Allow disabling keyring#8910
Conversation
030aaaa to
becfbd9
Compare
|
Deploy preview for website ready! Built with commit de19d4a. |
radoering
left a comment
There was a problem hiding this comment.
Looks good in general. I wonder if we should add some kind of tests in password_manager to check that keyring is not used when calling certain methods or if this does not add much value?
b8ce740 to
171c69a
Compare
|
I made all the changes you requestet @radoering.
What certain methods would this be? |
171c69a to
e997e39
Compare
|
It's probably just like "when |
e997e39 to
33cf92f
Compare
I implemented such a test and actually found an issue with it, so I guess it is necessary. Not sure what you think of the attempt to detect code-changes that were not reflected in the test. Looks weird, but I think it might be worth it. Better to have one more place to make a change than a bug. |
33cf92f to
baa8ed2
Compare
radoering
left a comment
There was a problem hiding this comment.
I implemented such a test and actually found an issue with it, so I guess it is necessary.
Nice.
Not sure what you think of the attempt to detect code-changes that were not reflected in the test. Looks weird, but I think it might be worth it. Better to have one more place to make a change than a bug.
I completely agree. I don't think it's an issue that the unit test of password_manager has to be adapted if password_manager is changed.
The test looks good to me. Just a small suggestion to make the idea behind the test more clear.
baa8ed2 to
310136b
Compare
310136b to
de19d4a
Compare
|
This pull request has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
This PR allows disabling the keyring completely. I have found myself often in situations where the keyring caused a lot of trouble. Checking whether the keyring was available would cause poetry to hang indefinetely. Rather than fixing broken keyring setups on various Linux systems I would much rather just disable the keyring altogether and accept the risk of plaintext credentials.