud is run on Raspbian on a Raspberry Pi 2.

**Prerequisites**
- cryptography
- paramiko
- pillow

**Setup**
- Install prerequisites
- Clone repo or pip install acid_vault
- Run VaultGui.pyw (For GUI)
- Setup your vault in file menu (Only necessary for Cloud and/or Steganography)
  - Setup SSH for cloud (For remote storage of vault)
    - Host - URL to host
    - Port - Port to use on host
    - Username - Username to login with at host
    - Password - Password to login with at host, will not be saved and has to be entered each time program is started. Recomended usage is through key exchange, see below
  - Setup Steganography (For hiding the vault in an image)
    - File location - path to vault storage E.g. images/picture.png
    - Original file - path to local file with the original png picture to compare against (Important that its a png and not jpeg as jpeg compression is not stable)
- Check [Steganography](https://en.wikipedia.org/wiki/Steganography) (If Steganography is to be used)
- Chose Local/Remote (Where to store vault)

**Basic usage**
- Add passwords by pressing "Add Password" button.
- Chose a password in password box.
- Press Save passwords to save passwords in vault.
- Press Load passwords to load passwords into vault (Will clear any unsaved data).
- Lock/Unlock - Will lock/unlock the data kept by program while its running to avoid overhead of getting data from the cloud.

If vault detect that the user has not used the UI for 5 minutes it will lock itself.

The file menu has options to save/load backups both as encrypted and unencrypted locally where the user chose.




%package -n python3-acid-vault
Summary:	Python Password Vault
Provides:	python-acid-vault
BuildRequires:	python3-devel
BuildRequires:	python3-setuptools
BuildRequires:	python3-pip
%description -n python3-acid-vault
# Python password vault.

Python password vault to keep track of password either locally or centralized in your own cloud.
As this is a hobby project I cannot guarantee any functionality or that no data loss will occur, but as I use it personally I will do my best to avoid it.
Currently development is done on Python 3.9 and the client runs on Win10 while the cloud is run on Raspbian on a Raspberry Pi 2.

**Prerequisites**
- cryptography
- paramiko
- pillow

**Setup**
- Install prerequisites
- Clone repo or pip install acid_vault
- Run VaultGui.pyw (For GUI)
- Setup your vault in file menu (Only necessary for Cloud and/or Steganography)
  - Setup SSH for cloud (For remote storage of vault)
    - Host - URL to host
    - Port - Port to use on host
    - Username - Username to login with at host
    - Password - Password to login with at host, will not be saved and has to be entered each time program is started. Recomended usage is through key exchange, see below
  - Setup Steganography (For hiding the vault in an image)
    - File location - path to vault storage E.g. images/picture.png
    - Original file - path to local file with the original png picture to compare against (Important that its a png and not jpeg as jpeg compression is not stable)
- Check [Steganography](https://en.wikipedia.org/wiki/Steganography) (If Steganography is to be used)
- Chose Local/Remote (Where to store vault)

**Basic usage**
- Add passwords by pressing "Add Password" button.
- Chose a password in password box.
- Press Save passwords to save passwords in vault.
- Press Load passwords to load passwords into vault (Will clear any unsaved data).
- Lock/Unlock - Will lock/unlock the data kept by program while its running to avoid overhead of getting data from the cloud.

If vault detect that the user has not used the UI for 5 minutes it will lock itself.

The file menu has options to save/load backups both as encrypted and unencrypted locally where the user chose.




%package help
Summary:	Development documents and examples for acid-vault
Provides:	python3-acid-vault-doc
%description help
# Python password vault.

Python password vault to keep track of password either locally or centralized in your own cloud.
As this is a hobby project I cannot guarantee any functionality or that no data loss will occur, but as I use it personally I will do my best to avoid it.
Currently development is done on Python 3.9 and the client runs on Win10 while the cloud is run on Raspbian on a Raspberry Pi 2.

**Prerequisites**
- cryptography
- paramiko
- pillow

**Setup**
- Install prerequisites
- Clone repo or pip install acid_vault
- Run VaultGui.pyw (For GUI)
- Setup your vault in file menu (Only necessary for Cloud and/or Steganography)
  - Setup SSH for cloud (For remote storage of vault)
    - Host - URL to host
    - Port - Port to use on host
    - Username - Username to login with at host
    - Password - Password to login with at host, will not be saved and has to be entered each time program is started. Recomended usage is through key exchange, see below
  - Setup Steganography (For hiding the vault in an image)
    - File location - path to vault storage E.g. images/picture.png
    - Original file - path to local file with the original png picture to compare against (Important that its a png and not jpeg as jpeg compression is not stable)
- Check [Steganography](https://en.wikipedia.org/wiki/Steganography) (If Steganography is to be used)
- Chose Local/Remote (Where to store vault)

**Basic usage**
- Add passwords by pressing "Add Password" button.
- Chose a password in password box.
- Press Save passwords to save passwords in vault.
- Press Load passwords to load passwords into vault (Will clear any unsaved data).
- Lock/Unlock - Will lock/unlock the data kept by program while its running to avoid overhead of getting data from the cloud.

If vault detect that the user has not used the UI for 5 minutes it will lock itself.

The file menu has options to save/load backups both as encrypted and unencrypted locally where the user chose.




%prep
%autosetup -n acid_vault-2.1.0

%build
%py3_build

%install
%py3_install
install -d -m755 %{buildroot}/%{_pkgdocdir}
if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
pushd %{buildroot}
if [ -d usr/lib ]; then
	find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst
fi
if [ -d usr/lib64 ]; then
	find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst
fi
if [ -d usr/bin ]; then
	find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst
fi
if [ -d usr/sbin ]; then
	find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst
fi
touch doclist.lst
if [ -d usr/share/man ]; then
	find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst
fi
popd
mv %{buildroot}/filelist.lst .
mv %{buildroot}/doclist.lst .

%files -n python3-acid-vault -f filelist.lst
%dir %{python3_sitelib}/*

%files help -f doclist.lst
%{_docdir}/*

%changelog
* Thu Jun 08 2023 Python_Bot <Python_Bot@openeuler.org> - 2.1.0-1
- Package Spec generated