-
-
Notifications
You must be signed in to change notification settings - Fork 424
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add docs to identity_key.rs #470
add docs to identity_key.rs #470
Conversation
7674fc4
to
4fb7d02
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
432df90
to
b24ef4f
Compare
rust/protocol/src/identity_key.rs
Outdated
/// Given a trusted identity `self`, verify that `other` represents the same user for the given | ||
/// `signature`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure what you mean by "for the given signature". The signature is used to perform the verification, but if the verification passes, self
and other
represent the same user in all cases, not just regarding this signature.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was trying to clarify why the signature
is needed for this method, and wasn't quite understanding what "alternate" identity was referring to. I have modified this to:
/// Given a trusted identity `self`, verify that `other` represents an alternate identity for
/// this user.
///
/// `signature` must be calculated from [`IdentityKeyPair::sign_alternate_identity`].
It looks like the alternate identity calculation mechanism is consumed in the app somewhere; I'll take a look at documenting that more fully in another PR perhaps.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's part of the Phone Number Privacy project but I don't know if anyone's hooked it up end-to-end on the app side yet. But as usual that's just the current use case; the API's designed for future sorts of "alternate identities" as well.
4298b99
to
b2ca02f
Compare
Since the last round of PRs we've changed libsignal to match the other Signal repositories in developing mostly in private and doing public releases, with external contributions being cherry-picked into the upcoming release's private branch. That's not so great for an ongoing patch series like this one, though. Perhaps we can make a side branch your PRs are targeted to, |
I was just admiring the fact that the development for libsignal is a lot more transparent, and publicly accessible, compared to the clients 🤔 I love the fact that I am able to see developers making PR's for features and reviewing each other's code, it's incredibly educational. so, can I ask, why the change ? |
There wasn't one big reason, but a bunch of small things adding up:
I'm a little sad too, but ultimately while it was nice to have a "fully open" development, that's not really the main goal of the project. The thing we optimize for is "supporting the Signal client apps" rather than "making a model open-source library", and I do think that's the right choice. [This is not something that can be argued with, but if you want to keep discussing it please move that discussion to https://community.signalusers.org, so we can go back to talking about the PR content and how to integrate it!] |
yes, this makes perfect sense..
No need, your answer was quite detailed, thanks for taking the time to write it! |
I have updated the description in the tracking issue #467 to note that I am maintaining a branch named |
b2ca02f
to
16fc650
Compare
16fc650
to
b8c09c1
Compare
Cherry-picked as 9ad2362, will be in the next release! |
Broken out of #287.