The Reliable, High Performance TCP/HTTP Load Balancer

Edit Package haproxy

HAProxy implements an event-driven, mono-process model which enables support
for very high number of simultaneous connections at very high speeds.
Multi-process or multi-threaded models can rarely cope with thousands of
connections because of memory limits, system scheduler limits, and lock
contention everywhere. Event-driven models do not have these problems because
implementing all the tasks in user-space allows a finer resource and time
management. The down side is that those programs generally don't scale well on
multi-processor systems. That's the reason why they must be optimized to get
the most work done from every CPU cycle.

Authors:
--------
w@1wt.eu

Refresh
Refresh
Source Files
Filename Size Changed
_service 0000000747 747 Bytes
_servicedata 0000000225 225 Bytes
haproxy-1.6.0-makefile_lib.patch 0000000812 812 Bytes
haproxy-1.6.0-sec-options.patch 0000001356 1.32 KB
haproxy-1.6.0_config_haproxy_user.patch 0000003040 2.97 KB
haproxy-3.0.1+git0.471a1b2f1.tar.gz 0004821322 4.6 MB
haproxy-rpmlintrc 0000000172 172 Bytes
haproxy-service.patch 0000000648 648 Bytes
haproxy-tmpfiles.conf 0000000033 33 Bytes
haproxy-user.conf 0000000077 77 Bytes
haproxy.cfg 0000000770 770 Bytes
haproxy.changes 0000413112 403 KB
haproxy.init 0000010172 9.93 KB
haproxy.spec 0000008546 8.35 KB
local.usr.sbin.haproxy.apparmor 0000000070 70 Bytes
series 0000000105 105 Bytes
usr.sbin.haproxy.apparmor 0000001603 1.57 KB
Revision 144 (latest revision is 150)
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1179720 from Marcus Rueckert's avatar Marcus Rueckert (darix) (revision 144)
- Update to version 3.0.1+git0.471a1b2f1:
  * [RELEASE] Released version 3.0.1
  * BUG/MINOR: mux-h1: Use the right variable to set NEGO_FF_FL_EXACT_SIZE flag
  * BUG/MAJOR: mux-h1:  Properly copy chunked input data during zero-copy nego
  * BUG/MEDIUM: stconn/mux-h1: Fix suspect change causing timeouts
  * BUG/MINOR: quic: ensure Tx buf is always purged
  * BUG/MINOR: quic: fix computed length of emitted STREAM frames
  * BUG/MEDIUM: ssl: bad auth selection with TLS1.2 and WolfSSL
  * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration
  * BUG/MEDIUM: mux-quic: Don't unblock zero-copy fwding if blocked during nego
  * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume()
  * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path
  * BUG/MINOR: hlua: prevent LJMP in hlua_traceback()
  * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage
  * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP
  * CLEANUP: hlua: use hlua_pusherror() where relevant
  * BUG/MINOR: quic: prevent crash on qc_kill_conn()
  * BUG/MEDIUM: mux-quic: Unblock zero-copy forwarding if the txbuf can be released
  * MEDIUM: stconn: Be able to unblock zero-copy data forwarding from done_fastfwd
  * BUG/MEDIUM: h1-htx: Don't state interim responses are bodyless
  * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts
  * DOC: configuration: add an example for keywords from crt-store
  * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory
  * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser
  * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning
Comments 0
openSUSE Build Service is sponsored by