-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tracking cbits in the hackage ecosystem #162
Comments
Thanks, these are all good suggestions. We will discuss it at the next SRT meeting and decide the priorities and next steps. |
And if you intend to target anything other than Linux, this is kind of hopeless.
Would this be part of the recommendations? Most of the C bindings I have used do not follow this convention, which makes things hard to understand in general, security advisories aside. As far as I know there is also no way to enforce this convention?
I like this also because it leaves it up to the user or a separate package to decide how to write the bindings. Some packages deviate from the "raw" binding style and are instead rather opinionated, which then makes them overall not as useful. |
The |
Following #157 I think it's clear that bundled c sources are an issue.
I've been advocating against it for a long time, but there are cases where the alternative is basically leaving the end user alone with compiling a system library from source. Further discussion happened here https://discourse.haskell.org/t/haskell-cryptography-group-botan-the-first-milestone/9018/11
I think the least worst option is to create packages like
bzip2-clib
that do nothing but install headers and allow linking against the upstream code with no Haskell pieces whatsoever. These can be more easily tracked and shared maintenance is not an issue.What should the sec team do here? I think there are three potential missions:
The text was updated successfully, but these errors were encountered: