tustvold commented on issue #413:
URL: 
https://github.com/apache/arrow-rs-object-store/issues/413#issuecomment-3160703614

   Given there are varying compliance requirements, and the nature of such 
requirements is that they're often unrelated to the quality of the 
implementations in question, I wonder if we might instead explore a mechanism 
by which alternative crypto implementations can be provided out of tree? This 
would allow users to bring along whatever crypto implementation their 
cybersecurity team happens to have been approved, without burdening us with 
maintaining multiple parallel implementations. Perhaps we could introduce some 
generic `CryptoProvider` trait that would use ring by default, but allow 
specifying something different?
   
   > I get your point but if you have mutually exclusive features and you have 
transitive dependencies on object store with different crypto providers enabled 
then my understanding is you will not be able to compile which is why it's 
discouraged. Not sure if it's going to be a problem in practice but sounds like 
a risk.
   
   I agree that mutually exclusive features are best avoided and go against 
established best practices (cargo cannot handle them very well).
   
    


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: github-unsubscr...@arrow.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to