The Reliable, High Performance TCP/HTTP Load Balancer
HAProxy implements an event-driven, mono-process model which enables support
for very high number of simultaneous connections at very high speeds.
Multi-process or multi-threaded models can rarely cope with thousands of
connections because of memory limits, system scheduler limits, and lock
contention everywhere. Event-driven models do not have these problems because
implementing all the tasks in user-space allows a finer resource and time
management. The down side is that those programs generally don't scale well on
multi-processor systems. That's the reason why they must be optimized to get
the most work done from every CPU cycle.
Authors:
--------
w@1wt.eu
- Developed at server:http
- Sources inherited from project openSUSE:Factory
-
5
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:16.0:FactoryCandidates/haproxy && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000747 747 Bytes | |
_servicedata | 0000000225 225 Bytes | |
haproxy-1.6.0-makefile_lib.patch | 0000000812 812 Bytes | |
haproxy-1.6.0-sec-options.patch | 0000001356 1.32 KB | |
haproxy-1.6.0_config_haproxy_user.patch | 0000003040 2.97 KB | |
haproxy-3.0.1+git0.471a1b2f1.tar.gz | 0004821322 4.6 MB | |
haproxy-rpmlintrc | 0000000172 172 Bytes | |
haproxy-service.patch | 0000000648 648 Bytes | |
haproxy-tmpfiles.conf | 0000000033 33 Bytes | |
haproxy-user.conf | 0000000077 77 Bytes | |
haproxy.cfg | 0000000770 770 Bytes | |
haproxy.changes | 0000413112 403 KB | |
haproxy.init | 0000010172 9.93 KB | |
haproxy.spec | 0000008546 8.35 KB | |
local.usr.sbin.haproxy.apparmor | 0000000070 70 Bytes | |
series | 0000000105 105 Bytes | |
usr.sbin.haproxy.apparmor | 0000001603 1.57 KB |
Revision 144 (latest revision is 150)
Ana Guerrero (anag+factory)
accepted
request 1179720
from
Marcus Rueckert (darix)
(revision 144)
- Update to version 3.0.1+git0.471a1b2f1: * [RELEASE] Released version 3.0.1 * BUG/MINOR: mux-h1: Use the right variable to set NEGO_FF_FL_EXACT_SIZE flag * BUG/MAJOR: mux-h1: Properly copy chunked input data during zero-copy nego * BUG/MEDIUM: stconn/mux-h1: Fix suspect change causing timeouts * BUG/MINOR: quic: ensure Tx buf is always purged * BUG/MINOR: quic: fix computed length of emitted STREAM frames * BUG/MEDIUM: ssl: bad auth selection with TLS1.2 and WolfSSL * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * BUG/MEDIUM: mux-quic: Don't unblock zero-copy fwding if blocked during nego * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MEDIUM: mux-quic: Unblock zero-copy forwarding if the txbuf can be released * MEDIUM: stconn: Be able to unblock zero-copy data forwarding from done_fastfwd * BUG/MEDIUM: h1-htx: Don't state interim responses are bodyless * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * DOC: configuration: add an example for keywords from crt-store * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning
Comments 0