mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2025-03-04 18:39:37 +00:00
Now str2sa_range() will enforce the caller's port specification passed using the PA_O_PORT_* flags, and will return an error on failure. For optional ports, values 0-65535 will be enforced. For mandatory ports, values 1-65535 are enforced. In case of ranges, it is also verified that the upper bound is not lower than the lower bound, as this used to result in empty listeners. I couldn't find an easy way to test this using VTC since the purpose is to trigger parse errors, so instead a test file is provided as tests/ports.cfg with comments about what errors are expected for each line. |
||
---|---|---|
.. | ||
0000-debug-stats.diff | ||
blocksig.c | ||
ext-check.cfg | ||
filltab25.c | ||
hash_results.txt | ||
hashing-results.txt | ||
io_limits.txt | ||
ip-hash.c | ||
ist.c | ||
ports.cfg | ||
reset.c | ||
sockstat.txt | ||
tcp-check.cfg | ||
test_hashes.c | ||
test_pools.c | ||
test-acl-args.cfg | ||
test-address-syntax.cfg | ||
test-arg.c | ||
test-backlog.cfg | ||
test-check-expect.cfg | ||
test-connection.cfg | ||
test-cookie-indirect.cfg | ||
test-cookie-insert.cfg | ||
test-cookie-passive.cfg | ||
test-cookie-prefix.cfg | ||
test-cookie-rewrite.cfg | ||
test-disable-404.cfg | ||
test-fsm.cfg | ||
test-fwlc.cfg | ||
test-fwrr.cfg | ||
test-handshakes-chk.cfg | ||
test-handshakes.cfg | ||
test-http-send-name-hdr.cfg | ||
test-inherited-fd.py | ||
test-inspect-smtp.cfg | ||
test-inspect-ssl.cfg | ||
test-list.c | ||
test-map-ports.cfg | ||
test-pollers.cfg | ||
test-redirect.cfg | ||
test-sample-fetch-args.cfg | ||
test-sample-fetch-conv.cfg | ||
test-sockpair.py | ||
test-sql.cfg | ||
test-srv-verify.cfg | ||
test-str2sa.cfg | ||
test-time.cfg | ||
test-timeout.cfg | ||
test-url-hash.cfg | ||
test-valid-names.cfg | ||
test.c | ||
testinet.c | ||
uri_hash.c |