1Password
Fetches secrets from 1Password vaults using the 1Password CLI (op).
| Field | Description |
|---|---|
vault | 1Password vault name |
item | Item name within the vault |
field | Field name within the item |
Prerequisites
Theop CLI must be installed and authenticated before starting cordon:
OS Keyring
Reads credentials from the operating system’s built-in credential store.| Field | Description |
|---|---|
service | Service name (namespace for the credential) |
account | Account name (identifier within the service) |
Storing keyring credentials
Use thecordon secret set command to store credentials:
- macOS
- Linux
Platform differences
macOS Keychain
macOS Keychain
macOS Keychain enforces per-application access control. The binary that creates a keychain entry owns it and can read it without prompting. Any other binary triggers a system authorization dialog.Use
cordon secret set to create entries owned by cordon. Entries created by other tools (e.g., security CLI) will prompt on every proxy startup.Upgrading cordon changes the binary signature. macOS may prompt for keychain access after an upgrade.Linux kernel keyring
Linux kernel keyring
On Linux, cordon uses the kernel keyring (via
keyutils) or the Secret Service API (via D-Bus). There are no per-application ACLs — any process running as the user can read entries. Security relies on standard Unix user isolation.