Skip to content

Decouple common_ssl from common_secret#5524

Closed
bdecoste wants to merge 1 commit intoenvoyproxy:masterfrom
bdecoste:common_secret
Closed

Decouple common_ssl from common_secret#5524
bdecoste wants to merge 1 commit intoenvoyproxy:masterfrom
bdecoste:common_secret

Conversation

@bdecoste
Copy link
Copy Markdown
Contributor

@bdecoste bdecoste commented Jan 7, 2019

Signed-off-by: William DeCoste bdecoste@gmail.com

For an explanation of how to fill out the fields, please see the relevant section
in PULL_REQUESTS.md

Description: As part of the work to support openssl this PR decouples the dependency of common/secret on common/ssl. This is one step that will enable the linking and testing of openssl with a new transport socket for openssl. The common/secret package did not require the common/ssl components that depended on the ssl libraries. The classes required by common/secret were moved into a new common/certificate package.
Risk Level: Low
Testing: Standard tests passed
Docs Changes: None
Release Notes: None
[Optional Fixes #Issue]
[Optional Deprecated:]

Signed-off-by: William DeCoste <bdecoste@gmail.com>
@lizan lizan self-assigned this Jan 7, 2019
Copy link
Copy Markdown
Member

@lizan lizan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@bdecoste The goal is to make we can compile without BoringSSL. How about do the opposite by moving BoringSSL dependent part to source/extensions/transport_sockets/ssl and keep common/ssl with common TLS config stuff? I know there will be more code to be moved, though it will be clearer that the BoringSSL is as an extension and easier to spot the code pulls in BoringSSL. WDYT?

@bdecoste
Copy link
Copy Markdown
Contributor Author

bdecoste commented Jan 8, 2019

OK, that makes sense. I was trying to minimize the code impact to isolate the boringssl. I'll close this PR and move all of the boringssl dependent code to extensions. That fits with what I've done locally for openssl since I've created source/extensions/transport_sockets/openssl

@bdecoste bdecoste closed this Jan 8, 2019
lizan pushed a commit that referenced this pull request Jan 16, 2019
*Description*: As part of the work to support openssl this PR moves all boringssl dependencies to extensions. This is one step that will enable the linking and testing of openssl with a new transport socket for openssl. Those files with boringssl dependencies were moved from common/ssl to extensions/transport_sockets/ssl with similar changes for the tests. Please see #5524 for additional context. 

*Risk Level*: Low
*Testing*: Standard tests passed
*Docs Changes*: None
*Release Notes*: None

Signed-off-by: William DeCoste <bdecoste@gmail.com>
fredlas pushed a commit to fredlas/envoy that referenced this pull request Mar 5, 2019
*Description*: As part of the work to support openssl this PR moves all boringssl dependencies to extensions. This is one step that will enable the linking and testing of openssl with a new transport socket for openssl. Those files with boringssl dependencies were moved from common/ssl to extensions/transport_sockets/ssl with similar changes for the tests. Please see envoyproxy#5524 for additional context. 

*Risk Level*: Low
*Testing*: Standard tests passed
*Docs Changes*: None
*Release Notes*: None

Signed-off-by: William DeCoste <bdecoste@gmail.com>
Signed-off-by: Fred Douglas <fredlas@google.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants