The Reliable, High Performance TCP/HTTP Load Balancer
HAProxy implements an event-driven, mono-process model which enables support
for very high number of simultaneous connections at very high speeds.
Multi-process or multi-threaded models can rarely cope with thousands of
connections because of memory limits, system scheduler limits, and lock
contention everywhere. Event-driven models do not have these problems because
implementing all the tasks in user-space allows a finer resource and time
management. The down side is that those programs generally don't scale well on
multi-processor systems. That's the reason why they must be optimized to get
the most work done from every CPU cycle.
Authors:
--------
w@1wt.eu
- Devel package for openSUSE:Factory
-
7
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout server:http/haproxy && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000747 747 Bytes | |
_servicedata | 0000000225 225 Bytes | |
haproxy-1.6.0-makefile_lib.patch | 0000000812 812 Bytes | |
haproxy-1.6.0-sec-options.patch | 0000001356 1.32 KB | |
haproxy-1.6.0_config_haproxy_user.patch | 0000003040 2.97 KB | |
haproxy-3.0.1+git0.471a1b2f1.tar.gz | 0004821322 4.6 MB | |
haproxy-rpmlintrc | 0000000172 172 Bytes | |
haproxy-service.patch | 0000000648 648 Bytes | |
haproxy-tmpfiles.conf | 0000000033 33 Bytes | |
haproxy-user.conf | 0000000077 77 Bytes | |
haproxy.cfg | 0000000770 770 Bytes | |
haproxy.changes | 0000413112 403 KB | |
haproxy.init | 0000010172 9.93 KB | |
haproxy.spec | 0000008546 8.35 KB | |
local.usr.sbin.haproxy.apparmor | 0000000070 70 Bytes | |
series | 0000000105 105 Bytes | |
usr.sbin.haproxy.apparmor | 0000001603 1.57 KB |
Revision 305 (latest revision is 315)
Marcus Rueckert (darix)
committed
(revision 305)
- Update to version 3.0.1+git0.471a1b2f1: * [RELEASE] Released version 3.0.1 * BUG/MINOR: mux-h1: Use the right variable to set NEGO_FF_FL_EXACT_SIZE flag * BUG/MAJOR: mux-h1: Properly copy chunked input data during zero-copy nego * BUG/MEDIUM: stconn/mux-h1: Fix suspect change causing timeouts * BUG/MINOR: quic: ensure Tx buf is always purged * BUG/MINOR: quic: fix computed length of emitted STREAM frames * BUG/MEDIUM: ssl: bad auth selection with TLS1.2 and WolfSSL * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * BUG/MEDIUM: mux-quic: Don't unblock zero-copy fwding if blocked during nego * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MEDIUM: mux-quic: Unblock zero-copy forwarding if the txbuf can be released * MEDIUM: stconn: Be able to unblock zero-copy data forwarding from done_fastfwd * BUG/MEDIUM: h1-htx: Don't state interim responses are bodyless * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * DOC: configuration: add an example for keywords from crt-store * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning
Comments 6
Apparmor gets installed and enabled by default with this package. Please could the profiles be moved into a separate package so that apparmor isn't forced on people or move the profiles into apparmor's profile package instead?
Hello Marcus, Any plan to have haproxy 2.8.5 rpm for centos7?
not really.
Pls update to latest version, thanks.
2024/01/18 : 2.9.3 - BUILD: quic: missing include for quic_tp - BUG/MINOR: mux-quic: do not prevent non-STREAM sending on flow control - BUG/MINOR: mux-h2: also count streams for refused ones - BUG/MEDIUM: quic: keylog callback not called (USE_OPENSSL_COMPAT)
Hi, any chance to update to 3.0.2 ? Thanks a lot
Pls update to latest version, thanks. There is bunch of changes and backports from 3.1 dev.