txresp -hdr "Server: s4"
} -repeat 2 -start
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Server: s4" -body "s4"
} -repeat 5 -start
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Server: s4"
} -repeat 2 -start
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
chunkedlen 0
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
-bodylen 170
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
chunkedlen 0
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
chunkedlen 0
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
chunkedlen 0
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
chunkedlen 0
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
-bodylen 57
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
server s38 {} -start
server s39 {} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
server s37 {} -start
server s39 {} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be1/srv succeeded.*code: 202"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be[0-9]/srv succeeded.*code: 200"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be4/srv succeeded, reason: Layer7 check passed.+info: \"Success\".+check duration: [[:digit:]]+ms, status: 1/1 UP."
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be4/srv succeeded, reason: Layer7 check passed.+info: \"PostgreSQL server is ok\".+check duration: [[:digit:]]+ms, status: 1/1 UP."
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be4/srv failed, reason: Layer7 invalid response.+info: \"unsupported version\".+check duration: [[:digit:]]+ms, status: 0/1 DOWN."
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be3/srv failed, reason: Layer6 invalid response.+check duration: [[:digit:]]+ms, status: 0/1 DOWN."
} -start
-haproxy htst -conf {
+haproxy htst -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy htst -conf {
+haproxy htst -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
expect_close
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
server s1 {
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Health check for server be1/srv succeeded, reason: Layer7 check passed.+code: 200.+check duration: [[:digit:]]+ms, status: 1/1 UP."
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: .* fe1~ be1/srv1 .* 200 [[:digit:]]+ - - ---- .* \"OPTIONS \\* HTTP/1.1\""
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
expect ~ "[^:\\[ ]\\[${h2_pid}\\]: Health check for server be6/srv3 succeeded, reason: Layer7 check passed.+code: 200.+check duration: [[:digit:]]+ms, status: 1/1 UP."
} -start
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/lua_validation.lua
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
feature cmd "$HAPROXY_PROGRAM -cc 'version_atleast(2.5-dev0)'"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
log global
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
# haproxy frontend
-haproxy hap -conf {
+haproxy hap -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -W -conf {
+haproxy h1 -W -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
expect ~ "ssl-offload-http/http .* \"POST (https://.*:${h1_ssl_port})?/[1-8] HTTP/(2\\.0|1\\.1)\""
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
log global
} -run
# Ensure that we achieve the same via a default-server.
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
defaults
mode http
log global
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
# We need one HAProxy for each test, because apparently the connection by
# the client is reused, leading to connection resets.
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
expect resp.http.echo == "3132333435"
} -run
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
expect resp.http.echo == <undef>
} -run
-haproxy h3 -conf {
+haproxy h3 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
expect_close
} -run
-haproxy h4 -conf {
+haproxy h4 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h_edge -conf {
+haproxy h_edge -arg '-dW' -conf {
global
expose-experimental-directives
server dev rhttp@
} -start
-haproxy h_dev -conf {
+haproxy h_dev -arg '-dW' -conf {
global
expose-experimental-directives
barrier b1 cond 2
-haproxy h_edge -conf {
+haproxy h_edge -arg '-dW' -conf {
global
expose-experimental-directives
barrier b1 cond 2
-haproxy h_edge -conf {
+haproxy h_edge -arg '-dW' -conf {
global
expose-experimental-directives
# Simple clear <-> SSL bridge between clients and h_edge haproxy
# Used certificate has the name "client1"
-haproxy h_ssl_bridge -conf {
+haproxy h_ssl_bridge -arg '-dW' -conf {
defaults
log global
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 3 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 3 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 3 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 1 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# TEST - 2
# negative starting index causes startup failure
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# TEST - 3
# negative length causes startup failure
-haproxy h3 -conf {
+haproxy h3 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# TEST - 4
# 0 length causes startup failure
-haproxy h4 -conf {
+haproxy h4 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 3 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 3 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 8 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
sendhex "20250000221100000078217fff24012501270000ffff22000a2600016100016226000163000164"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode tcp
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 10 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 7 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
txresp
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Connection: close"
} -repeat 3 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
-bodylen 16384
} -start
-haproxy h -conf {
+haproxy h -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Cookie: SRVID=S1"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
log ${S1_addr}:${S1_port} len 2048 local0 debug err
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
http-errors errors-1
errorfile 400 ${testdir}/errors/400-1.http
errorfile 403 ${testdir}/errors/403-1.http
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
http-errors errors-1
errorfile 400 ${testdir}/errors/400-1.http
errorfile 403 ${testdir}/errors/403-1.http
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
http-errors errors-1
errorfile 400 ${testdir}/errors/400-1.http
errorfile 403 ${testdir}/errors/403-1.http
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
http-errors errors-2
errorfile 400 ${testdir}/errors/400-2.http
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
#REQUIRE_VERSION=3.0
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
-body "response 4"
} -repeat 3 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
} -start
# haproxy frontend
-haproxy hap -conf {
+haproxy hap -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
# the next request is never received
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
expect ~ "[^:\\[ ]*\\[[0-9]*\\]: .* .* fe2 be2/srv1 [0-9]*/[0-9]*/-1/-1/[0-9]* 503 .* - - SC-- .* .* \"GET /c6 HTTP/1\\.1\""
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
} -start
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
-body "last response"
} -repeat 3 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
-body "last response"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
expect ~ "[^:\\[ ]*\\[[0-9]*\\]: .* .* fe1 be1/srv1 [0-9]*/[0-9]*/[0-9]*/[0-9]*/[0-9]* 200 .* - - ---- .* .* \"GET / HTTP/1\\.1\""
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
tune.bufsize 16384
tune.maxrewrite 1024
expect ~ "[^:\\[ ]*\\[[0-9]*\\]: .* .* fe2 be1/<NOSRV> [0-9]*/-1/-1/-1/[0-9]* 400 .* - - CR-- .* .* \"POST /2 HTTP/1\\.1\""
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout client 100
txresp -status 200 -nolen -bodylen 1048576
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
log stderr len 4096 local0 debug
chunkedlen 0
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
log stderr len 4096 local0 debug
-hdr "Transfer-Encoding: gzip"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
send "1"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
-status 200
} -start
-haproxy hap -conf {
+haproxy hap -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "^.* uri: GET https://hostname:80/ HTTP/2.0; host: {hostname:80}$"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
# haproxy server
-haproxy hapsrv -conf {
+haproxy hapsrv -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
# haproxy LB
-haproxy hap -conf {
+haproxy hap -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
delay 0.05
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
#log stdout format raw daemon
mode http
# haproxy instance used as a server
# generate a http/1.1 websocket response with the valid key
-haproxy hap_srv -conf {
+haproxy hap_srv -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# haproxy instance used as a server
# generate a http/1.1 websocket response with an invalid key
-haproxy hap_srv_bad_key -conf {
+haproxy hap_srv_bad_key -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
http-after-response set-status 101 if { status eq 200 }
} -start
-haproxy hap -conf {
+haproxy hap -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -repeat 2 -start
-haproxy h1 -W -S -conf {
+haproxy h1 -W -S -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
# ipmask,hdr_ip tests with accept-proxy bind
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
# concat,strcmp,word,field haproxy
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults common
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
defaults common
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h3 -conf {
+haproxy h3 -arg '-dW' -conf {
defaults base-http
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
feature ignore_unknown_macro
#test: converters, parsing and header injection logic
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
} -start
#test: "default" and "no option forwarded"
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
expect req.http.be-hdr-crc == 3634102538
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
http-err-codes 220 +300-499 -300-399 # only 220, 400-499 remain
http-fail-codes -550-580 +555,599,556-566
-body "This is a body"
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
feature cmd "$HAPROXY_PROGRAM -cc 'version_atleast(2.5-dev0)'"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -body "test1 after del map ok"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
log global
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
log ${S1_addr}:${S1_port} local0 debug err
txresp -hdr "connection: close"
} -repeat 70 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
tune.bufsize 2048
tune.maxrewrite 128
expect ~ "^.*timeout: 5000 3000.*$"
} -start
-haproxy hap -conf {
+haproxy hap -arg '-dW' -conf {
defaults
timeout connect 5s
timeout client 5s
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: .* lr=.*/h1/cfg:49"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
nbthread 1
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: .* \"GET /client_c8 HTTP/1.1\""
} -repeat 50 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
nbthread 1
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: .* \"GET /backup HTTP/1.1\""
} -repeat 1 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
option httplog
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: .* \"GET /client_c1 HTTP/1.1\""
} -repeat 50 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
option httplog
expect ~ ".* haproxy ${h1_pid} .* txn_close"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: .* hpo=/r/4 hp=http://localhost/r/4 hu=http://localhost/r/4\\?q=4 hq=\\?q=4"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
nbthread 1
expect ~ \"dip\":\"${h1_fe_1_addr}\",\"dport\":\"${h1_fe_1_port}.*\"ts\":\"[cC-][D-]\",\"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
log ${Slg_1_addr}:${Slg_1_port} local0
expect ~ "[^:\\[ ]\\[[0-9]*\\]: Tc=[0-9]* Td=[0-9]* Th=[0-9]* Tt=[0-9]* Tw=[0-9]*$"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/bad_http_clt_req_duration.lua
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Ta=[0-9]* Tc=[0-9]* Td=[0-9]* Th=[0-9]* Ti=[0-9]* Tq=[0-9]* TR=[0-9]* Tr=[0-9]* Tt=[0-9]* Tw=[0-9]*"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/h_txn_get_priv.lua
#REQUIRE_OPTIONS=LUA
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/httpclient_action.lua
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/lua_httpclient.lua
txresp -bodylen 20
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/lua_socket.lua
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/txn_get_priv.lua
lua-load ${testdir}/txn_get_priv-print_r.lua
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/wrong_types_usage.lua
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: Result=SUCCESS Bytes=[[:digit:]]+"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
lua-load ${testdir}/mailers.lua
lua-load ${testdir}/healthcheckmail.lua
} -start
-haproxy h1 -W -S -conf {
+haproxy h1 -W -S -arg '-dW' -conf {
global
log ${S1_addr}:${S1_port} local0 info
server s1 {
} -start
-haproxy h1 -W -S -conf {
+haproxy h1 -W -S -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
#REGTEST_TYPE=slow
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
tcp-request content sc-inc-gpc0(0)
}
-haproxy h2 -arg "-L B" -conf {
+haproxy h2 -arg "-L B" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
http-request sc-inc-gpc0(0)
}
-haproxy h3 -arg "-L C" -conf {
+haproxy h3 -arg "-L C" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
#REGTEST_TYPE=slow
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
tcp-request content sc-inc-gpc0(0)
}
-haproxy h2 -arg "-L B" -conf {
+haproxy h2 -arg "-L B" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
http-request sc-inc-gpc0(0)
}
-haproxy h3 -arg "-L C" -conf {
+haproxy h3 -arg "-L C" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
#REGTEST_TYPE=slow
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
tcp-request content sc-inc-gpc0(0)
}
-haproxy h2 -arg "-L B" -conf {
+haproxy h2 -arg "-L B" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
http-request sc-inc-gpc0(0)
}
-haproxy h3 -arg "-L C" -conf {
+haproxy h3 -arg "-L C" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
http-request sc-inc-gpc0(0)
}
-haproxy h4 -arg "-L D" -conf {
+haproxy h4 -arg "-L D" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
#REQUIRE_OPTIONS=OPENSSL
#REGTEST_TYPE=slow
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
tcp-request content sc-inc-gpc0(0)
}
-haproxy h2 -arg "-L B" -conf {
+haproxy h2 -arg "-L B" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
http-request sc-inc-gpc0(0)
}
-haproxy h3 -arg "-L C" -conf {
+haproxy h3 -arg "-L C" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
http-request sc-inc-gpc0(0)
}
-haproxy h4 -arg "-L D" -conf {
+haproxy h4 -arg "-L D" -arg '-dW' -conf {
defaults
mode http
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
set-var proc.int12 int(12)
set-var proc.int5 var(proc.str60,60),div(proc.int12)
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
txresp -hdr "Set-Cookie: cook1=0; cook2=123; cook3=22"
} -start
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
txresp
} -start
-haproxy h3 -conf {
+haproxy h3 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
-hdr "Set-Cookie: cook4=1; cook5=2; cook6=3"
} -start
-haproxy h4 -conf {
+haproxy h4 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
timeout client 30s
timeout server 30s
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults common
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
varnishtest "Tests for fetching PROXY protocol v2 TLVs"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# note below, str60 is purposely not defined so that the default is used
set-var proc.int12 int(12)
#EXCLUDE_TARGETS=freebsd,osx,generic
#REGTEST_TYPE=devel
-haproxy h1 -W -S -conf {
+haproxy h1 -W -S -arg '-dW' -conf {
global
stats socket "${tmpdir}/h1/stats" level admin expose-fd listeners
#EXCLUDE_TARGETS=freebsd,osx,generic
#REGTEST_TYPE=devel
-haproxy h1 -W -S -conf {
+haproxy h1 -W -S -arg '-dW' -conf {
global
stats socket "${tmpdir}/h1/stats" level admin expose-fd listeners
expect ~ "Health check for server be1/s5 succeeded."
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
stats socket "${tmpdir}/h1/stats" level admin
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
expect ~ "Health check for server li-ssl/s3 succeeded."
