-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GSOC 2025 ideas #1058
Comments
What about porting the |
It's a good idea although maybe even too simple :) |
@wolfv add Complexity, Duration, Mentors, Required Skills, and Expected Outcomes. |
Hi @henrykironde - added the missing fields - sorry! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
rattler WASM
We would love to have a WASM build of rattler. We have a prototype, but it has a lot of rough edges.
A fully functional WASM build of rattler would be able to:
resolvo
resolverThe prospective student will have to make changes across rattler to support WASM, and potentially in some dependencies of rattler, too.
The motivating use cases are as an alternative to
picomamba
in the emscripten-forge project, as well as to serve as a backend for a Dependabot integration.Expected outcomes:
The expected outcome of this work would be a version of rattler that can run easily in the browser or another WASM runtime. We expect a few patches to rattler itself, as well as dependencies of rattler (such as the Rust bindings to bzip2, zstd, and more). Most importantly, it would be great to demonstrate that the SAT solver at the core of
rattler
(resolvo
) can run fine in WASM. If time permits, we would add some TypeScript bindings to start the integration with Dependabot.Complexity: Hard
Duration: 350 Hours
Mentors: @wolfv / @baszalmstra
Required Skills: Build systems, Rust
rattler speed and security improvements
We would love for someone to take another look at security and speed in rattler.
We already ship
rattler_sandbox
for lightweight process sandboxing, but we have yet to roll it out to all function in the rattler codebase. It would be especially useful when executing arbitrary package scripts, such asactivation
scripts,post-link
andpre-unlink
scripts.Furthermore, we would also like to implement sandboxing for Windows, which is a bigger topic, but highly interesting.
Expected outcomes
When the project is finished, the mutating parts of rattler (such as installing packages) can pass an optional "sandbox" configuration parameter. If the parameter is set to true, then certain actions (such as running activation scripts or post-link scripts) are executed in a special sandbox that makes sure that the script has no network access and cannot write outside of a constrained set of locations.
If time permits, we take another look at sandboxing on Windows, and add support for a Windows sandbox using windows AppJail.
Complexity: Hard
Duration: 350 Hours
Mentors: @wolfv / @baszalmstra
Required Skills: Rust
The text was updated successfully, but these errors were encountered: