Refactor password logic to prevent accidental password leakage #708
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Stacked on #706 and #705, merge those before merging this PR. I can also rebase on master afterwards before merging to avoid duplicate commits.After working with the passwords a bit in #706, I noticed how they were sometimes stored in the same dict as all the other journal specific configuration. I also noticed how some of the test files even had password fields in them.
I was worried that real passwords would accidentally get written to the jrnl config file in the future (and subsequently leaked through peoples dotfile repositories...). To prevent that, I refactored a lot of the code to constrict the password handling logic only to the EncryptedJournal classes and away from the other configuration that gets saved to disk.
However, I had to change the install progress a little bit to make this work. It will now not ask you for a password right away but rather if you want to encrypt or not. Only if you reply 'y' will it ask you for the password later on.
Currently this still breaks the install, which we do not have tests for by the way.Checklist