Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE REQUEST] Delete all keys for a service name #111

Open
avallete opened this issue Sep 10, 2024 · 0 comments
Open

[FEATURE REQUEST] Delete all keys for a service name #111

avallete opened this issue Sep 10, 2024 · 0 comments

Comments

@avallete
Copy link
Contributor

Use case

In our usage of the package, we register different secrets for different projects all over the same "service name" but with distincts username (each one matching the secret project id).

Issue is that when we want to "logout" an user it's hard to make sure all the secrets set by our app are deleted from the keychain.

Proposal

Exposing a DeleteAllKeys(servicename: string) method would fix that. Since we could ensure that all the user secrets are cleaned up after disconnecting.

Depending of the underlying keyring system it could be implemented by different means. I know that for osx, we could just call the "delete" without the "account" mentioned in a loop until we have nothing left to delete. I'm not sure for the other systems so I'm open to feedbacks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant