* [PATCH] osxkeychain: lock for exclusive execution @ 2024-05-10 8:07 Koji Nakamaru via GitGitGadget 2024-05-10 15:02 ` Bo Anderson ` (2 more replies) 0 siblings, 3 replies; 21+ messages in thread From: Koji Nakamaru via GitGitGadget @ 2024-05-10 8:07 UTC (permalink / raw) To: git; +Cc: Bo Anderson, Koji Nakamaru, Koji Nakamaru From: Koji Nakamaru <koji.nakamaru@gree.net> Resolves "failed to store: -25299" when "fetch.parallel 0" is configured and there are many submodules. The error code -25299 (errSecDuplicateItem) may be returned by SecItemUpdate() in add_internet_password() if multiple instances of git-credential-osxkeychain run in parallel. This patch introduces an exclusive lock to serialize execution for avoiding this and other potential issues. Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> --- osxkeychain: lock for exclusive execution Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-1729%2FKojiNakamaru%2Ffeature%2Fosxkeychian_exlock-v1 Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-1729/KojiNakamaru/feature/osxkeychian_exlock-v1 Pull-Request: https://github.com/gitgitgadget/git/pull/1729 contrib/credential/osxkeychain/git-credential-osxkeychain.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c index 6a40917b1ef..0884db48d0a 100644 --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c @@ -414,6 +414,9 @@ int main(int argc, const char **argv) if (!argv[1]) die("%s", usage); + if (open(argv[0], O_RDONLY | O_EXLOCK) == -1) + die("failed to lock %s", argv[0]); + read_credential(); if (!strcmp(argv[1], "get")) base-commit: 0f3415f1f8478b05e64db11eb8aaa2915e48fef6 -- gitgitgadget ^ permalink raw reply related [flat|nested] 21+ messages in thread
* Re: [PATCH] osxkeychain: lock for exclusive execution 2024-05-10 8:07 [PATCH] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget @ 2024-05-10 15:02 ` Bo Anderson 2024-05-10 20:01 ` Jeff King [not found] ` <C0C8F71D-2A01-4C31-9EB6-AB31FA17C3AB@boanderson.me> 2024-05-11 11:55 ` [PATCH v2 0/2] " Koji Nakamaru via GitGitGadget 2 siblings, 1 reply; 21+ messages in thread From: Bo Anderson @ 2024-05-10 15:02 UTC (permalink / raw) To: Koji Nakamaru via GitGitGadget; +Cc: git Interesting. SecItemUpdate returning errSecDuplicateItem didn’t make sense to make sense to me so I had a check to see what scenario this happens and it appears to be a scenario where updating in-place fails but replacing it entirely succeeds. However it seems the item might have ultimately still been updated: https://github.com/apple-oss-distributions/Security/blob/0600e7bab30fbac3adcafcb6c57d3981dc682304/OSX/libsecurity_keychain/lib/SecItem.cpp#L2398 The behaviour is a bit odd and the associated code comment referencing an Apple bug number is perhaps is indicative of that. I guess it perhaps makes sense if you are holding references, but that doesn’t apply to us. I wonder if a fix here could be to treat errSecDuplicateItem as a successful operation for SecItemUpdate. Can you confirm the keychain item is successfully updated in that scenario? A broader Git-wide question that you perhaps don’t know the answer to but someone else here might do is: why are we spamming updates to the credential helper? Every parallel fetch instance performing a store operation on the same host seems unexpected to me, particularly if there’s no actual changes. Bo > On 10 May 2024, at 09:07, Koji Nakamaru via GitGitGadget <gitgitgadget@gmail.com> wrote: > > From: Koji Nakamaru <koji.nakamaru@gree.net> > > Resolves "failed to store: -25299" when "fetch.parallel 0" is configured > and there are many submodules. > > The error code -25299 (errSecDuplicateItem) may be returned by > SecItemUpdate() in add_internet_password() if multiple instances of > git-credential-osxkeychain run in parallel. This patch introduces an > exclusive lock to serialize execution for avoiding this and other > potential issues. > > Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> > --- > osxkeychain: lock for exclusive execution > > Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-1729%2FKojiNakamaru%2Ffeature%2Fosxkeychian_exlock-v1 > Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-1729/KojiNakamaru/feature/osxkeychian_exlock-v1 > Pull-Request: https://github.com/gitgitgadget/git/pull/1729 > > contrib/credential/osxkeychain/git-credential-osxkeychain.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c > index 6a40917b1ef..0884db48d0a 100644 > --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c > +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c > @@ -414,6 +414,9 @@ int main(int argc, const char **argv) > if (!argv[1]) > die("%s", usage); > > + if (open(argv[0], O_RDONLY | O_EXLOCK) == -1) > + die("failed to lock %s", argv[0]); > + > read_credential(); > > if (!strcmp(argv[1], "get")) > > base-commit: 0f3415f1f8478b05e64db11eb8aaa2915e48fef6 > -- > gitgitgadget ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] osxkeychain: lock for exclusive execution 2024-05-10 15:02 ` Bo Anderson @ 2024-05-10 20:01 ` Jeff King 2024-05-10 20:33 ` brian m. carlson 2024-05-10 20:40 ` Junio C Hamano 0 siblings, 2 replies; 21+ messages in thread From: Jeff King @ 2024-05-10 20:01 UTC (permalink / raw) To: Bo Anderson; +Cc: Koji Nakamaru via GitGitGadget, git On Fri, May 10, 2024 at 04:02:03PM +0100, Bo Anderson wrote: > A broader Git-wide question that you perhaps don’t know the answer to > but someone else here might do is: why are we spamming updates to the > credential helper? Every parallel fetch instance performing a store > operation on the same host seems unexpected to me, particularly if > there’s no actual changes. The short answer is that Git always passes a credential which has been used successfully to the helpers to record (if they want to). That's how stuff gets stored in the first place. And those parallel fetches have no knowledge of what the other ones are doing, so they all try to store. But the more interesting question is: why do we tell helpers to store a credential that we got from helpers in the first place? The behavior is mostly an artifact of how the original implementation behaved, as it did not record the source of the credential. And I think there are several problems with that, besides inefficiency and locking. See this old patch, which fixes it by remembering when a credential came from a helper: https://lore.kernel.org/git/20120407033417.GA13914@sigill.intra.peff.net/ But we didn't merge it because some people rely on the behavior of helpers feeding back to themselves. I outlined some solutions there, but it would definitely be a change in behavior that people would have to adapt to. Some possible alternatives: - we could remember _which_ helper we got the credential from, and avoid invoking it again. - we could record a bit saying that the credential came from a helper, and then feed that back to helpers when storing. So osxkeychain could then decide not to store it. Both of those solve the repeated stores, but still let credentials populate across helpers (which I still think is a questionable thing to do by default, per the discussion in that thread, but is the very thing that some people rely on). -Peff ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] osxkeychain: lock for exclusive execution 2024-05-10 20:01 ` Jeff King @ 2024-05-10 20:33 ` brian m. carlson 2024-05-10 22:07 ` Jeff King 2024-05-10 20:40 ` Junio C Hamano 1 sibling, 1 reply; 21+ messages in thread From: brian m. carlson @ 2024-05-10 20:33 UTC (permalink / raw) To: Jeff King; +Cc: Bo Anderson, Koji Nakamaru via GitGitGadget, git [-- Attachment #1: Type: text/plain, Size: 2026 bytes --] On 2024-05-10 at 20:01:14, Jeff King wrote: > And I think there are several problems with that, besides inefficiency > and locking. See this old patch, which fixes it by remembering when > a credential came from a helper: > > https://lore.kernel.org/git/20120407033417.GA13914@sigill.intra.peff.net/ > > But we didn't merge it because some people rely on the behavior of > helpers feeding back to themselves. I outlined some solutions there, but > it would definitely be a change in behavior that people would have to > adapt to. > > Some possible alternatives: > > - we could remember _which_ helper we got the credential from, and > avoid invoking it again. This will break the new `state[]` feature, which relies on being able to see the state after the fact to know whether the operation was successful. As an example of the functionality the current approach allows, authentication could use an HOTP (like TOTP, but using a counter instead of time) value, and storing the correct used counter on success would be important. I agree it's not super important if we're just using a username and password, but considering I just added support for arbitrary authentication schemes, which can include things such as limited-use OAuth tokens, one-time use passcodes, and certain types of HMAC-based signing, we probably don't want to choose this approach. > - we could record a bit saying that the credential came from a helper, > and then feed that back to helpers when storing. So osxkeychain > could then decide not to store it. This is actually possible with the new `state[]` feature. `osxkeychain` can simply set that field to something like `osxkeychain:seen=1` and simply do nothing if it sees that field. All the credential helper needs to do is declare support for that functionality with the appropriate capability and emit the field if it gets that capability on standard input. -- brian m. carlson (they/them or he/him) Toronto, Ontario, CA [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 262 bytes --] ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] osxkeychain: lock for exclusive execution 2024-05-10 20:33 ` brian m. carlson @ 2024-05-10 22:07 ` Jeff King 2024-05-10 23:12 ` brian m. carlson 0 siblings, 1 reply; 21+ messages in thread From: Jeff King @ 2024-05-10 22:07 UTC (permalink / raw) To: brian m. carlson; +Cc: Bo Anderson, Koji Nakamaru via GitGitGadget, git On Fri, May 10, 2024 at 08:33:08PM +0000, brian m. carlson wrote: > > Some possible alternatives: > > > > - we could remember _which_ helper we got the credential from, and > > avoid invoking it again. > > This will break the new `state[]` feature, which relies on being able to > see the state after the fact to know whether the operation was > successful. As an example of the functionality the current approach > allows, authentication could use an HOTP (like TOTP, but using a counter > instead of time) value, and storing the correct used counter on success > would be important. > > I agree it's not super important if we're just using a username and > password, but considering I just added support for arbitrary > authentication schemes, which can include things such as limited-use > OAuth tokens, one-time use passcodes, and certain types of HMAC-based > signing, we probably don't want to choose this approach. Yeah, I think it makes sense to keep the Git side as general as possible. So invoking the helper but giving it extra information (so it can decide whether to be a noop or not) seems like the better approach. > > - we could record a bit saying that the credential came from a helper, > > and then feed that back to helpers when storing. So osxkeychain > > could then decide not to store it. > > This is actually possible with the new `state[]` feature. `osxkeychain` > can simply set that field to something like `osxkeychain:seen=1` and > simply do nothing if it sees that field. Makes sense. Back in that old thread I showed a patch which would let helpers pass arbitrary fields to each other (or back to themselves), and this works in roughly the same way. > All the credential helper needs to do is declare support for that > functionality with the appropriate capability and emit the field if it > gets that capability on standard input. If I understand the protocol, it is just: printf("capability[]=state\n"); printf("state[]=osxkeychain:seen=1\n"); in the helper when it returns a username/password? And I guess the matching parse/check on "store". Sounds like that would be easy for folks on macOS to play with. -Peff ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] osxkeychain: lock for exclusive execution 2024-05-10 22:07 ` Jeff King @ 2024-05-10 23:12 ` brian m. carlson 0 siblings, 0 replies; 21+ messages in thread From: brian m. carlson @ 2024-05-10 23:12 UTC (permalink / raw) To: Jeff King; +Cc: Bo Anderson, Koji Nakamaru via GitGitGadget, git [-- Attachment #1: Type: text/plain, Size: 890 bytes --] On 2024-05-10 at 22:07:15, Jeff King wrote: > On Fri, May 10, 2024 at 08:33:08PM +0000, brian m. carlson wrote: > > All the credential helper needs to do is declare support for that > > functionality with the appropriate capability and emit the field if it > > gets that capability on standard input. > > If I understand the protocol, it is just: > > printf("capability[]=state\n"); > printf("state[]=osxkeychain:seen=1\n"); > > in the helper when it returns a username/password? And I guess the > matching parse/check on "store". > > Sounds like that would be easy for folks on macOS to play with. Yup. It may receive `state[]` fields from other helpers, so it needs to check that the entries are its own (presumably starting with `osxkeychain:`) when it reads them, but otherwise, that's it. -- brian m. carlson (they/them or he/him) Toronto, Ontario, CA [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 262 bytes --] ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] osxkeychain: lock for exclusive execution 2024-05-10 20:01 ` Jeff King 2024-05-10 20:33 ` brian m. carlson @ 2024-05-10 20:40 ` Junio C Hamano 2024-05-10 22:09 ` Jeff King 1 sibling, 1 reply; 21+ messages in thread From: Junio C Hamano @ 2024-05-10 20:40 UTC (permalink / raw) To: Jeff King; +Cc: Bo Anderson, Koji Nakamaru via GitGitGadget, git Jeff King <peff@peff.net> writes: > - we could remember _which_ helper we got the credential from, and > avoid invoking it again. > > - we could record a bit saying that the credential came from a helper, > and then feed that back to helpers when storing. So osxkeychain > could then decide not to store it. > > Both of those solve the repeated stores, but still let credentials > populate across helpers (which I still think is a questionable thing to > do by default, per the discussion in that thread, but is the very thing > that some people rely on). Would "refreshing the last-time-used record" a valid use case for the behaviour that feeds the successful one back to where the credential came from? Such a helper could instead log the last-time the credential was asked for, and assume that the lack of an explicit "reject" call signals that the use of the value it returned earlier was auccessfully used, but it is a less obvious way to implement such a "this hasn't been successfully used for a long time, perhaps we should expire/ask again/do something else?" logic. ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] osxkeychain: lock for exclusive execution 2024-05-10 20:40 ` Junio C Hamano @ 2024-05-10 22:09 ` Jeff King 2024-05-10 22:50 ` Junio C Hamano 0 siblings, 1 reply; 21+ messages in thread From: Jeff King @ 2024-05-10 22:09 UTC (permalink / raw) To: Junio C Hamano; +Cc: Bo Anderson, Koji Nakamaru via GitGitGadget, git On Fri, May 10, 2024 at 01:40:29PM -0700, Junio C Hamano wrote: > Jeff King <peff@peff.net> writes: > > > - we could remember _which_ helper we got the credential from, and > > avoid invoking it again. > > > > - we could record a bit saying that the credential came from a helper, > > and then feed that back to helpers when storing. So osxkeychain > > could then decide not to store it. > > > > Both of those solve the repeated stores, but still let credentials > > populate across helpers (which I still think is a questionable thing to > > do by default, per the discussion in that thread, but is the very thing > > that some people rely on). > > Would "refreshing the last-time-used record" a valid use case for > the behaviour that feeds the successful one back to where the > credential came from? Such a helper could instead log the last-time > the credential was asked for, and assume that the lack of an explicit > "reject" call signals that the use of the value it returned earlier > was auccessfully used, but it is a less obvious way to implement > such a "this hasn't been successfully used for a long time, perhaps > we should expire/ask again/do something else?" logic. There was some discussion in that old thread about whether that was important or not. I don't have a strong opinion there. Not refreshing is a more secure default, but possibly more annoying (and a change from the status quo). I do think brian's suggestion to use state[] to pass it back means that the decision is then in the hands of the helper. So "credential-cache", for example, could decide whether to refresh its ttl or not, or we could even make it configurable with a command-line option for the helper. -Peff ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH] osxkeychain: lock for exclusive execution 2024-05-10 22:09 ` Jeff King @ 2024-05-10 22:50 ` Junio C Hamano 0 siblings, 0 replies; 21+ messages in thread From: Junio C Hamano @ 2024-05-10 22:50 UTC (permalink / raw) To: Jeff King; +Cc: Bo Anderson, Koji Nakamaru via GitGitGadget, git Jeff King <peff@peff.net> writes: > I do think brian's suggestion to use state[] to pass it back means that > the decision is then in the hands of the helper. So "credential-cache", > for example, could decide whether to refresh its ttl or not, or we could > even make it configurable with a command-line option for the helper. Yeah, I read your discussion with brian, and the state[] thing all made sense to me. Thanks. ^ permalink raw reply [flat|nested] 21+ messages in thread
[parent not found: <C0C8F71D-2A01-4C31-9EB6-AB31FA17C3AB@boanderson.me>]
* Re: [PATCH] osxkeychain: lock for exclusive execution [not found] ` <C0C8F71D-2A01-4C31-9EB6-AB31FA17C3AB@boanderson.me> @ 2024-05-10 18:26 ` Koji Nakamaru 0 siblings, 0 replies; 21+ messages in thread From: Koji Nakamaru @ 2024-05-10 18:26 UTC (permalink / raw) To: Bo Anderson; +Cc: Koji Nakamaru via GitGitGadget, git Thank you for detailed insights. > SecItemUpdate returning errSecDuplicateItem didn’t make sense to make sense to me so I had a check to see what scenario this happens and it appears to be a scenario where updating in-place fails but replacing it entirely succeeds. However it seems the item might have ultimately still been updated: https://github.com/apple-oss-distributions/Security/blob/0600e7bab30fbac3adcafcb6c57d3981dc682304/OSX/libsecurity_keychain/lib/SecItem.cpp#L2398 > The behaviour is a bit odd and the associated code comment referencing an Apple bug number is perhaps is indicative of that. I guess it perhaps makes sense if you are holding references, but that doesn’t apply to us. > I wonder if a fix here could be to treat errSecDuplicateItem as a successful operation for SecItemUpdate. Can you confirm the keychain item is successfully updated in that scenario? I tested osxkeychain with the modification at the end of this note and got the following log for "git fetch --all --prune --recurse-submodules". SecItemUpdate() sometimes returns errSecDuplicateItem but the keychain item seems okay -- its value is correct after the command finished -- perhaps because one of successful operations stores the correct value. Even if every store operation fails, perhaps the originally stored value is kept and no damage occurs. XXX: get XXXX: protocol=https XXXX: host=github.com XXXX: wwwauth[]=Basic realm="GitHub" XXX: store XXXX: protocol=https XXXX: host=github.com XXXX: username=jenkins XXXX: password=ghq_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx XXXX: -25299 XXXXX: 0 XXX: get XXXX: protocol=https XXXX: host=github.com XXXX: wwwauth[]=Basic realm="GitHub" XXX: store XXXX: protocol=https XXXX: host=github.com XXXX: username=jenkins XXXX: password=ghq_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx XXXX: -25299 XXXXX: 0 XXX: get XXXX: protocol=https XXXX: host=github.com XXXX: wwwauth[]=Basic realm="GitHub" XXX: store XXXX: protocol=https XXXX: host=github.com XXXX: username=jenkins XXXX: password=ghq_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx XXXX: -25299 XXXXX: 0 XXX: get XXXX: protocol=https XXXX: host=github.com XXXX: wwwauth[]=Basic realm="GitHub" XXX: store XXXX: protocol=https XXXX: host=github.com XXXX: username=jenkins XXXX: password=ghq_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx XXXX: -25299 XXXXX: -25299 failed to store: -25299 XXX: get XXXX: protocol=https XXXX: host=github.com XXXX: wwwauth[]=Basic realm="GitHub" XXX: store XXXX: protocol=https XXXX: host=github.com XXXX: username=jenkins XXXX: password=ghq_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx XXXX: -25299 XXXXX: 0 XXX: get XXXX: protocol=https XXXX: host=github.com XXXX: wwwauth[]=Basic realm="GitHub" XXX: store XXXX: protocol=https XXXX: host=github.com XXXX: username=jenkins XXXX: password=ghq_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx XXXX: -25299 XXXXX: -25299 failed to store: -25299 ... This issue however occurs only when fetch.parallel is configured. If fetch.parallel is not configured, we should not ignore any error (including errSecDuplicateItem). Also, the above unstable behaviour is essentially caused by running osxkeychain instances in parallel where some of them treat "get" and others treat "store". I've also considered treating errSecDuplicateItem of SecItemUpdate() as errSecSuccess, but ended up with the current patch for these reasons. > A broader Git-wide question that you perhaps don’t know the answer to but someone else here might do is: why are we spamming updates to the credential helper? Every parallel fetch instance performing a store operation on the same host seems unexpected to me, particularly if there’s no actual changes. I agree on this point and would like to know the reason. Koji Nakamaru diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c index 6a40917b1e..0373857731 100644 --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c @@ -308,10 +308,12 @@ static OSStatus add_internet_password(void) NULL); result = SecItemAdd(attrs, NULL); + fprintf(stderr, "XXXX: %d\n", result); if (result == errSecDuplicateItem) { CFDictionaryRef query; query = CREATE_SEC_ATTRIBUTES(NULL); result = SecItemUpdate(query, attrs); + fprintf(stderr, "XXXXX: %d\n", result); CFRelease(query); } @@ -333,6 +335,7 @@ static void read_credential(void) if (!strcmp(buf, "\n")) break; buf[line_len-1] = '\0'; + fprintf(stderr, "XXXX: %s\n", buf); v = strchr(buf, '='); if (!v) @@ -414,6 +417,7 @@ int main(int argc, const char **argv) if (!argv[1]) die("%s", usage); + fprintf(stderr, "XXX: %s\n", argv[1]); read_credential(); if (!strcmp(argv[1], "get")) 2024年5月10日(金) 23:58 Bo Anderson <mail@boanderson.me>: > > Interesting. > > SecItemUpdate returning errSecDuplicateItem didn’t make sense to make sense to me so I had a check to see what scenario this happens and it appears to be a scenario where updating in-place fails but replacing it entirely succeeds. However it seems the item might have ultimately still been updated: https://github.com/apple-oss-distributions/Security/blob/0600e7bab30fbac3adcafcb6c57d3981dc682304/OSX/libsecurity_keychain/lib/SecItem.cpp#L2398 > > The behaviour is a bit odd and the associated code comment referencing an Apple bug number is perhaps is indicative of that. I guess it perhaps makes sense if you are holding references, but that doesn’t apply to us. > > I wonder if a fix here could be to treat errSecDuplicateItem as a successful operation for SecItemUpdate. Can you confirm the keychain item is successfully updated in that scenario? > > A broader Git-wide question that you perhaps don’t know the answer to but someone else here might do is: why are we spamming updates to the credential helper? Every parallel fetch instance performing a store operation on the same host seems unexpected to me, particularly if there’s no actual changes. > > Bo > > On 10 May 2024, at 09:07, Koji Nakamaru via GitGitGadget <gitgitgadget@gmail.com> wrote: > > From: Koji Nakamaru <koji.nakamaru@gree.net> > > Resolves "failed to store: -25299" when "fetch.parallel 0" is configured > and there are many submodules. > > The error code -25299 (errSecDuplicateItem) may be returned by > SecItemUpdate() in add_internet_password() if multiple instances of > git-credential-osxkeychain run in parallel. This patch introduces an > exclusive lock to serialize execution for avoiding this and other > potential issues. > > Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> > --- > osxkeychain: lock for exclusive execution > > Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-1729%2FKojiNakamaru%2Ffeature%2Fosxkeychian_exlock-v1 > Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-1729/KojiNakamaru/feature/osxkeychian_exlock-v1 > Pull-Request: https://github.com/gitgitgadget/git/pull/1729 > > contrib/credential/osxkeychain/git-credential-osxkeychain.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c > index 6a40917b1ef..0884db48d0a 100644 > --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c > +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c > @@ -414,6 +414,9 @@ int main(int argc, const char **argv) > if (!argv[1]) > die("%s", usage); > > + if (open(argv[0], O_RDONLY | O_EXLOCK) == -1) > + die("failed to lock %s", argv[0]); > + > read_credential(); > > if (!strcmp(argv[1], "get")) > > base-commit: 0f3415f1f8478b05e64db11eb8aaa2915e48fef6 > -- > gitgitgadget > > ^ permalink raw reply related [flat|nested] 21+ messages in thread
* [PATCH v2 0/2] osxkeychain: lock for exclusive execution 2024-05-10 8:07 [PATCH] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget 2024-05-10 15:02 ` Bo Anderson [not found] ` <C0C8F71D-2A01-4C31-9EB6-AB31FA17C3AB@boanderson.me> @ 2024-05-11 11:55 ` Koji Nakamaru via GitGitGadget 2024-05-11 11:55 ` [PATCH v2 1/2] " Koji Nakamaru via GitGitGadget ` (2 more replies) 2 siblings, 3 replies; 21+ messages in thread From: Koji Nakamaru via GitGitGadget @ 2024-05-11 11:55 UTC (permalink / raw) To: git; +Cc: Bo Anderson, Jeff King, brian m. carlson, Koji Nakamaru Koji Nakamaru (2): osxkeychain: lock for exclusive execution osxkeychain: state[] seen=1 to skip unnecessary store operations .../osxkeychain/git-credential-osxkeychain.c | 14 ++++++++++++++ 1 file changed, 14 insertions(+) base-commit: 0f3415f1f8478b05e64db11eb8aaa2915e48fef6 Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-1729%2FKojiNakamaru%2Ffeature%2Fosxkeychian_exlock-v2 Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-1729/KojiNakamaru/feature/osxkeychian_exlock-v2 Pull-Request: https://github.com/gitgitgadget/git/pull/1729 Range-diff vs v1: 1: 309c17c78f3 = 1: 309c17c78f3 osxkeychain: lock for exclusive execution -: ----------- > 2: 1f57718abff osxkeychain: state[] seen=1 to skip unnecessary store operations -- gitgitgadget ^ permalink raw reply [flat|nested] 21+ messages in thread
* [PATCH v2 1/2] osxkeychain: lock for exclusive execution 2024-05-11 11:55 ` [PATCH v2 0/2] " Koji Nakamaru via GitGitGadget @ 2024-05-11 11:55 ` Koji Nakamaru via GitGitGadget 2024-05-12 4:09 ` Junio C Hamano 2024-05-11 11:55 ` [PATCH v2 2/2] osxkeychain: state[] seen=1 to skip unnecessary store operations Koji Nakamaru via GitGitGadget 2024-05-15 19:21 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget 2 siblings, 1 reply; 21+ messages in thread From: Koji Nakamaru via GitGitGadget @ 2024-05-11 11:55 UTC (permalink / raw) To: git; +Cc: Bo Anderson, Jeff King, brian m. carlson, Koji Nakamaru, Koji Nakamaru From: Koji Nakamaru <koji.nakamaru@gree.net> Resolves "failed to store: -25299" when "fetch.parallel 0" is configured and there are many submodules. The error code -25299 (errSecDuplicateItem) may be returned by SecItemUpdate() in add_internet_password() if multiple instances of git-credential-osxkeychain run in parallel. This patch introduces an exclusive lock to serialize execution for avoiding this and other potential issues. Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> --- contrib/credential/osxkeychain/git-credential-osxkeychain.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c index 6a40917b1ef..0884db48d0a 100644 --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c @@ -414,6 +414,9 @@ int main(int argc, const char **argv) if (!argv[1]) die("%s", usage); + if (open(argv[0], O_RDONLY | O_EXLOCK) == -1) + die("failed to lock %s", argv[0]); + read_credential(); if (!strcmp(argv[1], "get")) -- gitgitgadget ^ permalink raw reply related [flat|nested] 21+ messages in thread
* Re: [PATCH v2 1/2] osxkeychain: lock for exclusive execution 2024-05-11 11:55 ` [PATCH v2 1/2] " Koji Nakamaru via GitGitGadget @ 2024-05-12 4:09 ` Junio C Hamano 2024-05-12 6:47 ` Koji Nakamaru 0 siblings, 1 reply; 21+ messages in thread From: Junio C Hamano @ 2024-05-12 4:09 UTC (permalink / raw) To: Koji Nakamaru via GitGitGadget Cc: git, Bo Anderson, Jeff King, brian m. carlson, Koji Nakamaru "Koji Nakamaru via GitGitGadget" <gitgitgadget@gmail.com> writes: > From: Koji Nakamaru <koji.nakamaru@gree.net> > > Resolves "failed to store: -25299" when "fetch.parallel 0" is configured > and there are many submodules. Use of third-person singular without subject for the "observation" part is highly unusual the log messages in our codebase. The usual way to compose a log message of this project is to - Give an observation on how the current system work in the present tense (so no need to say "Currently X is Y", just "X is Y"), and discuss what you perceive as a problem in it. - Propose a solution (optional---often, problem description trivially leads to an obvious solution in reader's minds). - Give commands to the codebase to "become like so". in this order. > The error code -25299 (errSecDuplicateItem) may be returned by > SecItemUpdate() in add_internet_password() if multiple instances of > git-credential-osxkeychain run in parallel. This patch introduces an > exclusive lock to serialize execution for avoiding this and other > potential issues. "This patch introduces" -> "Introduce" Is this step still needed, though? > Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> > --- > contrib/credential/osxkeychain/git-credential-osxkeychain.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c > index 6a40917b1ef..0884db48d0a 100644 > --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c > +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c > @@ -414,6 +414,9 @@ int main(int argc, const char **argv) > if (!argv[1]) > die("%s", usage); > > + if (open(argv[0], O_RDONLY | O_EXLOCK) == -1) > + die("failed to lock %s", argv[0]); > + > read_credential(); > > if (!strcmp(argv[1], "get")) ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH v2 1/2] osxkeychain: lock for exclusive execution 2024-05-12 4:09 ` Junio C Hamano @ 2024-05-12 6:47 ` Koji Nakamaru 0 siblings, 0 replies; 21+ messages in thread From: Koji Nakamaru @ 2024-05-12 6:47 UTC (permalink / raw) To: Junio C Hamano Cc: Koji Nakamaru via GitGitGadget, git, Bo Anderson, Jeff King, brian m. carlson Thank you for the instruction about a log message. I'll follow it. > Is this step still needed, though? For solving the issue I originally had, just utilizing state[] to skip "store" operations is enough. Since the osxkeychain implementation doesn't seem to be aware that it can run in parallel, I thought it would be better to leave this step in case a similar problem occurs. If this reason is weak, I'll remove this step. Koji Nakamaru ^ permalink raw reply [flat|nested] 21+ messages in thread
* [PATCH v2 2/2] osxkeychain: state[] seen=1 to skip unnecessary store operations 2024-05-11 11:55 ` [PATCH v2 0/2] " Koji Nakamaru via GitGitGadget 2024-05-11 11:55 ` [PATCH v2 1/2] " Koji Nakamaru via GitGitGadget @ 2024-05-11 11:55 ` Koji Nakamaru via GitGitGadget 2024-05-12 4:09 ` Junio C Hamano 2024-05-15 19:21 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget 2 siblings, 1 reply; 21+ messages in thread From: Koji Nakamaru via GitGitGadget @ 2024-05-11 11:55 UTC (permalink / raw) To: git; +Cc: Bo Anderson, Jeff King, brian m. carlson, Koji Nakamaru, Koji Nakamaru From: Koji Nakamaru <koji.nakamaru@gree.net> Records whether credentials come from get operations and skips unnecessary store operations by utilizing the state[] feature, as suggested by brian m. carlson. Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> --- .../osxkeychain/git-credential-osxkeychain.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c index 0884db48d0a..6ce22a28ed7 100644 --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c @@ -12,6 +12,7 @@ static CFStringRef username; static CFDataRef password; static CFDataRef password_expiry_utc; static CFDataRef oauth_refresh_token; +static int state_seen; static void clear_credential(void) { @@ -171,6 +172,9 @@ static OSStatus find_internet_password(void) CFRelease(item); + write_item("capability[]", "state", strlen("state")); + write_item("state[]", "osxkeychain:seen=1", strlen("osxkeychain:seen=1")); + out: CFRelease(attrs); @@ -284,6 +288,9 @@ static OSStatus add_internet_password(void) CFDictionaryRef attrs; OSStatus result; + if (state_seen) + return errSecSuccess; + /* Only store complete credentials */ if (!protocol || !host || !username || !password) return -1; @@ -395,6 +402,10 @@ static void read_credential(void) oauth_refresh_token = CFDataCreate(kCFAllocatorDefault, (UInt8 *)v, strlen(v)); + else if (!strcmp(buf, "state[]")) { + if (!strcmp(v, "osxkeychain:seen=1")) + state_seen = 1; + } /* * Ignore other lines; we don't know what they mean, but * this future-proofs us when later versions of git do -- gitgitgadget ^ permalink raw reply related [flat|nested] 21+ messages in thread
* Re: [PATCH v2 2/2] osxkeychain: state[] seen=1 to skip unnecessary store operations 2024-05-11 11:55 ` [PATCH v2 2/2] osxkeychain: state[] seen=1 to skip unnecessary store operations Koji Nakamaru via GitGitGadget @ 2024-05-12 4:09 ` Junio C Hamano 2024-05-12 7:05 ` Koji Nakamaru 0 siblings, 1 reply; 21+ messages in thread From: Junio C Hamano @ 2024-05-12 4:09 UTC (permalink / raw) To: Koji Nakamaru via GitGitGadget Cc: git, Bo Anderson, Jeff King, brian m. carlson, Koji Nakamaru "Koji Nakamaru via GitGitGadget" <gitgitgadget@gmail.com> writes: > From: Koji Nakamaru <koji.nakamaru@gree.net> > > Records whether credentials come from get operations and skips > unnecessary store operations by utilizing the state[] feature, as > suggested by brian m. carlson. This step has a problem description that is even sketchier than the previous one. Anticipate questions by the other developers who read this commit 6 months after it is accepted in the mainline (e.g., What problem is there in the current system, why it is bad and worth solving, and how is the patch trying to solve it?) and let your proposed log message answer the questions, as you won't be always sitting next to these developers. Thanks. ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [PATCH v2 2/2] osxkeychain: state[] seen=1 to skip unnecessary store operations 2024-05-12 4:09 ` Junio C Hamano @ 2024-05-12 7:05 ` Koji Nakamaru 0 siblings, 0 replies; 21+ messages in thread From: Koji Nakamaru @ 2024-05-12 7:05 UTC (permalink / raw) To: Junio C Hamano Cc: Koji Nakamaru via GitGitGadget, git, Bo Anderson, Jeff King, brian m. carlson Thank you. I'll clean up the whole patch and its description after getting a final reply about exlock. Koji Nakamaru ^ permalink raw reply [flat|nested] 21+ messages in thread
* [PATCH v3 0/2] osxkeychain: lock for exclusive execution 2024-05-11 11:55 ` [PATCH v2 0/2] " Koji Nakamaru via GitGitGadget 2024-05-11 11:55 ` [PATCH v2 1/2] " Koji Nakamaru via GitGitGadget 2024-05-11 11:55 ` [PATCH v2 2/2] osxkeychain: state[] seen=1 to skip unnecessary store operations Koji Nakamaru via GitGitGadget @ 2024-05-15 19:21 ` Koji Nakamaru via GitGitGadget 2024-05-15 19:21 ` [PATCH v3 1/2] osxkeychain: exclusive lock to serialize execution of operations Koji Nakamaru via GitGitGadget ` (2 more replies) 2 siblings, 3 replies; 21+ messages in thread From: Koji Nakamaru via GitGitGadget @ 2024-05-15 19:21 UTC (permalink / raw) To: git; +Cc: Bo Anderson, Jeff King, brian m. carlson, Junio C Hamano, Koji Nakamaru Koji Nakamaru (2): osxkeychain: exclusive lock to serialize execution of operations osxkeychain: state to skip unnecessary store operations .../osxkeychain/git-credential-osxkeychain.c | 14 ++++++++++++++ 1 file changed, 14 insertions(+) base-commit: 83f1add914c6b4682de1e944ec0d1ac043d53d78 Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-1729%2FKojiNakamaru%2Ffeature%2Fosxkeychian_exlock-v3 Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-1729/KojiNakamaru/feature/osxkeychian_exlock-v3 Pull-Request: https://github.com/gitgitgadget/git/pull/1729 Range-diff vs v2: 1: 309c17c78f3 ! 1: 3341346c5e6 osxkeychain: lock for exclusive execution @@ Metadata Author: Koji Nakamaru <koji.nakamaru@gree.net> ## Commit message ## - osxkeychain: lock for exclusive execution + osxkeychain: exclusive lock to serialize execution of operations - Resolves "failed to store: -25299" when "fetch.parallel 0" is configured - and there are many submodules. + git passes a credential that has been used successfully to the helpers + to record. If "git-credential-osxkeychain store" commands run in + parallel (with fetch.parallel configuration and/or by running multiple + git commands simultaneously), some of them may exit with the error + "failed to store: -25299". This is because SecItemUpdate() in + add_internet_password() may return errSecDuplicateItem (-25299) in this + situation. Apple's documentation [1] also states as below: - The error code -25299 (errSecDuplicateItem) may be returned by - SecItemUpdate() in add_internet_password() if multiple instances of - git-credential-osxkeychain run in parallel. This patch introduces an - exclusive lock to serialize execution for avoiding this and other - potential issues. + In macOS, some of the functions of this API block while waiting for + input from the user (for example, when the user is asked to unlock a + keychain or give permission to change trust settings). In general, it + is safe to use this API in threads other than your main thread, but + avoid calling the functions from multiple operations, work queues, or + threads concurrently. Instead, serialize function calls or confine + them to a single thread. + + The error has not been noticed before, because the former implementation + ignored the error. + + Introduce an exclusive lock to serialize execution of operations. + + [1] https://developer.apple.com/documentation/security/certificate_key_and_trust_services/working_with_concurrency Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> 2: 1f57718abff ! 2: 146b0ae9146 osxkeychain: state[] seen=1 to skip unnecessary store operations @@ Metadata Author: Koji Nakamaru <koji.nakamaru@gree.net> ## Commit message ## - osxkeychain: state[] seen=1 to skip unnecessary store operations + osxkeychain: state to skip unnecessary store operations - Records whether credentials come from get operations and skips - unnecessary store operations by utilizing the state[] feature, as - suggested by brian m. carlson. + git passes a credential that has been used successfully to the helpers + to record. If a credential is already stored, + "git-credential-osxkeychain store" just records the credential returned + by "git-credential-osxkeychain get", and unnecessary (sometimes + problematic) SecItemAdd() and/or SecItemUpdate() are performed. + We can skip such unnecessary operations by marking a credential returned + by "git-credential-osxkeychain get". This marking can be done by + utilizing the "state[]" feature: + + - The "get" command sets the field "state[]=osxkeychain:seen=1". + + - The "store" command skips its actual operation if the field + "state[]=osxkeychain:seen=1" exists. + + Introduce a new state "state[]=osxkeychain:seen=1". + + Suggested-by: brian m. carlson <sandals@crustytoothpaste.net> Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> ## contrib/credential/osxkeychain/git-credential-osxkeychain.c ## -- gitgitgadget ^ permalink raw reply [flat|nested] 21+ messages in thread
* [PATCH v3 1/2] osxkeychain: exclusive lock to serialize execution of operations 2024-05-15 19:21 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget @ 2024-05-15 19:21 ` Koji Nakamaru via GitGitGadget 2024-05-15 19:21 ` [PATCH v3 2/2] osxkeychain: state to skip unnecessary store operations Koji Nakamaru via GitGitGadget 2024-05-15 19:41 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru 2 siblings, 0 replies; 21+ messages in thread From: Koji Nakamaru via GitGitGadget @ 2024-05-15 19:21 UTC (permalink / raw) To: git Cc: Bo Anderson, Jeff King, brian m. carlson, Junio C Hamano, Koji Nakamaru, Koji Nakamaru From: Koji Nakamaru <koji.nakamaru@gree.net> git passes a credential that has been used successfully to the helpers to record. If "git-credential-osxkeychain store" commands run in parallel (with fetch.parallel configuration and/or by running multiple git commands simultaneously), some of them may exit with the error "failed to store: -25299". This is because SecItemUpdate() in add_internet_password() may return errSecDuplicateItem (-25299) in this situation. Apple's documentation [1] also states as below: In macOS, some of the functions of this API block while waiting for input from the user (for example, when the user is asked to unlock a keychain or give permission to change trust settings). In general, it is safe to use this API in threads other than your main thread, but avoid calling the functions from multiple operations, work queues, or threads concurrently. Instead, serialize function calls or confine them to a single thread. The error has not been noticed before, because the former implementation ignored the error. Introduce an exclusive lock to serialize execution of operations. [1] https://developer.apple.com/documentation/security/certificate_key_and_trust_services/working_with_concurrency Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> --- contrib/credential/osxkeychain/git-credential-osxkeychain.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c index 6a40917b1ef..0884db48d0a 100644 --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c @@ -414,6 +414,9 @@ int main(int argc, const char **argv) if (!argv[1]) die("%s", usage); + if (open(argv[0], O_RDONLY | O_EXLOCK) == -1) + die("failed to lock %s", argv[0]); + read_credential(); if (!strcmp(argv[1], "get")) -- gitgitgadget ^ permalink raw reply related [flat|nested] 21+ messages in thread
* [PATCH v3 2/2] osxkeychain: state to skip unnecessary store operations 2024-05-15 19:21 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget 2024-05-15 19:21 ` [PATCH v3 1/2] osxkeychain: exclusive lock to serialize execution of operations Koji Nakamaru via GitGitGadget @ 2024-05-15 19:21 ` Koji Nakamaru via GitGitGadget 2024-05-15 19:41 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru 2 siblings, 0 replies; 21+ messages in thread From: Koji Nakamaru via GitGitGadget @ 2024-05-15 19:21 UTC (permalink / raw) To: git Cc: Bo Anderson, Jeff King, brian m. carlson, Junio C Hamano, Koji Nakamaru, Koji Nakamaru From: Koji Nakamaru <koji.nakamaru@gree.net> git passes a credential that has been used successfully to the helpers to record. If a credential is already stored, "git-credential-osxkeychain store" just records the credential returned by "git-credential-osxkeychain get", and unnecessary (sometimes problematic) SecItemAdd() and/or SecItemUpdate() are performed. We can skip such unnecessary operations by marking a credential returned by "git-credential-osxkeychain get". This marking can be done by utilizing the "state[]" feature: - The "get" command sets the field "state[]=osxkeychain:seen=1". - The "store" command skips its actual operation if the field "state[]=osxkeychain:seen=1" exists. Introduce a new state "state[]=osxkeychain:seen=1". Suggested-by: brian m. carlson <sandals@crustytoothpaste.net> Signed-off-by: Koji Nakamaru <koji.nakamaru@gree.net> --- .../osxkeychain/git-credential-osxkeychain.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/contrib/credential/osxkeychain/git-credential-osxkeychain.c b/contrib/credential/osxkeychain/git-credential-osxkeychain.c index 0884db48d0a..6ce22a28ed7 100644 --- a/contrib/credential/osxkeychain/git-credential-osxkeychain.c +++ b/contrib/credential/osxkeychain/git-credential-osxkeychain.c @@ -12,6 +12,7 @@ static CFStringRef username; static CFDataRef password; static CFDataRef password_expiry_utc; static CFDataRef oauth_refresh_token; +static int state_seen; static void clear_credential(void) { @@ -171,6 +172,9 @@ static OSStatus find_internet_password(void) CFRelease(item); + write_item("capability[]", "state", strlen("state")); + write_item("state[]", "osxkeychain:seen=1", strlen("osxkeychain:seen=1")); + out: CFRelease(attrs); @@ -284,6 +288,9 @@ static OSStatus add_internet_password(void) CFDictionaryRef attrs; OSStatus result; + if (state_seen) + return errSecSuccess; + /* Only store complete credentials */ if (!protocol || !host || !username || !password) return -1; @@ -395,6 +402,10 @@ static void read_credential(void) oauth_refresh_token = CFDataCreate(kCFAllocatorDefault, (UInt8 *)v, strlen(v)); + else if (!strcmp(buf, "state[]")) { + if (!strcmp(v, "osxkeychain:seen=1")) + state_seen = 1; + } /* * Ignore other lines; we don't know what they mean, but * this future-proofs us when later versions of git do -- gitgitgadget ^ permalink raw reply related [flat|nested] 21+ messages in thread
* Re: [PATCH v3 0/2] osxkeychain: lock for exclusive execution 2024-05-15 19:21 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget 2024-05-15 19:21 ` [PATCH v3 1/2] osxkeychain: exclusive lock to serialize execution of operations Koji Nakamaru via GitGitGadget 2024-05-15 19:21 ` [PATCH v3 2/2] osxkeychain: state to skip unnecessary store operations Koji Nakamaru via GitGitGadget @ 2024-05-15 19:41 ` Koji Nakamaru 2 siblings, 0 replies; 21+ messages in thread From: Koji Nakamaru @ 2024-05-15 19:41 UTC (permalink / raw) To: Koji Nakamaru via GitGitGadget Cc: git, Bo Anderson, Jeff King, brian m. carlson, Junio C Hamano I thought about the issue further. The approach with the "state[]" feature reduces problematic "store" operations a lot in most cases, it is however not perfect to avoid the original issue about parallel execution. For example (though quite artificial), let's suppose if two git commands start simultaneously where the credential is input automatically by "expect" command. Two "osxkeychain store" commands will then run simultaneously. I hope new descriptions are convincing. Koji Nakamaru ^ permalink raw reply [flat|nested] 21+ messages in thread
end of thread, other threads:[~2024-05-15 19:41 UTC | newest] Thread overview: 21+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2024-05-10 8:07 [PATCH] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget 2024-05-10 15:02 ` Bo Anderson 2024-05-10 20:01 ` Jeff King 2024-05-10 20:33 ` brian m. carlson 2024-05-10 22:07 ` Jeff King 2024-05-10 23:12 ` brian m. carlson 2024-05-10 20:40 ` Junio C Hamano 2024-05-10 22:09 ` Jeff King 2024-05-10 22:50 ` Junio C Hamano [not found] ` <C0C8F71D-2A01-4C31-9EB6-AB31FA17C3AB@boanderson.me> 2024-05-10 18:26 ` Koji Nakamaru 2024-05-11 11:55 ` [PATCH v2 0/2] " Koji Nakamaru via GitGitGadget 2024-05-11 11:55 ` [PATCH v2 1/2] " Koji Nakamaru via GitGitGadget 2024-05-12 4:09 ` Junio C Hamano 2024-05-12 6:47 ` Koji Nakamaru 2024-05-11 11:55 ` [PATCH v2 2/2] osxkeychain: state[] seen=1 to skip unnecessary store operations Koji Nakamaru via GitGitGadget 2024-05-12 4:09 ` Junio C Hamano 2024-05-12 7:05 ` Koji Nakamaru 2024-05-15 19:21 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru via GitGitGadget 2024-05-15 19:21 ` [PATCH v3 1/2] osxkeychain: exclusive lock to serialize execution of operations Koji Nakamaru via GitGitGadget 2024-05-15 19:21 ` [PATCH v3 2/2] osxkeychain: state to skip unnecessary store operations Koji Nakamaru via GitGitGadget 2024-05-15 19:41 ` [PATCH v3 0/2] osxkeychain: lock for exclusive execution Koji Nakamaru
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).