Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Early Adoption the Envoy OpenSSL Version #126

Open
thekief opened this issue Oct 12, 2023 · 9 comments
Open

Early Adoption the Envoy OpenSSL Version #126

thekief opened this issue Oct 12, 2023 · 9 comments

Comments

@thekief
Copy link

thekief commented Oct 12, 2023

As you probably have seen by the other opened issue [1], I am interested in getting the Envoy up and running with the OpenSSL extension. With OpenSSL 1.1.1 being EOL now, Maistra is not a feasible approach for us anymore, so we are looking into early-adopting envoy with the OpenSSL extension.

Me and my colleague monitored the changes you introduced over the last couple months, getting closer to a fully working server. We have seen (and tested) that there are currently a few things open, such as the missing mapping of some BoringSSL errors to OpenSSL ones. We are wondering, if we can help expedite the stabilisation process, to get a bit faster to a fully working release; may it be code contributions or testing, we would like to help a bit.

[1] #66

@twghu
Copy link
Contributor

twghu commented Oct 12, 2023

We are in the final stages of getting a clean build.

It would be fantastic to have someone looking over the build and testing.

@thekief
Copy link
Author

thekief commented Oct 12, 2023

I am not lying, telling you right now that you made my day. Do you have a an approximate timeline when we can look into it? We would not mind applying patches, etc. on my own to get things started.

@twghu
Copy link
Contributor

twghu commented Nov 13, 2023

Let's organize a chat/meet to discuss how we can collaborate.

@thekief
Copy link
Author

thekief commented Nov 24, 2023

Sorry for my late answer. I will contact you on your committer email, this way we will not clutter the Github issues with any unnecessary information.

@vasudev-chavan1
Copy link

Please do include me,
I will be interested in building and testing on s390x architecture.

@wufanqqfsc
Copy link

As you probably have seen by the other opened issue [1], I am interested in getting the Envoy up and running with the OpenSSL extension. With OpenSSL 1.1.1 being EOL now, Maistra is not a feasible approach for us anymore, so we are looking into early-adopting envoy with the OpenSSL extension.

Me and my colleague monitored the changes you introduced over the last couple months, getting closer to a fully working server. We have seen (and tested) that there are currently a few things open, such as the missing mapping of some BoringSSL errors to OpenSSL ones. We are wondering, if we can help expedite the stabilisation process, to get a bit faster to a fully working release; may it be code contributions or testing, we would like to help a bit.

[1] #66

@thekief do your know is this Maistra have any plan to support the openssl 3.0 ?

@thekief
Copy link
Author

thekief commented Dec 13, 2023

@wufanqqfsc you might swap OpenSSL 1.1.1 for OpenSSL 3.0 if you really need to continue with Maistra but as the future is this repository, I highly doubt that there will be any official support for it.

@wufanqqfsc
Copy link

@thekief yes, that's also we want to do . May be swap OpenSSL 1.1.1 for OpenSSL 3.0 is a much better choice. there is no official release now for this project "enovoy-openssl" .
Anyway, the community of "Maistra " seems not very friendly, we have no channel to ask questions and send request.

@twghu
Copy link
Contributor

twghu commented Jan 8, 2024

Regarding OpenSSL Versions, we are only supporting OpenSSL 3. Initially 3.0, although we expect to move to 3.1 in subsequent releases.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants