https://git.schokokeks.org/derivepassphrase.git/tree/beeb1be4c20bf17573685d59136baa833a9fe18cRecent commits to derivepassphrase.git (beeb1be4c20bf17573685d59136baa833a9fe18c)2026-01-21T22:55:28+01:00tag:gitlist.org,2012:commit/beeb1be4c20bf17573685d59136baa833a9fe18cRework the documentation concerning SSH agent use2026-01-21T22:55:28+01:00Marco Riccisoftware@the13thletter.info
<pre></pre>
tag:gitlist.org,2012:commit/ed25ccced6533e0d232b3ef8a44fcc482b91ae8fFor interfaced SSH agents in the tests, set SSH_AUTH_SOCK manually2026-01-18T17:35:34+01:00Marco Riccisoftware@the13thletter.info
<pre>Generally, if we have an abstract socket connected to an SSH agent, then
this is sufficient for us to construct a client based on the socket,
and interact with the agent as needed.
However, in the CLI tests, there are situations where we are
orchestrating the whole `derivepassphrase` application, and the
application must connect to the agent itself. For these situations, we
need to set up the necessary configuration to pass the agent's socket
address to `derivepassphrase`. For agents merely interfaced in the test
suite, we were not doing such a setup, causing orchestrated
`derivepassphrase` application instances to believe there was no agent
to connect to.
Fix this by (a) exposing the socket address on the socket object,
internal to the spawning/interfacing function, and (b) let interfacing
functions return a pair of socket and socket address, not just the
socket. (We intend to keep the interface for actually obtaining the
address private to each interfacing function, because not all socket
objects can easily be retrofitted with extra methods to query the socket
address.)
(As a side effect, give the socket providers on The Annoying OS more
specific typing, so that the type checker can verify that the
interfacing functions are accessing the correct attributes and methods
for obtaining the socket address.)
</pre>
tag:gitlist.org,2012:commit/b75da19d3f401c95ae934ac6c0b6b612bea7c296Use the "correct" wrong SSH_AUTH_SOCK value2026-01-18T16:37:36+01:00Marco Riccisoftware@the13thletter.info
<pre>Some tests require a wrong SSH_AUTH_SOCK value where no SSH agent can be
listening, but which is nonetheless syntactically valid. Since Windows
named pipes have a specific address format, syntactically valid but
wrong values look different on The Annoying OS than they look on POSIX.
So fill in wrong values OS-specifically, not generally: on POSIX, we use
what is clearly a directory, and on The Annoying OS, we use the common
pipe name prefix (which is also a directory).
</pre>
tag:gitlist.org,2012:commit/02d2d13c912b32537031727eab69221091ad2201Prioritize WindowsNamedPipesNotAvailableError over other errors2026-01-18T15:42:53+01:00Marco Riccisoftware@the13thletter.info
<pre>The SSH agent socket provider, by contract, must raise
`NotImplementedError` (or a subclass) if and only if the socket can
never be successfully constructed, on principle. Conversely, if the
socket provider raises any other kind of error, then the socket *could*
be constructed on this system, principally.
In the specific case of Windows named pipes whose address is named by
the `SSH_AUTH_SOCK` environment variable, it is a programming error to
first check the environment variable value, allowing `KeyError` or
`ValueError` to bubble through to the caller, and only afterwards during
construction of the named pipe realize that there is no support.
</pre>
tag:gitlist.org,2012:commit/a3f6fee29272418e3079710d478ed0e82e654a8cFix coverage slipups and error messages in the Windows named pipe handles2026-01-18T14:38:27+01:00Marco Riccisoftware@the13thletter.info
<pre></pre>
tag:gitlist.org,2012:commit/05c3cb74382b10d13a7912c840c783a8fcd05552Fix coverage slipup of socket provider alias registration2026-01-18T14:25:44+01:00Marco Riccisoftware@the13thletter.info
<pre>When registering auto-detected new socket providers, registration should
fail if two different providers try to register the same alias.
The test suite originally contained a test case for this, but it used
the "posix" and "the_annoying_os" names as base names, which were
changed to aliases in 41029a5e6ef04a9870dcaf044b54a26af94260ab. Thus,
the test *actually* attempted to register something that was previously
an alias as a new base name. This was also an error (still is), and it
used the same error message, so the test continued to pass. But it was
then exercising a different code branch, and thus the original code
branch was effectively lacking a dedicated test.
We fix this by resolving the now-aliased entry to its actual base name.
</pre>
tag:gitlist.org,2012:commit/8aed7846f2960cd924e35db5ed8621cf69a8dacdProperly combine coverage files cross-platform2026-01-18T14:23:57+01:00Marco Riccisoftware@the13thletter.info
<pre>Set the coverage settings to record relative paths, instead of absolute
ones, so that when combining coverage files from different OSes, the
paths merge cleanly.
</pre>
tag:gitlist.org,2012:commit/868aecb5e6e26bfeb489078446b1a97e698b27e5Use the SSH_AUTH_SOCK socket provider as "native" also on The Annoying OS2026-01-18T14:14:04+01:00Marco Riccisoftware@the13thletter.info
<pre>Pageant is a good *fallback* native socket provider, but a bad
*preferred* native socket provider, because the address is not
configurable. Using `ssh_auth_sock_on_the_annoying_os` as the preferred
native socker provider instead allows the user to easily change the
agent to talk to by switching out environment variables.
</pre>
tag:gitlist.org,2012:commit/644314273a14781b720c5d8434f1db38c2819007Distinguish process-spawning heavy-duty tests from other heavy-duty tests2026-01-17T19:40:14+01:00Marco Riccisoftware@the13thletter.info
<pre>Give heavy-duty tests that involve spawning processes less extensive
example counts, because spawning processes is expensive (especially on
The Annoying OS), and because Python 3.14+ is defaulting to
slow-but-safe process spawning machinery that make these costs much more
visible than before.
Specifically, we introduce new hypothesis machinery for calculating
a good `max_example` count for state machines that involve spawning
processes on each state transition. There is currently only one such
state machine: `FakeConfigurationMutexStateMachine` from the CLI
heavy-duty tests. The example count `n'` for state machines is then
`sqrt(10 * n)`, where `n` is the example count for other test types.
For the "dev", "default" and "intense" profiles (`n = 10`, `100` and
`1000`, respectively), this translates to `n' = 10`, `31` and `100`,
respectively. In particular, at "dev" they are identical, and at
"intense", state machines have "default" behavior.
In preparation for this commit, we noticed that the hypothesis settings
profiles were not necessarily defined when the state machines query the
settings. Accordingly, we moved the settings profiles setup into the
`tests.machinery.hypothesis` package, made it idempotent, and ensured it
would be called before accessing the profiles.
</pre>
tag:gitlist.org,2012:commit/f31b9a94ba8b10a3c5bc38fb0971bebaa2bc9d60Use "loadgroup" scheduling in the test suite runner2026-01-17T19:00:49+01:00Marco Riccisoftware@the13thletter.info
<pre>Parallelize the test suite via the "loadgroup" scheduler, instead of the
"worksteal" scheduler. There is currently only one `xtest_group` marker
value, so effectively, the scheduler schedules the *marked* tests all to
the same worker, and the others in whatever manner. We can thus rely on
the marked tests executing serially, and do not need locks to protect
them (or their fixture calls) from concurrent access.
This eliminates "locking implementations" as both a source of errors and
as another group of code that needs debugging, testing, and coverage.
(Which was, unfortunately, our experience with the `filelock` package we
used to protect non-isolated SSH agents on The Annoying OS during
fixture setup and teardown.)
As a bonus, because the "loadgroup" scheduler lazily assigns work items
as other items are completed, the performance is similar to the
"worksteal" scheduler it is replacing.
</pre>