-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cryptohash-sha1 doesn't allow building with ghc 9.0 or newer #305
Comments
Indeed. See haskell-hvr/cryptohash-sha1#10. |
same goes for cryptohash-md5, cryptohash-sha256, cryptohash-sha512. I tried bumping cryptohash-md5/sha1 manually and they built fine. So a revision would be sufficient for them to work on GHC 9. |
Related issues and PRs are haskell-hvr/cryptohash-md5#5 (haskell-hvr/cryptohash-md5#6, cc @swamp-agr), haskell-hvr/cryptohash-sha256#12, haskell-hvr/cryptohash-sha512#7. My main question is whether the GHC changes around optimizing If the performance is significantly reduced, should the trustees relax the bounds, anyway? The policy document doesn't say what to do in this case – maybe @gbaz, @phadej, etc. can weigh in. Personally, I probably won't perform a bounds relaxation, anyway, because I don't have much experience with cryptographic code. Other trustees may be more comfortable with this. |
That shouldn’t change the security characteristics of the code.
…On Tue, Jun 8, 2021 at 5:48 AM Simon Jakobi ***@***.***> wrote:
same goes for cryptohash-md5, cryptohash-sha256, cryptohash-sha512.
Related issues and PRs are haskell-hvr/cryptohash-md5#5
<haskell-hvr/cryptohash-md5#5> (
haskell-hvr/cryptohash-md5#6
<haskell-hvr/cryptohash-md5#6>, cc @swamp-agr
<https://github.com/swamp-agr>), haskell-hvr/cryptohash-sha256#12
<haskell-hvr/cryptohash-sha256#12>,
haskell-hvr/cryptohash-sha512#7
<haskell-hvr/cryptohash-sha512#7>.
My main question is whether the GHC changes around optimizing
withForeignPtr
<https://gitlab.haskell.org/ghc/ghc/-/wikis/migration/9.0#withforeignptr>
result in significantly reduced performance compared to GHC 8.10.
If the performance is significantly reduced, should the trustees relax the
bounds, anyway? The policy document
<https://github.com/haskell-infra/hackage-trustees/blob/master/policy.md#2-metadata-only-changes-relaxing-constraints>
doesn't say what to do in this case – maybe @gbaz
<https://github.com/gbaz>, @phadej <https://github.com/phadej>, etc. can
weigh in.
Personally, I probably won't perform a bounds relaxation, anyway, because
I don't have much experience with cryptographic code. Other trustees may be
more comfortable with this.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#305 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAABBQRN4UFIIZYEYVOTCRLTRXRNNANCNFSM442WLNFA>
.
|
Our policies don't cover performance regressions between versions of GHC, or really address performance in general. In this case I think that it means that they approve of revisions even when there may be performance regressions on new versions of GHC. PVP semantics are supposed to cover buildability and correctness, and trustee revisions are supposed to abide by pvp semantics. That's really the only sane way to proceed, so I give bounds bumps a 👍 |
We can bump bounds, but it does not feel right to depend on abandoned packages for cryptographic applications. Is there any alternative to them? |
They actually do a pretty awesome trick using capi ffi to have a nice c
impl while not leaking linker symbols. They deserve to be maintained. The
underlying code is very stable.
…On Sun, Jun 13, 2021 at 3:42 PM Bodigrim ***@***.***> wrote:
We can bump bounds, but it does not feel right to depend on abandoned
packages for cryptographic applications. Is there any alternative to them?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#305 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAABBQQBVTEAQBVAMT2U2MLTSUC3ZANCNFSM442WLNFA>
.
|
Trustees can intervene in a short term, but clearly this situation needs a sustainable solution. Trustees are not well-positioned to semi-maintain a package for a long time. To follow the policy I would expect someone a) to raise PRs for |
AFAIK the There's also the new If the |
Vincent is full awol too. So that doesn’t even make sense to me …
…On Tue, Jun 15, 2021 at 5:50 AM Simon Jakobi ***@***.***> wrote:
We can bump bounds, but it does not feel right to depend on abandoned
packages for cryptographic applications. Is there any alternative to them?
AFAIK the hnix packages are currently switching to cryptonite although
its maintainer hasn't always been as responsive as could be desired. See
e.g.
https://mail.haskell.org/pipermail/haskell-cafe/2021-March/133636.html.
There's also the new Z-Botan <https://hackage.haskell.org/package/Z-Botan>
package, which however operates on data structures from the Z-Data
<https://hackage.haskell.org/package/Z-Data-0.8.5.0/docs/Z-Data-Vector-Base.html#t:Bytes>
package, so it's not as easy to use from existing Haskell packages.
If the cryptohash-* packages should live on it would be great to find
some new and active maintainers for it.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#305 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAABBQR6SKV6X2XOGPVAMK3TS4O6BANCNFSM442WLNFA>
.
|
|
Performed base bumps on the four cryptohash-* packages. |
No description provided.
The text was updated successfully, but these errors were encountered: