haproxy/reg-tests/connection
Willy Tarreau 870e2d3f1f MEDIUM: mux-h2: update session trackers with number of glitches
We now update the session's tracked counters with the observed glitches.
In order to avoid incurring a high cost, e.g. if many small frames contain
issues, we batch the updates around h2_process_demux() by directly passing
the difference. Indeed, for now all functions that increment glitches are
called from h2_process_demux(). If that were to change, we'd just need to
keep the value of the last synced counter in the h2c struct instead of the
stack.

The regtest was updated to verify that the 3rd client that does not cause
issue still sees the counter resulting from client 2's mistakes. The rate
is also verified, considering it shouldn't fail since the period is very
long (1m).
2024-02-08 15:51:49 +01:00
..
ca-auth.crt
cli_src_dst.vtc
client1.pem
common.pem
dispatch.vtc
h2_glitches.vtc MEDIUM: mux-h2: update session trackers with number of glitches 2024-02-08 15:51:49 +01:00
http_reuse_aggressive.vtc
http_reuse_always.vtc
http_reuse_be_transparent.vtc REGTESTS: connection: disable http_reuse_be_transparent.vtc if !TPROXY 2023-11-24 16:27:55 +01:00
http_reuse_conn_hash.vtc
http_reuse_dispatch.vtc
http_reuse_never.vtc
http_reuse_safe.vtc
proxy_protocol_random_fail.vtc
proxy_protocol_send_generic.vtc
proxy_protocol_send_unique_id.vtc
proxy_protocol_send_unique_id_alpn.vtc
proxy_protocol_tlv_validation.vtc
reverse_connect_full.vtc REGTESTS: check attach-srv out of order declaration 2024-01-02 15:52:47 +01:00
reverse_server.vtc MINOR: rhttp: mark reverse HTTP as experimental 2023-11-30 15:04:27 +01:00
reverse_server_name.vtc MINOR: rhttp: mark reverse HTTP as experimental 2023-11-30 15:04:27 +01:00
tcp_to_http_upgrade.vtc