e675ce1878
- refresh haproxy-1.6.0-makefile_lib.patch - Readd USE_RELRO_NOW=1, USE_STACKPROTECTOR=1, USE_PIE=1 - adapt haproxy-1.6.0-sec-options.patch so the build no longer complains about unused options - drop CPU="%{_target_cpu}" as it is unused - migrate to DEBUG_CFLAGS to OPT_CFLAGS
Marcus Rueckert2025-11-20 17:27:39 +00:00
ca9c399490
- Readd USE_RELRO_NOW=1, USE_STACKPROTECTOR=1, USE_PIE=1, USE_SYSTEMD=1 all of them are still used.
Marcus Rueckert2025-11-20 14:42:06 +00:00
abc62b6f2e
Accepting request 1317993 from server:http
Ana Guerrero2025-11-17 11:16:55 +00:00
5fdce62cc7
- Remove checks for not supported openSUSE versions
Peter Varkoly2025-11-07 20:11:51 +00:00
b9559ba947
Accepting request 1316410 from server:http
Ana Guerrero2025-11-07 17:23:22 +00:00
a197d2d9f1
- Update to version 3.2.8+git0.9200f398d: * [RELEASE] Released version 3.2.8 * BUG/MINOR: acme: wrong dns-01 challenge in the log * BUG/MEDIUM: server: close a race around ready_srv when deleting a server * BUG/MEDIUM: connections: permit to permanently remove an idle conn * BUG/MEDIUM: mux-h2: make sure not to move a dead connection to idle * BUG/MEDIUM: mux-h1: fix 414 / 431 status code reporting * SCRIPTS: build-ssl: fix rpath in AWS-LC install for openssl and bssl bin * OPTIM: backend: skip conn reuse for incompatible proxies * BUG/MINOR: resolvers: ensure fair round robin iteration * BUG/MINOR: ssl: returns when SSL_CTX_new failed during init * BUG/MINOR: resolvers: Apply dns-accept-family setting on additional records * BUG/MINOR: init: Do not close previously created fd in stdio_quiet * MINOR: http: fix 405,431,501 default errorfile * MINOR: ssl-sample: add ssl_fc_early_rcvd() to detect use of early data * DOC: config: slightly clarify the ssl_fc_has_early() behavior * BUG/MEDIUM: ssl: Crash because of dangling ckch_store reference in a ckch instance * MINOR: backend: srv_is_up converter * MINOR: backend: srv_queue helper * BUG/MEDIUM: cli: do not return ACKs one char at a time * MINOR: cli: create cli_raw_rcv_buf() from the generic applet_raw_rcv_buf() * MINOR: applet: do not put SE_FL_WANT_ROOM on rcv_buf() if the channel is empty * BUG/MEDIUM: mt_list: Use atomic operations to prevent compiler optims * BUG/MINOR: stick-tables: properly index string-type keys * BUG/MEDIUM: applet: Improve again spinning loops detection with the new API * BUG/MEDIUM: mt_lists: Avoid el->prev = el->next = el
Marcus Rueckert2025-11-07 10:20:42 +00:00
201c119ea0
Accepting request 1313209 from server:http
Ana Guerrero2025-10-23 14:38:28 +00:00
59e4f51c4d
- Fix apparmor profile: - we need attach disconnected for the systemd notify socket - more access for the cpu scheduling support in haproxy
Marcus Rueckert2025-10-07 13:32:14 +00:00
4405c77806
Accepting request 1308350 from server:http
Ana Guerrero2025-10-01 16:57:31 +00:00
8082a1c3ca
- Update to version 3.2.5+git0.ba0fd6b8e: * [RELEASE] Released version 3.2.5 * BUG/MEDIUM: pattern: fix possible infinite loops on deletion (try 2) * DEBUG: stick-tables: export stktable_add_pend_updates() for better reporting * BUG/MEDIUM: ring: invert the length check to avoid an int overflow * BUG/MINOR: resolvers: always normalize FQDN from response * BUG/MINOR: ocsp: Crash when updating CA during ocsp updates * BUG/MEDIUM: http_ana: fix potential NULL deref in http_process_req_common() * BUG/MINOR: ocsp: prototype inconsistency * BUG/MINOR: ssl: Fix potential NULL deref in trace callback * BUG/MINOR: ssl: Potential NULL deref in trace macro * BUG/MEDIUM: jws: return size_t in JWS functions * BUG/MINOR: acme: null pointer dereference upon allocation failure * BUG/MAJOR: stream: Force channel analysis on successful synchronous send * BUG/MAJOR: stream: Remove READ/WRITE events on channels after analysers eval * BUG/MINOR: stick-table: make sure never to miss a process_table_expire update * BUG/MEDIUM: stick-tables: don't loop on non-expirable entries * BUG/MINOR: activity: fix reporting of task latency * BUG/MEDIUM: ssl: create the mux immediately on early data * BUG/MEDIUM: h1: Allow reception if we have early data * BUG/MEDIUM: checks: fix ALPN inheritance from server * OPTIM: check: do not delay MUX for ALPN if SSL not active * BUG/MEDIUM: mux-h2: Reinforce conditions to report an error to app-layer stream * BUG/MEDIUM: mux-h2: Report RST/error to app-layer stream during 0-copy fwding * BUG/MINOR: mux-h2: Remove H2_CF_DEM_DFULL flags when the demux buffer is reset * BUG/MEDIUM: mux-h2: Restart reading when mbuf ring is no longer full * BUG/MEDIUM: mux-h2; Don't block reveives in H2_CS_ERROR and H2_CS_ERROR2 states * BUG/MEDIUM: mux-h2: Reset MUX blocking flags when a send error is caught * CLEANUP: quic: fix typo in quic_tx trace * BUG/MINOR: cpu_topo: work around a small bug in musl's CPU_ISSET()
Peter Varkoly2025-09-24 08:26:00 +00:00
5af7ca5968
Accepting request 1287782 from server:http
Ana Guerrero2025-06-24 18:46:47 +00:00
195d2f83d3
Accepting request 1287667 from home:crameleon:branches:server:http
Peter Varkoly2025-06-23 04:08:39 +00:00
0ea7418fe3
Accepting request 1286645 from server:http
Ana Guerrero2025-06-18 15:58:33 +00:00
66a98a2cf5
- modernize spec file with spec-cleaner. some changes (mostly whitespaces) got reverted for readability
Marcus Rueckert2025-06-11 10:51:33 +00:00
854e7a6f4d
- Add support to build against aws-lc with --with=awslc or in the project config `` %define _with_awslc 1 Macros: %_with_awslc 1 :Macros ``
Marcus Rueckert2025-06-11 10:46:53 +00:00
43b169d35f
VUL-0: CVE-2025-32464: haproxy: HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. (bsc#1240971)
Peter Varkoly2025-06-04 08:22:46 +00:00
53a8febe2f
- Update to version 3.1.0+git0.f2b97918e: * [RELEASE] Released version 3.1.0 * MINOR: version: mention that 3.1 is stable now * DOC: install: update the list of supported versions * DOC: management: mention "show sess help" and "show quic help" * MINOR: cli/quic: Add a "help" keyword to show quic * MINOR: cli: Add a "help" keyword to show sess * BUG/MEDIUM: quic: prevent EMSGSIZE with GSO for larger bufsize * DOC: quic: Amend the pacing information about BBR. * MINOR: quic: make bbr consider the max window size setting * BUG/MEDIUM: http-ana: Don't release too early the L7 buffer
Marcus Rueckert2024-11-26 15:01:02 +00:00
fb737f344c
Accepting request 1222555 from server:http
Ana Guerrero2024-11-08 10:59:57 +00:00
0a688fad95
Accepting request 1183498 from server:http
Ana Guerrero2024-06-27 14:03:48 +00:00
0e4619e65b
haproxy 3.0.2
Lars Vogdt
2024-06-26 21:29:25 +00:00
df29221716
Accepting request 1179720 from server:http
Ana Guerrero2024-06-11 16:27:29 +00:00
1dd5fe4c8a
- Update to version 3.0.1+git0.471a1b2f1: * [RELEASE] Released version 3.0.1 * BUG/MINOR: mux-h1: Use the right variable to set NEGO_FF_FL_EXACT_SIZE flag * BUG/MAJOR: mux-h1: Properly copy chunked input data during zero-copy nego * BUG/MEDIUM: stconn/mux-h1: Fix suspect change causing timeouts * BUG/MINOR: quic: ensure Tx buf is always purged * BUG/MINOR: quic: fix computed length of emitted STREAM frames * BUG/MEDIUM: ssl: bad auth selection with TLS1.2 and WolfSSL * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * BUG/MEDIUM: mux-quic: Don't unblock zero-copy fwding if blocked during nego * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MEDIUM: mux-quic: Unblock zero-copy forwarding if the txbuf can be released * MEDIUM: stconn: Be able to unblock zero-copy data forwarding from done_fastfwd * BUG/MEDIUM: h1-htx: Don't state interim responses are bodyless * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * DOC: configuration: add an example for keywords from crt-store * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning
Marcus Rueckert2024-06-10 15:09:36 +00:00
7198745188
Accepting request 1177941 from server:http
Ana Guerrero2024-06-03 15:41:34 +00:00