Skip to content

[Console] Expand LockableTrait API #61273

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: 7.4
Choose a base branch
from

Conversation

MakarMS
Copy link

@MakarMS MakarMS commented Jul 30, 2025

Q A
Branch? 7.4
Bug fix? no
New feature? yes
Deprecations? no
License MIT

This change safely extends the lock() method to allow manual control over lock release in the parent process.
This is necessary when the main process forks: the previously introduced automatic lock release (enabled by default) triggers upon the destruction of the lock object. As a result, when a forked child process terminates, it unintentionally releases the lock for all processes.

This update ensures that lock release can be explicitly managed to avoid premature unlocking in such scenarios.

@carsonbot
Copy link

Hey!

I see that this is your first PR. That is great! Welcome!

Symfony has a contribution guide which I suggest you to read.

In short:

  • Always add tests
  • Keep backward compatibility (see https://symfony.com/bc).
  • Bug fixes must be submitted against the lowest maintained branch where they apply (see https://symfony.com/releases)
  • Features and deprecations must be submitted against the 7.4 branch.

Review the GitHub status checks of your pull request and try to solve the reported issues. If some tests are failing, try to see if they are failing because of this change.

When two Symfony core team members approve this change, it will be merged and you will become an official Symfony contributor!
If this PR is merged in a lower version branch, it will be merged up to all maintained branches within a few days.

I am going to sit back now and wait for the reviews.

Cheers!

Carsonbot

@carsonbot
Copy link

Hey!

Thanks for your PR. You are targeting branch "7.4" but it seems your PR description refers to branch "feature/expand-lockabletrait-api on 7.4".
Could you update the PR description or change target branch? This helps core maintainers a lot.

Cheers!

Carsonbot

@MakarMS MakarMS changed the title feat: Expand LockableTrait API [Component] Expand LockableTrait API Jul 30, 2025
@MakarMS MakarMS changed the title [Component] Expand LockableTrait API [Console] Expand LockableTrait API Jul 30, 2025
@MakarMS
Copy link
Author

MakarMS commented Aug 8, 2025

@chalasr Could you take a quick look at this PR? 🙂

@chalasr
Copy link
Member

chalasr commented Aug 8, 2025

Looks sensible. Can you check if there is some test case covering LockableTrait and, if any, update it according to this change?

@MakarMS
Copy link
Author

MakarMS commented Aug 10, 2025

Looks sensible. Can you check if there is some test case covering LockableTrait and, if any, update it according to this change?

Hi, after studying the code more thoroughly, I concluded that SemaphoreStore and FlockStore are not designed to be safe in forked processes, as they rely on the state stored in Key internally.

If we apply the change I proposed, there's still an issue where Lock::isAcquired() / SemaphoreStore::exists() returns incorrect results when autoRelease is enabled. Specifically, in the parent process, the Key state will exist (see exists() in SemaphoreStore/FlockStore), even though the actual lock no longer physically exists.

This can be handled fairly simply in FlockStore, but with SemaphoreStore it’s more complicated. The PHP sysvsem extension does not provide any way to check if a semaphore actually exists. Any check would have to be indirect and therefore unreliable.

The only idea I have so far is to use the sysvshm extension, storing semaphore state in shared memory between PHP processes: creating an entry when the semaphore is created, removing it when the semaphore is released, and checking this shared memory to determine semaphore existence. Of course, this solution is not very elegant and adds an additional dependency.

Maybe someone has better suggestions?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants