Re: Sporadic 520 Errors (HTTP/2 Only) with HAProxy Behind Cloudflare

2025-07-17 Thread Christopher Faulet
. For instance: front-http/5: SSL handshake failure (error:0A00010B:SSL routines::wrong version number) You should use at least HAProxy 3.1 to benefit from the error-log-format for TLS handshake errors. -- Christopher Faulet

[ANNOUNCE] haproxy-3.2.1

2025-06-11 Thread Christopher Faulet
www.haproxy.org/l/code-reports Latest builds: https://www.haproxy.org/l/dev-packages --- Complete changelog : Amaury Denoyelle (2): BUG/MINOR: config: emit warning for empty args only in discovery mode BUG/MINOR: config: fix arg number reported on empty arg warning Christopher Faulet

[ANNOUNCE] haproxy-3.3-dev1

2025-06-11 Thread Christopher Faulet
ommon counters between {fe,be}_counters_shared MINOR: counters: add local-only internal rates to compute some maxes MAJOR: counters: dispatch counters over thread groups Christopher Faulet (11): DOC: config: Fix a typo in 2.7 (Name format for maps and ACLs) BUG/MEDIUM: check: Re

Re: [PATCH 1/5] REGTESTS: Do not use REQUIRE_VERSION for HAProxy 2.5+ (5)

2025-06-02 Thread Christopher Faulet
Le 01/06/2025 à 3:26 PM, Tim Duesterhus a écrit : Introduced in: 25bcdb1d9 BUG/MAJOR: h1: Be stricter on request target validation during message parsing see also: fbbbc33df REGTESTS: Do not use REQUIRE_VERSION for HAProxy 2.5+ Thanks, the series was merged ! -- Christopher Faulet

[ANNOUNCE] haproxy-3.0.11

2025-06-02 Thread Christopher Faulet
send-proxy" options with ring servers DOC: config: restore default values for resolvers hold directive Christopher Faulet (17): BUG/MEDIUM: mux-fcgi: Try to fully fill demux buffer on receive if not empty BUG/MINOR: cli: Issue an error when too many args are passed for a command

[ANNOUNCE] haproxy-3.1.8

2025-06-02 Thread Christopher Faulet
solvers hold directive Basha Mougamadou (1): DOC: configuration: explicit multi-choice on bind shards option Christopher Faulet (29): BUG/MINOR: cli: Issue an error when too many args are passed for a command BUG/MINOR: mux-h1: Don't pretend connection was released for TCP>H1>H

Re: [PATCH] CI: combine AWS-LC and AWS-LC-FIPS by template

2025-05-27 Thread Christopher Faulet
Le 26/05/2025 à 11:47 PM, Ilya Shipitsin a écrit : let's reduce code duplication by involving workflow templates Merged, thanks ! -- Christopher Faulet

Re: FCGI issue with 3.0.10

2025-04-30 Thread Christopher Faulet
Le 30/04/2025 à 7:56 PM, Christopher Faulet a écrit : Le 30/04/2025 à 5:12 PM, Ionel GARDAIS a écrit : Hi, For technical showoff, I was using the fcgi-app feature to serve PHP FPM websites (matomo and a planning portal) but with the 3.0.10 update, haproxy starts using 100% cpu and requests

Re: FCGI issue with 3.0.10

2025-04-30 Thread Christopher Faulet
found the offending commit is indeed "BUG/MEDIUM: mux-fcgi: Properly handle read0 on partial records". I will review it because on 3.1 and 3.2, there is no issue. -- Christopher Faulet

Re: [PATCH] BUG/MINOR: spoe/mux-spop: set agent max-frame-size

2025-04-22 Thread Christopher Faulet
. -- Christopher Faulet From 6c24a1e729697c2fd57f4bd479ffa965d774e1f4 Mon Sep 17 00:00:00 2001 From: Christopher Faulet Date: Tue, 22 Apr 2025 15:27:12 +0200 Subject: [PATCH] BUG/MEDIUM: mux-spop: Respect the negociated max-frame-size value to send frames When a SPOP connection is opened, the

Re: Compression with LUA response

2025-04-02 Thread Christopher Faulet
Le 02/04/2025 à 1:37 PM, Olivier D a écrit : Hi, Le mer. 2 avr. 2025 à 09:10, Christopher Faulet <mailto:cfau...@haproxy.com>> a écrit : In fact, in your case, it is expected to have no compression. You abort the request analysis, skipping this way the response analys

Re: Compression with LUA response

2025-04-02 Thread Christopher Faulet
action that aborts the request. A lua service is an applet that is equivalent to a server. So the response analysis is performed and the response is no limited to one buffer. To do so, you must use the "use-service" action. -- Christopher Faulet

[ANNOUNCE] haproxy-2.6.21

2025-01-29 Thread Christopher Faulet
nt methods expected contexts BUG/MEDIUM: pattern: prevent uninitialized reads in pat_match_{str,beg} BUG/MINOR: stktable: fix big-endian compatiblity in smp_to_stkey() BUG/MEDIUM: stktable: fix missing lock on some table converters Christopher Faulet (20): MEDIUM: h1: Accept

[ANNOUNCE] haproxy-2.8.14

2025-01-29 Thread Christopher Faulet
tktable: fix missing lock on some table converters Christopher Faulet (7): BUG/MEDIUM: stconn: Really report blocked send if sends are blocked by an error BUG/MEDIUM: mux-h1: Fix how timeouts are applied on H1 connections BUG/MEDIUM: stconn: Don't forward shut for SC in connecting s

[ANNOUNCE] haproxy-2.9.14

2025-01-29 Thread Christopher Faulet
t; to the list of global parameters DOC: config: add missing "track-sc0" in action keywords matrix BUG/MINOR: stktable: fix big-endian compatiblity in smp_to_stkey() BUG/MEDIUM: stktable: fix missing lock on some table converters BUG/MAJOR: log/sink: possible sink

[ANNOUNCE] haproxy-3.0.8

2025-01-29 Thread Christopher Faulet
t; DOC: config: add missing "track-sc0" in action keywords matrix BUG/MINOR: stktable: fix big-endian compatiblity in smp_to_stkey() BUG/MEDIUM: stktable: fix missing lock on some table converters BUG/MAJOR: log/sink: possible sink collision in sink_new_from_srv() Christoph

[ANNOUNCE] haproxy-3.1.3

2025-01-29 Thread Christopher Faulet
big-endian compatiblity in smp_to_stkey() BUG/MEDIUM: stktable: fix missing lock on some table converters BUG/MAJOR: log/sink: possible sink collision in sink_new_from_srv() Christopher Faulet (3): BUG/MEDIUM: promex: Use right context pointers to dump backends extra-counters B

Re: Authentication/authorization implementation in haproxy, possibly with Redis

2025-01-13 Thread Christopher Faulet
ltiplex the requests. -- Christopher Faulet

[ANNOUNCE] haproxy-3.1.2

2025-01-08 Thread Christopher Faulet
tests using tune.lua.smp-preserve-bool MINOR: hlua: rename "tune.lua.preserve-smp-bool" to "tune.lua.bool-sample-conversion" BUG/MINOR: stats: fix segfault caused by uninitialized value in "show schema json" DOC: config: add missing "track-sc

[ANNOUNCE] haproxy-2.8.13

2024-12-12 Thread Christopher Faulet
INOR: quic: remove startup alert if conn socket-owner unsupported Aurelien DARRAGON (2): DOC: lua: fix yield-dependent methods expected contexts BUG/MEDIUM: event_hdl: fix uninitialized value in async mode when no data is provided Christopher Faulet (21): MINOR: mux-h1: Set EOI on S

[ANNOUNCE] haproxy-2.9.13

2024-12-12 Thread Christopher Faulet
nt methods expected contexts BUG/MEDIUM: event_hdl: fix uninitialized value in async mode when no data is provided Christopher Faulet (20): BUG/MEDIUM: resolvers: Insert a non-executed resulution in front of the wait list BUG/MEDIUM: mux-h2: Don't send RST_STREAM frame

[ANNOUNCE] haproxy-3.0.7

2024-12-12 Thread Christopher Faulet
uninitialized reads in pat_match_{str,beg} DOC: lua: fix yield-dependent methods expected contexts BUG/MINOR: log: fix lf_text() behavior with empty string BUG/MEDIUM: event_hdl: fix uninitialized value in async mode when no data is provided Christopher Faulet (23): BUG/MEDIUM:

Re: RST_STREAM immediately after GET request in h2

2024-11-28 Thread Christopher Faulet
REAM was received on the client side: h2s.flags = H2_SF_HEADERS_RCVD | H2_SF_RST_RCVD | H2_SF_ES_RCVD So the request was in fact aborted by the client and this was forwarded to the server. You may be interested by logging fs.aborted / fs.rst_code and bs.aborted / bs.rst_code to have more info and a confirmation too. Regards, -- Christopher Faulet

[ANNOUNCE] haproxy-2.4.28

2024-11-08 Thread Christopher Faulet
uck in maintenance after FQDN change BUG/MEDIUM: hlua: make hlua_ctx_renew() safe BUG/MEDIUM: hlua: properly handle sample func errors in hlua_run_sample_{fetch,conv}() BUG/MEDIUM: connection/http-reuse: fix address collision on unhandled address families Christopher Faulet (8):

[ANNOUNCE] haproxy-2.6.20

2024-11-08 Thread Christopher Faulet
BUG/MEDIUM: hlua: properly handle sample func errors in hlua_run_sample_{fetch,conv}() BUG/MEDIUM: connection/http-reuse: fix address collision on unhandled address families Christopher Faulet (3): BUG/MINOR: http-ana: Don't report a server abort if response payload is in

[ANNOUNCE] haproxy-2.8.12

2024-11-08 Thread Christopher Faulet
make hlua_ctx_renew() safe BUG/MEDIUM: hlua: properly handle sample func errors in hlua_run_sample_{fetch,conv}() DOC: config: fix rfc7239 forwarded typo in desc BUG/MEDIUM: connection/http-reuse: fix address collision on unhandled address families Christopher Faulet (9):

[ANNOUNCE] haproxy-2.9.12

2024-11-08 Thread Christopher Faulet
le func errors in hlua_run_sample_{fetch,conv}() DOC: config: fix rfc7239 forwarded typo in desc BUG/MEDIUM: connection/http-reuse: fix address collision on unhandled address families Christopher Faulet (17): MINOR: mux-h1: Set EOI on SE during demux when both side are in DONE

[ANNOUNCE] haproxy-3.0.6

2024-11-07 Thread Christopher Faulet
-reuse: fix address collision on unhandled address families DOC: config: add missing glitch_{cnt,rate} data types DOC: config: add missing glitch_{cnt,rate} sample definitions Christopher Faulet (24): MINOR: connection: No longer include stconn type header in connection-t.h

Re: haproxy retries with redispatch not working consistently

2024-10-17 Thread Christopher Faulet
I guess if someone adds a "retry-on" directive to enable some L7 retries on a backend, he also wants to wait for a full request to honor the retry-on. -- Christopher Faulet

Re: haproxy retries with redispatch not working consistently

2024-10-17 Thread Christopher Faulet
request payloads < 256K, but that's not what I'm seeing.  Notice that sometimes there will be retries, and the timers.Ta is consistent with the total number of retries, but most of the time haproxy is not retrying. This is not only happening on 504s; it's happening on 503s as well. Not sure on other other types since those are a little harder to induce.  I've tried playing with the tune.bufsize parameter since our reqest payloads can be quite large (max up to 1MB recently). It's currently set it to 256K for now since that covers the 95%-ile. The default 16K so initially we were getting almost zero retries, but I've also tried setting tune.bufsize to 1MB, which did not change anything either.  I've also played with various retry-on settings (like all-retryable-errors) but same thing. Hi, As you noticed, the request must fit in a buffer to perform L7-retries. But it must also be fully received. You should probably add the "http-buffer-request" option or use "wait-for-body" action if you need more control. I recently noticed it was not mentionned in the "retry-on" documentation. And it is not obvious. I must update the doc. Another solution would be to automatically wait for the request body if some L7-retries are enabled. -- Christopher Faulet

Re: [3.0.5] Unexpected SD-- on (almost) successful requests

2024-10-08 Thread Christopher Faulet
Le 08/10/2024 à 18:07, Christopher Faulet a écrit : Le 08/10/2024 à 16:13, Christopher Faulet a écrit : Le 08/10/2024 à 11:05, Luke Seelenbinder a écrit : Hi Christopher, I was out last week, but we were able to gather a few more pieces of data. 1) We ran some tcpdumps, and nothing odd

Re: [3.0.5] Unexpected SD-- on (almost) successful requests

2024-10-08 Thread Christopher Faulet
Le 08/10/2024 à 16:13, Christopher Faulet a écrit : Le 08/10/2024 à 11:05, Luke Seelenbinder a écrit : Hi Christopher, I was out last week, but we were able to gather a few more pieces of data. 1) We ran some tcpdumps, and nothing odd popped up at all. Given our traffic levels, we were

Re: [3.0.5] Unexpected SD-- on (almost) successful requests

2024-10-08 Thread Christopher Faulet
g for the response") The first one is the best candidate. If you perform some tests, you can try to revert it. -- Christopher Faulet

Re: [3.0.5] Unexpected SD-- on (almost) successful requests

2024-09-27 Thread Christopher Faulet
e, I guess it could be easier to track the issue on Github. Outside this bug, have you many unsuccessful termination states in your logs (other than '' in fact) ? If not, it could be possible to enable H1 traces on error level. Let me know. In the mean time, I will review the 3.0.5 changes... -- Christopher Faulet

Re: [3.0.5] Unexpected SD-- on (almost) successful requests

2024-09-26 Thread Christopher Faulet
HAProxy. I don't know how it is possible. -- Christopher Faulet

Re: [3.0.5] Unexpected SD-- on (almost) successful requests

2024-09-26 Thread Christopher Faulet
following one, not sure: commit e2a93b649286b30245333eec5851acd3991fda47 Author: Christopher Faulet Date: Mon Jul 29 17:48:16 2024 +0200 BUG/MEDIUM: stconn: Report error on SC on send if a previous SE error was set When a send on a connection is performed, if a SE error (or a pending error) was

Re: BUG: cli: Deadlock when setting frontend maxconn

2024-09-25 Thread Christopher Faulet
d versions for the backports. Nothing fancy. Regards, -- Christopher Faulet

Re: [PATCH] FEATURE/MAJOR: Add upstream-proxy-tunnel feature

2024-09-24 Thread Christopher Faulet
tp1-proxy-tunnel" for the server keyword. And set-http1-proxy-tunnel-header/set-http1-proxy-tunnel-target. IMHO, It is important to specify the action performed (set here), to be able to add other kind of actions (add, del...), even if it is unlikely for now. I guess, it's all for now 😉 Regards, -- Christopher Faulet

[ANNOUNCE] haproxy-2.6.19

2024-09-19 Thread Christopher Faulet
: add a test to ensure map-ordering is preserved BUG/MINOR: pattern: prevent const sample from being tampered in pat_match_beg() BUG/MEDIUM: pattern: prevent UAF on reused pattern expr BUG/MINOR: cfgparse-listen: fix option httpslog override warning message Christopher Faulet (12

[ANNOUNCE] haproxy-2.8.11

2024-09-19 Thread Christopher Faulet
pered in pat_match_beg() BUG/MEDIUM: pattern: prevent UAF on reused pattern expr BUG/MINOR: cfgparse-listen: fix option httpslog override warning message Christopher Faulet (21): BUG/MINOR: h1: Fail to parse empty transfer coding names BUG/MINOR: h1: Reject empty coding name a

Re: [PATCH] FEATURE/MAJOR: Add upstream-proxy-tunnel feature

2024-09-19 Thread Christopher Faulet
in to review your patchs. I guess I will be able to give you a feedback soon. Very sorry for the delay ! Regards, -- Christopher Faulet

[ANNOUNCE] haproxy-2.9.11

2024-09-19 Thread Christopher Faulet
once event miss and leak BUG/MINOR: pattern: prevent const sample from being tampered in pat_match_beg() BUG/MEDIUM: pattern: prevent UAF on reused pattern expr BUG/MINOR: cfgparse-listen: fix option httpslog override warning message Christopher Faulet (12): BUG/MEDIUM: stco

[ANNOUNCE] haproxy-3.0.5

2024-09-19 Thread Christopher Faulet
al entries updates may not be advertised after resync BUG/MINOR: cfgparse-listen: fix option httpslog override warning message Christopher Faulet (14): BUG/MEDIUM: stconn: Report error on SC on send if a previous SE error was set BUG/MEDIUM: mux-pt/mux-h1: Release the p

[ANNOUNCE] haproxy-2.9.10

2024-09-03 Thread Christopher Faulet
pi/event_hdl: small updates, fix an example and add some precisions BUG/MINOR: hlua: report proper context upon error in hlua_cli_io_handler_fct() Christopher Faulet (16): BUG/MEDIUM: proxy: fix email-alert invalid free BUG/MEDIUM: stick-table: Decrement the ref count inside lock

Re: Some HTTP connections not closing properly on Haproxy 2.8.10

2024-08-02 Thread Christopher Faulet
In attachement, the whole series for 3.0 and 2.8: My first 3 patches and the 3 new ones. I'm going to be on vacation for 3 weeks. so there's no rush Many thanks for your help. -- Christopher Faulet From db2e751bc8cc4bd8a96d2149c8a59022d15b9709 Mon Sep 17 00:00:00 2001 From: Christopher Faulet

Re: Some HTTP connections not closing properly on Haproxy 2.8.10

2024-07-30 Thread Christopher Faulet
o be a coincidence. So I may have missed something the first time, distracted by the splicing. So, for now, it is better to wait a bit before testing my fixes. I hope to find the root cause of the issue quickly. Thanks ! -- Christopher Faulet

Re: Some HTTP connections not closing properly on Haproxy 2.8.10

2024-07-30 Thread Christopher Faulet
Le 29/07/2024 à 16:30, Jens Wahnes a écrit : Christopher Faulet wrote: Le 29/07/2024 à 09:05, Christopher Faulet a écrit : Thanks, I will investigate. It is indeed most probably an issue with the splicing, as Willy said. I will try to find the bug on the 2.8 and figure out if upper versions

Re: Some HTTP connections not closing properly on Haproxy 2.8.10

2024-07-29 Thread Christopher Faulet
Le 29/07/2024 à 09:05, Christopher Faulet a écrit : Thanks, I will investigate. It is indeed most probably an issue with the splicing, as Willy said. I will try to find the bug on the 2.8 and figure out if upper versions are affected too. I'm able to reproduce the issue by hacking the

Re: Some HTTP connections not closing properly on Haproxy 2.8.10

2024-07-29 Thread Christopher Faulet
eed most probably an issue with the splicing, as Willy said. I will try to find the bug on the 2.8 and figure out if upper versions are affected too. -- Christopher Faulet

Re: About the SPOE

2024-07-24 Thread Christopher Faulet
Le 28/03/2024 à 18:14, Christopher Faulet a écrit : Thanks Lokesh, Abhijeet and Aleksandar for your feedback. This truly help us. Thanks too to Pierre and Mattia for their feedback on the request mirroring. Rest assured that we take this into account in our reflections. After some internal

Re: [SPOE] an error was triggered during the resources allocation.

2024-07-10 Thread Christopher Faulet
Le 10/07/2024 à 09:02, Maciej Zdeb a écrit : Hi, I've tested this patch and it looks very promising - no errors so far. I will deploy it tomorrow on a larger scale. Thanks Christopher! Thanks ! I will merge it. -- Christopher Faulet

Re: [SPOE] an error was triggered during the resources allocation.

2024-07-08 Thread Christopher Faulet
e the issue is that there are applets but not on the current thread. The following patch should fix the issue. Could you confirm it really fixes your issue ? it can safely be applied on the 2.8.9 or 2.8-HEAD. FYI, I'm working on the SPOE refactoring. I hope the f

Re: [ANNOUNCE] haproxy-3.1-dev1

2024-06-14 Thread Christopher Faulet
Le 14/06/2024 à 16:22, Christopher Faulet a écrit : Le 14/06/2024 à 16:20, Willy Tarreau a écrit : On Fri, Jun 14, 2024 at 04:12:03PM +0200, Christopher Faulet wrote: Hi, HAProxy 3.1-dev1 was released on 2024/06/14. It added 95 new commits after version 3.1-dev0. Because Willy announced

Re: [ANNOUNCE] haproxy-3.1-dev1

2024-06-14 Thread Christopher Faulet
Le 14/06/2024 à 16:20, Willy Tarreau a écrit : On Fri, Jun 14, 2024 at 04:12:03PM +0200, Christopher Faulet wrote: Hi, HAProxy 3.1-dev1 was released on 2024/06/14. It added 95 new commits after version 3.1-dev0. Because Willy announced publicly I should managed a -dev1 before his return from

[ANNOUNCE] haproxy-3.1-dev1

2024-06-14 Thread Christopher Faulet
MINOR: log: provide proxy context to resolve_logger() MINOR: log: add __send_log_set_metadata_sd helper MINOR: log: add logger flags MINOR: log: add log-profile parsing logic MINOR: log: add log profile buildlines MEDIUM: log: handle log-profile in process_send_log()

[ANNOUNCE] haproxy-2.9.9

2024-06-14 Thread Christopher Faulet
ename show stats domain cli "dns" to "resolvers" Christopher Faulet (1): BUG/MAJOR: mux-h1: Prevent any UAF on H1 connection after draining a request Valentine Krasnobaeva (2): DOC/MINOR: management: add missed -dR and -dv options DOC/MINOR: management: add -dZ option -- Christopher Faulet

[ANNOUNCE] haproxy-3.0.2

2024-06-14 Thread Christopher Faulet
proxy_free_common() DOC: management: rename show stats domain cli "dns" to "resolvers" Christopher Faulet (2): BUG/MINOR: promex: Skip resolvers metrics when there is no resolver section BUG/MAJOR: mux-h1: Prevent any UAF on H1 connection after draining a r

Re: [PATCH] MINOR?: stconn/connection: Fix suspect change causing timeouts

2024-06-10 Thread Christopher Faulet
fix. I choose to keep your message with just a comment at the end. However, I changed the subject to "BUG/MEDIUM: stconn/mux-h1: Fix suspect change causing timeouts". It is part of the 3.0.1. -- Christopher Faulet

[ANNOUNCE] haproxy-3.0.1

2024-06-10 Thread Christopher Faulet
n't use lua_pushfstring() when we don't expect LJMP BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage BUG/MINOR: hlua: prevent LJMP in hlua_traceback() BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path CLEANUP: hlua: simplify ambiguous lua_insert() usage in

