-
-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make SHA1 crate dependency feature gated #543
Comments
@hkr1990 zbus 4 already released so you missed the train on this one, I'm afraid. :( We'll have to wait till the next API break. |
Sorry about that! When is the next API break expected? Also, I was planning to add the new gating feature as Will you still consider this behavior as API break? |
When enough issues require API break are accumulated. :) I honestly hope it won't be anytime soon though. Every break is a burden on the users.
I thought of that but it will still break existing code that disables default features and rely on cookie auth (on Windows, it's currently the only authenticated mechanism you can use with tokio). This would especially apply to tokio users (I think most of our users) as they disable default features to avoid depending on a bunch of smol-rs crates.
Unfortunately, yes. |
Giving me thought to this, I don't think most people use cookies so even though it might break things for some people, I think it won't for most people and even for people for whom this will break, it's super easy to fix with a oneline change. So please do contribute the PR. |
* It drags the `sha1` crate as a dependency, which can be [problematic for some users]. * It makes the handshake more complex, not allowing to pipeline all the commands. * It's not widely used. If `EXTERNAL` is not an option, you might as well just use `ANONYMOUS`. Fixes dbus2#727. [problematic for some users]: dbus2#543
This was only needed for `DBUS_COOKIE_SHA1` auth mechansim, which was just dropped so we can happily drop this. Fixes dbus2#543.
Zbus crate depends on a crate "SHA1" which is now flagged as "cryptographically broken" by most Rust Component governance tools in major software companies.
I see that SHA1 crate is used for DBUS_SHA1_COOKIE mechanism. I did some reading on the DBUS_SHA1_COOKIE mechanism and looks like it is only needed on legacy unix and windows systems. So, it should be possible to make the DBUS_SHA1_COOKIE feature as optional feature (gated by a feature flag). This will make zbus crate not being flagged by compliance tools and improve its adoption in production.
Thanks,
Hemendra
The text was updated successfully, but these errors were encountered: