--- - branch: pkgsrc-2014Q2 date: Sat Sep 13 18:13:24 UTC 2014 files: - new: 1.12.2.1 old: '1.12' path: pkgsrc/net/haproxy/Makefile pathrev: pkgsrc/net/haproxy/Makefile@1.12.2.1 type: modified - new: 1.4.4.1 old: '1.4' path: pkgsrc/net/haproxy/PLIST pathrev: pkgsrc/net/haproxy/PLIST@1.4.4.1 type: modified - new: 1.8.2.1 old: '1.8' path: pkgsrc/net/haproxy/distinfo pathrev: pkgsrc/net/haproxy/distinfo@1.8.2.1 type: modified - new: 1.1.2.2 old: '0' path: pkgsrc/net/haproxy/options.mk pathrev: pkgsrc/net/haproxy/options.mk@1.1.2.2 type: added - new: 1.4.2.1 old: '1.4' path: pkgsrc/net/haproxy/patches/patch-aa pathrev: pkgsrc/net/haproxy/patches/patch-aa@1.4.2.1 type: modified - new: '0' old: '1.2' path: pkgsrc/net/haproxy/patches/patch-ab pathrev: pkgsrc/net/haproxy/patches/patch-ab@0 type: deleted - new: 1.1.2.2 old: '0' path: pkgsrc/net/haproxy/patches/patch-standard_h pathrev: pkgsrc/net/haproxy/patches/patch-standard_h@1.1.2.2 type: added id: 20140913T181324Z.6e560406b96c2b0786509706bc251c0c45b61b3b log: "Pullup ticket #4499 - requested by morr\nnet/haproxy: security update\n\nRevisions pulled up:\n- net/haproxy/Makefile 1.13-1.15\n- net/haproxy/PLIST 1.5\n- net/haproxy/distinfo \ 1.9-1.11\n- net/haproxy/options.mk 1.1\n- net/haproxy/patches/patch-aa 1.5\n- net/haproxy/patches/patch-ab \ deleted\n- net/haproxy/patches/patch-standard_h \ 1.1\n\n---\n Module Name:\tpkgsrc\n Committed By:\tfhajny\n \ Date:\t\tMon Jul 14 15:30:10 UTC 2014\n\n Modified Files:\n \tpkgsrc/net/haproxy: Makefile PLIST distinfo\n \tpkgsrc/net/haproxy/patches: patch-aa\n Added Files:\n \ \tpkgsrc/net/haproxy: options.mk\n \tpkgsrc/net/haproxy/patches: patch-standard_h\n \ Removed Files:\n \tpkgsrc/net/haproxy/patches: patch-ab\n\n Log Message:\n \ Update haproxy to 1.5.2. Introduce support for OpenSSL, PCRE and Zlib.\n\n \ 1.5.2\n -----\n Two extra important issues were discovered since 1.5.1 which were fixed\n in 1.5.2. The first one can cause some sample fetch combinations to fail\n together in a same expression, and one artificial case (but totally\n \ useless) may even crash the process. The second one is an incomplete\n fix in 1.5-dev23 for the request body forwarding. Hash-based balancing\n algorithms and http-send-name-header may fail if a request contains\n a body which starts to be forwarded before the contents are used.\n A few other bugs were fixed, and the max syslog line length is now\n configurable per logger.\n\n 1.5.1\n \ -----\n Version 1.5.1 fixes a few bugs from 1.5.0 among which a really annoying\n \ one which can cause some file descriptor leak when dealing with clients\n which disappear from the net, resulting in the impossibility to accept\n new connections after some time.\n\n 1.5.0\n -----\n 1.5 expands 1.4 with many new features and performance improvements,\n including native SSL support on both sides with SNI/NPN/ALPN and OCSP\n stapling, IPv6 and UNIX sockets are supported everywhere, full HTTP\n keep-alive for better support of NTLM and improved efficiency in\n \ static farms, HTTP/1.1 compression (deflate, gzip) to save bandwidth,\n PROXY protocol versions 1 and 2 on both sides, data sampling on\n everything in request or response, including payload, ACLs can use\n any matching method with any input sample maps and dynamic ACLs\n updatable from the CLI stick-tables support counters to track\n activity on any input sample custom format for logs, unique-id,\n \ header rewriting, and redirects, improved health checks (SSL,\n scripted TCP, check agent, ...), much more scalable configuration\n supports hundreds of thousands of backends and certificates without\n sweating.\n\n Full changelog for the 1.5 branch:\n\n http://www.haproxy.org/download/1.5/src/CHANGELOG\n\n---\n \ Module Name:\tpkgsrc\n Committed By:\tfhajny\n Date:\t\tSun Jul 27 16:33:36 UTC 2014\n\n Modified Files:\n \tpkgsrc/net/haproxy: Makefile distinfo\n\n \ Log Message:\n Update haproxy to 1.5.3.\n\n 2014/07/25 : 1.5.3\n - DOC: fix typo in Unix Socket commands\n - BUG/MEDIUM: connection: fix memory corruption when building a proxy\n v2 header\n - BUG/MEDIUM: ssl: Fix a memory leak in DHE key exchange\n - DOC: mention that Squid correctly responds 400 to PPv2 header\n - BUG/MINOR: http: base32+src should use the big endian version of base32\n - BUG/MEDIUM: connection: fix proxy v2 header again!\n\n---\n Module Name:\tpkgsrc\n Committed By:\tmorr\n Date:\t\tFri Sep 12 21:37:38 UTC 2014\n\n \ Modified Files:\n \tpkgsrc/net/haproxy: Makefile distinfo\n\n Log Message:\n \ Update to version 1.5.4.\n\n Changes:\n\n - BUG: config: error in http-response replace-header number of arguments\n - BUG/MINOR: Fix search for -p argument in systemd wrapper.\n - BUG/MEDIUM: auth: fix segfault with http-auth and a configuration with an unknown encryption algorithm\n - BUG/MEDIUM: config: userlists should ensure that encrypted passwords are supported\n - MEDIUM: connection: add new bit in Proxy Protocol V2\n - BUG/MINOR: server: move the directive #endif to the end of file\n - BUG/MEDIUM: http: tarpit timeout is reset\n - BUG/MAJOR: tcp: fix a possible busy spinning loop in content track-sc*\n - BUG/MEDIUM: http: fix inverted condition in pat_match_meth()\n - BUG/MEDIUM: http: fix improper parsing of HTTP methods for use with ACLs\n - BUG/MINOR: pattern: remove useless allocation of unused trash in pat_parse_reg()\n - BUG/MEDIUM: acl: correctly compute the output type when a converter is used\n - CLEANUP: acl: cleanup some of the redundancy and spaghetti after last fix\n - BUG/CRITICAL: http: don't update msg->sov once data start to leave the buffer\n" module: pkgsrc subject: 'CVS commit: [pkgsrc-2014Q2] pkgsrc/net/haproxy' unixtime: '1410632004' user: tron