-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
What is the difference between fork and original golang/crypto? #21
Comments
Hi! 👋 Here's a current list of changes:
We're hoping to merge these changes back into the original, so I won't add them to the readme for now, but I hope that's useful anyway ^.^ |
Oh, that's nice, thank you for the info! (probably leaving this issue is a good idea, so everyone else may find it easily) |
Hi @twiss, I have a bunch of enhancements to the golang/crypto package for supporting adding subkeys and generating revocation signatures (review) as well as supporting GNU dummy S2K for missing private keys used to import keyrings generated by However the upstream package does not have an active maintainer/reviewer causing the reviews to be in a limbo for months. Since there are plans to push changes from this fork upstream, could we sync up on the "Widening golang.org/x/crypto/openpgp maintainership" forum thread on how to keep the upstream package alive or whether this fork would be the primary place to add new features? Any comments on the existing reviews would be greatly appreciated. |
Hey @syadav2015, thanks for reaching out! I'll start with reviewing the S2K patch (hopefully tomorrow), as it's smaller. I'll leave any comments there and then post on the mailinglist see if we can get it merged there. If that doesn't succeed, you could make a PR here, yeah. |
Thanks, @twiss!! More than half of the patch for https://go-review.googlesource.com/c/crypto/+/161817 is the tests for the new API's so hopefully it's still a manageable review. Looking forward to your feedback. |
Hey @syadav2015 👋 I left a review on https://go-review.googlesource.com/c/crypto/+/191658, did you see it? It'd be nice to try to get it merged there, and we'd like to merge it here, too (and the other one as well, eventually). Although it seems like there's gonna be a merge conflict here for this one so that's gonna be a bit of extra work ^.^ |
Thanks for the review!! Pushed an updated patchset with resolution for comments. |
Hi @twiss, I rebased my changes to resolve the merge conflict in the review and ensure the review is up to date. Please let me know if anything needs to be addressed in the reviews. I would really like to get these reviews merged if possible since there is another pull request waiting for these APIs to merge in before the PR is accepted. I really appreciate you taking time to review the changes 😄 . |
@twiss Sorry for the slight delay in response. Was on leave due to medical reasons. Have updated https://go-review.googlesource.com/c/crypto/+/191658. Hopefully the latest patchset should suffice. |
@syadav2015 No worries, hope you're well! And thanks for all the patience with all the nitpicks :) I'll send another message to the mailing list trying to get it merged, and if not, I can merge it here instead. |
Do you have any central location where you're tracking the progress on upstreaming your changes? |
Hey 👋 Our latest attempt at that was here: https://groups.google.com/d/msg/golang-openpgp/_P6AmeCmD9w/sDaiFm89EgAJ We haven't received a reply there. At this point, if @syadav2015 is willing to rebase their changes, we'd be happy to merge them here directly. (If not, I might get to it myself eventually.) We will also continue to merge changes from upstream here. |
We (passforios: https://github.com/mssun/passforios) are using |
Hello @mssun, thanks for reaching out! The issue mssun/passforios#373 is closed, did you manage to solve it? And the patch you provided is not accessible from this URL: https://github.com/mssun/passforios/blob/master/go/crypto.patch |
Hey @mssun 👋 I'll merge @syadav2015's patch. Edit: merged as a103d74. |
Yes, I have modified gopenpgp and crypto:
And migrate to v2 APIs: |
These are all great additions IMO and the one not mentioned which has me looking into this fork is the Encrypt() method on the PrivateKey to set the passphrase on the secret key before exporting. I have a routine working with the x/crypto/openpgp module that does not encrypt the secret key and I am trying to swap out with this ProtonMail/crypto/openpgp module but running into some issues during the build/get phase because of references to modules that are in the fork but referenced as golang.org/x/crypto modules. Could you provide some guidance on how best to swap out the modules until such time as they can be merged into x/crypto which I see is a path being pursued? I am using go.mod and what I get when I attempt to build is the following:
Any assistance would be extremely appreciated as the task I'm working on has a lot of pressure from above to get it implemented. |
Hello @jbouse!
will effectively import commit |
@zugzwang okay that seems much simpler than I was trying to make it out to be. I was thinking it was more complicated. Just recently started working with Go so still learning. Thanks for the quick reply. |
Should we close this issue? 👀 |
Yes, this can be considered closed.
…On Fri, Jul 10, 2020 at 3:33 AM Oleg Kovalov ***@***.***> wrote:
Should we close this issue? 👀
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#21 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAAKHHTYXZWWSTNRMKV26L3R2272ZANCNFSM4HNFWARA>
.
|
Is it possible to remove dependency to |
No, since #77 we use upstream |
See golang/go#44226 for background. The ProtonMail fork is the same API (and code mostly). Differences are documented at ProtonMail/go-crypto#21 Signed-off-by: Brad Fitzpatrick <[email protected]>
I think everyone will be happy to see a short summary in README what was changes.
Thank you for the lib 😉
The text was updated successfully, but these errors were encountered: