-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add check to avoid overriding existing keys #1513
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can't merge this change at the moment, not until closer to a v22 release, because it breaks existing behavior.
Hi @BlaineHeffron Did we agree on this feature? Could you show me the thread of the discussion please |
@leighmcculloch How about a flag to prevent the overwrite? Then we can deprecate it in the next breaking release? |
There isn't a discussion thread that I'm aware of, it was something we had discussed with other AhaLabs team members. |
It's unclear how effective an option would be. I doubt the average CLI user is going to start using a What use case / workflow does the option serve? |
The app |
Original discussion thread in #1380 and in Slack. @janewang, @fnando, @elizabethengelman, and @willemneal were all in strong agreement with "overwrite by default is a bug" back in June. |
Yup, I think the idea of avoiding overwriting a key, which is a destructive action, is good too, but it needs to be held until the next major version because it is a breaking change. And I was otherwise only pushing back on the suggestion to add a temporary @Ifropc has labelled the issue as a |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Couple more things I noticed that I think we should change before merging this in the next major release.
Comments have been addressed. This PR now also resolves #1407
Now I need to fix all the integration tests so that they fund the account after generate |
Actually, does it make sense to just add a --fund so that you could do both at once like the old functionality? (Would also make it easier for me to fix the tests ) @leighmcculloch |
Tests are fixed, should be ready. |
Closing in favor of #1709 |
What
stellar keys generate
will no longer overwrite an identity if it already exists, unless a different seed is provided.Why
Workflows that utilize
generate
might unintentionally overwrite during contract development.Close #1380
Known limitations
N/A