Comments (5)
Digging a bit more, this seems like it's also been reported a long time ago here (in 1.5) https://haproxy.formilux.narkive.com/WkdV7fGj/abstract-namespace-sockets-handling
from haproxy.
I think I'd be OK with changing the default at least because as you say it looks like the rest of the ecosystem has chosen that option, but we need to be sure not to break the old one. If some users have already padded their addresses in their servers to receive connections, or have passed the option to socat, it will suddenly stop working. Or maybe we should just create a new family that is not padded (e.g. abns2) ? After all that's the point of using different address families, we're in some sort changing the address family here. BTW, I was also concerned with the risk that some older kernels might possibly not support this, but I checked, and in kernel 2.1.131 it already used the advertised size so from this point that's OK.
from haproxy.
Agreed on both points; as you'll see on the ML, I took a tunable approach as I'm sure some people manually tweaked their other programs already.
As for changing the default, I'd certainly not complain either :)
Or maybe we should just create a new family that is not padded (e.g. abns2)
I considered that too, but in the end I figured that it's a bit overkill for a niche-enough feature vs a tunable that changes the default value, especially with how many bind families already exist
from haproxy.
I agree with the non-invasive patch on the ML.
Changing the default on the other hand will break old configurations, configurations that have been in active use, otherwise those previous conversations wouldn't have come up on the issues tracker and mailing list in the first place.
So yes, I'd say changing the default behavior of the abns@ address family prefix is not possible.
If the goal is to end up with a abstract namespace address family that doesn't default to zero padding, then we will have to deprecated the abns@ address family entirely for one LTS cycle or two along with the introduction of new address family prefix.
from haproxy.
So yes, I'd say changing the default behavior of the abns@ address family prefix is not possible.
While I don’t think it’s mandatory, I don’t agree that it’s impossible or even undesirable.
It’d be reasonable enough to add a notice, which is then increased to a warning in a subsequent release, until a changing-default release.
That said, no matter the default, HAProxy will have to support changing behavior in perpetuity, like socat does and the proposed patch enables.
As for the default, I’m honestly neutral in the way to go because I think it’s advanced and niche enough that:
- no change: requiring a flag forever for « new » behavior is an okay cost
- change: requiring a flag be added to revert to « old » behavior not changed for 10 years is also ok
In both cases, the specifically affected crowd can honestly just « deal with it ». And that includes me if it doesn’t change.
But I don’t like the idea that known-suboptimal defaults are to be kept in software for BC alone.
They accumulate over the years, and then you end up with something like MySQL, where you absolutely need 30 lines of boilerplate config to get to a not-insane set of defaults.
That said, I don’t think the default value here is particularly good or particularly bad, and both seem acceptable to me. So this is more philosophical than on-topic… :)
from haproxy.
Related Issues (20)
- issue with openssl initialisation order prevent use of security framework configuration for DH-related part HOT 5
- Ability to inherit server properties when using dynamic servers
- 2.9.4: Peers? crash during/after reload HOT 4
- Native asynchronous request mirroring HOT 11
- OCSP Stapling fails when server resolves to IPv6 but only IPv4 connectivity available HOT 2
- QUIC/H3 vs H2 performance difference for large payloads HOT 23
- Logging multiple combined FIX messages HOT 8
- High CPU (possibly stick-tables related) on 2.9.6 HOT 33
- Freezing frontend in state LIM after high load test HOT 4
- Unable to set a carriage return through a variable with http-request return HOT 4
- SPOE requests hanging until processing time is met when doing a reload HOT 2
- QUIC Interop "resumption" testcase failure when run with LibreSSL HOT 7
- src/http_ext.c: uninitialized variable suspected by gcc-14 HOT 5
- Attach config elements to a uniquely defined ID
- Preserve stats across reloads HOT 2
- src/sample.c: couple of coverity findings HOT 6
- httpclient adding full URL to the generated request. HOT 2
- haproxy 2.9.5 (solaris) external-check command go in infinite loop HOT 9
- Can not extract value from cookie if it is unescaped json HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from haproxy.