aboutsummaryrefslogtreecommitdiff
path: root/net/haproxy
Commit message (Collapse)AuthorAge
...
* haproxy: update to version 1.9 patch 02Thomas Heil2014-12-05
| | | | | | | | | | | | | | | | | | | | | - BUILD: fix "make install" to support spaces in the install dirs - BUG/MEDIUM: checks: fix conflicts between agent checks and ssl healthchecks - BUG/MEDIUM: ssl: fix bad ssl context init can cause segfault in case of OOM. - BUG/MINOR: samples: fix unnecessary memcopy converting binary to string. - BUG/MEDIUM: connection: sanitize PPv2 header length before parsing address information - BUG/MEDIUM: pattern: don't load more than once a pattern list. - BUG/MEDIUM: ssl: force a full GC in case of memory shortage - BUG/MINOR: config: don't inherit the default balance algorithm in frontends - BUG/MAJOR: frontend: initialize capture pointers earlier - BUG/MINOR: stats: correctly set the request/response analysers - DOC: fix typo in the body parser documentation for msg.sov - BUG/MINOR: peers: the buffer size is global.tune.bufsize, not trash.size - MINOR: sample: add a few basic internal fetches (nbproc, proc, stopping) - BUG/MAJOR: sessions: unlink session from list on out of memory - BUG/MEDIUM: patterns: previous fix was incomplete - BUG/MEDIUM: payload: ensure that a request channel is available Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: patches from upstreamThomas Heil2014-11-20
| | | | | | | | | | | - [PATCH 1/6] BUILD: fix "make install" to support spaces in the - [PATCH 2/6] BUG/MEDIUM: ssl: fix bad ssl context init can cause - [PATCH 3/6] BUG/MEDIUM: ssl: force a full GC in case of memory - [PATCH 4/6] BUG/MEDIUM: checks: fix conflicts between agent checks - [PATCH 5/6] BUG/MINOR: config: don't inherit the default balance - [PATCH 6/6] BUG/MAJOR: frontend: initialize capture pointers earlier Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: bump to version 1.5.8Thomas Heil2014-11-05
| | | | | | | | | | Released version 1.5.8 with the following main changes : - BUG/MAJOR: buffer: check the space left is enough or not when input data in a buffer is wrapped - BUG/BUILD: revert accidental change in the makefile from latest SSL fix Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: patches from upstreamThomas Heil2014-10-14
| | | | | | | -[PATCH 1/2] BUG/MEDIUM: systemd: set KillMode to 'mixed' -[PATCH 2/2] BUG/MEDIUM: config: avoid skipping disabled proxies Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: maintenance release to fix no critical bugsThomas Heil2014-10-08
| | | | | | - bump to version 1.5.5 Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fixes from upstreamThomas Heil2014-10-06
| | | | | | | | | | | - [PATCH 15/20] BUG/MEDIUM: remove debugging code from systemd-wrapper - [PATCH 16/20] BUG/MEDIUM: http: adjust close mode when switching to - [PATCH 17/20] BUG/MINOR: config: don't propagate process binding on - [PATCH 18/20] BUG/MEDIUM: check: rule-less tcp-check must detect - [PATCH 19/20] BUG/MINOR: tcp-check: report the correct failed step in - [PATCH 20/20] BUG/MINOR: config: don't propagate process binding for Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: remove unnecessary parts in MakefileThomas Heil2014-09-23
| | | | | | | - remove ADDLIB - remove -lcrypt which was -lcrypto Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: add nossl variantThomas Heil2014-09-23
| | | | | | | | | | According to Issue #342 here is a proposal to add a nossl variant to that builts haproxy without ssl Add pending patch from upstream - [PATCH 14/14] MEDIUM: systemd-wrapper: support multiple executable Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: patches from upstreamThomas Heil2014-09-17
| | | | | | | | | | | | | | | | | | - [PATCH 01/13] DOC: clearly state that the "show sess" output format - [PATCH 02/13] MINOR: stats: fix minor typo fix in - [PATCH 03/13] MEDIUM: Improve signal handling in systemd wrapper. - [PATCH 04/13] MINOR: Also accept SIGHUP/SIGTERM in systemd-wrapper - [PATCH 05/13] DOC: indicate in the doc that track-sc* can wait if - [PATCH 06/13] MEDIUM: http: enable header manipulation for 101 - [PATCH 07/13] BUG/MEDIUM: config: propagate frontend to backend - [PATCH 08/13] MEDIUM: config: properly propagate process binding - [PATCH 09/13] MEDIUM: config: make the frontends automatically bind - [PATCH 10/13] MEDIUM: config: compute the exact bind-process before - [PATCH 11/13] MEDIUM: config: only warn if stats are attached to - [PATCH 12/13] MEDIUM: config: report it when tcp-request rules are - [PATCH 13/13] MINOR: config: detect the case where a tcp-request Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: new release 1.5.4 that fixes recent cveThomas Heil2014-09-03
| | | | | | | | | | | | | | | | | | | - BUG: config: error in http-response replace-header number of arguments - BUG/MINOR: Fix search for -p argument in systemd wrapper. - BUG/MEDIUM: auth: fix segfault with http-auth and a configuration with an unknown encryption algorithm - BUG/MEDIUM: config: userlists should ensure that encrypted passwords are supported - MEDIUM: connection: add new bit in Proxy Protocol V2 - BUG/MINOR: server: move the directive #endif to the end of file - BUG/MEDIUM: http: tarpit timeout is reset - BUG/MAJOR: tcp: fix a possible busy spinning loop in content track-sc* - BUG/MEDIUM: http: fix inverted condition in pat_match_meth() - BUG/MEDIUM: http: fix improper parsing of HTTP methods for use with ACLs - BUG/MINOR: pattern: remove useless allocation of unused trash in pat_parse_reg() - BUG/MEDIUM: acl: correctly compute the output type when a converter is used - CLEANUP: acl: cleanup some of the redundancy and spaghetti after last fix - BUG/CRITICAL: http: don't update msg->sov once data start to leave the buffer Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: patches from upstreamThomas Heil2014-08-24
| | | | | | | - [PATCH 5/6] BUG/MEDIUM: http: tarpit timeout is reset - [PATCH 6/6] MEDIUM: connection: add new bit in Proxy Protocol V2 Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fix from upstreamThomas Heil2014-08-11
| | | | | | [PATCH 4/4] BUG: config: error in http-response replace-header number Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: bump to version 1.5.3Thomas Heil2014-07-30
| | | | | | | | | - upgrade to 1.5.3 - [PATCH 1/3] BUG/MINOR: server: move the directive #endif to the end - [PATCH 2/3] BUG/MINOR: Fix search for -p argument in systemd wrapper. - [PATCH 3/3] BUG/MAJOR: tcp: fix a possible busy spinning loop in Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fixes from upstreamThomas Heil2014-07-21
| | | | | | [PATCH 6/6] BUG/MEDIUM: connection: fix proxy v2 header again! Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fixes from upstreamThomas Heil2014-07-18
| | | | | | | [PATCH 4/5] BUG/MINOR: http: base32+src should use the big endian [PATCH 5/5] BUG/MEDIUM: connection: fix memory corruption when Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fixes from upstreamThomas Heil2014-07-15
| | | | | | [PATCH 3/3] BUG/MEDIUM: ssl: Fix a memory leak in DHE key exchange Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: bump to version 1.5.2Thomas Heil2014-07-14
| | | | | | | | - [RELEASE] Released version 1.5.2 - [PATCH 1/2] DOC: mention that Squid correctly responds 400 to PPv2 - [PATCH 2/2] DOC: fix typo in Unix Socket commands Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fixes from upstreamThomas Heil2014-07-12
| | | | | | | | | - [PATCH 22/25] DOC: minor fix on {sc,src}_kbytes_{in,out} - [PATCH 23/25] DOC: fix alphabetical sort of converters - [PATCH 24/25] BUG/MAJOR: http: correctly rewind the request body - [PATCH 25/25] DOC: remove references to CPU=native in the README Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fixes from upstreamThomas Heil2014-07-10
| | | | | | | | | | | | | | | | | this patch series mainly fixes a lot of reported issues in conjuction with abstract socktet handling, improved the docs about the stats - [PATCH 13/21] BUILD: http: fix isdigit & isspace warnings on Solaris - [PATCH 14/21] BUG/MINOR: listener: set the listener's fd to -1 after - [PATCH 15/21] BUG/MEDIUM: unix: failed abstract socket binding is - [PATCH 16/21] MEDIUM: listener: implement a per-protocol pause() - [PATCH 17/21] MEDIUM: listener: support rebinding during resume() - [PATCH 18/21] BUG/MEDIUM: unix: completely unbind abstract sockets - [PATCH 19/21] DOC: explicitly mention the limits of abstract - [PATCH 20/21] DOC: expand the docs for the provided stats. - [PATCH 21/21] BUG/MEDIUM: backend: Update hash to use unsigned int Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fixes from upstreamThomas Heil2014-07-06
| | | | | | | | - [PATCH 10/12] MINOR: stats: fix minor typo in HTML page - [PATCH 11/12] BUG/MEDIUM: unix: do not unlink() abstract namespace - [PATCH 12/12] DOC: provide an example of how to use ssl_c_sha1 Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: patches from upstreamThomas Heil2014-06-30
| | | | | | | | | - [PATCH 7/9] BUILD: remove TODO from the spec file and add READM - [PATCH 8/9] MINOR: log: make MAX_SYSLOG_LEN overridable at build time - [PATCH 9/9] MEDIUM: log: support a user-configurable max log line length Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: patches from upstream (ssl,counter,stick-table, track)Thomas Heil2014-06-26
| | | | | | | | | | | | - BUG/MINOR: ssl: Fix external function in order not to return a pointer on an internal trash buffer - BUG/MINOR: counters: do not untrack counters before logging - BUG/MAJOR: sample: correctly reinitialize sample fetch context before calling sample_process() - MINOR: stick-table: make stktable_fetch_key() indicate why it failed - BUG/MEDIUM: counters: fix track-sc* to wait on unstable contents Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: upgrade to version 1.5.1Thomas Heil2014-06-24
| | | | | | | Bugs from 1.5.0 can cause file descriptor leak, results in the impossibility to accept new connections after some time. Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: upstream commit, properly initialize and count logThomas Heil2014-06-23
| | | | | | [PATCH 6/6] BUG/MINOR: logs: properly initialize and count log sockets Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fix OCSP response, remove crappy client side timeout patchesThomas Heil2014-06-23
| | | | Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: fix targe avr32Thomas Heil2014-06-21
| | | | | | | The avr32 target uses a old accept4 implementation, so i disabled it for this patform. Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: add upstream bugfix, adapt CopyrightThomas Heil2014-06-20
| | | | | | - [PATCH] BUG/MEDIUM: Consistently use 'check' in process_chk Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: upgrade haproxy to version 1.5.0Thomas Heil2014-06-19
| | | | | | | - includes support for SSL Termination, Compression Offloading, OCSP Stapling support and much more Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
* haproxy: import from packages, add myself as the maintainerThomas Heil2014-06-12
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>