danj
b5cb592a59
Update to haproxy-2.0.8
...
Enable zlib
From Matthieu Guegan (matthieu dot guegan at deindeal dot ch)
2019-11-09 15:52:53 +00:00
danj
3a4e833600
Update to haproxy-1.9.10
2019-08-13 00:34:03 +00:00
sthen
48b0b9660c
replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes
2019-07-12 20:48:23 +00:00
danj
20fb1d8c8f
Update to haproxy-1.9.8
...
With some help from tb@ for the LibreSSL part.
2019-06-10 23:01:13 +00:00
cwen
235b5eb19d
haproxy: needs atomics on macppc (and probably hppa)
...
Successfully tested on macppc.
OK jca@, "no objection" danj@ (maintainer)
2019-03-14 21:37:20 +00:00
jca
8642cc437b
ports-gcc should bring atomic ops support on hppa, remove workaround
...
"no objection" maintainer
2019-01-14 18:18:59 +00:00
jca
e6f3ebf319
haproxy now uses TLS (__thread) by default, switch to ports-gcc on gcc archs
...
"no objection" maintainer
2019-01-14 18:17:50 +00:00
danj
5bdbf63dbc
Update to haproxy-1.8.17
...
Fix CVE-2018-20615: """BUG/CRITICAL: mux-h2: re-check the frame
length when PRIORITY is used
An incorrect frame length check is performed on HEADERS frame having
the PRIORITY flag, possibly resulting in a read-past-bound which can
cause a crash depending how the frame is crafted. All 1.9 and 1.8
versions are affected. As a result, all HTTP/2 users must either
upgrade or temporarily disable HTTP/2 by commenting the "npn h2" and
"alpn h2" statements on their related "bind" lines."""
2019-01-11 01:09:50 +00:00
danj
2ea6f71113
Update to haproxy-1.8.16
2018-12-27 21:28:28 +00:00
danj
453877888b
Update to haproxy-1.8.15
...
2 CVEs are fixed with this update
2018-12-15 20:25:54 +00:00
danj
dee14f1fc3
Update to haproxy-1.8.14
...
This update brings HTTP/2 support.
Most libressl patching done by jsing@
ok tb@ jsing@
2018-12-05 16:32:13 +00:00
danj
a4f3eb6c2e
Update to haproxy-1.7.11
2018-05-26 16:40:04 +00:00
sthen
3d9171fba7
unbreak; we now have all functions that haproxy uses in openssl-compat.h
...
(there are more !LIBRESSL pieces src/ssl_sock.c)
2018-03-20 21:57:55 +00:00
sthen
139e13f31b
we have all functions other than SSL_SESSION_set1_id now; unbreak, from jsing
2018-03-18 12:24:43 +00:00
sthen
03c18e5bcd
fix now we have X509_get0_tbs_sigalg
2018-02-23 10:25:17 +00:00
sthen
671eca8fb6
cope with DH_set0_pqg addition
2018-02-19 10:26:10 +00:00
sthen
811c606bd1
add "defined(LIBRESSL_VERSION_NUMBER) && " to the ifdef
2018-02-15 13:58:25 +00:00
sthen
e9cb28456b
adapt compat code conditionals for ASN1_STRING_get0_data() to unbreak
...
since it was added in libressl, ok jsing
2018-02-15 13:45:49 +00:00
danj
a66cab4eed
Update to haproxy-1.7.10
2018-01-21 17:14:08 +00:00
jsg
9a190ffe23
Now that arm has switched to clang the base compiler has atomic builtins
...
and accepts -mfpu=neon.
ok jca@ sthen@
2018-01-20 14:03:39 +00:00
rpe
9a8b5ccd06
Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
...
daemon scripts and bump subpackages that contain the *.rc scripts.
discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
danj
5ba8a1c7fb
Update to haproxy-1.7.9
...
From ChangeLog: BUG/MAJOR: http: Fix possible infinity loop in
http_sync_(req|res)_state
2017-08-21 01:32:19 +00:00
danj
88dc65fb0a
Update to haproxy-1.7.8
...
This moves the port to the latest stable branch. Thanks to Bernard Spil
for patching haproxy to make it work with libressl and pointing it to me!
OK gonzalo@
2017-08-12 14:20:11 +00:00
danj
09168d30e1
Update to haproxy-1.6.13
2017-06-20 17:38:40 +00:00
danj
0737c10470
Update to haproxy-1.6.12
2017-04-05 03:34:57 +00:00
naddy
2e12ef0622
Unbreak after libressl change: remove direct access to field now private.
...
Similar to upstream changes for OpenSSL 1.1.0. Not tested at run time.
ok danj@ sthen@
2017-02-01 15:49:34 +00:00
danj
892545f724
Update to haproxy-1.6.11
2016-12-30 14:02:17 +00:00
jca
d4b8d537c2
Needs __sync_sub_and_fetch_4 and friends, build with lang/gcc on arm.
...
ok danj (maintainer)
2016-12-29 14:05:08 +00:00
jca
898293df04
Move NO_TEST, and kill a trailing whitespace.
...
ok danj@ (maintainer)
2016-12-29 13:52:14 +00:00
danj
c0dee63708
Update to haproxy-1.6.10
2016-11-26 12:29:50 +00:00
danj
04a92c12b7
Patch has been (finally, yay) committed upstream
2016-10-20 16:19:11 +00:00
danj
e9cc00c472
Make use of the accept4() API on OpenBSD.
...
From Brad, ok jca@
2016-09-27 17:04:58 +00:00
danj
38ab7a348d
Update to haproxy-1.6.9
2016-08-31 17:50:39 +00:00
danj
eb68ef5395
Maintenance update to haproxy-1.6.8
2016-08-17 18:57:57 +00:00
danj
1344f9a3e6
update to haproxy-1.6.7
...
from David Carlier
2016-08-01 17:30:50 +00:00
danj
7fc676bcc9
update to haproxy-1.6.6
...
from David Carlier
2016-06-27 18:41:11 +00:00
jasper
a2e16608d9
Security fix for CVE-2016-5360
...
ok danj@ (MAINTAINER)
2016-06-15 06:55:58 +00:00
gonzalo
8fb1926a7a
Update for Haproxy to 1.6.5 from David CARLIER
...
http://www.haproxy.org/download/1.6/src/CHANGELOG
2016-05-13 03:34:28 +00:00
jca
0e201d7883
Update to haproxy-1.6.4, from David Carlier
...
ok Daniel Jakots (maintainer)
2016-03-18 12:41:26 +00:00
benoit
75440423b5
Update to haproxy-1.6.3.
...
from David Carlier, ok maintainer Daniel Jakots.
2016-01-06 09:50:04 +00:00
jca
667206481b
Maintainer update to haproxy-1.6.2
...
Upstream removed the example config file, this update adds a new,
simpler one.
Also fix a time_t printing warning while here.
2015-11-10 11:56:54 +00:00
jca
a182859996
Update to haproxy-1.5.15, from maintainer Daniel Jakots.
2015-11-05 20:00:24 +00:00
ajacoutot
36710574d8
Unbreak reloading haproxy.
...
rc_reload() appends '-sf pid' which broke the default pexp.
breakage reported by Alexandre Perrin via Daniel Jakots (maintainer)
2015-10-24 14:31:26 +00:00
jca
43b89ca6a9
Add a comment about shared SSL session cache support.
2015-09-08 18:35:41 +00:00
jca
0eb74ae52d
Disable the shared SSL session cache on hppa, and remove the BROKEN marker.
...
hppa lacks the atomic ops needed for this feature. Other archs may be
good candidates too.
ok Daniel Jakots (maintainer), juanfra@
2015-09-08 18:28:50 +00:00
juanfra
a6bd869f98
BROKEN-hppa = undefined reference to __sync atomic ops
2015-09-07 22:20:52 +00:00
jca
3e24df4613
Committed upstream.
2015-08-25 17:51:52 +00:00
sthen
88a52fdf3e
guard SSLv3_client_method() with #ifndef OPENSSL_NO_SSL3
2015-07-18 15:43:44 +00:00
gsoares
6059555a55
SECURITY update to 1.5.14
...
(fixes an information leak vunerability CVE-2015-3281)
diff from Daniel Jakots (MAINAINER)
2015-07-04 03:12:08 +00:00
jca
773ca29794
Change maintainer mail address per his request.
2015-05-12 19:08:42 +00:00