-
Notifications
You must be signed in to change notification settings - Fork 224
Collapse session tokens to single keychain item? #146
Comments
I'm concerned about race conditions between two
I'm not sure the repercussions, but it feels bad |
This is all cache data, so it's not an error to throw is away, only a performance degradation. When two processes collide, they'll both still succeed using their in memory copy of the data. The next time one of them runs, it'll need to go through a longer auth flow than it otherwise would have. I wouldn't worry about the interleaving. I think, the user needing to 2FA one additional time or wait an extra 500ms is less of a problem than requiring unnecessary password entries. |
This issue has been automatically marked |
Closing due to staleness. Closed does not mean "never", just that it has no momentum to get accomplished any time soon. |
I'm going to get this in, but behind a feature flag. Wondering how we're going to do migration. Should we worry about cleaning up the old format keychain items? Should that happen automatically? |
@boggsboggs had the idea to collapse all session tokens into a single keychain item. Currently, whenever we upgrade, keychain needs to reprompt for a password to reauthorize the new binary, for each profile, which for us is in the 10s.
The text was updated successfully, but these errors were encountered: