fix: remove legacy assistant keychain entries#11
Conversation
Move migrated audit assistant credentials out of the legacy default account instead of copying them. Make the Settings delete action remove both the current credential ID and the legacy default account so stale keys cannot reappear on the next launch. Add tests for migration cleanup and delete behavior.
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: defaults Review profile: CHILL Plan: Pro Plus Run ID: 📒 Files selected for processing (3)
📝 WalkthroughWalkthroughThis PR enhances credential cleanup by teaching the audit assistant credential store to remove legacy default credentials during migration and deletion operations. A new helper method is added, the settings view is updated to use it, and tests verify the complete cleanup behavior. ChangesLegacy Credential Cleanup
Estimated code review effort🎯 2 (Simple) | ⏱️ ~12 minutes Poem
🚥 Pre-merge checks | ✅ 4 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (4 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches📝 Generate docstrings
🧪 Generate unit tests (beta)
Comment |
Summary
Validation
Security note
The published v0.2.1-beta artifacts were built by GitHub Actions from commit d4d4299. I also checked the released app bundle and repository for common API-key token patterns; no match was found.
Summary by CodeRabbit
Release Notes