stable-bot: Bugfixes waiting for a release 2.4 (1)

2021-07-20 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.4.2 was issued on 2021-07-07.  There are currently 1 patches 
in the queue cut down this way:
- 1 MINOR, first one merged on 2021-07-15

Thus the computed ideal release date for 2.4.3 would be 2021-08-12, which is in 
three weeks or less.

The current list of patches in the queue is:
 - 2.4   - MINOR   : ssl: Default-server configuration 
ignored by server

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.4 (11), 2.3 (7)

2021-07-27 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.4.2 was issued on 2021-07-07.  There are currently 11 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-07-27
- 9 MINOR, first one merged on 2021-07-15

Thus the computed ideal release date for 2.4.3 would be 2021-08-12, which is in 
two weeks or less.

Last release 2.3.12 was issued on 2021-07-08.  There are currently 7 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-07-27
- 5 MINOR, first one merged on 2021-07-27

Thus the computed ideal release date for 2.3.13 would be 2021-08-24, which is 
in four weeks or less.

The current list of patches in the queue is:
 - 2.3, 2.4  - MEDIUM  : mworker: do not register an exit 
handler if exit is expected
 - 2.3, 2.4  - MEDIUM  : ssl_sample: fix segfault for srv 
samples on invalid request
 - 2.4   - MINOR   : mux-h1: Be sure to swap H1C to splice 
mode when rcv_pipe() is called
 - 2.3, 2.4  - MINOR   : resolvers: Use a null-terminated 
string to lookup in servers tree
 - 2.3, 2.4  - MINOR   : mux-h2: Obey dontlognull option during 
the preface
 - 2.3, 2.4  - MINOR   : mworker: do not export 
HAPROXY_MWORKER_REEXEC across programs
 - 2.3, 2.4  - MINOR   : systemd: must check the configuration 
using -Ws
 - 2.4   - MINOR   : ssl: Default-server configuration 
ignored by server
 - 2.4   - MINOR   : stats: Add missing agent stats on 
servers
 - 2.3, 2.4  - MINOR   : check: fix the condition to validate a 
port-less server
 - 2.4   - MINOR   : mux-h1: Obey dontlognull option for 
empty requests

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.4 (11), 2.3 (7), 2.0 (1)

2021-08-03 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.4.2 was issued on 2021-07-07.  There are currently 11 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-07-27
- 9 MINOR, first one merged on 2021-07-15

Thus the computed ideal release date for 2.4.3 would be 2021-08-12, which is in 
one week or less.

Last release 2.3.12 was issued on 2021-07-08.  There are currently 7 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-07-27
- 5 MINOR, first one merged on 2021-07-27

Thus the computed ideal release date for 2.3.13 would be 2021-08-24, which is 
in three weeks or less.

Last release 2.0.23 was issued on 2021-07-16.  There are currently 1 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-07-29

Thus the computed ideal release date for 2.0.24 would be 2021-10-27, which is 
in twelve weeks or less.

The current list of patches in the queue is:
 - 2.3, 2.4  - MEDIUM  : ssl_sample: fix segfault for srv 
samples on invalid request
 - 2.0   - MEDIUM  : tcp-check: Do not dereference 
inexisting connection
 - 2.3, 2.4  - MEDIUM  : mworker: do not register an exit 
handler if exit is expected
 - 2.4   - MINOR   : mux-h1: Be sure to swap H1C to splice 
mode when rcv_pipe() is called
 - 2.4   - MINOR   : mux-h1: Obey dontlognull option for 
empty requests
 - 2.3, 2.4  - MINOR   : check: fix the condition to validate a 
port-less server
 - 2.3, 2.4  - MINOR   : resolvers: Use a null-terminated 
string to lookup in servers tree
 - 2.3, 2.4  - MINOR   : mux-h2: Obey dontlognull option during 
the preface
 - 2.4   - MINOR   : ssl: Default-server configuration 
ignored by server
 - 2.4   - MINOR   : stats: Add missing agent stats on 
servers
 - 2.3, 2.4  - MINOR   : systemd: must check the configuration 
using -Ws
 - 2.3, 2.4  - MINOR   : mworker: do not export 
HAPROXY_MWORKER_REEXEC across programs

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.4 (11), 2.3 (7), 2.0 (1)

2021-08-10 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.4.2 was issued on 2021-07-07.  There are currently 11 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-07-27
- 9 MINOR, first one merged on 2021-07-15

Thus the computed ideal release date for 2.4.3 would be 2021-08-12, which was 
within the last week.

Last release 2.3.12 was issued on 2021-07-08.  There are currently 7 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-07-27
- 5 MINOR, first one merged on 2021-07-27

Thus the computed ideal release date for 2.3.13 would be 2021-08-24, which is 
in two weeks or less.

Last release 2.0.23 was issued on 2021-07-16.  There are currently 1 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-07-29

Thus the computed ideal release date for 2.0.24 would be 2021-10-27, which is 
in eleven weeks or less.

The current list of patches in the queue is:
 - 2.0   - MEDIUM  : tcp-check: Do not dereference 
inexisting connection
 - 2.3, 2.4  - MEDIUM  : ssl_sample: fix segfault for srv 
samples on invalid request
 - 2.3, 2.4  - MEDIUM  : mworker: do not register an exit 
handler if exit is expected
 - 2.4   - MINOR   : ssl: Default-server configuration 
ignored by server
 - 2.4   - MINOR   : mux-h1: Be sure to swap H1C to splice 
mode when rcv_pipe() is called
 - 2.3, 2.4  - MINOR   : systemd: must check the configuration 
using -Ws
 - 2.3, 2.4  - MINOR   : check: fix the condition to validate a 
port-less server
 - 2.3, 2.4  - MINOR   : resolvers: Use a null-terminated 
string to lookup in servers tree
 - 2.3, 2.4  - MINOR   : mux-h2: Obey dontlognull option during 
the preface
 - 2.4   - MINOR   : stats: Add missing agent stats on 
servers
 - 2.4   - MINOR   : mux-h1: Obey dontlognull option for 
empty requests
 - 2.3, 2.4  - MINOR   : mworker: do not export 
HAPROXY_MWORKER_REEXEC across programs

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.4 (1), 2.3 (1), 2.2 (1)

2021-08-24 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.4.3 was issued on 2021-08-17.  There are currently 1 patches 
in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-08-20

Thus the computed ideal release date for 2.4.4 would be 2021-09-19, which is in 
four weeks or less.

Last release 2.3.13 was issued on 2021-08-17.  There are currently 1 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-08-20

Thus the computed ideal release date for 2.3.14 would be 2021-09-19, which is 
in four weeks or less.

Last release 2.2.16 was issued on 2021-08-17.  There are currently 1 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-08-20

Thus the computed ideal release date for 2.2.17 would be 2021-10-19, which is 
in eight weeks or less.

The current list of patches in the queue is:
 - 2.2, 2.3, 2.4 - MEDIUM  : h2: match absolute-path not 
path-absolute for :path

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.4 (1), 2.3 (2), 2.2 (1)

2021-08-31 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.4.3 was issued on 2021-08-17.  There are currently 1 patches 
in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-08-20

Thus the computed ideal release date for 2.4.4 would be 2021-09-19, which is in 
three weeks or less.

Last release 2.3.13 was issued on 2021-08-17.  There are currently 2 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-08-20

Thus the computed ideal release date for 2.3.14 would be 2021-09-19, which is 
in three weeks or less.

Last release 2.2.16 was issued on 2021-08-17.  There are currently 1 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-08-20

Thus the computed ideal release date for 2.2.17 would be 2021-10-19, which is 
in seven weeks or less.

The current list of patches in the queue is:
 - 2.3   - MEDIUM  : sock: really fix detection of early 
connection failures in for 2.3-
 - 2.2, 2.3, 2.4 - MEDIUM  : h2: match absolute-path not 
path-absolute for :path

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.4 (15), 2.3 (11), 2.2 (5), 2.0 (5)

2021-09-21 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.4.4 was issued on 2021-09-07.  There are currently 15 
patches in the queue cut down this way:
- 1 MAJOR, first one merged on 2021-09-20
- 3 MEDIUM, first one merged on 2021-09-10
- 11 MINOR, first one merged on 2021-09-08

Thus the computed ideal release date for 2.4.5 would be 2021-10-04, which is in 
two weeks or less.

Last release 2.3.14 was issued on 2021-09-07.  There are currently 11 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-09-20
- 9 MINOR, first one merged on 2021-09-20

Thus the computed ideal release date for 2.3.15 would be 2021-10-18, which is 
in four weeks or less.

Last release 2.2.17 was issued on 2021-09-07.  There are currently 5 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-09-20
- 4 MINOR, first one merged on 2021-09-20

Thus the computed ideal release date for 2.2.18 would be 2021-11-15, which is 
in eight weeks or less.

Last release 2.0.25 was issued on 2021-09-07.  There are currently 5 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-09-20
- 4 MINOR, first one merged on 2021-09-20

Thus the computed ideal release date for 2.0.26 would be 2021-12-13, which is 
in twelve weeks or less.

The current list of patches in the queue is:
 - 2.4   - MAJOR   : mux-h1: Don't eval input data if an 
error was reported
 - 2.3, 2.4  - MEDIUM  : http-ana: Reset channels analysers 
when returning an error
 - 2.4   - MEDIUM  : mux-h1: Remove "Upgrade:" header for 
requests with payload
 - 2.2, 2.3, 2.4 - MEDIUM  : stream-int: Don't block SI on a 
channel policy if EOI is reached
 - 2.0   - MEDIUM  : http: check for a channel pending data 
before waiting
 - 2.0   - MINOR   : stats: fix the POST requests 
processing in legacy mode
 - 2.4   - MINOR   : flt-trace: fix an infinite loop when 
random-parsing is set
 - 2.4   - MINOR   : connection: prevent null deref on mux 
cleanup task allocation
 - 2.0, 2.2, 2.3, 2.4- MINOR   : cli/payload: do not search for 
args inside payload
 - 2.3, 2.4  - MINOR   : lua: Yield in channel functions only 
if lua context can yield
 - 2.3, 2.4  - MINOR   : stream: Don't release a stream if 
FLT_END is still registered
 - 2.0, 2.2, 2.3, 2.4- MINOR   : systemd: ExecStartPre must use -Ws
 - 2.3, 2.4  - MINOR   : filters: Always set FLT_END analyser 
when CF_FLT_ANALYZE flag is set
 - 2.3, 2.4  - MINOR   : lua: Don't yield in channel.append() 
and channel.set()
 - 2.0, 2.2, 2.3, 2.4- MINOR   : compat: make sure __WORDSIZE is 
always defined
 - 2.3, 2.4  - MINOR   : filters: Set right FLT_END analyser 
depending on channel
 - 2.2, 2.3, 2.4 - MINOR   : tcpcheck: Improve LDAP response 
parsing to fix LDAP check

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.4 (23), 2.3 (11), 2.2 (5), 2.0 (5)

2021-09-28 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.4.4 was issued on 2021-09-07.  There are currently 23 
patches in the queue cut down this way:
- 1 MAJOR, first one merged on 2021-09-20
- 4 MEDIUM, first one merged on 2021-09-10
- 18 MINOR, first one merged on 2021-09-08

Thus the computed ideal release date for 2.4.5 would be 2021-10-04, which is in 
one week or less.

Last release 2.3.14 was issued on 2021-09-07.  There are currently 11 
patches in the queue cut down this way:
- 2 MEDIUM, first one merged on 2021-09-20
- 9 MINOR, first one merged on 2021-09-20

Thus the computed ideal release date for 2.3.15 would be 2021-10-18, which is 
in three weeks or less.

Last release 2.2.17 was issued on 2021-09-07.  There are currently 5 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-09-20
- 4 MINOR, first one merged on 2021-09-20

Thus the computed ideal release date for 2.2.18 would be 2021-11-15, which is 
in seven weeks or less.

Last release 2.0.25 was issued on 2021-09-07.  There are currently 5 
patches in the queue cut down this way:
- 1 MEDIUM, first one merged on 2021-09-20
- 4 MINOR, first one merged on 2021-09-20

Thus the computed ideal release date for 2.0.26 would be 2021-12-13, which is 
in eleven weeks or less.

The current list of patches in the queue is:
 - 2.4   - MAJOR   : mux-h1: Don't eval input data if an 
error was reported
 - 2.4   - MEDIUM  : mux-h1: Remove "Upgrade:" header for 
requests with payload
 - 2.0   - MEDIUM  : http: check for a channel pending data 
before waiting
 - 2.4   - MEDIUM  : leastconn: fix rare possibility of 
divide by zero
 - 2.2, 2.3, 2.4 - MEDIUM  : stream-int: Don't block SI on a 
channel policy if EOI is reached
 - 2.3, 2.4  - MEDIUM  : http-ana: Reset channels analysers 
when returning an error
 - 2.4   - MINOR   : vars: improve accuracy of the rules 
used to check expression validity
 - 2.4   - MINOR   : vars: truncate the variable name in 
error reports about scope.
 - 2.0, 2.2, 2.3, 2.4- MINOR   : cli/payload: do not search for 
args inside payload
 - 2.4   - MINOR   : vars: properly set the argument 
parsing context in the expression
 - 2.2, 2.3, 2.4 - MINOR   : tcpcheck: Improve LDAP response 
parsing to fix LDAP check
 - 2.3, 2.4  - MINOR   : lua: Don't yield in channel.append() 
and channel.set()
 - 2.3, 2.4  - MINOR   : filters: Always set FLT_END analyser 
when CF_FLT_ANALYZE flag is set
 - 2.3, 2.4  - MINOR   : lua: Yield in channel functions only 
if lua context can yield
 - 2.3, 2.4  - MINOR   : filters: Set right FLT_END analyser 
depending on channel
 - 2.4   - MINOR   : connection: prevent null deref on mux 
cleanup task allocation
 - 2.0, 2.2, 2.3, 2.4- MINOR   : systemd: ExecStartPre must use -Ws
 - 2.0, 2.2, 2.3, 2.4- MINOR   : compat: make sure __WORDSIZE is 
always defined
 - 2.4   - MINOR   : server: allow 'enable health' only if 
check configured
 - 2.3, 2.4  - MINOR   : stream: Don't release a stream if 
FLT_END is still registered
 - 2.4   - MINOR   : flt-trace: fix an infinite loop when 
random-parsing is set
 - 2.0   - MINOR   : stats: fix the POST requests 
processing in legacy mode
 - 2.4   - MINOR   : h1-htx: Fix a typo when request parser 
is reset
 - 2.4   - MINOR   : http-ana: increment internal_errors 
counter on response error
 - 2.4   - MINOR   : vars: do not talk about global section 
in CLI errors for set-var

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (7), 2.0 (5)

2020-02-25 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.3 was issued on 2020-02-12.  There are currently 7 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-02-21
- 1 MEDIUM, first one merged on 2020-02-21
- 5 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.1.4 would be 2020-03-06, which is in 
two weeks or less.

Last release 2.0.13 was issued on 2020-02-13.  There are currently 5 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-02-21
- 1 MEDIUM, first one merged on 2020-02-21
- 3 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.0.14 would be 2020-03-06, which is 
in two weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MAJOR   : http-ana: Always abort the request 
when a tarpit is triggered
 - 2.0, 2.1  - MEDIUM  : muxes: Use the right argument when 
calling the destroy method.
 - 2.0, 2.1  - MINOR   : filters: Count HTTP headers as 
filtered data but don't forward them
 - 2.0, 2.1  - MINOR   : namespace: avoid closing fd when 
socket failed in my_socketat
 - 2.0, 2.1  - MINOR   : http-ana: Matching on monitor-uri 
should be case-sensitive
 - 2.1   - MINOR   : http-htx: Don't return error if 
authority is updated without changes
 - 2.1   - MINOR   : mux-fcgi: Forbid special characters 
when matching PATH_INFO param

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (17), 2.0 (13)

2020-03-03 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.3 was issued on 2020-02-12.  There are currently 17 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-02-21
- 4 MEDIUM, first one merged on 2020-02-21
- 12 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.1.4 would be 2020-03-06, which is in 
one week or less.

Last release 2.0.13 was issued on 2020-02-13.  There are currently 13 patches 
in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-02-21
- 4 MEDIUM, first one merged on 2020-02-21
- 8 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.0.14 would be 2020-03-06, which is 
in one week or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MAJOR   : http-ana: Always abort the request 
when a tarpit is triggered
 - 2.0, 2.1  - MEDIUM  : muxes: Use the right argument when 
calling the destroy method.
 - 2.0, 2.1  - MEDIUM  : shctx: make sure to keep all blocks 
aligned
 - 2.0, 2.1  - MEDIUM  : ebtree: don't set attribute packed 
without unaligned access support
 - 2.0, 2.1  - MEDIUM  : ssl: fix several bad pointer aliases 
in a few sample fetch functions
 - 2.0, 2.1  - MINOR   : http: http-request replace-path 
duplicates the query string
 - 2.0, 2.1  - MINOR   : http-ana: Matching on monitor-uri 
should be case-sensitive
 - 2.0, 2.1  - MINOR   : sample: Make sure to return stable IDs 
in the unique-id fetch
 - 2.0, 2.1  - MINOR   : namespace: avoid closing fd when 
socket failed in my_socketat
 - 2.0, 2.1  - MINOR   : sample: fix the json converter's 
endian-sensitivity
 - 2.1   - MINOR   : mux-fcgi: Forbid special characters 
when matching PATH_INFO param
 - 2.1   - MINOR   : http-htx: Don't return error if 
authority is updated without changes
 - 2.0, 2.1  - MINOR   : filters: Count HTTP headers as 
filtered data but don't forward them
 - 2.1   - MINOR   : http-htx: Do case-insensive 
comparisons on Host header name
 - 2.0, 2.1  - MINOR   : dns: ignore trailing dot
 - 2.0, 2.1  - MINOR   : connection: make sure to correctly tag 
local PROXY connections
 - 2.1   - MINOR   : h2: reject again empty :path 
pseudo-headers

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (17), 2.0 (13)

2020-03-10 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.3 was issued on 2020-02-12.  There are currently 17 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-02-21
- 4 MEDIUM, first one merged on 2020-02-21
- 12 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.1.4 would be 2020-03-06, which was 
within the last week.

Last release 2.0.13 was issued on 2020-02-13.  There are currently 13 patches 
in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-02-21
- 4 MEDIUM, first one merged on 2020-02-21
- 8 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.0.14 would be 2020-03-06, which was 
within the last week.

The current list of patches in the queue is:
 - 2.0, 2.1  - MAJOR   : http-ana: Always abort the request 
when a tarpit is triggered
 - 2.0, 2.1  - MEDIUM  : shctx: make sure to keep all blocks 
aligned
 - 2.0, 2.1  - MEDIUM  : ebtree: don't set attribute packed 
without unaligned access support
 - 2.0, 2.1  - MEDIUM  : muxes: Use the right argument when 
calling the destroy method.
 - 2.0, 2.1  - MEDIUM  : ssl: fix several bad pointer aliases 
in a few sample fetch functions
 - 2.1   - MINOR   : http-htx: Don't return error if 
authority is updated without changes
 - 2.0, 2.1  - MINOR   : dns: ignore trailing dot
 - 2.0, 2.1  - MINOR   : filters: Count HTTP headers as 
filtered data but don't forward them
 - 2.0, 2.1  - MINOR   : sample: Make sure to return stable IDs 
in the unique-id fetch
 - 2.1   - MINOR   : h2: reject again empty :path 
pseudo-headers
 - 2.0, 2.1  - MINOR   : sample: fix the json converter's 
endian-sensitivity
 - 2.0, 2.1  - MINOR   : http-ana: Matching on monitor-uri 
should be case-sensitive
 - 2.0, 2.1  - MINOR   : http: http-request replace-path 
duplicates the query string
 - 2.1   - MINOR   : mux-fcgi: Forbid special characters 
when matching PATH_INFO param
 - 2.1   - MINOR   : http-htx: Do case-insensive 
comparisons on Host header name
 - 2.0, 2.1  - MINOR   : connection: make sure to correctly tag 
local PROXY connections
 - 2.0, 2.1  - MINOR   : namespace: avoid closing fd when 
socket failed in my_socketat

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (21), 2.0 (16)

2020-03-17 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.3 was issued on 2020-02-12.  There are currently 21 patches in 
the queue cut down this way:
- 2 MAJOR, first one merged on 2020-02-21
- 6 MEDIUM, first one merged on 2020-02-21
- 13 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.1.4 would be 2020-03-06, which was 
one week ago.

Last release 2.0.13 was issued on 2020-02-13.  There are currently 16 patches 
in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-02-21
- 6 MEDIUM, first one merged on 2020-02-21
- 9 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.0.14 would be 2020-03-06, which was 
one week ago.

The current list of patches in the queue is:
 - 2.1   - MAJOR   : list: fix invalid element address 
calculation
 - 2.0, 2.1  - MAJOR   : http-ana: Always abort the request 
when a tarpit is triggered
 - 2.0, 2.1  - MEDIUM  : shctx: make sure to keep all blocks 
aligned
 - 2.0, 2.1  - MEDIUM  : muxes: Use the right argument when 
calling the destroy method.
 - 2.0, 2.1  - MEDIUM  : ebtree: don't set attribute packed 
without unaligned access support
 - 2.0, 2.1  - MEDIUM  : random: implement a thread-safe and 
process-safe PRNG
 - 2.0, 2.1  - MEDIUM  : random: initialize the random pool a 
bit better
 - 2.0, 2.1  - MEDIUM  : ssl: fix several bad pointer aliases 
in a few sample fetch functions
 - 2.0, 2.1  - MINOR   : connection: make sure to correctly tag 
local PROXY connections
 - 2.1   - MINOR   : http-htx: Don't return error if 
authority is updated without changes
 - 2.0, 2.1  - MINOR   : checks/threads: use ha_random() and 
not rand()
 - 2.0, 2.1  - MINOR   : sample: Make sure to return stable IDs 
in the unique-id fetch
 - 2.1   - MINOR   : mux-fcgi: Forbid special characters 
when matching PATH_INFO param
 - 2.0, 2.1  - MINOR   : dns: ignore trailing dot
 - 2.0, 2.1  - MINOR   : filters: Count HTTP headers as 
filtered data but don't forward them
 - 2.0, 2.1  - MINOR   : http-ana: Matching on monitor-uri 
should be case-sensitive
 - 2.1   - MINOR   : http-htx: Do case-insensive 
comparisons on Host header name
 - 2.0, 2.1  - MINOR   : namespace: avoid closing fd when 
socket failed in my_socketat
 - 2.1   - MINOR   : h2: reject again empty :path 
pseudo-headers
 - 2.0, 2.1  - MINOR   : sample: fix the json converter's 
endian-sensitivity
 - 2.0, 2.1  - MINOR   : http: http-request replace-path 
duplicates the query string

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (21), 2.0 (16)

2020-03-24 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.3 was issued on 2020-02-12.  There are currently 21 patches in 
the queue cut down this way:
- 2 MAJOR, first one merged on 2020-02-21
- 6 MEDIUM, first one merged on 2020-02-21
- 13 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.1.4 would be 2020-03-06, which was 
two weeks ago.

Last release 2.0.13 was issued on 2020-02-13.  There are currently 16 patches 
in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-02-21
- 6 MEDIUM, first one merged on 2020-02-21
- 9 MINOR, first one merged on 2020-02-21

Thus the computed ideal release date for 2.0.14 would be 2020-03-06, which was 
two weeks ago.

The current list of patches in the queue is:
 - 2.0, 2.1  - MAJOR   : http-ana: Always abort the request 
when a tarpit is triggered
 - 2.1   - MAJOR   : list: fix invalid element address 
calculation
 - 2.0, 2.1  - MEDIUM  : muxes: Use the right argument when 
calling the destroy method.
 - 2.0, 2.1  - MEDIUM  : ssl: fix several bad pointer aliases 
in a few sample fetch functions
 - 2.0, 2.1  - MEDIUM  : shctx: make sure to keep all blocks 
aligned
 - 2.0, 2.1  - MEDIUM  : ebtree: don't set attribute packed 
without unaligned access support
 - 2.0, 2.1  - MEDIUM  : random: implement a thread-safe and 
process-safe PRNG
 - 2.0, 2.1  - MEDIUM  : random: initialize the random pool a 
bit better
 - 2.0, 2.1  - MINOR   : dns: ignore trailing dot
 - 2.0, 2.1  - MINOR   : namespace: avoid closing fd when 
socket failed in my_socketat
 - 2.0, 2.1  - MINOR   : sample: fix the json converter's 
endian-sensitivity
 - 2.1   - MINOR   : h2: reject again empty :path 
pseudo-headers
 - 2.0, 2.1  - MINOR   : connection: make sure to correctly tag 
local PROXY connections
 - 2.1   - MINOR   : http-htx: Don't return error if 
authority is updated without changes
 - 2.0, 2.1  - MINOR   : http-ana: Matching on monitor-uri 
should be case-sensitive
 - 2.0, 2.1  - MINOR   : checks/threads: use ha_random() and 
not rand()
 - 2.0, 2.1  - MINOR   : filters: Count HTTP headers as 
filtered data but don't forward them
 - 2.1   - MINOR   : mux-fcgi: Forbid special characters 
when matching PATH_INFO param
 - 2.1   - MINOR   : http-htx: Do case-insensive 
comparisons on Host header name
 - 2.0, 2.1  - MINOR   : sample: Make sure to return stable IDs 
in the unique-id fetch
 - 2.0, 2.1  - MINOR   : http: http-request replace-path 
duplicates the query string

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (1), 2.0 (1)

2020-04-07 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.4 was issued on 2020-04-02.  There are currently 1 patches in 
the queue cut down this way:
- 1 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.1.5 would be 2020-04-30, which is in 
three weeks or less.

Last release 2.0.14 was issued on 2020-04-02.  There are currently 1 patches in 
the queue cut down this way:
- 1 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.0.15 would be 2020-04-30, which is 
in three weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MINOR   : protocol_buffer: Wrong maximum 
shifting.

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (4), 2.0 (1)

2020-04-14 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.4 was issued on 2020-04-02.  There are currently 4 patches in 
the queue cut down this way:
- 4 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.1.5 would be 2020-04-30, which is in 
two weeks or less.

Last release 2.0.14 was issued on 2020-04-02.  There are currently 1 patches in 
the queue cut down this way:
- 1 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.0.15 would be 2020-04-30, which is 
in two weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MINOR   : protocol_buffer: Wrong maximum 
shifting.
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections
 - 2.1   - MINOR   : ssl: memleak of the struct 
cert_key_and_chain
 - 2.1   - MINOR   : ssl/cli: memory leak in 'set ssl cert'

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (4), 2.0 (1)

2020-04-21 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.4 was issued on 2020-04-02.  There are currently 4 patches in 
the queue cut down this way:
- 4 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.1.5 would be 2020-04-30, which is in 
one week or less.

Last release 2.0.14 was issued on 2020-04-02.  There are currently 1 patches in 
the queue cut down this way:
- 1 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.0.15 would be 2020-04-30, which is 
in one week or less.

The current list of patches in the queue is:
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections
 - 2.0, 2.1  - MINOR   : protocol_buffer: Wrong maximum 
shifting.
 - 2.1   - MINOR   : ssl: memleak of the struct 
cert_key_and_chain
 - 2.1   - MINOR   : ssl/cli: memory leak in 'set ssl cert'

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (4), 2.0 (1)

2020-04-28 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.4 was issued on 2020-04-02.  There are currently 4 patches in 
the queue cut down this way:
- 4 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.1.5 would be 2020-04-30, which was 
within the last week.

Last release 2.0.14 was issued on 2020-04-02.  There are currently 1 patches in 
the queue cut down this way:
- 1 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.0.15 would be 2020-04-30, which was 
within the last week.

The current list of patches in the queue is:
 - 2.0, 2.1  - MINOR   : protocol_buffer: Wrong maximum 
shifting.
 - 2.1   - MINOR   : ssl: memleak of the struct 
cert_key_and_chain
 - 2.1   - MINOR   : ssl/cli: memory leak in 'set ssl cert'
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (24), 2.0 (1)

2020-05-05 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.4 was issued on 2020-04-02.  There are currently 24 patches in 
the queue cut down this way:
- 10 MEDIUM, first one merged on 2020-05-01
- 14 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.1.5 would be 2020-04-30, which was 
one week ago.

Last release 2.0.14 was issued on 2020-04-02.  There are currently 1 patches in 
the queue cut down this way:
- 1 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.0.15 would be 2020-04-30, which was 
one week ago.

The current list of patches in the queue is:
 - 2.1   - MEDIUM  : shctx: really check the lock's value 
while waiting
 - 2.1   - MEDIUM  : capture: capture.{req,res}.* crash 
without a stream
 - 2.1   - MEDIUM  : http-ana: Handle NTLM messages 
correctly.
 - 2.1   - MEDIUM  : listener: mark the thread as not stuck 
inside the loop
 - 2.1   - MEDIUM  : http: the "unique-id" sample fetch 
could crash without a steeam
 - 2.1   - MEDIUM  : server/checks: Init server check 
during config validity check
 - 2.1   - MEDIUM  : http: the "http_first_req" sample 
fetch could crash without a steeam
 - 2.1   - MEDIUM  : sample: make the CPU and latency 
sample fetches check for a stream
 - 2.1   - MEDIUM  : shctx: bound the number of loops that 
can happen around the lock
 - 2.1   - MEDIUM  : capture: capture-req/capture-res 
converters crash without a stream
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections
 - 2.1   - MINOR   : ssl: default settings for ssl server 
options are not used
 - 2.1   - MINOR   : mux-fcgi: Be sure to have a connection 
as session's origin to use it
 - 2.1   - MINOR   : tools: fix the i386 version of the 
div64_32 function
 - 2.1   - MINOR   : obj_type: Handle stream object in 
obj_base_ptr() function
 - 2.1   - MINOR   : checks: Respect the no-check-ssl option
 - 2.1   - MINOR   : debug: properly use long long instead 
of long for the thread ID
 - 2.1   - MINOR   : peers: Incomplete peers sections 
should be validated.
 - 2.1   - MINOR   : checks: chained expect will not 
properly wait for enough data
 - 2.1   - MINOR   : http: make url_decode() optionally 
convert '+' to SP
 - 2.1   - MINOR   : ssl: memleak of the struct 
cert_key_and_chain
 - 2.1   - MINOR   : check: Update server address and port 
to execute an external check
 - 2.1   - MINOR   : ssl/cli: memory leak in 'set ssl cert'
 - 2.0, 2.1  - MINOR   : protocol_buffer: Wrong maximum 
shifting.

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (27), 2.0 (24)

2020-05-12 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.4 was issued on 2020-04-02.  There are currently 27 patches in 
the queue cut down this way:
- 10 MEDIUM, first one merged on 2020-05-01
- 17 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.1.5 would be 2020-04-30, which was 
two weeks ago.

Last release 2.0.14 was issued on 2020-04-02.  There are currently 24 patches 
in the queue cut down this way:
- 12 MEDIUM, first one merged on 2020-05-07
- 12 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.0.15 would be 2020-04-30, which was 
two weeks ago.

The current list of patches in the queue is:
 - 2.0   - MEDIUM  : backend: don't access a non-existing 
mux from a previous connection
 - 2.0, 2.1  - MEDIUM  : server/checks: Init server check 
during config validity check
 - 2.0, 2.1  - MEDIUM  : http: the "unique-id" sample fetch 
could crash without a steeam
 - 2.0, 2.1  - MEDIUM  : shctx: really check the lock's value 
while waiting
 - 2.0, 2.1  - MEDIUM  : capture: capture.{req,res}.* crash 
without a stream
 - 2.0, 2.1  - MEDIUM  : http-ana: Handle NTLM messages 
correctly.
 - 2.0, 2.1  - MEDIUM  : capture: capture-req/capture-res 
converters crash without a stream
 - 2.0, 2.1  - MEDIUM  : listener: mark the thread as not stuck 
inside the loop
 - 2.0, 2.1  - MEDIUM  : sample: make the CPU and latency 
sample fetches check for a stream
 - 2.0   - MEDIUM  : checks: Always initialize checks 
before starting them
 - 2.0, 2.1  - MEDIUM  : shctx: bound the number of loops that 
can happen around the lock
 - 2.0, 2.1  - MEDIUM  : http: the "http_first_req" sample 
fetch could crash without a steeam
 - 2.0, 2.1  - MINOR   : checks: chained expect will not 
properly wait for enough data
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections"
 - 2.0, 2.1  - MINOR   : ssl: default settings for ssl server 
options are not used
 - 2.0, 2.1  - MINOR   : protocol_buffer: Wrong maximum 
shifting.
 - 2.0, 2.1  - MINOR   : checks: Respect the no-check-ssl option
 - 2.0, 2.1  - MINOR   : http: make url_decode() optionally 
convert '+' to SP
 - 2.1   - MINOR   : ssl: memleak of the struct 
cert_key_and_chain
 - 2.0, 2.1  - MINOR   : checks/server: use_ssl member must be 
signed
 - 2.0, 2.1  - MINOR   : connection: make sure to correctly tag 
local PROXY connections"
 - 2.0, 2.1  - MINOR   : check: Update server address and port 
to execute an external check
 - 2.0, 2.1  - MINOR   : tools: fix the i386 version of the 
div64_32 function
 - 2.0, 2.1  - MINOR   : peers: Incomplete peers sections 
should be validated.
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections
 - 2.0, 2.1  - MINOR   : obj_type: Handle stream object in 
obj_base_ptr() function
 - 2.1   - MINOR   : mux-fcgi: Be sure to have a connection 
as session's origin to use it
 - 2.1   - MINOR   : ssl/cli: memory leak in 'set ssl cert'
 - 2.0, 2.1  - MINOR   : debug: properly use long long instead 
of long for the thread ID

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (27), 2.0 (24)

2020-05-19 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.4 was issued on 2020-04-02.  There are currently 27 patches in 
the queue cut down this way:
- 10 MEDIUM, first one merged on 2020-05-01
- 17 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.1.5 would be 2020-04-30, which was 
three weeks ago.

Last release 2.0.14 was issued on 2020-04-02.  There are currently 24 patches 
in the queue cut down this way:
- 12 MEDIUM, first one merged on 2020-05-07
- 12 MINOR, first one merged on 2020-04-02

Thus the computed ideal release date for 2.0.15 would be 2020-04-30, which was 
three weeks ago.

The current list of patches in the queue is:
 - 2.0, 2.1  - MEDIUM  : server/checks: Init server check 
during config validity check
 - 2.0, 2.1  - MEDIUM  : http: the "http_first_req" sample 
fetch could crash without a steeam
 - 2.0, 2.1  - MEDIUM  : http: the "unique-id" sample fetch 
could crash without a steeam
 - 2.0, 2.1  - MEDIUM  : shctx: bound the number of loops that 
can happen around the lock
 - 2.0, 2.1  - MEDIUM  : capture: capture-req/capture-res 
converters crash without a stream
 - 2.0, 2.1  - MEDIUM  : shctx: really check the lock's value 
while waiting
 - 2.0, 2.1  - MEDIUM  : http-ana: Handle NTLM messages 
correctly.
 - 2.0, 2.1  - MEDIUM  : listener: mark the thread as not stuck 
inside the loop
 - 2.0   - MEDIUM  : backend: don't access a non-existing 
mux from a previous connection
 - 2.0, 2.1  - MEDIUM  : sample: make the CPU and latency 
sample fetches check for a stream
 - 2.0   - MEDIUM  : checks: Always initialize checks 
before starting them
 - 2.0, 2.1  - MEDIUM  : capture: capture.{req,res}.* crash 
without a stream
 - 2.0, 2.1  - MINOR   : protocol_buffer: Wrong maximum 
shifting.
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections
 - 2.0, 2.1  - MINOR   : debug: properly use long long instead 
of long for the thread ID
 - 2.1   - MINOR   : mux-fcgi: Be sure to have a connection 
as session's origin to use it
 - 2.0, 2.1  - MINOR   : ssl: default settings for ssl server 
options are not used
 - 2.0, 2.1  - MINOR   : tools: fix the i386 version of the 
div64_32 function
 - 2.0, 2.1  - MINOR   : checks: chained expect will not 
properly wait for enough data
 - 2.0, 2.1  - MINOR   : http: make url_decode() optionally 
convert '+' to SP
 - 2.0, 2.1  - MINOR   : checks: Respect the no-check-ssl option
 - 2.0, 2.1  - MINOR   : checks/server: use_ssl member must be 
signed
 - 2.1   - MINOR   : ssl/cli: memory leak in 'set ssl cert'
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections"
 - 2.0, 2.1  - MINOR   : connection: make sure to correctly tag 
local PROXY connections"
 - 2.0, 2.1  - MINOR   : check: Update server address and port 
to execute an external check
 - 2.1   - MINOR   : ssl: memleak of the struct 
cert_key_and_chain
 - 2.0, 2.1  - MINOR   : obj_type: Handle stream object in 
obj_base_ptr() function
 - 2.0, 2.1  - MINOR   : peers: Incomplete peers sections 
should be validated.

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (52), 2.0 (45)

2020-05-26 Thread stable-bot
 - 2.1   - MINOR   : ssl: memleak of the struct 
cert_key_and_chain
 - 2.0, 2.1  - MINOR   : debug: properly use long long instead 
of long for the thread ID
 - 2.0, 2.1  - MINOR   : cache: Don't needlessly test "cache" 
keyword in parse_cache_flt()
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections"
 - 2.0, 2.1  - MINOR   : http: make url_decode() optionally 
convert '+' to SP
 - 2.1   - MINOR   : connection: always send address-less 
LOCAL PROXY connections
 - 2.0, 2.1  - MINOR   : peers: Incomplete peers sections 
should be validated.
 - 2.0, 2.1  - MINOR   : threads: fix multiple use of argument 
inside HA_ATOMIC_CAS()
 - 2.1   - MINOR   : ssl/cli: memory leak in 'set ssl cert'
 - 2.0, 2.1  - MINOR   : config: Make use_backend and 
use-server post-parsing less obscur
 - 2.0, 2.1  - MINOR   : check: Update server address and port 
to execute an external check
 - 2.0, 2.1  - MINOR   : server: Fix server_finalize_init() to 
avoid unused variable
 - 2.0, 2.1  - MINOR   : protocol_buffer: Wrong maximum 
shifting.
 - 2.0, 2.1  - MINOR   : checks: chained expect will not 
properly wait for enough data
 - 2.1   - MINOR   : mux-fcgi: Be sure to have a connection 
as session's origin to use it
 - 2.0, 2.1  - MINOR   : http-ana: fix NTLM response parsing 
again
 - 2.0, 2.1  - MINOR   : pools: use %u not %d to report pool 
stats in "show pools"

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (1), 2.0 (48)

2020-06-02 Thread stable-bot
m when a 
port or an addr is specified
 - 2.0   - MINOR   : connection: make sure to correctly tag 
local PROXY connections"
 - 2.0   - MINOR   : checks: Compute the right HTTP request 
length for HTTP health checks
 - 2.0   - MINOR   : http-ana: fix NTLM response parsing 
again
 - 2.0   - MINOR   : checks: Respect the no-check-ssl option
 - 2.0   - MINOR   : lua: Add missing string length for lua 
sticktable lookup
 - 2.0   - MINOR   : threads: fix multiple use of argument 
inside HA_ATOMIC_UPDATE_{MIN,MAX}()
 - 2.0   - MINOR   : sample: Set the correct type when a 
binary is converted to a string
 - 2.0   - MINOR   : checks/server: use_ssl member must be 
signed
 - 2.0   - MINOR   : pollers: remove uneeded free in global 
init

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.0 (55)

2020-06-09 Thread stable-bot
 - 2.0   - MINOR   : config: Make use_backend and 
use-server post-parsing less obscur
 - 2.0   - MINOR   : peers: fix internal/network key type 
mapping.
 - 2.0   - MINOR   : cache: Don't needlessly test "cache" 
keyword in parse_cache_flt()
 - 2.0   - MINOR   : ssl: default settings for ssl server 
options are not used
 - 2.0   - MINOR   : sample: Set the correct type when a 
binary is converted to a string
 - 2.0   - MINOR   : obj_type: Handle stream object in 
obj_base_ptr() function
 - 2.0   - MINOR   : check: Update server address and port 
to execute an external check
 - 2.0   - MINOR   : nameservers: fix error handling in 
parsing of resolv.conf
 - 2.0   - MINOR   : cfgparse: Abort parsing the current 
line if an invalid \x sequence is encountered
 - 2.0   - MINOR   : soft-stop: always wake up waiting 
threads on stopping
 - 2.0   - MINOR   : tools: fix the i386 version of the 
div64_32 function
 - 2.0   - MINOR   : checks: Remove a warning about http 
health checks
 - 2.0   - MINOR   : lua: Add missing string length for lua 
sticktable lookup

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (4)

2020-06-16 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.7 was issued on 2020-06-09.  There are currently 4 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2020-06-12
- 1 MINOR, first one merged on 2020-06-12

Thus the computed ideal release date for 2.1.8 would be 2020-07-10, which is in 
four weeks or less.

The current list of patches in the queue is:
 - 2.1   - MEDIUM  : ssl: crt-list must continue parsing on 
ERR_WARN
 - 2.1   - MEDIUM  : log: don't hold the log lock during 
writev() on a file descriptor
 - 2.1   - MEDIUM  : pattern: fix thread safety of pattern 
matching
 - 2.1   - MINOR   : ssl: fix ssl-{min,max}-ver with 
openssl < 1.1.0

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (4)

2020-06-23 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.7 was issued on 2020-06-09.  There are currently 4 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2020-06-12
- 1 MINOR, first one merged on 2020-06-12

Thus the computed ideal release date for 2.1.8 would be 2020-07-10, which is in 
three weeks or less.

The current list of patches in the queue is:
 - 2.1   - MEDIUM  : pattern: fix thread safety of pattern 
matching
 - 2.1   - MEDIUM  : log: don't hold the log lock during 
writev() on a file descriptor
 - 2.1   - MEDIUM  : ssl: crt-list must continue parsing on 
ERR_WARN
 - 2.1   - MINOR   : ssl: fix ssl-{min,max}-ver with 
openssl < 1.1.0

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (4)

2020-06-30 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.7 was issued on 2020-06-09.  There are currently 4 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2020-06-12
- 1 MINOR, first one merged on 2020-06-12

Thus the computed ideal release date for 2.1.8 would be 2020-07-10, which is in 
two weeks or less.

The current list of patches in the queue is:
 - 2.1   - MEDIUM  : log: don't hold the log lock during 
writev() on a file descriptor
 - 2.1   - MEDIUM  : ssl: crt-list must continue parsing on 
ERR_WARN
 - 2.1   - MEDIUM  : pattern: fix thread safety of pattern 
matching
 - 2.1   - MINOR   : ssl: fix ssl-{min,max}-ver with 
openssl < 1.1.0

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (26)

2020-07-07 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.7 was issued on 2020-06-09.  There are currently 26 patches in 
the queue cut down this way:
- 9 MEDIUM, first one merged on 2020-06-12
- 17 MINOR, first one merged on 2020-06-12

Thus the computed ideal release date for 2.1.8 would be 2020-07-10, which is in 
one week or less.

The current list of patches in the queue is:
 - 2.1   - MEDIUM  : log: don't hold the log lock during 
writev() on a file descriptor
 - 2.1   - MEDIUM  : ssl: crt-list must continue parsing on 
ERR_WARN
 - 2.1   - MEDIUM  : ebtree: use a byte-per-byte memcmp() 
to compare memory blocks
 - 2.1   - MEDIUM  : fetch: Fix hdr_ip misparsing IPv4 
addresses due to missing NUL
 - 2.1   - MEDIUM  : mux-h1: Disable splicing for the 
conn-stream if read0 is received
 - 2.1   - MEDIUM  : mux-h1: Subscribe rather than waking 
up in h1_rcv_buf()
 - 2.1   - MEDIUM  : connection: Continue to recv data to a 
pipe when the FD is not ready
 - 2.1   - MEDIUM  : pattern: Add a trailing \0 to match 
strings only if possible
 - 2.1   - MEDIUM  : pattern: fix thread safety of pattern 
matching
 - 2.1   - MINOR   : proxy: fix dump_server_state()'s 
misuse of the trash
 - 2.1   - MINOR   : ssl: fix ssl-{min,max}-ver with 
openssl < 1.1.0
 - 2.1   - MINOR   : spoe: add missing key length check 
before checking key names
 - 2.1   - MINOR   : cli: allow space escaping on the CLI
 - 2.1   - MINOR   : mux-h1: Fix the splicing in TUNNEL mode
 - 2.1   - MINOR   : mworker/cli: fix the escaping in the 
master CLI
 - 2.1   - MINOR   : spoe: correction of setting bits for 
analyzer
 - 2.1   - MINOR   : http: make smp_fetch_body() report 
that the contents may change
 - 2.1   - MINOR   : systemd: Wait for network to be online
 - 2.1   - MINOR   : backend: Remove CO_FL_SESS_IDLE if a 
client remains on the last server
 - 2.1   - MINOR   : mux-h1: Don't read data from a pipe if 
the mux is unable to receive
 - 2.1   - MINOR   : mux-h1: Disable splicing only if input 
data was processed
 - 2.1   - MINOR   : proxy: always initialize the trash in 
show servers state
 - 2.1   - MINOR   : tcp-rules: tcp-response must check the 
buffer's fullness
 - 2.1   - MINOR   : mworker/cli: fix semicolon escaping in 
master CLI
 - 2.1   - MINOR   : http_ana: clarify connection pointer 
check on L7 retry
 - 2.1   - MINOR   : http_act: don't check capture id in 
backend (2)

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (26), 2.0 (23)

2020-07-14 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.7 was issued on 2020-06-09.  There are currently 26 patches in 
the queue cut down this way:
- 9 MEDIUM, first one merged on 2020-06-12
- 17 MINOR, first one merged on 2020-06-12

Thus the computed ideal release date for 2.1.8 would be 2020-07-10, which was 
within the last week.

Last release 2.0.15 was issued on 2020-06-12.  There are currently 23 patches 
in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-07-10
- 7 MEDIUM, first one merged on 2020-07-07
- 15 MINOR, first one merged on 2020-07-07

Thus the computed ideal release date for 2.0.16 would be 2020-08-07, which is 
in four weeks or less.

The current list of patches in the queue is:
 - 2.0   - MAJOR   : stream: Mark the server address as 
unset on new outgoing connection
 - 2.1   - MEDIUM  : pattern: fix thread safety of pattern 
matching
 - 2.0, 2.1  - MEDIUM  : connection: Continue to recv data to a 
pipe when the FD is not ready
 - 2.0, 2.1  - MEDIUM  : mux-h1: Subscribe rather than waking 
up in h1_rcv_buf()
 - 2.1   - MEDIUM  : log: don't hold the log lock during 
writev() on a file descriptor
 - 2.1   - MEDIUM  : ssl: crt-list must continue parsing on 
ERR_WARN
 - 2.0, 2.1  - MEDIUM  : mux-h1: Disable splicing for the 
conn-stream if read0 is received
 - 2.0, 2.1  - MEDIUM  : fetch: Fix hdr_ip misparsing IPv4 
addresses due to missing NUL
 - 2.0, 2.1  - MEDIUM  : ebtree: use a byte-per-byte memcmp() 
to compare memory blocks
 - 2.0   - MEDIUM  : stream-int: Disable connection retries 
on plain HTTP proxy mode
 - 2.0, 2.1  - MEDIUM  : pattern: Add a trailing \0 to match 
strings only if possible
 - 2.0, 2.1  - MINOR   : tcp-rules: tcp-response must check the 
buffer's fullness
 - 2.0, 2.1  - MINOR   : backend: Remove CO_FL_SESS_IDLE if a 
client remains on the last server
 - 2.0, 2.1  - MINOR   : spoe: correction of setting bits for 
analyzer
 - 2.1   - MINOR   : ssl: fix ssl-{min,max}-ver with 
openssl < 1.1.0
 - 2.0, 2.1  - MINOR   : mux-h1: Disable splicing only if input 
data was processed
 - 2.0, 2.1  - MINOR   : proxy: always initialize the trash in 
show servers state
 - 2.0, 2.1  - MINOR   : spoe: add missing key length check 
before checking key names
 - 2.0, 2.1  - MINOR   : mworker/cli: fix the escaping in the 
master CLI
 - 2.0, 2.1  - MINOR   : http_act: don't check capture id in 
backend (2)
 - 2.0, 2.1  - MINOR   : proxy: fix dump_server_state()'s 
misuse of the trash
 - 2.0, 2.1  - MINOR   : mux-h1: Don't read data from a pipe if 
the mux is unable to receive
 - 2.0, 2.1  - MINOR   : mworker/cli: fix semicolon escaping in 
master CLI
 - 2.0, 2.1  - MINOR   : mux-h1: Fix the splicing in TUNNEL mode
 - 2.0, 2.1  - MINOR   : systemd: Wait for network to be online
 - 2.0, 2.1  - MINOR   : http_ana: clarify connection pointer 
check on L7 retry
 - 2.1   - MINOR   : http: make smp_fetch_body() report 
that the contents may change
 - 2.0, 2.1  - MINOR   : cli: allow space escaping on the CLI

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (18), 2.1 (42), 2.0 (3)

2020-07-21 Thread stable-bot
   - MINOR   : spoe: add missing key length check 
before checking key names
 - 2.1, 2.2  - MINOR   : sample: Free str.area in 
smp_check_const_bool
 - 2.1   - MINOR   : http_ana: clarify connection pointer 
check on L7 retry
 - 2.1   - MINOR   : systemd: Wait for network to be online
 - 2.1   - MINOR   : spoe: correction of setting bits for 
analyzer
 - 2.1, 2.2  - MINOR   : mux-fcgi: Handle empty STDERR record
 - 2.1   - MINOR   : mworker/cli: fix semicolon escaping in 
master CLI
 - 2.1   - MINOR   : mux-h1: Disable splicing only if input 
data was processed
 - 2.0, 2.1  - MINOR   : cfgparse: don't increment linenum on 
incomplete lines
 - 2.1   - MINOR   : ssl: fix ssl-{min,max}-ver with 
openssl < 1.1.0

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (2), 2.1 (48), 2.0 (9)

2020-07-28 Thread stable-bot
2.2 - MINOR   : debug: Don't dump the lua stack if it 
is not initialized
 - 2.0, 2.1  - MINOR   : cfgparse: don't increment linenum on 
incomplete lines
 - 2.1   - MINOR   : sample: Free str.area in 
smp_check_const_bool
 - 2.1   - MINOR   : mux-h1: Don't read data from a pipe if 
the mux is unable to receive
 - 2.1   - MINOR   : mworker/cli: fix the escaping in the 
master CLI
 - 2.1   - MINOR   : mux-fcgi: Set conn state to RECORD_P 
when skipping the record padding
 - 2.1   - MINOR   : backend: Remove CO_FL_SESS_IDLE if a 
client remains on the last server
 - 2.1   - MINOR   : sample: Free str.area in 
smp_check_const_meth
 - 2.1   - MINOR   : mux-fcgi: Set flags on the right 
stream field for empty FCGI_STDOUT
 - 2.0, 2.1  - MINOR   : threads: Don't forget to init each 
thread toremove_lock.
 - 2.1   - MINOR   : mux-fcgi: Handle empty STDERR record
 - 2.1   - MINOR   : tcp-rules: tcp-response must check the 
buffer's fullness

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 1.8 (1)

2020-08-04 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 1.8.26 was issued on 2020-08-03.  There are currently 1 patches in 
the queue cut down this way:
- 1 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in twelve weeks or less.

The current list of patches in the queue is:
 - 1.8   - MINOR   : dns: ignore trailing dot

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (16), 2.1 (12), 2.0 (7), 1.8 (6)

2020-08-11 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.2 was issued on 2020-07-31.  There are currently 16 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-08-05
- 4 MEDIUM, first one merged on 2020-08-05
- 11 MINOR, first one merged on 2020-08-05

Thus the computed ideal release date for 2.2.3 would be 2020-08-19, which is in 
one week or less.

Last release 2.1.8 was issued on 2020-07-31.  There are currently 12 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2020-08-05
- 9 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.1.9 would be 2020-09-04, which is in 
four weeks or less.

Last release 2.0.17 was issued on 2020-07-31.  There are currently 7 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2020-08-05
- 4 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.0.18 would be 2020-10-04, which is 
in eight weeks or less.

Last release 1.8.26 was issued on 2020-08-03.  There are currently 6 patches in 
the queue cut down this way:
- 2 MEDIUM, first one merged on 2020-08-05
- 4 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in eleven weeks or less.

The current list of patches in the queue is:
 - 2.2   - MAJOR   : dns: disabled servers through SRV 
records never recover
 - 1.8, 2.0, 2.1, 2.2- MEDIUM  : map/lua: Return an error if a map 
is loaded during runtime
 - 2.0, 2.1, 2.2 - MEDIUM  : mux-h1: Refresh H1 connection timeout 
after a synchronous send
 - 2.1, 2.2  - MEDIUM  : ssl: memory leak of ocsp data at 
SSL_CTX_free()
 - 2.2   - MEDIUM  : ssl: fix the ssl-skip-self-issued-ca 
option
 - 1.8, 2.0  - MEDIUM  : mux-h2: Don't fail if nothing is 
parsed for a legacy chunk response
 - 2.0, 2.1, 2.2 - MINOR   : snapshots: leak of snapshots on 
deinit()
 - 2.1, 2.2  - MINOR   : lua: Duplicate map name to load it 
when a new Map object is created
 - 1.8, 2.0, 2.1, 2.2- MINOR   : lua: Check argument type to 
convert it to IPv4/IPv6 arg validation
 - 2.1, 2.2  - MINOR   : converters: Store the sink in an arg 
pointer for debug() converter
 - 2.2   - MINOR   : spoa-server: fix size_t format printing
 - 1.8, 2.0, 2.1, 2.2- MINOR   : lua: Check argument type to 
convert it to IP mask in arg validation
 - 1.8, 2.0, 2.1, 2.2- MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 2.1, 2.2  - MINOR   : ssl: fix memory leak at OCSP loading
 - 2.1, 2.2  - MINOR   : lua: Duplicate lua strings in sample 
fetches/converters arg array
 - 2.2   - MINOR   : ssl: ssl-skip-self-issued-ca requires 
>= 1.0.2
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.1, 2.2  - MINOR   : arg: Fix leaks during arguments 
validation for fetches/converters

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (18), 2.1 (13), 2.0 (8), 1.8 (6)

2020-08-18 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.2 was issued on 2020-07-31.  There are currently 18 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-08-05
- 6 MEDIUM, first one merged on 2020-08-05
- 11 MINOR, first one merged on 2020-08-05

Thus the computed ideal release date for 2.2.3 would be 2020-08-19, which was 
within the last week.

Last release 2.1.8 was issued on 2020-07-31.  There are currently 13 patches in 
the queue cut down this way:
- 4 MEDIUM, first one merged on 2020-08-05
- 9 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.1.9 would be 2020-09-04, which is in 
three weeks or less.

Last release 2.0.17 was issued on 2020-07-31.  There are currently 8 patches in 
the queue cut down this way:
- 4 MEDIUM, first one merged on 2020-08-05
- 4 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.0.18 would be 2020-10-04, which is 
in seven weeks or less.

Last release 1.8.26 was issued on 2020-08-03.  There are currently 6 patches in 
the queue cut down this way:
- 2 MEDIUM, first one merged on 2020-08-05
- 4 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in ten weeks or less.

The current list of patches in the queue is:
 - 2.2   - MAJOR   : dns: disabled servers through SRV 
records never recover
 - 2.2   - MEDIUM  : ssl: fix the ssl-skip-self-issued-ca 
option
 - 1.8, 2.0  - MEDIUM  : mux-h2: Don't fail if nothing is 
parsed for a legacy chunk response
 - 2.2   - MEDIUM  : ssl: never generates the chain from 
the verify store
 - 2.0, 2.1, 2.2 - MEDIUM  : mux-h1: Refresh H1 connection timeout 
after a synchronous send
 - 2.0, 2.1, 2.2 - MEDIUM  : htx: smp_prefetch_htx() must always 
validate the direction
 - 2.1, 2.2  - MEDIUM  : ssl: memory leak of ocsp data at 
SSL_CTX_free()
 - 1.8, 2.0, 2.1, 2.2- MEDIUM  : map/lua: Return an error if a map 
is loaded during runtime
 - 2.1, 2.2  - MINOR   : arg: Fix leaks during arguments 
validation for fetches/converters
 - 1.8, 2.0, 2.1, 2.2- MINOR   : lua: Check argument type to 
convert it to IP mask in arg validation
 - 2.1, 2.2  - MINOR   : ssl: fix memory leak at OCSP loading
 - 2.0, 2.1, 2.2 - MINOR   : snapshots: leak of snapshots on 
deinit()
 - 1.8, 2.0, 2.1, 2.2- MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 2.2   - MINOR   : ssl: ssl-skip-self-issued-ca requires 
>= 1.0.2
 - 2.1, 2.2  - MINOR   : lua: Duplicate map name to load it 
when a new Map object is created
 - 2.2   - MINOR   : spoa-server: fix size_t format printing
 - 1.8, 2.0, 2.1, 2.2- MINOR   : lua: Check argument type to 
convert it to IPv4/IPv6 arg validation
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.1, 2.2  - MINOR   : converters: Store the sink in an arg 
pointer for debug() converter
 - 2.1, 2.2  - MINOR   : lua: Duplicate lua strings in sample 
fetches/converters arg array

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (18), 2.1 (13), 2.0 (8), 1.8 (6)

2020-08-25 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.2 was issued on 2020-07-31.  There are currently 18 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-08-05
- 6 MEDIUM, first one merged on 2020-08-05
- 11 MINOR, first one merged on 2020-08-05

Thus the computed ideal release date for 2.2.3 would be 2020-08-19, which was 
one week ago.

Last release 2.1.8 was issued on 2020-07-31.  There are currently 13 patches in 
the queue cut down this way:
- 4 MEDIUM, first one merged on 2020-08-05
- 9 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.1.9 would be 2020-09-04, which is in 
two weeks or less.

Last release 2.0.17 was issued on 2020-07-31.  There are currently 8 patches in 
the queue cut down this way:
- 4 MEDIUM, first one merged on 2020-08-05
- 4 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.0.18 would be 2020-10-04, which is 
in six weeks or less.

Last release 1.8.26 was issued on 2020-08-03.  There are currently 6 patches in 
the queue cut down this way:
- 2 MEDIUM, first one merged on 2020-08-05
- 4 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in nine weeks or less.

The current list of patches in the queue is:
 - 2.2   - MAJOR   : dns: disabled servers through SRV 
records never recover
 - 2.2   - MEDIUM  : ssl: never generates the chain from 
the verify store
 - 2.1, 2.2  - MEDIUM  : ssl: memory leak of ocsp data at 
SSL_CTX_free()
 - 1.8, 2.0  - MEDIUM  : mux-h2: Don't fail if nothing is 
parsed for a legacy chunk response
 - 2.0, 2.1, 2.2 - MEDIUM  : mux-h1: Refresh H1 connection timeout 
after a synchronous send
 - 2.2   - MEDIUM  : ssl: fix the ssl-skip-self-issued-ca 
option
 - 1.8, 2.0, 2.1, 2.2- MEDIUM  : map/lua: Return an error if a map 
is loaded during runtime
 - 2.0, 2.1, 2.2 - MEDIUM  : htx: smp_prefetch_htx() must always 
validate the direction
 - 1.8, 2.0, 2.1, 2.2- MINOR   : lua: Check argument type to 
convert it to IPv4/IPv6 arg validation
 - 2.1, 2.2  - MINOR   : ssl: fix memory leak at OCSP loading
 - 2.1, 2.2  - MINOR   : lua: Duplicate map name to load it 
when a new Map object is created
 - 2.1, 2.2  - MINOR   : arg: Fix leaks during arguments 
validation for fetches/converters
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.0, 2.1, 2.2 - MINOR   : snapshots: leak of snapshots on 
deinit()
 - 2.1, 2.2  - MINOR   : converters: Store the sink in an arg 
pointer for debug() converter
 - 2.2   - MINOR   : ssl: ssl-skip-self-issued-ca requires 
>= 1.0.2
 - 1.8, 2.0, 2.1, 2.2- MINOR   : lua: Check argument type to 
convert it to IP mask in arg validation
 - 2.1, 2.2  - MINOR   : lua: Duplicate lua strings in sample 
fetches/converters arg array
 - 1.8, 2.0, 2.1, 2.2- MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 2.2   - MINOR   : spoa-server: fix size_t format printing

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (23), 2.1 (15), 2.0 (8), 1.8 (6)

2020-09-01 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.2 was issued on 2020-07-31.  There are currently 23 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-08-05
- 9 MEDIUM, first one merged on 2020-08-05
- 13 MINOR, first one merged on 2020-08-05

Thus the computed ideal release date for 2.2.3 would be 2020-08-19, which was 
two weeks ago.

Last release 2.1.8 was issued on 2020-07-31.  There are currently 15 patches in 
the queue cut down this way:
- 4 MEDIUM, first one merged on 2020-08-05
- 11 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.1.9 would be 2020-09-04, which is in 
one week or less.

Last release 2.0.17 was issued on 2020-07-31.  There are currently 8 patches in 
the queue cut down this way:
- 4 MEDIUM, first one merged on 2020-08-05
- 4 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.0.18 would be 2020-10-04, which is 
in five weeks or less.

Last release 1.8.26 was issued on 2020-08-03.  There are currently 6 patches in 
the queue cut down this way:
- 2 MEDIUM, first one merged on 2020-08-05
- 4 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in eight weeks or less.

The current list of patches in the queue is:
 - 2.2   - MAJOR   : dns: disabled servers through SRV 
records never recover
 - 2.2   - MEDIUM  : ssl: never generates the chain from 
the verify store
 - 2.0, 2.1, 2.2 - MEDIUM  : mux-h1: Refresh H1 connection timeout 
after a synchronous send
 - 2.2   - MEDIUM  : ssl: fix ssl_bind_conf double free w/ 
wildcards
 - 2.1, 2.2  - MEDIUM  : ssl: memory leak of ocsp data at 
SSL_CTX_free()
 - 1.8, 2.0  - MEDIUM  : mux-h2: Don't fail if nothing is 
parsed for a legacy chunk response
 - 2.0, 2.1, 2.2 - MEDIUM  : htx: smp_prefetch_htx() must always 
validate the direction
 - 1.8, 2.0, 2.1, 2.2- MEDIUM  : map/lua: Return an error if a map 
is loaded during runtime
 - 2.2   - MEDIUM  : ssl: crt-list negative filters don't 
work
 - 2.2   - MEDIUM  : http-ana: Don't wait to send 1xx 
responses received from servers
 - 2.2   - MEDIUM  : ssl: fix the ssl-skip-self-issued-ca 
option
 - 2.1, 2.2  - MINOR   : reload: do not fail when no socket is 
sent
 - 2.0, 2.1, 2.2 - MINOR   : snapshots: leak of snapshots on 
deinit()
 - 2.1, 2.2  - MINOR   : converters: Store the sink in an arg 
pointer for debug() converter
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.1, 2.2  - MINOR   : arg: Fix leaks during arguments 
validation for fetches/converters
 - 2.1, 2.2  - MINOR   : lua: Duplicate map name to load it 
when a new Map object is created
 - 2.2   - MINOR   : ssl: ssl-skip-self-issued-ca requires 
>= 1.0.2
 - 2.1, 2.2  - MINOR   : ssl: fix memory leak at OCSP loading
 - 1.8, 2.0, 2.1, 2.2- MINOR   : lua: Check argument type to 
convert it to IP mask in arg validation
 - 2.1, 2.2  - MINOR   : lua: Duplicate lua strings in sample 
fetches/converters arg array
 - 2.2   - MINOR   : spoa-server: fix size_t format printing
 - 1.8, 2.0, 2.1, 2.2- MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 2.1, 2.2  - MINOR   : http-rules: Replace path and 
query-string in "replace-path" action
 - 1.8, 2.0, 2.1, 2.2- MINOR   : lua: Check argument type to 
convert it to IPv4/IPv6 arg validation

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (23), 2.0 (16), 1.8 (8)

2020-09-08 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.8 was issued on 2020-07-31.  There are currently 23 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-09-07
- 6 MEDIUM, first one merged on 2020-08-05
- 16 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.1.9 would be 2020-09-04, which was 
within the last week.

Last release 2.0.17 was issued on 2020-07-31.  There are currently 16 patches 
in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-09-07
- 6 MEDIUM, first one merged on 2020-08-05
- 9 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.0.18 would be 2020-10-04, which is 
in four weeks or less.

Last release 1.8.26 was issued on 2020-08-03.  There are currently 8 patches in 
the queue cut down this way:
- 2 MEDIUM, first one merged on 2020-08-05
- 6 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in seven weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MAJOR   : contrib/spoa-server: Fix unhandled 
python call leading to memory leak
 - 2.0, 2.1  - MEDIUM  : mux-h1: Refresh H1 connection timeout 
after a synchronous send
 - 1.8, 2.0  - MEDIUM  : mux-h2: Don't fail if nothing is 
parsed for a legacy chunk response
 - 2.0, 2.1  - MEDIUM  : doc: Fix replace-path action 
description
 - 2.0, 2.1  - MEDIUM  : htx: smp_prefetch_htx() must always 
validate the direction
 - 2.0, 2.1  - MEDIUM  : contrib/spoa-server: Fix ipv4_address 
used instead of ipv6_address
 - 2.1   - MEDIUM  : ssl: memory leak of ocsp data at 
SSL_CTX_free()
 - 1.8, 2.0, 2.1 - MEDIUM  : map/lua: Return an error if a map is 
loaded during runtime
 - 2.1   - MINOR   : http-rules: Replace path and 
query-string in "replace-path" action
 - 1.8, 2.0, 2.1 - MINOR   : lua: Check argument type to convert it 
to IPv4/IPv6 arg validation
 - 2.0, 2.1  - MINOR   : snapshots: leak of snapshots on 
deinit()
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.1   - MINOR   : ssl: fix memory leak at OCSP loading
 - 1.8, 2.0, 2.1 - MINOR   : startup: haproxy -s cause 100% cpu
 - 1.8, 2.0, 2.1 - MINOR   : lua: Check argument type to convert it 
to IP mask in arg validation
 - 1.8, 2.0, 2.1 - MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 2.0, 2.1  - MINOR   : contrib/spoa-server: Ensure ip address 
references are freed
 - 2.1   - MINOR   : lua: Duplicate lua strings in sample 
fetches/converters arg array
 - 2.0, 2.1  - MINOR   : contrib/spoa-server: Do not free 
reference to NULL
 - 1.8, 2.0, 2.1 - MINOR   : reload: do not fail when no socket is 
sent
 - 2.1   - MINOR   : http-rules: Replace path and 
query-string in "replace-path" action"
 - 2.1   - MINOR   : arg: Fix leaks during arguments 
validation for fetches/converters
 - 2.0, 2.1  - MINOR   : contrib/spoa-server: Updating 
references to free in case of failure
 - 2.1   - MINOR   : converters: Store the sink in an arg 
pointer for debug() converter
 - 2.1   - MINOR   : lua: Duplicate map name to load it 
when a new Map object is created

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (1), 2.1 (28), 2.0 (21), 1.8 (11)

2020-09-15 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.3 was issued on 2020-09-08.  There are currently 1 patches in 
the queue cut down this way:
- 1 MEDIUM, first one merged on 2020-09-11

Thus the computed ideal release date for 2.2.4 would be 2020-10-11, which is in 
four weeks or less.

Last release 2.1.8 was issued on 2020-07-31.  There are currently 28 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2020-09-07
- 9 MEDIUM, first one merged on 2020-08-05
- 18 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.1.9 would be 2020-09-04, which was 
one week ago.

Last release 2.0.17 was issued on 2020-07-31.  There are currently 21 patches 
in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-09-07
- 9 MEDIUM, first one merged on 2020-08-05
- 11 MINOR, first one merged on 2020-08-11

Thus the computed ideal release date for 2.0.18 would be 2020-10-04, which is 
in three weeks or less.

Last release 1.8.26 was issued on 2020-08-03.  There are currently 11 patches 
in the queue cut down this way:
- 4 MEDIUM, first one merged on 2020-08-05
- 7 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in six weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MAJOR   : contrib/spoa-server: Fix unhandled 
python call leading to memory leak
 - 2.0, 2.1  - MEDIUM  : contrib/spoa-server: Fix ipv4_address 
used instead of ipv6_address
 - 2.0, 2.1  - MEDIUM  : doc: Fix replace-path action 
description
 - 2.1   - MEDIUM  : ssl: memory leak of ocsp data at 
SSL_CTX_free()
 - 2.0, 2.1  - MEDIUM  : mux-h1: Refresh H1 connection timeout 
after a synchronous send
 - 1.8, 2.0, 2.1 - MEDIUM  : map/lua: Return an error if a map is 
loaded during runtime
 - 2.0, 2.1  - MEDIUM  : htx: smp_prefetch_htx() must always 
validate the direction
 - 2.0, 2.1  - MEDIUM  : mux-h1: always apply the timeout on 
half-closed connections
 - 1.8, 2.0, 2.1, 2.2- MEDIUM  : pattern: Renew the pattern 
expression revision when it is pruned
 - 1.8, 2.0  - MEDIUM  : mux-h2: Don't fail if nothing is 
parsed for a legacy chunk response
 - 1.8, 2.0, 2.1 - MEDIUM  : ssl: check OCSP calloc in 
ssl_sock_load_ocsp()
 - 1.8, 2.0, 2.1 - MINOR   : lua: Check argument type to convert it 
to IP mask in arg validation
 - 2.0, 2.1  - MINOR   : contrib/spoa-server: Updating 
references to free in case of failure
 - 2.1   - MINOR   : ssl: fix memory leak at OCSP loading
 - 1.8, 2.0, 2.1 - MINOR   : lua: Check argument type to convert it 
to IPv4/IPv6 arg validation
 - 2.1   - MINOR   : http-rules: Replace path and 
query-string in "replace-path" action
 - 1.8, 2.0, 2.1 - MINOR   : reload: do not fail when no socket is 
sent
 - 1.8, 2.0, 2.1 - MINOR   : threads: work around a libgcc_s issue 
with chrooting
 - 2.0, 2.1  - MINOR   : snapshots: leak of snapshots on 
deinit()
 - 2.1   - MINOR   : converters: Store the sink in an arg 
pointer for debug() converter
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.1   - MINOR   : lua: Duplicate lua strings in sample 
fetches/converters arg array
 - 1.8, 2.0, 2.1 - MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 1.8, 2.0, 2.1 - MINOR   : startup: haproxy -s cause 100% cpu
 - 2.0, 2.1  - MINOR   : contrib/spoa-server: Ensure ip address 
references are freed
 - 2.0, 2.1  - MINOR   : auth: report valid crypto(3) support 
depending on build options
 - 2.1   - MINOR   : arg: Fix leaks during arguments 
validation for fetches/converters
 - 2.1   - MINOR   : lua: Duplicate map name to load it 
when a new Map object is created
 - 2.0, 2.1  - MINOR   : contrib/spoa-server: Do not free 
reference to NULL
 - 2.1   - MINOR   : http-rules: Replace path and 
query-string in "replace-path" action"

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (11), 2.1 (34), 2.0 (26), 1.8 (11)

2020-09-22 Thread stable-bot
s: Replace path and 
query-string in "replace-path" action
 - 2.0, 2.1, 2.2 - MINOR   : server: report correct error message 
for invalid port on "socks4"
 - 1.8, 2.0, 2.1 - MINOR   : threads: work around a libgcc_s issue 
with chrooting
 - 2.0, 2.1, 2.2 - MINOR   : ssl: verifyhost is case sensitive
 - 2.0, 2.1  - MINOR   : contrib/spoa-server: Do not free 
reference to NULL
 - 1.8, 2.0, 2.1 - MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 2.1   - MINOR   : ssl: fix memory leak at OCSP loading
 - 2.2   - MINOR   : Fix type passed of sizeof() for 
calloc()
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.0, 2.1  - MINOR   : snapshots: leak of snapshots on 
deinit()

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (11), 2.1 (36), 2.0 (26), 1.8 (12)

2020-09-29 Thread stable-bot
- MINOR   : threads: work around a libgcc_s issue 
with chrooting
 - 2.1, 2.2  - MINOR   : Fix memory leaks cfg_parse_peers
 - 2.2   - MINOR   : ssl/crt-list: crt-list could end 
without a \n
 - 1.8, 2.0, 2.1 - MINOR   : lua: Check argument type to convert it 
to IP mask in arg validation
 - 2.0, 2.1  - MINOR   : auth: report valid crypto(3) support 
depending on build options
 - 2.1   - MINOR   : converters: Store the sink in an arg 
pointer for debug() converter
 - 2.1   - MINOR   : lua: Duplicate map name to load it 
when a new Map object is created
 - 2.1   - MINOR   : http-rules: Replace path and 
query-string in "replace-path" action
 - 2.0, 2.1  - MINOR   : contrib/spoa-server: Do not free 
reference to NULL
 - 1.8       - MINOR   : dns: ignore trailing dot

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (3), 2.1 (1), 1.8 (17)

2020-10-06 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.4 was issued on 2020-09-30.  There are currently 3 patches in 
the queue cut down this way:
- 1 MEDIUM, first one merged on 2020-10-02
- 2 MINOR, first one merged on 2020-10-02

Thus the computed ideal release date for 2.2.5 would be 2020-10-30, which is in 
four weeks or less.

Last release 2.1.9 was issued on 2020-09-30.  There are currently 1 patches in 
the queue cut down this way:
- 1 MEDIUM, first one merged on 2020-09-30

Thus the computed ideal release date for 2.1.10 would be 2020-10-30, which is 
in four weeks or less.

Last release 1.8.26 was issued on 2020-08-03.  There are currently 17 patches 
in the queue cut down this way:
- 8 MEDIUM, first one merged on 2020-08-05
- 9 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in three weeks or less.

The current list of patches in the queue is:
 - 1.8   - MEDIUM  : h2: report frame bits only for handled 
types
 - 1.8   - MEDIUM  : ssl: does not look for all SNIs before 
chosing a certificate
 - 1.8   - MEDIUM  : pattern: Renew the pattern expression 
revision when it is pruned
 - 1.8   - MEDIUM  : listeners: do not pause foreign 
listeners
 - 1.8   - MEDIUM  : mux-h2: Don't fail if nothing is 
parsed for a legacy chunk response
 - 2.1   - MEDIUM  : ssl: crt-list negative filters don't 
work
 - 2.2   - MEDIUM  : queue: make pendconn_cond_unlink() 
really thread-safe
 - 1.8   - MEDIUM  : map/lua: Return an error if a map is 
loaded during runtime
 - 1.8   - MEDIUM  : pattern: fix memory leak in regex 
pattern functions
 - 1.8   - MEDIUM  : ssl: check OCSP calloc in 
ssl_sock_load_ocsp()
 - 1.8   - MINOR   : config: Fix memory leak on config 
parse listen
 - 1.8   - MINOR   : reload: do not fail when no socket is 
sent
 - 1.8   - MINOR   : lua: Check argument type to convert it 
to IP mask in arg validation
 - 2.2   - MINOR   : Fix several leaks of 'log_tag' in 
init().
 - 1.8   - MINOR   : startup: haproxy -s cause 100% cpu
 - 1.8   - MINOR   : lua: Check argument type to convert it 
to IPv4/IPv6 arg validation
 - 1.8   - MINOR   : threads: work around a libgcc_s issue 
with chrooting
 - 1.8   - MINOR   : ssl: verifyhost is case sensitive
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.2   - MINOR   : tcpcheck: Set socks4 and send-proxy 
flags before the connect call
 - 1.8   - MINOR   : stats: use strncmp() instead of 
memcmp() on health states

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (11), 2.1 (9), 2.0 (7), 1.8 (18)

2020-10-13 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.4 was issued on 2020-09-30.  There are currently 11 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2020-10-02
- 8 MINOR, first one merged on 2020-10-02

Thus the computed ideal release date for 2.2.5 would be 2020-10-30, which is in 
three weeks or less.

Last release 2.1.9 was issued on 2020-09-30.  There are currently 9 patches in 
the queue cut down this way:
- 4 MEDIUM, first one merged on 2020-09-30
- 5 MINOR, first one merged on 2020-10-08

Thus the computed ideal release date for 2.1.10 would be 2020-10-30, which is 
in three weeks or less.

Last release 2.0.18 was issued on 2020-09-30.  There are currently 7 patches in 
the queue cut down this way:
- 2 MEDIUM, first one merged on 2020-10-08
- 5 MINOR, first one merged on 2020-10-08

Thus the computed ideal release date for 2.0.19 would be 2020-12-03, which is 
in seven weeks or less.

Last release 1.8.26 was issued on 2020-08-03.  There are currently 18 patches 
in the queue cut down this way:
- 8 MEDIUM, first one merged on 2020-08-05
- 10 MINOR, first one merged on 2020-08-03

Thus the computed ideal release date for 1.8.27 would be 2020-10-26, which is 
in two weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1, 2.2 - MEDIUM  : mux-h2: Don't handle pending read0 too 
early on streams
 - 1.8   - MEDIUM  : h2: report frame bits only for handled 
types
 - 2.1, 2.2  - MEDIUM  : mux-fcgi: Don't handle pending read0 
too early on streams
 - 2.1   - MEDIUM  : ssl: crt-list negative filters don't 
work
 - 1.8   - MEDIUM  : ssl: check OCSP calloc in 
ssl_sock_load_ocsp()
 - 1.8   - MEDIUM  : pattern: fix memory leak in regex 
pattern functions
 - 1.8   - MEDIUM  : map/lua: Return an error if a map is 
loaded during runtime
 - 1.8   - MEDIUM  : pattern: Renew the pattern expression 
revision when it is pruned
 - 1.8   - MEDIUM  : mux-h2: Don't fail if nothing is 
parsed for a legacy chunk response
 - 1.8   - MEDIUM  : ssl: does not look for all SNIs before 
chosing a certificate
 - 1.8   - MEDIUM  : listeners: do not pause foreign 
listeners
 - 2.0, 2.1, 2.2 - MEDIUM  : queue: make pendconn_cond_unlink() 
really thread-safe
 - 1.8   - MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 2.2   - MINOR   : http: Fix content-length of the 
default 500 error
 - 1.8   - MINOR   : startup: haproxy -s cause 100% cpu
 - 1.8   - MINOR   : config: Fix memory leak on config 
parse listen
 - 1.8, 2.0, 2.1, 2.2- MINOR   : stats: fix validity of the json 
schema
 - 2.0, 2.1, 2.2 - MINOR   : http-htx: Expect no body for 204/304 
internal HTTP responses
 - 1.8   - MINOR   : ssl: verifyhost is case sensitive
 - 2.0, 2.1, 2.2 - MINOR   : peers: Inconsistency when dumping peer 
status codes.
 - 1.8   - MINOR   : lua: Check argument type to convert it 
to IP mask in arg validation
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 1.8   - MINOR   : threads: work around a libgcc_s issue 
with chrooting
 - 1.8   - MINOR   : lua: Check argument type to convert it 
to IPv4/IPv6 arg validation
 - 2.0, 2.1, 2.2 - MINOR   : mux-h1: Always set the session on 
frontend h1 stream
 - 2.2   - MINOR   : mux-h1: Be sure to only set 
CO_RFL_READ_ONCE for the first read
 - 1.8   - MINOR   : reload: do not fail when no socket is 
sent
 - 2.2   - MINOR   : tcpcheck: Set socks4 and send-proxy 
flags before the connect call
 - 2.0, 2.1, 2.2 - MINOR   : Fix several leaks of 'log_tag' in 
init().

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (20), 2.1 (16), 2.0 (15), 1.8 (20)

2020-10-22 Thread stable-bot
dot
 - 2.0, 2.1, 2.2 - MINOR   : peers: Possible unexpected peer 
seesion reset after collisions.
 - 1.8   - MINOR   : reload: do not fail when no socket is 
sent
 - 2.0, 2.1, 2.2 - MINOR   : Fix several leaks of 'log_tag' in 
init().
 - 1.8   - MINOR   : config: Fix memory leak on config 
parse listen

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (25), 2.1 (18), 2.0 (15), 1.8 (20)

2020-10-27 Thread stable-bot
connections on stopping
 - 2.2   - MINOR   : connection: fix loop iter on 
connection takeover
 - 2.2   - MINOR   : queue: properly report redistributed 
connections
 - 2.0, 2.1, 2.2 - MINOR   : init: only keep rlim_fd_cur if max is 
unlimited
 - 2.0, 2.1, 2.2 - MINOR   : peers: Inconsistency when dumping peer 
status codes.
 - 1.8   - MINOR   : startup: haproxy -s cause 100% cpu
 - 1.8   - MINOR   : ssl: verifyhost is case sensitive
 - 1.8   - MINOR   : lua: Check argument type to convert it 
to IP mask in arg validation
 - 1.8   - MINOR   : config: Fix memory leak on config 
parse listen
 - 1.8   - MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 2.0, 2.1, 2.2 - MINOR   : Fix several leaks of 'log_tag' in 
init().

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (40), 2.1 (35), 2.0 (30), 1.8 (20)

2020-11-03 Thread stable-bot
 
seesion reset after collisions.
 - 2.2   - MINOR   : tcpcheck: Set socks4 and send-proxy 
flags before the connect call
 - 1.8   - MINOR   : threads: work around a libgcc_s issue 
with chrooting
 - 2.0, 2.1, 2.2 - MINOR   : http-htx: Expect no body for 204/304 
internal HTTP responses
 - 1.8   - MINOR   : startup: haproxy -s cause 100% cpu
 - 2.2   - MINOR   : log: fix risk of null deref on error 
path
 - 2.0, 2.1, 2.2 - MINOR   : peers: Inconsistency when dumping peer 
status codes.
 - 1.8   - MINOR   : config: Fix memory leak on config 
parse listen
 - 2.0, 2.1, 2.2 - MINOR   : cache: Inverted variables in 
http_calc_maxage function
 - 2.0, 2.1, 2.2 - MINOR   : queue: properly report redistributed 
connections
 - 2.1, 2.2  - MINOR   : cache: Manage multiple values in 
cache-control header value
 - 2.0, 2.1, 2.2 - MINOR   : http-ana: Don't send payload for 
internal responses to HEAD requests
 - 2.2   - MINOR   : checks: Report a socket error before 
any connection attempt
 - 1.8, 2.0, 2.1, 2.2- MINOR   : stats: fix validity of the json 
schema
 - 1.8   - MINOR   : dns: ignore trailing dot
 - 2.1, 2.2  - MINOR   : disable dynamic OCSP load with 
BoringSSL
 - 1.8   - MINOR   : lua: Check argument type to convert it 
to IP mask in arg validation
 - 2.2   - MINOR   : http: Fix content-length of the 
default 500 error
 - 2.0, 2.1, 2.2 - MINOR   : log: fix memory leak on logsrv parse 
error
 - 2.0, 2.1, 2.2 - MINOR   : lua: initialize sample before using it
 - 2.0, 2.1, 2.2 - MINOR   : mux-h2: do not stop outgoing 
connections on stopping
 - 1.8   - MINOR   : ssl: verifyhost is case sensitive
 - 1.8   - MINOR   : stats: use strncmp() instead of 
memcmp() on health states
 - 1.8   - MINOR   : reload: do not fail when no socket is 
sent
 - 2.0, 2.1, 2.2 - MINOR   : server: fix srv downtime calcul on 
starting
 - 2.1, 2.2  - MINOR   : proxy/server: Skip per-proxy/server 
post-check for disabled proxies
 - 2.0, 2.1, 2.2 - MINOR   : filters: Skip disabled proxies during 
startup only

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (2), 2.2 (3), 2.1 (1)

2020-11-10 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.3.0 was issued on 2020-11-05.  There are currently 2 patches 
in the queue cut down this way:
- 1 MEDIUM, first one merged on 2020-11-06
- 1 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.3.1 would be 2020-12-04, which is in 
four weeks or less.

Last release 2.2.5 was issued on 2020-11-05.  There are currently 3 patches 
in the queue cut down this way:
- 3 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.2.6 would be 2020-12-04, which is in 
four weeks or less.

Last release 2.1.10 was issued on 2020-11-05.  There are currently 1 
patches in the queue cut down this way:
- 1 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.1.11 would be 2020-12-04, which is 
in four weeks or less.

The current list of patches in the queue is:
 - 2.3   - MEDIUM  : ssl/crt-list: correctly insert 
crt-list line if crt already loaded
 - 2.1, 2.2  - MINOR   : http-htx: Just warn if payload of an 
errorfile doesn't match the C-L
 - 2.2   - MINOR   : ssl: double free w/ 
smp_fetch_ssl_x_chain_der()
 - 2.2, 2.3  - MINOR   : ssl: don't report 1024 bits DH param 
load error when it's higher

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (14), 2.1 (9), 2.0 (8)

2020-11-17 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.5 was issued on 2020-11-05.  There are currently 14 
patches in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-11-13
- 2 MEDIUM, first one merged on 2020-11-13
- 11 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.2.6 would be 2020-11-27, which is in 
two weeks or less.

Last release 2.1.10 was issued on 2020-11-05.  There are currently 9 
patches in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-11-13
- 1 MEDIUM, first one merged on 2020-11-13
- 7 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.1.11 would be 2020-11-27, which is 
in two weeks or less.

Last release 2.0.19 was issued on 2020-11-06.  There are currently 8 
patches in the queue cut down this way:
- 1 MAJOR, first one merged on 2020-11-13
- 1 MEDIUM, first one merged on 2020-11-13
- 6 MINOR, first one merged on 2020-11-13

Thus the computed ideal release date for 2.0.20 would be 2020-12-11, which is 
in four weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1, 2.2 - MAJOR   : spoe: Be sure to remove all references 
on a released spoe applet
 - 2.2   - MEDIUM  : check: reuse srv proto only if using 
same mode
 - 2.0, 2.1, 2.2 - MEDIUM  : peers: fix decoding of multi-byte 
length in stick-table messages
 - 2.2   - MINOR   : ssl: don't report 1024 bits DH param 
load error when it's higher
 - 2.2   - MINOR   : tcpcheck: Don't warn on unused rules 
if check option is after
 - 2.2   - MINOR   : http-htx: Handle warnings when parsing 
http-error and http-errors
 - 2.0, 2.1, 2.2 - MINOR   : peers: Missing TX cache entries reset.
 - 2.1, 2.2  - MINOR   : http-htx: Just warn if payload of an 
errorfile doesn't match the C-L
 - 2.0, 2.1, 2.2 - MINOR   : lua: set buffer size during map lookups
 - 2.0, 2.1, 2.2 - MINOR   : peers: Do not ignore a protocol error 
for dictionary entries.
 - 2.0, 2.1, 2.2 - MINOR   : pattern: a sample marked as const 
could be written
 - 2.2   - MINOR   : ssl: double free w/ 
smp_fetch_ssl_x_chain_der()
 - 2.0, 2.1, 2.2 - MINOR   : http-fetch: Fix calls w/o parentheses 
of the cookie sample fetches
 - 2.0, 2.1, 2.2 - MINOR   : http-fetch: Extract cookie value even 
when no cookie name

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (11), 2.2 (20), 2.1 (12), 2.0 (11)

2020-11-24 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.3.1 was issued on 2020-11-13.  There are currently 11 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2020-11-24
- 5 MEDIUM, first one merged on 2020-11-18
- 4 MINOR, first one merged on 2020-11-18

Thus the computed ideal release date for 2.3.2 would be 2020-12-08, which is in 
two weeks or less.

Last release 2.2.5 was issued on 2020-11-05.  There are currently 20 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2020-11-13
- 4 MEDIUM, first one merged on 2020-11-13
- 14 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.2.6 would be 2020-11-27, which is in 
one week or less.

Last release 2.1.10 was issued on 2020-11-05.  There are currently 12 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2020-11-13
- 2 MEDIUM, first one merged on 2020-11-13
- 8 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.1.11 would be 2020-12-11, which is 
in three weeks or less.

Last release 2.0.19 was issued on 2020-11-06.  There are currently 11 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2020-11-13
- 2 MEDIUM, first one merged on 2020-11-13
- 7 MINOR, first one merged on 2020-11-13

Thus the computed ideal release date for 2.0.20 would be 2020-12-11, which is 
in three weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1, 2.2 - MAJOR   : spoe: Be sure to remove all references 
on a released spoe applet
 - 2.0, 2.1, 2.2, 2.3- MAJOR   : filters: Always keep all offsets 
up to date during data filtering
 - 2.3   - MAJOR   : connection: reset conn->owner when 
detaching from session list
 - 2.0, 2.1, 2.2 - MEDIUM  : peers: fix decoding of multi-byte 
length in stick-table messages
 - 2.2   - MEDIUM  : check: reuse srv proto only if using 
same mode
 - 2.2, 2.3  - MEDIUM  : http-ana: Don't eval 
http-after-response ruleset on empty messages
 - 2.3   - MEDIUM  : ssl: error when no certificate are 
found
 - 2.3   - MEDIUM  : ssl/crt-list: fix error when no file 
found
 - 2.3   - MEDIUM  : ssl/crt-list: bundle support broken in 
crt-list
 - 2.0, 2.1, 2.2, 2.3- MEDIUM  : filters: Forward all filtered data 
at the end of http filtering
 - 2.1, 2.2  - MINOR   : http-htx: Just warn if payload of an 
errorfile doesn't match the C-L
 - 2.0, 2.1, 2.2 - MINOR   : http-fetch: Extract cookie value even 
when no cookie name
 - 2.2   - MINOR   : tcpcheck: Don't warn on unused rules 
if check option is after
 - 2.0, 2.1, 2.2, 2.3- MINOR   : http-ana: Don't wait for the body 
of CONNECT requests
 - 2.0, 2.1, 2.2 - MINOR   : pattern: a sample marked as const 
could be written
 - 2.2   - MINOR   : ssl: don't report 1024 bits DH param 
load error when it's higher
 - 2.2   - MINOR   : ssl: double free w/ 
smp_fetch_ssl_x_chain_der()
 - 2.0, 2.1, 2.2 - MINOR   : lua: set buffer size during map lookups
 - 2.0, 2.1, 2.2 - MINOR   : http-fetch: Fix calls w/o parentheses 
of the cookie sample fetches
 - 2.0, 2.1, 2.2 - MINOR   : peers: Missing TX cache entries reset.
 - 2.2, 2.3  - MINOR   : http_htx: Fix searching headers by 
substring
 - 2.2, 2.3  - MINOR   : ssl: segv on startup when AKID but no 
keyid
 - 2.3   - MINOR   : ssl/crt-list: load bundle in crt-list 
only if activated
 - 2.2   - MINOR   : http-htx: Handle warnings when parsing 
http-error and http-errors
 - 2.0, 2.1, 2.2 - MINOR   : peers: Do not ignore a protocol error 
for dictionary entries.

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (12), 2.0 (11)

2020-12-01 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.10 was issued on 2020-11-05.  There are currently 12 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2020-11-13
- 2 MEDIUM, first one merged on 2020-11-13
- 8 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.1.11 would be 2020-12-11, which is 
in two weeks or less.

Last release 2.0.19 was issued on 2020-11-06.  There are currently 11 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2020-11-13
- 2 MEDIUM, first one merged on 2020-11-13
- 7 MINOR, first one merged on 2020-11-13

Thus the computed ideal release date for 2.0.20 would be 2020-12-11, which is 
in two weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MAJOR   : spoe: Be sure to remove all references 
on a released spoe applet
 - 2.0, 2.1  - MAJOR   : filters: Always keep all offsets up to 
date during data filtering
 - 2.0, 2.1  - MEDIUM  : peers: fix decoding of multi-byte 
length in stick-table messages
 - 2.0, 2.1  - MEDIUM  : filters: Forward all filtered data at 
the end of http filtering
 - 2.0, 2.1  - MINOR   : http-fetch: Extract cookie value even 
when no cookie name
 - 2.0, 2.1  - MINOR   : lua: set buffer size during map lookups
 - 2.1   - MINOR   : http-htx: Just warn if payload of an 
errorfile doesn't match the C-L
 - 2.0, 2.1  - MINOR   : http-fetch: Fix calls w/o parentheses 
of the cookie sample fetches
 - 2.0, 2.1  - MINOR   : peers: Do not ignore a protocol error 
for dictionary entries.
 - 2.0, 2.1  - MINOR   : pattern: a sample marked as const 
could be written
 - 2.0, 2.1  - MINOR   : peers: Missing TX cache entries reset.
 - 2.0, 2.1  - MINOR   : http-ana: Don't wait for the body of 
CONNECT requests

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (12), 2.0 (11)

2020-12-08 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.10 was issued on 2020-11-05.  There are currently 12 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2020-11-13
- 2 MEDIUM, first one merged on 2020-11-13
- 8 MINOR, first one merged on 2020-11-06

Thus the computed ideal release date for 2.1.11 would be 2020-12-11, which is 
in one week or less.

Last release 2.0.19 was issued on 2020-11-06.  There are currently 11 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2020-11-13
- 2 MEDIUM, first one merged on 2020-11-13
- 7 MINOR, first one merged on 2020-11-13

Thus the computed ideal release date for 2.0.20 would be 2020-12-11, which is 
in one week or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MAJOR   : spoe: Be sure to remove all references 
on a released spoe applet
 - 2.0, 2.1  - MAJOR   : filters: Always keep all offsets up to 
date during data filtering
 - 2.0, 2.1  - MEDIUM  : peers: fix decoding of multi-byte 
length in stick-table messages
 - 2.0, 2.1  - MEDIUM  : filters: Forward all filtered data at 
the end of http filtering
 - 2.0, 2.1  - MINOR   : http-ana: Don't wait for the body of 
CONNECT requests
 - 2.1   - MINOR   : http-htx: Just warn if payload of an 
errorfile doesn't match the C-L
 - 2.0, 2.1  - MINOR   : lua: set buffer size during map lookups
 - 2.0, 2.1  - MINOR   : pattern: a sample marked as const 
could be written
 - 2.0, 2.1  - MINOR   : peers: Do not ignore a protocol error 
for dictionary entries.
 - 2.0, 2.1  - MINOR   : http-fetch: Extract cookie value even 
when no cookie name
 - 2.0, 2.1  - MINOR   : http-fetch: Fix calls w/o parentheses 
of the cookie sample fetches
 - 2.0, 2.1  - MINOR   : peers: Missing TX cache entries reset.

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (23), 2.2 (17), 2.1 (26), 2.0 (24)

2020-12-15 Thread stable-bot
ors
 - 2.1   - MINOR   : http-htx: Just warn if payload of an 
errorfile doesn't match the C-L
 - 2.2, 2.3  - MINOR   : tcpcheck: Don't rearm the check 
timeout on each read
 - 2.0, 2.1, 2.2, 2.3- MINOR   : lua: lua-load doesn't check its 
parameters
 - 2.1, 2.2, 2.3 - MINOR   : lua: missing "\n" in error message

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (23), 2.2 (17), 2.1 (26), 2.0 (24)

2020-12-22 Thread stable-bot
ed beyond the first one
 - 2.0, 2.1  - MINOR   : lua: set buffer size during map lookups
 - 2.0, 2.1  - MINOR   : http-fetch: Extract cookie value even 
when no cookie name
 - 2.0, 2.1, 2.2, 2.3- MINOR   : lua: Some lua init operation are 
processed unsafe
 - 2.0, 2.1  - MINOR   : pattern: a sample marked as const 
could be written

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (23), 2.2 (17), 2.1 (26), 2.0 (24)

2020-12-29 Thread stable-bot
2, 2.3- MINOR   : tools: make parse_time_err() more 
strict on the timer validity
 - 2.3   - MINOR   : mux-h2/stats: not all GOAWAY frames 
are errors
 - 2.3   - MINOR   : mux-h2/stats: make stream/connection 
proto errors more accurate
 - 2.0, 2.1, 2.2, 2.3- MINOR   : tools: Reject size format not 
starting by a digit

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (23), 2.2 (17), 2.1 (26), 2.0 (24)

2021-01-05 Thread stable-bot
ua-load doesn't check its 
parameters
 - 2.2, 2.3  - MINOR   : mux-h1: Handle keep-alive timeout for 
idle frontend connections
 - 2.0, 2.1  - MINOR   : peers: Do not ignore a protocol error 
for dictionary entries.
 - 2.1   - MINOR   : http-htx: Just warn if payload of an 
errorfile doesn't match the C-L

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (11), 2.2 (10)

2021-01-26 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.3.4 was issued on 2021-01-13.  There are currently 11 
patches in the queue cut down this way:
- 4 MEDIUM, first one merged on 2021-01-26
- 7 MINOR, first one merged on 2021-01-26

Thus the computed ideal release date for 2.3.5 would be 2021-02-23, which is in 
four weeks or less.

Last release 2.2.8 was issued on 2021-01-13.  There are currently 10 
patches in the queue cut down this way:
- 3 MEDIUM, first one merged on 2021-01-26
- 7 MINOR, first one merged on 2021-01-26

Thus the computed ideal release date for 2.2.9 would be 2021-02-23, which is in 
four weeks or less.

The current list of patches in the queue is:
 - 2.3   - MEDIUM  : tcpcheck: Don't destroy connection in 
the wake callback context
 - 2.2, 2.3  - MEDIUM  : stats: add missing INF_BUILD_INFO 
definition
 - 2.2, 2.3  - MEDIUM  : mux-h2: fix read0 handling on partial 
frames
 - 2.2, 2.3  - MEDIUM  : filters/htx: Fix data forwarding when 
payload length is unknown
 - 2.2, 2.3  - MINOR   : peers: Wrong "new_conn" value for 
"show peers" CLI command.
 - 2.2, 2.3  - MINOR   : init: Use a dynamic buffer to set 
HAPROXY_CFGFILES env variable
 - 2.2, 2.3  - MINOR   : mworker: define _GNU_SOURCE for 
strsignal()
 - 2.2, 2.3  - MINOR   : peers: Possible appctx pointer 
dereference.
 - 2.2, 2.3  - MINOR   : threads: Fixes the number of possible 
cpus report for Mac.
 - 2.2, 2.3  - MINOR   : dns: SRV records ignores duplicated AR 
records (v2)
 - 2.2, 2.3  - MINOR   : mux_h2: missing space between "st" and 
".flg" in the "show fd" helper

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (16), 2.2 (10), 2.1 (11), 2.0 (8)

2021-02-02 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.3.4 was issued on 2021-01-13.  There are currently 16 
patches in the queue cut down this way:
- 6 MEDIUM, first one merged on 2021-01-26
- 10 MINOR, first one merged on 2021-01-26

Thus the computed ideal release date for 2.3.5 would be 2021-02-23, which is in 
three weeks or less.

Last release 2.2.8 was issued on 2021-01-13.  There are currently 10 
patches in the queue cut down this way:
- 3 MEDIUM, first one merged on 2021-01-26
- 7 MINOR, first one merged on 2021-01-26

Thus the computed ideal release date for 2.2.9 would be 2021-02-23, which is in 
three weeks or less.

Last release 2.1.11 was issued on 2021-01-08.  There are currently 11 
patches in the queue cut down this way:
- 3 MEDIUM, first one merged on 2021-01-26
- 8 MINOR, first one merged on 2021-01-26

Thus the computed ideal release date for 2.1.12 would be 2021-03-23, which is 
in seven weeks or less.

Last release 2.0.20 was issued on 2021-01-08.  There are currently 8 
patches in the queue cut down this way:
- 3 MEDIUM, first one merged on 2021-01-28
- 5 MINOR, first one merged on 2021-01-28

Thus the computed ideal release date for 2.0.21 would be 2021-03-25, which is 
in seven weeks or less.

The current list of patches in the queue is:
 - 2.3   - MEDIUM  : tcpcheck: Don't destroy connection in 
the wake callback context
 - 2.3   - MEDIUM  : session: only retrieve ready idle conn 
from session
 - 2.0, 2.1, 2.2, 2.3- MEDIUM  : mux-h2: fix read0 handling on 
partial frames
 - 2.0, 2.1, 2.2, 2.3- MEDIUM  : stats: add missing INF_BUILD_INFO 
definition
 - 2.0, 2.1, 2.2, 2.3- MEDIUM  : filters/htx: Fix data forwarding 
when payload length is unknown
 - 2.3   - MEDIUM  : backend: never reuse a connection for 
tcp mode
 - 2.2, 2.3  - MINOR   : peers: Possible appctx pointer 
dereference.
 - 2.0, 2.1, 2.2, 2.3- MINOR   : peers: Wrong "new_conn" value for 
"show peers" CLI command.
 - 2.1, 2.2, 2.3 - MINOR   : threads: Fixes the number of possible 
cpus report for Mac.
 - 2.1, 2.2, 2.3 - MINOR   : mux_h2: missing space between "st" and 
".flg" in the "show fd" helper
 - 2.0, 2.1  - MINOR   : sample: Memory leak of sample_expr 
structure in case of error
 - 2.0, 2.1, 2.2, 2.3- MINOR   : init: Use a dynamic buffer to set 
HAPROXY_CFGFILES env variable
 - 2.0, 2.1  - MINOR   : sample: check alloc_trash_chunk return 
value in concat()
 - 2.1   - MINOR   : init: enforce strict-limits when using 
master-worker
 - 2.3   - MINOR   : config: fix leak on 
proxy.conn_src.bind_hdr_name
 - 2.3   - MINOR   : backend: check available list 
allocation for reuse
 - 2.2, 2.3  - MINOR   : dns: SRV records ignores duplicated AR 
records (v2)
 - 2.0, 2.1, 2.2, 2.3- MINOR   : mworker: define _GNU_SOURCE for 
strsignal()
 - 2.3   - MINOR   : ssl: init tmp chunk correctly in 
ssl_sock_load_sctl_from_file()

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (19), 2.0 (14)

2021-02-09 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.11 was issued on 2021-01-08.  There are currently 19 
patches in the queue cut down this way:
- 7 MEDIUM, first one merged on 2021-01-26
- 12 MINOR, first one merged on 2021-01-26

Thus the computed ideal release date for 2.1.12 would be 2021-03-23, which is 
in six weeks or less.

Last release 2.0.20 was issued on 2021-01-08.  There are currently 14 
patches in the queue cut down this way:
- 6 MEDIUM, first one merged on 2021-01-28
- 8 MINOR, first one merged on 2021-01-28

Thus the computed ideal release date for 2.0.21 would be 2021-03-25, which is 
in six weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MEDIUM  : filters/htx: Fix data forwarding when 
payload length is unknown
 - 2.0, 2.1  - MEDIUM  : ssl: check a connection's status 
before computing a handshake
 - 2.0, 2.1  - MEDIUM  : mux-h2: do not quit the demux loop 
before setting END_REACHED
 - 2.0, 2.1  - MEDIUM  : stats: add missing INF_BUILD_INFO 
definition
 - 2.0, 2.1  - MEDIUM  : mux-h2: fix read0 handling on partial 
frames
 - 2.0, 2.1  - MEDIUM  : mux-h2: handle remaining read0 cases
 - 2.1   - MEDIUM  : ssl/cli: abort ssl cert is freeing the 
old store
 - 2.0, 2.1  - MINOR   : config: fix leak on 
proxy.conn_src.bind_hdr_name
 - 2.0, 2.1  - MINOR   : peers: Wrong "new_conn" value for 
"show peers" CLI command.
 - 2.1   - MINOR   : threads: Fixes the number of possible 
cpus report for Mac.
 - 2.1   - MINOR   : ssl: init tmp chunk correctly in 
ssl_sock_load_sctl_from_file()
 - 2.0, 2.1  - MINOR   : sample: Memory leak of sample_expr 
structure in case of error
 - 2.1   - MINOR   : mux_h2: missing space between "st" and 
".flg" in the "show fd" helper
 - 2.0, 2.1  - MINOR   : stick-table: Always call 
smp_fetch_src() with a valid arg list
 - 2.0, 2.1  - MINOR   : init: Use a dynamic buffer to set 
HAPROXY_CFGFILES env variable
 - 2.0, 2.1  - MINOR   : xxhash: make sure armv6 uses memcpy()
 - 2.0, 2.1  - MINOR   : sample: check alloc_trash_chunk return 
value in concat()
 - 2.0, 2.1  - MINOR   : mworker: define _GNU_SOURCE for 
strsignal()
 - 2.1   - MINOR   : init: enforce strict-limits when using 
master-worker

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (19), 2.0 (15)

2021-02-16 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.11 was issued on 2021-01-08.  There are currently 19 
patches in the queue cut down this way:
- 7 MEDIUM, first one merged on 2021-01-26
- 12 MINOR, first one merged on 2021-01-26

Thus the computed ideal release date for 2.1.12 would be 2021-03-23, which is 
in five weeks or less.

Last release 2.0.20 was issued on 2021-01-08.  There are currently 15 
patches in the queue cut down this way:
- 7 MEDIUM, first one merged on 2021-01-28
- 8 MINOR, first one merged on 2021-01-28

Thus the computed ideal release date for 2.0.21 would be 2021-03-25, which is 
in five weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.1  - MEDIUM  : ssl: check a connection's status 
before computing a handshake
 - 2.0, 2.1  - MEDIUM  : mux-h2: fix read0 handling on partial 
frames
 - 2.0   - MEDIUM  : mux-h2: Be sure to enter in demux loop 
even if dbuf is empty
 - 2.0, 2.1  - MEDIUM  : mux-h2: handle remaining read0 cases
 - 2.1   - MEDIUM  : ssl/cli: abort ssl cert is freeing the 
old store
 - 2.0, 2.1  - MEDIUM  : mux-h2: do not quit the demux loop 
before setting END_REACHED
 - 2.0, 2.1  - MEDIUM  : filters/htx: Fix data forwarding when 
payload length is unknown
 - 2.0, 2.1  - MEDIUM  : stats: add missing INF_BUILD_INFO 
definition
 - 2.0, 2.1  - MINOR   : init: Use a dynamic buffer to set 
HAPROXY_CFGFILES env variable
 - 2.0, 2.1  - MINOR   : peers: Wrong "new_conn" value for 
"show peers" CLI command.
 - 2.0, 2.1  - MINOR   : stick-table: Always call 
smp_fetch_src() with a valid arg list
 - 2.1   - MINOR   : mux_h2: missing space between "st" and 
".flg" in the "show fd" helper
 - 2.0, 2.1  - MINOR   : xxhash: make sure armv6 uses memcpy()
 - 2.0, 2.1  - MINOR   : mworker: define _GNU_SOURCE for 
strsignal()
 - 2.1   - MINOR   : init: enforce strict-limits when using 
master-worker
 - 2.1   - MINOR   : threads: Fixes the number of possible 
cpus report for Mac.
 - 2.0, 2.1  - MINOR   : sample: check alloc_trash_chunk return 
value in concat()
 - 2.1   - MINOR   : ssl: init tmp chunk correctly in 
ssl_sock_load_sctl_from_file()
 - 2.0, 2.1  - MINOR   : config: fix leak on 
proxy.conn_src.bind_hdr_name
 - 2.0, 2.1  - MINOR   : sample: Memory leak of sample_expr 
structure in case of error

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (23), 2.1 (19), 2.0 (15)

2021-02-23 Thread stable-bot
eers: Wrong "new_conn" value for 
"show peers" CLI command.
 - 2.3   - MINOR   : server: Fix server-state-file-name 
directive
 - 2.3   - MINOR   : server: re-align state file fields 
number
 - 2.1   - MINOR   : mux_h2: missing space between "st" and 
".flg" in the "show fd" helper
 - 2.0, 2.1  - MINOR   : xxhash: make sure armv6 uses memcpy()
 - 2.0, 2.1  - MINOR   : sample: check alloc_trash_chunk return 
value in concat()
 - 2.1       - MINOR   : threads: Fixes the number of possible 
cpus report for Mac.

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (41), 2.2 (38), 2.1 (50), 2.0 (43)

2021-03-02 Thread stable-bot
ssible 
cpus report for Mac.
 - 2.3   - MINOR   : stats: fix compare of no-maint url 
suffix
 - 2.0, 2.1, 2.2, 2.3- MINOR   : server: Remove RMAINT from admin 
state when loading server state
 - 2.2, 2.3  - MINOR   : resolvers: Fix condition to release 
received ARs if not assigned
 - 2.0, 2.1, 2.2, 2.3- MINOR   : sample: Always consider zero size 
string samples as unsafe
 - 2.0, 2.1, 2.2, 2.3- MINOR   : server: Don't call fopen() with 
server-state filepath set to NULL
 - 2.0, 2.1  - MINOR   : sample: check alloc_trash_chunk return 
value in concat()
 - 2.0, 2.1, 2.2, 2.3- MINOR   : backend: hold correctly lock when 
killing idle conn
 - 2.1   - MINOR   : mux_h2: missing space between "st" and 
".flg" in the "show fd" helper
 - 2.0, 2.1, 2.2, 2.3- MINOR   : resolvers: new callback to 
properly handle SRV record errors
 - 2.2, 2.3  - MINOR   : resolvers: Only renew TTL for SRV 
records with an additional record
 - 2.0, 2.1, 2.2, 2.3- MINOR   : tools: Fix a memory leak on error 
path in parse_dotted_uints()
 - 2.0, 2.1, 2.2, 2.3- MINOR   : tcp-act: Don't forget to set the 
original port for IPv4 set-dst rule
 - 2.0, 2.1  - MINOR   : peers: Wrong "new_conn" value for 
"show peers" CLI command.
 - 2.0, 2.1, 2.2, 2.3- MINOR   : cfgparse: do not mention 
"addr:port" as supported on proxy lines
 - 2.0, 2.1  - MINOR   : mworker: define _GNU_SOURCE for 
strsignal()
 - 2.0, 2.1  - MINOR   : config: fix leak on 
proxy.conn_src.bind_hdr_name
 - 2.0, 2.1  - MINOR   : xxhash: make sure armv6 uses memcpy()
 - 2.1, 2.2, 2.3 - MINOR   : http-ana: Don't increment HTTP error 
counter on internal errors
 - 2.1, 2.2, 2.3 - MINOR   : ssl/cli: potential null pointer 
dereference in "set ssl cert"
 - 2.0, 2.1, 2.2, 2.3- MINOR   : sample: secure convs that accept 
base64 string and var name as args
 - 2.0, 2.1, 2.2, 2.3- MINOR   : http-ana: Only consider dst 
address to process originalto option
 - 2.1   - MINOR   : ssl: init tmp chunk correctly in 
ssl_sock_load_sctl_from_file()
 - 2.2, 2.3  - MINOR   : fd: properly wait for !running_mask in 
fd_set_running_excl()
 - 2.0, 2.1, 2.2, 2.3- MINOR   : server: Be sure to cut the last 
parsed field of a server-state line
 - 2.0, 2.1, 2.2, 2.3- MINOR   : connection: Use the client's dst 
family for adressless servers
 - 2.0, 2.1, 2.2, 2.3- MINOR   : proxy: wake up all threads when 
sending the hard-stop signal
 - 2.0, 2.1, 2.2, 2.3- MINOR   : session: atomically increment the 
tracked sessions counter

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (4), 2.2 (1), 2.1 (55), 2.0 (45)

2021-03-09 Thread stable-bot
buf()
 - 2.0, 2.1  - MINOR   : server: re-align state file fields 
number
 - 2.0, 2.1  - MINOR   : checks: properly handle wrapping time 
in __health_adjust()
 - 2.0, 2.1  - MINOR   : tcp-act: Don't forget to set the 
original port for IPv4 set-dst rule
 - 2.1   - MINOR   : ssl/cli: potential null pointer 
dereference in "set ssl cert"
 - 2.1   - MINOR   : threads: Fixes the number of possible 
cpus report for Mac.
 - 2.0, 2.1  - MINOR   : http-ana: Don't increment HTTP error 
counter on read error/timeout
 - 2.0, 2.1  - MINOR   : resolvers: new callback to properly 
handle SRV record errors
 - 2.0, 2.1  - MINOR   : server: Fix server-state-file-name 
directive
 - 2.0, 2.1  - MINOR   : backend: hold correctly lock when 
killing idle conn
 - 2.1   - MINOR   : stats: revert the change on ST_CONVDONE
 - 2.0, 2.1  - MINOR   : mworker: define _GNU_SOURCE for 
strsignal()
 - 2.0, 2.1  - MINOR   : init: Use a dynamic buffer to set 
HAPROXY_CFGFILES env variable
 - 2.1   - MINOR   : ssl: init tmp chunk correctly in 
ssl_sock_load_sctl_from_file()
 - 2.0, 2.1  - MINOR   : stick-table: Always call 
smp_fetch_src() with a valid arg list
 - 2.3   - MINOR   : mt-list: always perform a cpu_relax 
call on failure
 - 2.1   - MINOR   : mux-h2: Fix typo in scheme adjustment
 - 2.0, 2.1  - MINOR   : sample: Memory leak of sample_expr 
structure in case of error
 - 2.0, 2.1  - MINOR   : server: Be sure to cut the last parsed 
field of a server-state line
 - 2.0, 2.1  - MINOR   : server: Init params before parsing a 
new server-state line
 - 2.1   - MINOR   : mux_h2: missing space between "st" and 
".flg" in the "show fd" helper
 - 2.0, 2.1  - MINOR   : session: atomically increment the 
tracked sessions counter
 - 2.0, 2.1  - MINOR   : config: fix leak on 
proxy.conn_src.bind_hdr_name
 - 2.0, 2.1  - MINOR   : proxy: wake up all threads when 
sending the hard-stop signal
 - 2.0, 2.1  - MINOR   : http-ana: Only consider dst address to 
process originalto option
 - 2.3   - MINOR   : ssl: don't truncate the file 
descriptor to 16 bits in debug mode
 - 2.0, 2.1  - MINOR   : xxhash: make sure armv6 uses memcpy()

