Skip to content

fix(config): check file fallback when keyring has no entry#9279

Merged
DOsinga merged 1 commit into
aaif-goose:mainfrom
sheikhlimon:fix/keyring-fallback-read-path
May 18, 2026
Merged

fix(config): check file fallback when keyring has no entry#9279
DOsinga merged 1 commit into
aaif-goose:mainfrom
sheikhlimon:fix/keyring-fallback-read-path

Conversation

@sheikhlimon
Copy link
Copy Markdown
Contributor

Summary

Fixes #8902

When keyring is unavailable and secrets were written to the file fallback, reading secrets back returned empty because the "No entry found" handler skipped the file entirely. Now tries fallback_to_file_storage() before concluding no secrets exist.

Signed-off-by: sheikhlimon <sheikhlimon404@gmail.com>
Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 4cf53ba36f

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

|| msg.contains("No matching entry found") =>
{
HashMap::new()
self.fallback_to_file_storage()?
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Return empty secrets when keyring entry is missing

When get_password() returns a "No entry found" error from an otherwise functional keyring (e.g., first run or after a user deletes the keychain item), this branch now reads secrets.yaml instead of treating the keyring as authoritative-empty. That can silently resurrect stale credentials from prior fallback runs and make get_secret succeed even though the keyring entry was intentionally removed, which is a behavioral and security regression tied to this new call path.

Useful? React with 👍 / 👎.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

secrets.yaml only gets written when is_keyring_availability_error returns true – meaning the keyring is genuinely unavailable (no dbus, no secret service). on a system with a working keyring, the fallback path never creates that file

Copy link
Copy Markdown
Collaborator

@DOsinga DOsinga left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice catch! Clean, minimal fix for a real bug. The logic is sound — fallback_to_file_storage correctly reads secrets.yaml when it exists (written during a prior keyring-unavailable session) and returns an empty HashMap when it doesn't, so this is safe on systems with a working keyring too. Thanks for the fix! 🎉

@DOsinga DOsinga added this pull request to the merge queue May 18, 2026
Merged via the queue into aaif-goose:main with commit 92eb1b6 May 18, 2026
21 checks passed
@sheikhlimon sheikhlimon deleted the fix/keyring-fallback-read-path branch May 18, 2026 15:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Configuration wizard error: Configuration value not found

2 participants