-
Notifications
You must be signed in to change notification settings - Fork 824
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rename unsafe Artifact deserialize functions #3727
Labels
Milestone
Comments
Michael-F-Bryan
added
📦 lib-engine
About wasmer-engine
priority-medium
Medium priority issue
labels
Apr 11, 2023
We agreed to make this change when we do the next breaking change. |
Also need to make the checked functions unsafe again, because loading executable code is inherently unsafe. |
theduke
added a commit
that referenced
this issue
May 22, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 22, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 22, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 22, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 23, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 23, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 23, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 23, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 23, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 23, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 23, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
theduke
added a commit
that referenced
this issue
May 24, 2023
Rework the deserialize/deserialize_checked methods for module deserialization. * Make deserialize() methods use artifact validation * Make checked methods unsafe again, because loading executable memory is inherently unsafe * Rename methods that skip artifact validation to deserialize_unchecked Closes #3727
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
The unsafe methods and functions for deserializing rkyv serialized artifacts should be renamed to more clearly express their dangerous nature, especially since we added
deserialize_checked
methods recently.Preferred name:
dangerous_deserialize_unchecked()
.See #3693 for related discussion.
The text was updated successfully, but these errors were encountered: