This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 2.1.2 was issued on 2019/12/21.  There are currently 54 patches in 
the queue cut down this way:
    - 2 MAJOR, first one merged on 2020/01/20
    - 20 MEDIUM, first one merged on 2020/01/09
    - 32 MINOR, first one merged on 2020/01/07

Thus the computed ideal release date for 2.1.3 would be 2020/02/03, which was 
one week ago.

The current list of patches in the queue is:
    - MAJOR   : memory: Don't forget to unlock the rwlock if the pool is empty.
    - MAJOR   : hashes: fix the signedness of the hash inputs
    - MEDIUM  : pipe: fix a use-after-free in case of pipe creation error
    - MEDIUM  : 0rtt: Only consider the SSL handshake.
    - MEDIUM  : ssl/cli: 'commit ssl cert' wrong SSL_CTX init
    - MEDIUM  : http-ana: Truncate the response when a redirect rule is applied
    - MEDIUM  : mux-h2: make sure we don't emit TE headers with anything but 
    - MEDIUM  : ssl: Don't forget to free ctx->ssl on failure.
    - MEDIUM  : memory: Add a rwlock before freeing memory.
    - MEDIUM  : netscaler: Don't forget to allocate storage for conn->src/dst.
    - MEDIUM  : connections: Don't forget to unlock when killing a connection.
    - MEDIUM  : connection: add a mux flag to indicate splice usability
    - MEDIUM  : cli: _getsocks must send the peers sockets
    - MEDIUM  : memory_pool: Update the seq number in pool_flush().
    - MEDIUM  : mux_h1: Don't call h1_send if we subscribed().
    - MEDIUM  : mux-h2: fix missing test on sending_list in previous patch
    - MEDIUM  : tasks: Use the MT macros in tasklet_free().
    - MEDIUM  : session: do not report a failure when rejecting a session
    - MEDIUM  : mworker: remain in mworker mode during reload
    - MEDIUM  : connections: Hold the lock when wanting to kill a connection.
    - MEDIUM  : checks: Only attempt to do handshakes if the connection is 
    - MEDIUM  : mux-h2: don't stop sending when crossing a buffer boundary
    - MINOR   : h1: Report the right error position when a header value is 
    - MINOR   : channel: inject output data at the end of output
    - MINOR   : ssl: we may only ignore the first 64 errors
    - MINOR   : ssl/cli: free the previous ckch content once a PEM is loaded
    - MINOR   : 51d: Fix bug when HTX is enabled
    - MINOR   : pattern: handle errors from fgets when trying to load patterns
    - MINOR   : proxy: Fix input data copy when an error is captured
    - MINOR   : ssl: increment issuer refcount if in chain
    - MINOR   : stream: don't mistake match rules for store-request rules
    - MINOR   : stream-int: Don't trigger L7 retry if max retries is already 
    - MINOR   : connection: fix ip6 dst_port copy in make_proxy_line_v2
    - MINOR   : tcp-rules: Fix memory releases on error path during action 
    - MINOR   : dns: Make dns_query_id_seed unsigned
    - MINOR   : http_act: don't check capture id in backend
    - MINOR   : ssl: ssl_sock_load_issuer_file_into_ckch memory leak
    - MINOR   : cli/mworker: can't start haproxy with 2 programs
    - MINOR   : ssl/cli: ocsp_issuer must be set w/ "set ssl cert"
    - MINOR   : ssl: ssl_sock_load_ocsp_response_from_file memory leak
    - MINOR   : ssl: clear the SSL errors on DH loading failure
    - MINOR   : tcpchecks: fix the connect() flags regarding delayed ack
    - MINOR   : stktable: report the current proxy name in error messages
    - MINOR   : stick-table: Use MAX_SESS_STKCTR as the max track ID during 
    - MINOR   : checks: refine which errno values are really errors.
    - MINOR   : ssl: ssl_sock_load_sctl_from_file memory leak
    - MINOR   : http-rules: Remove buggy deinit functions for HTTP rules
    - MINOR   : ssl: ssl_sock_load_pem_into_ckch is not consistent
    - MINOR   : mux-h2: use a safe list_for_each_entry in h2_send()
    - MINOR   : ssl: typo in previous patch
    - MINOR   : ssl: Possible memleak when allowing the 0RTT data buffer.
    - MINOR   : ssl: memory leak w/ the ocsp_issuer
    - MINOR   : http-ana/filters: Wait end of the http_end callback for all 
    - MINOR   : cache: Fix leak of cache name in error path

The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.

Reply via email to