-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Crypto: delete internal crypto #118
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice!
6a12299
to
243061e
Compare
Hey @psiemens, do you have a preference about making breaking changes to the SDK crypto APIs ? If you think breaking changes are fine, I'll make some cleaner changes to this PR. If breaking changes are a problem, we can merge the PR in its current state. Thanks! |
…sdk into tarak/use-flow-go-crypto
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good! Just added one point in a comment.
I'd prefer to avoid breaking changes for now, so the way you have it is great 👌
flow.go
Outdated
@@ -87,10 +87,10 @@ func (id ChainID) String() string { | |||
// entityHasher is a thread-safe hasher used to hash Flow entities. | |||
type entityHasher struct { | |||
mut sync.Mutex | |||
hasher crypto.Hasher | |||
hasher hash.Hasher |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could these all stay as crypto.Hash
and crypto.Hasher
?
I'd prefer to have the rest of the SDK files depend only on flow-go-sdk/crypto
@turbolent Is there a way other than |
@tarakby you probably just want to commit the changes in to go.sum file. If that's the output of go mod tidy, then that's what should be in the repo |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good! I think you just need to do a rebase and re-run go mod tidy
to clear up the conflict. I can do that if you'd like 😄
…sdk into tarak/use-flow-go-crypto
Closes: #113
Description
flow-go/crypto
without breaking changes to the SDK api.I tried to not break any external api in this PR, but a better refactoring and cleaning could be done if I'm allowed to introduce breaking changes and remove redundant types from the sdk (for instance remove
flow-go-sdk/crypto.PrivateKey
and useflow-go/crypto.PrivateKey
instead, and a few other examples). Let me know if such changes are possible. cc @psiemens @turbolent