1Password
Fetches secrets from 1Password vaults using the 1Password CLI (op).
| Field | Description |
|---|---|
vault | 1Password vault name |
item | Item name within the vault |
field | Field label within the item (case-sensitive) |
Prerequisites
Theop CLI must be installed and authenticated before starting cordon:
op is not on PATH (common for background services), specify the binary path explicitly in the provider config:
For detailed setup, security considerations, and troubleshooting, see the 1Password guide.
OS Keyring
Reads credentials from the operating system’s built-in credential store.| Field | Description |
|---|---|
account | Account name (identifier for the credential) |
cordon as the keyring service name. If you inspect the OS keychain directly (e.g., macOS Keychain Access, security find-generic-password -s cordon), entries appear under the service cordon.
Storing keyring credentials
Use thecordon secret set command to store credentials. Pass the route or service name from your config:
security CLI:
Platform differences
macOS Keychain
macOS Keychain
macOS Keychain enforces per-application access control. The binary that creates a keychain entry owns it and can read it without prompting. Any other binary triggers a system authorization dialog.Use
cordon secret set to create entries owned by cordon. Entries created by other tools (e.g., security CLI) will prompt on every request that needs the secret.Upgrading cordon changes the binary signature. macOS may prompt for keychain access after an upgrade.Linux Secret Service
Linux Secret Service
On Linux, cordon uses the D-Bus Secret Service API, typically provided by GNOME Keyring or KDE Wallet. Secrets are encrypted on disk and unlocked with the user’s login session. There are no per-application ACLs — any process running as the user can read entries. Security relies on standard Unix user isolation.A Secret Service provider must be installed and running:After installing, log out and log back in to initialize the default “login” collection. Without this step, A running D-Bus session bus is required — the keyring source does not work in containers, CI, or headless environments. Use 1Password as the secret source in those cases.
cordon secret set will fail with:Troubleshooting (Linux)
DBus error: Object does not exist at path "/org/freedesktop/secrets/collection/login"
DBus error: Object does not exist at path "/org/freedesktop/secrets/collection/login"
A Secret Service provider is not running or has not initialized its default collection. Fix:Then log out and log back in so the keyring daemon starts and creates the “login” collection.
Platform secure storage failure
Platform secure storage failure
The D-Bus session bus is not available. Verify it’s reachable:If neither is available, you’re not in a desktop session (e.g., SSH, container, or headless server). The keyring source requires a desktop session — use 1Password instead.
Keyring access timed out
Keyring access timed out
The Secret Service provider is not responding. Check that gnome-keyring-daemon (or your provider) is running:If not running, log out and back in, or start it manually: