ream_uniq_id sample fetch, it is a good idea to add it. In fact,
when it makes sense, a log variable must also be accessible via a sample fetch.
Tim's remarks about the patch are valid. For the scope, INTRN or L4CLI, I don't
know. I'm inclined to choose INTRN.
--
Christopher Faulet
Le 6/1/21 à 12:35 AM, Aleksandar Lazic a écrit :
Fix alphabetical order of uuid
merged now, thanks !
--
Christopher Faulet
t; value is displayed as an IPv4 while it should be an IPv6. Could you
check your agent is properly decoding IPv6 values ?
You may also try to do a network capture between HAProxy and your agent.
--
Christopher Faulet
Le 7/3/21 à 10:22 AM, David CARLIER a écrit :
Hi here a follow-up of the previous patch but this time for OpenBSD.
Thanks, applied now !
--
Christopher Faulet
If you don't specify a username (it is deprecated and not recommended), the
check only consists in parsing the Mysql Handshake Initialization packet or
Merged now, thanks !
--
Christopher Faulet
ow if it is acceptable or not to change the
log level.
I guess that if no one has a better idea or any objections about this change,
you can provide a patch.
--
Christopher Faulet
apply scheme-based normalization on h1 requests
MEDIUM: h2: apply scheme-based normalization on h2 requests
REGTESTS: add http scheme-based normalization test
Christopher Faulet (19):
BUG/MINOR: server-state: load SRV resolution only if params match the
config
BUG/MINOR: server: For
ttp_fetch: fix possible uninit sockaddr in fetch_url_ip/port
BUG/MAJOR: server: prevent deadlock when using 'set maxconn server'
BUG/MINOR: stick-table: insert srv in used_name tree even with fixed id
BUG/MAJOR: server: fix deadlock when changing maxconn via agent-check
G/MAJOR: server: fix deadlock when changing maxconn via agent-check
REGTESTS: fix maxconn update with agent-check
Christopher Faulet (35):
BUG/MINOR: hlua: Don't rely on top of the stack when using Lua buffers
BUG/MINOR: stream: Decrement server current session counter on L7 re
sockaddr in fetch_url_ip/port
BUG/MAJOR: server: prevent deadlock when using 'set maxconn server'
BUG/MINOR: stick-table: insert srv in used_name tree even with fixed id
BUG/MAJOR: server: fix deadlock when changing maxconn via agent-check
Christopher Faulet (34):
m the HTX
representation. It counted for 1 byte. This explains the difference of 5 bytes
between 2.3 and 2.4.
--
Christopher Faulet
5. This API is really experimental for now,
but it may be a solution to analyze the whole message payload, regardless its
size. However, It may be painful because the API may be incomplete and because
dealing with multiple buffers is not simple, especially if you don't want to
forward the payload before the end of analysis.
--
Christopher Faulet
Le 9/14/21 à 3:14 AM, Ryan Burn a écrit :
On Thu, Sep 9, 2021 at 12:22 AM Christopher Faulet <mailto:cfau...@haproxy.com>> wrote:
Le 8/11/21 à 2:53 AM, Ryan Burn a écrit :
> I'm working on integrating HAProxy with traceable.ai
<http://traceable.ai> <
/flt_spoe.c
@@ -17,6 +17,7 @@
#include
#include
#include
+#include
#include
#include
#include
Thanks Tim! Both patches merged now.
--
Christopher Faulet
l
give you several hints.
Regards,
--
Christopher Faulet
docs that haproxy does not support HTTP/1.1 pipelining.
I agree. Pipelining should at least be removed from "option http-server-close"
description. And section 1.1 should be reword to be clear on this point.
--
Christopher Faulet
MINOR: server: implement a refcount for dynamic servers
MINOR: global: define MODE_STOPPING
BUG/MINOR: server: do not use refcount in free_server in stopping mode
MINOR: server: return the next srv instance on free_server
BUG/MINOR: stats: use refcount to protect dynamic se
Le 10/2/21 à 10:54 AM, Matthias Fechner a écrit :
Am 01.10.2021 um 18:09 schrieb Christopher Faulet:
HAProxy 2.4.5 was released on 2021/10/01. It added 69 new commits
after version 2.4.4.
Damned ! You're right...
It is a typo in the commit feca2a453 ("BUG/MINOR: filters: Always s
Le 10/3/21 à 9:06 AM, Vincent Bernat a écrit :
❦ 3 October 2021 08:53 +02, Christopher Faulet:
I will push a fix. As a workaround, you can temporarily disable the HTTP
compression filter.
Will you release 2.4.6 or should we push packages for 2.4.5 with the
patch? For Debian/Ubuntu, I
Le 10/3/21 à 7:46 PM, Matthias Fechner a écrit :
Am 03.10.2021 um 08:53 schrieb Christopher Faulet:
Damned ! You're right...
It is a typo in the commit feca2a453 ("BUG/MINOR: filters: Always set FLT_END
analyzer when CF_FLT_ANALYZE flag is set"). It also affects the 2.5-DEV.
y, it was reported after the 2.4.6 was
released. We try to figure out if it is a major problem or not for now. But it
crashes HAProxy. So, a 2.4.7 will probably be released very soon.
--
Christopher Faulet
tp://git.haproxy.org/?p=haproxy-2.4.git
Changelog: http://www.haproxy.org/download/2.4/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Christopher Faulet (2):
BUG/MEDIUM: http-ana: Clear request analyzers when applying redire
bles. Thus, you can
indeed rely on "%si". But you must use 2.2.14 or newer.
--
Christopher Faulet
nic_safe);
+ }
+
return 0;
err2:
Thanks Tim, now merged !
--
Christopher Faulet
ttp2 or is it by design and just the
documentation might need some clarification here.
Hi,
It should work. What is your HAProxy version ?
--
Christopher Faulet
Le 10/15/21 à 12:04 PM, Björn Jacke a écrit :
On 15.10.21 10:10, Christopher Faulet wrote:
It should work. What is your HAProxy version ?
2.4.7
Björn
Sorry Björn, I missed your reply. It is strange, there is no known bug in this
area for now. There is probably something in the request
such error is encountered, HAProxy returns a 500-Internal-Error response.
You can change that to make it fails silently. To do so, take a look at the
"strict-mode" http-response action.
--
Christopher Faulet
ce where a 500 is possible with the PH termination
state. If you are using http-after-response rules, it may explain this error.
However, share your redacted configuration too. It can help me to explain what
you observe.
--
Christopher Faulet
Le 10/20/21 à 01:24, Björn Jacke a écrit :
Hi,
On 19.10.21 11:06, Christopher Faulet wrote:
Sorry Björn, I missed your reply. It is strange, there is no known bug
in this area for now. There is probably something in the request or
response headers preventing the compression to be enabled.
I
Ls will be rejected while
it works today:
http-request set-var(txn.foo) str("forbidden")
http-request deny if { var(txn.foo) "forbidden" }
With the proposed change, "-m str" will be required.
--
Christopher Faulet
Le 11/4/21 à 21:12, Tim Duesterhus a écrit :
This patch effectively is identical to 7ba98480cc5b2ede0fd4cca162959f66beb82c82.
Merged, thanks Tim!
--
Christopher Faulet
.io/haproxy-dconv/
---
Complete changelog :
Amaury Denoyelle (3):
BUILD: ist: prevent gcc11 maybe-uninitialized warning on istalloc
BUG/MINOR: server: allow 'enable health' only if check configured
BUILD: fix compilation on NetBSD
Christopher Faulet (31):
BUG/M
ntation. I will add backports
info in the commit message and merge it. Thanks !
--
Christopher Faulet
ernative mux_ops param for conn_install_mux_be
MEDIUM: server/backend: implement websocket protocol selection
MINOR: server: add ws keyword
Christopher Faulet (10):
DOC: config: Fix typo in ssl_fc_unique_id description
BUG/MINOR: http-ana: Apply stop to the current section fo
aproxy.org/download/2.3/src/
Git repository : http://git.haproxy.org/git/haproxy-2.3.git/
Git Web browsing : http://git.haproxy.org/?p=haproxy-2.3.git
Changelog: http://www.haproxy.org/download/2.3/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
prepend_path_list.
*/
- for (size_t i = 0; i < 2; i++) {
+ for (i = 0; i < 2; i++) {
lua_State *L = hlua_states[i];
const char *error;
Thanks, merged now with backports info updated.
--
Christopher Faulet
-2.2.git/
Git Web browsing : http://git.haproxy.org/?p=haproxy-2.2.git
Changelog: http://www.haproxy.org/download/2.2/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Christopher Faulet (11):
BUG/MEDIUM: stream-int: Block reads if
configure ssl on server at runtime"). During the post-parsing stage, when the
configuration is validated, we rely on the last "default-server" line parsed in
the backend section to finalize the SSL configuration of servers in this
backend. It is of course a bug. We may probably rely on a flag instead. I'll
investigate.
Thanks !
--
Christopher Faulet
this issue. It will be backported ASAP. In the mean time, the patch
for the 2.4 is attached to this mail.
--
Christopher FauletFrom 7f689d5265a973d66b702e57ba02e866c1db400c Mon Sep 17 00:00:00 2001
From: Christopher Faulet
Date: Wed, 1 Dec 2021 09:50:41 +0100
Subject: [PATCH] BUG/MINOR: server:
gth,
decoded_header->area, decoded_header->size);
if (ret == -1)
Thanks, merged now !
--
Christopher Faulet
ble to capture info from
generated responses at this stage. However, it is probably possible to add a
"capture" action to the "http-afer-response" ruleset. This would able to you to
capture your header with the following config:
declare capture response len 4
http-after-response capture hdr(dst_conn) id 0
At first glance it seems trivial. I will check that.
--
Christopher Faulet
Le 12/6/21 à 08:25, Christopher Faulet a écrit :
Le 12/4/21 à 13:25, Aleksandar Lazic a écrit :
Hi.
I try to capture the response header "dst_conn" from "http-request return" but
in %hs isn't the value.
```
podman logs -f haproxy-dest
[NOTICE] (1) : New worker
issue. I'm unable to reproduce the spinning loop but I can
freeze infinitely a stream. It is probably just a matter of timing. On my side,
it is related to L7 retries. Could you confirm you have a "retry-on" parameter
in your configuration ?
Thanks !
--
Christopher Faulet
Le 1/4/22 à 10:26, Aleksandar Lazic a écrit :
On 04.01.22 10:16, Christopher Faulet wrote:
Le 12/25/21 à 23:59, Aleksandar Lazic a écrit :
Hi.
as the message tell us that we should report this to the developers I do so :-)
```
Dec 24 01:10:31 lb1 haproxy[20008]: A bogus STREAM
r FauletFrom 2984ccfc1f5c4ca1157f7a498dcdc7de2f7ba934 Mon Sep 17 00:00:00 2001
From: Christopher Faulet
Date: Mon, 10 Jan 2022 17:27:51 +0100
Subject: [PATCH] BUG/MAJOR: mux-h1: Don't decrement .curr_len for unsent data
A regression was introduced by commit 140f1a585 ("BUG/MEDIUM: mux-h1: Fi
=haproxy-2.4.git
Changelog: http://www.haproxy.org/download/2.4/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Christopher Faulet (1):
BUG/MAJOR: mux-h1: Don't decrement .curr_len for unsent data
William Lallemand (1):
ot;srv->check.use_ssl" is also
changed. I don't remember why this field is updated. But this may prevent any
dynamic change on healtcheck. I must read the code to be sure.
--
Christopher Faulet
p=haproxy-2.5.git
Changelog: http://www.haproxy.org/download/2.5/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Bertrand Jacquin (1):
BUG/MINOR: lua: remove loop initial declarations
Christopher Faulet (15):
BUG/MINOR:
s->check.xprt = s->xprt;
}
#endif /* USE_OPENSSL */
This may be done with the following 3 steps:
* First, stop to change "srv->check.use_ssl" value
* Then, stop to change the agent settings in srv_set_ssl() because there is
no ssl support for agent-check.
* Finally, fix the bug identified by William, adding the according
documentation.
Note I don't know if all this stuff works properly with the server-state file...
--
Christopher Faulet
..
I truly understand :( ...
--
Christopher Faulet
n to the one performed during the request
analysis). And if it should be extended to CONNECT requests. In practice, it is
only an issue for CONNECT requests because the absolue-form is not the common
form for URIs in H1.
--
Christopher Faulet
#x27;if' or
'unless' followed by a condition but found ‘…'.
Hi,
The ACL part in the "http-request return" rule is optional. Otherwise it means
there is a bug in the parser. But, first of all, you should share the failing
rule and the HAProxy version you use.
Thanks,
--
Christopher Faulet
stream: Abort processing if response buffer allocation fails
Willy Tarreau (3):
BUG/MINOR: proxy: preset the error message pointer to NULL in
parse_new_proxy()
REGTESTS: fix the race conditions in 40be_2srv_odd_health_checks
CI: github: enable pool debugging by default
--
Christopher Faulet
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Christopher Faulet (6):
BUG/MINOR: sink: Use the right field in appctx context in release callback
BUG/MEDIUM: resolvers: Really ignore trailing dot in domain names
BUG/MEDIUM: htx: Be sure to have a buffe
} { url_beg /login }
http-response track-sc0 src table table_login_limiter if { capture.req.uri -m
beg /login } { status 401 }
You can also match on the url in an http-request rule to set a variable and use
it in the http-response rule.
Regards,
--
Christopher Faulet
ete changelog :
Andrew McDermott (1):
BUG/MAJOR: http/htx: prevent unbounded loop in
http_manage_server_side_cookies
Christopher Faulet (9):
BUG/MEDIUM: htx: Adjust length to add DATA block in an empty HTX buffer
BUG/MEDIUM: cli: Never wait for more data on client shutdown
BU
n another line.
Both can be specified in the frontend, the backend or split. It depends on your
other rules, if any. With your config snippet, it doesn't matter.
--
Christopher Faulet
-check and the beginning of the following one.
This is independent on the evaluation time. Thus in your example, a health-check
will still run 2s after the end of the previous one, independently on its duration.
--
Christopher Faulet
/
Git repository : http://git.haproxy.org/git/haproxy-2.5.git/
Git Web browsing : http://git.haproxy.org/?p=haproxy-2.5.git
Changelog: http://www.haproxy.org/download/2.5/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Christop
t.haproxy.org/?p=haproxy-2.4.git
Changelog: http://www.haproxy.org/download/2.4/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Christian Ruppert (1):
DOC: Fix usage/examples of deprecated ACLs
Christopher Faulet (12):
uot;
Willy Tarreau (2):
BUG/MINOR: stream: make the call_rate only count the no-progress calls
BUILD: tree-wide: mark a few numeric constants as explicitly long long
--
Christopher Faulet
org/download/2.2/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Christian Ruppert (1):
DOC: Fix usage/examples of deprecated ACLs
Christopher Faulet (9):
BUG/MINOR: hlua: Set conn-stream/channel EOI flags at the end of request
load/2.0/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Alex (1):
DOC: use the req.ssl_sni in examples
Andrew McDermott (1):
BUG/MAJOR: http/htx: prevent unbounded loop in
http_manage_server_side_cookies
Christian Ruppert
t; instead. The same is true when the
server is set to UP state, "2/2 UP" is never reported because "0/3 DOWN" is
reported.
And you're right, with a rise value lower than the fall value it is quicker to
consider a DOWN server as UP than the opposite. But with a rise to 2, we need 2
successful health checks to set a server UP.
--
Christopher Faulet
ttp://www.haproxy.org/l/code-reports
---
Complete changelog :
Aleksandar Lazic (1):
DOC: remove double blanks in configuration.txt
Christopher Faulet (21):
BUG/MINOR: rules: Initialize the list element when allocating a new rule
DOC: config: Explictly add supported MQTT versions
.org/l/reviewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
---
Complete changelog :
Christopher Faulet (19):
DOC: config: Explictly add supported MQTT versions
BUG/MEDIUM: mux-fcgi: Properly handle return value of headers/trailers
parsing
BUG/MEDIUM:
Changelog: http://www.haproxy.org/download/2.3/src/CHANGELOG
Pending bugs : http://www.haproxy.org/l/pending-bugs
Reviewed bugs: http://www.haproxy.org/l/reviewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
---
Complete changelog :
Christopher Faulet (14)
/2.2/src/CHANGELOG
Pending bugs : http://www.haproxy.org/l/pending-bugs
Reviewed bugs: http://www.haproxy.org/l/reviewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
Latest builds: http://www.haproxy.org/l/dev-packages
---
Complete changelog :
Christopher Faulet (12)
offset, and 4th (nonexistent) as length. hlua_http_msg_del_data() also
improperly checks arguments. This patch fixes argument handling in both.
Must be backported to 2.5.
Thanks ! Both patches were merged.
--
Christopher Faulet
.haproxy.org/l/reviewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
Latest builds: http://www.haproxy.org/l/dev-packages
---
Complete changelog :
Boyang Li (2):
BUG/MEDIUM: lua: fix argument handling in data removal functions
DOC/MINOR: fix typos in the lu
rg/download/2.4/src/CHANGELOG
Pending bugs : http://www.haproxy.org/l/pending-bugs
Reviewed bugs: http://www.haproxy.org/l/reviewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
Latest builds: http://www.haproxy.org/l/dev-packages
---
Complete changelog :
Chris
ing-bugs
Reviewed bugs: http://www.haproxy.org/l/reviewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
Latest builds: http://www.haproxy.org/l/dev-packages
---
Complete changelog :
Christopher Faulet (2):
DOC: config: Update doc for PR/PH session states to warn ab
iewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
Latest builds : http://www.haproxy.org/l/dev-packages
---
Complete changelog :
Christopher Faulet (7):
Revert "BUG/MAJOR: mux-pt: Always destroy the backend connection on
detach"
BUG/MEDIUM: http
ves your
issue and also validate everything works fine.
--
Christopher Faulet
counter in "show stat" command output or in the csv export of the HTTP state page.
Regards,
--
Christopher Faulet
Le 6/1/22 à 21:58, Tim Duesterhus a écrit :
This reapplies the xalloc_size.cocci patch across the whole `src/` tree.
Merged. Thanks !
--
Christopher Faulet
buffer. With this solution, it is not
possible to rewrite a too big response body.
If you want to rewrite a large response, you must write a lua filter. It is more
difficult. The API is a bit rough. But it is more versatile.
--
Christopher Faulet
f
mode tcp
server ipwtf localhost:8080
backend cloud-regions.bodge.cloud
mode http
server cr localhost:8080
Hi,
Thanks ! I'm able to reproduce the segfault. I'm on it.
--
Christopher Faulet
there's a write-up
of it at https://dgl.cx/2022/04/showing-you-your-actual-http-request)
I pushed a fix in 2.7-dev :
https://github.com/haproxy/haproxy/commit/82af3c68
It will be backported to 2.6 soon. A 2.6.1 should be released the next week.
Thanks !
--
Christopher Faulet
ny help is appreciated. Thanks in advance.
Hi,
When the health-check is running, the status reported is the last known status
and it is prefixed with an asterisks. In this case the code is set to 0 in the
CSV output. So it is expected. The same is done for the agent-check.
--
Christopher Faulet
excuse me if I miss
any information required to properly identify the problem. If I’m missing
anything - please do let me know.
I would appreciate any help here.
I’m using HAProxy version 2.4.15-7782e23
Thanks ! Indeed, I can confirm the issue. I'll try to fix it soon.
--
Christopher Faulet
Le 7/4/22 à 11:19, Christopher Faulet a écrit :
Le 6/30/22 à 11:47, Krzysztof Kozłowski a écrit :
Hi,
I’m struggling with consecutive early-hint statements defined with if condition.
Considering below configuration:
http-request early-hint Link "<https://example.com/style1.cs
ad Smith (1):
BUILD: makefile: Fix install(1) handling for OpenBSD/NetBSD/Solaris/AIX
Christian Ruppert (1):
BUILD: Makefile: Add Lua 5.4 autodetect
Christopher Faulet (16):
BUG/MINOR: http-ana: Set method to HTTP_METH_OTHER when an HTTP txn is
created
BUG/MINOR: http
.haproxy.org/l/pending-bugs
Reviewed bugs: http://www.haproxy.org/l/reviewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
Latest builds: http://www.haproxy.org/l/dev-packages
---
Complete changelog :
Brad Smith (1):
BUILD: makefile: Fix install(1
Code reports : http://www.haproxy.org/l/code-reports
Latest builds: http://www.haproxy.org/l/dev-packages
---
Complete changelog :
Brad Smith (1):
BUILD: makefile: Fix install(1) handling for OpenBSD/NetBSD/Solaris/AIX
Christian Ruppert (1):
BUILD: Makefile: Add Lua 5.4 au
ler: implement unreachable for older compilers too
BUG/MINOR: cli/stats: add missing trailing LF after JSON outputs
BUG/MINOR: server: do not enable DNS resolution on disabled proxies
BUG/MINOR: cli/stats: add missing trailing LF after "show info json"
MEDIUM: mux-h2: try to coalesce outgoing WINDOW_UPDATE frames
BUG/MINOR: peers/config: always fill the bind_conf's argument
--
Christopher Faulet
ot;embryonic" session is
killed with no connection/ssl error. For instance, an SSL connection rejected
because of a "tcp-request session" rule (so after the SSL handshake). The same
may happen with a listener using the PROXY protocol.
Regards,
--
Christopher Faulet
Le 7/29/22 à 11:21, Tim Düsterhus a écrit :
Hi
On 7/29/22 11:10, Christopher Faulet wrote:
What is your version ? At first glance, I can't find such log message in the
code. It could come from a lua module.
I'm seeing the same for both 2.4.x and 2.6.x. Christian and I had a
short
ly after the server timeout is reached?
Hi,
The 2.2.9 is pretty old. It is affected by 369 known bugs
(http://www.haproxy.org/bugs/bugs-2.2.9.html). You must update it to 2.2.25 first.
Regards,
--
Christopher Faulet
x27;t understand. In your bug report on solr project,
HAProxy logs report HTTP/3.0 requests but the screenshots show HTTP/2.0
requests. And the payload for the 403 response is talking about 50x errors. What
is the 50x.http error file content ?
--
Christopher Faulet
count.
Am I missing something?
Bren
Hi,
It could be good to share your config, at least the part calling your lua
script. But this error can be triggered when the inspect-delay for tcp rules
evaluation is expires. It can also happen when a read error is detected or an
abort with abortonclose option.
--
Christopher Faulet
Le 8/23/22 à 20:08, Bren a écrit :
--- Original Message ---
On Tuesday, August 23rd, 2022 at 4:26 AM, Christopher Faulet
wrote:
It could be good to share your config, at least the part calling your lua
script.
I think these are the only relevant bits:
tcp-request inspect-delay
ere is a bug. I'm able to reproduce it with your lua script. I will fix it
soon.
Thanks !
--
Christopher Faulet
Le 8/29/22 à 12:30, Christopher Faulet a écrit :
There is a bug. I'm able to reproduce it with your lua script. I will fix it
soon.
FYI, I pushed a fix[1] to 2.7-DEV. It will be backported soon.
[1] https://github.com/haproxy/haproxy/commit/4a20972a
--
Christopher Faulet
, health-checks, dns resolution ...).
--
Christopher Faulet
Le 9/19/22 à 21:04, Tim Düsterhus a écrit :
Christopher,
On 9/19/22 20:22, Christopher Faulet wrote:
It is not exactly how it works. When HAProxy is reloaded, it stops to accept new
connections and it closes idle HTTP connections on the server side and also on
the client side. However, on
checks/4be_1srv_smtpchk_httpchk_layer47errors.vtc and
reg-tests/checks/smtp-check.vtc)
Thanks !
--
Christopher Faulet
NOR: Revert part of clarifying samples support per os commit
BUILD: makefile: enable crypt(3) for NetBSD
Christopher Faulet (4):
BUG/MINOR: h1: Support headers case adjustment for TCP proxies
BUG/MINOR: task: Fix detection of tasks profiling in
tasklet_wakeup_after()
BUG/MIN
necessary parts for next time!
Hi,
I merged your patch. Thanks !
--
Christopher Faulet
l API change
MINOR: proxy/listener: support for additional PAUSED state
BUG/MINOR: stats: fixing stat shows disabled frontend status as 'OPEN'
BUG/MEDIUM: server: segv when adding server with hostname from CLI
BUG/MINOR: log: improper behavior when escaping log data
Brad S
1 - 100 of 759 matches
Mail list logo