[PATCH 16/16] BUG/BUILD: opentracing: fixed OT_DEFINE variable setting

2022-04-07 Thread Miroslav Zagorac
001 From: Miroslav Zagorac Date: Wed, 9 Mar 2022 19:59:15 +0100 Subject: [PATCH 16/16] BUG/BUILD: opentracing: fixed OT_DEFINE variable setting In case of using parameter 'OT_USE_VARS=1', the value of the OT_DEFINE variable is set incorrectly (i.e. the previous value was deleted and a new one

[PATCH 06/16] BUG/MINOR: opentracing: setting the return value in function flt_ot_var_set()

2022-04-07 Thread Miroslav Zagorac
18:42:54 +0100 Subject: [PATCH 06/16] BUG/MINOR: opentracing: setting the return value in function flt_ot_var_set() Function flt_ot_var_set() did not check whether the variable was successfully set or not. In case of failure, the value -1 is returned. --- addons/ot/src/vars.c | 8 +++- 1 f

Re: possible bug in haproxy: backend switching with map file does not work with HTTP/2

2022-03-30 Thread Tim Düsterhus
Jarno, On 3/30/22 14:57, Jarno Huuskonen wrote: Hello, when testing with HTTP/2 we found a behaviour, we did not expect: we use switching between different backends by use of a map file, e.g.: use_backend %[url,map_beg(/etc/haproxy/pool.map,defaultbackend)] With HTTP/1.1 this works

Re: possible bug in haproxy: backend switching with map file does not work with HTTP/2

2022-03-30 Thread Jarno Huuskonen
Hi, On Wed, 2022-03-30 at 12:19 +, Ralf Saier wrote: > Hello, >   > when testing with HTTP/2 we found a behaviour, we did not expect: >   > we use switching between different backends by use of a map file, e.g.: > use_backend %[url,map_beg(/etc/haproxy/pool.map,defaultbackend)] >   > With

possible bug in haproxy: backend switching with map file does not work with HTTP/2

2022-03-30 Thread Ralf Saier
Hello, when testing with HTTP/2 we found a behaviour, we did not expect: we use switching between different backends by use of a map file, e.g.: use_backend %[url,map_beg(/etc/haproxy/pool.map,defaultbackend)] With HTTP/1.1 this works fine in haproxy. But with HTTP/2, it does not work. Here's

Re: Bug: No support of mqtt_is_valid and mqtt_field_value for proxy-protocol connection

2022-03-07 Thread Tim Düsterhus
Hi all On 3/6/22 18:10, Dhruv Jain wrote: I would request you to share a work around if possible until it is fixed. As a heads up: There's an issue in the tracker now. So before replying you might want to check there first: https://github.com/haproxy/haproxy/issues/1598 Best regards Tim

Re: Bug: No support of mqtt_is_valid and mqtt_field_value for proxy-protocol connection

2022-03-06 Thread Tim Düsterhus
Dhruv, On 3/6/22 18:10, Dhruv Jain wrote: In the following mqtt connection flow, mqtt_is_valid and mqtt_field_value is not working as intended. Client -> Google Load Balancer(proxy-protocol enabled) -> HAProxy Currently the connection is rejected if the ACL rule(

Bug: No support of mqtt_is_valid and mqtt_field_value for proxy-protocol connection

2022-03-06 Thread Dhruv Jain
Hi, In the following mqtt connection flow, mqtt_is_valid and mqtt_field_value is not working as intended. Client -> Google Load Balancer(proxy-protocol enabled) -> HAProxy Currently the connection is rejected if the ACL rule( https://pastebin.mozilla.org/TESFMj1b#L57) is mentioned in the

Re: [PATCH] BUG/MINOR: mailers: negotiate SMTP, not ESMTP

2022-02-17 Thread Willy Tarreau
On Thu, Feb 17, 2022 at 03:40:51PM +0100, Lukas Tribus wrote: > As per issue #1552 the mailer code currently breaks on ESMTP multiline > responses. Let's negotiate SMTP instead. Merged, thank you Lukas! Willy

[PATCH] BUG/MINOR: mailers: negotiate SMTP, not ESMTP

2022-02-17 Thread Lukas Tribus
As per issue #1552 the mailer code currently breaks on ESMTP multiline responses. Let's negotiate SMTP instead. Should be backported to 2.0. --- src/mailers.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/mailers.c b/src/mailers.c index 3d01d7532..34eaa5bb6 100644 ---

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-19 Thread William Lallemand
On Wed, Jan 19, 2022 at 03:32:35PM +0100, Willy Tarreau wrote: > Subject: Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with > set server ssl > > On Wed, Jan 19, 2022 at 03:24:44PM +0100, William Lallemand wrote: > > On Tue, Jan 18, 2022 at 12:07:21PM +0100, W

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-19 Thread Willy Tarreau
On Wed, Jan 19, 2022 at 03:24:44PM +0100, William Lallemand wrote: > On Tue, Jan 18, 2022 at 12:07:21PM +0100, Willy Tarreau wrote: > > > > On Mon, Jan 17, 2022 at 07:46:24PM +0100, William Dauchy wrote: > > > Hello Christopher, > > > > > > On Wed, Jan 12, 2022 at 12:45 PM William Dauchy wrote:

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-19 Thread William Lallemand
On Tue, Jan 18, 2022 at 12:07:21PM +0100, Willy Tarreau wrote: > > On Mon, Jan 17, 2022 at 07:46:24PM +0100, William Dauchy wrote: > > Hello Christopher, > > > > On Wed, Jan 12, 2022 at 12:45 PM William Dauchy wrote: > > > my approach was to say: > > > - remove the implicit behavior > > > - then

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-18 Thread Willy Tarreau
On Mon, Jan 17, 2022 at 07:46:24PM +0100, William Dauchy wrote: > Hello Christopher, > > On Wed, Jan 12, 2022 at 12:45 PM William Dauchy wrote: > > my approach was to say: > > - remove the implicit behavior > > - then work on the missing commands for the health checks > > Do you think we can

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-17 Thread William Dauchy
Hello Christopher, On Wed, Jan 12, 2022 at 12:45 PM William Dauchy wrote: > my approach was to say: > - remove the implicit behavior > - then work on the missing commands for the health checks Do you think we can conclude on it? -- William

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-12 Thread William Dauchy
On Wed, Jan 12, 2022 at 10:02 AM Christopher Faulet wrote: > I don't know what is the expected behavior on the stable releases for users. > Honestly, I've misread you patch and kept in mind you alternative solution... > But as said, if there is no implicit change (and I'm fine with this >

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-12 Thread Willy Tarreau
On Wed, Jan 12, 2022 at 10:02:30AM +0100, Christopher Faulet wrote: > I don't know what is the expected behavior on the stable releases for users. > The actual state is buggy because health-check are only updated when ssl is > disabled. When SSL is enabled on a server, there is no implicit change

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-12 Thread Amaury Denoyelle
be different because of implicit changes and it is > pretty hard to predict how it will behave in all cases. > For instance, to fix William's bug about "set server ssl" command, in a way > or another, we must stop to dynamically update the health-check if its port > or its ad

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-12 Thread Christopher Faulet
Le 1/11/22 à 22:47, William Dauchy a écrit : Agree. But, if possible, a warning may be added in the documentation to warn about implicit changes. From the discussion, I would be tempted to say the opposite, as I feel like keeping implicit things for this command is worse. I don't know what

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-11 Thread William Dauchy
ng the order of > commands, the result can be different because of implicit changes and it is > pretty hard to predict how it will behave in all cases. yup totally agree with both of you. I can't really remember why I did that in the first place. > For instance, to fix William's bug ab

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-11 Thread Christopher Faulet
Willy on this point. Especially because, depending the order of commands, the result can be different because of implicit changes and it is pretty hard to predict how it will behave in all cases. For instance, to fix William's bug about "set server ssl" command, in a way or anothe

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-11 Thread Christopher Faulet
Le 1/10/22 à 23:19, Willy Tarreau a écrit : w options were still configurable on the CLI by then. "check-ssl" has been available for a long time, so that's not the reason behind it, but I guess you were referring to something else. I suspect I did a dumb copy/paste from the new_server function

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-10 Thread Willy Tarreau
sl` in your default server. In that sense I believe > it should be backported to v2.4. If you're *certain* that we're not going to break existing 2.4 deployments that could rely on the current behavior, I'm fine with that. It's just that I absolutely hate behavior changes in stable versions because we tend to think we've seen all corner cases, and after a release someone reports an issue :-/ I can't think of a case which would benefit from the current bug, I'm just trying to be careful. Thanks! Willy

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-10 Thread William Dauchy
On Sat, Jan 8, 2022 at 3:03 PM Tim Düsterhus wrote: > Causes issues when applying the patch, because git gets confused and > believes this to be the patch. > I tend to indent this type of "literal code block" within my commit > message with 4 spaces for clarity. indeed, good point, will fix if I

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-09 Thread Willy Tarreau
On Thu, Jan 06, 2022 at 04:57:15PM +0100, William Dauchy wrote: > While giving a fresh try to `set server ssl` (which I wrote), I realised > the behavior is a bit inconsistent. Indeed when using this command over > a server with ssl enabled for the data path but also for the health > check path we

Re: [PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-08 Thread Tim Düsterhus
William, as a heads up, this part of the commit message: On 1/6/22 4:57 PM, William Dauchy wrote: The alternative solution was to restore the previous state, but I believe this will create even more confusion in the future: --- a/src/server.c +++ b/src/server.c @@ -2113,8 +2113,11 @@ void

[PATCH] BUG/MEDIUM: server: avoid changing healthcheck ctx with set server ssl

2022-01-06 Thread William Dauchy
While giving a fresh try to `set server ssl` (which I wrote), I realised the behavior is a bit inconsistent. Indeed when using this command over a server with ssl enabled for the data path but also for the health check path we have: - data and health check done using tls - emit `set server

Re: [PATCH] BUG/MEDIUM: sample: Fix memory leak in sample_conv_jwt_member_query

2021-12-03 Thread Christopher Faulet
Le 12/1/21 à 23:04, Tim Duesterhus a écrit : The function leaked one full buffer per invocation. Fix this by simply removing the call to alloc_trash_chunk(), the static chunk from get_trash_chunk() is sufficient. This bug was introduced in 0a72f5ee7c2a61bdb379436461269315c776b50a, which is 2.5

[PATCH] BUG/MEDIUM: sample: Fix memory leak in sample_conv_jwt_member_query

2021-12-01 Thread Tim Duesterhus
The function leaked one full buffer per invocation. Fix this by simply removing the call to alloc_trash_chunk(), the static chunk from get_trash_chunk() is sufficient. This bug was introduced in 0a72f5ee7c2a61bdb379436461269315c776b50a, which is 2.5-dev10. This fix needs to be backported to 2.5

Re: [PATCH 1/1] BUG/MINOR: lua: remove loop initial declarations

2021-11-25 Thread Christopher Faulet
op iterator to an explicit declaration. No backport needed as this issue was introduced in v2.5-dev10~69 with commit 9e5e586e35c5 ("BUG/MINOR: lua: Fix lua error handling in `hlua_config_prepend_path()`") --- src/hlua.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/hl

Re: [PATCH 1/1] BUG/MINOR: lua: remove loop initial declarations

2021-11-24 Thread Tim Düsterhus
Bertrand, On 11/24/21 10:16 PM, Bertrand Jacquin wrote: No backport needed as this issue was introduced in v2.5-dev10~69 with commit 9e5e586e35c5 ("BUG/MINOR: lua: Fix lua error handling in `hlua_config_prepend_path()`") Oh no, that's mine :-( Actually a backport is needed, b

[PATCH 1/1] BUG/MINOR: lua: remove loop initial declarations

2021-11-24 Thread Bertrand Jacquin
this issue was introduced in v2.5-dev10~69 with commit 9e5e586e35c5 ("BUG/MINOR: lua: Fix lua error handling in `hlua_config_prepend_path()`") --- src/hlua.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/hlua.c b/src/hlua.c index 08735374af77..8dea91e75832 1006

Re: [PATCH] BUG/MINOR: jwt: Fix jwt_parse_alg incorrectly returning JWS_ALG_NONE

2021-11-03 Thread Willy Tarreau
On Wed, Nov 03, 2021 at 12:23:54PM +0100, Remi Tricot-Le Breton wrote: > jwt_parse_alg would mistakenly return JWT_ALG_NONE for algorithms "", > "n", "no" and "non" because of a strncmp misuse. It now sees them as > unknown algorithms. Merged, thank you Rémi! Willy

[PATCH] BUG/MINOR: jwt: Fix jwt_parse_alg incorrectly returning JWS_ALG_NONE

2021-11-03 Thread Remi Tricot-Le Breton
jwt_parse_alg would mistakenly return JWT_ALG_NONE for algorithms "", "n", "no" and "non" because of a strncmp misuse. It now sees them as unknown algorithms. No backport needed. --- src/jwt.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/jwt.c b/src/jwt.c index

[PATCH 2/2] BUG/MINOR: jwt: Fix jwt_parse_alg incorrectly returning JWS_ALG_NONE

2021-10-29 Thread Tim Duesterhus
`"no"`, and `"non"` due to an incorrect check with `strncmp` that also matches prefixes. This bug did not affect the matching of the other known variants, because of the special cased length check at the start of the function. Nonetheless these variants are also affecte

[PR] BUG/MEDIUM: lua: fix invalid return types in hlua_http_msg_get_body

2021-10-23 Thread PR Bot
Dear list! Author: vishnu Number of patches: 1 This is an automated relay of the Github pull request: BUG/MEDIUM: lua: fix invalid return types in hlua_http_msg_get_body Patch title(s): BUG/MEDIUM: lua: fix invalid return types in hlua_http_msg_get_body Link: https://github.com

Re: [PATCH] BUG/MINOR: lua: Fix lua error handling in `hlua_config_prepend_path()`

2021-10-12 Thread Christopher Faulet
Le 10/11/21 à 6:51 PM, Tim Duesterhus a écrit : Set an `lua_atpanic()` handler before calling `hlua_prepend_path()` in `hlua_config_prepend_path()`. This prevents the process from abort()ing when `hlua_prepend_path()` fails for some reason. see GitHub Issue #1409 This is a very minor issue

[PATCH] BUG/MINOR: lua: Fix lua error handling in `hlua_config_prepend_path()`

2021-10-11 Thread Tim Duesterhus
Set an `lua_atpanic()` handler before calling `hlua_prepend_path()` in `hlua_config_prepend_path()`. This prevents the process from abort()ing when `hlua_prepend_path()` fails for some reason. see GitHub Issue #1409 This is a very minor issue that can't happen in practice. No backport needed.

Re: [PATCH] BUG/???: lua: Add missing call to RESET_SAFE_LJMP in hlua_filter_new()

2021-09-14 Thread Willy Tarreau
On Tue, Sep 14, 2021 at 02:00:16PM +0200, Thierry Fournier wrote: (...) > So, I guess this ommit is not a great bug, but the experieence learn > when we play with longjmp, MEDIUM is the right level for a patch. Thanks Thierry for the detailed analysis! Willy

Re: [PATCH] BUG/???: lua: Add missing call to RESET_SAFE_LJMP in hlua_filter_new()

2021-09-14 Thread Thierry Fournier
only if haproxy try to execute Lua code without setting the safe environment. I hope this is not the case. I’m confident because if some lus code were executed without the panic handler, abort() were already observed for a long time. So, I guess this ommit is not a great bug, but the experieence lear

Re: [PATCH 2/4] BUG/MINOR: opentracing: enable the use of http headers without a set value

2021-09-12 Thread Miroslav Zagorac
Hello Willy, On 09/12/2021 08:19 AM, Willy Tarreau wrote: Bah, I discovered that one after merging the first series :-/ I've applied it on top as a cleanup with your description above as the commit message since it's really what it's about. It is no problem. I apologize for the slight

Re: [PATCH] BUG/???: lua: Add missing call to RESET_SAFE_LJMP in hlua_filter_new()

2021-09-12 Thread Willy Tarreau
On Sat, Sep 11, 2021 at 11:17:25PM +0200, Tim Duesterhus wrote: > In one case before exiting leaving the function the panic handler was not > reset. > > Introduced in 69c581a09271e91d306e7b9080502a36abdc415e, which is 2.5+. > No backport required. Good catch, applied as medium since it seems

Re: [PATCH 2/4] BUG/MINOR: opentracing: enable the use of http headers without a set value

2021-09-12 Thread Willy Tarreau
On Sat, Sep 11, 2021 at 12:27:30AM +0200, Miroslav Zagorac wrote: > On 09/11/2021 12:05 AM, Miroslav Zagorac wrote: > > Hello all, > > > > the second patch from the last series of patches has been redesigned > > here, the ist() function is used to set an empty string instead of > > working

[PATCH] BUG/???: lua: Add missing call to RESET_SAFE_LJMP in hlua_filter_new()

2021-09-11 Thread Tim Duesterhus
In one case before exiting leaving the function the panic handler was not reset. Introduced in 69c581a09271e91d306e7b9080502a36abdc415e, which is 2.5+. No backport required. --- src/hlua.c | 1 + 1 file changed, 1 insertion(+) diff --git a/src/hlua.c b/src/hlua.c index 72d232491..915356c09

Re: [PATCH 2/4] BUG/MINOR: opentracing: enable the use of http headers without a set value

2021-09-10 Thread Miroslav Zagorac
comment has been slightly corrected. Sorry to bother you. :) -- Zaga What can change the nature of a man? >From 969f6e001a2ec9fe96ff3d148c0e673afdd1f13b Mon Sep 17 00:00:00 2001 From: Miroslav Zagorac Date: Thu, 9 Sep 2021 01:23:42 +0200 Subject: [PATCH 2/4] BUG/MINOR: opentracing: ena

[PATCH 2/4] BUG/MINOR: opentracing: enable the use of http headers without a set value

2021-09-10 Thread Miroslav Zagorac
? >From 661e87f9b897924d786c887d19b211816443eed5 Mon Sep 17 00:00:00 2001 From: Miroslav Zagorac Date: Thu, 9 Sep 2021 01:23:42 +0200 Subject: [PATCH 2/4] BUG/MINOR: opentracing: enable the use of http headers without a set value In case we transfer some data that does not have a set value

Re: [PATCH] BUG/???: threads: Use get_(local|gm)time instead of (local|gm)time

2021-08-29 Thread Willy Tarreau
On Sat, Aug 28, 2021 at 11:57:01PM +0200, Tim Duesterhus wrote: > Willy, > > please fill in the severity yourself. Good catch, I didn't notice we still had those. Applied as minor as I don't think anyone really noticed it (it would require different arguments in different converters to be used

Re: [PATCH] BUG/MINOR: tools: Fix loop condition in dump_text()

2021-08-29 Thread Willy Tarreau
On Sun, Aug 29, 2021 at 12:58:22AM +0200, Tim Duesterhus wrote: > The condition should first check whether `bsize` is reached, before > dereferencing the offset. Even if this always works fine, due to the > string being null-terminated, this certainly looks odd. Applied as well, thank you! Willy

[PATCH] BUG/MINOR: tools: Fix loop condition in dump_text()

2021-08-28 Thread Tim Duesterhus
The condition should first check whether `bsize` is reached, before dereferencing the offset. Even if this always works fine, due to the string being null-terminated, this certainly looks odd. Found using GitHub's CodeQL scan. This bug traces back to at least

[PATCH] BUG/???: threads: Use get_(local|gm)time instead of (local|gm)time

2021-08-28 Thread Tim Duesterhus
Willy, please fill in the severity yourself. Best regards Tim Düsterhus PS: sample_conv_http_date has a pretty messed up indentation, mixing tabs and spaces. It probably should be cleaned up. Apply with `git am --scissors` to automatically cut the commit message. -- >8 -- Using localtime

Re: [PATCH spoa-server] BUG/MINOR: build: install binary inside bin/ directory

2021-06-25 Thread Willy Tarreau
On Sun, Jun 13, 2021 at 01:13:52AM +0100, Bertrand Jacquin wrote: > Prior to the change, spoa is installed under DESTDIR with name `bin` Thanks Bertrand. I've merged it now, after realizing that I still had access to this now external repo :-) Willy

Re: Fix small bug in srv_parse_agent_check

2021-06-25 Thread Willy Tarreau
Hi Dirkjan, On Fri, Jun 18, 2021 at 10:03:17PM +0200, Dirkjan Bussink wrote: > Hi all, > > I was building HAProxy using scan-build to see if there were any issues and > it called out an unused variable write. I think this was due to a bug that > the err_code was not used in srv_pa

Fix small bug in srv_parse_agent_check

2021-06-18 Thread Dirkjan Bussink
Hi all, I was building HAProxy using scan-build to see if there were any issues and it called out an unused variable write. I think this was due to a bug that the err_code was not used in srv_parse_agent_check. I’ve attached a patch to fix this issue. Cheers, Dirkjan Bussink 0001-BUG

Re: [PATCH] BUG/MINOR: cache: Correctly handle existing-but-empty, 'accept-encoding' header

2021-06-18 Thread Willy TARREAU
e of us preferred to maintain that ability for compatibility purposes, the general consensus was rather that these are design mistakes to be avoided in the future. > I found the issue, because HAProxy was serving me a gzip encoded response > from the cache when I was not providing an 'accept

Re: [PATCH] BUG/MINOR: cache: Correctly handle existing-but-empty, 'accept-encoding' header

2021-06-18 Thread Tim Düsterhus , WoltLab GmbH
initially wanted to report *that* as a bug report. Then I noticed that this was intentional and that it is the expected behavior based on the HTTP specification. I would not be surprised if this case is not correctly handled by the majority of HTTP clients out there, because most (all?) servers

Re: [PATCH] BUG/MINOR: cache: Correctly handle existing-but-empty, 'accept-encoding' header

2021-06-18 Thread Willy TARREAU
On Fri, Jun 18, 2021 at 03:46:26PM +0200, Remi Tricot-Le Breton wrote: > Hello Tim, > > On 18/06/2021 15:26, Tim Düsterhus, WoltLab GmbH wrote: > > Remi, > > > > please find a small fix for the 'Vary' support of the cache to correctly > > handle the difference between a missing 'accept-encoding'

Re: [PATCH] BUG/MINOR: cache: Correctly handle existing-but-empty, 'accept-encoding' header

2021-06-18 Thread Remi Tricot-Le Breton
Hello Tim, On 18/06/2021 15:26, Tim Düsterhus, WoltLab GmbH wrote: Remi, please find a small fix for the 'Vary' support of the cache to correctly handle the difference between a missing 'accept-encoding' and an empty 'accept-encoding'. Best regards Tim Düsterhus Developer WoltLab GmbH

[PATCH] BUG/MINOR: cache: Correctly handle existing-but-empty, 'accept-encoding' header

2021-06-18 Thread Tim Düsterhus , WoltLab GmbH
96784338 duester...@woltlab.com www.woltlab.com Managing director: Marcel Werk AG Potsdam HRB 26795 P >From e33b3332a138319476d690acbf0aa20395df5598 Mon Sep 17 00:00:00 2001 From: Tim Duesterhus Date: Fri, 18 Jun 2021 15:09:28 +0200 Subject: [PATCH] BUG/MINOR: cache: Correctly handle existing-but-em

[PATCH spoa-server] BUG/MINOR: build: install binary inside bin/ directory

2021-06-12 Thread Bertrand Jacquin
Prior to the change, spoa is installed under DESTDIR with name `bin` --- Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/Makefile b/Makefile index 5de6135ec7d6..52eb43e5f938 100644 --- a/Makefile +++ b/Makefile @@ -68,6 +68,7 @@ spoa: $(OBJS) $(LD) $(LDFLAGS) -o $@ $^

Re: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-09 Thread Willy Tarreau
who provide packages. > > > > I'll retag your patch as BUG/MEDIUM as it really addresses an initialization > > issue and the fix is not that trivial. We may add the above info to the > > commit message if needed. > > > > Hello Willy, > > I adde

Re: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-09 Thread Miroslav Zagorac
On 06/10/2021 04:20 AM, Willy Tarreau wrote: Thank you Miroslav. Just to be sure, is this in anyway related to the fix or not ? We need to make sure that we maintain a smooth upgrade path for those who provide packages. I'll retag your patch as BUG/MEDIUM as it really addresses

Re: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-09 Thread Willy Tarreau
is in anyway related to the fix or not ? We need to make sure that we maintain a smooth upgrade path for those who provide packages. I'll retag your patch as BUG/MEDIUM as it really addresses an initialization issue and the fix is not that trivial. We may add the above info to the commit message if needed. Willy

Re: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-09 Thread Miroslav Zagorac
I forgot to mention that one should take the latest version of the opentracing c wrapper (it is now 1.1.0). https://github.com/haproxytech/opentracing-c-wrapper -- Zaga What can change the nature of a man?

Re: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-09 Thread Miroslav Zagorac
rom fd06ebf4cab6dcef649e1ca5a6f38db33ae68b26 Mon Sep 17 00:00:00 2001 From: Miroslav Zagorac Date: Thu, 10 Jun 2021 01:19:13 +0200 Subject: [PATCH 1/2] Revert "BUG/MINOR: opentracing: initialization after establishing daemon mode" This reverts commit f2263435d71964d1aa3eb80df64

Re: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-09 Thread Miroslav Zagorac
On 06/09/2021 09:10 AM, Willy Tarreau wrote: Hi Miroslav, On Mon, Jun 07, 2021 at 04:55:21PM +0200, Miroslav Zagorac wrote: ... In fact, the only access to these files is achieved only once at the beginning of the HAProxy process, in the initialization of threads. After this initialization, no

Re: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-09 Thread Willy Tarreau
Hi Miroslav, On Mon, Jun 07, 2021 at 04:55:21PM +0200, Miroslav Zagorac wrote: > From 4bbbe5fd3e66a37ec9703723ba22b742e7926a07 Mon Sep 17 00:00:00 2001 > From: Miroslav Zagorac > Date: Mon, 7 Jun 2021 16:21:31 +0200 > Subject: [PATCH] BUG/MINOR: opentracing: fixed files existence che

Re: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-07 Thread Miroslav Zagorac
16:21:31 +0200 Subject: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode If the 'chroot' keyword is used in the HAProxy configuration file, HAProxy reports an error when initializing the OpenTracing API library. The problem is that HAProxy also executes chdir("/&

[PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode

2021-06-07 Thread Miroslav Zagorac
Zagorac Date: Mon, 7 Jun 2021 16:21:31 +0200 Subject: [PATCH] BUG/MINOR: opentracing: fixed files existence check in chroot mode If the 'chroot' keyword is used in the HAProxy configuration file, HAProxy reports an error when initializing the OpenTracing API library. The problem is that HAProxy

Re: [PATCH] BUG/MINOR: http_act: Fix normalizer names in error messages

2021-05-11 Thread Willy Tarreau
Hi Tim, On Mon, May 10, 2021 at 11:21:20PM +0200, Tim Duesterhus wrote: > These places were forgotten when the normalizers were renamed. (...) All of your 3 patches applied, thank you! Willy

[PATCH] BUG/MINOR: http_act: Fix normalizer names in error messages

2021-05-10 Thread Tim Duesterhus
These places were forgotten when the normalizers were renamed. Bug introduced in 5be6ab269e5606aef954f39d6717b024f97b3789, which is 2.4. No backport needed. --- src/http_act.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/http_act.c b/src/http_act.c index b8413f331

[PATCH 1/3] BUG/MINOR: uri_normalizer: Use delim parameter when building the sorted query in uri_normalizer_query_sort

2021-04-20 Thread Maximilian Mader
Currently the delimiter is hardcoded as ampersand (&) but the function takes the delimiter as a paramter. This patch replaces the hardcoded ampersand with the given delimiter. --- src/uri_normalizer.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/uri_normalizer.c

Re: [PATCH] BUG/MINOR: sample: Fix adjusting size in field converter

2021-04-13 Thread Willy Tarreau
Hi Thayne, On Sun, Apr 11, 2021 at 11:26:59PM -0600, Thayne McCombs wrote: > Adjust the size of the sample buffer before we change the "area" > pointer. The change in size is calculated as the difference between the > original pointer and the new start pointer. But since the >

[PATCH] BUG/MINOR: sample: Fix adjusting size in field converter

2021-04-11 Thread Thayne McCombs
Adjust the size of the sample buffer before we change the "area" pointer. The change in size is calculated as the difference between the original pointer and the new start pointer. But since the `smp->data.u.str.area` assignment results in `smp->data.u.str.area` and `start` being the same pointer,

Re: Request for new 1.8.x release due to freq counter bug

2021-04-09 Thread Amaury Denoyelle
"Robin H. Johnson" wrote: > Hi, > Wondering if you could make a new 1.8.x release to get the fix for the > freq counter bug into more systems? > dde80e111 BUG/MEDIUM: time: make sure to always initialize the global tick > 491b86ed0 BUG/MEDIUM: freq_ctr/threads: use t

Request for new 1.8.x release due to freq counter bug

2021-04-09 Thread Robin H. Johnson
Hi, Wondering if you could make a new 1.8.x release to get the fix for the freq counter bug into more systems? dde80e111 BUG/MEDIUM: time: make sure to always initialize the global tick 491b86ed0 BUG/MEDIUM: freq_ctr/threads: use the global_now_ms variable It's a problem for anybody using

Request for new 1.8.x release due to freq counter bug

2021-04-09 Thread Robin H. Johnson
Hi, Wondering if you could make a new 1.8.x release to get the fix for the freq counter bug into more systems? dde80e111 BUG/MEDIUM: time: make sure to always initialize the global tick 491b86ed0 BUG/MEDIUM: freq_ctr/threads: use the global_now_ms variable It's a problem for anybody using

Re: [PATCH] BUG/MINOR: tools: fix parsing "us" unit for timers

2021-04-05 Thread Christopher Faulet
Le 02/04/2021 à 22:12, Thayne McCombs a écrit : Commit c20ad0d8dbd1bb5707bbfe23632415c3062e046c (BUG/MINOR: tools: make parse_time_err() more strict on the timer validity) broke parsing the "us" unit in timers. It caused `parse_time_err()` to return the string "s", whic

Re: [PATCH] BUG/MINOR: tools: fix parsing "us" unit for timers

2021-04-02 Thread Thayne McCombs
Oh, and this should be backported to all supported versions.

[PATCH] BUG/MINOR: tools: fix parsing "us" unit for timers

2021-04-02 Thread Thayne McCombs
Commit c20ad0d8dbd1bb5707bbfe23632415c3062e046c (BUG/MINOR: tools: make parse_time_err() more strict on the timer validity) broke parsing the "us" unit in timers. It caused `parse_time_err()` to return the string "s", which indicates an error. Now if the "u" is

Re: [PATCH] BUG/MINOR: opentracing: initialization after establishing daemon mode

2021-04-02 Thread Willy Tarreau
Hi Miroslav, On Fri, Apr 02, 2021 at 01:44:31PM +0200, Miroslav Zagorac wrote: > Hello, > > This patch solves the problem reported in github issue #1204, where the > OpenTracing filter cannot communicate with the selected tracer if HAProxy is > run in daemon mode. > > This patch should be

[PATCH] BUG/MINOR: opentracing: initialization after establishing daemon mode

2021-04-02 Thread Miroslav Zagorac
change the nature of a man? >From fe482c8adaa703e790b4d1995255b9754799b149 Mon Sep 17 00:00:00 2001 From: Miroslav Zagorac Date: Fri, 2 Apr 2021 04:25:47 +0200 Subject: [PATCH] BUG/MINOR: opentracing: initialization after establishing daemon mode This patch solves the problem reported in git

Re: [PATCH] BUG/MINOR: sample: Rename SenderComID/TargetComID to SenderCompID/TargetCompID

2021-03-10 Thread William Lallemand
On Wed, Mar 10, 2021 at 08:24:24AM +0100, Baptiste wrote: > On Wed, Mar 10, 2021 at 5:15 AM Daniel Corbett wrote: > > > Hello, > > > > > > > > > > > > The recently introduced Financial Information eXchange (FIX) > > > > converters have some hard coded tags based on the specification that > > > >

Re: [PATCH] BUG/MINOR: sample: Rename SenderComID/TargetComID to SenderCompID/TargetCompID

2021-03-09 Thread Baptiste
On Wed, Mar 10, 2021 at 5:15 AM Daniel Corbett wrote: > Hello, > > > > > > The recently introduced Financial Information eXchange (FIX) > > converters have some hard coded tags based on the specification that > > were misspelled. Specifically, SenderComID and TargetComID should > > be

[PATCH] BUG/MINOR: sample: Rename SenderComID/TargetComID to SenderCompID/TargetCompID

2021-03-09 Thread Daniel Corbett
]. This patch updates all references, which includes the converters themselves, the regression test, and the documentation. [1] https://fiximate.fixtrading.org/en/FIX.5.0SP2_EP264/tag49.html [2] https://fiximate.fixtrading.org/en/FIX.5.0SP2_EP264/tag56.html Thanks, -- Daniel 0001-BUG

Re: [Bug: 2.2.10] Regression in SRV TTL Handling + Unexpected Record Timeouts

2021-03-06 Thread Luke Seelenbinder
Hi Tim, Ah, good eye! It does appear to be the same, but in my case it's due to short TTLs vs large responses. Thanks. I'll link this over there. Best, Luke — Luke Seelenbinder Stadia Maps | Founder stadiamaps.com | (864) 735-8533 > On 6 Mar 2021, at 19:03, Tim Düsterhus wrote: > > Luke, >

Re: [Bug: 2.2.10] Regression in SRV TTL Handling + Unexpected Record Timeouts

2021-03-06 Thread Tim Düsterhus
Luke, Am 06.03.21 um 18:57 schrieb Luke Seelenbinder: > I just upgraded one of our HAProxy installations to 2.2.10 (on Debian using > the from the HAProxy maintained apt repo). It appears the changes made to how > SRV records are expired is causing issues, at least with short-lived TTLs in >

[Bug: 2.2.10] Regression in SRV TTL Handling + Unexpected Record Timeouts

2021-03-06 Thread Luke Seelenbinder
Hi List, I just upgraded one of our HAProxy installations to 2.2.10 (on Debian using the from the HAProxy maintained apt repo). It appears the changes made to how SRV records are expired is causing issues, at least with short-lived TTLs in the SRV records. The issue I'm seeing is the record

Re: [PATCH] BUG/MEDIUM: contrib/prometheus-exporter: fix segfault in listener name dump

2021-02-24 Thread Christopher Faulet
loop (data=data@entry=0x0) at src/haproxy.c:3035 #9  0x55596c90 in main (argc=, argv=0x7fffe818) at src/haproxy.c:3723 quit) this bug was introduced by commit e3f7bd5ae9e969cbfe87e4130d06bff7a3e814c6 ("MEDIUM: contrib/prometheus-exporter: add listen stats"), which is

[PATCH] BUG/MEDIUM: contrib/prometheus-exporter: fix segfault in listener name dump

2021-02-24 Thread William Dauchy
596c90 in main (argc=, argv=0x7fffe818) at src/haproxy.c:3723 quit) this bug was introduced by commit e3f7bd5ae9e969cbfe87e4130d06bff7a3e814c6 ("MEDIUM: contrib/prometheus-exporter: add listen stats"), which is present for 2.4 only, so no backport needed. Signed-of

Re: [PATCH v2 3/6] BUG/MEDIUM: server: re-align state file fields number

2021-02-08 Thread William Dauchy
Hello Christopher, On Mon, Feb 8, 2021 at 11:53 PM William Dauchy wrote: > Since commit 3169471964fdc49963e63f68c1fd88686821a0c4 ("MINOR: Add > server port field to server state file.") max_fields was not increased > on version number 1. So this patch aims to fix it. This should be > backported

[PATCH v2 3/6] BUG/MINOR: server: re-align state file fields number

2021-02-08 Thread William Dauchy
Since commit 3169471964fdc49963e63f68c1fd88686821a0c4 ("MINOR: Add server port field to server state file.") max_fields was not increased on version number 1. So this patch aims to fix it. This should be backported as far as v1.8, but the numbering should be adpated depending on the version:

[PATCH v2 3/6] BUG/MEDIUM: server: re-align state file fields number

2021-02-08 Thread William Dauchy
Since commit 3169471964fdc49963e63f68c1fd88686821a0c4 ("MINOR: Add server port field to server state file.") max_fields was not increased on version number 1. So this patch aims to fix it. This should be backported as far as v1.8, but the numbering should be adpated depending on the version:

[PATCH v3 1/5] BUG/MINOR: cli: fix set server addr/port coherency with health checks

2021-02-03 Thread William Dauchy
o a change of behavior along the years. So this patch can potentially be backported up to v1.8 but we must be careful while doing so, as the code has changed a lot. That being said, the bug being not very impacting I would be fine keeping it for 2.4 only. Signed-off-by: William Dauchy --- src/ser

[PATCH v3 4/5] BUG/MINOR: check: consitent way to set agentaddr

2021-02-03 Thread William Dauchy
small consistency problem with `addr` and `agent-addr` options: for the both options, the last one parsed is always used to set the agent-check addr. Thus these two lines don't have the same behavior: server ... addr agent-addr server ... agent-addr addr After this patch `agent-addr`

[PATCH v2 5/5] BUG/MINOR: server: don't set agent addr for addr parsing

2021-02-02 Thread William Dauchy
small consistency problem with `addr` and `agent-addr` options: for the both options, the last one parsed is always used to set the agent-check addr. Thus these two lines don't have the same behavior: server ... addr agent-addr server ... agent-addr addr I was not really able to

[PATCH v2 1/5] BUG/MINOR: cli: fix set server addr/port coherency with health checks

2021-02-02 Thread William Dauchy
o a change of behavior along the years. So this patch can potentially be backported up to v1.8 but we must be careful while doing so, as the code has changed a lot. That being said, the bug being not very impacting I would be fine keeping it for 2.4 only. Signed-off-by: William Dauchy --- src/ser

Re: [PATCH 1/2] BUG/MINOR: cli: fix set server addr/port coherency with health checks

2021-02-02 Thread William Dauchy
Hi Christopher, Thanks for the review. On Tue, Feb 2, 2021 at 10:21 AM Christopher Faulet wrote: > So, it may be good to take a global look at this stuff. I may missed > something. > And be carefull for the backports because the health-checks were refactored in > the 2.2. ok I will come back

Re: [PATCH 1/2] BUG/MINOR: cli: fix set server addr/port coherency with health checks

2021-02-02 Thread Christopher Faulet
Le 31/01/2021 à 11:11, William Dauchy a écrit : while reading `update_server_addr_port` I found out some things which can be seen as incoherency. I hope I did not overlooked anything: - one comment is stating check's address should be updated if it uses the server one; however the condition

[PATCH 1/2] BUG/MINOR: cli: fix set server addr/port coherency with health checks

2021-02-01 Thread William Dauchy
while reading `update_server_addr_port` I found out some things which can be seen as incoherency. I hope I did not overlooked anything: - one comment is stating check's address should be updated if it uses the server one; however the condition checks if `SRV_F_CHECKADDR` is set; this flag is

[PATCH 2/2] BUG/MINOR: cli: set server check-port missing flag

2021-02-01 Thread William Dauchy
when we set check port flag, we need to set a flag on server. this is missing since the origin of the feature: commit 5094656a67fa1b56f30cd2316adb675ca9d2a79a ("MINOR: cli: change a server health check port through the stats socket"). So it can potentially be backport up to v1.8. Signed-off-by:

<    1   2   3   4   5   6   7   8   9   10   >