Commit graph

37 commits

Author SHA1 Message Date
heil
d5c18252d4 haproxy: add patches from upstream
- [PATCH 1/2] BUG/MEDIUM: stats: properly initialize the scope before
 - [PATCH 2/2] BUG/MEDIUM: http: don't forward client shutdown without
 - [PATCH 3/8] BUG/MINOR: check: fix tcpcheck error message
 - [PATCH 4/8] CLEANUP: checks: fix double usage of cur / current_step
 - [PATCH 5/8] BUG/MEDIUM: checks: do not dereference head of a
 - [PATCH 6/8] CLEANUP: checks: simplify the loop processing of
 - [PATCH 7/8] BUG/MAJOR: checks: always check for end of list before
 - [PATCH 8/8] BUG/MEDIUM: checks: do not dereference a list as a
 - [PATCH 09/10] BUG/MEDIUM: peers: apply a random reconnection timeout
 - [PATCH 10/10] DOC: Update doc about weight, act and bck fields in the
 - [PATCH 11/14] MINOR: ssl: add a destructor to free allocated SSL
 - [PATCH 12/14] BUG/MEDIUM: ssl: fix tune.ssl.default-dh-param value
 - [PATCH 13/14] BUG/MINOR: cfgparse: fix typo in 'option httplog' error
 - [PATCH 14/14] BUG/MEDIUM: cfgparse: segfault when userlist is misused

Signed-off-by: heil <heil@terminal-consulting.de>
2015-06-11 19:03:14 +02:00
heil
26d577ac26 haproxy: update to 1.5.12
[RELEASE] Released version 1.5.12

    Released version 1.5.12 with the following main changes :
        - BUG/MINOR: ssl: Display correct filename in error message
        - DOC: Fix L4TOUT typo in documentation
        - BUG/MEDIUM: Do not consider an agent check as failed on L7 error
        - BUG/MINOR: pattern: error message missing
        - BUG/MEDIUM: pattern: some entries are not deleted with case insensitive match
        - BUG/MEDIUM: buffer: one byte miss in buffer free space check
        - BUG/MAJOR: http: don't read past buffer's end in http_replace_value
        - BUG/MEDIUM: http: the function "(req|res)-replace-value" doesn't respect the HTTP syntax
        - BUG/MEDIUM: peers: correctly configure the client timeout
        - BUG/MINOR: compression: consider the expansion factor in init
        - BUG/MEDIUM: http: hdr_cnt would not count any header when called without name
        - BUG/MEDIUM: listener: don't report an error when resuming unbound listeners
        - BUG/MEDIUM: init: don't limit cpu-map to the first 32 processes only
        - BUG/MEDIUM: stream-int: always reset si->ops when si->end is nullified
        - BUG/MEDIUM: http: remove content-length from chunked messages
        - DOC: http: update the comments about the rules for determining transfer-length
        - BUG/MEDIUM: http: do not restrict parsing of transfer-encoding to HTTP/1.1
        - BUG/MEDIUM: http: incorrect transfer-coding in the request is a bad request
        - BUG/MEDIUM: http: remove content-length form responses with bad transfer-encoding
        - MEDIUM: http: restrict the HTTP version token to 1 digit as per RFC7230
        - MEDIUM: http: add option-ignore-probes to get rid of the floods of 408
        - BUG/MINOR: config: clear proxy->table.peers.p for disabled proxies
        - MINOR: stick-table: don't attach to peers in stopped state
        - MEDIUM: config: initialize stick-tables after peers, not before
        - MEDIUM: peers: add the ability to disable a peers section
        - DOC: document option http-ignore-probes
        - DOC: fix the comments about the meaning of msg->sol in HTTP
        - BUG/MEDIUM: http: wait for the exact amount of body bytes in wait_for_request_body
        - BUG/MAJOR: http: prevent risk of reading past end with balance url_param
        - DOC: update the doc on the proxy protocol

Signed-off-by: heil <heil@terminal-consulting.de>
2015-05-04 17:49:47 +02:00
Thomas Heil
8827409a17 Merge pull request #1216 from ryzhovau/halog_linkage
haproxy: fix halog linkage
2015-04-29 12:05:39 +02:00
Alexander Ryzhov
95faa1a0ba haproxy: fix halog linkage
Signed-off-by: Alexander Ryzhov <openwrt@ryzhov-al.ru>
2015-04-29 08:42:02 +00:00
Alexander Ryzhov
ba80d015ed fix PCREDIR
Signed-off-by: Alexander Ryzhov <openwrt@ryzhov-al.ru>
2015-04-28 13:42:15 +00:00
heil
a412694bbc haproxy: include patches from mainline
- [PATCH 3/9] BUG/MEDIUM: Do not consider an agent check as failed on
 - [PATCH 4/9] BUG/MEDIUM: peers: correctly configure the client timeout
 - [PATCH 5/9] BUG/MEDIUM: buffer: one byte miss in buffer free space
 - [PATCH 6/9] BUG/MAJOR: http: don't read past buffer's end in
 - [PATCH 7/9] BUG/MEDIUM: http: the function "(req|res)-replace-value"
 - [PATCH 8/9] BUG/MINOR: compression: consider the expansion factor in
 - [PATCH 9/9] BUG/MEDIUM: http: hdr_cnt would not count any header when

Signed-off-by: heil <heil@terminal-consulting.de>
2015-04-16 12:04:10 +02:00
Thomas Heil
8609cc44e7 haproxy: update to version 1.5.11 and pending patches
- BUG/MEDIUM: backend: correctly detect the domain when use_domain_only is used
     - MINOR: ssl: load certificates in alphabetical order
     - BUG/MINOR: checks: prevent http keep-alive with http-check expect
     - BUG/MEDIUM: Do not set agent health to zero if server is disabled in config
     - MEDIUM/BUG: Only explicitly report "DOWN (agent)" if the agent health is zero
     - BUG/MINOR: stats:Fix incorrect printf type.
     - DOC: add missing entry for log-format and clarify the text
     - BUG/MEDIUM: http: fix header removal when previous header ends with pure LF
     - BUG/MEDIUM: channel: fix possible integer overflow on reserved size computation
     - BUG/MINOR: channel: compare to_forward with buf->i, not buf->size
     - MINOR: channel: add channel_in_transit()
     - MEDIUM: channel: make buffer_reserved() use channel_in_transit()
     - MEDIUM: channel: make bi_avail() use channel_in_transit()
     - BUG/MEDIUM: channel: don't schedule data in transit for leaving until connected
     - BUG/MAJOR: log: don't try to emit a log if no logger is set
     - BUG/MINOR: args: add missing entry for ARGT_MAP in arg_type_names
     - BUG/MEDIUM: http: make http-request set-header compute the string before removal
     - BUG/MINOR: http: fix incorrect header value offset in replace-hdr/replace-value
     - BUG/MINOR: http: abort request processing on filter failure
     - BUG/MINOR: pattern: error message missing
     - BUG/MEDIUM: pattern: some entries are not deleted with case insensitive match

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2015-02-15 14:26:03 +01:00
Thomas Heil
a393c6b021 haproxy: update to version 1.5.10
- DOC: fix a few typos
 - BUG/MINOR: http: fix typo: "401 Unauthorized" => "407 Unauthorized"
 - BUG/MINOR: parse: refer curproxy instead of proxy
 - DOC: httplog does not support 'no'
 - MINOR: map/acl/dumpstats: remove the "Done." message
 - BUG/MEDIUM: sample: fix random number upper-bound
 - BUG/MEDIUM: patterns: previous fix was incomplete
 - BUG/MEDIUM: payload: ensure that a request channel is available
 - BUG/MINOR: tcp-check: don't condition data polling on check type
 - BUG/MEDIUM: tcp-check: don't rely on random memory contents
 - BUG/MEDIUM: tcp-checks: disable quick-ack unless next rule is an expect
 - BUG/MINOR: config: fix typo in condition when propagating process binding
 - BUG/MEDIUM: config: do not propagate processes between stopped processes
 - BUG/MAJOR: stream-int: properly check the memory allocation return
 - BUG/MEDIUM: memory: fix freeing logic in pool_gc2()
 - BUG/MEDIUM: compression: correctly report zlib_mem

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2015-01-04 18:21:07 +01:00
Thomas Heil
9912b6cbff haproxy: update to version 1.9 patch 02
- BUILD: fix "make install" to support spaces in the install dirs
 - BUG/MEDIUM: checks: fix conflicts between agent checks and ssl healthchecks
 - BUG/MEDIUM: ssl: fix bad ssl context init can cause segfault in case of OOM.
 - BUG/MINOR: samples: fix unnecessary memcopy converting binary to string.
 - BUG/MEDIUM: connection: sanitize PPv2 header length before parsing address information
 - BUG/MEDIUM: pattern: don't load more than once a pattern list.
 - BUG/MEDIUM: ssl: force a full GC in case of memory shortage
 - BUG/MINOR: config: don't inherit the default balance algorithm in frontends
 - BUG/MAJOR: frontend: initialize capture pointers earlier
 - BUG/MINOR: stats: correctly set the request/response analysers
 - DOC: fix typo in the body parser documentation for msg.sov
 - BUG/MINOR: peers: the buffer size is global.tune.bufsize, not trash.size
 - MINOR: sample: add a few basic internal fetches (nbproc, proc, stopping)
 - BUG/MAJOR: sessions: unlink session from list on out of memory
 - BUG/MEDIUM: patterns: previous fix was incomplete
 - BUG/MEDIUM: payload: ensure that a request channel is available

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-12-05 13:02:19 +01:00
Thomas Heil
c950f48e7a haproxy: patches from upstream
- [PATCH 1/6] BUILD: fix "make install" to support spaces in the
 - [PATCH 2/6] BUG/MEDIUM: ssl: fix bad ssl context init can cause
 - [PATCH 3/6] BUG/MEDIUM: ssl: force a full GC in case of memory
 - [PATCH 4/6] BUG/MEDIUM: checks: fix conflicts between agent checks
 - [PATCH 5/6] BUG/MINOR: config: don't inherit the default balance
 - [PATCH 6/6] BUG/MAJOR: frontend: initialize capture pointers earlier

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-11-20 14:29:40 +01:00
Thomas Heil
4846a203bb haproxy: bump to version 1.5.8
Released version 1.5.8 with the following main changes :
 - BUG/MAJOR: buffer: check the space left is enough or not
   when input data in a buffer is wrapped
 - BUG/BUILD: revert accidental change in the
   makefile from latest SSL fix

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-11-05 22:04:57 +01:00
Thomas Heil
0e45b40fb5 haproxy: patches from upstream
-[PATCH 1/2] BUG/MEDIUM: systemd: set KillMode to 'mixed'
 -[PATCH 2/2] BUG/MEDIUM: config: avoid skipping disabled proxies

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-10-14 23:33:27 +02:00
Thomas Heil
f42d4f63ee haproxy: maintenance release to fix no critical bugs
- bump to version 1.5.5

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-10-08 23:28:24 +02:00
Thomas Heil
a6a3037fbd haproxy: fixes from upstream
- [PATCH 15/20] BUG/MEDIUM: remove debugging code from systemd-wrapper
 - [PATCH 16/20] BUG/MEDIUM: http: adjust close mode when switching to
 - [PATCH 17/20] BUG/MINOR: config: don't propagate process binding on
 - [PATCH 18/20] BUG/MEDIUM: check: rule-less tcp-check must detect
 - [PATCH 19/20] BUG/MINOR: tcp-check: report the correct failed step in
 - [PATCH 20/20] BUG/MINOR: config: don't propagate process binding for

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-10-06 16:28:36 +02:00
Thomas Heil
d613e1e94e haproxy: remove unnecessary parts in Makefile
- remove ADDLIB
 - remove -lcrypt which was -lcrypto

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-09-23 11:08:51 +02:00
Thomas Heil
2e071aeaa8 haproxy: add nossl variant
According to Issue #342 here is a proposal to add a nossl variant to
that builts haproxy without ssl

Add pending patch from upstream
 - [PATCH 14/14] MEDIUM: systemd-wrapper: support multiple executable

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-09-23 10:45:03 +02:00
Thomas Heil
85c47b0630 haproxy: patches from upstream
- [PATCH 01/13] DOC: clearly state that the "show sess" output format
- [PATCH 02/13] MINOR: stats: fix minor typo fix in
- [PATCH 03/13] MEDIUM: Improve signal handling in systemd wrapper.
- [PATCH 04/13] MINOR: Also accept SIGHUP/SIGTERM in systemd-wrapper
- [PATCH 05/13] DOC: indicate in the doc that track-sc* can wait if
- [PATCH 06/13] MEDIUM: http: enable header manipulation for 101
- [PATCH 07/13] BUG/MEDIUM: config: propagate frontend to backend
- [PATCH 08/13] MEDIUM: config: properly propagate process binding
- [PATCH 09/13] MEDIUM: config: make the frontends automatically bind
- [PATCH 10/13] MEDIUM: config: compute the exact bind-process before
- [PATCH 11/13] MEDIUM: config: only warn if stats are attached to
- [PATCH 12/13] MEDIUM: config: report it when tcp-request rules are
- [PATCH 13/13] MINOR: config: detect the case where a tcp-request

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-09-17 12:13:12 +02:00
Thomas Heil
fbe4697b49 haproxy: new release 1.5.4 that fixes recent cve
- BUG: config: error in http-response replace-header number of arguments
    - BUG/MINOR: Fix search for -p argument in systemd wrapper.
    - BUG/MEDIUM: auth: fix segfault with http-auth and a configuration with an unknown encryption algorithm
    - BUG/MEDIUM: config: userlists should ensure that encrypted passwords are supported
    - MEDIUM: connection: add new bit in Proxy Protocol V2
    - BUG/MINOR: server: move the directive #endif to the end of file
    - BUG/MEDIUM: http: tarpit timeout is reset
    - BUG/MAJOR: tcp: fix a possible busy spinning loop in content track-sc*
    - BUG/MEDIUM: http: fix inverted condition in pat_match_meth()
    - BUG/MEDIUM: http: fix improper parsing of HTTP methods for use with ACLs
    - BUG/MINOR: pattern: remove useless allocation of unused trash in pat_parse_reg()
    - BUG/MEDIUM: acl: correctly compute the output type when a converter is used
    - CLEANUP: acl: cleanup some of the redundancy and spaghetti after last fix
    - BUG/CRITICAL: http: don't update msg->sov once data start to leave the buffer

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-09-03 15:37:24 +02:00
Thomas Heil
7c167bfd16 haproxy: patches from upstream
- [PATCH 5/6] BUG/MEDIUM: http: tarpit timeout is reset
- [PATCH 6/6] MEDIUM: connection: add new bit in Proxy Protocol V2

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-08-24 20:46:00 +02:00
Thomas Heil
4eec42a248 haproxy: fix from upstream
[PATCH 4/4] BUG: config: error in http-response replace-header number

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-08-11 17:10:30 +02:00
Thomas Heil
08e97960c7 haproxy: bump to version 1.5.3
- upgrade to 1.5.3
 - [PATCH 1/3] BUG/MINOR: server: move the directive #endif to the end
 - [PATCH 2/3] BUG/MINOR: Fix search for -p argument in systemd wrapper.
 - [PATCH 3/3] BUG/MAJOR: tcp: fix a possible busy spinning loop in

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-30 23:39:29 +02:00
Thomas Heil
bbfeac7e06 haproxy: fixes from upstream
[PATCH 6/6] BUG/MEDIUM: connection: fix proxy v2 header again!

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-21 17:57:31 +02:00
Thomas Heil
6785138bca haproxy: fixes from upstream
[PATCH 4/5] BUG/MINOR: http: base32+src should use the big endian
[PATCH 5/5] BUG/MEDIUM: connection: fix memory corruption when

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-18 14:58:29 +02:00
Thomas Heil
d49fd62acd haproxy: fixes from upstream
[PATCH 3/3] BUG/MEDIUM: ssl: Fix a memory leak in DHE key exchange

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-15 17:41:01 +02:00
Thomas Heil
48438302f5 haproxy: bump to version 1.5.2
- [RELEASE] Released version 1.5.2
 - [PATCH 1/2] DOC: mention that Squid correctly responds 400 to PPv2
 - [PATCH 2/2] DOC: fix typo in Unix Socket commands

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-14 17:02:53 +02:00
Thomas Heil
10d9b68c49 haproxy: fixes from upstream
- [PATCH 22/25] DOC: minor fix on {sc,src}_kbytes_{in,out}
 - [PATCH 23/25] DOC: fix alphabetical sort of converters
 - [PATCH 24/25] BUG/MAJOR: http: correctly rewind the request body
 - [PATCH 25/25] DOC: remove references to CPU=native in the README

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-12 13:45:36 +02:00
Thomas Heil
0661fbcf90 haproxy: fixes from upstream
this patch series mainly fixes a lot of reported issues in conjuction with
abstract socktet handling, improved the docs about the stats

 - [PATCH 13/21] BUILD: http: fix isdigit & isspace warnings on Solaris
 - [PATCH 14/21] BUG/MINOR: listener: set the listener's fd to -1 after
 - [PATCH 15/21] BUG/MEDIUM: unix: failed abstract socket binding is
 - [PATCH 16/21] MEDIUM: listener: implement a per-protocol pause()
 - [PATCH 17/21] MEDIUM: listener: support rebinding during resume()
 - [PATCH 18/21] BUG/MEDIUM: unix: completely unbind abstract sockets
 - [PATCH 19/21] DOC: explicitly mention the limits of abstract
 - [PATCH 20/21] DOC: expand the docs for the provided stats.
 - [PATCH 21/21] BUG/MEDIUM: backend: Update hash to use unsigned int

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-10 13:51:27 +02:00
Thomas Heil
4a3440a8c3 haproxy: fixes from upstream
- [PATCH 10/12] MINOR: stats: fix minor typo in HTML page
 - [PATCH 11/12] BUG/MEDIUM: unix: do not unlink() abstract namespace
 - [PATCH 12/12] DOC: provide an example of how to use ssl_c_sha1

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-07-06 20:34:33 +02:00
Thomas Heil
ece8d3b51f haproxy: patches from upstream
- [PATCH 7/9] BUILD: remove TODO from the spec file and add READM
 - [PATCH 8/9] MINOR: log: make MAX_SYSLOG_LEN overridable at build time
 - [PATCH 9/9] MEDIUM: log: support a user-configurable max log line
    length

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-30 23:44:43 +02:00
Thomas Heil
2d9af2967c haproxy: patches from upstream (ssl,counter,stick-table, track)
- BUG/MINOR: ssl: Fix external function in order not to return a pointer
   on an internal trash buffer
 - BUG/MINOR: counters: do not untrack counters before logging
 - BUG/MAJOR: sample: correctly reinitialize sample fetch context before
   calling sample_process()
 - MINOR: stick-table: make stktable_fetch_key() indicate why it failed
 - BUG/MEDIUM: counters: fix track-sc* to wait on unstable contents

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-26 06:22:41 +02:00
Thomas Heil
11bf9384ed haproxy: upgrade to version 1.5.1
Bugs from 1.5.0 can cause file descriptor leak, results in the
impossibility to accept new connections after some time.

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-24 19:39:47 +02:00
Thomas Heil
58e6bd332b haproxy: upstream commit, properly initialize and count log
[PATCH 6/6] BUG/MINOR: logs: properly initialize and count log sockets

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-23 22:16:46 +02:00
Thomas Heil
7e55100146 haproxy: fix OCSP response, remove crappy client side timeout patches
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-23 18:47:36 +02:00
Thomas Heil
c7931f98b2 haproxy: fix targe avr32
The avr32 target uses a old accept4 implementation, so i disabled it for
this patform.

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-21 13:45:32 +02:00
Thomas Heil
9501ca562f haproxy: add upstream bugfix, adapt Copyright
- [PATCH] BUG/MEDIUM: Consistently use 'check' in process_chk

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-20 13:35:06 +02:00
Thomas Heil
d48626190c haproxy: upgrade haproxy to version 1.5.0
- includes support for SSL Termination, Compression Offloading, OCSP
	  Stapling support and much more

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-19 23:45:18 +02:00
Thomas Heil
db5d567e7d haproxy: import from packages, add myself as the maintainer
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2014-06-12 18:29:23 +02:00