Re: do we want to keep CentOS 6 builds?
CentOS 6 isn't EOL until the end of the month, so there is a couple of more weeks left. There is at least one place to pay for support through 2024. ($3/month/server) Might be good to keep for a a bit past EOL, as I know when migrating services sometimes I'll throw a proxy server on the old server to the new one... and there will likely be some that don't make the Nov 30th deadline to retire all Centos 6 servers. On Sun, Nov 15, 2020 at 11:15 AM Илья Шипицин wrote: > Hello, > > we still run cirrus-ci builds. > CentOS 6 is EOL. > > should we drop it? > > Ilya >
Re: [PATCH] remote couple of travis jobs (migrated to github actions), unmark arm64 as allowed to fail
One of those jobs uses ERR= I keep an eye on them:) will remove them sometimes On Sun, Nov 15, 2020, 11:16 PM Tim Düsterhus wrote: > Ilya, > > Am 11.11.20 um 19:18 schrieb Илья Шипицин: > > Hi, > > > > some travis-ci cleanup. > > > > Ilya > > > > I believe these can be removed as well, can't they? > > - os: linux > if: type == push > compiler: clang > env: TARGET=linux-glibc LIBRESSL_VERSION=3.1.1 CC=clang-9 > name: libressl-3.1.1 > - os: linux > env: DEBUG_OPTIONS="" > if: type == cron > compiler: clang > env: TARGET=linux-glibc LIBRESSL_VERSION=3.0.2 CC=clang-9 > name: libressl-3.0.2 | ERR= > - os: linux > if: type == push > compiler: clang > env: TARGET=linux-glibc FLAGS= CC=clang-9 > name: FLAGS= > - os: linux > if: type == cron > compiler: clang > env: TARGET=linux-glibc FLAGS="USE_SLZ=1 USE_PCRE2=1 USE_PCRE2_JIT=1 > USE_LUA=1 USE_OPENSSL=1 USE_SYSTEMD=1 USE_WURFL=1 > WURFL_INC=contrib/wurfl WURFL_LIB=contrib/wurfl USE_51DEGREES=1" CC=clang-9 > before_script: > - git clone https://github.com/wtarreau/libslz > - cd libslz && make && make PREFIX=${HOME}/opt install && cd .. > - export SLZ_INC=${HOME}/opt/include SLZ_LIB=${HOME}/opt/lib > - export ADDLIB="-Wl,-rpath,$SLZ_LIB" > name: openssl-1.1.1 | slz | pcre2 > > Best regards > Tim Düsterhus >
Re: [PATCH] remote couple of travis jobs (migrated to github actions), unmark arm64 as allowed to fail
Ilya, Am 11.11.20 um 19:18 schrieb Илья Шипицин: > Hi, > > some travis-ci cleanup. > > Ilya > I believe these can be removed as well, can't they? - os: linux if: type == push compiler: clang env: TARGET=linux-glibc LIBRESSL_VERSION=3.1.1 CC=clang-9 name: libressl-3.1.1 - os: linux env: DEBUG_OPTIONS="" if: type == cron compiler: clang env: TARGET=linux-glibc LIBRESSL_VERSION=3.0.2 CC=clang-9 name: libressl-3.0.2 | ERR= - os: linux if: type == push compiler: clang env: TARGET=linux-glibc FLAGS= CC=clang-9 name: FLAGS= - os: linux if: type == cron compiler: clang env: TARGET=linux-glibc FLAGS="USE_SLZ=1 USE_PCRE2=1 USE_PCRE2_JIT=1 USE_LUA=1 USE_OPENSSL=1 USE_SYSTEMD=1 USE_WURFL=1 WURFL_INC=contrib/wurfl WURFL_LIB=contrib/wurfl USE_51DEGREES=1" CC=clang-9 before_script: - git clone https://github.com/wtarreau/libslz - cd libslz && make && make PREFIX=${HOME}/opt install && cd .. - export SLZ_INC=${HOME}/opt/include SLZ_LIB=${HOME}/opt/lib - export ADDLIB="-Wl,-rpath,$SLZ_LIB" name: openssl-1.1.1 | slz | pcre2 Best regards Tim Düsterhus
Re: do we want to keep CentOS 6 builds?
Hello, On Sun, 15 Nov 2020 at 17:14, Илья Шипицин wrote: > > Hello, > > we still run cirrus-ci builds. > CentOS 6 is EOL. > > should we drop it? I think CentOs6 gives us good feedback about older operating systems that we may not necessarily want to break. The question for me is not so much whether we want to test with CentOs 6, it's more about do we want to be aware and fix build issues with those old systems? If the answer to the latter is yes, then we should keep the tests. If the answer is no, then we should drop them of course. How much of a burden is it to a) keep testing and b) keep supporting (by making sure it builds) on old kernels, libc and libraries? I don't have a strong opinion, but I would tend to keep the support (even though it's EOL). However if this is a continued pain in the ass, for example with openssl, then it's probably better to drop it. Lukas
Re: do we want to keep CentOS 6 builds?
Ilya, Am 15.11.20 um 17:14 schrieb Илья Шипицин: > we still run cirrus-ci builds. > CentOS 6 is EOL. > > should we drop it? > If it's EOL and they did not upgrade the OS then they are either lazy or interesting in "stability". Either way they are probably not going to upgrade HAProxy any further. I'd say that keeping the CentOS 6 builds is a waste of effort. Especially since they are limiting us with regard to the supported SSL version from my understanding (I might be wrong there, but I believe this is what https://github.com/haproxy/haproxy/issues/944 is about). Best regards Tim Düsterhus
do we want to keep CentOS 6 builds?
Hello, we still run cirrus-ci builds. CentOS 6 is EOL. should we drop it? Ilya
[PATCH v2] REGTESTS: converter: add url_dec test
while looking at `url_dec` implementation I realised there was not yet a simple test to avoid future regressions. This one is testing simple case, including the "+" behaviour depending on the argument passed to `url_dec` Signed-off-by: William Dauchy --- reg-tests/converter/url_dec.vtc | 38 + 1 file changed, 38 insertions(+) create mode 100644 reg-tests/converter/url_dec.vtc diff --git a/reg-tests/converter/url_dec.vtc b/reg-tests/converter/url_dec.vtc new file mode 100644 index 0..464c35a27 --- /dev/null +++ b/reg-tests/converter/url_dec.vtc @@ -0,0 +1,38 @@ +varnishtest "url_dec converter Test" + +#REQUIRE_VERSION=1.6 + +feature ignore_unknown_macro + +server s1 { + rxreq + txresp +} -repeat 2 -start + +haproxy h1 -conf { +defaults + mode http + timeout connect 1s + timeout client 1s + timeout server 1s + +frontend fe + bind "fd@${fe}" + + http-request set-var(txn.url) url + http-response set-header url_dec0 "%[var(txn.url),url_dec]" + http-response set-header url_dec1 "%[var(txn.url),url_dec(1)]" + + default_backend be + +backend be + server s1 ${s1_addr}:${s1_port} +} -start + +client c1 -connect ${h1_fe_sock} { + txreq -url "/bla+%20?foo%3Dbar%2B42+42%20" + rxresp + expect resp.http.url_dec0 == "/bla+ ?foo=bar+42 42 " + expect resp.http.url_dec1 == "/bla ?foo=bar+42 42 " + expect resp.status == 200 +} -run -- 2.29.2
Re: [PATCH] REGTESTS: converter: add url_dec test
Hi Tim, thanks for the review. On Sun, Nov 15, 2020 at 1:50 PM Tim Düsterhus wrote: > Am 15.11.20 um 13:45 schrieb William Dauchy: > > +#REQUIRE_OPTION=OPENSSL > > I don't believe OPENSSL is required. The test passes for me even without > compiling with SSL. true bad copy/paste on my side. > > +client c1 -connect ${h1_fe_sock} { > > + txreq -url "/bla+?foo%3Dbar%2B42+42" > > Maybe add %20 to the string to test the other variant of encoding a space? fixed in v2 even though %20 is not much different than other encoded characters to my knowledge. -- William
Re: [PATCH] REGTESTS: converter: add url_dec test
William, Am 15.11.20 um 13:45 schrieb William Dauchy: > +#REQUIRE_OPTION=OPENSSL I don't believe OPENSSL is required. The test passes for me even without compiling with SSL. > +client c1 -connect ${h1_fe_sock} { > + txreq -url "/bla+?foo%3Dbar%2B42+42" Maybe add %20 to the string to test the other variant of encoding a space? > + rxresp > + expect resp.http.url_dec0 == "/bla+?foo=bar+42 42" > + expect resp.http.url_dec1 == "/bla ?foo=bar+42 42" > + expect resp.status == 200 > +} -run > Best regards Tim Düsterhus
[PATCH] REGTESTS: converter: add url_dec test
while looking at `url_dec` implementation I realised there was not yet a simple test to avoid future regressions. This one is testing simple case, including the "+" behaviour depending on the argument passed to `url_dec` Signed-off-by: William Dauchy --- reg-tests/converter/url_dec.vtc | 39 + 1 file changed, 39 insertions(+) create mode 100644 reg-tests/converter/url_dec.vtc diff --git a/reg-tests/converter/url_dec.vtc b/reg-tests/converter/url_dec.vtc new file mode 100644 index 0..52b3b61ca --- /dev/null +++ b/reg-tests/converter/url_dec.vtc @@ -0,0 +1,39 @@ +varnishtest "url_dec converter Test" + +#REQUIRE_VERSION=1.6 +#REQUIRE_OPTION=OPENSSL + +feature ignore_unknown_macro + +server s1 { + rxreq + txresp +} -repeat 2 -start + +haproxy h1 -conf { +defaults + mode http + timeout connect 1s + timeout client 1s + timeout server 1s + +frontend fe + bind "fd@${fe}" + + http-request set-var(txn.url) url + http-response set-header url_dec0 "%[var(txn.url),url_dec]" + http-response set-header url_dec1 "%[var(txn.url),url_dec(1)]" + + default_backend be + +backend be + server s1 ${s1_addr}:${s1_port} +} -start + +client c1 -connect ${h1_fe_sock} { + txreq -url "/bla+?foo%3Dbar%2B42+42" + rxresp + expect resp.http.url_dec0 == "/bla+?foo=bar+42 42" + expect resp.http.url_dec1 == "/bla ?foo=bar+42 42" + expect resp.status == 200 +} -run -- 2.29.2