We forgot to resize the response buffer to what we actually got,
so the initial buffer size (512) was mistakenly used later on.
Technically this should not be an issue as the buffer is large
enough, but that prevents us from reporting that the response
was broken if it not large enough for a DNS header, for example.
data->d_ds->submitHealthCheckResult(data->d_initial, false);
return;
}
+ data->d_buffer.resize(static_cast<size_t>(got));
/* we are using a connected socket but hey.. */
if (from != data->d_ds->d_config.remote) {