Commit Graph

112 Commits

Author SHA1 Message Date
danj
d027ff562d Update to haproxy-2.6.7 2022-12-04 13:45:44 +00:00
ajacoutot
f50fdd748e Stop using the daemon class in @newuser.
If we need to make an exception we can do it and properly document the
reason but by default we should just use the default login class.
rc.d uses daemon or the login class provided in login.conf.d so this has
no impact there.

discussed with sthen@, tb@ and robert@

praying that my grep/sed skills did not break anything and still
believing in portbump :-)
2022-11-08 11:14:43 +00:00
danj
6fe3165621 Update to haproxy-2.6.6
From brad
2022-10-10 13:31:00 +00:00
danj
78d7d9614b Update to haproxy-2.6.5
from brad
2022-09-05 23:25:14 +00:00
danj
b978a6752e Update to haproxy-2.6.4 2022-08-28 19:51:38 +00:00
danj
5f306451fd Fix build by adding support for TCP_INFO
Noticed by naddy, patch from brad
2022-08-14 12:35:38 +00:00
danj
97d60af540 Update to haproxy-2.6.2
From brad
2022-07-27 09:27:26 +00:00
danj
406d2d806f Update to haproxy-2.6.1
- Switch over to using PCRE2.
- Convert over to using the haproxy's Makefile for the regular
  install target and simplify the post-install target handling.

From brad.
2022-07-20 01:41:31 +00:00
danj
b8f7eeafd5 Update to haproxy-2.4.17 2022-05-15 00:50:49 +00:00
danj
2fdf8bd040 Update to haproxy-2.4.15 2022-04-19 01:14:47 +00:00
danj
3f81a9adb4 Update to haproxy-2.4.14 2022-03-13 14:30:39 +00:00
naddy
3f5796b9fd drop RCS Ids 2022-03-11 19:45:43 +00:00
danj
3a3f5fae5f Update to haproxy 2.4.12
Simplify and fix the libatomic handling.

Based on a diff for 2.4.11 from brad.
libatomic handling discussed with sthen and brad.
2022-01-12 01:45:16 +00:00
sthen
688afc662a unbreak haproxy build on i386 by hardcoding libatomic check (we don't
have it with clang, and in theory it shouldn't be needed if we build with
586 opcodes).
2022-01-06 21:03:27 +00:00
danj
ccdb043d5d Patch has been upstreamed 2021-12-16 21:48:17 +00:00
danj
bdf3720e33 Update to haproxy-2.4.9 2021-12-08 01:38:22 +00:00
tb
02662b3e88 net/haproxy: use BIO_* functions provided by the library instead of
replacement macros. Prevents build brekage with opaque BIO.

ok danj
2021-11-24 04:25:18 +00:00
tb
80984580c1 net/haproxy: drop definition of TLS1_3_VERSION and SSL_OP_NO_TLSv1_3 via
CFLAGS. Since LibreSSL 3.4.1 this gross hack is no longer needed.
2021-11-18 20:18:08 +00:00
danj
eb13316c44 Update to haproxy-2.4.7 2021-10-10 13:12:23 +00:00
danj
b16e1ed9bd Update to haproxy-2.4.4
This version essentially aims at fixing the HTX header encoding
issue mentioned in a previous message, and that may lead to a
request smuggling attack.

New release pointed out by tb
2021-09-10 01:16:15 +00:00
danj
53b01bf202 Update to haproxy-2.4.3
From brad
2021-09-02 23:41:06 +00:00
danj
890b79ced3 Update to haproxy-2.3.13
"A vulnerability was found that makes it possible to abuse the
HTTP/2 parser, allowing an attacker to prepend hostnames to a
request, append top-level domains to an existing domain, and inject
invalid characters through the :method pseudo-header."
https://www.haproxy.com/blog/august-2021-haproxy-2-0-http-2-vulnerabilities-fixed/
2021-08-18 00:42:10 +00:00
danj
cfd89afa57 Update to haproxy-2.3.12 2021-07-31 19:31:44 +00:00
danj
fb99ccff3d Update to haproxy-2.3.10 2021-04-26 00:09:42 +00:00
danj
0ec190057a Update to haproxy-2.3.9 2021-04-03 14:53:30 +00:00
danj
8a85ad21ba Update to haproxy-2.3.7 2021-03-21 13:45:56 +00:00
danj
cd084c4e1b Update to haproxy-2.3.6 2021-03-06 18:13:48 +00:00
danj
c6ce35a2f5 Enable TLSv1.3
This mimics what has been done in www/nginx.

Lack of TLSv1.3 pointed out by Brandon (theriverlethe at gmail).
From and ok tb@
2021-02-21 15:05:21 +00:00
danj
825997f877 Update to haproxy-2.3.5 2021-02-13 22:09:37 +00:00
danj
824a5c3a3b Update to haproxy-2.3.4
"Haproxy now supports keeping the private and public keys in
separate files, while previously, they needed to be in the same
file. This allows us to directly use the output of acme-client(1)
without doing extra scripting."

Based on a diff from Aisha Tammy who also authored the quote.
2021-01-30 22:10:01 +00:00
danj
4de718f109 Update to haproxy-2.0.20 2021-01-17 15:22:56 +00:00
danj
104fe2bb47 Update to haproxy-2.0.19 2020-12-14 23:26:59 +00:00
danj
b8be89cd6d Add support for encrypted passwords in Userlists
This is a backport from upstream:
BUILD: makefile: enable crypt(3) for OpenBSD (496374e)

Upstream diff from Matthieu Guegan, port one from brad. Prodded by both.
2020-11-26 23:28:27 +00:00
danj
6ef539baf3 Backport two commits to support closefrom()
From brad
2020-10-24 18:27:51 +00:00
danj
73e1f9da9d Fix CFLAGS handling
The proper variable to override for optimizations is CPU_CFLAGS.
Upstream Makefile adds -fno-strict-aliasing so remove it.

From brad
2020-10-24 18:27:05 +00:00
danj
ffdc5178d6 Update to haproxy-2.0.18 2020-10-22 22:03:36 +00:00
danj
05464cc878 Add patch to fix vfprintf %s NULL in syslog
From Willy Tarreau, via Matthieu Guegan
2020-09-22 14:12:21 +00:00
danj
0859186aeb Update to haproxy-2.0.17 2020-09-21 19:19:05 +00:00
danj
da2a3863a9 Update to haproxy-2.0.15 2020-06-23 17:35:41 +00:00
cwen
250d5aaa37 haproxy: don't require `-latomic' anymore on powerpc, now that this arch
switched to clang

OK danj@ (maintainer), also built by kettenis@
2020-04-06 13:36:08 +00:00
sthen
b5edc4961c haproxy: use V=1 for building to unhide command lines. ok danj 2020-04-05 19:28:09 +00:00
danj
6f88c608f0 Update to haproxy-2.0.14
From the Announce email:
The main driver for this release is that it contains a fix for a
serious vulnerability that was responsibly reported last week by
Felix Wilhelm from Google Project Zero, affecting the HPACK
decoder used for HTTP/2.  CVE-2020-11100 was assigned to this
issue.

This vulnerability makes it possible under certain circumstances
to write to a wide range of memory locations within the process'
heap, with the limitation that the attacker doesn't control the
absolute address, so the most likely result and by a far margin
will be a process crash, but it is not possible to completely
rule out the faint possibility of a remote code execution, at
least in a lab-controlled environment.
2020-04-02 23:01:17 +00:00
danj
31b52064ac Update to haproxy-2.0.12 2020-02-06 20:16:26 +00:00
danj
b5cb592a59 Update to haproxy-2.0.8
Enable zlib
From Matthieu Guegan (matthieu dot guegan at deindeal dot ch)
2019-11-09 15:52:53 +00:00
danj
3a4e833600 Update to haproxy-1.9.10 2019-08-13 00:34:03 +00:00
sthen
48b0b9660c replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:48:23 +00:00
danj
20fb1d8c8f Update to haproxy-1.9.8
With some help from tb@ for the LibreSSL part.
2019-06-10 23:01:13 +00:00
cwen
235b5eb19d haproxy: needs atomics on macppc (and probably hppa)
Successfully tested on macppc.

OK jca@, "no objection" danj@ (maintainer)
2019-03-14 21:37:20 +00:00
jca
8642cc437b ports-gcc should bring atomic ops support on hppa, remove workaround
"no objection" maintainer
2019-01-14 18:18:59 +00:00
jca
e6f3ebf319 haproxy now uses TLS (__thread) by default, switch to ports-gcc on gcc archs
"no objection" maintainer
2019-01-14 18:17:50 +00:00