Crates.io | notp |
lib.rs | notp |
version | 2.1.0 |
source | src |
created_at | 2020-04-22 01:08:15.919728 |
updated_at | 2020-06-04 00:24:03.474235 |
description | One Time Password Generator tool that is meant to be used on CLI. |
homepage | https://github.com/kondanta/notp |
repository | https://github.com/kondanta/notp |
max_upload_size | |
id | 232761 |
size | 61,270 |
notp is a CLI tool for generating one time passwords from CLI. Highly influenced by 2FA repository from rsc.
You can clone the repository and build it from the source, download using crate.io
or just download the binary that goes well with your OS
from the latest release
# Let's see what we have here.
$ notp --help
# notp supports --key and --stdin exclusively. If you want to keep your secret secret,
# I urge you to use --stdin flag. --key is also usefull when you want to combine notp with
# shell tools and don't want to pass your secret using echo and such. Also, for the sake of
# simplictiy I'll keep using --key flag throughout this documentation.
# Alrigh, lets say I'd like to add a Google account.
$ notp --add taylan-google --key superSecretKey
# you have to provide secret code when stdin prompts.
# OR
$ notp --add taylan-google --stdin
# Key: <you will type your encryption key here>
# Enter secret prompt: <You will paste your OTP secret here>
$ notp --list
$ notp --get <name> --key superSecretKey
OTP generation only supports 6 digit codes, for now.
notp uses default config path on the OS that you're using. Such as ~/.config/notp
for Linux, \AppData\Roaming\notp
for
Windows and ~/Library/Preferences/notp
for iOS and encrypts the file AES with the given key from CLI as an argument.
The default time-based authentication codes are derived from a hash of the key and the current time, so it is important that the system clock have at least one-minute accuracy.
Adding new secret:
$ notp --add AWS --key ttaayyllaann
Please enter the secret: NRNM7KGFTR6SUMPBAEMBETM2WGKVUWHH6Y4VEGNPZON3GMVXBHF...
$
# There won't be any confirmation messages that indicates successfull insertion
# but there will be error messages if something wents wrong.
Checking existing secrets you have:
$ notp --list
1. AWS
2. Google
$
Generating the OTP code:
$ notp --get AWS --key ttaayyllaann
OTP code for the AWS: 442659
$
Deleting a secret:
$ notp --delete AWS
AWS Deleted!
Using with CLI:
$ notp --key ttaayyllaann -q --get AWS
442659