Commit graph

88 commits

Author SHA1 Message Date
Christian Lachner
19623a4ef9 haproxy: Update HAProxy to v2.0.10
- Update haproxy download URL and hash
- Add new patches (see https://www.haproxy.org/bugs/bugs-2.0.10.html)
- This fixes CVE-2019-19330 (See: https://nvd.nist.gov/vuln/detail/CVE-2019-19330)

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-11-29 12:25:21 +01:00
Christian Lachner
03a7a01f4e haproxy: Update HAProxy to v2.0.9
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-11-17 10:24:27 +01:00
Christian Lachner
d1a86e9f53 haproxy: Update patches for HAProxy v2.0.8
- Add new patches (see https://www.haproxy.org/bugs/bugs-2.0.8.html)

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-11-02 12:11:07 +01:00
Christian Lachner
38a4100d04 haproxy: Update HAProxy to v2.0.8
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-10-23 14:48:09 +02:00
Christian Lachner
5d59ddd923 haproxy: Update HAProxy to v2.0.7
- Update haproxy download URL and hash
- Add new patches (see https://www.haproxy.org/bugs/bugs-2.0.7.html)

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-10-05 13:59:57 +02:00
Christian Lachner
c44b070804 haproxy: Update HAProxy to v2.0.6
- Update haproxy download URL and hash
- Add new patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-09-25 11:36:07 +02:00
Christian Lachner
33bc3d877b haproxy: Update HAProxy to v2.0.5
- Update haproxy download URL and hash
- Add new patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-08-30 07:21:51 +02:00
Christian Lachner
fe2ed1c398 haproxy: Update all patches for HAProxy v2.0.3
- Add new patches (see https://www.haproxy.org/bugs/bugs-2.0.3.html)
- Raise PKG_RELEASE to 2

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-08-05 09:24:49 +02:00
Christian Lachner
e7faabcf11 haproxy: Update HAProxy to v2.0.3
- Update haproxy download URL and hash
- Add new patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-07-24 17:54:07 +08:00
Christian Lachner
92b5742300 haproxy: Update HAProxy to v2.0.1
- Update haproxy download URL and hash
- Add new patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-07-01 20:45:28 +02:00
Rosen Penev
49382922f8 haproxy: Fix compilation without deprecated OpenSSL APIs
It seems there is a mistake in the version I sent upstream.

Cleaned up Makefile for consistency between packages.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-06-27 00:31:37 -07:00
Christian Lachner
f8268e442c haproxy: Fix issue #9294 & update patches
The arc700 target (and probably others) uses uclibc as it's c-library. However,
uClibc's libcrypt seems to not support the crypt_data struct which broke
the build. This fix adds a new build-target to haproxy which does not use
libcrypt. Summing up, this commit does:
- Add support for uclibc to haproxy with libcrypt disabled
- Add detection of c-library to configure the correct build-target
- Silence additional warnings
- Update patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-06-23 13:39:12 +02:00
Christian Lachner
6cc24a477f haproxy: Update HAProxy to v2.0.0 (LTS)
- Update haproxy download URL and hash
- Add new patches
- Add several CFLAGS (derived from haproxy Makefile) to make the build work with v1.9+
- Update default configuration
- Add check-command (for config) to init-script
- Add prometheus-service from contribs by default

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-06-21 09:09:11 +02:00
Christian Lachner
b4d67e3484 haproxy: Update HAProxy to v1.8.20
- Update haproxy download URL and hash
- Add new patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-05-02 07:58:58 +02:00
Christian Lachner
b7d6096f54 haproxy: Update all patches for HAProxy v1.8.19
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.19.html)
- Raise PKG_RELEASE to 4

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-04-26 08:56:27 +02:00
Christian Lachner
5cdfacc122 haproxy: Update all patches for HAProxy v1.8.19
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.19.html)
- Raise PKG_RELEASE to 3

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-04-01 10:23:00 +02:00
Christian Lachner
b8d3db6fec haproxy: Update HAProxy to v1.8.19
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-02-12 08:58:53 +01:00
Christian Lachner
512411108c haproxy: Update all patches for HAProxy v1.8.17
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.17.html)
- Raise PKG_RELEASE to 2
- Prefix patches with 3-digit numbers instead of 4-digit numbers

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-01-31 13:59:35 +01:00
Rosen Penev
0bd1f7a9a9 haproxy: Update deprecated API patch
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2018-12-17 22:13:46 +08:00
Christian Lachner
a854729155 haproxy: Update HAProxy to v1.8.15
- Update haproxy download URL and hash
- Removed all obsolete patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-12-13 10:59:51 +01:00
Christian Lachner
9c8b1e38b0 haproxy: Update all patches for HAProxy v1.8.14
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.14.html)
- Raise PKG_RELEASE to 5
- Improve version-handling

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-12-04 10:56:40 +01:00
Christian Lachner
ca39a1b787 haproxy: Update all patches for HAProxy v1.8.14
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.14.html)
- Raise PKG_RELEASE to 4

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-11-02 10:35:38 +01:00
Rosen Penev
5c950bd726 haproxy: Remove unnecessary OpenSSL depends
All of these are either not needed or not valid.

Added a patch to remove the OPENSSL_WITH_DEPRECATED dependency.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2018-10-30 14:20:55 -07:00
Christian Lachner
6e309cd99e haproxy: Update all patches for HAProxy v1.8.14
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.14.html)
- Raise PKG_RELEASE to 2

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-10-17 09:18:37 +02:00
Christian Lachner
60138d90b8 haproxy: Update HAProxy to v1.8.14
- Update haproxy download URL and hash
- Removed all obsolete patches
- This fixes CVE-2018-14645 (See: https://nvd.nist.gov/vuln/detail/CVE-2018-14645)

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-09-22 16:54:44 +02:00
Christian Lachner
2cc76214e1 haproxy: Update all patches for HAProxy v1.8.13
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.13.html)
- Raise PKG_RELEASE to 2

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-08-25 18:51:06 +02:00
Christian Lachner
4ae1c3307a haproxy: Update HAProxy to v1.8.9
- Update haproxy download URL and hash
- Removed all obsolete patches
- Added logic to Makefile to only append the patch-version to the HA-Proxy version if we actually applied any patches (PKG_RELEASE!=00)

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-05-19 10:14:50 +02:00
Christian Lachner
567135a239 haproxy: Update all patches for HAProxy v1.8.8+5
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.8.html)
- Raise patch-level to 05

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-05-18 14:01:18 +02:00
Christian Lachner
e5a860634b haproxy: Update all patches for HAProxy v1.8.8
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.8.html)
- Raise patch-level to 04

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-05-16 14:44:53 +02:00
Christian Lachner
842901b4b1 haproxy: Update all patches for HAProxy v1.8.8
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.8.html)
- Raise patch-level to 03

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-05-10 20:37:15 +02:00
Christian Lachner
c866db0911 haproxy: Update all patches for HAProxy v1.8.8
- Add new patches (see https://www.haproxy.org/bugs/bugs-1.8.8.html)
- Raise patch-level to 02

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-04-29 10:04:49 +02:00
Christian Lachner
c8095562db haproxy: Update HAProxy to v1.8.6
- Update haproxy download URL and hash
- Remove all already included patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-04-05 15:56:37 +02:00
Christian Lachner
17d73b0dc1 haproxy: Update MEDIUM+ patches for HAProxy v1.8.5
- Add new MEDIUM+ patches (see https://www.haproxy.org/bugs/bugs-1.8.5.html)
- Raise patch-level to 02

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-03-30 11:10:46 +02:00
Christian Lachner
3bcc1fb602 haproxy: Update HAProxy to v1.8.5
- Update haproxy download URL and hash
- Remove all already included patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-03-23 20:09:30 +01:00
Christian Lachner
88fdeb5085 haproxy: Update MEDIUM+ patches for HAProxy v1.8.4
- Add new MEDIUM+ patches (see https://www.haproxy.org/bugs/bugs-1.8.4.html)
- Raise patch-level to 02

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-03-16 11:26:28 +01:00
Christian Lachner
02deb12f70 haproxy: Update HAProxy to v1.8.4 (+patches)
- Update haproxy download URL and hash
- Update the haproxy homepage
- Add libatomic to the dependencies as 1.8 needs it
- Make USE_REGPARM an x86-only option as this fixes many warnings and does not do much on non-x86 platforms
- Add USE_GETADDRINFO=1 to use getaddrinfo() to resolve IPv6 host names
- Add USE_TFO=1 to enable TCP fast open
- Unbreak CFLAGS, LD and LDFLAGS by adding the missing backslash after $(ADDON)
- Unbreak IGNOREGIT=1 option (typo)
- Rework LDFLAGS and add libatomic
- Add MEDIUM+ patches (see https://www.haproxy.org/bugs/bugs-1.8.4.html)

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2018-03-04 12:42:10 +01:00
Thomas Heil
1feb0bae0f haproxy update to 1.7.9 and pending patches
- update lua to 5.3.4

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-10-15 17:25:38 +02:00
Thomas Heil
73140ba8b2 haproxy: update to 1.7.8 and pending patches
- fixes reload issue with hanging process

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-08-17 01:07:49 +02:00
Thomas Heil
bb33a56225 package: haproxy bump to latest stable 1.7.4
[RELEASE] Released version 1.7.4

    Released version 1.7.4 with the following main changes :
        - MINOR: config: warn when some HTTP rules are used in a TCP proxy
        - BUG/MINOR: spoe: Fix soft stop handler using a specific id for spoe filters
        - BUG/MINOR: spoe: Fix parsing of arguments in spoe-message section
        - BUG/MEDIUM: ssl: Clear OpenSSL error stack after trying to parse OCSP file
        - BUG/MEDIUM: cli: Prevent double free in CLI ACL lookup
        - BUG/MINOR: Fix "get map <map> <value>" CLI command
        - BUG/MAJOR: connection: update CO_FL_CONNECTED before calling the data layer
        - BUG/MEDIUM: ssl: switchctx should not return SSL_TLSEXT_ERR_ALERT_WARNING
        - BUG/MINOR: checks: attempt clean shutw for SSL check
        - CONTRIB: tcploop: add limits.h to fix build issue with some compilers
        - CONTRIB: tcploop: make it build on FreeBSD
        - CONTRIB: tcploop: fix time format to silence build warnings
        - CONTRIB: tcploop: report action 'K' (kill) in usage message
        - CONTRIB: tcploop: fix connect's address length
        - CONTRIB: tcploop: use the trash instead of NULL for recv()
        - BUG/MEDIUM: listener: do not try to rebind another process' socket
        - BUG/MEDIUM: filters: Fix channels synchronization in flt_end_analyze
        - BUG/MAJOR: stream-int: do not depend on connection flags to detect connection
        - BUG/MEDIUM: connection: ensure to always report the end of handshakes
        - BUG: payload: fix payload not retrieving arbitrary lengths
        - BUG/MAJOR: http: fix typo in http_apply_redirect_rule
        - MINOR: doc: 2.4. Examples should be 2.5. Examples
        - BUG/MEDIUM: stream: fix client-fin/server-fin handling
        - MINOR: fd: add a new flag HAP_POLL_F_RDHUP to struct poller
        - BUG/MINOR: raw_sock: always perfom the last recv if RDHUP is not available
        - DOC/MINOR: Fix typos in proxy protocol doc
        - DOC: Protocol doc: add checksum, TLV type ranges
        - DOC: Protocol doc: add SSL TLVs, rename CHECKSUM
        - DOC: Protocol doc: add noop TLV
        - MEDIUM: global: add a 'hard-stop-after' option to cap the soft-stop time
        - BUG/MINOR: cfgparse: loop in tracked servers lists not detected by check_config_validity().
        - MINOR: server: irrelevant error message with 'default-server' config file keyword.
        - MINOR: doc: fix use-server example (imap vs mail)
        - BUG/MEDIUM: tcp: don't require privileges to bind to device
        - BUILD: make the release script use shortlog for the final changelog
        - BUILD: scripts: fix typo in announce-release error message

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-03-28 11:42:16 +02:00
heil
0f73eff96a package: haproxy
- bump to stable 1.7.3 and pending patches from upstream

Signed-off-by: heil <heil@terminal-consulting.de>
2017-03-16 22:35:59 +01:00
heil
0424c1f723 haproxy: bump to version 1.7.2
Released version 1.7.2 with the following main changes :

