mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 11:15:54 +03:00
[GH-ISSUE #2212] just clippy does not catch warnings produced by just dnssec-openssl #925
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#925
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @japaric on GitHub (May 15, 2024).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/2212
Describe the bug
what the title says
To Reproduce
Steps to reproduce the behavior:
Expected behavior
just clippyshould catch the warnings shown when one runsjust dnssec-openssland similar tasks.System:
Version:
Crate: whole repository
Version:
97e1f434Additional context
Seems like
just clippyonly test two combinations of Cargo features: all features disabled; and all features enabled.To test the combinations of other Cargo features a tool like
cargo-hackcould be used. I know the rustls project uses it to test combinations of Cargo features but I have not used it myself.@djc commented on GitHub (May 15, 2024):
I'd be open to a PR that introduces the use of cargo-hack similar to what we have in the rustls repo. Might want a separate job for it since it could be pretty slow?
(If you just want to fix the
dnssec-opensslwarnings, that might be a good start, too.)@bluejekyll I think you've mentioned wanting to just get rid of OpenSSL-based stuff before, how are you feeling about that project now?
@bluejekyll commented on GitHub (May 18, 2024):
I keep hesitating on the removal of OpenSSL because of some of the compliance it has that we're still waiting on for Rustle. I think we should just clean it up instead of fixing up testing related to it, but it wouldn't be hard to fix this.
Today we only test these feature flags directly with clippy:
We could add this after
--all-features,just clippy-inner --features=dnssec-openssl. OpenSSL generally doesn't get caught, because where they conflict, Rustls takes precedent.@djc commented on GitHub (May 18, 2024):
What kind of compliance are we waiting for? I think Rustls is in a pretty good place today.
@bluejekyll commented on GitHub (May 18, 2024):
Primarily, FIPS compliance, does this announcement mean that Rustls is FIPS compliant now? https://www.memorysafety.org/blog/rustls-with-aws-crypto-back-end-and-fips/
@djc commented on GitHub (May 18, 2024):
Yes, Rustls from 0.22 onwards supports the aws-lc-rs crypto provider which has a FIPS mode available (on Linux only).
@djc commented on GitHub (Jan 10, 2025):
Support for OpenSSL was removed: