Skip to content

Instantly share code, notes, and snippets.

@nixy
Created July 27, 2017 08:58
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save nixy/66f45ae025c3bb39c2660da07a14ebc6 to your computer and use it in GitHub Desktop.
Save nixy/66f45ae025c3bb39c2660da07a14ebc6 to your computer and use it in GitHub Desktop.
Python keyring library buildlog
installing ‘python2.7-keyring-8.4.1’
these derivations will be built:
/nix/store/gisfwl3mhvq9y53rcy5bb2z95kpam4vb-python2.7-keyring-8.4.1.drv
building path(s) ‘/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1’
unpacking sources
unpacking source archive /nix/store/08gr3da4rsqk5gxryz1khhm0h4rrf9jx-keyring-8.4.1.tar.gz
source root is keyring-8.4.1
setting SOURCE_DATE_EPOCH to timestamp 1455505972 of file keyring-8.4.1/setup.cfg
patching sources
configuring
building
running bdist_wheel
running build
running build_py
creating build
creating build/lib
creating build/lib/keyring
copying keyring/__init__.py -> build/lib/keyring
copying keyring/__main__.py -> build/lib/keyring
copying keyring/backend.py -> build/lib/keyring
copying keyring/cli.py -> build/lib/keyring
copying keyring/core.py -> build/lib/keyring
copying keyring/credentials.py -> build/lib/keyring
copying keyring/errors.py -> build/lib/keyring
copying keyring/getpassbackend.py -> build/lib/keyring
copying keyring/http.py -> build/lib/keyring
copying keyring/py27compat.py -> build/lib/keyring
copying keyring/py33compat.py -> build/lib/keyring
creating build/lib/keyring/backends
copying keyring/backends/__init__.py -> build/lib/keyring/backends
copying keyring/backends/fail.py -> build/lib/keyring/backends
copying keyring/backends/kwallet.py -> build/lib/keyring/backends
copying keyring/backends/OS_X.py -> build/lib/keyring/backends
copying keyring/backends/SecretService.py -> build/lib/keyring/backends
copying keyring/backends/Windows.py -> build/lib/keyring/backends
creating build/lib/keyring/tests
copying keyring/tests/__init__.py -> build/lib/keyring/tests
copying keyring/tests/test_backend.py -> build/lib/keyring/tests
copying keyring/tests/util.py -> build/lib/keyring/tests
creating build/lib/keyring/util
copying keyring/util/__init__.py -> build/lib/keyring/util
copying keyring/util/escape.py -> build/lib/keyring/util
copying keyring/util/platform_.py -> build/lib/keyring/util
copying keyring/util/properties.py -> build/lib/keyring/util
creating build/lib/keyring/tests/backends
copying keyring/tests/backends/__init__.py -> build/lib/keyring/tests/backends
copying keyring/tests/backends/test_kwallet.py -> build/lib/keyring/tests/backends
copying keyring/tests/backends/test_OS_X.py -> build/lib/keyring/tests/backends
copying keyring/tests/backends/test_SecretService.py -> build/lib/keyring/tests/backends
copying keyring/tests/backends/test_Windows.py -> build/lib/keyring/tests/backends
running egg_info
writing requirements to keyring.egg-info/requires.txt
writing keyring.egg-info/PKG-INFO
writing top-level names to keyring.egg-info/top_level.txt
writing dependency_links to keyring.egg-info/dependency_links.txt
writing entry points to keyring.egg-info/entry_points.txt
reading manifest file 'keyring.egg-info/SOURCES.txt'
writing manifest file 'keyring.egg-info/SOURCES.txt'
installing to build/bdist.macosx-10.10-x86_64/wheel
running install
running install_lib
creating build/bdist.macosx-10.10-x86_64
creating build/bdist.macosx-10.10-x86_64/wheel
creating build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/__init__.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/__main__.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/backend.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
creating build/bdist.macosx-10.10-x86_64/wheel/keyring/backends
copying build/lib/keyring/backends/__init__.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/backends
copying build/lib/keyring/backends/fail.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/backends
copying build/lib/keyring/backends/kwallet.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/backends
copying build/lib/keyring/backends/OS_X.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/backends
copying build/lib/keyring/backends/SecretService.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/backends
copying build/lib/keyring/backends/Windows.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/backends
copying build/lib/keyring/cli.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/core.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/credentials.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/errors.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/getpassbackend.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/http.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/py27compat.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
copying build/lib/keyring/py33compat.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring
creating build/bdist.macosx-10.10-x86_64/wheel/keyring/tests
copying build/lib/keyring/tests/__init__.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/tests
creating build/bdist.macosx-10.10-x86_64/wheel/keyring/tests/backends
copying build/lib/keyring/tests/backends/__init__.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/tests/backends
