Skip to content

Commit

Permalink
Update to version 1.8.17.
Browse files Browse the repository at this point in the history
Changelog:

2019/01/08 : 1.8.17
    - BUG/MAJOR: stream-int: Update the stream expiration date in stream_int_notify()
    - MINOR: mux-h2: only increase the connection window with the first update
    - BUG/MEDIUM: mux-h2: mark that we have too many CS once we have more than the max
    - BUG/MEDIUM: server: Also copy "check-sni" for server templates.
    - MINOR: lb: allow redispatch when using consistent hash
    - MINOR: stream/cli: fix the location of the waiting flag in "show sess all"
    - MINOR: stream/cli: report more info about the HTTP messages on "show sess all"
    - BUG/MEDIUM: cli: make "show sess" really thread-safe
    - BUG/MINOR: lua: Return an error if a legacy HTTP applet doesn't send anything
    - BUG/MINOR: lua: bad args are returned for Lua actions
    - BUG/MEDIUM: lua: dead lock when Lua tasks are trigerred
    - BUG/CRITICAL: mux-h2: re-check the frame length when PRIORITY is used

2018/12/21 : 1.8.16
    - BUG/MINOR: logs: leave startup-logs global and not per-thread
    - BUG/MEDIUM: dns: Don't prevent reading the last byte of the payload in dns_validate_response()
    - BUG/MEDIUM: dns: overflowed dns name start position causing invalid dns error

2018/12/13 : 1.8.15
    - MINOR: threads: Make sure threads_sync_pipe is initialized before using it.
    - DOC: clarify force-private-cache is an option
    - BUG/MINOR: connection: avoid null pointer dereference in send-proxy-v2
    - BUG/MINOR: backend: check that the mux installed properly
    - BUG/MEDIUM: buffers: Make sure we don't wrap in buffer_insert_line2/replace2.
    - MEDIUM: ssl: add support for ciphersuites option for TLSv1.3
    - BUG/MEDIUM: Cur/CumSslConns counters not threadsafe.
    - BUG/MINOR: checks: queues null-deref
    - BUG/MEDIUM: mworker: segfault receiving SIGUSR1 followed by SIGTERM.
    - BUG/MEDIUM: stream: don't crash on out-of-memory
    - BUILD: ssl: fix null-deref warning in ssl_fc_cipherlist_str sample fetch
    - BUILD: ssl: fix another null-deref warning in ssl_sock_switchctx_cbk()
    - BUILD: stick-table: make sure not to fail on task_new() during initialization
    - BUILD: peers: check allocation error during peers_init_sync()
    - DOC: Fix a few typos
    - BUG/MEDIUM: threads: fix thread_release() at the end of the rendez-vous point
    - BUG/MEDIUM: threads: make sure threads_want_sync is marked volatile
    - BUILD: compiler: add a new statement "__unreachable()"
    - MINOR: lua: all functions calling lua_yieldk() may return
    - BUILD: lua: silence some compiler warnings about potential null derefs (#2)
    - BUILD: lua: silence some compiler warnings after WILL_LJMP
    - CLEANUP: stick-tables: Remove unneeded double (()) around conditional clause
    - BUILD: Makefile: add a "make opts" target to simply show the build options
    - BUILD: Makefile: speed up compiler options detection
    - BUILD: Makefile: silence an option conflict warning with clang
    - MINOR: server: Use memcpy() instead of strncpy().
    - MINOR: cfgparse: Write 130 as 128 as 0x82 and 0x80.
    - MINOR: peers: use defines instead of enums to appease clang.
    - DOC: fix reference to map files in MAINTAINERS
    - BUILD: compiler: rename __unreachable() to my_unreachable()
    - BUG/MEDIUM: pools: Fix the usage of mmap()) with DEBUG_UAF.
    - BUG/MEDIUM: h2: Close connection if no stream is left an GOAWAY was sent.
    - BUILD: Makefile: add the new ERR variable to force -Werror
    - BUG/MINOR: cache: Crashes with "total-max-size" > 2047(MB).
    - BUG/MINOR: cache: Wrong usage of shctx_init().
    - BUG/MINOR: ssl: Wrong usage of shctx_init().
    - DOC: cache: Missing information about "total-max-size"
    - BUG/MINOR: only mark connections private if NTLM is detected
    - BUG/MINOR: only auto-prefer last server if lb-alg is non-deterministic
    - BUG/MAJOR: http: http_txn_get_path() may deference an inexisting buffer
    - BUG/MEDIUM: auth/threads: use of crypt() is not thread-safe
    - BUG/MINOR: config: better detect the presence of the h2 pattern in npn/alpn
    - BUG/MEDIUM: Make sure stksess is properly aligned.
    - BUG/MINOR: config: Copy default error messages when parsing of a backend starts
    - BUG/MEDIUM: hpack: fix encoding of "accept-ranges" field
    - BUG/MINOR: ssl: ssl_sock_parse_clienthello ignores session id
    - BUG/MINOR: cfgparse: Fix transition between 2 sections with the same name
    - BUG/MINOR: cfgparse: Fix the call to post parser of the last sections parsed
    - BUG/MINOR: lb-map: fix unprotected update to server's score
    - BUG/MEDIUM: sample: Don't treat SMP_T_METH as SMP_T_STR.
    - BUG/MINOR: hpack: fix off-by-one in header name encoding length calculation
    - BUG/MINOR: mux-h2: refrain from muxing during the preface
    - BUG/MINOR: mux-h2: advertise a larger connection window size
    - BUILD: compression: fix build error with DEFAULT_MAXZLIBMEM
    - BUILD: threads: fix minor build warnings when threads are disabled
    - MINOR: stats: report the number of active jobs and listeners in "show info"
    - MINOR: servers: Free [idle|safe|priv]_conns on exit.
    - DOC: clarify that check-sni needs an argument.
    - DOC: refer to check-sni in the documentation of sni
    - BUG: dns: Prevent stack-exhaustion via recursion loop in dns_read_name
    - BUG: dns: Prevent out-of-bounds read in dns_read_name()
    - BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response()
    - BUG: dns: Fix out-of-bounds read via signedness error in dns_validate_dns_response()
    - BUG: dns: Fix off-by-one write in dns_validate_dns_response()
    - DOC: Update configuration doc about the maximum number of stick counters.
    - DOC: restore note about "independant" typo
    - DOC: Fix typos in README and CONTRIBUTING
    - DOC: Fix typos in different subsections of the documentation
    - DOC: fix a few typos in the documentation
  • Loading branch information
dashmoho committed Jan 24, 2019
1 parent 7238fac commit 6773467
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
4 changes: 2 additions & 2 deletions net/haproxy/Makefile
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# $NetBSD: Makefile,v 1.44 2018/11/29 09:02:37 morr Exp $
# $NetBSD: Makefile,v 1.45 2019/01/24 10:33:52 morr Exp $

