mirror of
				https://git.haproxy.org/git/haproxy.git/
				synced 2025-10-31 08:30:59 +01:00 
			
		
		
		
	When threads are enabled and running on a machine with multiple CCX or multiple nodes, thread groups are now enabled since 3.3-dev2, causing load-balancing algorithms to randomly fail due to incoming connections spreading over multiple groups and using different load balancing indexes. Let's just force "thread-groups 1" into all configs when threads are enabled to avoid this.
		
			
				
	
	
		
			76 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			76 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| #REGTEST_TYPE=devel
 | |
| 
 | |
| varnishtest "Test the ssl_f_* sample fetches"
 | |
| #REQUIRE_OPTIONS=OPENSSL
 | |
| feature ignore_unknown_macro
 | |
| 
 | |
| server s1 -repeat 3 {
 | |
|     rxreq
 | |
|     txresp
 | |
| } -start
 | |
| 
 | |
| haproxy h1 -conf {
 | |
|     global
 | |
|     .if feature(THREAD)
 | |
|         thread-groups 1
 | |
|     .endif
 | |
| 
 | |
|     .if !ssllib_name_startswith(AWS-LC)
 | |
|         tune.ssl.default-dh-param 2048
 | |
|     .endif
 | |
|         tune.ssl.capture-buffer-size 1
 | |
|         crt-base ${testdir}
 | |
| 
 | |
|     defaults
 | |
|         mode http
 | |
|         option httplog
 | |
|         log stderr local0 debug err
 | |
|         option logasap
 | |
|         timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
 | |
|         timeout client  "${HAPROXY_TEST_TIMEOUT-5s}"
 | |
|         timeout server  "${HAPROXY_TEST_TIMEOUT-5s}"
 | |
| 
 | |
| 
 | |
|     listen clear-lst
 | |
|         bind "fd@${clearlst}"
 | |
|         balance roundrobin
 | |
|         server s1 "${tmpdir}/ssl.sock" ssl verify none
 | |
| 
 | |
|     listen ssl-lst
 | |
|         mode http
 | |
| 
 | |
|         http-response add-header x-ssl-der %[ssl_f_der,hex]
 | |
|         http-response add-header x-ssl-sha1 %[ssl_f_sha1,hex]
 | |
|         http-response add-header x-ssl-notafter %[ssl_f_notafter]
 | |
|         http-response add-header x-ssl-notbefore %[ssl_f_notbefore]
 | |
|         http-response add-header x-ssl-sig_alg %[ssl_f_sig_alg]
 | |
|         http-response add-header x-ssl-i_dn %[ssl_f_i_dn]
 | |
|         http-response add-header x-ssl-s_dn %[ssl_f_s_dn]
 | |
|         http-response add-header x-ssl-s_serial %[ssl_f_serial,hex]
 | |
|         http-response add-header x-ssl-key_alg %[ssl_f_key_alg]
 | |
|         http-response add-header x-ssl-version %[ssl_f_version]
 | |
| 
 | |
|         bind "${tmpdir}/ssl.sock" ssl crt ${testdir}/common.pem
 | |
| 
 | |
|         server s1 ${s1_addr}:${s1_port}
 | |
| } -start
 | |
| 
 | |
| 
 | |
| client c1 -connect ${h1_clearlst_sock} {
 | |
|     txreq
 | |
|     rxresp
 | |
|     expect resp.status == 200
 | |
|     expect resp.http.x-ssl-der ~ 308203C7308202AFA003020102021445B6C777.*65AD7F4469DB9C8581EE260ABCB727AEF8A7C3ADA
 | |
|     expect resp.http.x-ssl-sha1 == "DF3B6E847A7BF83DFAAFCFEC65EE9BC36230D3EA"
 | |
|     expect resp.http.x-ssl-notafter == "330917162600Z"
 | |
|     expect resp.http.x-ssl-notbefore == "230920162600Z"
 | |
|     expect resp.http.x-ssl-sig_alg == "RSA-SHA256"
 | |
|     expect resp.http.x-ssl-i_dn == "/C=FR/L=Paris/O=HAProxy Technologies/CN=HAProxy Test Intermediate CA"
 | |
|     expect resp.http.x-ssl-s_dn  == "/C=FR/L=Paris/O=test1/CN=www.test1.com"
 | |
|     expect resp.http.x-ssl-s_serial == "45B6C777A017159A19126340C1053521B91E123B"
 | |
|     expect resp.http.x-ssl-key_alg == "rsaEncryption"
 | |
|     expect resp.http.x-ssl-version == "3"
 | |
| } -run
 | |
| 
 | |
| 
 |