make Tahoe-LAFS work under PyPy #1792
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
3 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#1792
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
If I remember correctly, the main obstacle was extension modules. Current PyPy supports extension modules compiled for CPython, but is not 100% compatible with the CPython extension API.
[Twisted apparently now builds correctly with PyPy.](https://bugs.pypy.org/issue735)
fijal wrote in #pypy:
From an IRC discussion about why it doesn't work (pycryptopp), I decided to look at Cryptography and pynacl, and what uses pycryptopp in tahoe.
Zooko mentioned that Cryptography has a hard dependency on OpenSSL (which he rightfully dislikes) but my unqualified self thinks that it might not be so bad. Worth a shot, maybe? I have (some) time on Tuesday's PyCon AU sprint session to maybe take a hack on it, if the maintainers don't find the current-hard-dep on OpenSSL a dealbreaker.
Foolscap depends upon OpenSSL too, and even though we're planning on replacing Foolscap (#510), for backwards compatibility we'll probably need it for quite a while yet. Also when we replace it, we may wind up wanting TLS-protected HTTP instead of just plain HTTP (to maintain privacy of which shares you're fetching), which might be another thing that depends upon OpenSSL. I'm not a fan of OpenSSL either, but I don't think depending upon it would be the worst direction to go. Maybe our policy could be to use pynacl for new features, and migrate old ones from pycryptopp to cryptography?
That policy sounds reasonable -- although pynacl doesn't expose much more than ed22519 keys and "boxes" (Curve25519-pubpriv, salsa20+Poly1305 symmetric), so, unless the new features use that, you'll have to use Cryptography.
To replace pycryptopp in Tahoe, both Cryptography and pynacl will have to be used (pynacl for the ed22519, cryptography for AES, RSA, and SHA-2), so new features could possibly rely on either. The best case is that Cryptography later comes with a non-OpenSSL backend (that being said, LibreSSL works, if I'm not mistaken), which is improbable (because it's a lot of work) but possible (because it's been written from the start to have multiple backends -- on OS X it uses CommonCrypto for instance).
I'll see what I can get from a day of hacking in the sprints.
Note that efforts are underway to switch from pycryptopp to cryptography (https://tahoe-lafs.org/trac/tahoe-lafs/ticket/3031) as part of the Python 3 porting effort.
There is a PR that seems to get us most of the way there now - https://github.com/tahoe-lafs/tahoe-lafs/pull/669
Merged in https://github.com/tahoe-lafs/tahoe-lafs/commit/466369dd6948d8fb4ecc3b9fea0c98ba6aca140d (some while ago)