Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix and defend wasm code using wasi platform #136

Merged
merged 1 commit into from
Sep 1, 2024

Conversation

ctz
Copy link
Member

@ctz ctz commented Aug 30, 2024

This avoids all the annoyance with the wasm32-unknown-unknown platform, and arguably wasi is more typical for a networked application.

This PR is a variation on #122.

@ctz ctz force-pushed the jbp-check-wasm-using-wasi-platform branch 2 times, most recently from aeba11f to 8fb6f48 Compare August 30, 2024 15:25
@ctz ctz force-pushed the jbp-check-wasm-using-wasi-platform branch from 8fb6f48 to d356a59 Compare August 30, 2024 15:43
@complexspaces
Copy link
Collaborator

I think these changes make a lot of sense given that browser's don't let WASM/JS control what TLS roots are trusted, make raw network connections, etc. Thanks for the proposal :)

It might be worth figuring out how to keep CI happy for wasm32-unknown-unknown to make downstream user's conditional compilation easier but that is just a nice to have.

@complexspaces complexspaces merged commit 4c758e1 into main Sep 1, 2024
20 checks passed
@djc djc mentioned this pull request Sep 2, 2024
@cpu cpu deleted the jbp-check-wasm-using-wasi-platform branch September 3, 2024 15:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants