Commit Graph

  • 7e0d52b5cf Accepting request 1333967 from server:http factory Dominique Leuenberger 2026-02-20 16:42:06 +00:00
  • 3311195234 - Update to version 3.3.4+git0.c2bffae0a: * [RELEASE] Released version 3.3.4 * BUG/MINOR: backend: check delay MUX before conn_prepare() * BUG/MINOR: acme: fix X509_NAME leak when X509_set_issuer_name() fails * CLEANUP: mux-h1: Remove unneeded null check * BUG/MEDIUM: ssl: SSL backend sessions used after free * CI: github: disable windows.yml by default on unofficials repo * CI: vtest: move the vtest2 URL to vinyl-cache.org * MINOR: stconn: Add missing SC_FL_NO_FASTFWD flag in sc_show_flags * BUG/MINOR: http-ana: Stop to wait for body on client error/abort * CLEANUP: compression: Remove unused static buffers * BUG/MINOR: flt-trace: Properly compute length of the first DATA block * DEV: term-events: Fix hanshake events decoding * BUG/MEDIUM: applet: Fix test on shut flags for legacy applets (v2) * BUG/MEDIUM: mux-h1: Stop sending vi fast-forward for unexpected states * BUG/MEDIUM: mux-h2/quic: Stop sending via fast-forward if stream is closed * BUG/MEDIUM: h3: reject frontend CONNECT as currently not implemented * BUG/MAJOR: Revert "MEDIUM: mux-quic: add BUG_ON if sending on locally closed QCS" * BUG/MINOR: ssl: error with ssl-f-use when no "crt" * BUG/MINOR: ssl: clarify ssl-f-use errors in post-section parsing * BUG/MINOR: ssl: fix leak in ssl-f-use parser upon error * BUG/MINOR: ssl: double-free on error path w/ ssl-f-use parser * BUG/MINOR: ssl: lack crtlist_dup_ssl_conf() declaration * BUG/MINOR: deviceatlas: set cache_size on hot-reloaded atlas instance * BUG/MINOR: deviceatlas: fix deinit to only finalize when initialized * BUG/MINOR: deviceatlas: fix resource leak on hot-reload compile failure * BUG/MINOR: deviceatlas: fix double-checked locking race in checkinst * BUG/MINOR: deviceatlas: fix cookie vlen using wrong length after extraction * BUG/MINOR: deviceatlas: fix off-by-one in da_haproxy_conv() * BUG/MEDIUM: deviceatlas: fix resource leaks on init error paths Marcus Rueckert 2026-02-19 13:53:50 +00:00
  • 83adac273f Accepting request 1332730 from server:http Ana Guerrero 2026-02-12 16:30:48 +00:00
  • 00adb23abc - Update to version 3.3.3+git0.465d8e2fc: (boo#1257976 CVE-2026-26081 CVE-2026-26080) * [RELEASE] Released version 3.3.3 * BUG/MAJOR: quic: fix parsing frame type * BUG/MAJOR: quic: reject invalid token * BUG/MINOR: backend: fix access on shared counters array * BUG/MINOR: quic: ensure handshake speed up is only run once per conn * BUG/MINOR: ssl: SSL_CERT_DIR environment variable doesn't affect haproxy * MINOR: activity: allow to switch per-task lock/memory profiling at runtime * MEDIUM: activity: apply and use new finegrained task profiling settings * MINOR: activity: support setting/clearing lock/memory watching for task profiling * BUG/MINOR: startup: handle a possible strdup() failure * BUG/MINOR: startup: fix allocation error message of progname string * BUG/MINOR: config: Fix setting of alt_proto * MEDIUM: backend: make "balance random" consider req rate when loads are equal * DOC: config: mention the limitation on server id range for consistent hash * BUG/MEDIUM: lb-chash: always properly initialize lb_nodes with dynamic servers * CLEANUP: lb-chash: free lb_nodes from chash's deinit(), not global * BUG/MINOR: cpu-topo: count cores not cpus to distinguish core types * CLEANUP: haproxy: fix bad line wrapping in run_poll_loop() * BUG/MEDIUM: threads: Atomically set TH_FL_SLEEPING and clr FL_NOTIFIED Marcus Rueckert 2026-02-12 15:18:38 +00:00
  • 07c6f847fc Accepting request 1331681 from server:http slfo-main Ana Guerrero 2026-02-06 18:11:22 +00:00
  • d9e587087b Accepting request 1331681 from server:http Ana Guerrero 2026-02-06 18:11:22 +00:00
  • a79c16c530 Accepting request 1329868 from server:http Ana Guerrero 2026-01-30 17:22:20 +00:00
  • 89ba0f6e79 Accepting request 1329868 from server:http Ana Guerrero 2026-01-30 17:22:20 +00:00
  • 10ab59f5c4 - Update to version 3.3.2+git3.bc0fb5969: * BUG/MEDIUM: applet: Fix test on shut flags for legacy applets * DOC: internals: cleanup few typos in master-worker documentation * MEDIUM: h1: strictly verify quoting in chunk extensions Marcus Rueckert 2026-01-30 13:28:31 +00:00
  • 7a84663f26 - Update to version 3.3.2+git3.bc0fb5969: * BUG/MEDIUM: applet: Fix test on shut flags for legacy applets * DOC: internals: cleanup few typos in master-worker documentation * MEDIUM: h1: strictly verify quoting in chunk extensions Marcus Rueckert 2026-01-30 13:28:31 +00:00
  • e8156d4b1c - Update to version 3.3.2+git0.72df9192b: Marcus Rueckert 2026-01-29 18:47:33 +00:00
  • 05f8946f70 - Update to version 3.3.2+git0.72df9192b: Marcus Rueckert 2026-01-29 18:47:33 +00:00
  • 53b7160d37 - Fix packages for Immutable Mode Peter Varkoly 2026-01-28 15:12:30 +00:00
  • 1b38454eea - Fix packages for Immutable Mode Peter Varkoly 2026-01-28 15:12:30 +00:00
  • e7485774f7 Accepting request 1323692 from server:http Ana Guerrero 2025-12-19 16:41:25 +00:00
  • 8683f3ed56 Accepting request 1323692 from server:http Ana Guerrero 2025-12-19 16:41:25 +00:00
  • 35492a6562 - Update to version 3.3.1+git0.9c24c11a6: Marcus Rueckert 2025-12-19 16:05:05 +00:00
  • b55f75091a - Update to version 3.3.1+git0.9c24c11a6: Marcus Rueckert 2025-12-19 16:05:05 +00:00
  • 45f4273f4f Fix bsc#1250983 slfo-1.2 Peter Varkoly 2025-11-28 20:28:14 +01:00
  • 5e645c9413 Accepting request 1320231 from server:http Ana Guerrero 2025-11-27 14:20:07 +00:00
  • 6a1ce1b72e Accepting request 1320231 from server:http Ana Guerrero 2025-11-27 14:20:07 +00:00
  • a73071a7c8 - Update to version 3.3.0+git0.7832fb21f: https://www.haproxy.com/blog/announcing-haproxy-3-3 https://www.mail-archive.com/haproxy@formilux.org/msg46300.html - refresh patches: haproxy-1.6.0-makefile_lib.patch haproxy-1.6.0-sec-options.patch - enable USE_KTLS - prepare ech/quic support Marcus Rueckert 2025-11-26 18:18:12 +00:00
  • d2a89fe585 - Update to version 3.3.0+git0.7832fb21f: https://www.haproxy.com/blog/announcing-haproxy-3-3 https://www.mail-archive.com/haproxy@formilux.org/msg46300.html - refresh patches: haproxy-1.6.0-makefile_lib.patch haproxy-1.6.0-sec-options.patch - enable USE_KTLS - prepare ech/quic support Marcus Rueckert 2025-11-26 18:18:12 +00:00
  • 02c5a8c5ad Accepting request 1319056 from server:http Ana Guerrero 2025-11-21 15:55:56 +00:00
  • 2c65fcb9e1 Accepting request 1319056 from server:http Ana Guerrero 2025-11-21 15:55:56 +00:00
  • 6641010043 - Update to version 3.2.9+git0.170436929: Marcus Rueckert 2025-11-21 10:32:50 +00:00
  • e0aebfeaec - Update to version 3.2.9+git0.170436929: Marcus Rueckert 2025-11-21 10:32:50 +00:00
  • e675ce1878 - refresh haproxy-1.6.0-makefile_lib.patch - Readd USE_RELRO_NOW=1, USE_STACKPROTECTOR=1, USE_PIE=1 - adapt haproxy-1.6.0-sec-options.patch so the build no longer complains about unused options - drop CPU="%{_target_cpu}" as it is unused - migrate to DEBUG_CFLAGS to OPT_CFLAGS Marcus Rueckert 2025-11-20 17:27:39 +00:00
  • a01a004086 - refresh haproxy-1.6.0-makefile_lib.patch - Readd USE_RELRO_NOW=1, USE_STACKPROTECTOR=1, USE_PIE=1 - adapt haproxy-1.6.0-sec-options.patch so the build no longer complains about unused options - drop CPU="%{_target_cpu}" as it is unused - migrate to DEBUG_CFLAGS to OPT_CFLAGS Marcus Rueckert 2025-11-20 17:27:39 +00:00
  • 4b67e85f69 add bugnumber Marcus Rueckert 2025-11-20 14:42:59 +00:00
  • 56b33214f3 add bugnumber Marcus Rueckert 2025-11-20 14:42:59 +00:00
  • ca9c399490 - Readd USE_RELRO_NOW=1, USE_STACKPROTECTOR=1, USE_PIE=1, USE_SYSTEMD=1 all of them are still used. Marcus Rueckert 2025-11-20 14:42:06 +00:00
  • 564ff17ee4 Accepting request 1318880 from home:darix:apps Marcus Rueckert 2025-11-20 14:42:06 +00:00
  • abc62b6f2e Accepting request 1317993 from server:http Ana Guerrero 2025-11-17 11:16:55 +00:00
  • b7b0274f60 Accepting request 1317993 from server:http Ana Guerrero 2025-11-17 11:16:55 +00:00
  • f1cfb32eef - Remove deprecated ini file Peter Varkoly 2025-11-08 13:03:27 +00:00
  • 907923b96a - Remove deprecated ini file Peter Varkoly 2025-11-08 13:03:27 +00:00
  • b5a30dba40 - Remove deprecated build options: USE_RELRO_NOW=1, USE_STACKPROTECTOR=1, USE_PIE=1, USE_SYSTEMD=1 Peter Varkoly 2025-11-07 20:12:53 +00:00
  • 4ec4e50c54 - Remove deprecated build options: USE_RELRO_NOW=1, USE_STACKPROTECTOR=1, USE_PIE=1, USE_SYSTEMD=1 Peter Varkoly 2025-11-07 20:12:53 +00:00
  • 5fdce62cc7 - Remove checks for not supported openSUSE versions Peter Varkoly 2025-11-07 20:11:51 +00:00
  • 5d12f13da9 - Remove checks for not supported openSUSE versions Peter Varkoly 2025-11-07 20:11:51 +00:00
  • b9559ba947 Accepting request 1316410 from server:http Ana Guerrero 2025-11-07 17:23:22 +00:00
  • c8f5d47eff Accepting request 1316410 from server:http Ana Guerrero 2025-11-07 17:23:22 +00:00
  • a197d2d9f1 - Update to version 3.2.8+git0.9200f398d: * [RELEASE] Released version 3.2.8 * BUG/MINOR: acme: wrong dns-01 challenge in the log * BUG/MEDIUM: server: close a race around ready_srv when deleting a server * BUG/MEDIUM: connections: permit to permanently remove an idle conn * BUG/MEDIUM: mux-h2: make sure not to move a dead connection to idle * BUG/MEDIUM: mux-h1: fix 414 / 431 status code reporting * SCRIPTS: build-ssl: fix rpath in AWS-LC install for openssl and bssl bin * OPTIM: backend: skip conn reuse for incompatible proxies * BUG/MINOR: resolvers: ensure fair round robin iteration * BUG/MINOR: ssl: returns when SSL_CTX_new failed during init * BUG/MINOR: resolvers: Apply dns-accept-family setting on additional records * BUG/MINOR: init: Do not close previously created fd in stdio_quiet * MINOR: http: fix 405,431,501 default errorfile * MINOR: ssl-sample: add ssl_fc_early_rcvd() to detect use of early data * DOC: config: slightly clarify the ssl_fc_has_early() behavior * BUG/MEDIUM: ssl: Crash because of dangling ckch_store reference in a ckch instance * MINOR: backend: srv_is_up converter * MINOR: backend: srv_queue helper * BUG/MEDIUM: cli: do not return ACKs one char at a time * MINOR: cli: create cli_raw_rcv_buf() from the generic applet_raw_rcv_buf() * MINOR: applet: do not put SE_FL_WANT_ROOM on rcv_buf() if the channel is empty * BUG/MEDIUM: mt_list: Use atomic operations to prevent compiler optims * BUG/MINOR: stick-tables: properly index string-type keys * BUG/MEDIUM: applet: Improve again spinning loops detection with the new API * BUG/MEDIUM: mt_lists: Avoid el->prev = el->next = el Marcus Rueckert 2025-11-07 10:20:42 +00:00
  • 6f282eee19 - Update to version 3.2.8+git0.9200f398d: * [RELEASE] Released version 3.2.8 * BUG/MINOR: acme: wrong dns-01 challenge in the log * BUG/MEDIUM: server: close a race around ready_srv when deleting a server * BUG/MEDIUM: connections: permit to permanently remove an idle conn * BUG/MEDIUM: mux-h2: make sure not to move a dead connection to idle * BUG/MEDIUM: mux-h1: fix 414 / 431 status code reporting * SCRIPTS: build-ssl: fix rpath in AWS-LC install for openssl and bssl bin * OPTIM: backend: skip conn reuse for incompatible proxies * BUG/MINOR: resolvers: ensure fair round robin iteration * BUG/MINOR: ssl: returns when SSL_CTX_new failed during init * BUG/MINOR: resolvers: Apply dns-accept-family setting on additional records * BUG/MINOR: init: Do not close previously created fd in stdio_quiet * MINOR: http: fix 405,431,501 default errorfile * MINOR: ssl-sample: add ssl_fc_early_rcvd() to detect use of early data * DOC: config: slightly clarify the ssl_fc_has_early() behavior * BUG/MEDIUM: ssl: Crash because of dangling ckch_store reference in a ckch instance * MINOR: backend: srv_is_up converter * MINOR: backend: srv_queue helper * BUG/MEDIUM: cli: do not return ACKs one char at a time * MINOR: cli: create cli_raw_rcv_buf() from the generic applet_raw_rcv_buf() * MINOR: applet: do not put SE_FL_WANT_ROOM on rcv_buf() if the channel is empty * BUG/MEDIUM: mt_list: Use atomic operations to prevent compiler optims * BUG/MINOR: stick-tables: properly index string-type keys * BUG/MEDIUM: applet: Improve again spinning loops detection with the new API * BUG/MEDIUM: mt_lists: Avoid el->prev = el->next = el Marcus Rueckert 2025-11-07 10:20:42 +00:00
  • 201c119ea0 Accepting request 1313209 from server:http Ana Guerrero 2025-10-23 14:38:28 +00:00
  • 54b33ff210 Accepting request 1313209 from server:http Ana Guerrero 2025-10-23 14:38:28 +00:00
  • 9675fcd7d1 - Update to version 3.2.7+git0.be4f72dc5: Marcus Rueckert 2025-10-23 12:01:57 +00:00
  • abaa9be71a - Update to version 3.2.7+git0.be4f72dc5: Marcus Rueckert 2025-10-23 12:01:57 +00:00
  • 95d4384185 Accepting request 1309647 from server:http Dominique Leuenberger 2025-10-07 16:29:45 +00:00
  • ffc88446d1 Accepting request 1309647 from server:http Dominique Leuenberger 2025-10-07 16:29:45 +00:00
  • 59e4f51c4d - Fix apparmor profile: - we need attach disconnected for the systemd notify socket - more access for the cpu scheduling support in haproxy Marcus Rueckert 2025-10-07 13:32:14 +00:00
  • dda00b7aca - Fix apparmor profile: - we need attach disconnected for the systemd notify socket - more access for the cpu scheduling support in haproxy Marcus Rueckert 2025-10-07 13:32:14 +00:00
  • 250db6858b Accepting request 1308873 from server:http Dominique Leuenberger 2025-10-04 16:51:28 +00:00
  • 8036cb7042 Accepting request 1308873 from server:http Dominique Leuenberger 2025-10-04 16:51:28 +00:00
  • 3ac2c8ab55 add bugnumbers Marcus Rueckert 2025-10-03 13:52:36 +00:00
  • e7758456fd add bugnumbers Marcus Rueckert 2025-10-03 13:52:36 +00:00
  • f741d0b4a1 - Update to version 3.2.6+git0.81568b2d1: Marcus Rueckert 2025-10-03 13:42:46 +00:00
  • 418925b379 - Update to version 3.2.6+git0.81568b2d1: Marcus Rueckert 2025-10-03 13:42:46 +00:00
  • 4405c77806 Accepting request 1308350 from server:http Ana Guerrero 2025-10-01 16:57:31 +00:00
  • 79c6ca3d21 Accepting request 1308350 from server:http Ana Guerrero 2025-10-01 16:57:31 +00:00
  • 8082a1c3ca - Update to version 3.2.5+git0.ba0fd6b8e: * [RELEASE] Released version 3.2.5 * BUG/MEDIUM: pattern: fix possible infinite loops on deletion (try 2) * DEBUG: stick-tables: export stktable_add_pend_updates() for better reporting * BUG/MEDIUM: ring: invert the length check to avoid an int overflow * BUG/MINOR: resolvers: always normalize FQDN from response * BUG/MINOR: ocsp: Crash when updating CA during ocsp updates * BUG/MEDIUM: http_ana: fix potential NULL deref in http_process_req_common() * BUG/MINOR: ocsp: prototype inconsistency * BUG/MINOR: ssl: Fix potential NULL deref in trace callback * BUG/MINOR: ssl: Potential NULL deref in trace macro * BUG/MEDIUM: jws: return size_t in JWS functions * BUG/MINOR: acme: null pointer dereference upon allocation failure * BUG/MAJOR: stream: Force channel analysis on successful synchronous send * BUG/MAJOR: stream: Remove READ/WRITE events on channels after analysers eval * BUG/MINOR: stick-table: make sure never to miss a process_table_expire update * BUG/MEDIUM: stick-tables: don't loop on non-expirable entries * BUG/MINOR: activity: fix reporting of task latency * BUG/MEDIUM: ssl: create the mux immediately on early data * BUG/MEDIUM: h1: Allow reception if we have early data * BUG/MEDIUM: checks: fix ALPN inheritance from server * OPTIM: check: do not delay MUX for ALPN if SSL not active * BUG/MEDIUM: mux-h2: Reinforce conditions to report an error to app-layer stream * BUG/MEDIUM: mux-h2: Report RST/error to app-layer stream during 0-copy fwding * BUG/MINOR: mux-h2: Remove H2_CF_DEM_DFULL flags when the demux buffer is reset * BUG/MEDIUM: mux-h2: Restart reading when mbuf ring is no longer full * BUG/MEDIUM: mux-h2; Don't block reveives in H2_CS_ERROR and H2_CS_ERROR2 states * BUG/MEDIUM: mux-h2: Reset MUX blocking flags when a send error is caught * CLEANUP: quic: fix typo in quic_tx trace * BUG/MINOR: cpu_topo: work around a small bug in musl's CPU_ISSET() Peter Varkoly 2025-09-24 08:26:00 +00:00
  • 3263c21a09 - Update to version 3.2.5+git0.ba0fd6b8e: * [RELEASE] Released version 3.2.5 * BUG/MEDIUM: pattern: fix possible infinite loops on deletion (try 2) * DEBUG: stick-tables: export stktable_add_pend_updates() for better reporting * BUG/MEDIUM: ring: invert the length check to avoid an int overflow * BUG/MINOR: resolvers: always normalize FQDN from response * BUG/MINOR: ocsp: Crash when updating CA during ocsp updates * BUG/MEDIUM: http_ana: fix potential NULL deref in http_process_req_common() * BUG/MINOR: ocsp: prototype inconsistency * BUG/MINOR: ssl: Fix potential NULL deref in trace callback * BUG/MINOR: ssl: Potential NULL deref in trace macro * BUG/MEDIUM: jws: return size_t in JWS functions * BUG/MINOR: acme: null pointer dereference upon allocation failure * BUG/MAJOR: stream: Force channel analysis on successful synchronous send * BUG/MAJOR: stream: Remove READ/WRITE events on channels after analysers eval * BUG/MINOR: stick-table: make sure never to miss a process_table_expire update * BUG/MEDIUM: stick-tables: don't loop on non-expirable entries * BUG/MINOR: activity: fix reporting of task latency * BUG/MEDIUM: ssl: create the mux immediately on early data * BUG/MEDIUM: h1: Allow reception if we have early data * BUG/MEDIUM: checks: fix ALPN inheritance from server * OPTIM: check: do not delay MUX for ALPN if SSL not active * BUG/MEDIUM: mux-h2: Reinforce conditions to report an error to app-layer stream * BUG/MEDIUM: mux-h2: Report RST/error to app-layer stream during 0-copy fwding * BUG/MINOR: mux-h2: Remove H2_CF_DEM_DFULL flags when the demux buffer is reset * BUG/MEDIUM: mux-h2: Restart reading when mbuf ring is no longer full * BUG/MEDIUM: mux-h2; Don't block reveives in H2_CS_ERROR and H2_CS_ERROR2 states * BUG/MEDIUM: mux-h2: Reset MUX blocking flags when a send error is caught * CLEANUP: quic: fix typo in quic_tx trace * BUG/MINOR: cpu_topo: work around a small bug in musl's CPU_ISSET() Peter Varkoly 2025-09-24 08:26:00 +00:00
  • 0e41ed7404 Accepting request 1299269 from server:http Dominique Leuenberger 2025-08-14 09:36:25 +00:00
  • 20c9cb0f9e Accepting request 1299269 from server:http Dominique Leuenberger 2025-08-14 09:36:25 +00:00
  • 967a286928 - Update to version 3.2.4+git0.98813a13e: Marcus Rueckert 2025-08-13 16:50:20 +00:00
  • f75fdb951c Accepting request 1299268 from home:darix:apps Marcus Rueckert 2025-08-13 16:50:20 +00:00
  • 34ef7e85fd Accepting request 1291449 from server:http Ana Guerrero 2025-07-09 15:29:29 +00:00
  • de5d419f0f Accepting request 1291449 from server:http Ana Guerrero 2025-07-09 15:29:29 +00:00
  • 61db165886 - Update to version 3.2.3+git0.1844da7c6: * [RELEASE] Released version 3.2.3 * BUILD/MEDIUM: deviceatlas: fix when installed in custom locations. * BUG/MINOR: http-act: Fix parsing of the expression argument for pause action * BUG/MINOR: ssl: crash in ssl_sock_io_cb() with SSL traces and idle connections * BUG/MINOR: ssl/ocsp: fix definition discrepancies with ocsp_update_init() * BUG/MINOR: quic: Missing TLS 1.3 QUIC cipher suites and groups inits (OpenSSL 3.5 QUIC API) * CI: github: update to OpenSSL 3.5.1 * BUG/MEDIUM: quic: SSL/TCP handshake failures with OpenSSL 3.5 * BUILD: quic: QUIC build against OpenSSL 3.5 broken * CI: github: update the stable CI to ubuntu-24.04 * CI: github: add an OpenSSL 3.5.0 job * CI: enable USE_QUIC=1 for OpenSSL versions >= 3.5.0 Marcus Rueckert 2025-07-09 09:20:21 +00:00
  • 6653654059 - Update to version 3.2.3+git0.1844da7c6: * [RELEASE] Released version 3.2.3 * BUILD/MEDIUM: deviceatlas: fix when installed in custom locations. * BUG/MINOR: http-act: Fix parsing of the expression argument for pause action * BUG/MINOR: ssl: crash in ssl_sock_io_cb() with SSL traces and idle connections * BUG/MINOR: ssl/ocsp: fix definition discrepancies with ocsp_update_init() * BUG/MINOR: quic: Missing TLS 1.3 QUIC cipher suites and groups inits (OpenSSL 3.5 QUIC API) * CI: github: update to OpenSSL 3.5.1 * BUG/MEDIUM: quic: SSL/TCP handshake failures with OpenSSL 3.5 * BUILD: quic: QUIC build against OpenSSL 3.5 broken * CI: github: update the stable CI to ubuntu-24.04 * CI: github: add an OpenSSL 3.5.0 job * CI: enable USE_QUIC=1 for OpenSSL versions >= 3.5.0 Marcus Rueckert 2025-07-09 09:20:21 +00:00
  • 66fa96f327 Accepting request 1289848 from server:http Ana Guerrero 2025-07-02 15:30:56 +00:00
  • 3d70558e3d Accepting request 1289848 from server:http Ana Guerrero 2025-07-02 15:30:56 +00:00
  • 2a379227d3 - Update to version 3.2.2+git0.a55102f09: Marcus Rueckert 2025-07-02 10:10:12 +00:00
  • da88059f71 Accepting request 1289847 from home:darix:apps Marcus Rueckert 2025-07-02 10:10:12 +00:00
  • 5af7ca5968 Accepting request 1287782 from server:http Ana Guerrero 2025-06-24 18:46:47 +00:00
  • 9c370123d2 Accepting request 1287782 from server:http Ana Guerrero 2025-06-24 18:46:47 +00:00
  • 195d2f83d3 Accepting request 1287667 from home:crameleon:branches:server:http Peter Varkoly 2025-06-23 04:08:39 +00:00
  • b3b2cffa89 Accepting request 1287667 from home:crameleon:branches:server:http Peter Varkoly 2025-06-23 04:08:39 +00:00
  • 0ea7418fe3 Accepting request 1286645 from server:http Ana Guerrero 2025-06-18 15:58:33 +00:00
  • 85c608291f Accepting request 1286645 from server:http Ana Guerrero 2025-06-18 15:58:33 +00:00
  • 66a98a2cf5 - modernize spec file with spec-cleaner. some changes (mostly whitespaces) got reverted for readability Marcus Rueckert 2025-06-11 10:51:33 +00:00
  • d17cfcaf2e - modernize spec file with spec-cleaner. some changes (mostly whitespaces) got reverted for readability Marcus Rueckert 2025-06-11 10:51:33 +00:00
  • 854e7a6f4d - Add support to build against aws-lc with --with=awslc or in the project config `` %define _with_awslc 1 Macros: %_with_awslc 1 :Macros `` Marcus Rueckert 2025-06-11 10:46:53 +00:00
  • 0ea3144fdc - Add support to build against aws-lc with --with=awslc or in the project config `` %define _with_awslc 1 Macros: %_with_awslc 1 :Macros `` Marcus Rueckert 2025-06-11 10:46:53 +00:00
  • 759a264a53 Accepting request 1282598 from server:http Dominique Leuenberger 2025-06-04 18:27:29 +00:00
  • 64ad8d7797 Accepting request 1282598 from server:http Dominique Leuenberger 2025-06-04 18:27:29 +00:00
  • 43b169d35f VUL-0: CVE-2025-32464: haproxy: HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. (bsc#1240971) Peter Varkoly 2025-06-04 08:22:46 +00:00
  • da01ec2c64 VUL-0: CVE-2025-32464: haproxy: HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. (bsc#1240971) Peter Varkoly 2025-06-04 08:22:46 +00:00
  • 2bbc771d5b Accepting request 1280971 from server:http Dominique Leuenberger 2025-05-30 12:35:09 +00:00
  • c535769797 Accepting request 1280971 from server:http Dominique Leuenberger 2025-05-30 12:35:09 +00:00
  • b15ec4e153 remove broken line Marcus Rueckert 2025-05-28 17:54:27 +00:00
  • 8c93028db4 remove broken line Marcus Rueckert 2025-05-28 17:54:27 +00:00
  • e7f0aec0b8 - Update apparmor profile to allow new cpu binding handling Marcus Rueckert 2025-05-28 17:16:15 +00:00
  • 4776538945 - Update apparmor profile to allow new cpu binding handling Marcus Rueckert 2025-05-28 17:16:15 +00:00
  • b1953059a2 - Update to version 3.2.0+git0.e134140d2: https://www.haproxy.com/blog/announcing-haproxy-3-2 https://www.mail-archive.com/haproxy@formilux.org/msg45917.html Marcus Rueckert 2025-05-28 16:40:10 +00:00
  • 6465ea96ec - Update to version 3.2.0+git0.e134140d2: https://www.haproxy.com/blog/announcing-haproxy-3-2 https://www.mail-archive.com/haproxy@formilux.org/msg45917.html Marcus Rueckert 2025-05-28 16:40:10 +00:00
  • 847f9a655c Accepting request 1270823 from server:http Dominique Leuenberger 2025-04-20 07:35:02 +00:00
  • e7002f1d5a Accepting request 1270823 from server:http Dominique Leuenberger 2025-04-20 07:35:02 +00:00
  • 20ef41886f fix sources list Marcus Rueckert 2025-04-18 12:43:02 +00:00