!UNVBThoJtlIiVwiDjU:nixos.org

Staging

318 Members
Staging merges | Find currently open staging-next PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+sort%3Aupdated-desc+head%3Astaging-next+head%3Astaging-next-21.05+is%3Aopen109 Servers

Load older messages


SenderMessageTime
20 Sep 2025
@emilazy:matrix.orgemilywell, they don't have a super explicit preference16:07:25
@emilazy:matrix.orgemilythey support multiple things16:07:31
@emilazy:matrix.orgemilyin theory they consider ngtcp2 + any TLS backend to be non-experimental I think16:07:41
@pyrox:pyrox.devdish [Fox/It/She]well yeah but i mean coverage in ci16:07:50
@pyrox:pyrox.devdish [Fox/It/She]as you mentioned in the PR comments16:07:57
@emilazy:matrix.orgemilybut it seems like they generally want to converge on ngtcp2 + OpenSSL16:08:00
@pyrox:pyrox.devdish [Fox/It/She]sorry bad wording on my part16:08:03
@emilazy:matrix.orgemily ok, this regresses nghttp2.override { enableHttp3 = true; } 16:09:17
@emilazy:matrix.orgemily cc Marie 16:09:24
@emilazy:matrix.orgemilyit looks like upstream supports OpenSSL backend there but maybe we need to bump version16:09:38
@emilazy:matrix.orgemilyoh16:09:46
@emilazy:matrix.orgemily
    ++ lib.optionals (enableApp && !enableHttp3) [ openssl ]
16:09:47
@emilazy:matrix.orgemilyor just fix this16:09:51
@emilazy:matrix.orgemily and drop quictls 16:10:05
@emilazy:matrix.orgemily (arguably we should just quictls: drop, only other user than these is HAProxy and HAProxy 3.2 supports QUIC with OpenSSL 3.5 it looks like) 16:11:27
@emilazy:matrix.orgemily(though that would be the native OpenSSL QUIC which apparently still has some weirdness, so AWS-LC is another option)16:11:51
@pyrox:pyrox.devdish [Fox/It/She]yeah openssl quic is... rough16:12:06
@pyrox:pyrox.devdish [Fox/It/She]aws lc would be a good option in that case if we drop quictls16:12:22
@emilazy:matrix.orgemilyhttps://github.com/haproxy/haproxy/commit/bbe302087ccc1471a97d88ec1c24fbc55e4d1c51 they do sort of imply OpenSSL 3.5 is preferred upstream though16:13:16
@marie:marie.cologneMarie I'll have a look right after this mesa build 16:15:00
@emilazy:matrix.orgemily nix build --impure --expr 'with import (builtins.getFlake ("github:NixOS/nixpkgs/pull/435914/head")) {}; (nghttp2.override { enableHttp3 = true; }).overrideAttrs (p: {src = fetchurl {url = "https://github.com/nghttp2/nghttp2/releases/download/v1.67.1/nghttp2-1.67.1.tar.bz2"; hash = "sha256-37cg1CQ6eVBYn6JjI3i+te6a1ELpS3lLO44soowdfio=";}; buildInputs=lib.filter (d: d.pname!="quictls") p.buildInputs ++ [openssl];})'

configure: Requested 'libngtcp2_crypto_ossl >= 1.15.0' but version of libngtcp2_crypto_ossl is 1.14.0
🫠
16:15:44
@emilazy:matrix.orgemily bump ngtcp2 and nghttp2 and we should be good 16:16:05
@emilazy:matrix.orgemilyhttps://github.com/haproxy/haproxy/blob/34cdc5e191784cdae671a6c337fd4385522855af/INSTALL#L28-L3916:19:37
@emilazy:matrix.orgemilydunno, it seems like HAProxy basically suggests people use OpenSSL 3.5 QUIC16:19:50
@emilazy:matrix.orgemilybut AWS-LC may be the safe choice16:20:37
@emilazy:matrix.orgemily"Three OpenSSL derivatives called LibreSSL, QUICTLS, and AWS-LC are reported to work as well. While there are some efforts from the community to ensure they work well, OpenSSL remains the primary target and this means that in case of conflicting choices, OpenSSL support will be favored over other options. Note that QUIC is not fully supported when haproxy is built with OpenSSL < 3.5 version. In this case, QUICTLS is the preferred alternative. As of writing this, the QuicTLS project follows OpenSSL very closely and provides update simultaneously, but being a volunteer-driven project, its long-term future does not look certain enough to convince operating systems to package it, so it needs to be build locally. See the section about QUIC in this document."16:20:55
@emilazy:matrix.orgemilyseems like a pretty explicit recommendation for OpenSSL 3.5 even for QUIC16:21:04
@marie:marie.cologneMarie
As of writing this, the QuicTLS project follows OpenSSL very closely and provides
update simultaneously
16:25:40
@marie:marie.cologneMarie
As of writing this, the QuicTLS project follows OpenSSL very closely and provides update simultaneously
16:25:43
@marie:marie.cologneMariethats a bit outdated from what I've heard16:25:55

Show newer messages


Back to Room ListRoom Version: 6