Re: [PR] Add destination ip as source ip

2024-04-10 Thread Christopher Faulet
CO_SRC_TPROXY_DIP). Finally, I didn't checked deeply, but CO_SRC_TPROXY_CIP is used in proto_tcp.c and proto_quic.c files. I guess something must also be added here. I have also a question. For completeness, could the 'dst' parameter be useful ? -- Christopher Faulet

[ANNOUNCE] haproxy-2.8.9

2024-04-05 Thread Christopher Faulet
://www.haproxy.org/l/code-reports Latest builds: https://www.haproxy.org/l/dev-packages --- Complete changelog : Christopher Faulet (1): BUILD: proxy: Replace free_logformat_list() to manually release log-format -- Christopher Faulet

[ANNOUNCE] haproxy-2.9.7

2024-04-05 Thread Christopher Faulet
xtract_{ipv4,ipv6} BUG/MINOR: server: 'source' interface ignored from 'default-server' directive DOC: config: balance 'first' not usable in LOG mode BUG/MINOR: log/balance: detect if user tries to use unsupported algo BUG/MINOR: proxy: fix logform

[ANNOUNCE] haproxy-2.8.8

2024-04-05 Thread Christopher Faulet
MINOR: hlua: use accessors for stream hlua ctx BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per-thread (2nd try) OPTIM: http_ext: avoid useless copy in http_7239_extract_{ipv4,ipv6} BUG/MINOR: server: 'source' interface ignored from 'default-s

[ANNOUNCE] haproxy-2.7.12 (EOL)

2024-04-05 Thread Christopher Faulet
BUG/MINOR: hlua: missing lock in hlua_filter_new() BUG/MINOR: hlua: fix missing lock in hlua_filter_delete() BUG/MINOR: server: 'source' interface ignored from 'default-server' directive DEBUG: lua: precisely identify if stream is stuck inside lua or not MIN

[ANNOUNCE] haproxy-2.6.17

2024-04-05 Thread Christopher Faulet
;default-server' directive DEBUG: lua: precisely identify if stream is stuck inside lua or not MINOR: hlua: use accessors for stream hlua ctx BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per-thread (2nd try) BUG/MINOR: proxy: fix logf

[ANNOUNCE] haproxy-2.4.26

2024-04-05 Thread Christopher Faulet
R: cfgparse: report proper location for log-format-sd errors BUG/MINOR: server: 'source' interface ignored from 'default-server' directive DEBUG: lua: precisely identify if stream is stuck inside lua or not MINOR: hlua: use accessors for stream hlua ctx

[ANNOUNCE] haproxy-2.2.33

2024-04-05 Thread Christopher Faulet
): BUG/MINOR: cfgparse: report proper location for log-format-sd errors BUG/MINOR: server: 'source' interface ignored from 'default-server' directive Christopher Faulet (6): BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is empty

[ANNOUNCE] haproxy-2.0.35

2024-04-05 Thread Christopher Faulet
NOR: server: 'source' interface ignored from 'default-server' directive Christopher Faulet (5): BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is empty BUG/MEDIUM: spoe: Never create new spoe applet if there is no server up BUG/MINOR: hlua:

Re: About the SPOE

2024-03-28 Thread Christopher Faulet
med on the 3.1. Of course, it is still a subject under discussion. The above issue is here to collect ideas for the next steps but also for more long term features. Feel free to feed it. Regards, -- Christopher Faulet

About the SPOE

2024-03-15 Thread Christopher Faulet
et us know your feeling and if you have any suggestion, we will be happy to talk about it. Regards, -- Christopher Faulet

Re: [ANNOUNCE] haproxy-2.9.2

2024-01-11 Thread Christopher Faulet
Le 11/01/2024 à 16:14, Christopher Faulet a écrit : Hi, HAProxy 2.9.2 was released on 2024/01/11. It added 37 new commits after version 2.9.1. A major issue about the zero-copy forwarding in TCP mode was fixed in this release. A regression was introduced to the 2.9.1, blocking connection

[ANNOUNCE] haproxy-2.9.2

2024-01-11 Thread Christopher Faulet
ession REGTESTS: add a test to ensure map-ordering is preserved Christopher Faulet (6): DOC: config: Update documentation about local haproxy response BUG/MINOR: server: Use the configured address family for the initial resolution BUG/MAJOR: stconn: Disable zero-copy forwardi

Re: Haproxy 2.9 and malformed requests

2024-01-05 Thread Christopher Faulet
Le 05/01/2024 à 18:17, Christopher Faulet a écrit : Le 05/01/2024 à 14:45, Marcello Lorenzi a écrit : yes we did it and we didn't notice the issue. So I suggest you stay on the 2.9.1 without zero-copy forwarding for now. A new release will be emitted soon, fixing the CPU issue. Coul

Re: Haproxy 2.9 and malformed requests

2024-01-05 Thread Christopher Faulet
Le 05/01/2024 à 14:45, Marcello Lorenzi a écrit : yes we did it and we didn't notice the issue. So I suggest you stay on the 2.9.1 without zero-copy forwarding for now. A new release will be emitted soon, fixing the CPU issue. Il giorno ven 5 gen 2024 alle ore 14:35 Christopher F

Re: Haproxy 2.9 and malformed requests

2024-01-05 Thread Christopher Faulet
? -- Christopher Faulet

Re: Haproxy 2.9 and malformed requests

2024-01-05 Thread Christopher Faulet
he truncated response issue is still there on the 2.9.1. And if you still experience a CPU issue with the zero-copy forwarding disabled, it is also a unknown bug... -- Christopher Faulet

Re: Haproxy 2.9 and malformed requests

2024-01-04 Thread Christopher Faulet
open an issue on the issue tracker (https://github.com/haproxy/haproxy/issues). Don't forget to share your configuration and the log message corresponding to the truncated response. Thanks, -- Christopher Faulet

Re: [PATCH 0/1] CI: switch to semantic version compare for openssl=latest

2024-01-02 Thread Christopher Faulet
github/matrix.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) Merged now, Thanks ! -- Christopher Faulet

Re: [PATCH 0/1] more spell fixes

2024-01-02 Thread Christopher Faulet
| 6 +++--- 10 files changed, 25 insertions(+), 25 deletions(-) Nerged now. Thanks ! -- Christopher Faulet

[ANNOUNCE] haproxy-2.0.34

2023-12-19 Thread Christopher Faulet
fy supported sections for "max-session-srv-conns" DOC: config: add matrix entry for "max-session-srv-conns" Christopher Faulet (2): BUG/MEDIUM: mux-h2: Don't report an error on shutr if a shutw is pending BUG/MEDIUM: peers: Be sure to always refresh recconnect

[ANNOUNCE] haproxy-2.2.32

2023-12-19 Thread Christopher Faulet
onfig: add matrix entry for "max-session-srv-conns" Christopher Faulet (17): BUG/MEDIUM: stconn: Wake applets on sending path if there is a pending shutdown BUG/MEDIUM: stconn/stream: Forward shutdown on write timeout BUG/MEDIUM: mux-fcgi: Don't swap trash and dbu

Re: mux-h2: Backend stream is not fully closed if frontend keeps stream open

2023-12-18 Thread Christopher Faulet
Le 20/09/2023 à 22:14, Valters Jansons a écrit : On Mon, Sep 18, 2023 at 9:32 AM Christopher Faulet wrote: Please find a new patch. It should be good ( or better at least :) The provided patch resolves my scenario for both the gRPC server-client as well as the Java client to nginx server

[ANNOUNCE] haproxy-2.9.1

2023-12-15 Thread Christopher Faulet
ury Denoyelle (1): BUG/MEDIUM: mux-quic: report early error on stream Aurelien DARRAGON (2): BUG/MEDIUM: map/acl: pat_ref_{set,delete}_by_id regressions BUG/MINOR: ext-check: cannot use without preserve-env Christopher Faulet (6): MINOR: version: mention that it's st

[ANNOUNCE] haproxy-2.4.25

2023-12-14 Thread Christopher Faulet
DOC: config: add matrix entry for "max-session-srv-conns" Cedric Paillet (1): BUG/MINOR: promex: fix backend_agg_check_status Christopher Faulet (20): BUG/MEDIUM: dns: Be sure to unlock DSS when existing dns_session_io_handler() BUG/MEDIUM: stconn: Wake applets

[ANNOUNCE] haproxy-2.6.16

2023-12-13 Thread Christopher Faulet
s for "max-session-srv-conns" DOC: config: add matrix entry for "max-session-srv-conns" DOC: config: fix monitor-fail typo Cedric Paillet (1): BUG/MINOR: promex: fix backend_agg_check_status Chris Staite (1): BUG/MEDIUM: h1-htx: Ensure chunked parsing w

[ANNOUNCE] haproxy-2.7.11

2023-12-07 Thread Christopher Faulet
;max-session-srv-conns" DOC: config: add matrix entry for "max-session-srv-conns" DOC: config: fix monitor-fail typo Cedric Paillet (1): BUG/MINOR: promex: fix backend_agg_check_status Chris Staite (1): BUG/MEDIUM: h1-htx: Ensure chunked parsing with full

[ANNOUNCE] haproxy-2.8.5

2023-12-07 Thread Christopher Faulet
en: fix warning being reported as an alert DOC: config: specify supported sections for "max-session-srv-conns" DOC: config: add matrix entry for "max-session-srv-conns" DOC: config: fix monitor-fail typo Christopher Faulet (2): BUG/MEDIUM: master/cli: Proper

Re: How to debug "IH" termination state on HTTP connections?

