} -start
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 5 -start
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
server s39 {} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
server s39 {} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy htst -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy htst -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
ssl-default-bind-options ssl-min-ver TLSv1.2 ssl-max-ver TLSv1.3
defaults
haproxy htst -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h2 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/lua_validation.lua
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# this is needed since 3.3, and this test will be removed in 3.5.
expose-deprecated-directives
# haproxy frontend
haproxy hap -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
haproxy h1 -Ws -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
nbthread 1
defaults
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
nbthread 1
defaults
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
log global
# Ensure that we achieve the same via a default-server.
haproxy h2 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
log global
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
# the client is reused, leading to connection resets.
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -run
haproxy h2 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -run
haproxy h3 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -run
haproxy h4 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h_edge -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
expose-experimental-directives
defaults
haproxy h_dev -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
expose-experimental-directives
defaults
haproxy h_edge -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
expose-experimental-directives
defaults
haproxy h_edge -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
expose-experimental-directives
defaults
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 3 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 3 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 3 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 1 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# TEST - 2
# negative starting index causes startup failure
haproxy h2 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# TEST - 3
# negative length causes startup failure
haproxy h3 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# TEST - 4
# 0 length causes startup failure
haproxy h4 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 3 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 3 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode tcp
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 10 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 3 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
log ${S1_addr}:${S1_port} len 2048 local0 debug err
defaults
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
http-errors errors-1
errorfile 400 ${testdir}/errors/400-1.http
errorfile 403 ${testdir}/errors/403-1.http
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
http-errors errors-1
errorfile 400 ${testdir}/errors/400-1.http
errorfile 403 ${testdir}/errors/403-1.http
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
http-errors errors-1
errorfile 400 ${testdir}/errors/400-1.http
errorfile 403 ${testdir}/errors/403-1.http
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
http-errors errors-2
errorfile 400 ${testdir}/errors/400-2.http
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
# haproxy frontend
haproxy hap -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h2 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client 100
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
log stderr len 4096 local0 debug
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
log stderr len 4096 local0 debug
defaults
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy hap -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# haproxy server
haproxy hapsrv -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# haproxy LB
haproxy hap -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
#log stdout format raw daemon
mode http
# haproxy instance used as a server
# generate a http/1.1 websocket response with the valid key
haproxy hap_srv -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# haproxy instance used as a server
# generate a http/1.1 websocket response with an invalid key
haproxy hap_srv_bad_key -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy hap -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -Ws -S -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# ipmask,hdr_ip tests with accept-proxy bind
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# concat,strcmp,word,field haproxy
haproxy h2 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults common
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h2 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults common
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h3 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults base-http
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
#test: converters, parsing and header injection logic
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
#test: "default" and "no option forwarded"
haproxy h2 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
http-err-codes 220 +300-499 -300-399 # only 220, 400-499 remain
http-fail-codes -550-580 +555,599,556-566
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
log global
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
log ${S1_addr}:${S1_port} local0 debug err
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.bufsize 2048
tune.maxrewrite 128
} -start
haproxy hap -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout connect 5s
timeout client 5s
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
nbthread 1
defaults
} -repeat 1 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
option httplog
} -repeat 50 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
option httplog
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
nbthread 1
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
log ${Slg_1_addr}:${Slg_1_port} local0
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/bad_http_clt_req_duration.lua
} -start
haproxy h1 -conf {
- defaults
- timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
- timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
-
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/close_wait_lf.lua
+ defaults
+ timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
+ timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
+
frontend frt
log ${Slog_addr}:${Slog_port} local0 debug err
log-format Ta=%Ta\ Tc=%Tc\ Td=%Td\ Th=%Th\ Ti=%Ti\ Tq=%Tq\ TR=%TR\ Tr=%Tr\ Tt=%Tt\ Tw=%Tw
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/h_txn_get_priv.lua
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/httpclient_action.lua
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/lua_httpclient.lua
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/lua_socket.lua
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
tune.idle-pool.shared off
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/set_var.lua
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/txn_get_priv.lua
lua-load ${testdir}/txn_get_priv-print_r.lua
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/wrong_types_usage.lua
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.lua.bool-sample-conversion normal
lua-load ${testdir}/mailers.lua
lua-load ${testdir}/healthcheckmail.lua
haproxy h1 -Ws -S -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
log ${S1_addr}:${S1_port} local0 info
defaults
} -start
haproxy h1 -Ws -S -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
#REGTEST_TYPE=slow
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h2 -arg "-L B" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h3 -arg "-L C" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
#REGTEST_TYPE=slow
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h2 -arg "-L B" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h3 -arg "-L C" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
#REGTEST_TYPE=slow
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h2 -arg "-L B" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h3 -arg "-L C" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h4 -arg "-L D" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
