-
Notifications
You must be signed in to change notification settings - Fork 15
Using with Electron #10
Comments
Thanks @apiriouIpso for the excellent write-up. Yes, if Electron is no longer bundling or exporting OpenSSL then that's a showstopper. I am not sure I want to go down the road of bundling OpenSSL statically with It's a pity that Electron is not keeping step with Node.js. A third option is to get Node.js to move to BoringSSL, but I think Electron probably needs to sort this out. |
I assume the Node.js team will not move to BoringSSL mostly because of this line that implies that stability will never be guaranted:
I've seen a few issues on this subject such as this one. Also I'm guessing the folks working on Electron had no choice but to migrate because Chromium itself switched to BoringSSL as seen on this issue. Since I only need to be able to use the AES cipher in CTR mode, I'm guessing it'll be faster to make my own native module supporting this one algorithm, which is a shame cause your module seemed perfect for my use case. Thanks for the answer. |
Thanks @apiriouIpso , is there otherwise not a one or two liner patch for Electron that can expose OpenSSL? I am assuming OpenSSL is still bundled statically with the Node that ships with Electron? |
If I'm not mistaken they are now building their Node.js version with BoringSSL. See Since BoringSSL is a fork of OpenSSL (and still retains a good compatibility from what I gather) maybe it's possible to expose BoringSSL in a mostly compatible way, but it's uncharted territory for me, and would also need to be updated every once in a while to keep up with Electron/BoringSSL's updates. |
@jorangreef @apiriouIpso another options is to compile Electron enabling BoringSSL compilation flag to add a prefix (a kind of namespace) to the functions, and patches (they already do it to some extent) the code that uses that functions. This way any other nodejs add-on could depend on OpenSSL without name clashing. I'm facing a similar issue and maybe we can ask Electron team to do this in order to solve problems with third party add-ons like this one. |
Thanks @alejandroclaro, if you could take care of it with the Electron team that would be great. |
@jorangreef I just notice that Electron is not exporting BoringSSL symbols. So, I was able to compile an addon which depends on OpenSSL without issues and wrap what I need. This will work as long as Electron upholds this decision. It doesn't work with NodeJS due to symbol clashing. But in the case of |
@alejandroclaro, could you provide a sample gyp file to do this? |
Electron and crypto-async
I can't get this lib to work with Electron. I made a basic project reproducing my problem here
Bug Description
I can't use the module without recompiling it because, the following code crashes when executed with electron but works perfectly fine when executed on node directly.
I've tested on both Windows (Windows 10) and Mac OS (El Capitan) and observed two different behaviors (I'm guessing cause MacOS uses the system openssl)
cryptoAsync.cipher
method call throws an exceptionHow to reproduce
npm i
npm run start-electron
to execute with electronnpm run start-node
to execute with nodeCauses
As far as I can tell both errors seems to originate from the same line in
binding.c
in the@ronomon/crypto-async
repo :On windows the
EVP_get_cipherbyname
method crashes, on Mac it returnsnull
This seems to be the result of the differences with the bundled version of node in electron.
Rebuilding for Electron
I've also tried to rebuild the native module for electron using the following commands
But the build fails cause
openssl/err.h
and others openssl headers file cannot be found.It seems that electron now uses
boringssl
instead ofopenssl
and does not export the same headers/symbols that Node does.From the different issues I've come accross on github, I can only think of two solutions (let me know If you can think of any other workaround):
Wait until electron exports those symbols/headers and do this in the meantime
Try to bundle openssl/boringssl with the module
The text was updated successfully, but these errors were encountered: