Package Details: 1password 8.10.30-32

Git Clone URL: https://aur.archlinux.org/1password.git (read-only, click to copy)
Package Base: 1password
Description: Password manager and secure wallet
Upstream URL: https://1password.com
Keywords: manager onepassword password
Licenses: LicenseRef-1Password-Proprietary
Conflicts: 1password-beta, 1password-beta-bin
Submitter: rew1red
Maintainer: 1Password
Last Packager: 1Password
Votes: 97
Popularity: 3.25
First Submitted: 2020-08-04 23:11 (UTC)
Last Updated: 2024-04-16 14:30 (UTC)

Pinned Comments

1Password commented on 2021-07-27 21:07 (UTC) (edited on 2021-09-13 17:52 (UTC) by 1Password)

1Password for Arch Linux - Stable

The source is signed with the GPG key 3FEF9748469ADBE15DA7CA80AC2D62742012EA22 and can be seen on the install-linux guide.

Getting Started

Our getting started guide can be found at https://support.1password.com/install-linux/#arch-linux

Support

Our Linux support discussion is available at https://1password.community/categories/linux

Beta Releases

Our beta releases can be found at 1password-beta. Beta releases are more likely to have regressions than our stable releases.

Latest Comments

1 2 3 4 Next › Last »

jacek2v commented on 2024-03-21 08:32 (UTC) (edited on 2024-03-21 08:36 (UTC) by jacek2v)

Hi, Something is wrong with the code signature?

I'm consern that message during installation doesn't look good:

==> Retrieving sources...
  -> Found 1password-8.10.28.x64.tar.gz
  -> Found 1password-8.10.28.x64.tar.gz.sig
==> WARNING: Skipping verification of source file PGP signatures.
==> Validating source files with sha256sums...
    1password-8.10.28.x64.tar.gz ... Passed
    1password-8.10.28.x64.tar.gz.sig ... Passed
:: (1/1) Parsing SRCINFO: 1password
pub   rsa4096 2017-05-18 [SC] [expires: 2025-05-16]
      3FEF9748469ADBE15DA7CA80AC2D62742012EA22
uid           [ unknown] Code signing for 1Password <codesign@1password.com>

I updated my gpg keys.

Scimmia commented on 2023-07-22 01:31 (UTC)

What in the world are you doing with the pkgrel? It's supposed to be reset on a pkgver update, not however you're using it.

dcreager commented on 2023-07-11 01:34 (UTC)

This patch updates the PKGBUILD to build the aarch64 download:

https://git.sr.ht/~dcreager/1password-aur/commit/d64b38aaaa50cbf4eb2c858f90c070e3d6cb4508

Core_UK commented on 2023-06-01 23:21 (UTC)

aarch64 builds can be obtained through https://downloads.1password.com/linux/tar/stable/aarch64/1password-latest.tar.gz

If the PKGBUILD could be adapted for this, it would be great.

lkrms commented on 2023-05-04 07:25 (UTC)

Thanks for providing this package!

I checked the PKGBUILD before installing and thought I should mention that for those of us who build their AUR packages in a chroot or otherwise isolated environment, the "first 10 human users of the system" are unlikely to match the target system.

It looks like the PolicyKit file generated at build time only surfaces this data in an annotation, so it's not a security issue, but it might be worth considering an install script instead?

xuanwo commented on 2023-02-24 03:39 (UTC)

Can we enable wayland support of 1password via add flags:

--ozone-platform-hint=auto

kal commented on 2022-09-20 12:29 (UTC)

Beautiful application and seamless install - thank you @1password

DynamiteMoose commented on 2022-07-01 12:09 (UTC) (edited on 2022-07-04 02:33 (UTC) by DynamiteMoose)

Edit: Turns out I broke something on my end, sorry for any inconvenience caused.

whynothugo commented on 2022-01-14 16:05 (UTC)

You don't need to chmod the helper after installation via the install script; you can just do this when packaging and install the file with the right mode bits.

Here's a patch:

diff --git a/1password.install b/1password.install
index e752514..156badc 100755
--- a/1password.install
+++ b/1password.install
@@ -9,12 +9,6 @@ app_group_exists() {
     fi
 }

-set_chromesandbox_permissions() {
-    # chrome-sandbox requires the setuid bit to be specifically set.
-    # See https://github.com/electron/electron/issues/17972
-    chmod 4755 /opt/1Password/chrome-sandbox
-}
-
 setup_browser_helper() {
     # Setup the Core App Integration helper binary with the correct permissions and group
     HELPER_PATH="/opt/1Password/1Password-KeyringHelper"
@@ -46,12 +40,10 @@ pre_upgrade() {
 }

 post_install() {
-    set_chromesandbox_permissions
     setup_browser_helper
 }

 post_upgrade() {
-    set_chromesandbox_permissions
     setup_browser_helper
 }

diff --git a/PKGBUILD b/PKGBUILD
index 2e5a93e..680429f 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -46,4 +46,8 @@ package() {
     # Symlink /usr/bin executable to opt
     install -dm0755 "${pkgdir}"/usr/bin
     ln -s /opt/1Password/1password "${pkgdir}"/usr/bin/1password
+
+    # chrome-sandbox requires the setuid bit to be specifically set.
+    # See https://github.com/electron/electron/issues/17972
+    chmod 4755 "${pkgdir}"/opt/1Password/chrome-sandbox
 }

shaybox commented on 2022-01-13 19:46 (UTC)

@1Password why did you remove the ability to use Polkit authentication on first startup?