Revisions of haproxy
Ana Guerrero (anag+factory)
accepted
request 1222555
from
Marcus Rueckert (darix)
(revision 150)
- Update to version 3.0.6+git0.c2c009086:
Ana Guerrero (anag+factory)
accepted
request 1207938
from
Peter Varkoly (varkoly)
(revision 149)
- Update to version 3.0.5+git0.8e879a52e: (VUL-0: CVE-2024-49214 boo#1231612)
Ana Guerrero (anag+factory)
accepted
request 1204834
from
Marcus Rueckert (darix)
(revision 148)
- Update to version 3.0.5+git0.8e879a52e:
Dominique Leuenberger (dimstar_suse)
accepted
request 1198535
from
Marcus Rueckert (darix)
(revision 147)
- Update to version 3.0.4+git0.7a59afa93: (CVE-2024-45506 boo#1229993)
Ana Guerrero (anag+factory)
accepted
request 1186896
from
Marcus Rueckert (darix)
(revision 146)
- Update to version 3.0.3+git0.95a607c4b:
Ana Guerrero (anag+factory)
accepted
request 1179720
from
Marcus Rueckert (darix)
(revision 144)
- Update to version 3.0.1+git0.471a1b2f1: * [RELEASE] Released version 3.0.1 * BUG/MINOR: mux-h1: Use the right variable to set NEGO_FF_FL_EXACT_SIZE flag * BUG/MAJOR: mux-h1: Properly copy chunked input data during zero-copy nego * BUG/MEDIUM: stconn/mux-h1: Fix suspect change causing timeouts * BUG/MINOR: quic: ensure Tx buf is always purged * BUG/MINOR: quic: fix computed length of emitted STREAM frames * BUG/MEDIUM: ssl: bad auth selection with TLS1.2 and WolfSSL * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * BUG/MEDIUM: mux-quic: Don't unblock zero-copy fwding if blocked during nego * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MEDIUM: mux-quic: Unblock zero-copy forwarding if the txbuf can be released * MEDIUM: stconn: Be able to unblock zero-copy data forwarding from done_fastfwd * BUG/MEDIUM: h1-htx: Don't state interim responses are bodyless * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * DOC: configuration: add an example for keywords from crt-store * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning
Ana Guerrero (anag+factory)
accepted
request 1177941
from
Marcus Rueckert (darix)
(revision 143)
- AppArmor: allow haproxy to read the files needed for the "p post_mortem" support
Ana Guerrero (anag+factory)
accepted
request 1177631
from
Marcus Rueckert (darix)
(revision 142)
- Update to version 3.0.0+git0.5590ada47: https://www.haproxy.com/blog/announcing-haproxy-3-0 https://www.mail-archive.com/haproxy@formilux.org/msg44993.html
Ana Guerrero (anag+factory)
accepted
request 1151945
from
Marcus Rueckert (darix)
(revision 141)
- Update to version 2.9.6+git0.9eafce5dc:
Ana Guerrero (anag+factory)
accepted
request 1141253
from
Peter Varkoly (varkoly)
(revision 140)
- Update to version 2.9.3+git0.de3ab549a: * [RELEASE] Released version 2.9.3 * BUG/MEDIUM: quic: keylog callback not called (USE_OPENSSL_COMPAT) * BUG/MINOR: mux-h2: also count streams for refused ones * BUG/MINOR: mux-quic: do not prevent non-STREAM sending on flow control * BUILD: quic: missing include for quic_tp * [RELEASE] Released version 2.9.2 * DOC: configuration: corrected description of keyword tune.ssl.ocsp-update.mindelay * REGTESTS: add a test to ensure map-ordering is preserved * BUG/MINOR: map: list-based matching potential ordering regression * CLEANUP: quic: Double quic_dgram_parse() prototype declaration. * MINOR: ssl: Update ssl_fc_curve/ssl_bc_curve to use SSL_get0_group_name * MINOR: ot: logsrv struct becomes logger * MINOR: mux-h2: support limiting the total number of H2 streams per connection * BUG/MEDIUM: spoe: Never create new spoe applet if there is no server up * BUG/MEDIUM: stconn: Set fsb date if zero-copy forwarding is blocked during nego * BUG/MEDIUM: stconn: Forward shutdown on write timeout only if it is forwardable * BUG/MEDIUM: h3: fix incorrect snd_buf return value * BUILD: quic: Missing quic_ssl.h header protection * CLEANUP: quic: Remaining useless code into server part * REGTESTS: check attach-srv out of order declaration * MINOR: debug: add features and build options to "show dev" * MINOR: global: export a way to list build options * CI: use semantic version compare for determing "latest" OpenSSL * BUG/MINOR: h3: disable fast-forward on buffer alloc failure * BUG/MINOR: h3: close connection on sending alloc errors * BUG/MINOR: h3: properly handle alloc failure on finalize * MINOR: h3: add traces for connection init stage * BUG/MINOR: h3: close connection on header list too big * MINOR: h3: check connection error during sending
Ana Guerrero (anag+factory)
accepted
request 1137606
from
Marcus Rueckert (darix)
(revision 139)
- Update to version 2.9.1+git0.f72603ceb: * [RELEASE] Released version 2.9.1 * DOC: config: also add arguments to the converters in the table * DOC: config: add arguments to sample fetch methods in the table * BUG/MEDIUM: mux-quic: report early error on stream * BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is empty * CLEANUP: mux-h1: Fix a trace message about C-L header addition * BUG/MEDIUM: mux-h1: Explicitly skip request's C-L header if not set originally * BUG/MEDIUM: mux-h1: Cound data from input buf during zero-copy forwarding * BUG/MEDIUM: stconn: Block zero-copy forwarding if EOS/ERROR on consumer side * BUG/MEDIUM: quic: QUIC CID removed from tree without locking * MINOR: version: mention that it's stable now * BUG/MINOR: ext-check: cannot use without preserve-env * BUG/MEDIUM: map/acl: pat_ref_{set,delete}_by_id regressions * BUILD: ssl: update types in wolfssl cert selection callback * BUG/MEDIUM: quic: Possible buffer overflow when building TLS records * BUG/MINOR: mworker/cli: fix set severity-output support * DOC: configuration: typo req.ssl_hello_type * BUG/MINOR: lua: Wrong OCSP CID after modifying an SSL certficate (LUA) * BUG/MINOR: ssl: Wrong OCSP CID after modifying an SSL certficate * MINOR: ssl/cli: Add ha_(warning|alert) msgs to CLI ckch callback * BUG/MINOR: ssl: Double free of OCSP Certificate ID
Ana Guerrero (anag+factory)
accepted
request 1134037
from
Factory Maintainer (factory-maintainer)
(revision 138)
Automatic submission by obs-autosubmit
Ana Guerrero (anag+factory)
accepted
request 1128544
from
Marcus Rueckert (darix)
(revision 137)
- Update to version 2.8.4+git0.a4ebf9d3b:
Ana Guerrero (anag+factory)
accepted
request 1109628
from
Marcus Rueckert (darix)
(revision 136)
- Update to version 2.8.3+git0.86e043add:
Ana Guerrero (anag+factory)
accepted
request 1105108
from
Marcus Rueckert (darix)
(revision 135)
- Build error on ppc64le: include/import/xxhash.h:4148:9: error: invalid parameter combination for AltiVec intrinsic __builtin_vec_ld Add patch: fix-invalid-parameter-combination-for-AltiVec-intrinsic-__builtin_vec_ld.patch
Dominique Leuenberger (dimstar_suse)
accepted
request 1103460
from
Marcus Rueckert (darix)
(revision 134)
- Add CVE
Dominique Leuenberger (dimstar_suse)
accepted
request 1103151
from
Marcus Rueckert (darix)
(revision 133)
- Update to version 2.8.2+git0.61a0f576a: (boo#1214102)
Dominique Leuenberger (dimstar_suse)
accepted
request 1096613
from
Marcus Rueckert (darix)
(revision 132)
- Update to version 2.8.1+git0.a90123aa8:
Dominique Leuenberger (dimstar_suse)
accepted
request 1090094
from
Marcus Rueckert (darix)
(revision 131)
- Refreshed patches to apply cleanly again: haproxy-1.6.0-makefile_lib.patch haproxy-1.6.0-sec-options.patch - Updated series file: removed outdated patches - Update to version 2.8.0+git0.fdd8154ed: https://www.mail-archive.com/haproxy@formilux.org/msg43600.html
Displaying revisions 1 - 20 of 150