!UNVBThoJtlIiVwiDjU:nixos.org

Staging

317 Members
Staging merges | Find currently open staging-next PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+sort%3Aupdated-desc+head%3Astaging-next+head%3Astaging-next-21.05+is%3Aopen109 Servers

Load older messages


SenderMessageTime
20 Sep 2025
@emilazy:matrix.orgemilyshould be low-risk16:04:18
@emilazy:matrix.orgemilysome question about the appropriate choice of TLS backend on the PR but per my latest comment I don't think that there are actually sensible options other than ngtcp2 + OpenSSL here16:04:50
@hexa:lossy.networkhexaoverdue16:05:10
@emilazy:matrix.orgemilywondering whether nghttp2 will work with the switch16:06:30
@emilazy:matrix.orgemilylooks like it builds at least16:06:36
@emilazy:matrix.orgemily oh, enableHttp3 ? false :) 16:06:58
@pyrox:pyrox.devdish [Fox/It/She]
In reply to @emilazy:matrix.org
some question about the appropriate choice of TLS backend on the PR but per my latest comment I don't think that there are actually sensible options other than ngtcp2 + OpenSSL here
agree with this being the best option considering thats what upstream uses
16:07:05
@pyrox:pyrox.devdish [Fox/It/She]is there info on closure size differences?16:07:20
@emilazy:matrix.orgemilywell, they don't have a super explicit preference16:07:25
@emilazy:matrix.orgemilythey support multiple things16:07:31
@emilazy:matrix.orgemilyin theory they consider ngtcp2 + any TLS backend to be non-experimental I think16:07:41
@pyrox:pyrox.devdish [Fox/It/She]well yeah but i mean coverage in ci16:07:50
@pyrox:pyrox.devdish [Fox/It/She]as you mentioned in the PR comments16:07:57
@emilazy:matrix.orgemilybut it seems like they generally want to converge on ngtcp2 + OpenSSL16:08:00
@pyrox:pyrox.devdish [Fox/It/She]sorry bad wording on my part16:08:03
@emilazy:matrix.orgemily ok, this regresses nghttp2.override { enableHttp3 = true; } 16:09:17
@emilazy:matrix.orgemily cc Marie 16:09:24
@emilazy:matrix.orgemilyit looks like upstream supports OpenSSL backend there but maybe we need to bump version16:09:38
@emilazy:matrix.orgemilyoh16:09:46
@emilazy:matrix.orgemily
    ++ lib.optionals (enableApp && !enableHttp3) [ openssl ]
16:09:47
@emilazy:matrix.orgemilyor just fix this16:09:51
@emilazy:matrix.orgemily and drop quictls 16:10:05
@emilazy:matrix.orgemily (arguably we should just quictls: drop, only other user than these is HAProxy and HAProxy 3.2 supports QUIC with OpenSSL 3.5 it looks like) 16:11:27
@emilazy:matrix.orgemily(though that would be the native OpenSSL QUIC which apparently still has some weirdness, so AWS-LC is another option)16:11:51
@pyrox:pyrox.devdish [Fox/It/She]yeah openssl quic is... rough16:12:06
@pyrox:pyrox.devdish [Fox/It/She]aws lc would be a good option in that case if we drop quictls16:12:22
@emilazy:matrix.orgemilyhttps://github.com/haproxy/haproxy/commit/bbe302087ccc1471a97d88ec1c24fbc55e4d1c51 they do sort of imply OpenSSL 3.5 is preferred upstream though16:13:16
@marie:marie.cologneMarie I'll have a look right after this mesa build 16:15:00
@emilazy:matrix.orgemily nix build --impure --expr 'with import (builtins.getFlake ("github:NixOS/nixpkgs/pull/435914/head")) {}; (nghttp2.override { enableHttp3 = true; }).overrideAttrs (p: {src = fetchurl {url = "https://github.com/nghttp2/nghttp2/releases/download/v1.67.1/nghttp2-1.67.1.tar.bz2"; hash = "sha256-37cg1CQ6eVBYn6JjI3i+te6a1ELpS3lLO44soowdfio=";}; buildInputs=lib.filter (d: d.pname!="quictls") p.buildInputs ++ [openssl];})'

configure: Requested 'libngtcp2_crypto_ossl >= 1.15.0' but version of libngtcp2_crypto_ossl is 1.14.0
🫠
16:15:44
@emilazy:matrix.orgemily bump ngtcp2 and nghttp2 and we should be good 16:16:05

Show newer messages


Back to Room ListRoom Version: 6