-
-
Notifications
You must be signed in to change notification settings - Fork 12.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
duckscript: use system TLS instead of rustls #113077
Conversation
cd "duckscript_cli" do | ||
system "cargo", "install", *std_cargo_args | ||
end | ||
system "cargo", "install", "--features", "tls-native", *std_cargo_args(path: "duckscript_cli") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Still need to make sure of linkage. Open to opinions on whether we should favor the statically linked pure Rust implementation vs dynamically linked system/Homebrew library.
Upstream changed from native OpenSSL to rustls, and then added option afterward https://github.com/sagiegurari/duckscript/blob/master/CHANGELOG.md#v0813-2022-07-21
### v0.8.13 (2022-07-21)
* Enhancement: Runtime - Enable to clone duckscript context #253 (thanks waterlens)
* Enhancement: Support both native TLS via openssl and pure rust TLS #258 (thanks @jirutka)
### v0.8.12 (2022-05-25)
* Enhancement: Add support for stdin input passing to child process in exec, watchdog and spawn commands #247
* Enhancement: Replace native TLS support via openssl with pure rust TLS
* Update dependencies
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Old linkage #112420:
==> brew linkage --cached duckscript
System libraries:
/lib/x86_64-linux-gnu/libc.so.6
/lib/x86_64-linux-gnu/libgcc_s.so.1
/lib/x86_64-linux-gnu/libm.so.6
New linkage:
==> brew linkage --cached duckscript
System libraries:
/lib/x86_64-linux-gnu/libc.so.6
/lib/x86_64-linux-gnu/libgcc_s.so.1
/lib/x86_64-linux-gnu/libm.so.6
Homebrew libraries:
/home/linuxbrew/.linuxbrew/opt/openssl@3/lib/libcrypto.so.3 (openssl@3)
/home/linuxbrew/.linuxbrew/opt/openssl@3/lib/libssl.so.3 (openssl@3)
@Homebrew/core I see that some Wanted to discuss whether we should use I guess the main consideration would be security. Dynamically linked libraries allow providing security fixes with formulae/system updates. |
I'm averse to statically linking crypto libraries. Do you know what Linux distros are doing? |
Yeh, I'm initially "oh let's do what upstream does" but this does not sound like it'll be an easy process for us to detect and push updates for compared to e.g. a new |
There aren't that many examples right now. Alpine's Of course this will depend on whether each upstream is willing to support alternative TLS options. For example, Based on current responses, we could try to prioritize dynamically linked SSL/TLS libraries when available. May need to verify On side note, there are some other bundled libraries that we may want to check on later per
|
🤖 A scheduled task has triggered a merge. |
brew install --build-from-source <formula>
, where<formula>
is the name of the formula you're submitting?brew test <formula>
, where<formula>
is the name of the formula you're submitting?brew audit --strict <formula>
(after doingbrew install --build-from-source <formula>
)? If this is a new formula, does it passbrew audit --new <formula>
?