Re: testing and validating complex haproxy.conf rules

2020-03-31 Thread Dave Cottlehuber
On Tue, 31 Mar 2020, at 07:53, Aleksandar Lazic wrote:
> Hi Dave.
> 
> On 31.03.20 09:24, Dave Cottlehuber wrote:
> > hi all,
> > 
> > Our main haproxy.conf has practically become sentient... it's reached the
> > point where the number of url redirects and similar incantations is very
> > hard to reason about, and certainly not test or validate, until it's
> > shipped. In fact I deploy to a "B" cluster node, and verify most changes
> > on a spare production node. This is not always possible to ensure that
> > existing acls and url redirects aren't broken by the changes.
> > 
> > For example:
> > 
> > https://%[hdr(host)]%[url,regsub(/$,)] ...
> > 
> > didn't do what the person who deployed it thinks it does - easy enough to
> > fix. How could we have tested this locally before committing it?
> > 
> > Is there any easy-ish way to try out these rules, almost like you
> > could in a REPL?
> > 
> > Once we've written them, and committed them to our ansible repos, is there
> > any way to unit test the whole config, to avoid regressions?
> > 
> > 90% of these commits relate to remapping and redirecting urls from patterns.
> 
> Please can you tell us which version of HAProxy and some more details 
> from the config.
> Maybe you can split the redirects, for example can you use a map for 
> the host part.

thanks Aleks,

In this case it's haproxy 2.1, and the config is complex. 

This is a generic problem, not one for a single rule -- I need to find a way
to enable other people "unit test" their changes, before committing, and,
once committed, to avoid breaking production, be able to validate that the
most recent change doesn't break existing functions (more unit tests but
over the whole config). I can spin up a full staging environment if
necessary but I'm hoping somebody has a clever hack to avoid this.

Our newer stuff looks a bit like this with a map file:

  http-requestredirect  code 301  location 
%[capture.req.uri,map(/usr/local/etc/haproxy/redirects.map)] if { 
capture.req.uri,map(/usr/local/etc/haproxy/redirects.map) -m found } 

but there are hundreds of acls that can overlap, or even override the 
straightforward logic of the map. That's what I need to find a way to deal with.

A+
Dave



Re: [PATCH] MINOR: ssl: skip self issued CA in cert chain for ssl_ctx

2020-03-31 Thread William Lallemand
On Thu, Mar 26, 2020 at 06:29:48PM +0100, William Lallemand wrote:
> 
> After some thinking and discussing with people involved in this part of
> HAProxy. I'm not feeling very confortable with setting this behavior by
> default, on top on that the next version is an LTS so its not a good
> idea to change this behavior yet. I think in most case it won't be a
> problem but it would be better if it's enabled by an option in the
> global section.
> 

Hi Manu,

Could you take a look at this? Because I already merged your first
patch, so if we don't do anything about it we may revert it before the
release.

Thanks a lot!

-- 
William Lallemand



Re: [PATCH] DOC: internals: Fix spelling errors in filters.txt

2020-03-31 Thread Willy Tarreau
On Thu, Mar 26, 2020 at 08:51:03PM +0100, Miroslav Zagorac wrote:
> Hello,
> 
> here is attached the patch that corrects several spelling errors in
> doc/internals/filters.txt document.

Thanks Miroslav, now merged.

Willy



Re: [PATCH] BUG/MINOR: stats: Fix color of draining servers on stats page

2020-03-31 Thread Willy Tarreau
On Sat, Mar 28, 2020 at 12:54:39PM -0400, Daniel Corbett wrote:
> This patch fixes #53 where it was noticed that when an active
> server is set to DRAIN it no longer has the color blue reflected
> within the stats page. This patch addresses that and adds the
> color back to drain. It's to be noted that backup servers are
> configured to have an orange color when they are draining.

Thanks Daniel, now merged!

Willy



Re: stable-bot: Bugfixes waiting for a release 2.1 (21), 2.0 (16)

2020-03-31 Thread Julien Pivotto
On 31 Mar 17:14, Willy Tarreau wrote:
> On Tue, Mar 24, 2020 at 04:46:43PM +0100, Tim Düsterhus wrote:
> > > Could you please cut a release ? there are many fixes that just cherry
> > > picking it in my fork would make sense.
> > 
> > I second that. I was already thinking about asking after yesterday's
> > 2.2-dev5.
> 
> I'm aiming at Thursday. Still working on the backports. I know sometimes
> we're lagging behind a lot, but when you consider that backports can take
> up to 50% of the work time, and more importantly that many times it can
> divert you by 3 hours for something that was expected to take 10 seconds,
> it's easy to understand why they're often handled in batches :-/
> 
> Willy

No worries. The goal is not to put pressure on the maintainers, also I
did not insist after my first mail. Take your time, thanks!

-- 
 (o-Julien Pivotto
 //\Open-Source Consultant
 V_/_   Inuits - https://www.inuits.eu


signature.asc
Description: PGP signature


Re: [PATCH] MINOR: config: make strict limits enabled by default

2020-03-31 Thread Willy Tarreau
Hi guys,

On Sat, Mar 28, 2020 at 09:09:17PM +0100, Tim Düsterhus wrote:
> William,
> 
> Am 28.03.20 um 19:32 schrieb William Dauchy:
> > On Sat, Mar 28, 2020 at 7:29 PM Lukas Tribus  wrote:
> >> master is still for 2.2 which is in development. If you want to target
> >> v2.3, you have to wait until 2.2 is released.
> > 
> > oh true, I'm mixing versions, probably because we already started to
> > deploy part of v2.2...
> > 
> > Sorry for that, please ignore this patch :)
> > 
> 
> For 2.1 we used the 'next' branch to already take these type of patches.

You're right, and I've just updated it now with v2 of this patch. We'll
progressively start to queue new patches into -next now. It will get
rebased from time to time.

Thanks!
Willy



Re: stable-bot: Bugfixes waiting for a release 2.1 (21), 2.0 (16)

2020-03-31 Thread Willy Tarreau
On Tue, Mar 24, 2020 at 04:46:43PM +0100, Tim Düsterhus wrote:
> > Could you please cut a release ? there are many fixes that just cherry
> > picking it in my fork would make sense.
> 
> I second that. I was already thinking about asking after yesterday's
> 2.2-dev5.

I'm aiming at Thursday. Still working on the backports. I know sometimes
we're lagging behind a lot, but when you consider that backports can take
up to 50% of the work time, and more importantly that many times it can
divert you by 3 hours for something that was expected to take 10 seconds,
it's easy to understand why they're often handled in batches :-/

Willy



Re: [PATCH] 5th iteration of typo fixes

2020-03-31 Thread Willy Tarreau
On Mon, Mar 23, 2020 at 10:32:29PM +0500,  ??? wrote:
> Hello,
> 
> I can send typo fixes weekly.

Thanks Ilya, now merged!
Willy



Re: [PR] Add missing string length for lua sticktable lookup

2020-03-31 Thread Willy Tarreau
Hi Nathan,

On Mon, Mar 30, 2020 at 02:12:26AM +, Neulinger, Nathan wrote:
> Willy, I never saw any response to this - and don't think any of my responses
> to you ever showed up on the mailing list archive either.

Indeed, I never saw this one. I'll have a look at your resent message
shortly, I need to dive into its context again, and will do it after
I'm done on the pending backports.

Thanks!
Willy



Want to be on top of Search Results?

2020-03-31 Thread Jaclyn Smith
*Hello,*



Hope this email finds you well.



I would like to know if you got my last email Regarding the SEO campaign.
If yes! Please update me on your thoughts for the same, so that we could
discuss further and initiate this campaign shortly.



Look forward to hearing from you soon.



Best Regards,




*Jaclyn Smith Internet Marketer*



*--*
*Note: *If you are not interested to hire our services then reply to this
email with the subject line*“NOT INTERESTED”.*


[image: beacon]


Re: testing and validating complex haproxy.conf rules

2020-03-31 Thread Aleksandar Lazic

Hi Dave.

On 31.03.20 09:24, Dave Cottlehuber wrote:

hi all,

Our main haproxy.conf has practically become sentient... it's reached the
point where the number of url redirects and similar incantations is very
hard to reason about, and certainly not test or validate, until it's
shipped. In fact I deploy to a "B" cluster node, and verify most changes
on a spare production node. This is not always possible to ensure that
existing acls and url redirects aren't broken by the changes.

For example:

https://%[hdr(host)]%[url,regsub(/$,)] ...

didn't do what the person who deployed it thinks it does - easy enough to
fix. How could we have tested this locally before committing it?

Is there any easy-ish way to try out these rules, almost like you
could in a REPL?

Once we've written them, and committed them to our ansible repos, is there
any way to unit test the whole config, to avoid regressions?

90% of these commits relate to remapping and redirecting urls from patterns.


Please can you tell us which version of HAProxy and some more details from the 
config.
Maybe you can split the redirects, for example can you use a map for the host 
part.


A+
Dave


Regards
Aleks



testing and validating complex haproxy.conf rules

2020-03-31 Thread Dave Cottlehuber
hi all,

Our main haproxy.conf has practically become sentient... it's reached the
point where the number of url redirects and similar incantations is very
hard to reason about, and certainly not test or validate, until it's
shipped. In fact I deploy to a "B" cluster node, and verify most changes
on a spare production node. This is not always possible to ensure that
existing acls and url redirects aren't broken by the changes.

For example:

https://%[hdr(host)]%[url,regsub(/$,)] ...

didn't do what the person who deployed it thinks it does - easy enough to
fix. How could we have tested this locally before committing it?

Is there any easy-ish way to try out these rules, almost like you
could in a REPL?

Once we've written them, and committed them to our ansible repos, is there
any way to unit test the whole config, to avoid regressions?

90% of these commits relate to remapping and redirecting urls from patterns.

A+
Dave