Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

refactor: Generalize csr/crl signed_by to take &impl AsRef issuer #312

Merged
merged 1 commit into from
Jan 19, 2025

Conversation

audunhalland
Copy link
Contributor

@audunhalland audunhalland commented Jan 19, 2025

Completes #307 by applying the same treatment to csr and crl.

Also improves CertificateParams::signed_by issuer from AsRef<Self> to AsRef<CertificateParams>, because I think it's irrelevant that the issuer is the same type as the CertificateParams being signed, thus Self should not be used.

This makes these consistent with Certificate::signed_by.
Copy link
Member

@djc djc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Makes sense, thanks!

@@ -157,7 +157,7 @@ impl CertificateParams {
pub fn signed_by(
self,
public_key: &impl PublicKeyData,
issuer: &impl AsRef<Self>,
issuer: &impl AsRef<CertificateParams>,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: let's stick to Self here?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, I tried to make an explanation of this change in the PR summary.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The argument you made seems reasonable to me in absence of a reason to prefer keeping it as-is.

Copy link
Member

@cpu cpu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, thank you :-)

@djc djc added this pull request to the merge queue Jan 19, 2025
Merged via the queue into rustls:main with commit 5a0e2bf Jan 19, 2025
15 checks passed
@cpu
Copy link
Member

cpu commented Mar 16, 2025

Since we discovered this is a breaking change (#324) and reverted 0.13.3 we need to think about a path forward.

We could:

  1. Revert this, and re-introduce it in a semver compatible way
  2. Re-version main as 0.14 and document it as a breaking change
  3. Something else?

I'm not sure I have a strong opinion. Initially I was thinking option 2, but perhaps it's best to wait until we have more breaking changes before incrementing that version component to avoid downstream churn?

@djc @est31 @audunhalland Do you folks have thoughts?

@est31
Copy link
Member

est31 commented Mar 16, 2025

So #324 was about AsRef creating problems with Arc<Certificate>, while &Certificate works well with it. I guess the limitation here is that the compiler doesn't attempt AsRef two times, and going from Arc<Certificate> to &Certificate to &CertificateParams takes two steps.

Then #307 is similarly a breaking change, it is not that different from this PR.

I think it's better to have a more generic API than a more restricted one, so the change itself makes sense. But looking at the releases page, the 0.13 release is from December 2024, so from three months ago. Making another breaking change now would be a little bit fast I think.

In the past I would have been "who cares, make a release", but rcgen has grown in size, and most of our downloads are still in the "other" category from before 0.13. So maybe we can make an issue with a wishlist of breaking changes and put the AsRef stuff there. Then in 3-6 months if there is nothing else, we can make a semver breaking release, even if there is no other breakage we want to do. One or two semver breaking releases per year are okay for libraries the kind of rcgen I think.

@audunhalland
Copy link
Contributor Author

I consider AsRef an API "hack" and wasn't sure if semver was violated. Indeed it was. Sorry for not catching it upfront.

Ideally I'd prefer not having AsRef hacks, but instead take issuer: &CertificateParams directly, which is a simpler API than a generic one. That way you'd need to do cert.signed_by(public_key, issuer.params(), issuer_key) when the issuer is a Certificate.

The other option that works now and is backwards compatible is of course to add another set of methods: signed_by_params. But not very pretty.

@djc
Copy link
Member

djc commented Mar 17, 2025

I don't like the idea of releasing 0.14 only for this change much -- too soon after the previous semver-incompatible release, for too little gain. @audunhalland if you'd like this API to become available sooner, adding it under a different method name could make sense for the 0.13.x line.

I also want to spend more time cleaning up the issuer API to make it clearer/safer for this scenario of parsing an existing CA, and when that happens the simple change here might not make sense anymore.

@cpu
Copy link
Member

cpu commented Mar 17, 2025

It sounds like we all agree that we don't want to make a 0.14 just for this change.

I propose we revert the two (?) AsRef changes for now, file issues for a semver breaking "proper" fix, and then review/merge a side-by-side new functions that offer this in the short term. We can cut a 0.13.1 after the revert, or after the new side-by-side fns are available.

Sounds good?

@audunhalland
Copy link
Contributor Author

Reverting those two changes is fine by me, I can prepare another PR with alternative methods.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants