-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
towards a release #1
Comments
I'm not in favor to completely revert Then, it seems to be a good plan 👍. |
as discussed earlier, I'm all for an all-or-nothing approach. I've to look through revdeps what else uses the sexp serialisers. in the end, I think most cryptographic material can be expressed in PKCS* / pem, and there's no need for sexp-serialisers. But a "partial revert" is IMHO more churn than necessary. in order to stage the changes through, it would be nice if others could join the discussion (about s-expressions, but also about the list of tasks above). to get the ball rolling, would it be possible to enable the ocaml-ci for this repository? and is anyone against bumping the lower ocaml bound to 4.05.0 (which is the one in debian-stable, and FreeBSD) -- I'd as well be ok with using anything more recent as lower bound (please express your view on this as comment). thanks. |
Not easily, because it's private and so the CI can't access it ( |
I'll open source it to facilitate the CI. Regarding the above, I'm in favour of all of them, but I suggest that we first do:
If we can release this first and a TLS release which ports to dune, then it will be much easier to perform the rest of the work for TLS 1.3 and digestif integration and fortuna separation asynchronously on top of those releases. Right now we are interlocked on a simultaneous code and build system change. |
@avsm ok, that sounds fine with me. I'll work on the PR (and test locally) addressing these changes this week. |
repository is now open so ocaml-ci should be activatable on this. |
ocaml-ci is now enabled (doesn't work on |
This does not match the plan I have in mind. I want to avoid yet another rebase of the TLS 1.3 branch (did that recently, it is painful). So my plan ahead is to get this package into a nice shape, then get TLS 1.3 branch merged (after further reviews and testing), and then finally use mirage-crypto in TLS and port TLS to dune. Once we're there, we can release TLS (with 1.3, mirage-crypto, and dune). :) |
Below is a draft plan of "what we should do before an initial release". Let us please discuss if there are items missing from the list, or whether some of the items should be skipped for a release.
The set of changes we should aim for an initial release are in my opinion:
Mirage_crypto
or justCrypto
)? It'll beMirage_crypto
.at some later point, we should:
The text was updated successfully, but these errors were encountered: