-
-
Notifications
You must be signed in to change notification settings - Fork 595
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Replace CryptoJS
with Web Crypto
#2501
base: alpha
Are you sure you want to change the base?
Conversation
🚀 Thanks for opening this pull request! |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## alpha #2501 +/- ##
=========================================
Coverage 100.00% 100.00%
=========================================
Files 64 64
Lines 6244 6264 +20
Branches 1452 1453 +1
=========================================
+ Hits 6244 6264 +20 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
crypto-js
with webcrypto
CryptoJS
with Web Crypto
@mtrezza Do you want to plan a Version 7.0.0 release? |
The thing is that we wouldn't be able to upgrade the JS SDK in Parse Server until December 2025 if we merged this. So we can't really merge this so easily with our current branch setup. We could tag this PR for merge on next major release. |
What does the server have to do with this? |
The Parse JS SDK is a dependency of Parse Sever. |
The server has a lot of dependencies, because the SDK breaks doesn’t mean the server breaks. In the case of this PR. You can’t log in on the server, there is no local storage like the browser, there is nothing to encrypt, so this doesn’t break the server. |
The difference is that the Parse JS SDK is a fully exposed API in Cloud Code, not merely a "hidden" dependency (which we want to change). The "hidden" dependencies are tested indirectly through the Parse Server API tests. The fully exposed JS SDK API may not be completely tested in Parse Server because not all of its APIs apply there, as you mentioned. Because of that risk, major version increments in tandem are safer. If we decide to go ahead and merge a major version upgrade of the JS SDK, we'd need to make sure that even ineffective APIs of the JS SDK do not break anything, for example methods that wouldn't make sense to be called in Cloud Code, but fail gracefully or have no effect at all. I agree that we could do the upgrade, but it requires some extra care. And it would need to be a dedicated major release, meaning we cannot combine it with other breaking changes, as we usually would do to minimize the number of major releases. Are there any other PRs that should go into a 7.0.0 release? |
For version 7.0.0
|
Signed-off-by: Diamond Lewis <[email protected]>
Which one of these are breaking and are there interdependencies? If only this crypto PR is breaking, then we can do a 7.0.0 release without waiting for the other ones. Since this is a "special" major release, it would make it also easier to control. |
Pull Request
Issue
Active development of CryptoJS has been discontinued. Nowadays, NodeJS and modern browsers have a native
crypto
module. This allows the SDK to have isomorphic encryption.Closes: #2494
Approach
Parse.enableEncryptedUser()
,Parse.encryptedUser
,Parse.isEncryptedUser
as they are not needed Breaking Changecrypto-js
andreact-native-crypto-js
Due to the encryption and decryption method being different, developers who used this feature before won't be able to decrypt users that are already logged in but not cached on disk. I'm not sure how many developers were using this feature as it was undocumented. There are two ways for devs to solve this.
Tasks