-
-
Notifications
You must be signed in to change notification settings - Fork 333
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
git-tempfile
clobbers signal handlers installed by tokio::signal
#336
Comments
On further investigation it looks like calling |
I don't know if reopening the issue is the right choice, but it's meant to indicate that I am looking at it. The goal of this accidentally surprising default behaviour is to assure tempfiles are deleted on interrupt automatically without the need for configuration. Meddling with signals from a library is dangerous business and this issue is a good example for that, it's definitely something I'd like to tackle. Using Can you try using I think what's happening here by default is the following:
The reason for this default behaviour is to avoid installing a handler that won't abort, which is also surprising in its own right. The only way to not make it surprising is to clearly document that an initialization call is needed before creating any tempfile, and to avoid automatic signal handler setup. |
The previous behaviour is meant to be convenient for the casual user even though it ends up being surprising when used in applications that install their own signal handlers and need more control over how the program shuts down. This is now fixed by **requiring an explicit `setup()`** call before the first tempfile is created, which makes it a breaking change.
About 6 months after the first stable release, it's time for the first breaking change to fix this issue. Here is the changelog. |
Can you make it so other gitoxide crates which are using |
What I mean is: a feature flag or something which guarantees that no signal handling is happening at all. |
Staying on the topic of not having automatically registered signal handlers interfere with an application, the latest released As of 90b1c42 only
You may be referring to another issue that isn't clear to me.
Despite trying I have trouble making a strong case for it. The one I could come up with is applications wanting to use a different signal handling crate than |
According to The signal handling code in |
By this definition of For reference, here is how signals are registered in
If users with access to global variables (or memory?) within a process are part of the threat model, isn't it time to wave the white flag? Maybe |
You don't seem to be familiar with Together with your general resistance to feedback and having your code audited by someone else before it gets released publicly, I fear that this means |
Until know I wasn't aware that the issue is about the claim the handler can deadlock, but about Based on the conversation here a fix was provided in 81ed5f5 which was released in v1.0.6. Unfortunately there was never any hard evidence that it actually would deadlock so it's certainly no more than a claim that it's fixed either. Is this what you mean by To get some data, I created a stress test in 076c4ff, made it part of CI and tried my best to find a deadlock. Unfortunately, even on v1.0.5 which should still be able to deadlock, the program came up with nothing. Fortunately, the same is true for the most recent version which contains the fix. For some numbers, here is the output of the program:
That's so helpful and is definitely not an issue I saw thus far, but I can see it now. A library calling In order to prevent that from happening, there seems to be only one way that fixes it for good: the removal of the code that installs signal handlers entirely. Otherwise there is no way to prevent upstream library crates to turn on the
Feedback must be actionable, and to me that requires a shared understanding of what the issue is. My replies on a formerly closed issue show that I intend to get the information I need to make it actionable and improve
I am not opposed to reviews and have moved to a PR based workflow a while ago to make comments on what's about to land possible. Since there seems to be an expectation to conduct audits that prevent releases which is new to me, may I suggest to open a discussion so we sort out a workflow for that? Generally I don't like the tone conversations with you end up having with you @kim, and while acknowledging that it could all be me I truly hope this can change towards more constructive and efficient interactions. Right now they are making me emotionally unhappy, leave a bitter taste, and seem inefficient. A pattern I see is that it starts out with requests along vague claims I can't follow. Here it's After I follow up to understand why that should be, I am met with yet another claim like: Even though the interaction finally unearthed a very valid concern that I am happy to address, it was awfully hard and frustrating to get to, costing time and nerves probably not only on my end. What would help me is if suggestions or requests would be accompanied by their motivation. Maybe assuming best intention and mistakes without directing blame can help with that and keeping that neutral. What is it that I could do differently? If we can't figure this out, then I do presume it's for the best to indeed cull |
Given the following code:
I would expect "got sigterm or sigint" to be printed on exit - and indeed that's what happens if I omit the
_tempfile = ..
line. With the tempfile however the signal handler doesn't get called.I can't tell if this is a bug in
git-tempfile
,signal_hook
ortokio::signal
.Note I'm using the following
Cargo.toml
The text was updated successfully, but these errors were encountered: