-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Properly handle concurrent access to qubes.xml #1729
Comments
As a stopgap I'll add detection of such situation and raise an exception. So at least it will be obvious what happened... |
For now simply throw an exception. Proper solution require some locking QubesOS/qubes-issues#1729
For now simply throw an exception. Proper solution require some locking QubesOS/qubes-issues#1729
For now simply throw an exception. Proper solution require some locking QubesOS/qubes-issues#1729
For now simply throw an exception. Proper solution require some locking QubesOS/qubes-issues#1729
I'm working on such a schema: Attempt to There would be no equivalent for |
I think this is very good compromise between usability and complexity. 👍 |
|
When two tools concurrently modify
qubes.xml
, one will "rollback" changes made by the other. Generally because each tool first loadqubes.xml
, do it's work, then (optionally) rewrite the whole file with new state. In core2 we have two locking methods -lock_db_for_reading
andlock_db_for_writing
- if one want to modifyqubes.xml
, he/she needs to take write (exclusive) lock.Not sure how it should be done here. Maybe somehow similar (but using
__init__()
orload()
parameter)?The text was updated successfully, but these errors were encountered: