From 1dd5fe4c8afa2a8f44b470b948fffced7ae191a160b98e24de9b888989a56be8 Mon Sep 17 00:00:00 2001 From: Marcus Rueckert Date: Mon, 10 Jun 2024 15:09:36 +0000 Subject: [PATCH] - Update to version 3.0.1+git0.471a1b2f1: * [RELEASE] Released version 3.0.1 * BUG/MINOR: mux-h1: Use the right variable to set NEGO_FF_FL_EXACT_SIZE flag * BUG/MAJOR: mux-h1: Properly copy chunked input data during zero-copy nego * BUG/MEDIUM: stconn/mux-h1: Fix suspect change causing timeouts * BUG/MINOR: quic: ensure Tx buf is always purged * BUG/MINOR: quic: fix computed length of emitted STREAM frames * BUG/MEDIUM: ssl: bad auth selection with TLS1.2 and WolfSSL * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * BUG/MEDIUM: mux-quic: Don't unblock zero-copy fwding if blocked during nego * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MEDIUM: mux-quic: Unblock zero-copy forwarding if the txbuf can be released * MEDIUM: stconn: Be able to unblock zero-copy data forwarding from done_fastfwd * BUG/MEDIUM: h1-htx: Don't state interim responses are bodyless * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * DOC: configuration: add an example for keywords from crt-store * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning OBS-URL: https://build.opensuse.org/package/show/server:http/haproxy?expand=0&rev=305 --- _service | 2 +- _servicedata | 4 ++-- haproxy-3.0.0+git0.5590ada47.tar.gz | 3 --- haproxy-3.0.1+git0.471a1b2f1.tar.gz | 3 +++ haproxy.changes | 29 +++++++++++++++++++++++++++++ haproxy.spec | 2 +- 6 files changed, 36 insertions(+), 7 deletions(-) delete mode 100644 haproxy-3.0.0+git0.5590ada47.tar.gz create mode 100644 haproxy-3.0.1+git0.471a1b2f1.tar.gz diff --git a/_service b/_service index e237bf4..7f0de84 100644 --- a/_service +++ b/_service @@ -6,7 +6,7 @@ @PARENT_TAG@+git@TAG_OFFSET@.%h v(.*) \1 - v3.0.0 + v3.0.1 enable diff --git a/_servicedata b/_servicedata index d3b26c0..dfacce8 100644 --- a/_servicedata +++ b/_servicedata @@ -1,6 +1,6 @@ http://git.haproxy.org/git/haproxy-3.0.git/ - 5590ada4731a1f75004675680b4bdca61fa4c507 + 471a1b2f11d7367ac03056a3d840146741341b64 - + \ No newline at end of file diff --git a/haproxy-3.0.0+git0.5590ada47.tar.gz b/haproxy-3.0.0+git0.5590ada47.tar.gz deleted file mode 100644 index 4579ee5..0000000 --- a/haproxy-3.0.0+git0.5590ada47.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:4c3531ef38749c53c90bfd63647ac04807bdb1ca0d4404676b4b94cfb16c8de9 -size 4818258 diff --git a/haproxy-3.0.1+git0.471a1b2f1.tar.gz b/haproxy-3.0.1+git0.471a1b2f1.tar.gz new file mode 100644 index 0000000..b5b6f9c --- /dev/null +++ b/haproxy-3.0.1+git0.471a1b2f1.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:423b282e3f117db2c2c628ae9245f57b598e284b5a9ce7b88fe647700299daaf +size 4821322 diff --git a/haproxy.changes b/haproxy.changes index b0614c4..7d41172 100644 --- a/haproxy.changes +++ b/haproxy.changes @@ -1,3 +1,32 @@ +------------------------------------------------------------------- +Mon Jun 10 14:52:46 UTC 2024 - mrueckert@suse.de + +- Update to version 3.0.1+git0.471a1b2f1: + * [RELEASE] Released version 3.0.1 + * BUG/MINOR: mux-h1: Use the right variable to set NEGO_FF_FL_EXACT_SIZE flag + * BUG/MAJOR: mux-h1: Properly copy chunked input data during zero-copy nego + * BUG/MEDIUM: stconn/mux-h1: Fix suspect change causing timeouts + * BUG/MINOR: quic: ensure Tx buf is always purged + * BUG/MINOR: quic: fix computed length of emitted STREAM frames + * BUG/MEDIUM: ssl: bad auth selection with TLS1.2 and WolfSSL + * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration + * BUG/MEDIUM: mux-quic: Don't unblock zero-copy fwding if blocked during nego + * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() + * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path + * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() + * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage + * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP + * CLEANUP: hlua: use hlua_pusherror() where relevant + * BUG/MINOR: quic: prevent crash on qc_kill_conn() + * BUG/MEDIUM: mux-quic: Unblock zero-copy forwarding if the txbuf can be released + * MEDIUM: stconn: Be able to unblock zero-copy data forwarding from done_fastfwd + * BUG/MEDIUM: h1-htx: Don't state interim responses are bodyless + * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts + * DOC: configuration: add an example for keywords from crt-store + * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory + * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser + * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning + ------------------------------------------------------------------- Fri May 31 12:07:48 UTC 2024 - Marcus Rueckert diff --git a/haproxy.spec b/haproxy.spec index 1c849b0..cc32b6f 100644 --- a/haproxy.spec +++ b/haproxy.spec @@ -53,7 +53,7 @@ %endif Name: haproxy -Version: 3.0.0+git0.5590ada47 +Version: 3.0.1+git0.471a1b2f1 Release: 0 # #