-
Notifications
You must be signed in to change notification settings - Fork 277
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[refactor]: Remove ursa
dependency
#3422
Labels
api-changes
Changes in the API for client libraries
crypto
Dead code
iroha2-dev
The re-implementation of a BFT hyperledger in RUST
Security
This issue asks for improved security
Comments
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
…ough ursa Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
…pt to iroha_crypto types Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
…ode from ursa Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
…20Poly1305 code from ursa, migrate iroha_p2p to use it Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
…o blocks This also removes bls signature aggregation and rogue key mitigation, as iroha does not and probably will not use aggregated signatures Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
This makes all the dependency tree of iroha_crypto wasm-compatible (except `getrandom`, which either requires a "js" feature enabled when used from web, or a custom getrandom implementation in other cases) Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 9, 2023
…tests Clean up the API a bit: - hide the implementation details of signatures (they are only used through the PublicKey, PrivateKey and Signature types) - remove even more unused API functions - add missing documentation items Signed-off-by: Nikita Strygin <[email protected]>
This was referenced Nov 9, 2023
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
…ough ursa Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
…pt to iroha_crypto types Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
…ode from ursa Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
…20Poly1305 code from ursa, migrate iroha_p2p to use it Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
…o blocks This also removes bls signature aggregation and rogue key mitigation, as iroha does not and probably will not use aggregated signatures Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 10, 2023
This makes all the dependency tree of iroha_crypto wasm-compatible (except `getrandom`, which either requires a "js" feature enabled when used from web, or a custom getrandom implementation in other cases) Signed-off-by: Nikita Strygin <[email protected]>
mversic
pushed a commit
to DCNick3/iroha
that referenced
this issue
Nov 20, 2023
…edundant result.is_ok() checks Signed-off-by: Nikita Strygin <[email protected]>
mversic
pushed a commit
to DCNick3/iroha
that referenced
this issue
Nov 20, 2023
… dependency from `iroha_crypto` and introduce configurable tls backends to `iroha_client` openssl-sys was previously added to `iroh_crypto` to allow static builds of openssl with musl libc. This was somewhat a kludge though, as `iroha_crypto` does not depend on `openssl` (or at least it stopped depending on it after removing `ursa` dependency). It was used, however, in the client to allow connecting to iroha nodes via HTTPS. This commit gives the user more freedom in choosing their TLS implementation by providing four features: `tls-native`, `tls-native-vendored`, `tls-rustls-native-roots` and `tls-rustls-webpki-roots`, which mirror corresponding features of `attohttpc` and `tokio-tungstenite`. Unlike previously, none of the TLS implementations are enabled by default, which is a breaking change Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
…o types Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
…rom ursa, migrate iroha_p2p to use it Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
This also removes bls signature aggregation and rogue key mitigation, as iroha does not and probably will not use aggregated signatures Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
This makes all the dependency tree of iroha_crypto wasm-compatible (except `getrandom`, which either requires a "js" feature enabled when used from web, or a custom getrandom implementation in other cases) Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
Clean up the API a bit: - hide the implementation details of signatures (they are only used through the PublicKey, PrivateKey and Signature types) - remove even more unused API functions - add missing documentation items Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
…moving dep of iroha_p2p on aead. Also remove buffer-based API from iroha_crypto, it's not used anyways. Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
…s_ok() checks Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
that referenced
this issue
Nov 20, 2023
…`iroha_crypto` and introduce configurable tls backends to `iroha_client` openssl-sys was previously added to `iroh_crypto` to allow static builds of openssl with musl libc. This was somewhat a kludge though, as `iroha_crypto` does not depend on `openssl` (or at least it stopped depending on it after removing `ursa` dependency). It was used, however, in the client to allow connecting to iroha nodes via HTTPS. This commit gives the user more freedom in choosing their TLS implementation by providing four features: `tls-native`, `tls-native-vendored`, `tls-rustls-native-roots` and `tls-rustls-webpki-roots`, which mirror corresponding features of `attohttpc` and `tokio-tungstenite`. Unlike previously, none of the TLS implementations are enabled by default, which is a breaking change Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
…ough ursa Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
…pt to iroha_crypto types Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
…ode from ursa Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
…20Poly1305 code from ursa, migrate iroha_p2p to use it Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
…o blocks This also removes bls signature aggregation and rogue key mitigation, as iroha does not and probably will not use aggregated signatures Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
This makes all the dependency tree of iroha_crypto wasm-compatible (except `getrandom`, which either requires a "js" feature enabled when used from web, or a custom getrandom implementation in other cases) Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
…tests Clean up the API a bit: - hide the implementation details of signatures (they are only used through the PublicKey, PrivateKey and Signature types) - remove even more unused API functions - add missing documentation items Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
… crate, allows removing dep of iroha_p2p on aead. Also remove buffer-based API from iroha_crypto, it's not used anyways. Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
…edundant result.is_ok() checks Signed-off-by: Nikita Strygin <[email protected]>
DCNick3
added a commit
to DCNick3/iroha
that referenced
this issue
Nov 22, 2023
… dependency from `iroha_crypto` and introduce configurable tls backends to `iroha_client` openssl-sys was previously added to `iroh_crypto` to allow static builds of openssl with musl libc. This was somewhat a kludge though, as `iroha_crypto` does not depend on `openssl` (or at least it stopped depending on it after removing `ursa` dependency). It was used, however, in the client to allow connecting to iroha nodes via HTTPS. This commit gives the user more freedom in choosing their TLS implementation by providing four features: `tls-native`, `tls-native-vendored`, `tls-rustls-native-roots` and `tls-rustls-webpki-roots`, which mirror corresponding features of `attohttpc` and `tokio-tungstenite`. Unlike previously, none of the TLS implementations are enabled by default, which is a breaking change Signed-off-by: Nikita Strygin <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
api-changes
Changes in the API for client libraries
crypto
Dead code
iroha2-dev
The re-implementation of a BFT hyperledger in RUST
Security
This issue asks for improved security
Hyperledger Ursa is rightfully considered EOL. We have no incentive to use
ursa
over any library given that at this point we're also the only people maintaining it and also the only people using it.Under these circumstances it is advised to remove the direct dependency on
ursa
and instead extract the code paths which are used iniroha_crypto
. Ursa-specific implementations of cryptographic primitives should be added toiroha_crypto
directly.The text was updated successfully, but these errors were encountered: