TCP check expect matching strings or binary patterns are able to know prior to applying their match function whether the available data is already sufficient to attempt the match or not. As such, on insufficient data the expect is postponed. This behavior avoids unnecessary matches when the data could not possibly match. When chaining expect, upon passing the previous and going onto the next however, this length check is not done again. Then the match is done and will necessarily fail, triggering a new wait for more data. The end result is the same for a slightly higher cost. Check received data length for all expects in a chain. This bug exists since the introduction of the feature: Fixes: 5ecb77f4c76f ("MEDIUM: checks: add send/expect tcp based check") Version 1.5+ impacted.
The HAProxy documentation has been split into a number of different files for ease of use. Please refer to the following files depending on what you're looking for : - INSTALL for instructions on how to build and install HAProxy - BRANCHES to understand the project's life cycle and what version to use - LICENSE for the project's license - CONTRIBUTING for the process to follow to submit contributions The more detailed documentation is located into the doc/ directory : - doc/intro.txt for a quick introduction on HAProxy - doc/configuration.txt for the configuration's reference manual - doc/lua.txt for the Lua's reference manual - doc/SPOE.txt for how to use the SPOE engine - doc/network-namespaces.txt for how to use network namespaces under Linux - doc/management.txt for the management guide - doc/regression-testing.txt for how to use the regression testing suite - doc/peers.txt for the peers protocol reference - doc/coding-style.txt for how to adopt HAProxy's coding style - doc/internals for developer-specific documentation (not all up to date)
Description
Languages
Shell
100%