summaryrefslogtreecommitdiff
path: root/net/haproxy
diff options
context:
space:
mode:
authormorr <morr@pkgsrc.org>2019-01-24 10:33:52 +0000
committermorr <morr@pkgsrc.org>2019-01-24 10:33:52 +0000
commit446521d212881f715e22bcf4d5db34b265dc0f5e (patch)
tree1f7688073a7b44fd78227e757574e3f7814514bc /net/haproxy
parent1950ce63e4be075fc749f89fe0c3917e62c20026 (diff)
downloadpkgsrc-446521d212881f715e22bcf4d5db34b265dc0f5e.tar.gz
Update to version 1.8.17.
Changelog: 2019/01/08 : 1.8.17 - BUG/MAJOR: stream-int: Update the stream expiration date in stream_int_notify() - MINOR: mux-h2: only increase the connection window with the first update - BUG/MEDIUM: mux-h2: mark that we have too many CS once we have more than the max - BUG/MEDIUM: server: Also copy "check-sni" for server templates. - MINOR: lb: allow redispatch when using consistent hash - MINOR: stream/cli: fix the location of the waiting flag in "show sess all" - MINOR: stream/cli: report more info about the HTTP messages on "show sess all" - BUG/MEDIUM: cli: make "show sess" really thread-safe - BUG/MINOR: lua: Return an error if a legacy HTTP applet doesn't send anything - BUG/MINOR: lua: bad args are returned for Lua actions - BUG/MEDIUM: lua: dead lock when Lua tasks are trigerred - BUG/CRITICAL: mux-h2: re-check the frame length when PRIORITY is used 2018/12/21 : 1.8.16 - BUG/MINOR: logs: leave startup-logs global and not per-thread - BUG/MEDIUM: dns: Don't prevent reading the last byte of the payload in dns_validate_response() - BUG/MEDIUM: dns: overflowed dns name start position causing invalid dns error 2018/12/13 : 1.8.15 - MINOR: threads: Make sure threads_sync_pipe is initialized before using it. - DOC: clarify force-private-cache is an option - BUG/MINOR: connection: avoid null pointer dereference in send-proxy-v2 - BUG/MINOR: backend: check that the mux installed properly - BUG/MEDIUM: buffers: Make sure we don't wrap in buffer_insert_line2/replace2. - MEDIUM: ssl: add support for ciphersuites option for TLSv1.3 - BUG/MEDIUM: Cur/CumSslConns counters not threadsafe. - BUG/MINOR: checks: queues null-deref - BUG/MEDIUM: mworker: segfault receiving SIGUSR1 followed by SIGTERM. - BUG/MEDIUM: stream: don't crash on out-of-memory - BUILD: ssl: fix null-deref warning in ssl_fc_cipherlist_str sample fetch - BUILD: ssl: fix another null-deref warning in ssl_sock_switchctx_cbk() - BUILD: stick-table: make sure not to fail on task_new() during initialization - BUILD: peers: check allocation error during peers_init_sync() - DOC: Fix a few typos - BUG/MEDIUM: threads: fix thread_release() at the end of the rendez-vous point - BUG/MEDIUM: threads: make sure threads_want_sync is marked volatile - BUILD: compiler: add a new statement "__unreachable()" - MINOR: lua: all functions calling lua_yieldk() may return - BUILD: lua: silence some compiler warnings about potential null derefs (#2) - BUILD: lua: silence some compiler warnings after WILL_LJMP - CLEANUP: stick-tables: Remove unneeded double (()) around conditional clause - BUILD: Makefile: add a "make opts" target to simply show the build options - BUILD: Makefile: speed up compiler options detection - BUILD: Makefile: silence an option conflict warning with clang - MINOR: server: Use memcpy() instead of strncpy(). - MINOR: cfgparse: Write 130 as 128 as 0x82 and 0x80. - MINOR: peers: use defines instead of enums to appease clang. - DOC: fix reference to map files in MAINTAINERS - BUILD: compiler: rename __unreachable() to my_unreachable() - BUG/MEDIUM: pools: Fix the usage of mmap()) with DEBUG_UAF. - BUG/MEDIUM: h2: Close connection if no stream is left an GOAWAY was sent. - BUILD: Makefile: add the new ERR variable to force -Werror - BUG/MINOR: cache: Crashes with "total-max-size" > 2047(MB). - BUG/MINOR: cache: Wrong usage of shctx_init(). - BUG/MINOR: ssl: Wrong usage of shctx_init(). - DOC: cache: Missing information about "total-max-size" - BUG/MINOR: only mark connections private if NTLM is detected - BUG/MINOR: only auto-prefer last server if lb-alg is non-deterministic - BUG/MAJOR: http: http_txn_get_path() may deference an inexisting buffer - BUG/MEDIUM: auth/threads: use of crypt() is not thread-safe - BUG/MINOR: config: better detect the presence of the h2 pattern in npn/alpn - BUG/MEDIUM: Make sure stksess is properly aligned. - BUG/MINOR: config: Copy default error messages when parsing of a backend starts - BUG/MEDIUM: hpack: fix encoding of "accept-ranges" field - BUG/MINOR: ssl: ssl_sock_parse_clienthello ignores session id - BUG/MINOR: cfgparse: Fix transition between 2 sections with the same name - BUG/MINOR: cfgparse: Fix the call to post parser of the last sections parsed - BUG/MINOR: lb-map: fix unprotected update to server's score - BUG/MEDIUM: sample: Don't treat SMP_T_METH as SMP_T_STR. - BUG/MINOR: hpack: fix off-by-one in header name encoding length calculation - BUG/MINOR: mux-h2: refrain from muxing during the preface - BUG/MINOR: mux-h2: advertise a larger connection window size - BUILD: compression: fix build error with DEFAULT_MAXZLIBMEM - BUILD: threads: fix minor build warnings when threads are disabled - MINOR: stats: report the number of active jobs and listeners in "show info" - MINOR: servers: Free [idle|safe|priv]_conns on exit. - DOC: clarify that check-sni needs an argument. - DOC: refer to check-sni in the documentation of sni - BUG: dns: Prevent stack-exhaustion via recursion loop in dns_read_name - BUG: dns: Prevent out-of-bounds read in dns_read_name() - BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response() - BUG: dns: Fix out-of-bounds read via signedness error in dns_validate_dns_response() - BUG: dns: Fix off-by-one write in dns_validate_dns_response() - DOC: Update configuration doc about the maximum number of stick counters. - DOC: restore note about "independant" typo - DOC: Fix typos in README and CONTRIBUTING - DOC: Fix typos in different subsections of the documentation - DOC: fix a few typos in the documentation
Diffstat (limited to 'net/haproxy')
-rw-r--r--net/haproxy/Makefile4
-rw-r--r--net/haproxy/distinfo10
2 files changed, 7 insertions, 7 deletions
diff --git a/net/haproxy/Makefile b/net/haproxy/Makefile
index 5f817e89bc5..5606c9089ae 100644
--- a/net/haproxy/Makefile
+++ b/net/haproxy/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.44 2018/11/29 09:02:37 morr Exp $
+# $NetBSD: Makefile,v 1.45 2019/01/24 10:33:52 morr Exp $
-DISTNAME= haproxy-1.8.14
+DISTNAME= haproxy-1.8.17
CATEGORIES= net www
MASTER_SITES= http://www.haproxy.org/download/${PKGVERSION_NOREV:R}/src/
diff --git a/net/haproxy/distinfo b/net/haproxy/distinfo
index e654b65a72a..872c3711cc9 100644
--- a/net/haproxy/distinfo
+++ b/net/haproxy/distinfo
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.39 2018/11/29 09:02:37 morr Exp $
+$NetBSD: distinfo,v 1.40 2019/01/24 10:33:52 morr Exp $
-SHA1 (haproxy-1.8.14.tar.gz) = 589c6f933d73e8d6ba5307c8304cafb80e968481
-RMD160 (haproxy-1.8.14.tar.gz) = e8701ede3f33eaa03d857ef0cd70f49b07755a73
-SHA512 (haproxy-1.8.14.tar.gz) = 17727c19e0439a2b45be2ec583cd2ce30d1af2bf48bd3cdb2dce1eff670ab8b24d93eaa7bebb410947528d1ad88c3856495e498fff518620efbd32b9adf4eb66
-Size (haproxy-1.8.14.tar.gz) = 2070813 bytes
+SHA1 (haproxy-1.8.17.tar.gz) = 066878e2e443473d0cb9f8e74c28be822ec1e4be
+RMD160 (haproxy-1.8.17.tar.gz) = c8e381f552ed51636ad2917a2cd2c1e58b662e73
+SHA512 (haproxy-1.8.17.tar.gz) = 0887d5d84c2cce9355fae032ba82e4b7b94c89d3053f209046a555101b5750c10b51feb38fd14245f806fb4f50ec1dcdf2b23b4f80578abd4a27693fc29b91b1
+Size (haproxy-1.8.17.tar.gz) = 2077525 bytes
SHA1 (patch-Makefile) = 30a778c6d83270ef672d14d6ae3fe7a1126fea53
SHA1 (patch-src_cli.c) = 4bc5cf0116df121ac4c3c38b8f962c3a62d536e5
SHA1 (patch-src_haproxy.c) = badb172013541087d84f03726ea928c6f5634dc3