-
Notifications
You must be signed in to change notification settings - Fork 172
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request [rust]: allow specifying TLS flavour to use #889
Comments
Thanks @msdinit! We actually explicitly switched away from rustls to openssl because it was causing issues. Take a look at #704, and let me know your thoughts.
|
Ah, I see. Did not notice that as I only searched through the issues, not PRs :) Regardless though, the PR you linked deals with the Would you be open to having rustls as a non-default option for the client only? I believe the overhead should be minimal (rename dependencies as |
Oh, sorry, I misread your request. 100%, we can easily change that, and potentially even make rustls the default. I didn't realize we were using openssl for that. Yeah, should be trivial. |
Awesome, thank you! |
The following patch seems that it does what is necessary, I have then ran three commands making sure the dependencies did or did not appear on the dependency tree as expected:
|
Oh awesome @marcoslopes, mind opening a PR? We would love to merge it. |
// only the default-tls cargo tree // both since features are additive cargo tree --features rustls-tls // only rustls-tls cargo tree --features rustls-tls --no-default-features closes svix#889
// only the default-tls cargo tree // both since features are additive cargo tree --features rustls-tls // only rustls-tls cargo tree --features rustls-tls --no-default-features closes svix#889
// only the default-tls cargo tree // both since features are additive cargo tree --features rustls-tls // only rustls-tls cargo tree --features rustls-tls --no-default-features closes #889 ## Motivation Bellow is verbatim copy from issue #889 created by @msdinit We are building our application against musl, cross-compiling it from regular libc Ubuntu. However, we are having issues with svix client, because it depends on system OpenSSL, which in our case would be linked against libc. There sfackler/rust-openssl#603, but they are a bit involved. ## Solution Added cargo features allowing users to choose which ssl version to use for svix reqwest http client, keeping backwards compatibility.
// only the default-tls cargo tree // both since features are additive cargo tree --features rustls-tls // only rustls-tls cargo tree --features rustls-tls --no-default-features closes #889 ## Motivation Bellow is verbatim copy from issue #889 created by @msdinit We are building our application against musl, cross-compiling it from regular libc Ubuntu. However, we are having issues with svix client, because it depends on system OpenSSL, which in our case would be linked against libc. There sfackler/rust-openssl#603, but they are a bit involved. ## Solution Added cargo features allowing users to choose which ssl version to use for svix reqwest http client, keeping backwards compatibility.
Feature Request
Motivation
We are building our application against musl, cross-compiling it from regular libc Ubuntu. However, we are having issues with svix client, because it depends on system OpenSSL, which in our case would be linked against libc. There are workarounds, but they are a bit involved.
Proposal
Allow user to choose whether
openssl
orrustls
version ofreqwest
will be used by the svix clientAlternatives
Alternative is to either vendor openssl, comiling it each time, or to use a pre-made Docker image with openssl compiled against musl included. However, we are already using reqwest with
rustls
, and would like to avoid having both flavours in the dependency tree, as well as extra complexity in the build pipeline.The text was updated successfully, but these errors were encountered: