Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RF of CredentialManager.get() related code #252

Merged
merged 7 commits into from
Feb 22, 2023
Merged

RF of CredentialManager.get() related code #252

merged 7 commits into from
Feb 22, 2023

Conversation

mih
Copy link
Member

@mih mih commented Feb 22, 2023

Trying to find what is happening with #249 by making the implemented logic less complex.

Only report on credentials that have a secret. Issue only a debug
message on credential fragments without one.

The recorded use case for the previous behavior was the discovery of
credential fragments for clean-up. However, that was nohow properly
implemented, and it seems cleaner to ignore random cruft than have it
impose handling complexity on a CredentialManager user.

Now `CredentialManager.get()` reports a credential that has a secret,
or it does not report at all (i.e. None).
@mih
Copy link
Member Author

mih commented Feb 22, 2023

#249 still unresolved, the rest is good.

@mih mih merged commit 232fe61 into datalad:main Feb 22, 2023
@mih mih deleted the credsalad branch February 22, 2023 08:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant