Commit graph

178 commits

Author SHA1 Message Date
Thomas Heil
c950f48e7a haproxy: patches from upstream
- [PATCH 1/6] BUILD: fix "make install" to support spaces in the
 - [PATCH 2/6] BUG/MEDIUM: ssl: fix bad ssl context init can cause
 - [PATCH 3/6] BUG/MEDIUM: ssl: force a full GC in case of memory
 - [PATCH 4/6] BUG/MEDIUM: checks: fix conflicts between agent checks
 - [PATCH 5/6] BUG/MINOR: config: don't inherit the default balance
 - [PATCH 6/6] BUG/MAJOR: frontend: initialize capture pointers earlier

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-11-20 14:29:40 +01:00
Thomas Heil
4846a203bb haproxy: bump to version 1.5.8
Released version 1.5.8 with the following main changes :
 - BUG/MAJOR: buffer: check the space left is enough or not
   when input data in a buffer is wrapped
 - BUG/BUILD: revert accidental change in the
   makefile from latest SSL fix

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-11-05 22:04:57 +01:00
Thomas Heil
0e45b40fb5 haproxy: patches from upstream
-[PATCH 1/2] BUG/MEDIUM: systemd: set KillMode to 'mixed'
 -[PATCH 2/2] BUG/MEDIUM: config: avoid skipping disabled proxies

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-10-14 23:33:27 +02:00
Thomas Heil
f42d4f63ee haproxy: maintenance release to fix no critical bugs
- bump to version 1.5.5

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-10-08 23:28:24 +02:00
Thomas Heil
a6a3037fbd haproxy: fixes from upstream
- [PATCH 15/20] BUG/MEDIUM: remove debugging code from systemd-wrapper
 - [PATCH 16/20] BUG/MEDIUM: http: adjust close mode when switching to
 - [PATCH 17/20] BUG/MINOR: config: don't propagate process binding on
 - [PATCH 18/20] BUG/MEDIUM: check: rule-less tcp-check must detect
 - [PATCH 19/20] BUG/MINOR: tcp-check: report the correct failed step in
 - [PATCH 20/20] BUG/MINOR: config: don't propagate process binding for

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-10-06 16:28:36 +02:00
Thomas Heil
d613e1e94e haproxy: remove unnecessary parts in Makefile
- remove ADDLIB
 - remove -lcrypt which was -lcrypto

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-09-23 11:08:51 +02:00
Thomas Heil
2e071aeaa8 haproxy: add nossl variant
According to Issue #342 here is a proposal to add a nossl variant to
that builts haproxy without ssl

Add pending patch from upstream
 - [PATCH 14/14] MEDIUM: systemd-wrapper: support multiple executable

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-09-23 10:45:03 +02:00
Thomas Heil
85c47b0630 haproxy: patches from upstream
- [PATCH 01/13] DOC: clearly state that the "show sess" output format
- [PATCH 02/13] MINOR: stats: fix minor typo fix in
- [PATCH 03/13] MEDIUM: Improve signal handling in systemd wrapper.
- [PATCH 04/13] MINOR: Also accept SIGHUP/SIGTERM in systemd-wrapper
- [PATCH 05/13] DOC: indicate in the doc that track-sc* can wait if
- [PATCH 06/13] MEDIUM: http: enable header manipulation for 101
- [PATCH 07/13] BUG/MEDIUM: config: propagate frontend to backend
- [PATCH 08/13] MEDIUM: config: properly propagate process binding
- [PATCH 09/13] MEDIUM: config: make the frontends automatically bind
- [PATCH 10/13] MEDIUM: config: compute the exact bind-process before
- [PATCH 11/13] MEDIUM: config: only warn if stats are attached to
- [PATCH 12/13] MEDIUM: config: report it when tcp-request rules are
- [PATCH 13/13] MINOR: config: detect the case where a tcp-request

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-09-17 12:13:12 +02:00
Thomas Heil
fbe4697b49 haproxy: new release 1.5.4 that fixes recent cve
- BUG: config: error in http-response replace-header number of arguments
    - BUG/MINOR: Fix search for -p argument in systemd wrapper.
    - BUG/MEDIUM: auth: fix segfault with http-auth and a configuration with an unknown encryption algorithm
    - BUG/MEDIUM: config: userlists should ensure that encrypted passwords are supported
    - MEDIUM: connection: add new bit in Proxy Protocol V2
    - BUG/MINOR: server: move the directive #endif to the end of file
    - BUG/MEDIUM: http: tarpit timeout is reset
    - BUG/MAJOR: tcp: fix a possible busy spinning loop in content track-sc*
    - BUG/MEDIUM: http: fix inverted condition in pat_match_meth()
    - BUG/MEDIUM: http: fix improper parsing of HTTP methods for use with ACLs
    - BUG/MINOR: pattern: remove useless allocation of unused trash in pat_parse_reg()
    - BUG/MEDIUM: acl: correctly compute the output type when a converter is used
    - CLEANUP: acl: cleanup some of the redundancy and spaghetti after last fix
    - BUG/CRITICAL: http: don't update msg->sov once data start to leave the buffer

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-09-03 15:37:24 +02:00
Thomas Heil
7c167bfd16 haproxy: patches from upstream
- [PATCH 5/6] BUG/MEDIUM: http: tarpit timeout is reset
- [PATCH 6/6] MEDIUM: connection: add new bit in Proxy Protocol V2

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-08-24 20:46:00 +02:00
Thomas Heil
4eec42a248 haproxy: fix from upstream
[PATCH 4/4] BUG: config: error in http-response replace-header number

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-08-11 17:10:30 +02:00
Thomas Heil
08e97960c7 haproxy: bump to version 1.5.3
- upgrade to 1.5.3
 - [PATCH 1/3] BUG/MINOR: server: move the directive #endif to the end
 - [PATCH 2/3] BUG/MINOR: Fix search for -p argument in systemd wrapper.
 - [PATCH 3/3] BUG/MAJOR: tcp: fix a possible busy spinning loop in

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-30 23:39:29 +02:00
Thomas Heil
bbfeac7e06 haproxy: fixes from upstream
[PATCH 6/6] BUG/MEDIUM: connection: fix proxy v2 header again!

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-21 17:57:31 +02:00
Thomas Heil
6785138bca haproxy: fixes from upstream
[PATCH 4/5] BUG/MINOR: http: base32+src should use the big endian
[PATCH 5/5] BUG/MEDIUM: connection: fix memory corruption when

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-18 14:58:29 +02:00
Thomas Heil
d49fd62acd haproxy: fixes from upstream
[PATCH 3/3] BUG/MEDIUM: ssl: Fix a memory leak in DHE key exchange

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-15 17:41:01 +02:00
Thomas Heil
48438302f5 haproxy: bump to version 1.5.2
- [RELEASE] Released version 1.5.2
 - [PATCH 1/2] DOC: mention that Squid correctly responds 400 to PPv2
 - [PATCH 2/2] DOC: fix typo in Unix Socket commands

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-14 17:02:53 +02:00
Thomas Heil
10d9b68c49 haproxy: fixes from upstream
- [PATCH 22/25] DOC: minor fix on {sc,src}_kbytes_{in,out}
 - [PATCH 23/25] DOC: fix alphabetical sort of converters
 - [PATCH 24/25] BUG/MAJOR: http: correctly rewind the request body
 - [PATCH 25/25] DOC: remove references to CPU=native in the README

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-12 13:45:36 +02:00
Thomas Heil
0661fbcf90 haproxy: fixes from upstream
this patch series mainly fixes a lot of reported issues in conjuction with
abstract socktet handling, improved the docs about the stats

 - [PATCH 13/21] BUILD: http: fix isdigit & isspace warnings on Solaris
 - [PATCH 14/21] BUG/MINOR: listener: set the listener's fd to -1 after
 - [PATCH 15/21] BUG/MEDIUM: unix: failed abstract socket binding is
 - [PATCH 16/21] MEDIUM: listener: implement a per-protocol pause()
 - [PATCH 17/21] MEDIUM: listener: support rebinding during resume()
 - [PATCH 18/21] BUG/MEDIUM: unix: completely unbind abstract sockets
 - [PATCH 19/21] DOC: explicitly mention the limits of abstract
 - [PATCH 20/21] DOC: expand the docs for the provided stats.
 - [PATCH 21/21] BUG/MEDIUM: backend: Update hash to use unsigned int

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-10 13:51:27 +02:00
Thomas Heil
4a3440a8c3 haproxy: fixes from upstream
- [PATCH 10/12] MINOR: stats: fix minor typo in HTML page
 - [PATCH 11/12] BUG/MEDIUM: unix: do not unlink() abstract namespace
 - [PATCH 12/12] DOC: provide an example of how to use ssl_c_sha1

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-06 20:34:33 +02:00
Thomas Heil
ece8d3b51f haproxy: patches from upstream
- [PATCH 7/9] BUILD: remove TODO from the spec file and add READM
 - [PATCH 8/9] MINOR: log: make MAX_SYSLOG_LEN overridable at build time
 - [PATCH 9/9] MEDIUM: log: support a user-configurable max log line
    length

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-30 23:44:43 +02:00
Thomas Heil
2d9af2967c haproxy: patches from upstream (ssl,counter,stick-table, track)
- BUG/MINOR: ssl: Fix external function in order not to return a pointer
   on an internal trash buffer
 - BUG/MINOR: counters: do not untrack counters before logging
 - BUG/MAJOR: sample: correctly reinitialize sample fetch context before
   calling sample_process()
 - MINOR: stick-table: make stktable_fetch_key() indicate why it failed
 - BUG/MEDIUM: counters: fix track-sc* to wait on unstable contents

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-26 06:22:41 +02:00
Thomas Heil
11bf9384ed haproxy: upgrade to version 1.5.1
Bugs from 1.5.0 can cause file descriptor leak, results in the
impossibility to accept new connections after some time.

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-24 19:39:47 +02:00
Thomas Heil
58e6bd332b haproxy: upstream commit, properly initialize and count log
[PATCH 6/6] BUG/MINOR: logs: properly initialize and count log sockets

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-23 22:16:46 +02:00
Thomas Heil
7e55100146 haproxy: fix OCSP response, remove crappy client side timeout patches
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-23 18:47:36 +02:00
Thomas Heil
c7931f98b2 haproxy: fix targe avr32
The avr32 target uses a old accept4 implementation, so i disabled it for
this patform.

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-21 13:45:32 +02:00
Thomas Heil
9501ca562f haproxy: add upstream bugfix, adapt Copyright
- [PATCH] BUG/MEDIUM: Consistently use 'check' in process_chk

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-20 13:35:06 +02:00
Thomas Heil
d48626190c haproxy: upgrade haproxy to version 1.5.0
- includes support for SSL Termination, Compression Offloading, OCSP
	  Stapling support and much more

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-19 23:45:18 +02:00
Thomas Heil
db5d567e7d haproxy: import from packages, add myself as the maintainer
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-12 18:29:23 +02:00