Talk:KeePass
Transferring secrets to and from providers
When migrating from a secrets provider to another, you will obviously want to transfer the secrets.
I've found a method, but 1) it's perfectible, and 2) where should it be documented?
What I've used is:
- Use
lssecret
to extract all secrets, systemctl --user stop gnome-keyring.service
,- Start KeePassXC's Secret Service integration,
- Use an ad-hoc script to parse its output into
secret-tool store
invocations.
...this is problematic because KeePassXC (at least) adds a lot of (perhaps harmless) key/value pairs, and also lssecret
is not able to extract from locked collections. (secret-tool
is, but it doesn't have ls
-like capabilities. Augh!)
ISSOtm (talk) 18:57, 17 September 2023 (UTC)
Cleanup the wiki entry and maybe split into KeePass and KeePassXC
KeePass and KeePassXC are entirely different applications and currently their configurations and features are mixed together into one big confusing block. I'd suggest either splitting both into individual pages or restructuring this page to separate them.
e.g. KeePassXC doesn't have plugin support. It only provides what is built into it where as KeePass can load plugins at runtime. Agowa338 (talk) 14:19, 23 June 2024 (UTC)
- Well the page introduces the topic as "KeePass is an encrypted password database format." But making a KeePassXC page at this point would be a good idea. — Lahwaacz (talk) 13:43, 24 June 2024 (UTC)