-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
example: FIPS mode on Linux #3480
base: main
Are you sure you want to change the base?
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #3480 +/- ##
=======================================
Coverage 79.49% 79.49%
=======================================
Files 88 88
Lines 3507 3507
=======================================
Hits 2788 2788
Misses 645 645
Partials 74 74
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
- Splunk Observability Cloud: <https://app.signalfx.com/#/apm?environments=YOURUSERNAME> | ||
> Note: Processing might take some time. | ||
|
||
### FIPS mode - Linux |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we need to say something about stability guarantees here?
https://go.dev/src/crypto/internal/boring/README
We have been working inside Google on a fork of Go that uses BoringCrypto (the core of BoringSSL) for various crypto primitives, in furtherance of some work related to FIPS 140. We have heard that some external users of Go would be interested in this code as well, so we have published this code here in the main Go repository behind the setting GOEXPERIMENT=boringcrypto.
Use of GOEXPERIMENT=boringcrypto outside Google is unsupported. This mode is not part of the Go 1 compatibility rules, and it may change incompatibly or break in other ways at any time.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we should indeed add a notice. Also probably that using it does not implies that something is FIPS compliant.
Towards #3460
Testing if it is possible to run the example in FIPS mode on Linux:
The trace was present in o11y Cloud.