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
stats socket "${tmpdir}/h1/stats" level admin
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
stats socket "${tmpdir}/h1/stats" level admin
-body "resp from s2"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature cmd "$HAPROXY_PROGRAM -cc 'version_atleast(2.5-dev0)'"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
server s1 {
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
server www1 ${s1_addr}:${s1_port}
} -start
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
server s1 {
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
ssl-server-verify none
feature ignore_unknown_macro
-haproxy h1 -conf-BAD {} {
+haproxy h1 -arg '-dW' -conf-BAD {} {
defaults
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
#
-haproxy h1 -arg -V -conf-OK {
+haproxy h1 -arg -V -arg '-dW' -conf-OK {
crt-store
load crt "${testdir}/common.crt" key "${testdir}/common.key"
}
-haproxy h2 -arg -V -conf-BAD {} {
+haproxy h2 -arg -V -arg '-dW' -conf-BAD {} {
listen ssl-lst
bind "${tmpdir}/ssl.sock" ssl crt ${testdir}/common.pem strict-sni
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
-body "resp from s1"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
stats socket "${tmpdir}/h1/stats" level admin
feature cmd "command -v openssl && command -v socat"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
stats socket "${tmpdir}/h1/stats" level admin
issuers-chain-path "${testdir}/issuers-chain-path/ca/"
expect ~ "[^:\\[ ]\\[${h1_pid}\\]: .* \"GET /client_c1 HTTP/1.1\""
} -repeat 50 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
insecure-fork-wanted
defaults
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
# This test will only be the most basic one where we check that ocsp response
# loading still works as expected.
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
barrier b2 sync
} -start
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
barrier b3 sync
} -start
-haproxy h3 -conf {
+haproxy h3 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
barrier b4 sync
} -start
-haproxy h4 -conf {
+haproxy h4 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
barrier b5 sync
} -start
-haproxy h5 -conf {
+haproxy h5 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
barrier b6 sync
} -start
-haproxy h6 -conf {
+haproxy h6 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
barrier b7 sync
} -start
-haproxy h7 -conf {
+haproxy h7 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
# instance is removed (via del ssl crt-list).
#
-haproxy h8 -conf {
+haproxy h8 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
} -start
-haproxy h9 -conf {
+haproxy h9 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
feature cmd "command -v socat && command -v openssl"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
feature cmd "$HAPROXY_PROGRAM -cc 'feature(OPENSSL) && openssl_version_atleast(1.0.2)'"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
stats socket "${tmpdir}/h1/stats" level admin
server s1 ${s1_addr}:${s1_port}
} -start
-haproxy h2 -conf {
+haproxy h2 -arg '-dW' -conf {
global
stats socket "${tmpdir}/h2/stats" level admin
server s1 ${s1_addr}:${s1_port}
} -start
-haproxy h3 -conf {
+haproxy h3 -arg '-dW' -conf {
global
stats socket "${tmpdir}/h3/stats" level admin
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# forced to 1 here, because there is a cached session per thread
nbthread 1
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
txresp
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
.if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
} -start
-haproxy h1 -arg "-m 1024" -conf {
+haproxy h1 -arg "-m 1024" -arg '-dW' -conf {
} -start
haproxy h1 -cli {
expect ~ ".*Maxconn: (29000|28000)\n.*"
}
-haproxy h2 -arg "-m 384" -conf {
+haproxy h2 -arg "-m 384" -arg '-dW' -conf {
} -start
haproxy h2 -cli {
expect ~ ".*Maxconn: (11000|10000)\n.*"
}
-haproxy h3 -arg "-m 256" -conf {
+haproxy h3 -arg "-m 256" -arg '-dW' -conf {
} -start
haproxy h3 -cli {
# 1 SSL front but no back
-haproxy h4 -arg "-m 256" -conf {
+haproxy h4 -arg "-m 256" -arg '-dW' -conf {
defaults
mode http
timeout connect 1s
# 1 SSL back but not front
-haproxy h5 -arg "-m 256" -conf {
+haproxy h5 -arg "-m 256" -arg '-dW' -conf {
defaults
mode http
timeout connect 1s
# 1 SSL front and 1 back
-haproxy h6 -arg "-m 256" -conf {
+haproxy h6 -arg "-m 256" -arg '-dW' -conf {
defaults
mode http
timeout connect 1s
#
# anonymous defaults section cannot define TCP/HTTP rules
#
-haproxy h1 -conf-BAD {} {
+haproxy h1 -arg '-dW' -conf-BAD {} {
defaults
http-request set-header X-Hdr 1
}
-haproxy h2 -conf-BAD {} {
+haproxy h2 -arg '-dW' -conf-BAD {} {
defaults
http-response set-header X-Hdr 1
}
-haproxy h3 -conf-BAD {} {
+haproxy h3 -arg '-dW' -conf-BAD {} {
defaults
http-after-request set-header X-Hdr 1
}
-haproxy h4 -conf-BAD {} {
+haproxy h4 -arg '-dW' -conf-BAD {} {
defaults
tcp-request connection accept
}
-haproxy h5 -conf-BAD {} {
+haproxy h5 -arg '-dW' -conf-BAD {} {
defaults
tcp-request session accept
}
-haproxy h6 -conf-BAD {} {
+haproxy h6 -arg '-dW' -conf-BAD {} {
defaults
tcp-request inspect-delay 5s
tcp-request content accept
}
-haproxy h7 -conf-BAD {} {
+haproxy h7 -arg '-dW' -conf-BAD {} {
defaults
tcp-response inspect-delay 5s
tcp-response content accept
# defaults section defining TCP/HTTP rules cannot be used to init another
# defaults section
#
-haproxy h8 -conf-BAD {} {
+haproxy h8 -arg '-dW' -conf-BAD {} {
defaults invalid
tcp-response inspect-delay 5s
tcp-response content accept
# defaults section defining TCP/HTTP rules cannot be used to init a listen
# section
#
-haproxy h9 -conf-BAD {} {
+haproxy h9 -arg '-dW' -conf-BAD {} {
defaults invalid
tcp-request inspect-delay 5s
tcp-request content accept
# backend sections at the same time
#
#
-haproxy h10 -conf-BAD {} {
+haproxy h10 -arg '-dW' -conf-BAD {} {
defaults invalid
tcp-request inspect-delay 5s
tcp-request content accept
# defaults section defining 'tcp-request connection' or 'tcp-request session'
# rules cannot be used to init backend sections
#
-haproxy h11 -conf-BAD {} {
+haproxy h11 -arg '-dW' -conf-BAD {} {
defaults invalid
tcp-request connection accept
server www 127.0.0.1:80
}
-haproxy h12 -conf-BAD {} {
+haproxy h12 -arg '-dW' -conf-BAD {} {
defaults invalid
tcp-request session accept
# defaults section defining 'tcp-response content' rules cannot be used to init
# a frontend section
#
-haproxy h13 -conf-BAD {} {
+haproxy h13 -arg '-dW' -conf-BAD {} {
defaults invalid
tcp-response inspect-delay 5s
tcp-response content accept
bind "fd@${feh10}"
}
-haproxy h14 -arg -V -conf-OK {
+haproxy h14 -arg -V -arg '-dW' -conf-OK {
defaults tcp
timeout client 30s
timeout server 30s
# SRV/TAB arguments without an explicit proxy name are not allowed.
#
-haproxy h15 -conf-BAD {} {
+haproxy h15 -arg '-dW' -conf-BAD {} {
defaults invalid
mode http
http-request set-header x-test "%[srv_conn(www)]"
server www 127.0.0.1:80
}
-haproxy h16 -conf-BAD {} {
+haproxy h16 -arg '-dW' -conf-BAD {} {
defaults invalid
mode http
http-request track-sc0 src
server www 127.0.0.1:80
}
-haproxy h17 -arg -V -conf-OK {
+haproxy h17 -arg -V -arg '-dW' -conf-OK {
defaults common
timeout client 30s
timeout server 30s
server s1 {
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
# Configuration file of 'h1' haproxy instance.
defaults
mode http
varnishtest "stick table: src_conn_rate"
feature ignore_unknown_macro
-haproxy h0 -conf {
+haproxy h0 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -start
-haproxy h0 -conf {
+haproxy h0 -arg '-dW' -conf {
defaults
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Server: be2/s4"
} -repeat 2 -start
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
} -repeat 2 -start
-haproxy h2 -arg "-L B" -conf {
+haproxy h2 -arg "-L B" -arg '-dW' -conf {
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
txresp -hdr "Server: s2"
} -repeat 8 -start
-haproxy h1 -arg "-L A" -conf {
+haproxy h1 -arg "-L A" -arg '-dW' -conf {
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
bind "fd@${fe}"
}
-haproxy h2 -arg "-L B" -conf {
+haproxy h2 -arg "-L B" -arg '-dW' -conf {
defaults
mode http
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
txresp
} -repeat 2 -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
expect req.http.x-test1-bck == "def_back"
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
defaults common
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
feature ignore_unknown_macro
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
} -start
haproxy h1 -cli {
server s1 {
} -start
-haproxy h1 -conf {
+haproxy h1 -arg '-dW' -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring