Skip to content

hamjin/docker-haproxy-boringssl

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

docker-haproxy-boringssl

Docker Pulls Travis branch

HAProxy built with BoringSSL in a Docker image

Why might you want to use BoringSSL instead of OpenSSL?

  • Match the TLS features available in Google Chrome, e.g. support the TLS version 1.3 draft that Chrome supports.
  • Use BoringSSL's cipher groups which allow the server to choose the client's preferred cipher in certain circumstances (e.g. when a client lacks hardware support for AES, then a faster software implementation of ChaCha20 can be used instead).
  • Some other reason you may have for preferring BoringSSL over OpenSSL :-)

This image is somewhat inspired by "nginx-boringssl", but of course uses HAProxy instead of Nginx. Also, while nginx-boringssl enables many extra features and optimisations, this image does fewer fancy things.

Note: Currently, to build HAProxy against a recent BoringSSL requires using a prerelease version of HAProxy--at the moment this image only tracks* the HAProxy 1.8-dev releases.

Compared to the official HAProxy image, this image:

  • Builds and statically links BoringSSL, tracking* the BoringSSL version used in Chromium stable (as opposed to using the operating system's OpenSSL).
  • Builds against PCRE2 instead of the older "PCRE 3".
  • Enables use of the PCRE2 JIT engine.
  • Is based on newer base images: Debian Stretch/Alpine 3.6 vs. (currently) Debian Jessie/Alpine 3.5 in the official images.

* No promises about speedy updates to HAProxy or BoringSSL. I'm just one person.

About

HAProxy built with BoringSSL in a Docker image

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Dockerfile 95.6%
  • Shell 4.4%