copying build/lib/keyring/tests/backends/test_kwallet.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/tests/backends
copying build/lib/keyring/tests/backends/test_OS_X.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/tests/backends
copying build/lib/keyring/tests/backends/test_SecretService.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/tests/backends
copying build/lib/keyring/tests/backends/test_Windows.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/tests/backends
copying build/lib/keyring/tests/test_backend.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/tests
copying build/lib/keyring/tests/util.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/tests
creating build/bdist.macosx-10.10-x86_64/wheel/keyring/util
copying build/lib/keyring/util/__init__.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/util
copying build/lib/keyring/util/escape.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/util
copying build/lib/keyring/util/platform_.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/util
copying build/lib/keyring/util/properties.py -> build/bdist.macosx-10.10-x86_64/wheel/keyring/util
running install_egg_info
Copying keyring.egg-info to build/bdist.macosx-10.10-x86_64/wheel/keyring-8.4.1-py2.7.egg-info
running install_scripts
creating build/bdist.macosx-10.10-x86_64/wheel/keyring-8.4.1.dist-info/WHEEL
installing
/private/var/folders/hk/yg8sxtg51r3ddbw249w_djlw0000gp/T/nix-build-python2.7-keyring-8.4.1.drv-0/keyring-8.4.1/dist /private/var/folders/hk/yg8sxtg51r3ddbw249w_djlw0000gp/T/nix-build-python2.7-keyring-8.4.1.drv-0/keyring-8.4.1
Processing ./keyring-8.4.1-py2.py3-none-any.whl
Installing collected packages: keyring
Successfully installed keyring-8.4.1
/private/var/folders/hk/yg8sxtg51r3ddbw249w_djlw0000gp/T/nix-build-python2.7-keyring-8.4.1.drv-0/keyring-8.4.1
post-installation fixup
stripping (with flags -S) in /nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib /nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/bin
patching script interpreter paths in /nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1
wrapping `/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/bin/keyring'...
running install tests
============================= test session starts ==============================
platform darwin -- Python 2.7.13, pytest-2.8.7, py-1.4.31, pluggy-0.3.1
rootdir: /nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1, inifile:
collected 34 items
../../../../../../../../nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/backends/test_OS_X.py .FFFFFFF.
../../../../../../../../nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/backends/test_SecretService.py ssssssss.
../../../../../../../../nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/backends/test_Windows.py ssssssss
../../../../../../../../nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/backends/test_kwallet.py ssssssss
=================================== FAILURES ===================================
_________________ OSXKeychainTestCase.test_delete_one_in_group _________________
self = <keyring.tests.backends.test_OS_X.OSXKeychainTestCase testMethod=test_delete_one_in_group>
def test_delete_one_in_group(self):
username1 = random_string(20, DIFFICULT_CHARS)
username2 = random_string(20, DIFFICULT_CHARS)
password = random_string(20, DIFFICULT_CHARS)
service = random_string(20, DIFFICULT_CHARS)
> self.keyring.set_password(service, username1, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:94:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = <keyring.backends.OS_X.Keyring object at 0x105ddfa50>
service = "=\t\\<\x0b'}'^@\x0b;>'+}-&(?"
username = "(.',\\?|(=[}*[*;{\x0c-<\x0c", password = '`/")<!$\n)\t( *_}\t/.\r^'
def set_password(self, service, username, password):
if username is None:
username = ''
try:
# This two-step process is a stop-gap measure until a ctypes
# implementation can be created. Fall back to the
# command-line version when the username/service/password
# strings contain characters (escapes, newlines, etc.) that
# the interactive security session can't handle.
interactive_call = functools.partial(self._interactive_set,
service, username, password)
direct_call = functools.partial(self._direct_set,
service, username, password)
code = interactive_call() and direct_call()
# check return code
if code:
raise Exception()
except Exception:
> raise PasswordSetError("Can't store password in keychain")
E PasswordSetError: Can't store password in keychain
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/backends/OS_X.py:63: PasswordSetError
___________________ OSXKeychainTestCase.test_delete_present ____________________
self = <keyring.tests.backends.test_OS_X.OSXKeychainTestCase testMethod=test_delete_present>
def test_delete_present(self):
password = random_string(20, DIFFICULT_CHARS)
username = random_string(20, DIFFICULT_CHARS)
service = random_string(20, DIFFICULT_CHARS)
> self.keyring.set_password(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:79:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = <keyring.backends.OS_X.Keyring object at 0x105e78350>
service = ' $!_\\[/@^\r!#\t!>\r\r_`.', username = ",&=[|_( .]]\n*%$&\x0c~<'"
password = '/[)\x0c\r|*\x0c>/|"}/)|\r=$:'
def set_password(self, service, username, password):
if username is None:
username = ''
try:
# This two-step process is a stop-gap measure until a ctypes
# implementation can be created. Fall back to the
# command-line version when the username/service/password
# strings contain characters (escapes, newlines, etc.) that
# the interactive security session can't handle.
interactive_call = functools.partial(self._interactive_set,
service, username, password)
direct_call = functools.partial(self._direct_set,
service, username, password)
code = interactive_call() and direct_call()
# check return code
if code:
raise Exception()
except Exception:
> raise PasswordSetError("Can't store password in keychain")
E PasswordSetError: Can't store password in keychain
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/backends/OS_X.py:63: PasswordSetError
___________________ OSXKeychainTestCase.test_different_user ____________________
self = <keyring.tests.backends.test_OS_X.OSXKeychainTestCase testMethod=test_different_user>
def test_different_user(self):
"""
Issue #47 reports that WinVault isn't storing passwords for
multiple users. This test exercises that test for each of the
backends.
"""
keyring = self.keyring
> self.set_password('service1', 'user1', 'password1')
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:122:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:46: in set_password
self.keyring.set_password(service, username, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = <keyring.backends.OS_X.Keyring object at 0x105ddfdd0>
service = 'service1', username = 'user1', password = 'password1'
def set_password(self, service, username, password):
if username is None:
username = ''
try:
# This two-step process is a stop-gap measure until a ctypes
# implementation can be created. Fall back to the
# command-line version when the username/service/password
# strings contain characters (escapes, newlines, etc.) that
# the interactive security session can't handle.
interactive_call = functools.partial(self._interactive_set,
service, username, password)
direct_call = functools.partial(self._direct_set,
service, username, password)
code = interactive_call() and direct_call()
# check return code
if code:
raise Exception()
except Exception:
> raise PasswordSetError("Can't store password in keychain")
E PasswordSetError: Can't store password in keychain
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/backends/OS_X.py:63: PasswordSetError
___________________ OSXKeychainTestCase.test_difficult_chars ___________________
self = <keyring.tests.backends.test_OS_X.OSXKeychainTestCase testMethod=test_difficult_chars>
def test_difficult_chars(self):
password = random_string(20, DIFFICULT_CHARS)
username = random_string(20, DIFFICULT_CHARS)
service = random_string(20, DIFFICULT_CHARS)
> self.check_set_get(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:73:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:56: in check_set_get
self.set_password(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:46: in set_password
self.keyring.set_password(service, username, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = <keyring.backends.OS_X.Keyring object at 0x105fb5710>
service = ".#'.$!~/*$\r/{^-|!<#)", username = '?\x0c_|/`\'").:%}=[)\x0b",['
password = '\x0b*#^&++}/\r{(&^)-\t\x0c\x0b~'
def set_password(self, service, username, password):
if username is None:
username = ''
try:
# This two-step process is a stop-gap measure until a ctypes
# implementation can be created. Fall back to the
# command-line version when the username/service/password
# strings contain characters (escapes, newlines, etc.) that
# the interactive security session can't handle.
interactive_call = functools.partial(self._interactive_set,
service, username, password)
direct_call = functools.partial(self._direct_set,
service, username, password)
code = interactive_call() and direct_call()
# check return code
if code:
raise Exception()
except Exception:
> raise PasswordSetError("Can't store password in keychain")
E PasswordSetError: Can't store password in keychain
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/backends/OS_X.py:63: PasswordSetError
__________________ OSXKeychainTestCase.test_password_set_get ___________________
self = <keyring.tests.backends.test_OS_X.OSXKeychainTestCase testMethod=test_password_set_get>
def test_password_set_get(self):
password = random_string(20)
username = random_string(20)
service = random_string(20)
> self.check_set_get(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:67:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:56: in check_set_get
self.set_password(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:46: in set_password
self.keyring.set_password(service, username, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = <keyring.backends.OS_X.Keyring object at 0x105e78a50>
service = 'JVdzd4gYQmGTIC2mP1WG', username = 'hYpEBA7Nz3bxzHtF5LsK'
password = 'ChqAGxaCwnAPXLTzsi7J'
def set_password(self, service, username, password):
if username is None:
username = ''
try:
# This two-step process is a stop-gap measure until a ctypes
# implementation can be created. Fall back to the
# command-line version when the username/service/password
# strings contain characters (escapes, newlines, etc.) that
# the interactive security session can't handle.
interactive_call = functools.partial(self._interactive_set,
service, username, password)
direct_call = functools.partial(self._direct_set,
service, username, password)
code = interactive_call() and direct_call()
# check return code
if code:
raise Exception()
except Exception:
> raise PasswordSetError("Can't store password in keychain")
E PasswordSetError: Can't store password in keychain
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/backends/OS_X.py:63: PasswordSetError
_______________ OSXKeychainTestCase.test_unicode_and_ascii_chars _______________
self = <keyring.tests.backends.test_OS_X.OSXKeychainTestCase testMethod=test_unicode_and_ascii_chars>
def test_unicode_and_ascii_chars(self):
source = (random_string(10, UNICODE_CHARS) + random_string(10) +
random_string(10, DIFFICULT_CHARS))
password = random_string(20, source)
username = random_string(20, source)
service = random_string(20, source)
> self.check_set_get(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:112:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:56: in check_set_get
self.set_password(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:46: in set_password
self.keyring.set_password(service, username, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = <keyring.backends.OS_X.Keyring object at 0x105ddf890>
service = '\\(}(p\xd7}q\\\xce}[g:f(~\x86\xd1f', username = 'j\xd1f:}\x89\xce\t\xb1\x89\xcef\xa1)j\x86@\xa1\x8b('
password = 'g\xb1q\t\xd0\xcefJ\xd0:q\xd09@Bj@@f\xd0'
def set_password(self, service, username, password):
if username is None:
username = ''
try:
# This two-step process is a stop-gap measure until a ctypes
# implementation can be created. Fall back to the
# command-line version when the username/service/password
# strings contain characters (escapes, newlines, etc.) that
# the interactive security session can't handle.
interactive_call = functools.partial(self._interactive_set,
service, username, password)
direct_call = functools.partial(self._direct_set,
service, username, password)
code = interactive_call() and direct_call()
# check return code
if code:
raise Exception()
except Exception:
> raise PasswordSetError("Can't store password in keychain")
E PasswordSetError: Can't store password in keychain
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/backends/OS_X.py:63: PasswordSetError
____________________ OSXKeychainTestCase.test_unicode_chars ____________________
self = <keyring.tests.backends.test_OS_X.OSXKeychainTestCase testMethod=test_unicode_chars>
def test_unicode_chars(self):
password = random_string(20, UNICODE_CHARS)
username = random_string(20, UNICODE_CHARS)
service = random_string(20, UNICODE_CHARS)
> self.check_set_get(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:104:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:56: in check_set_get
self.set_password(service, username, password)
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/tests/test_backend.py:46: in set_password
self.keyring.set_password(service, username, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = <keyring.backends.OS_X.Keyring object at 0x105fb5a90>
service = '\x85\x84\xbe\xd7\xd0\x86\x85\x91\x97\xa1\xd1\xce\x8d\xd0\xd0\xd0\xd7\xce\xd1\xd1', username = '\xce\x82\x8a\x98\xd0\xd0\xd1\xd0\xd1\xd1\xd0\x83\xd0\xaa\xd7\x91\xb0\x82\x86\xd7'
password = '\xd0\xb0\xb7\x91\xd1\xd0\xb3\xd1\xd1\xd1\x8e\xd0\x89\xb5\xd0\x88\xd0\x81\x8e\xd0'
def set_password(self, service, username, password):
if username is None:
username = ''
try:
# This two-step process is a stop-gap measure until a ctypes
# implementation can be created. Fall back to the
# command-line version when the username/service/password
# strings contain characters (escapes, newlines, etc.) that
# the interactive security session can't handle.
interactive_call = functools.partial(self._interactive_set,
service, username, password)
direct_call = functools.partial(self._direct_set,
service, username, password)
code = interactive_call() and direct_call()
# check return code
if code:
raise Exception()
except Exception:
> raise PasswordSetError("Can't store password in keychain")
E PasswordSetError: Can't store password in keychain
/nix/store/6c5ydvihiy4kkgyjy00j4158w9n8zaiq-python2.7-keyring-8.4.1/lib/python2.7/site-packages/keyring/backends/OS_X.py:63: PasswordSetError
================ 7 failed, 3 passed, 24 skipped in 0.28 seconds ================
builder for ‘/nix/store/gisfwl3mhvq9y53rcy5bb2z95kpam4vb-python2.7-keyring-8.4.1.drv’ failed with exit code 1
error: build of ‘/nix/store/gisfwl3mhvq9y53rcy5bb2z95kpam4vb-python2.7-keyring-8.4.1.drv’ failed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment