[PATCH spoa-server] BUG/MINOR: build: install binary inside bin/ directory

2021-06-12 Thread Bertrand Jacquin
Prior to the change, spoa is installed under DESTDIR with name `bin` --- Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/Makefile b/Makefile index 5de6135ec7d6..52eb43e5f938 100644 --- a/Makefile +++ b/Makefile @@ -68,6 +68,7 @@ spoa: $(OBJS) $(LD) $(LDFLAGS) -o $@ $^ $(LDLIBS

[PATCH 1/1] BUG/MINOR: lua: remove loop initial declarations

2021-11-24 Thread Bertrand Jacquin
HAProxy is documented to support gcc >= 3.4 as per INSTALL file, however hlua.c makes use of c11 only loop initial declarations leading to build failure when using gcc-4.9.4: x86_64-unknown-linux-gnu-gcc -Iinclude -Wchar-subscripts -Wcomment -Wformat -Winit-self -Wmain -Wmissing-braces -Wno-pr

[PATCH 1/1] BUG/MEDIUM: tests: use tmpdir to create UNIX socket

2022-12-17 Thread Bertrand Jacquin
testdir can be a very long directory since it depends on source directory path, this can lead to failure during tests when UNIX socket path exceeds maximum allowed length of 97 characters as defined in str2sa_range(). 16:48:14 [ALERT] *** h1debug|(10082) : config : parsing [/tmp/haregt

[PATCH] BUG/MEDIUM: contrib/spoa: do not register python3.8 if --embed fail

2020-05-22 Thread Bertrand Jacquin
spoa server fails to build when python3.8 is not available. If python3-config --embed fails, the output of the command is registered in check_python_config. However when it's later used to define PYTHON_DEFAULT_INC and PYTHON_DEFAULT_LIB it's content does not match and fallback to python2.7 Conte

[PATCH] MINOR: build: discard echoing in help target

2021-01-17 Thread Bertrand Jacquin
When V=1 is used in conjuction with help, the output becomes pretty difficult to read properly. $ make TARGET=linux-glibc V=1 help .. DEBUG_USE_ABORT: use abort() for program termination, see include/haproxy/bug.h for details echo; \ if [ -n "" ]; then \ if [ -n "" ]; then \

[PATCH] DOC: replace use of HAproxy with HAProxy

2021-01-17 Thread Bertrand Jacquin
This is a pretty lame commit in a attempt to use a common wording of HAProxy used 1319 times compared to HAproxy used 18 times --- contrib/syntax-highlight/haproxy.vim | 2 +- doc/SPOE.txt | 2 +- doc/architecture.txt | 2 +- doc/internals/htx-api.txt

[PATCH] DOC: replace use of HA-Proxy with HAProxy

2021-01-17 Thread Bertrand Jacquin
This is a pretty lame commit in a attempt to use a common wording of HAProxy used 1319 times compared to HAproxy used 10 times --- doc/internals/filters.txt | 2 +- doc/intro.txt | 8 doc/management.txt| 2 +- examples/haproxy.init | 2 +- scripts/run-regtests.sh

[PATCH] DOC: replace use of HAproxy with HAProxy

2021-01-17 Thread Bertrand Jacquin
This is a pretty lame commit in a attempt to use a common wording of HAProxy used 1319 times compared to HAproxy used 18 times --- contrib/syntax-highlight/haproxy.vim | 2 +- doc/SPOE.txt | 2 +- doc/architecture.txt | 2 +- doc/internals/htx-api.txt

Re: [PATCH] DOC: replace use of HA-Proxy with HAProxy

2021-01-17 Thread Bertrand Jacquin
On Sunday, January 17 2021 at 20:02:47 +0100, Tim Düsterhus wrote: > Bertrand, > > Am 17.01.21 um 19:58 schrieb Bertrand Jacquin: > > This is a pretty lame commit in a attempt to use a common wording of > > HAProxy used 1319 times compared to HAproxy used 10 times > >

[PATCH] DOC: replace use of HA-Proxy with HAProxy

2021-01-17 Thread Bertrand Jacquin
This is a pretty lame commit in a attempt to use a common wording of HAProxy used 1319 times compared to HA-Proxy used 10 times --- doc/internals/filters.txt | 2 +- doc/intro.txt | 8 doc/management.txt| 2 +- examples/haproxy.init | 2 +- scripts/run-regtests.sh

Re: [PATCH] DOC: replace use of HA-Proxy with HAProxy

2021-01-17 Thread Bertrand Jacquin
On Sunday, January 17 2021 at 20:28:40 +0100, Tim Düsterhus wrote: > Bertrand, > > Am 17.01.21 um 20:19 schrieb Bertrand Jacquin: > > On Sunday, January 17 2021 at 20:02:47 +0100, Tim Düsterhus wrote: > >> Bertrand, > >> > >> Am 17.01.21 um 19:58 schrie

Re: [PATCH] DOC: replace use of HA-Proxy with HAProxy

2021-01-20 Thread Bertrand Jacquin
Hi Willy, On Wednesday, January 20 2021 at 19:54:09 +0100, Willy Tarreau wrote: > On Mon, Jan 18, 2021 at 08:47:43AM +0100, William Lallemand wrote: > > Hello Bertrand, > > > > On Sun, Jan 17, 2021 at 06:58:46PM +0000, Bertrand Jacquin wrote: > > > This is a pret

[PATCH 1/1] BUG/MINOR: worker: define _GNU_SOURCE for strsignal()

2021-01-20 Thread Bertrand Jacquin
glibc < 2.10 requires _GNU_SOURCE in order to make use of strsignal(), otherwise leading to SEGV at runtime. $ make V=1 TARGET=linux-glibc-legacy USE_THREAD= USE_ACCEPT4= .. src/mworker.c: In function 'mworker_catch_sigchld': src/mworker.c:285: warning: implicit declaration of function 'st

[PATCH 1/1] MINOR: lua: remove unused variable

2021-01-21 Thread Bertrand Jacquin
hlua_init() uses 'idx' only in openssl related code, while 'i' is used in shared code and is safe to be reused. This commit replaces the use of 'idx' with 'i' $ make V=1 TARGET=linux-glibc USE_LUA=1 USE_OPENSSL= .. cc -Iinclude -O2 -g -Wall -Wextra -Wdeclaration-after-statement -fwrapv -Wn

[PATCH 1/1] BUG/MINOR: lua: define _GNU_SOURCE for LLONG_MAX

2021-01-21 Thread Bertrand Jacquin
Lua requires LLONG_MAX defined with __USE_ISOC99 which is set by _GNU_SOURCE, not necessarely defined by default on old compiler/glibc. $ make V=1 TARGET=linux-glibc-legacy USE_THREAD= USE_ACCEPT4= USE_PCRE=1 USE_OPENSSL=1 USE_ZLIB=1 USE_LUA=1 .. cc -Iinclude -O2 -g -Wall -Wextra -Wdeclar

[PATCH 1/1] MINOR: sample: allow build with OpenSSL 1.0.2

2021-01-21 Thread Bertrand Jacquin
According to INSTALL file, OpenSSL 1.0.2 is still supported by HAProxy, however OpenSSL 1.0.2 lacking CRYPTO_memcmp(), haproxy does not build: $ make V=1 TARGET=linux-glibc USE_NS= USE_OPENSSL=1 .. cc -Iinclude -O2 -g -Wall -Wextra -Wdeclaration-after-statement -fwrapv -Wno-unused-label -

Re: [PATCH 1/1] MINOR: sample: allow build with OpenSSL 1.0.2

2021-01-21 Thread Bertrand Jacquin
Hi, On Thursday, January 21 2021 at 22:34:27 +0100, Tim Düsterhus wrote: > Bertrand, > > Note: I was the contributor that added the secure_memcmp converter. > > Am 21.01.21 um 22:16 schrieb Bertrand Jacquin: > > diff --git a/doc/configuration.txt b/doc/configuration.txt &

Re: [PATCH 1/1] MINOR: sample: allow build with OpenSSL 1.0.2

2021-01-21 Thread Bertrand Jacquin
On Friday, January 22 2021 at 00:58:06 +0100, Tim Düsterhus wrote: > Bertrand, > > Am 22.01.21 um 00:45 schrieb Bertrand Jacquin: > >> The strcmp converter is not binary safe. It uses strncmp internally. > > > > It is not indeed, what do you think of im

[PATCH v2 1/2] DOC: ssl: fix typo in INSTALL

2021-01-21 Thread Bertrand Jacquin
--- INSTALL | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/INSTALL b/INSTALL index 32c0dd338fb5..7d3cbf4ba5c4 100644 --- a/INSTALL +++ b/INSTALL @@ -213,7 +213,7 @@ to forcefully enable it using "USE_LIBCRYPT=1". 4.5) Cryptography - For SSL/TLS, it is necess

[PATCH v2 2/2] MINOR: sample: allow build with OpenSSL < 1.0.1d

2021-01-21 Thread Bertrand Jacquin
According to INSTALL file, OpenSSL 1.0.1d is still supported by HAProxy, however OpenSSL 1.0.2 lacking CRYPTO_memcmp(), haproxy does not build: $ make V=1 TARGET=linux-glibc USE_NS= USE_OPENSSL=1 .. cc -Iinclude -O2 -g -Wall -Wextra -Wdeclaration-after-statement -fwrapv -Wno-unused-label

[PATCH 1/1] MINOR: build: force CC to set a return code when probing options

2021-03-06 Thread Bertrand Jacquin
gcc returns non zero code if an option is not supported (tested from 6.5 to 10.2). $ gcc -Wfoobar -E -xc - -o /dev/null < /dev/null > /dev/null 2>&1 ; echo $? 1 clang always return 0 if an option in not recognized unless -Werror is also passed, preventing a correct probing of options supporte

Re: [PATCH 1/1] MINOR: build: force CC to set a return code when probing options

2021-03-06 Thread Bertrand Jacquin
Hi Lukas, On Saturday, March 06 2021 at 23:48:52 +0100, Lukas Tribus wrote: > Hello, > > On Sat, 6 Mar 2021 at 21:25, Bertrand Jacquin wrote: > > > > gcc returns non zero code if an option is not supported (tested > > from 6.5 to 10.2). > > > > $ gcc -Wf

Re: [ANNOUNCE] haproxy-2.4-dev14

2021-03-27 Thread Bertrand Jacquin
Hi Willy, > Another discussion started around an easier support for some modern > platforms. In issue #1194, Ashley Penney was caught running on AWS's ARM > instances with the default ARM target optimizations. For having run some > tests on these machines, I can't say enough how great they are, bu

[PATCH 6/8] DOC: ssl: Use correct wording for ca-sign-pass

2016-11-13 Thread Bertrand Jacquin
Doc references ca-sign-passphrase but the source code is referring ca-sign-pass. Align doc to reality. --- doc/configuration.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/configuration.txt b/doc/configuration.txt index 6d92a4530749..24a222f3d1b9 100644 --- a/doc/confi

[PATCH 1/8] MINOR: tcp: Store upstream proxy TCP informations before overwrite

2016-11-13 Thread Bertrand Jacquin
This can be useful in order to extend ACL and log format with upstream proxy information when accept-proxy or accept-netscaler-cip is being used --- include/proto/connection.h | 32 include/types/connection.h | 9 - src/connection.c | 42

[PATCH 5/8] CLEANUP: ssl: Fix bind keywords name in comments

2016-11-13 Thread Bertrand Jacquin
Along with a whitespace cleanup and a grammar typo --- src/ssl_sock.c | 7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/src/ssl_sock.c b/src/ssl_sock.c index b14bb8a46e1b..ae6d19f2f69c 100644 --- a/src/ssl_sock.c +++ b/src/ssl_sock.c @@ -5144,8 +5144,7 @@ static int bind_p

[PATCH 2/8] MINOR: tcp: Add upstream proxy information fetch

2016-11-13 Thread Bertrand Jacquin
When accept-proxy or accept-netscaler-cip are being used, this gives the ability to perform action based on the TCP connections between upstream proxy and haproxy instead of the connection between the client and the upstream proxy. --- doc/configuration.txt | 28 src/proto_tcp.c

[PATCH 8/8] BUG/MINOR: ssl: Print correct filename when error occurs reading OCSP

2016-11-13 Thread Bertrand Jacquin
When Multi-Cert bundle are used, error is throwned regarding certificate filename without including certifcate type extension. --- src/ssl_sock.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/ssl_sock.c b/src/ssl_sock.c index 453647bd7e6c..ef03525fc514 100644 --- a/src/ss

[PATCH 4/8] MINOR: ssl: Remove goto after return dead code

2016-11-13 Thread Bertrand Jacquin
This code can never be reached. --- src/payload.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/src/payload.c b/src/payload.c index 3a534c377925..a02a86966051 100644 --- a/src/payload.c +++ b/src/payload.c @@ -181,9 +181,6 @@ smp_fetch_req_ssl_st_ext(const struct arg *args, struct sample

[PATCH 3/8] MINOR: log: Add upstream proxy keyword

2016-11-13 Thread Bertrand Jacquin
When accept-proxy or accept-netscaler-cip are being used, this gives the ability to log upstream proxy source IP and port. --- doc/configuration.txt | 4 include/types/log.h | 4 src/log.c | 66 +++ 3 files changed, 74 inser

[PATCH 7/8] BUG/MEDIUM: ssl: Store certificate filename in a variable

2016-11-13 Thread Bertrand Jacquin
Before this change, trash is being used to create certificate filename to read in care Mutli-Cert are in used. But then ssl_sock_load_ocsp() modify trash leading to potential wrong information given in later error message. This also blocks any further use of certificate filename for other usage, l

Re: [PATCH 1/8] MINOR: tcp: Store upstream proxy TCP informations before overwrite

2016-11-13 Thread Bertrand Jacquin
On Sun, Nov 13, 2016 at 07:48:46PM +0100, Willy Tarreau wrote: > Hi Bertrand, > > On Sun, Nov 13, 2016 at 04:37:07PM +, Bertrand Jacquin wrote: > > This can be useful in order to extend ACL and log format with upstream > > proxy information when accept-proxy or accept-n

Re: [ANNOUNCE] haproxy-1.7.1

2016-12-15 Thread Bertrand Jacquin
On 15/12/2016 19:03, Lukas Tribus wrote: Hi Igor, Am 14.12.2016 um 20:47 schrieb Igor Pav: Hi Lukas, in fact, openssl already gets early TLS 1.3 adoption in dev, will release in 1.1.1, and BoringSSL supports TLSv1.3 already. That's nice, and in fact since 1.1.1 will be API compatible with 1.

Re: NetScaler CIP analysing code seems to be incorrect

2017-04-04 Thread Bertrand Jacquin
Hi Andreas, Sorry for the long delay, I was out for a while and miss this email. To be honest with you, I was expecting to get some weirdness like this. I'm reaching out Citrix on a side channel to see if different specs for the protocol exist so I may do the appropriate changes in haproxy to sup

[PATCH 2/2] DOC: ssl: Specify stronger example ciphers

2019-02-04 Thread Bertrand Jacquin
Since TLS ciphers are not well understand, it is very common parameters from documentation are used as is. Since RC4 should not be used anymore I believe it is wiser to show example including stronger ciphers to avoid deploying unsafe configuration in the wild. "ALL" is also to avoid since it cont

[PATCH 1/2] DOC: ssl: Clarify when pre TLSv1.3 cipher can be used

2019-02-04 Thread Bertrand Jacquin
This is mainly driven by the fact TLSv1.3 will have a successor at some point. --- doc/configuration.txt | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/configuration.txt b/doc/configuration.txt index fe5eb25076c7..f7e1339a3e9b 100644 --- a/doc/configuration.txt +++ b/d

Re: [PATCH 2/2] DOC: ssl: Specify stronger example ciphers

2019-02-06 Thread Bertrand Jacquin
TS by default. What do you think Bertrand ? Yep, all of this sounds legit. Please find attache a new patch serie attempting to address all your concerns. Cheers, Bertrand -- BertrandFrom 10071238c893b49cd43cf447a885e4b6af4cd44c Mon Sep 17 00:00:00 2001 From: Bertrand Jacquin Date: Sun, 3 Feb 20

[PATCH] DOC: fix successful typo

2019-05-16 Thread Bertrand Jacquin
--- scripts/run-regtests.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/scripts/run-regtests.sh b/scripts/run-regtests.sh index ccfdd601acf4..19e8a1564b1b 100755 --- a/scripts/run-regtests.sh +++ b/scripts/run-regtests.sh @@ -49,12 +49,12 @@ _help() Including tex

Re: [PATCH] BUG: NetScaler CIP handling is incorrect

2017-12-11 Thread Bertrand Jacquin
Hi Andreas, I got this really side tracked, my apology. Let me take a look at that this evening again. Some corps need to be unburied. I'm afraid the patch, as is, will break compatibility with other version of the CIP protocol, I'd like haproxy to support both of them. Cheers, Bertrand On 07/1

Re: [PATCH] BUG: NetScaler CIP handling is incorrect

2017-12-19 Thread Bertrand Jacquin
serie applies cleanly on v1.9-dev0-76-g789691778fde but also on v1.8.1-20-gdd8ea125889d while I only tested it on v1.9. Cheers, Bertrand On 11/12/17 15:04, Bertrand Jacquin wrote: > Hi Andreas, > > I got this really side tracked, my apology. Let me take a look at that > this evening

Re: [PATCH] BUG: NetScaler CIP handling is incorrect

2017-12-21 Thread Bertrand Jacquin
Hi Willy, On 21/12/17 10:08, Willy Tarreau wrote: > On Thu, Dec 21, 2017 at 11:05:30AM +0100, Andreas Mahnke wrote: >> Hi Willy, >> >> The support of the standard protocol in 1.8 would be nice, because we are >> planning to migrate to haproxy 1.8 from our self - patched 1.7 instances. > > OK. Ber

Re: [PATCH] BUG: NetScaler CIP handling is incorrect

2017-12-21 Thread Bertrand Jacquin
On 21/12/17 13:28, Willy Tarreau wrote: > On Thu, Dec 21, 2017 at 10:46:17AM +0000, Bertrand Jacquin wrote: >> I'm all good with backporting this in 1.8. Feel free to. > > Great, now merged. Do not hesitate to report back any issues you > would notice on your infrastructu

server source behaviour

2018-02-05 Thread Bertrand Jacquin
Hi, I am not sure if the following configuration should be working, but it looks like it does while the documentation does not specify if I could be using it. Having a quick look at the source, it does not seem obvious either. Anyway, I'm just curious to know if the following should be working:

Re: [ANNOUNCE] haproxy-1.8.13

2018-07-31 Thread Bertrand Jacquin
Hi Willy, On 30/07/2018 19:55, Willy Tarreau wrote: On Mon, Jul 30, 2018 at 07:41:33PM +0200, Tim Düsterhus wrote: Willy, Am 30.07.2018 um 18:05 schrieb Willy Tarreau: > A small update happened to the download directory, the sha256 of the > tar.gz files are now present in addition to the (quit

Re: [ANNOUNCE] haproxy-1.8.13

2018-07-31 Thread Bertrand Jacquin
On 31/07/2018 18:26, Bertrand Jacquin wrote: Hi Willy, On 30/07/2018 19:55, Willy Tarreau wrote: On Mon, Jul 30, 2018 at 07:41:33PM +0200, Tim Düsterhus wrote: Willy, Am 30.07.2018 um 18:05 schrieb Willy Tarreau: > A small update happened to the download directory, the sha256 of the >

[PATCH] MINOR: ssl: Use consistent naming for TLS protocols

2018-08-13 Thread Bertrand Jacquin
In most cases, "TLSv1.x" naming is used across and documentation, lazy people tend to grep too much and may not find what they are looking for. Fixing people is hard. --- doc/configuration.txt | 2 +- src/ssl_sock.c| 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/

[PATCH] DOC: Fix typos in lua documentation

2018-09-13 Thread Bertrand Jacquin
Hi, Please find attached a patch to fix some typos in the lua documentation. Cheers, -- BertrandFrom a8c24069246fc6ba6e9a956963158596ec4a0a3b Mon Sep 17 00:00:00 2001 From: Bertrand Jacquin Date: Mon, 10 Sep 2018 21:26:07 +0100 Subject: [PATCH] DOC: Fix typos in lua documentation --- doc

[PATCH] DOC: Fix typo

2018-10-13 Thread Bertrand Jacquin
--- CONTRIBUTING | 6 +++--- include/types/connection.h | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/CONTRIBUTING b/CONTRIBUTING index b5ba18241c1c..575e63b40039 100644 --- a/CONTRIBUTING +++ b/CONTRIBUTING @@ -309,7 +309,7 @@ do not think about them anymore

Re: Follow-up on thread 'SSL handshake failure' from 2/5/2013

2013-04-26 Thread Bertrand Jacquin
Hi, If it can help, I've been in touch with Emeric about SSL handshake failure since some times now but it's maybe preferable to use the ML to share experience. I'm using the following cipher filter list : 'ALL:!SSLv2:!eNULL:!aNULL:!LOW:!EXPORT:!kECDH:!MD5:@STRENGTH' The PEM file I used is

Re: Follow-up on thread 'SSL handshake failure' from 2/5/2013

2013-04-26 Thread Bertrand Jacquin
$ openssl ciphers -v 'ALL:!SSLv2:!eNULL:!aNULL:!LOW:!EXPORT:!kECDH:!MD5:@STRENGTH' \ | while read C dumb; do echo -n "# $C " openssl s_client -connect 176.31.104.63:443 -cipher $C < /dev/null > /dev/null 2>&1 \ && echo OK \ || echo FAIL \ done \ | sort -k 3 \

[PATCH] proxy: support use_backend with dynamic names

2014-03-23 Thread Bertrand Jacquin
same logic for use-server and many other part such as reqadd.. Bertrand -- Bertrand Jacquin, EXOSEC (http://www.exosec.fr/) ZAC des Metz - 3 Rue du petit robinson - 78350 JOUY EN JOSAS Tel: +33 1 30 67 60 65 - Fax: +33 1 75 43 40 70 mailto:bjacq...@exosec.fr >From bc306e460752244e73ca7c04

Re: [PATCH] proxy: support use_backend with dynamic names

2014-03-31 Thread Bertrand Jacquin
> > > > And it does not work. I am not yet familiar with code to determine why this > > does not work. Again, the current proposal works well for me but an > > enhancement should probably consider using maps within dynamic lookup. > > > > +1 for the patch. >

BUG/FEATURE? http-request always applied if backend not available

2014-04-01 Thread Bertrand Jacquin
Hi Willy, I'm getting trouble with that sample configuration when backend has no server available : defaults HTTP mode http option httplog log global frontend ft_public bind 0.0.0.0:80 name HTTP bind 0.0.0.0:443 name HTTPS ssl crt foo.pem acl v-local hdr(Host) 203.0.113.42 acl p-

Re: BUG/FEATURE? http-request always applied if backend not available

2014-04-01 Thread Bertrand Jacquin
Hi Cyril, D'ar meurzh 01 a viz Ebrel 2014 e 23 eur 35, « Cyril Bonté » he deus skrivet : > > > If bk_local has server UP in the farm, and request look like > > https://203.0.113.42/__bar, then everything is fine, request is nicely > > handled by bk_local/localhost. http://203.0.113.42/__bar is cor

Re: BUG/FEATURE? http-request always applied if backend not available

2014-04-01 Thread Bertrand Jacquin
D'ar meurzh 01 a viz Ebrel 2014 e 23 eur 46, « Cyril Bonté » he deus skrivet : > Le 01/04/2014 23:42, Bertrand Jacquin a écrit : > > Hi Cyril, > > > > D'ar meurzh 01 a viz Ebrel 2014 e 23 eur 35, « Cyril Bonté » he deus > > skrivet : > >> > >&

Re: BUG/FEATURE? http-request always applied if backend not available

2014-04-01 Thread Bertrand Jacquin
D'ar merc'her 02 a viz Ebrel 2014 e 00 eur 13, « Cyril Bonté » he deus skrivet : > Le 01/04/2014 23:56, Bertrand Jacquin a écrit : > > When bk_local/localhost is UP : > > > > $ curl -vk -so /dev/null https://203.0.113.42/__bar/ > > (...) > >> GET

