Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make initializing SecretStorage lazy #189489

Merged
merged 1 commit into from
Aug 2, 2023
Merged

Conversation

TylerLeonhardt
Copy link
Member

To prevent a round trip until we need it.

Fixes #189481

To prevent a round trip until we need it.

Fixes #189481
@TylerLeonhardt TylerLeonhardt enabled auto-merge (squash) August 2, 2023 16:48
@TylerLeonhardt TylerLeonhardt self-assigned this Aug 2, 2023
@vscodenpa vscodenpa added this to the August 2023 milestone Aug 2, 2023
@TylerLeonhardt TylerLeonhardt merged commit a371c36 into main Aug 2, 2023
@TylerLeonhardt TylerLeonhardt deleted the tyler/intelligent-spoonbill branch August 2, 2023 17:33
TylerLeonhardt added a commit that referenced this pull request Aug 2, 2023
We have always had a way to disable reading from the keyring and use an in-memory secrets storage: `--disable-keytar`.

This honors that flag in the new SecretStorage world... in a follow up PR we will migrate that flag to `--disable-secret-storage`.

Additionally, I found a bug where we weren't firing events that we successfully set/deleted secrets in the browser version of secretStorageService and this fixes that by firing those events.

This also reverts #189489 so that `BaseSecretStorageService.type` reads correctly early on... plus there's more discussion to be had in #189481

Fixes #188432
TylerLeonhardt added a commit that referenced this pull request Aug 3, 2023
We have always had a way to disable reading from the keyring and use an in-memory secrets storage: `--disable-keytar`.

This honors that flag in the new SecretStorage world... in a follow up PR we will migrate that flag to `--disable-secret-storage`.

Additionally, I found a bug where we weren't firing events that we successfully set/deleted secrets in the browser version of secretStorageService and this fixes that by firing those events.

This also reverts #189489 so that `BaseSecretStorageService.type` reads correctly early on... plus there's more discussion to be had in #189481

Fixes #188432
@github-actions github-actions bot locked and limited conversation to collaborators Sep 16, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Consider to lazy initialise secrets service and access to safeStorage
3 participants