!UNVBThoJtlIiVwiDjU:nixos.org

Staging

317 Members
Staging merges | Find currently open staging-next PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+sort%3Aupdated-desc+head%3Astaging-next+head%3Astaging-next-21.05+is%3Aopen109 Servers

Load older messages


SenderMessageTime
20 Sep 2025
@k900:0upti.meK900And now back to libreoffice mines15:02:43
@hexa:lossy.networkhexaoh, but for bisect15:02:50
@hexa:lossy.networkhexanvm15:02:52
@k900:0upti.meK900(the entire reason I even noticed this was trying to nixpkgs-review the Plasma bump)15:02:56
@grimmauld:grapevine.grimmauld.deGrimmauld (any/all)thats what i ended up doing15:03:17
@emilazy:matrix.orgemilyhow do we feel about putting https://github.com/NixOS/nixpkgs/pull/435914 on the pile16:04:16
@emilazy:matrix.orgemilyshould be low-risk16:04:18
@emilazy:matrix.orgemilysome question about the appropriate choice of TLS backend on the PR but per my latest comment I don't think that there are actually sensible options other than ngtcp2 + OpenSSL here16:04:50
@hexa:lossy.networkhexaoverdue16:05:10
@emilazy:matrix.orgemilywondering whether nghttp2 will work with the switch16:06:30
@emilazy:matrix.orgemilylooks like it builds at least16:06:36
@emilazy:matrix.orgemily oh, enableHttp3 ? false :) 16:06:58
@pyrox:pyrox.devdish [Fox/It/She]
In reply to @emilazy:matrix.org
some question about the appropriate choice of TLS backend on the PR but per my latest comment I don't think that there are actually sensible options other than ngtcp2 + OpenSSL here
agree with this being the best option considering thats what upstream uses
16:07:05
@pyrox:pyrox.devdish [Fox/It/She]is there info on closure size differences?16:07:20
@emilazy:matrix.orgemilywell, they don't have a super explicit preference16:07:25
@emilazy:matrix.orgemilythey support multiple things16:07:31
@emilazy:matrix.orgemilyin theory they consider ngtcp2 + any TLS backend to be non-experimental I think16:07:41
@pyrox:pyrox.devdish [Fox/It/She]well yeah but i mean coverage in ci16:07:50
@pyrox:pyrox.devdish [Fox/It/She]as you mentioned in the PR comments16:07:57
@emilazy:matrix.orgemilybut it seems like they generally want to converge on ngtcp2 + OpenSSL16:08:00
@pyrox:pyrox.devdish [Fox/It/She]sorry bad wording on my part16:08:03
@emilazy:matrix.orgemily ok, this regresses nghttp2.override { enableHttp3 = true; } 16:09:17
@emilazy:matrix.orgemily cc Marie 16:09:24
@emilazy:matrix.orgemilyit looks like upstream supports OpenSSL backend there but maybe we need to bump version16:09:38
@emilazy:matrix.orgemilyoh16:09:46
@emilazy:matrix.orgemily
    ++ lib.optionals (enableApp && !enableHttp3) [ openssl ]
16:09:47
@emilazy:matrix.orgemilyor just fix this16:09:51
@emilazy:matrix.orgemily and drop quictls 16:10:05
@emilazy:matrix.orgemily (arguably we should just quictls: drop, only other user than these is HAProxy and HAProxy 3.2 supports QUIC with OpenSSL 3.5 it looks like) 16:11:27
@emilazy:matrix.orgemily(though that would be the native OpenSSL QUIC which apparently still has some weirdness, so AWS-LC is another option)16:11:51

Show newer messages


Back to Room ListRoom Version: 6