  - BUG/MEDIUM: lua: In some case, the return of sample-fetches is ignored (2)
  - SCRIPTS: git-show-backports: fix a harmless typo
  - SCRIPTS: git-show-backports: add -H to use the hash of the commit message
  - BUG/MINOR: stream-int: automatically release SI_FL_WAIT_DATA on SHUTW_NOW
  - DOC: lua: documentation about time parser functions
  - DOC: lua: section declared twice
  - BUG/MINOR: lua/cli: bad error message
  - DOC: fix small typo in fe_id (backend instead of frontend)
  - BUG/MINOR: Fix the sending function in Lua's cosocket
  - BUG/MINOR: lua: memory leak executing tasks
  - BUG/MINOR: lua: bad return code
  - BUG/MEDIUM: ssl: properly reset the reused_sess during a forced handshake
  - BUG/MEDIUM: ssl: avoid double free when releasing bind_confs
  - BUG/MINOR: stats: fix be/sessions/current out in typed stats
  - BUG/MINOR: backend: nbsrv() should return 0 if backend is disabled
  - BUG/MEDIUM: ssl: for a handshake when server-side SNI changes
  - BUG/MINOR: systemd: potential zombie processes
  - DOC: Add timings events schemas
  - BUILD: lua: build failed on FreeBSD.
  - BUG/MINOR: option prefer-last-server must be ignored in some case
  - MINOR: stats: Support "select all" for backend actions
  - BUG/MINOR: sample-fetches/stick-tables: bad type for the sample fetches sc*_get_gpt0
  - BUG/MAJOR: channel: Fix the definition order of channel analyzers
  - BUG/MINOR: http: report real parser state in error captures
  - BUILD: scripts: automatically update the branch in version.h when releasing
  - BUG/MAJOR: http: fix risk of getting invalid reports of bad requests
  - MINOR: http: custom status reason.
  - MINOR: connection: add sample fetch "fc_rcvd_proxy"
  - BUG/MINOR: config: emit a warning if http-reuse is enabled with incompatible options
  - BUG/MINOR: tools: fix off-by-one in port size check
  - BUG/MEDIUM: server: consider AF_UNSPEC as a valid address family
  - MEDIUM: server: split the address and the port into two different fields
  - MINOR: tools: make str2sa_range() return the port in a separate argument
  - MINOR: server: take the destination port from the port field, not the addr
  - MEDIUM: server: disable protocol validations when the server doesn't resolve
  - BUG/MEDIUM: tools: do not force an unresolved address to AF_INET:0.0.0.0
  - BUG/MINOR: ssl: EVP_PKEY must be freed after X509_get_pubkey usage
  - MINOR: proto_http.c 502 error txt typo.
  - DOC: add deprecation notice to "block"
  - BUG/MINOR: Reset errno variable before calling strtol(3)

Signed-off-by: heil <heil@terminal-consulting.de>
2017-01-15 21:26:00 +01:00
heil
afda05e417 haproxy: bump to 1.7.1-19
- fix wrong ncurses depency
 - integrate patches from mainline

Signed-off-by: heil <heil@terminal-consulting.de>
2016-12-27 00:24:38 +01:00
heil
0f9bf14e66 haproxy: remove old patches
- remove old patches from 1.6
 - fix download url for 1.7
 - fixes #3687

Signed-off-by: heil <heil@terminal-consulting.de>
2016-12-22 10:40:11 +01:00
heil
3ad569d645 haproxy: integrate patches from mainline and fix depencies to OPENSSL_..
- haproxy 1.6 needs OPENSSL_WITH_DEPRECATED, OPENSSL_WITH_EC NPM ...
 - fix buildflags for lua, so its not build with the host compiler
 - fix duplication of defines

Signed-off-by: heil <heil@terminal-consulting.de>
2016-11-13 16:25:13 +01:00
heil
079d911cfb haproxy: bump to version 1.6.9 mainline and pending patches
Signed-off-by: heil <heil@terminal-consulting.de>
2016-11-09 23:42:43 +01:00
heil
8c5bd7ae5e haproxy: bump to version 1.5.18 and pending patches
Signed-off-by: heil <heil@terminal-consulting.de>
2016-06-21 01:08:28 +02:00
heil
9c394b4c1b haproxy: bump to version 1.5.16
[RELEASE] Released version 1.5.16

  Released version 1.5.16 with the following main changes :
    - BUG/BUILD: replace haproxy-systemd-wrapper with $(EXTRA) in install-bin.
    - BUG/MINOR: acl: don't use record layer in req_ssl_ver
    - BUG: http: do not abort keep-alive connections on server timeout
    - BUG/MEDIUM: http: switch the request channel to no-delay once done.
    - MINOR: config: extend the default max hostname length to 64 and beyond
    - BUG/MEDIUM: http: don't enable auto-close on the response side
    - BUG/MEDIUM: stream: fix half-closed timeout handling
    - BUG/MEDIUM: cli: changing compression rate-limiting must require admin level
    - BUILD: freebsd: double declaration
    - BUG/MEDIUM: sample: urlp can't match an empty value
    - BUG/MEDIUM: peers: table entries learned from a remote are pushed to others after a random delay.
    - BUG/MEDIUM: peers: old stick table updates could be repushed.
    - CLEANUP: haproxy: using _GNU_SOURCE instead of __USE_GNU macro.
    - BUG/MINOR: chunk: make chunk_dup() always check and set dst->size
    - MINOR: chunks: ensure that chunk_strcpy() adds a trailing zero
    - MINOR: chunks: add chunk_strcat() and chunk_newstr()
    - MINOR: chunk: make chunk_initstr() take a const string
    - BUG/MEDIUM: config: Adding validation to stick-table expire value.
    - BUG/MEDIUM: sample: http_date() doesn't provide the right day of the week
    - BUG/MEDIUM: channel: fix miscalculation of available buffer space.
    - BUG/MINOR: stream: don't force retries if the server is DOWN
    - MINOR: unix: don't mention free ports on EAGAIN
    - BUG/CLEANUP: CLI: report the proper field states in "show sess"
    - MINOR: stats: send content-length with the redirect to allow keep-alive
    - BUG: stream_interface: Reuse connection even if the output channel is empty
    - DOC: remove old tunnel mode assumptions
    - DOC: add server name at rate-limit sessions example
    - BUG/MEDIUM: ssl: fix off-by-one in ALPN list allocation
    - BUG/MEDIUM: ssl: fix off-by-one in NPN list allocation
    - BUG/MEDIUM: stats: stats bind-process doesn't propagate the process mask correctly
    - BUG/MINOR: http: Be sure to process all the data received from a server
    - BUG/MEDIUM: chunks: always reject negative-length chunks
    - BUG/MINOR: systemd: ensure we don't miss signals
    - BUG/MINOR: systemd: report the correct signal in debug message output
    - BUG/MINOR: systemd: propagate the correct signal to haproxy
    - MINOR: systemd: ensure a reload doesn't mask a stop
    - CLEANUP: stats: Avoid computation with uninitialized bits.
    - CLEANUP: pattern: Ignore unknown samples in pat_match_ip().
    - CLEANUP: map: Avoid memory leak in out-of-memory condition.
    - BUG/MINOR: tcpcheck: conf parsing error when no port configured on server and last rule is a CONNECT with no port
    - BUG/MINOR: tcpcheck: fix incorrect list usage resulting in failure to load certain configs
    - MINOR: cfgparse: warn when uid parameter is not a number
    - MINOR: cfgparse: warn when gid parameter is not a number
    - BUG/MINOR: standard: Avoid free of non-allocated pointer
    - BUG/MINOR: pattern: Avoid memory leak on out-of-memory condition
    - CLEANUP: http: fix a build warning introduced by a recent fix
    - BUG/MINOR: log: GMT offset not updated when entering/leaving DST

Signed-off-by: heil <heil@terminal-consulting.de>
2016-03-29 13:09:27 +02:00
heil
a69ba3efe3 haproxy: add pending patches from upstream
- [PATCH 11/13] BUG/MEDIUM: peers: table entries learned from a remote
 - [PATCH 12/13] BUG/MEDIUM: peers: old stick table updates could be
 - [PATCH 13/13] CLEANUP: haproxy: using _GNU_SOURCE instead of

Signed-off-by: heil <heil@terminal-consulting.de>
2016-01-25 17:00:31 +01:00
heil
a265450e65 haproxy: bump to version 1.5.15
- integrate pending patches

Signed-off-by: heil <heil@terminal-consulting.de>
2015-12-02 12:08:32 +01:00
heil
1b9a79c04d haproxy: fixes from upstream
- [PATCH 14/16] BUG/MINOR: http: remove stupid HTTP_METH_NONE entry
 - [PATCH 15/16] BUG/MAJOR: http: don't call http_send_name_header()
 - [PATCH 16/16] BUG/MINOR: tools: make str2sa_range() report

Signed-off-by: heil <heil@terminal-consulting.de>
2015-09-09 20:49:16 +02:00