DISTNAME= haproxy-1.8.14
DISTNAME= haproxy-1.8.17
CATEGORIES= net www
MASTER_SITES= http://www.haproxy.org/download/${PKGVERSION_NOREV:R}/src/

Expand Down
10 changes: 5 additions & 5 deletions net/haproxy/distinfo
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
$NetBSD: distinfo,v 1.39 2018/11/29 09:02:37 morr Exp $
$NetBSD: distinfo,v 1.40 2019/01/24 10:33:52 morr Exp $

SHA1 (haproxy-1.8.14.tar.gz) = 589c6f933d73e8d6ba5307c8304cafb80e968481
RMD160 (haproxy-1.8.14.tar.gz) = e8701ede3f33eaa03d857ef0cd70f49b07755a73
SHA512 (haproxy-1.8.14.tar.gz) = 17727c19e0439a2b45be2ec583cd2ce30d1af2bf48bd3cdb2dce1eff670ab8b24d93eaa7bebb410947528d1ad88c3856495e498fff518620efbd32b9adf4eb66
Size (haproxy-1.8.14.tar.gz) = 2070813 bytes
SHA1 (haproxy-1.8.17.tar.gz) = 066878e2e443473d0cb9f8e74c28be822ec1e4be
RMD160 (haproxy-1.8.17.tar.gz) = c8e381f552ed51636ad2917a2cd2c1e58b662e73
SHA512 (haproxy-1.8.17.tar.gz) = 0887d5d84c2cce9355fae032ba82e4b7b94c89d3053f209046a555101b5750c10b51feb38fd14245f806fb4f50ec1dcdf2b23b4f80578abd4a27693fc29b91b1
Size (haproxy-1.8.17.tar.gz) = 2077525 bytes
SHA1 (patch-Makefile) = 30a778c6d83270ef672d14d6ae3fe7a1126fea53
SHA1 (patch-src_cli.c) = 4bc5cf0116df121ac4c3c38b8f962c3a62d536e5
SHA1 (patch-src_haproxy.c) = badb172013541087d84f03726ea928c6f5634dc3

0 comments on commit 6773467

Please sign in to comment.