-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change max encrypted document and max chunk size #62
Change max encrypted document and max chunk size #62
Conversation
Feedback from call: Add normative language Explain how that limit is calculated (e.g. based on UTF-8 JSON) |
@msporny To make this normative, should the 10MiB limit be moved to https://identity.foundation/edv-spec/#encrypteddocument? |
Yes, it might be better to move the limit there. As an aside, the thing that makes a statement normative or not is the use of the words (all caps): MUST, SHOULD, MAY, RECOMMENDED... and the rest of the IETF RFC normative statement language -- https://www.rfc-editor.org/rfc/rfc2119.html ReSpec (the editing tool) is usually good about only letting you use those statements in normative sections of the specification. If you try to use those words in "informative" sections, like the introduction, it'll complain loudly. :) |
d9a3911
to
ec6b02d
Compare
Good to know! I've updated my PR to include normative text under the Encrypted Document section.
|
Regarding how the limit is calculated - does this standard mandate what character set to use? Should be pick one now? Or maybe we can create an issue to explore this later. |
Yes, a good question. I expect that we may want to pick some place where it's easy to measure... like "on the wire". So, if your HTTP body is above 10MiB, the request is rejected. How the data is stored behind the API is implementation specific, and so will vary depending on optimizations implementations may do. If it were me, I'd limit it to sent/received HTTP body size... then the question becomes, is that uncompressed or compressed HTTP body size? I expect that we might want application front-ends to be able to abort when you go above 10MiB without concern for uncompressed size... that is, we want the application servers to be able to abort using a simple rule... "is the HTTP body I'm receiving going above 10MiB? If so, abort... we don't care if it's compressed or uncompressed via gzip." I'll also note that because we're dealing w/ encrypted blobs, gzip compression isn't expected to provide huge savings. |
@msporny HTTP body size (regardless of compression) sounds like a good idea. To me. Anyone else have any comments? |
@dlongley any thoughts here? |
+1 to HTTP body size. I can't remember if there will be any frustrating edge cases in implementations with |
ec6b02d
to
e2b0c17
Compare
Discussed on the July 22, 2021 WG call:
|
e2b0c17
to
1914ff8
Compare
- Max encrypted document size is now 10MiB (used to be 16MB). - Max chunk size is now 1MiB (wasn't explicitly defined before). - Updated some text to indicate that the limit is on Encrypted Documents, not Structured Documents.
1914ff8
to
5e9fdc1
Compare
Updated this PR to specify the max chunk size. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
closes #22