Re: BUG/FEATURE? http-request always applied if backend not available

2014-04-02 Thread Bertrand Jacquin
On 2014-04-02 14:05, Willy Tarreau wrote: Hi, On Wed, Apr 02, 2014 at 12:50:08AM +0200, Cyril Bonté wrote: Le 02/04/2014 00:16, Bertrand Jacquin a écrit : >>What is adding the Vary and Strict-Transport-Security headers in this >>second case ? > >A missing 'http-resp

Re: timeout gated by ACL is enforced regardless of ACL match set

2014-05-21 Thread Bertrand Jacquin
Hi Adam, On 2014-05-21 21:45, Adam Bruehl wrote: I added the following to one of my front ends. acl abuse_users src -f /etc/haproxy/abuse_users.lst timeout http-request 5s if abuse_users Unfortunately, you cannot use any condition on 'timeout' keyword, they are simply ignored. There have b

Re: [PATCH] MAJOR: filters: Add filters support

2016-09-19 Thread Bertrand Jacquin
On Mon, Sep 19, 2016 at 10:08:32AM +0200, Christopher Faulet wrote: > Le 18/09/2016 à 04:17, Bertrand Jacquin a écrit : > > Today I noticed data corruption when haproxy is used for compression > > offloading. I bisected twice, and it lead to this specific commit but > > I'

Re: [PATCH] MAJOR: filters: Add filters support

2016-09-22 Thread Bertrand Jacquin
Hi Christopher, On 22/09/2016 14:59, Christopher Faulet wrote: Le 22/09/2016 à 04:05, Bertrand Jacquin a écrit : On Tue, Sep 20, 2016 at 08:16:09AM +0200, Willy Tarreau wrote: Hi Bertrand, On Tue, Sep 20, 2016 at 12:13:32AM +0100, Bertrand Jacquin wrote: And finally, If you can share with

[PATCH] MINOR: build: Allow linking to device-atlas library file

2016-10-05 Thread Bertrand Jacquin
DeviceAtlas might be installed in a location where a user might not have enough permissions to write json.o and dac.o --- Makefile | 4 1 file changed, 4 insertions(+) diff --git a/Makefile b/Makefile index 0ce4b325305c..a10d2e4c1040 100644 --- a/Makefile +++ b/Makefile @@ -622,8 +622,12 @@

Re: [PATCH] MINOR: build: Allow linking to device-atlas library file

2016-10-06 Thread Bertrand Jacquin
hed a new version of the patch. Cheers, Bertrand > Cheers. > > On 6 October 2016 at 00:39, Bertrand Jacquin wrote: > > DeviceAtlas might be installed in a location where a user might not have > > enough permissions to write json.o and dac.o > > --- > > Makefile |

git clone git.haproxy.git with curl-8.7.1 failing writing received data

2024-04-05 Thread Bertrand Jacquin
Hi, For the last few days, I've been unable to git clone https://git.haproxy.org/git/haproxy.git with curl-8.7.1, where I'm getting the following error: $ GIT_TRACE=1 git fetch https://git.haproxy.org/git/haproxy.git 19:12:01.277740 git.c:463 trace: built-in: git fetch http

Re: git clone git.haproxy.git with curl-8.7.1 failing writing received data

2024-04-05 Thread Bertrand Jacquin
Hey Willy, On 2024-04-05 19:44, Willy Tarreau wrote: Thanks a lot for these details. One thing to have in mind that could explain that you have not observed this on other servers is that we're using plain HTTP, we haven't deployed the git-server stuff, so maybe it triggers a different object tr

Re: git clone git.haproxy.git with curl-8.7.1 failing writing received data

2024-04-05 Thread Bertrand Jacquin
On 2024-04-05 20:24, Bertrand Jacquin wrote: Just let us know if you're interested. We can also first wait for Stefan and/or Daniel's analysis of a possible cause for the commit you bisected above before hacking too much stuff, though :-) Let's see! Latest digging seems

regression in libc resolver since 2.9.0

2024-05-05 Thread Bertrand Jacquin
Hi, Since c886fb58eb56 ("MINOR: server/ip: centralize server ip updates"), there is a regression with server address resolution made against libc with getaddrinfo(), specifically when returned address are IPv6 address with % notation which specifies which interface index to access given address (u