We forgot to resize the response buffer to what we actually got,
so the initial buffer size (512) was mistakenly used later on.
Technically this should not be an issue as the buffer is large
enough, but that prevents us from reporting that the response
was broken if it not large enough for a DNS header, for example.
(cherry picked from commit
6a04912e36e32104434d2b1b0625a0de0e0c002d)
data->d_ds->submitHealthCheckResult(data->d_initial, false);
return;
}
+ data->d_buffer.resize(static_cast<size_t>(got));
/* we are using a connected socket but hey.. */
if (from != data->d_ds->d_config.remote) {