!UNVBThoJtlIiVwiDjU:nixos.org

Staging

315 Members
Staging merges | Running staging cycles: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+is%3Aopen+head%3Astaging-next+head%3Astaging-next-25.05 | Review Reports: https://malob.github.io/nix-review-tools-reports/108 Servers

Load older messages


SenderMessageTime
20 Sep 2025
@aloisw:julia0815.dealoisw Obviously, because why would you use quictls other than for quic. 16:48:37
@k900:0upti.meK900 I do wonder what the limit is 16:49:36
@marie:marie.cologneMarie pushed now, which changes do you want squashed? 16:49:56
@aloisw:julia0815.dealoisw If you mean nginx, aws-lc requires a patch (included with aws-lc source, but still). 16:52:58
@hexa:lossy.networkhexaiirc haproxy wanted to sell everyone on AWS-LC in https://www.haproxy.com/blog/state-of-ssl-stacks16:57:02
@aloisw:julia0815.dealoisw For nginx that could actually be a reasonable option, if it gets better maintenance in nixpkgs and having the patch is acceptable. 17:00:14
@emilazy:matrix.orgemily I would not be too surprised if somewhere in the GitHub codebase is a line like name != "all-packages.nix" at this point 17:00:24
@emilazy:matrix.orgemilyanyway I don't mind AWS-LC17:00:43
@emilazy:matrix.orgemilyeven for curl I wouldn't necessarily mind it17:00:48
@emilazy:matrix.orgemilybut that's a bigger decision17:00:52
@emilazy:matrix.orgemilythis seems to be prior to them adding 3.5 QUIC support at least17:01:34
@emilazy:matrix.orgemilyso I wonder what they would say now given the advice in their README17:01:42
@aloisw:julia0815.dealoisw Curl is linked into a bunch of other applications, and having two crypto libraries or requiring aws-lc support everywhere might be not so nice. 17:02:12
@emilazy:matrix.orgemilyI think "curl: drop usage of quictls" breaks curl, and "nghttp2: drop usage of quictls" breaks nghttp2 with HTTP/3, until you do "ngtcp2: use openssl instead of quictls", so I would move "ngtcp2: use openssl instead of quictls" after the bumps and squash the other two commits into it17:02:43
@emilazy:matrix.orgemilyright.17:02:54
@emilazy:matrix.orgemily at a certain point it's just deciding to openssl = aws-lc; 17:03:25
@hexa:lossy.networkhexabut do we want aws-lc at the core of so many things17:05:07
@emilazy:matrix.orgemily¯\_(ツ)_/¯17:07:34
@emilazy:matrix.orgemilyhence ^17:07:45
@aloisw:julia0815.dealoisw Judging by the graph labels it was performed during the 3.4 development cycle, so 3.5 didn't even exist yet. Although they mainly seem to be arguing that OpenSSL is slower, and I have no idea whether that has changed with 3.5. 17:21:28
@aloisw:julia0815.dealoisw This will almost certainly break a lot of stuff due to API incompatibility. 17:21:44
@emilazy:matrix.orgemilyright, I just mean that the README updates etc. I pointed to were after the argument they're making there17:25:37
@emilazy:matrix.orgemilyagain… not really seriously proposing this :)17:25:48
@emilazy:matrix.orgemily what to do for Nginx and HAProxy I am shrug about 17:26:04
@emilazy:matrix.orgemilyother than "probably not QuicTLS"17:26:09
@lt1379:matrix.orgLun<del>swap the alias every staging cycle</del>17:26:24
@aloisw:julia0815.dealoisw Given that they recommended quictls there before, while explicitly pointing it out in the article as having the same issues as OpenSSL, there does not seem to be a connection between that article and the README. I guess they just put in the readme what they assumed to be easiest. 17:39:47
@aloisw:julia0815.dealoisw LibreSSL, because every NixOS system already depends on it 17:43:35
@hexa:lossy.networkhexaI really want that fixed 🥲17:44:01
@hexa:lossy.networkhexaThis is netcat-openbsd, right?17:44:18

Show newer messages


Back to Room ListRoom Version: 6