-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update nodejs #153
Update nodejs #153
Conversation
Just a note, that libressl patch is still broken. The crypto stuff works, but some TLS tests still fail. |
i'd rather not push something broken to the overlay. |
Understood. It makes sense. |
please fix this!!!!! |
I think the best course of action wrt libressl is to not support it at all at the moment. |
This should probably target v6 (new LTS) and v7 as well. deps needs to be bumped. |
so it's not possible in libressl gentoo system use nodejs? any workaround? |
@dorvan the current state of libressl support in node.js is a very fresh patch that makes it build but also disables some functionality. You will likely also have issues with a system that has both libressl and openssl installed from npm or the test suite (makes assumptions about |
@jbergstroem my comment it's not regarding nodejs in the gentoo/libressl project, but on other distros libressl implementation it's a production reality not only on nodejs but on another problematic/core deps/frequently used packages. looking to frequently used and state-of-art or mainstream packages thay need a priority and a stability about the system profile coherence. Otherwise the risk is to remake the same quest of perl and python migration of 2004/2007 before the definitive design of system infrastructure with python eselect switch (causing looses in community on both developers and users side). or libressl migration can be more "flexible" where openssl and libress can find place on the same system, switching application(for package)/library with an eselect or have to be more convinced and fast. other ways can be like the icu lib update that impacts of the functionalities and coherence of all the installed system, make it broken with any simple maintenance action. |
@dorvan: I'm not sure what you're talking about. All I'm trying to to is to explain the current level of support for libressl in node since I happen to have a pretty good insight in that situation (being a node.js developer and part of the build infra team). |
As an alternative you can use the bundled openssl, but some people say that this is not safe(?). For me is ok though, if we keep updating regularly. Check my overlay for nodejs ebuilds, which has the |
Close due to #154 |
No description provided.