File: DEVELOPMENT.md

package info (click to toggle)
aws-crt-python 0.28.4%2Bdfsg-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 78,428 kB
  • sloc: ansic: 437,955; python: 27,657; makefile: 5,855; sh: 4,289; ruby: 208; java: 82; perl: 73; cpp: 25; xml: 11
file content (49 lines) | stat: -rw-r--r-- 2,324 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
# Managing Algorithm & Format Changes.

## Backwards Compatibility: Required
Changes must always be backwards compatible. More specifically, servers must always be able to deserialize earlier versions of PskIdentities, otherwise all of the in-flight communications would fail when an upgrade happens.

## Forward Compatibility: Customer Responsibility
We generally do not promise forwards compatibility: A `0.0.1` V1 enabled server might not be able to handshake with a `0.0.2` V2 enabled client. We will strive to maintain forward compatibility, but if there was ever an upgrade from `AES_256_GCM_SIV` to `AES_512_GCM_SIV`, that would not be forward compatible. 

It would be the customer's responsibility to first deploy version 0.0.2 to all servers, and only then would it be safe to enable `PskVersion::V2`. For further
information see the "Versioning" section in the main module docs.

## Example Version Changes
Below are some examples of scenarios that would require a new version change.
- new field: Adding a new field to either PskIdentity or the inner obfuscated fields would require a version change. 
- new obfuscation algorithm: switch the obfuscation algorithm from AES-256-GCM-SIV to some other AEAD algorithm.
- new HMAC algorithm: If s2n-tls exposed a new HMAC based on SHA512, we would need
a new PskVersion to take advantage of it.

All of these version changes could be accomplished with some variation of the following strategy.

```rust
struct PskIdentity {
    // This is a "rearranged" version of the existing wire format. As long as the
    // PskVersion field is first, we can branch on it when parsing.
    psk_version: PskVersion,
    psk_identity_value: PskIdentityValue
}

enum PskIdentityValue {
    V1(PskIdentityV1),
    V2(PskIdentityV2),
}

impl PskIdentityValue {
    /// version specific logic can be handled in the method
    fn deobfuscate_datakey(&self, obfuscation_key: ObfuscationKey) -> Vec<u8> {
        match self {
            Self::V1(v1_struct) => {
                // e.g. assert on the obfuscation_key version or size
            }
        }
    }
}
```

The above code structure would allow the `DecodeValue` and `EncodeValue` traits to work with both variants. Version specific logic can then be handled in the version-specific structs or the `PskIdentityValue` enum.