> DEBUG: [common/tools.py:823 keyringSupported] No appropriate keyring found.
>        'keyring.backends.chainer' can't be used with BackInTime
> ...
> Two Conclusion:
> 1) Backintime fails to access the keyring when keyring.backends.chainer is in 
> use.

Correct.

The keyring.backends.chainer.chainerBackend is not yet supported in BiT
and perhaps never will be because it iterates over all installed backends
and picks the "best one" by some internal logic.

The chosen backend my not be the one where the users saves the credentials 
anyhow.

So a decent fix for this would be to add a settings GUI to BiT so that
the user can choose which backend is the right one (containing the credentials).

I have documented future implementation options in this issue comment:

https://github.com/bit-team/backintime/issues/1321#issuecomment-1271689827


> With python3-keyring 22.0.1-1 backintime succeeds to read the ssh password
> However logs now say:
>   DEBUG: [common/tools.py:823 keyringSupported] No appropriate keyring found.
>          'keyring.backends.SecretService' can't be used with BackInTime
> ...
> Two Conclusion:
> ...
> 2) Backintime's test for keyring back ends does not work properly.
> It does not recognize a back end as functional it does work with later on.

Correct. I think this has the same reason as the bug #1321 linked in above 
issue.

I am preparing a fix for this bug (but NOT adding support for the 
ChainerBackend!)
and hopefully attach a patch for this if the package maintainer really wants
to backport this to BiT v1.2.1 (with no support from the BiT team I guess
since we are preparing a new stabilized release 1.3.x where many bugs are fixed
but no new features are added (therefore "stabilize" ;-)

So I'd prefer if the package maintainer waited for stabilized BiT version
and packages the new BiT version we are working on.

Reply via email to