-
Notifications
You must be signed in to change notification settings - Fork 1.2k
feat(tls): AWS Libcrypto Support #2008
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
djc
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes look good to me, thanks! Need to address the CI failures.
tottoto
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks. I left some comments.
Could you update the documentation regarding the features.
|
@jenr24-architect could you try to force push again to see if we can get CI to kick off again? |
Does it have to be a force push?? It doesn't look like my last push triggered it |
| tls-native-roots = ["_tls-any", "channel", "dep:rustls-native-certs"] | ||
| tls-webpki-roots = ["_tls-any","channel", "dep:webpki-roots"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just thinking out loud: it strikes me as unfortunate that this the implication here is that because you would only need to access the certificate trust store for doing client things, that we should also enable the channel feature, which is also necessary for client things.
Like in my mind, it would somehow be nicer if this was tls-client-native-roots, etc... to better indicate what the feature was affecting.
Anyways, just thinking out loud. None of this is blocking or needs a response. :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this is a good idea. However, since the scope is different from this pull request, I think it would be good to discuss it in a separate pull request rather than changing them here.
tobz
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like this needs to be run through cargo fmt and there's the broken intra-doc link stuff to sort out.
|
With this change, users can enable both |
I had thought about this -- I initially had written some code to add I would be willing to add that feature, in either this or a separate PR if we're interested in adding that functionality :) |
Co-authored-by: Lucio Franco <luciofranco14@gmail.com>
|
@jenr24-architect looks like there are some more CI failures |
tottoto
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
but the scope of that change started to get out of hand.
Makes sense to me. I suppose there are several possible ways to address this, so it seems reasonable to narrow the scope of this pull request.
|
@LucioFranco The CI failure does not seem to be caused by this pull request's change. I opened #2021 to address it. |
|
merged master after #2021 merged, this PR is ready for CI to re-run and to enter the merge queue |
Motivation
I want to use
aws-lc-rswith tonic.Solution
adds a feature flag
tls-aws-lcin parallel totls, removedtlsfeature flag dependency fromtls-*-rootsfeatures