-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(tls): AWS Libcrypto Support #2008
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes look good to me, thanks! Need to address the CI failures.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks. I left some comments.
Could you update the documentation regarding the features.
@jenr24-architect could you try to force push again to see if we can get CI to kick off again? |
Does it have to be a force push?? It doesn't look like my last push triggered it |
tls-native-roots = ["_tls-any", "channel", "dep:rustls-native-certs"] | ||
tls-webpki-roots = ["_tls-any","channel", "dep:webpki-roots"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just thinking out loud: it strikes me as unfortunate that this the implication here is that because you would only need to access the certificate trust store for doing client things, that we should also enable the channel
feature, which is also necessary for client things.
Like in my mind, it would somehow be nicer if this was tls-client-native-roots
, etc... to better indicate what the feature was affecting.
Anyways, just thinking out loud. None of this is blocking or needs a response. :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this is a good idea. However, since the scope is different from this pull request, I think it would be good to discuss it in a separate pull request rather than changing them here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like this needs to be run through cargo fmt
and there's the broken intra-doc link stuff to sort out.
With this change, users can enable both |
I had thought about this -- I initially had written some code to add I would be willing to add that feature, in either this or a separate PR if we're interested in adding that functionality :) |
Co-authored-by: Lucio Franco <[email protected]>
@jenr24-architect looks like there are some more CI failures |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
but the scope of that change started to get out of hand.
Makes sense to me. I suppose there are several possible ways to address this, so it seems reasonable to narrow the scope of this pull request.
@LucioFranco The CI failure does not seem to be caused by this pull request's change. I opened #2021 to address it. |
merged master after #2021 merged, this PR is ready for CI to re-run and to enter the merge queue |
Motivation
I want to use
aws-lc-rs
with tonic.Solution
adds a feature flag
tls-aws-lc
in parallel totls
, removedtls
feature flag dependency fromtls-*-roots
features