#REGTEST_TYPE=slow
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h2 -arg "-L B" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h3 -arg "-L C" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h4 -arg "-L D" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
set-var proc.int12 int(12)
set-var proc.int5 var(proc.str60,60),div(proc.int12)
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
} -start
haproxy h2 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
} -start
haproxy h3 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
} -start
haproxy h4 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout client 30s
timeout server 30s
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults common
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# note below, str60 is purposely not defined so that the default is used
set-var proc.int12 int(12)
set-var proc.int5 var(proc.str60,60),div(proc.int12)
haproxy h1 -Ws -S -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h1/stats" level admin expose-fd listeners
defaults
haproxy h1 -Ws -S -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h1/stats" level admin expose-fd listeners
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h1/stats" level admin
defaults
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h1/stats" level admin
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h1/stats" level admin
defaults
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h2 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
ssl-server-verify none
defaults
feature ignore_unknown_macro
haproxy h1 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -arg -V -conf-OK {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-store
load crt "${testdir}/common.crt" key "${testdir}/common.key"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h1/stats" level admin
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h1/stats" level admin
issuers-chain-path "${testdir}/issuers-chain-path/ca/"
crt-base "${testdir}/issuers-chain-path"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
insecure-fork-wanted
defaults
mode http
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h2 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h3 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h4 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h5 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h6 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h7 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h8 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h9 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
# ocsp-update.mode on
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
ocsp-update.mode on
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
ocsp-update.mode off
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
# ocsp-update.mode off
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
ocsp-update.mode on
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
ocsp-update.mode off
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
# ocsp-update.mode off
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
# ocsp-update.mode off
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
ocsp-update.mode on
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
ocsp-update.mode on
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
ocsp-update.mode off
cat << EOF > ${tmpdir}/ocsp_compat_check.cfg
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
crt-base ${testdir}/ocsp_update/multicert
ocsp-update.mode off
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h1/stats" level admin
defaults
haproxy h2 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h2/stats" level admin
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
tune.ssl.default-dh-param 4096
defaults
haproxy h3 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats socket "${tmpdir}/h3/stats" level admin
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
ssl-dh-param-file ${testdir}/common.4096.dh
defaults
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
server wrong_ciphers2 "${tmpdir}/wrong_ciphers_ssl.sock" ssl verify none crt ${testdir}/client1.pem ca-file ${testdir}/ca-auth.crt force-tlsv12 ciphers "aECDSA" sni str(foo.com)
.else
server wrong_ciphers_tls13 "${tmpdir}/wrong_ciphers_tls13_ssl.sock" ssl verify none crt ${testdir}/client1.pem ca-file ${testdir}/ca-auth.crt ciphersuites "TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256" force-tlsv13 sni str(foo.com)
-.endif
+ .endif
listen wrong_ciphers_tls13_ssl_lst from bknd_err_dflt
bind "${tmpdir}/wrong_ciphers_tls13_ssl.sock" ssl crt ${testdir}/common.pem ca-file ${testdir}/ca-auth.crt verify none force-tlsv13 ciphersuites "TLS_AES_128_GCM_SHA256"
server s1 ${s1_addr}:${s1_port}
-.endif
+ .endif
} -start
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# forced to 1 here, because there is a cached session per thread
nbthread 1
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
.endif
# 1 SSL front but no back
haproxy h4 -arg "-m 256" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect 1s
# 1 SSL back but not front
haproxy h5 -arg "-m 256" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect 1s
# 1 SSL front and 1 back
haproxy h6 -arg "-m 256" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect 1s
# anonymous defaults section cannot define TCP/HTTP rules
#
haproxy h1 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
http-request set-header X-Hdr 1
}
haproxy h2 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
http-response set-header X-Hdr 1
}
haproxy h3 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
http-after-request set-header X-Hdr 1
}
haproxy h4 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
tcp-request connection accept
}
haproxy h5 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
tcp-request session accept
}
haproxy h6 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
tcp-request inspect-delay 5s
tcp-request content accept
}
haproxy h7 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
tcp-response inspect-delay 5s
tcp-response content accept
# defaults section
#
haproxy h8 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults invalid
tcp-response inspect-delay 5s
tcp-response content accept
# section
#
haproxy h9 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults invalid
tcp-request inspect-delay 5s
tcp-request content accept
#
#
haproxy h10 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults invalid
tcp-request inspect-delay 5s
tcp-request content accept
# rules cannot be used to init backend sections
#
haproxy h11 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults invalid
tcp-request connection accept
}
haproxy h12 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults invalid
tcp-request session accept
# a frontend section
#
haproxy h13 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults invalid
tcp-response inspect-delay 5s
tcp-response content accept
}
haproxy h14 -arg -V -conf-OK {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults tcp
timeout client 30s
timeout server 30s
#
haproxy h15 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults invalid
mode http
http-request set-header x-test "%[srv_conn(www)]"
}
haproxy h16 -conf-BAD {} {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults invalid
mode http
http-request track-sc0 src
}
haproxy h17 -arg -V -conf-OK {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults common
timeout client 30s
timeout server 30s
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
stats-file ${testdir}/sample-stats-file
defaults
haproxy h1 -conf {
# Configuration file of 'h1' haproxy instance.
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
haproxy h0 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h0 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h2 -arg "-L B" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 8 -start
haproxy h1 -arg "-L A" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
}
haproxy h2 -arg "-L B" -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
haproxy h1 -conf {
+ global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
defaults common
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if feature(THREAD)
+ thread-groups 1
+ .endif
+
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.