diff options
author | Kali Kaneko <kali@leap.se> | 2014-01-11 23:10:53 -0400 |
---|---|---|
committer | Kali Kaneko <kali@leap.se> | 2014-01-11 23:36:37 -0400 |
commit | 5dc5dc816f2ba50920dd3a5908824c244c8d9390 (patch) | |
tree | dae870e6fcda2c11028ac340c16219a1f0e90087 /changes/bug-4734_akm-stored-public-keys-view | |
parent | a1db341a39ec336ab62e89280f9bfb315420bfb5 (diff) |
workaround for using keyring inside a virtualenv
(securestorage backend)
This is related to research #4190 and #4083.
I didn't resolve them, but I ended understanding a bit more what kind
of issues can we be having with those.
This workaround is more than anything a cleanup on that for future work,
and is making me able to test the client much more nicely inside a
virtualenv (where the default keyring selecting was the plaintext one).
For this to work inside a virtualenv, one have to install SecureStorage,
which in turns depends on python-dbus, which is basically uninstallable
using pip inside a venv. So, symlinking to the rescue!
it needs gi/repository and pyobject to be symlinked too.
but at least you don't have to type the pass every time.
I don't know what should be do in the long term with this issue.
Some of us were not too fond on using the keyrings at all.
We don't have many options among all the keyring backends, and sadly
many of them depend on PyCrypto. So probably roll our own backend. Yay.
Diffstat (limited to 'changes/bug-4734_akm-stored-public-keys-view')
0 files changed, 0 insertions, 0 deletions