2023-11-26 Thread Christopher Faulet
fected, but it is still possible to get a processing error. The fix will be shipped with the 2.9-dev11. -- Christopher Faulet

Re: How to debug "IH" termination state on HTTP connections?

2023-11-24 Thread Christopher Faulet
ile it (make dev/haring/haring). Then run ./dev/haring/haring -f /tmp/blah | less -- Christopher Faulet

Re: [PATCH] Add HAPROXY_SERVER_CHECK_PORT to the external check

2023-11-24 Thread Christopher Faulet
e mix up with indent changes. However, I don't understand what you want to achieve. If you are using an externel-check, there is no TCP health-check. The check port is useless in this case. -- Christopher Faulet

Re: Logging port #

2023-11-20 Thread Christopher Faulet
    option  httplog Hi, If you define a specific log-format, don't set httplog option. This directive, set after your log-format will override it. -- Christopher Faulet

[ANNOUNCE] haproxy-2.8.4

2023-11-17 Thread Christopher Faulet
BUG/MINOR: cfgparse/stktable: fix error message on stktable_init() failure BUG/MINOR: stick-table/cli: Check for invalid ipv4 key BUG/MINOR: sink: don't learn srv port from srv addr Cedric Paillet (1): BUG/MINOR: promex: fix backend_agg_check_status Christopher Faulet (42):

Re: [PATCH] MINOR: support for http-request set-timeout client

2023-09-27 Thread Christopher Faulet
Le 27/09/2023 à 16:43, Vladimir Vdovin a écrit : Added set-timeout for frontend side of session, so it can be used to set custom per-client timeouts if needed. Added cur_client_timeout to fetch client timeout samples. Thanks Vladimir! The patch is merged now. -- Christopher Faulet

Re: [PATCH] MINOR: support for http-request set-timeout client

2023-09-26 Thread Christopher Faulet
too busy to rework your patch it is really not a problem. I can add the change on top of your patch or just amend it before merging it. Just let me know. -- Christopher Faulet

Re: [PATCH] MINOR: support for http-request set-timeout client

2023-09-25 Thread Christopher Faulet
could you update "reg-tests/http-set-timeout/set_timeout.vtc" script to add a test about the client timeout. Of course, if you need some help or if you have any question, ask for it. -- Christopher Faulet

Re: [PATCH] MINOR: support for http-request set-timeout client

2023-09-25 Thread Christopher Faulet
her, could you please review it next week so that we don't forget it ? Rahh sorry, I saw it and forgotten to review it. I'll do it today of course ! -- Christopher Faulet

Re: mux-h2: Backend stream is not fully closed if frontend keeps stream open

2023-09-21 Thread Christopher Faulet
Le 20/09/2023 à 22:14, Valters Jansons a écrit : On Mon, Sep 18, 2023 at 9:32 AM Christopher Faulet wrote: Please find a new patch. It should be good ( or better at least :) The provided patch resolves my scenario for both the gRPC server-client as well as the Java client to nginx server

Re: mux-h2: Backend stream is not fully closed if frontend keeps stream open

2023-09-17 Thread Christopher Faulet
Le 16/09/2023 à 16:00, Valters Jansons a écrit : On Thu, Sep 14, 2023 at 12:35 PM Christopher Faulet wrote: After a discussion with Willy, we've hopefully found a way to fix the issue by delaying detection of the server abort on the request processing side when there is a response to fo

Re: mux-h2: Backend stream is not fully closed if frontend keeps stream open

2023-09-14 Thread Christopher Faulet
of an unhandled event. Thus it could be go to test it on your side if it is possible. The patch is in attachment. It can be applied on top of the 2.9 or 2.8. Is this possible for you ? -- Christopher Faulet From 04892caae72eb13605e4a32b4a182ec22fcc30bf Mon Sep 17 00:00:00 2001 From: Christ

Re: [PATCH] BUG/MINOR: promex: fix backend_agg_check_status

2023-09-12 Thread Christopher Faulet
ck_count[srv_check_status] += 1; + } sv = sv->next; } for (; ctx->obj_state < HCHK_STATUS_SIZE; ctx->obj_state++) { Thanks, merged now ! -- Christopher Faulet

  1   2   3   4   5   6   7   8   >