-
Notifications
You must be signed in to change notification settings - Fork 432
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tracker: Rand 0.7 #715
Comments
If |
Off-topic, and |
It is 8.5 times larger than |
Since there are no separate issues yet I will voice my opinion here:
Considering that platform support and ability to overwrite system RNG will be moved to
Since
It's a bit of shame to remove |
On that topic, having a backup source in Rand may no longer be necessary but is still a nice thing to have. I would prefer using RDRAND over JitterRng now. So I wouldn't say On the other hand, we can't exactly make There is also the question of where We could feature-gate the Yes, a lot of effort was put into Currently To some up: there are a few steps here that would allow us to simplify Rand (the API at least). Should we take them? |
I believe that without clear examples of non-pathological OS RNG failures we should not be considering including fallback by default at all. In other words today's OS RNGs are already "just work" for all common platforms. And even if such examples would have been present, fallback should be considered only on per-target basis. Also I would repeat again, but I don't think it's a good idea to give a preferential treatment to x86-64 targets by hardcoding RDRAND into the most fundamental layer.
Yes, we already have
We could add
I think yes, we should do it. BTW maybe later we should create an announcement on reddit and users forum with planned |
Progress report: we've been making good progress with the distribution work, and were also able to get a faster ChaChaRng (#789). Once #792 and #793 land (soon) a large part of the to-do list will be complete. The remaining blocking issue is #771 on which @newpavlov and myself have yet to reach an agreement (since he hasn't replied in four weeks, at this point I assume he has lost interest). |
We are now close to being ready for a 0.7 pre-release. We should still visit #572 first IMO. Anything else I've missed? (The tracker is out of date; seems my last edit was lost.) After that some work on documentation is needed (especially in the book); this can happen after the pre-release. |
I don't think there is anything else. Is #572 just about documentation? |
It is, though in my mind it is also an API change (not a breaking one but still a significant one), so I'd prefer that done first. |
Found another blocker: we need to make a I'm currently checking other crates (including |
The pre-release is out. Reddit thread: https://www.reddit.com/r/rust/comments/bzp5ib/rand_070_prerelease/ |
|
Please take a look at rust-random/getrandom#34, and if it doesn't help open an issue/PR on the getrandom repo. It may be that we should support both |
worked with |
I think only #828 is missing for the release? It is probably a good idea to have another pre-release, so we can check whether docs.rs works now. |
There's still some doc work needed in the book too. |
0.7 has been published. @vks would you make the reddit announcement? I don't have much time. |
@dhardy |
@newpavlov I just added you to the maintainers team — you should be able to make the release yourself. |
Add
getentropy
crate:OsRng
coderand_os
a wrapper around thisJitterRng
by defaultTarget: resolve #648, #699, #681
Follow-up changes:
EntropyRng
andOsRng
impls withgetrandom
Use getrandom, simplify OsRng, deprecate EntropyRng #765rand_core::Error
and rand_core::Error new version #771, Revise rand_core::Error (alt #771) #800.From<getrandom::Error>
(with feature gate)from_entropy()
function toSeedableRng
getrandom, security and fallback entropy #760from_rng
and value-stability #572 if we do changerand_core
Clean up dependencies:
rand_chacha
,rand_isaac
andrand_xorshift
(Remove deprecations #757, Remove dependence on Xorshift, ChaCha and Isaac crates #759)Distributions:
Result
when moving to another crate Error handling in distribution constructors #581, rand_distr: UseResult
instead of panics #770Float
types Implement distributions for f32 #100, Make distributions generic / impl for f32 #785, Generic distributions: use custom trait #793Poisson
: support FP output and check bound before int conversion (Poisson: Fix undefined behavior and support f64 output #795)Binomial
code torand_distr
(rand_distr: Update binomial distribution implementation #794)Sequences (may slip to later release):
Distribution::sample_iter
(Distribution::sample_iter could use owned values instead of references to be more general #602, Distribution::sample_iter changes #758)Extras which may slip to later versions:
ThreadRng
algorithm Future ofthread_rng
#463, Key erasure AES variant #299, Use ChaCha20 in StdRng and feature-gate SmallRng #792The text was updated successfully, but these errors were encountered: