-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DO NOT MERGE] smoke test cryptography with CFFI 1.16.0 pre-release #9653
Conversation
f24a25c
to
2219365
Compare
Welp, looks like there's going to be a CFFI 1.16.0rc2, and probably some new surrogate test coverage once I figure out what we screwed up with the shim module. ;) I'll update this to force rc2 once we get that sorted. |
Sounds good, thanks for testing. |
2219365
to
38f0fa5
Compare
* corrected packaging issue
OK, rc2 is looking a lot better- all CI tests are green (CFFI's source layout masked a packaging failure, even though all tests run against the built wheels). The wheel builder jobs are still failing, but I assume that's maybe due to some isolation/caching going on for the deps? Please let me know if there's more I should look into on the CFFI end, but ATM I'm assuming |
See: |
@alex aha, thanks for the tip- that did it. All the non-PyPy wheel builder jobs are green against CFFI 1.16.0rc2, and since it seems to be a "non-user-serviceable" component of PyPy (I've asked at https://foss.heptapod.net/pypy/pypy/-/issues/4005 to be sure there's nothing more we can verify there upstream), I'm feeling pretty good about it. I'll leave this PR open and validate any further RCs and/or the final bits as they're released. Also:
I know there's an awful lot of CFFI code stubs remaining- if the technical issues for an all-PyO3-no-CFFI |
We are slowly decreasing our usage of cffi, but pyOpenSSL uses our bindings layer and what we do there is still very much TBD. Outside of the pyOpenSSL situation I'm not aware of any fundamental technical issues, but as we convert we run into many yaks that are in need of shaving. Frequently that's additions to I don't think we can really even guess a date until we get to the point where we have a plan for pyOpenSSL, but @alex may have a different opinion 😄 |
Nope, that's totally in line with my view. Absent the pyOpenSSL issue I'd
say there's another year or so of replacement. But we don't even have a
basic concept for pyOpenSSL.
…On Tue, Sep 26, 2023, 12:30 PM Paul Kehrer ***@***.***> wrote:
We are slowly decreasing our usage of cffi, but pyOpenSSL uses our
bindings layer and what we do there is still very much TBD.
Outside of the pyOpenSSL situation I'm not aware of any fundamental
technical issues, but as we convert we run into many yaks that are in need
of shaving. Frequently that's additions to rust-openssl, but occasionally
it ranges farther afield into the PyO3 or the broader Rust ecosystem.
I don't think we can really even guess a date until we get to the point
where we have a plan for pyOpenSSL, but @alex <https://github.com/alex>
may have a different opinion 😄
—
Reply to this email directly, view it on GitHub
<#9653 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAAAGBG2KKCFX7DOYNMTMMLX4L7LXANCNFSM6AAAAAA5G7AYGQ>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
OK, sounds like we're on the hook for another year or two at least- do please let us know if you get to a point where it's purely a matter of cranking out binding adapters or something, because we could probably justify sending some capable hands your way for a bit if it meant eliminating CFFI from the picture. |
# via -r build-requirements.in | ||
tomli==2.0.1 \ | ||
--hash=sha256:939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc \ | ||
--hash=sha256:de526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4f | ||
# via setuptools-rust | ||
# via -r build-requirements.in |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This change here is what caused the test failures btw.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ahh, I ran the pip-compile
under Python 3.11, so setuptools et al probably decided they didn't need an aftermarket TOML parser.
I think we're good. Thanks! |
python_requires
metadata accordingly, so 3.7 should still use CFFI==1.15.1.