Hi, This is a friendly bot that watches fixes pending for the next haproxy-stable release! One such e-mail is sent periodically once patches are waiting in the last maintenance branch, and an ideal release date is computed based on the severity of these fixes and their merge date. Responses to this mail must be sent to the mailing list.
Last release 2.1.2 was issued on 2019/12/21. There are currently 54 patches in the queue cut down this way: - 2 MAJOR, first one merged on 2020/01/20 - 20 MEDIUM, first one merged on 2020/01/09 - 32 MINOR, first one merged on 2020/01/07 Thus the computed ideal release date for 2.1.3 would be 2020/02/03, which was one week ago. The current list of patches in the queue is: - MAJOR : memory: Don't forget to unlock the rwlock if the pool is empty. - MAJOR : hashes: fix the signedness of the hash inputs - MEDIUM : pipe: fix a use-after-free in case of pipe creation error - MEDIUM : 0rtt: Only consider the SSL handshake. - MEDIUM : ssl/cli: 'commit ssl cert' wrong SSL_CTX init - MEDIUM : http-ana: Truncate the response when a redirect rule is applied - MEDIUM : mux-h2: make sure we don't emit TE headers with anything but "trailers" - MEDIUM : ssl: Don't forget to free ctx->ssl on failure. - MEDIUM : memory: Add a rwlock before freeing memory. - MEDIUM : netscaler: Don't forget to allocate storage for conn->src/dst. - MEDIUM : connections: Don't forget to unlock when killing a connection. - MEDIUM : connection: add a mux flag to indicate splice usability - MEDIUM : cli: _getsocks must send the peers sockets - MEDIUM : memory_pool: Update the seq number in pool_flush(). - MEDIUM : mux_h1: Don't call h1_send if we subscribed(). - MEDIUM : mux-h2: fix missing test on sending_list in previous patch - MEDIUM : tasks: Use the MT macros in tasklet_free(). - MEDIUM : session: do not report a failure when rejecting a session - MEDIUM : mworker: remain in mworker mode during reload - MEDIUM : connections: Hold the lock when wanting to kill a connection. - MEDIUM : checks: Only attempt to do handshakes if the connection is ready. - MEDIUM : mux-h2: don't stop sending when crossing a buffer boundary - MINOR : h1: Report the right error position when a header value is invalid - MINOR : channel: inject output data at the end of output - MINOR : ssl: we may only ignore the first 64 errors - MINOR : ssl/cli: free the previous ckch content once a PEM is loaded - MINOR : 51d: Fix bug when HTX is enabled - MINOR : pattern: handle errors from fgets when trying to load patterns - MINOR : proxy: Fix input data copy when an error is captured - MINOR : ssl: increment issuer refcount if in chain - MINOR : stream: don't mistake match rules for store-request rules - MINOR : stream-int: Don't trigger L7 retry if max retries is already reached - MINOR : connection: fix ip6 dst_port copy in make_proxy_line_v2 - MINOR : tcp-rules: Fix memory releases on error path during action parsing - MINOR : dns: Make dns_query_id_seed unsigned - MINOR : http_act: don't check capture id in backend - MINOR : ssl: ssl_sock_load_issuer_file_into_ckch memory leak - MINOR : cli/mworker: can't start haproxy with 2 programs - MINOR : ssl/cli: ocsp_issuer must be set w/ "set ssl cert" - MINOR : ssl: ssl_sock_load_ocsp_response_from_file memory leak - MINOR : ssl: clear the SSL errors on DH loading failure - MINOR : tcpchecks: fix the connect() flags regarding delayed ack - MINOR : stktable: report the current proxy name in error messages - MINOR : stick-table: Use MAX_SESS_STKCTR as the max track ID during parsing - MINOR : checks: refine which errno values are really errors. - MINOR : ssl: ssl_sock_load_sctl_from_file memory leak - MINOR : http-rules: Remove buggy deinit functions for HTTP rules - MINOR : ssl: ssl_sock_load_pem_into_ckch is not consistent - MINOR : mux-h2: use a safe list_for_each_entry in h2_send() - MINOR : ssl: typo in previous patch - MINOR : ssl: Possible memleak when allowing the 0RTT data buffer. - MINOR : ssl: memory leak w/ the ocsp_issuer - MINOR : http-ana/filters: Wait end of the http_end callback for all filters - MINOR : cache: Fix leak of cache name in error path --- The haproxy stable-bot is freely provided by HAProxy Technologies to help improve the quality of each HAProxy release. If you have any issue with these emails or if you want to suggest some improvements, please post them on the list so that the solutions suiting the most users can be found.