Skip to content

Conversation

sulami
Copy link

@sulami sulami commented May 11, 2025

This is following up on #410 with the rest of the decoupled implementations, and addressing most of the review comments (I think?).

There are still some todos left for documentation, which I haven't filled in yet.

I've verified that tests & clippy pass with all combinations of features, but a lot of this I only know enough about to be dangerous, so I'd appreciate close looks at the actual implementations to make sure e.g. I've picked the correct library functions in each case.

They had todos for docstrings, and I realized they're single-use and
should probably not be exposed publicly anyway.
@sulami sulami force-pushed the decoupled-crypto-backends branch from 4664843 to 76b2fe3 Compare July 3, 2025 03:53
@sulami
Copy link
Author

sulami commented Jul 3, 2025

Addressed the latest comments, and also inlined _encode and _decode, which were single use, for some reason pub, and had TODO as docstrings.

@sulami
Copy link
Author

sulami commented Aug 5, 2025

@Keats Just in case you missed it again, I think this should be good for another review now.

@sulami sulami requested a review from Keats August 5, 2025 00:28
Copy link
Owner

@Keats Keats left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That looks good. One small copy/paste issue but fine otherwise. I need to create a 0.10 branch to group everything

@Keats
Copy link
Owner

Keats commented Aug 14, 2025

The wasm failure seems legit?

@sulami
Copy link
Author

sulami commented Aug 14, 2025

Looking at the AWS-LC docs, I don't think it builds/is supported on WASM. I've also recently read this with regards to default features, and I'm thinking maybe we shouldn't have a default backend after all? That way we could also pick a different backend for the WASM build.

@Keats
Copy link
Owner

Keats commented Aug 15, 2025

Yeah maybe let's not have a default if the default doesn't work with wasm.

In most situations AWS-LC is the better backend, but it's not available
on all platforms, for example WASM. Explicitly asking the user to pick a
backend is also more future-proof.
@Keats
Copy link
Owner

Keats commented Aug 18, 2025

Looks like legit failures as well

@sulami
Copy link
Author

sulami commented Aug 19, 2025

I don't know if this'll work or not, at least it builds on my machine, but it doesn't pass the WASM tests. Neither does master though, so I'm not sure that counts for much.

I'm not terribly familiar with WASM overall, so I wouldn't mind additional pointers & opinions.

This is fixing a Clippy complaint.
@sulami sulami force-pushed the decoupled-crypto-backends branch from 6619f3b to 570d732 Compare August 23, 2025 02:15
@sulami sulami force-pushed the decoupled-crypto-backends branch from 570d732 to eca3603 Compare August 23, 2025 02:27
@sulami
Copy link
Author

sulami commented Aug 23, 2025

I've addressed @jplatte's feedback, and I've also run a wasm CI run in my fork to shorten the feedback loop a bit here.

Copy link

@jplatte jplatte left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looking forward to this landing :)

@@ -80,7 +80,7 @@ jobs:
run: cargo install wasm-pack

- name: Run tests default features
run: wasm-pack test --node --features rust_crypto
run: wasm-pack test --node --features rust_crypto,getrandom/js
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's a related issue: #431
But I don't know enough about wasm to know what to actually do

Copy link

@jplatte jplatte Sep 1, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this PR might actually help with that, given getrandom/js is now only enabled in CI. Users may be able to enable another wasm-compatible getrandom backend after this lands.

@Keats
Copy link
Owner

Keats commented Sep 1, 2025

Any other breaking change we want to add? I know i'm not happy about EncodingKey/DecodingKey in general but I don't have a better idea right now.

@Keats
Copy link
Owner

Keats commented Sep 2, 2025

Any ideas why the jobs are stuck?

backend: [ aws_lc_rs, rust_crypto ]
include:
- build: pinned
os: ubuntu-20.04
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe ubuntu-20.04 is no longer supported by GHA. Need tp upgrade to 22.04 or 24.04.

Running most of them on the latest version, at the moment 24.04, except
for the test run that's pinned to Rust 1.73, which is pinned to 24.04.
@Keats
Copy link
Owner

Keats commented Sep 6, 2025

looks like we need to bump the pinned version in CI as well

Some dependencies are now on the 2024 edition.
@Keats
Copy link
Owner

Keats commented Sep 9, 2025

All good! I'll probably release a new version based on this PR this week if I don't forget

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants