The Reliable, High Performance TCP/HTTP Load Balancer
HAProxy implements an event-driven, mono-process model which enables support
for very high number of simultaneous connections at very high speeds.
Multi-process or multi-threaded models can rarely cope with thousands of
connections because of memory limits, system scheduler limits, and lock
contention everywhere. Event-driven models do not have these problems because
implementing all the tasks in user-space allows a finer resource and time
management. The down side is that those programs generally don't scale well on
multi-processor systems. That's the reason why they must be optimized to get
the most work done from every CPU cycle.
Authors:
--------
w@1wt.eu
- Developed at server:http
-
5
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/haproxy && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000705 705 Bytes | |
_servicedata | 0000000225 225 Bytes | |
haproxy-1.6.0-makefile_lib.patch | 0000000812 812 Bytes | |
haproxy-1.6.0-sec-options.patch | 0000001356 1.32 KB | |
haproxy-1.6.0_config_haproxy_user.patch | 0000003040 2.97 KB | |
haproxy-2.9.1+git0.f72603ceb.tar.gz | 0004637007 4.42 MB | |
haproxy-rpmlintrc | 0000000172 172 Bytes | |
haproxy-user.conf | 0000000077 77 Bytes | |
haproxy.cfg | 0000000769 769 Bytes | |
haproxy.changes | 0000402035 393 KB | |
haproxy.init | 0000010172 9.93 KB | |
haproxy.spec | 0000008174 7.98 KB | |
local.usr.sbin.haproxy.apparmor | 0000000070 70 Bytes | |
series | 0000000105 105 Bytes | |
usr.sbin.haproxy.apparmor | 0000001009 1009 Bytes |
Revision 139 (latest revision is 150)
Ana Guerrero (anag+factory)
accepted
request 1137606
from
Marcus Rueckert (darix)
(revision 139)
- Update to version 2.9.1+git0.f72603ceb: * [RELEASE] Released version 2.9.1 * DOC: config: also add arguments to the converters in the table * DOC: config: add arguments to sample fetch methods in the table * BUG/MEDIUM: mux-quic: report early error on stream * BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is empty * CLEANUP: mux-h1: Fix a trace message about C-L header addition * BUG/MEDIUM: mux-h1: Explicitly skip request's C-L header if not set originally * BUG/MEDIUM: mux-h1: Cound data from input buf during zero-copy forwarding * BUG/MEDIUM: stconn: Block zero-copy forwarding if EOS/ERROR on consumer side * BUG/MEDIUM: quic: QUIC CID removed from tree without locking * MINOR: version: mention that it's stable now * BUG/MINOR: ext-check: cannot use without preserve-env * BUG/MEDIUM: map/acl: pat_ref_{set,delete}_by_id regressions * BUILD: ssl: update types in wolfssl cert selection callback * BUG/MEDIUM: quic: Possible buffer overflow when building TLS records * BUG/MINOR: mworker/cli: fix set severity-output support * DOC: configuration: typo req.ssl_hello_type * BUG/MINOR: lua: Wrong OCSP CID after modifying an SSL certficate (LUA) * BUG/MINOR: ssl: Wrong OCSP CID after modifying an SSL certficate * MINOR: ssl/cli: Add ha_(warning|alert) msgs to CLI ckch callback * BUG/MINOR: ssl: Double free of OCSP Certificate ID
Comments 0