You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -56,14 +56,14 @@ This crate allows clients to "bring their own credential store" by providing tra
56
56
57
57
This crate provides built-in implementations of the following platform-specific credential stores:
58
58
59
-
*_Linux_: The DBus-based Secret Service and the kernel keyutils.
59
+
*_Linux_: The DBus-based Secret Service, the kernel keyutils, and a combo of the two.
60
60
*_FreeBSD_, _OpenBSD_: The DBus-based Secret Service.
61
61
*_macOS_, _iOS_: The local keychain.
62
62
*_Windows_: The Windows Credential Manager.
63
63
64
64
To enable the stores you want, you use features: there is one feature for each possibly-included credential store. If you specify a feature (e.g., `dbus-secret-service`) _and_ your target platform (e.g., `freebsd`) supports that credential store, it will be included as the default credential store in that build. That way you can have a build command that specifies a single credential store for each of your target platforms, and use that same build command for all targets.
65
65
66
-
If you don't enable any credential stores that are supported on a given platform, or you enable multiple credential stores for some platform, the _mock_ keystore will be the default on that platform. See the [developer docs](https://docs.rs/keyring/) for details of which features control the inclusion of which credential stores (and which platforms each credential store targets).
66
+
If you don't enable any credential stores that are supported on a given platform, the _mock_ keystore will be the default on that platform. See the [developer docs](https://docs.rs/keyring/) for details of which features control the inclusion of which credential stores.
0 commit comments