pekko/bench-jmh
Iain Hull c56edca78f
CVE-2023-31442 Address DNS poisoning vulnerability (#385)
* CVE-2023-31442 Address DNS poisoning vulnerability (and DNS concurrency bug)

* Remove sequential dns id generator

* fix scalafmt

* Fix bug in isSameQuestion
And ensure that DnsClient only removes inflight messages when the
questions match

* fix up exception message to remove reference to 'sequence' generator

* Add tests to failed commands and drop requests

---------

Co-authored-by: PJ Fanning <pjfanning@users.noreply.github.com>
2023-06-14 19:38:20 +01:00
..
src/main CVE-2023-31442 Address DNS poisoning vulnerability (#385) 2023-06-14 19:38:20 +01:00
README.md fix up refs to Akka in source code (#374) 2023-06-07 14:51:57 +01:00

Apache Pekko Microbenchmarks

This subproject contains some microbenchmarks excercising key parts of Apache Pekko. (Excluding typed which has its own jmh module)

You can run them like:

project bench-jmh jmh:run -i 3 -wi 3 -f 1 .*ActorCreationBenchmark

Use 'jmh:run -h' to get an overview of the available options.

Some potentially out of date resources for writing JMH benchmarks: