!UNVBThoJtlIiVwiDjU:nixos.org

Staging

315 Members
Staging merges | Running staging cycles: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+is%3Aopen+head%3Astaging-next+head%3Astaging-next-25.05 | Review Reports: https://malob.github.io/nix-review-tools-reports/108 Servers

Load older messages


SenderMessageTime
20 Sep 2025
@emilazy:matrix.orgemilyhttps://github.com/search?q=repo%3ANixOS%2Fnixpkgs%20quictls&type=code doesn't show Nginx for me either, am I missing something?16:47:24
@aloisw:julia0815.dealoisw (do not read the comment) 16:47:25
@emilazy:matrix.orgemily aha. only for nginxQuic 16:47:46
@emilazy:matrix.orgemilyok, we can punt what to do for that stuff for later.16:48:09
@emilazy:matrix.orgemilyOpenSSL 3.5 or AWS-LC seem like the sensible options.16:48:17
@aloisw:julia0815.dealoisw all-packages.nix is excluded from that due to its size I guess? 16:48:17
@emilazy:matrix.orgemilyit's not even that big any more16:48:30
@emilazy:matrix.orgemily15k lines16:48:32
@emilazy:matrix.orgemilybut yeah I guess16:48:34
@aloisw:julia0815.dealoisw Obviously, because why would you use quictls other than for quic. 16:48:37
@k900:0upti.meK900 I do wonder what the limit is 16:49:36
@marie:marie.cologneMarie pushed now, which changes do you want squashed? 16:49:56
@aloisw:julia0815.dealoisw If you mean nginx, aws-lc requires a patch (included with aws-lc source, but still). 16:52:58
@hexa:lossy.networkhexaiirc haproxy wanted to sell everyone on AWS-LC in https://www.haproxy.com/blog/state-of-ssl-stacks16:57:02
@aloisw:julia0815.dealoisw For nginx that could actually be a reasonable option, if it gets better maintenance in nixpkgs and having the patch is acceptable. 17:00:14
@emilazy:matrix.orgemily I would not be too surprised if somewhere in the GitHub codebase is a line like name != "all-packages.nix" at this point 17:00:24
@emilazy:matrix.orgemilyanyway I don't mind AWS-LC17:00:43
@emilazy:matrix.orgemilyeven for curl I wouldn't necessarily mind it17:00:48
@emilazy:matrix.orgemilybut that's a bigger decision17:00:52
@emilazy:matrix.orgemilythis seems to be prior to them adding 3.5 QUIC support at least17:01:34
@emilazy:matrix.orgemilyso I wonder what they would say now given the advice in their README17:01:42
@aloisw:julia0815.dealoisw Curl is linked into a bunch of other applications, and having two crypto libraries or requiring aws-lc support everywhere might be not so nice. 17:02:12
@emilazy:matrix.orgemilyI think "curl: drop usage of quictls" breaks curl, and "nghttp2: drop usage of quictls" breaks nghttp2 with HTTP/3, until you do "ngtcp2: use openssl instead of quictls", so I would move "ngtcp2: use openssl instead of quictls" after the bumps and squash the other two commits into it17:02:43
@emilazy:matrix.orgemilyright.17:02:54
@emilazy:matrix.orgemily at a certain point it's just deciding to openssl = aws-lc; 17:03:25
@hexa:lossy.networkhexabut do we want aws-lc at the core of so many things17:05:07
@emilazy:matrix.orgemily¯\_(ツ)_/¯17:07:34
@emilazy:matrix.orgemilyhence ^17:07:45
@aloisw:julia0815.dealoisw Judging by the graph labels it was performed during the 3.4 development cycle, so 3.5 didn't even exist yet. Although they mainly seem to be arguing that OpenSSL is slower, and I have no idea whether that has changed with 3.5. 17:21:28
@aloisw:julia0815.dealoisw This will almost certainly break a lot of stuff due to API incompatibility. 17:21:44

Show newer messages


Back to Room ListRoom Version: 6