Skip to content
This repository has been archived by the owner on Nov 6, 2020. It is now read-only.

update ring to 0.14 #10262

Merged
merged 12 commits into from
Feb 6, 2019
Merged

update ring to 0.14 #10262

merged 12 commits into from
Feb 6, 2019

Conversation

ordian
Copy link
Collaborator

@ordian ordian commented Jan 30, 2019

This update is necessary, since ring 0.13 is going to be yanked soon.

Change from u32 to NonZeroU32 in parity-crypto was pretty invasive (b347599)

@ordian ordian added A0-pleasereview 🤓 Pull request needs code review. M5-dependencies 🖇 Dependencies. labels Jan 30, 2019
@ordian ordian added this to the 2.4 milestone Jan 30, 2019
* master:
  Fix join-set test to be deterministic. (#10263)
@niklasad1 niklasad1 added A8-looksgood 🦄 Pull request is reviewed well. and removed A0-pleasereview 🤓 Pull request needs code review. labels Jan 30, 2019
Copy link
Contributor

@tomaka tomaka left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same remark for all the unsafe blocks.

use super::{Crypto, Error};
use super::{Crypto, Error, NonZeroU32};

const ITERATIONS: NonZeroU32 = unsafe { NonZeroU32::new_unchecked(10240) };
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Although this is technically safe, by ideology it's probably better to not use any unsafe anywhere.

Copy link
Collaborator Author

@ordian ordian Feb 3, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

by ideology it's probably better to not use any unsafe anywhere

Well, I don't think we should treat "don't use unsafe" as a dogma. The are different kinds of unsafe code. Here the unsafety of new_unchecked comes from const-control-flow (and probably const_panic) being unstable.
And, in this case, for literals and constants it's easy to reason about the safety.

Nevertheless, I've eliminated all the calls to new_unchecked.

* master:
  Fix Windows build (#10284)
  Don't run the CPP example on CI (#10285)
  Additional tests for uint deserialization. (#10279)
  prevent silent errors in daemon mode (#10007)
* master:
  Convert to jsonrpc-derive, use jsonrpc-* from crates.io (#10298)
* master:
  Update to jsonrpc-derive 10.0.2, fixes aliases bug (#10300)
* master:
  fix(secret-store): deprecation warning (#10301)
@niklasad1 niklasad1 merged commit a3e39c9 into master Feb 6, 2019
@niklasad1 niklasad1 deleted the ring-0.14 branch February 6, 2019 16:53
ordian added a commit that referenced this pull request Apr 5, 2019
* master:
  fix: parity-clib/examples/cpp/CMakeLists.txt (#10313)
  CI optimizations (#10297)
  Increase number of requested block bodies in chain sync (#10247)
  Deprecate account management (#10213)
  Properly handle check_epoch_end_signal errors (#10015)
  fix(osx and windows builds): bump parity-daemonize (#10291)
  Add missing step for  Using `systemd` service file (#10175)
  Call private contract methods from another private contract (read-only)  (#10086)
  update ring to 0.14 (#10262)
  fix(secret-store): deprecation warning (#10301)
  Update to jsonrpc-derive 10.0.2, fixes aliases bug (#10300)
  Convert to jsonrpc-derive, use jsonrpc-* from crates.io (#10298)
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
A8-looksgood 🦄 Pull request is reviewed well. M5-dependencies 🖇 Dependencies.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants