Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use sexp_of ppx and remove unnecessary t_of_sexp stubs #430

Merged
merged 3 commits into from
Apr 21, 2021
Merged

Use sexp_of ppx and remove unnecessary t_of_sexp stubs #430

merged 3 commits into from
Apr 21, 2021

Conversation

torinnd
Copy link
Contributor

@torinnd torinnd commented Apr 20, 2021

[@@deriving sexp_of] seems like the more appropriate ppx to use given many of the types in lib/ can't be deserialized.

This would avoid confusion like #398 where it's unclear if a state can be restored from an S-expression.

lib/reader.mli Outdated Show resolved Hide resolved
@hannesm
Copy link
Member

hannesm commented Apr 20, 2021

thanks, I'll get to this soon. it looks good (see a minor comment above)

@torinnd
Copy link
Contributor Author

torinnd commented Apr 20, 2021

Sure, that change makes sense. Thanks for taking a look at this!

@hannesm hannesm merged commit cfbbbf4 into mirleft:main Apr 21, 2021
hannesm added a commit to hannesm/ocaml-tls that referenced this pull request Apr 22, 2021
hannesm added a commit to hannesm/ocaml-tls that referenced this pull request Apr 22, 2021
hannesm added a commit to hannesm/ocaml-tls that referenced this pull request Apr 22, 2021
hannesm added a commit to hannesm/opam-repository that referenced this pull request Apr 22, 2021
CHANGES:

* Breaking: use deriving sexp_of instead of sexp. Constructing a state from
  a sexp has not been supported (lead to exception), and is now removed
  (mirleft/ocaml-tls#430 by @torinnd, continued in mirleft/ocaml-tls#431 by @hannesm)
* Bugfix: TLS 1.3 client authentication with certificate, client side. This
  used to work accidentally before 0.13.0 changed the signature algorithms
  handling, now the right signature algorithm (as requested by server) is used.
  (mirleft/ocaml-tls#431 @hannesm, @talex5 reported mirage/capnp-rpc#228)
* adapt to x509 0.13.0 and mirage-crypto-ec 0.10.0 changes (mirleft/ocaml-tls#431 @hannesm)
hannesm added a commit to hannesm/opam-repository that referenced this pull request Apr 22, 2021
CHANGES:

* Breaking: use deriving sexp_of instead of sexp. Constructing a state from
  a sexp has not been supported (lead to exception), and is now removed
  (mirleft/ocaml-tls#430 by @torinnd, continued in mirleft/ocaml-tls#431 by @hannesm)
* Bugfix: TLS 1.3 client authentication with certificate, client side. This
  used to work accidentally before 0.13.0 changed the signature algorithms
  handling, now the right signature algorithm (as requested by server) is used.
  (mirleft/ocaml-tls#431 @hannesm, @talex5 reported mirage/capnp-rpc#228)
* adapt to x509 0.13.0 and mirage-crypto-ec 0.10.0 changes (mirleft/ocaml-tls#431 @hannesm)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants