son schema.
However, it seems that the currently generated schema is not valid, at
least by checking on this website :
https://www.jsonschemavalidator.net/
Is the json schema useful to anyone or can I safely ignore/remove it ?
Thanks for your feedback,
--
Amaury Denoyelle
't worry :-)
At the moment I'm always interested to add simple feature, but I also
would like to progress with my patch serie on stats so I'm not sure if I
will have the time for this :/
--
Amaury Denoyelle
fects are quickly
> tested.
FIY, I have looked upon the issue and seems to have now a working
implementation. I will probably be able to produce a clean patch soon.
--
Amaury Denoyelle
he backports for haproxy 1.8, I will try to make a
release with your fix soon.
--
Amaury Denoyelle
e that in absence of any response this
>pull request will be lost.
I can reproduce your issue on haproxy master. However I'm not sure why
idle_conns list is NULL in this case so I'll investigate it before
validating your patch.
--
Amaury Denoyelle
xy-1.8.git/
Git Web browsing : http://git.haproxy.org/?p=haproxy-1.8.git
Changelog: http://www.haproxy.org/download/1.8/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Amaury Denoyelle (6):
BUG/MINOR: config: Fix memory leak on co
of my
implementation is less surprising, but if it is a real use-case, I do
not want to break it without knowing it.
Let me know if I'm not clear,
I'm putting the list on copy in case someone has an opinion on the
subject.
Thank you for your help,
--
Amaury Denoyelle
Tim Düsterhus wrote:
> Amaury,
> Am 21.01.21 um 16:40 schrieb (Amaury Denoyelle):
> > I have a question for you on the case of the proxy protocol. One of
> > these special parameters to identify a connection is the content of the
> > proxy protocol block. However, this
://www.haproxy.org/download/1.8/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
Amaury Denoyelle
---
Complete changelog :
Amaury Denoyelle (2):
BUG/MINOR: config: copy extra cookie attributes from dfl proxy
BUG/MINOR: srv: do not init address if backend is disabled
ow if the restart is systemd’s
> action).
> Any idea about what could we do?
> Thank you very much in advance!
> Oriol
> P.S. I don’t attach logs or system config to keep this first post simple,
> but if anyone wants to give them a look I’ll be happy to share; so just
> a
ase, but things are
> looking good and I don't expect to have to come back here crying.
> So thank you very much for your help!
Great news ! I will merge the fix soon in the dev branch and it should
hit the next serie of stable releases. Thank you again for your report
and your feedback.
--
Amaury Denoyelle
://git.haproxy.org/?p=haproxy-1.8.git
Changelog: http://www.haproxy.org/download/1.8/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Amaury Denoyelle (2):
BUG/MINOR: config: fix leak on proxy.conn_src.bind_hdr_name
CLEANUP: remove
/download/2.0/src/
Git repository : http://git.haproxy.org/git/haproxy-2.0.git/
Git Web browsing : http://git.haproxy.org/?p=haproxy-2.0.git
Changelog: http://www.haproxy.org/download/2.0/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
Amaury Denoyelle
://cbonte.github.io/haproxy-dconv/
Amaury Denoyelle
---
Complete changelog :
Willy Tarreau (8):
MINOR: time: also provide a global, monotonic global_now_ms timer
BUG/MEDIUM: freq_ctr/threads: use the global_now_ms variable
BUG/MEDIUM: time: make sure to always initialize the global tick
Hi,
I will try to emit new releases next week for 2.0 and 1.8 which are
impacted by the bug you mentionned.
--
Amaury Denoyelle
On Wed, Oct 20, 2021 at 07:03:43PM +0100, David CARLIER wrote:
> Hi
> here a little patch for netbsd system.
> Kind regards.
Thanks, I'm currently trying to fix other issues with NetBSD9.2, so I'll
merge your patch with my work.
--
Amaury Denoyelle
est to better
handle h2 websocket.
Regards,
--
Amaury Denoyelle
repository : http://git.haproxy.org/git/haproxy-2.0.git/
Git Web browsing : http://git.haproxy.org/?p=haproxy-2.0.git
Changelog: http://www.haproxy.org/download/2.0/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
---
Complete changelog :
Amaury Denoyelle (1):
erver'
> srv->ssl_ctx.alpn_len);
> ~~~ ^
> Version 2.4.8 builds fine.
>
>
Thanks for your report. One of my commit to handle properly websocket on
the server side introduces this issue. I'm working on a fix.
--
Amaury Denoyelle
p the patches in your tree so we can have a more substantial
list of change for a new version ?
--
Amaury Denoyelle
quot;${HOME}/opt" --openssldir="${HOME}/opt"
> --libdir=lib -DPURIFY
> +make -j$(nproc) build_sw
> +make install_sw
> +
> +)
> +fi
> --
> 2.29.2.windows.2
>
Thank you for your patches. However, we should probably fix the GCC
error reproduced on your repository before merging it. This will prevent
to have a red test indicator indefinitely.
--
Amaury Denoyelle
On Sat, Oct 30, 2021 at 12:25:13PM +0100, David CARLIER wrote:
> Hi here a patch to address freebsd build failure.
> Kind regards.
Thanks, applied.
--
Amaury Denoyelle
oon as possible.
--
Amaury Denoyelle
t; Regards.
I have merged your patch, thanks for your contribution. Note that I have
splitted it in two to facilitate possible revert or cherry-picking of
numa_detect_topology() various implementation. I also used the BUG_ON
macro which is the idiomatic way for asserts in haproxy.
Sorry for the delay, and thanks again,
--
Amaury Denoyelle
> file...
> --
> Christopher Faulet
>
To add more context on this discussion, I looked at dynamic servers.
Currently, the behavior is identical with the configuration as
init_srv_check() is used in the "add server" CLI handler. This is really
problematic as "no-check-ssl" is not available for dynamic servers, so
if I understand correctly it's not possible to add a dynamic SSL server
with checks on the same port without SSL on checks.
Christopher's patch for init_srv_check() is probably a good idea, but if
not taken it should be probably at least used for servers with the
SRV_F_DYNAMIC flag.
--
Amaury Denoyelle
d debug options
to be able to quickly understand bugs, so this may have an impact on the
results of perfs test.
Now, we are focused on trying to deploy QUIC on haproxy.org to inspect
the behavior with real-life browsers. When this is done, the next
objective will be to try to improve the results of these perfs tests.
--
Amaury Denoyelle
your process.
Thanks again for your help,
Regards,
--
Amaury Denoyelle
On Tue, Apr 12, 2022 at 05:26:41PM +0200, Amaury Denoyelle wrote:
> On Tue, Apr 12, 2022 at 08:01:59AM -0600, Shawn Heisey wrote:
> > On 4/12/22 02:22, Amaury Denoyelle wrote:
> > > then you can display the traces with the following command :
> > > $ show events bu
On Tue, Apr 12, 2022 at 08:01:59AM -0600, Shawn Heisey wrote:
> On 4/12/22 02:22, Amaury Denoyelle wrote:
> > then you can display the traces with the following command :
> > $ show events buf0
> > > For the h3 layer, the trace mechanism is not currently implemented
On Tue, Apr 12, 2022 at 10:30:05AM -0600, Shawn Heisey wrote:
> On 4/12/22 09:45, Amaury Denoyelle wrote:
> > After much analysis of the code, it may be useful to have a run with the
> > stream traces as well :
> > $ trace stream sink buf0; trace stream level developer; trace
On Wed, Apr 13, 2022 at 10:36:00AM +0200, Amaury Denoyelle wrote:
> On Tue, Apr 12, 2022 at 10:30:05AM -0600, Shawn Heisey wrote:
> > On 4/12/22 09:45, Amaury Denoyelle wrote:
> > > After much analysis of the code, it may be useful to have a run with the
> > > stream tra
On Wed, Apr 13, 2022 at 08:16:06AM -0600, Shawn Heisey wrote:
> On 4/13/22 02:42, Amaury Denoyelle wrote:
> > Ok this seems related to 'option abortonclose'. Without this, I do not
> > have a 400 error. Can you confirm me this behavior on your side please ?
>
> If I remove t
On Thu, Apr 14, 2022 at 07:29:20AM -0600, Shawn Heisey wrote:
> On 4/14/22 03:27, Amaury Denoyelle wrote:
> > So to summary, this option should be activated if you only have browsers
> > as client and the traffic is big enough to saturate haproxy queues.
> > I hope this will
liment for haproxy reliability. We hope one day
we will reach this level for QUIC but for now this objectif is still
far.
--
Amaury Denoyelle
handle all the cases. Sadly, this
requires some reflexion time and it won't be solve before the imminent
2.6 release. For the moment, you can try on your side to
increase/decrease the haproxy client timeout to see if this change your
situation.
Regards,
--
Amaury Denoyelle
alloc(global.nbthread,
> + sizeof(*quic_accept_queues));
> if (!quic_accept_queues) {
> ha_alert("Failed to allocate the quic accept queues.\n");
> return 0;
> --
> 2.36.1
>
Fine for me,
Thanks,
--
Amaury Denoyelle
roxy.org/l/pending-bugs
Reviewed bugs: http://www.haproxy.org/l/reviewed-bugs
Code reports : http://www.haproxy.org/l/code-reports
Latest builds: http://www.haproxy.org/l/dev-packages
---
Complete changelog :
Amaury Denoyelle (10):
BUG/MINOR: h3: fix frame type defin
QUIC issues resolved so far.
Regards,
--
Amaury Denoyelle
38 matches
Mail list logo