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (10), 2.1 (55), 2.0 (45)

2021-03-16 Thread stable-bot
rt the change on ST_CONVDONE
 - 2.0, 2.1  - MINOR   : sample: check alloc_trash_chunk return 
value in concat()
 - 2.2   - MINOR   : session: Add some forgotten tests on 
session's listener
 - 2.0, 2.1  - MINOR   : http-ana: Don't increment HTTP error 
counter on read error/timeout
 - 2.0, 2.1  - MINOR   : server: Fix server-state-file-name 
directive
 - 2.0, 2.1  - MINOR   : checks: properly handle wrapping time 
in __health_adjust()
 - 2.0, 2.1  - MINOR   : mux-h1: Immediately report H1C errors 
from h1_snd_buf()
 - 2.0, 2.1  - MINOR   : server: re-align state file fields 
number
 - 2.0, 2.1  - MINOR   : server: Be sure to cut the last parsed 
field of a server-state line
 - 2.0, 2.1  - MINOR   : tcp-act: Don't forget to set the 
original port for IPv4 set-dst rule
 - 2.1   - MINOR   : threads: Fixes the number of possible 
cpus report for Mac.
 - 2.0, 2.1  - MINOR   : tools: Fix a memory leak on error path 
in parse_dotted_uints()
 - 2.0, 2.1  - MINOR   : config: fix leak on 
proxy.conn_src.bind_hdr_name
 - 2.0, 2.1  - MINOR   : server: Remove RMAINT from admin state 
when loading server state
 - 2.2   - MINOR   : tcpcheck: Fix double free on error 
path when parsing tcp/http-check
 - 2.2   - MINOR   : tcpcheck: Update .health threshold of 
agent inside an agent-check
 - 2.0, 2.1  - MINOR   : mworker: define _GNU_SOURCE for 
strsignal()
 - 2.0, 2.1  - MINOR   : sample: secure convs that accept 
base64 string and var name as args
 - 2.0, 2.1  - MINOR   : resolvers: new callback to properly 
handle SRV record errors
 - 2.1   - MINOR   : ssl: init tmp chunk correctly in 
ssl_sock_load_sctl_from_file()
 - 2.0, 2.1  - MINOR   : connection: Use the client's dst 
family for adressless servers
 - 2.0, 2.1  - MINOR   : session: atomically increment the 
tracked sessions counter
 - 2.0, 2.1  - MINOR   : xxhash: make sure armv6 uses memcpy()
 - 2.1   - MINOR   : ssl/cli: potential null pointer 
dereference in "set ssl cert"
 - 2.0, 2.1  - MINOR   : sample: Always consider zero size 
string samples as unsafe
 - 2.0, 2.1  - MINOR   : proxy: wake up all threads when 
sending the hard-stop signal
 - 2.0, 2.1  - MINOR   : cfgparse: do not mention "addr:port" 
as supported on proxy lines
 - 2.0, 2.1  - MINOR   : backend: hold correctly lock when 
killing idle conn
 - 2.0, 2.1  - MINOR   : init: Use a dynamic buffer to set 
HAPROXY_CFGFILES env variable
 - 2.0, 2.1  - MINOR   : sample: Memory leak of sample_expr 
structure in case of error

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (6), 2.2 (3)

2021-03-23 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.3.7 was issued on 2021-03-16.  There are currently 6 patches 
in the queue cut down this way:
- 1 BUG, first one merged on 2021-03-23
- 3 MEDIUM, first one merged on 2021-03-22
- 2 MINOR, first one merged on 2021-03-18

Thus the computed ideal release date for 2.3.8 would be 2021-04-15, which is in 
three weeks or less.

Last release 2.2.11 was issued on 2021-03-18.  There are currently 3 
patches in the queue cut down this way:
- 1 BUG, first one merged on 2021-03-23
- 2 MEDIUM, first one merged on 2021-03-23

Thus the computed ideal release date for 2.2.12 would be 2021-04-20, which is 
in four weeks or less.

The current list of patches in the queue is:
 - 2.2, 2.3  - BUG : mworker/cli: do not use the unix_bind 
prefix for the master CLI socket
 - 2.3   - MEDIUM  : mux-fcgi: Fix locking of idle_conns 
lock in the FCGI I/O callback
 - 2.2, 2.3  - MEDIUM  : debug/lua: Don't dump the lua stack if 
not dumpable
 - 2.2, 2.3  - MEDIUM  : freq_ctr/threads: use the 
global_now_ms variable
 - 2.3   - MINOR   : protocol: add missing support of dgram 
unix socket.
 - 2.3   - MINOR   : freq_ctr/threads: make use of the last 
updated global time

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.2 (8), 2.0 (4)

2021-03-30 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.2.11 was issued on 2021-03-18.  There are currently 8 
patches in the queue cut down this way:
- 1 BUG, first one merged on 2021-03-23
- 6 MEDIUM, first one merged on 2021-03-23
- 1 MINOR, first one merged on 2021-03-24

Thus the computed ideal release date for 2.2.12 would be 2021-04-20, which is 
in three weeks or less.

Last release 2.0.21 was issued on 2021-03-18.  There are currently 4 
patches in the queue cut down this way:
- 1 BUG, first one merged on 2021-03-24
- 3 MEDIUM, first one merged on 2021-03-24

Thus the computed ideal release date for 2.0.22 would be 2021-05-19, which is 
in seven weeks or less.

The current list of patches in the queue is:
 - 2.0, 2.2  - BUG : mworker/cli: do not use the unix_bind 
prefix for the master CLI socket
 - 2.2   - MEDIUM  : fd: do not wait on FD removal in 
fd_delete()
 - 2.0, 2.2  - MEDIUM  : lua: Always init the lua stack before 
referencing the context
 - 2.0, 2.2  - MEDIUM  : freq_ctr/threads: use the 
global_now_ms variable
 - 2.2   - MEDIUM  : debug/lua: Don't dump the lua stack if 
not dumpable
 - 2.2   - MEDIUM  : fd: Take the fd_mig_lock when closing 
if no DWCAS is available.
 - 2.0, 2.2  - MEDIUM  : debug/lua: Use internal hlua function 
to dump the lua traceback
 - 2.2   - MINOR   : ssl: Prevent disk access when using 
"add ssl crt-list"

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (5), 2.1 (7), 2.0 (11)

2021-04-06 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.3.9 was issued on 2021-03-30.  There are currently 5 patches 
in the queue cut down this way:
- 5 MINOR, first one merged on 2021-03-31

Thus the computed ideal release date for 2.3.10 would be 2021-04-28, which is 
in three weeks or less.

Last release 2.1.12 was issued on 2021-03-18.  There are currently 7 
patches in the queue cut down this way:
- 4 MEDIUM, first one merged on 2021-03-31
- 3 MINOR, first one merged on 2021-03-31

Thus the computed ideal release date for 2.1.13 would be 2021-05-26, which is 
in seven weeks or less.

Last release 2.0.21 was issued on 2021-03-18.  There are currently 11 
patches in the queue cut down this way:
- 1 BUG, first one merged on 2021-03-24
- 6 MEDIUM, first one merged on 2021-03-24
- 4 MINOR, first one merged on 2021-03-31

Thus the computed ideal release date for 2.0.22 would be 2021-05-19, which is 
in six weeks or less.

The current list of patches in the queue is:
 - 2.0   - BUG : mworker/cli: do not use the unix_bind 
prefix for the master CLI socket
 - 2.0, 2.1  - MEDIUM  : thread: Fix a deadlock if an isolated 
thread is marked as harmless
 - 2.0   - MEDIUM  : lua: Always init the lua stack before 
referencing the context
 - 2.0   - MEDIUM  : debug/lua: Use internal hlua function 
to dump the lua traceback
 - 2.0, 2.1  - MEDIUM  : mux-h1: make h1_shutw_conn() idempotent
 - 2.0, 2.1  - MEDIUM  : freq_ctr/threads: use the 
global_now_ms variable
 - 2.0, 2.1  - MEDIUM  : time: make sure to always initialize 
the global tick
 - 2.0, 2.1  - MINOR   : http_fetch: make hdr_ip() reject 
trailing characters
 - 2.0, 2.1, 2.3 - MINOR   : tcp: fix silent-drop workaround for 
IPv6
 - 2.0   - MINOR   : stats: Apply proper styles in HTML 
status page.
 - 2.3   - MINOR   : ssl: Fix update of default certificate
 - 2.3   - MINOR   : ssl: Add missing free on SSL_CTX in 
ckch_inst_free
 - 2.0, 2.1, 2.3 - MINOR   : http_fetch: make hdr_ip() resistant to 
empty fields
 - 2.3   - MINOR   : ssl: Prevent removal of crt-list line 
if the instance is a default one

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (5), 2.1 (14)

2021-04-13 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.3.9 was issued on 2021-03-30.  There are currently 5 patches 
in the queue cut down this way:
- 5 MINOR, first one merged on 2021-03-31

Thus the computed ideal release date for 2.3.10 would be 2021-04-28, which is 
in two weeks or less.

Last release 2.1.12 was issued on 2021-03-18.  There are currently 14 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2021-04-09
- 7 MEDIUM, first one merged on 2021-03-31
- 5 MINOR, first one merged on 2021-03-31

Thus the computed ideal release date for 2.1.13 would be 2021-05-07, which is 
in four weeks or less.

The current list of patches in the queue is:
 - 2.1   - MAJOR   : dns: fix null pointer dereference in 
snr_update_srv_status
 - 2.1   - MAJOR   : dns: disabled servers through SRV 
records never recover
 - 2.1   - MEDIUM  : thread: Fix a deadlock if an isolated 
thread is marked as harmless
 - 2.1   - MEDIUM  : freq_ctr/threads: use the 
global_now_ms variable
 - 2.1   - MEDIUM  : debug/lua: Use internal hlua function 
to dump the lua traceback
 - 2.1   - MEDIUM  : resolvers: Don't release resolution 
from a requester callbacks
 - 2.1   - MEDIUM  : time: make sure to always initialize 
the global tick
 - 2.1   - MEDIUM  : mux-h1: make h1_shutw_conn() idempotent
 - 2.1   - MEDIUM  : lua: Always init the lua stack before 
referencing the context
 - 2.1   - MINOR   : stats: Apply proper styles in HTML 
status page.
 - 2.1, 2.3  - MINOR   : tcp: fix silent-drop workaround for 
IPv6
 - 2.1, 2.3  - MINOR   : http_fetch: make hdr_ip() resistant to 
empty fields
 - 2.3   - MINOR   : ssl: Fix update of default certificate
 - 2.3   - MINOR   : ssl: Add missing free on SSL_CTX in 
ckch_inst_free
 - 2.1   - MINOR   : http_fetch: make hdr_ip() reject 
trailing characters
 - 2.1   - MINOR   : resolvers: Unlink DNS resolution to 
set RMAINT on SRV resolution
 - 2.3   - MINOR   : ssl: Prevent removal of crt-list line 
if the instance is a default one

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (5), 2.1 (15)

2021-04-20 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.3.9 was issued on 2021-03-30.  There are currently 5 patches 
in the queue cut down this way:
- 5 MINOR, first one merged on 2021-03-31

Thus the computed ideal release date for 2.3.10 would be 2021-04-28, which is 
in one week or less.

Last release 2.1.12 was issued on 2021-03-18.  There are currently 15 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2021-04-09
- 8 MEDIUM, first one merged on 2021-03-31
- 5 MINOR, first one merged on 2021-03-31

Thus the computed ideal release date for 2.1.13 would be 2021-05-07, which is 
in three weeks or less.

The current list of patches in the queue is:
 - 2.1   - MAJOR   : dns: disabled servers through SRV 
records never recover
 - 2.1   - MAJOR   : dns: fix null pointer dereference in 
snr_update_srv_status
 - 2.1   - MEDIUM  : debug/lua: Use internal hlua function 
to dump the lua traceback
 - 2.1   - MEDIUM  : task: close a possible data race 
condition on a tasklet's list link
 - 2.1   - MEDIUM  : resolvers: Don't release resolution 
from a requester callbacks
 - 2.1   - MEDIUM  : time: make sure to always initialize 
the global tick
 - 2.1   - MEDIUM  : thread: Fix a deadlock if an isolated 
thread is marked as harmless
 - 2.1   - MEDIUM  : lua: Always init the lua stack before 
referencing the context
 - 2.1   - MEDIUM  : freq_ctr/threads: use the 
global_now_ms variable
 - 2.1   - MEDIUM  : mux-h1: make h1_shutw_conn() idempotent
 - 2.3   - MINOR   : ssl: Prevent removal of crt-list line 
if the instance is a default one
 - 2.3   - MINOR   : ssl: Fix update of default certificate
 - 2.1   - MINOR   : http_fetch: make hdr_ip() reject 
trailing characters
 - 2.1   - MINOR   : resolvers: Unlink DNS resolution to 
set RMAINT on SRV resolution
 - 2.1, 2.3  - MINOR   : http_fetch: make hdr_ip() resistant to 
empty fields
 - 2.1   - MINOR   : stats: Apply proper styles in HTML 
status page.
 - 2.1, 2.3  - MINOR   : tcp: fix silent-drop workaround for 
IPv6
 - 2.3   - MINOR   : ssl: Add missing free on SSL_CTX in 
ckch_inst_free

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.1 (15)

2021-04-27 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.12 was issued on 2021-03-18.  There are currently 15 
patches in the queue cut down this way:
- 2 MAJOR, first one merged on 2021-04-09
- 8 MEDIUM, first one merged on 2021-03-31
- 5 MINOR, first one merged on 2021-03-31

Thus the computed ideal release date for 2.1.13 would be 2021-05-07, which is 
in two weeks or less.

The current list of patches in the queue is:
 - 2.1   - MAJOR   : dns: disabled servers through SRV 
records never recover
 - 2.1   - MAJOR   : dns: fix null pointer dereference in 
snr_update_srv_status
 - 2.1   - MEDIUM  : debug/lua: Use internal hlua function 
to dump the lua traceback
 - 2.1   - MEDIUM  : resolvers: Don't release resolution 
from a requester callbacks
 - 2.1   - MEDIUM  : freq_ctr/threads: use the 
global_now_ms variable
 - 2.1   - MEDIUM  : task: close a possible data race 
condition on a tasklet's list link
 - 2.1   - MEDIUM  : time: make sure to always initialize 
the global tick
 - 2.1   - MEDIUM  : lua: Always init the lua stack before 
referencing the context
 - 2.1   - MEDIUM  : mux-h1: make h1_shutw_conn() idempotent
 - 2.1   - MEDIUM  : thread: Fix a deadlock if an isolated 
thread is marked as harmless
 - 2.1   - MINOR   : resolvers: Unlink DNS resolution to 
set RMAINT on SRV resolution
 - 2.1   - MINOR   : http_fetch: make hdr_ip() reject 
trailing characters
 - 2.1   - MINOR   : http_fetch: make hdr_ip() resistant to 
empty fields
 - 2.1   - MINOR   : tcp: fix silent-drop workaround for 
IPv6
 - 2.1   - MINOR   : stats: Apply proper styles in HTML 
status page.

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: Bugfixes waiting for a release 2.3 (10), 2.1 (44), 2.0 (26)

2021-05-04 Thread stable-bot
 already forwarded
 - 2.1   - MINOR   : tcp: fix silent-drop workaround for 
IPv6
 - 2.0, 2.1  - MINOR   : logs: Report the true number of 
retries if there was no connection
 - 2.0, 2.1  - MINOR   : mux-h1: Release idle server H1 
connection if data are received
 - 2.1   - MINOR   : http_fetch: make hdr_ip() reject 
trailing characters
 - 2.0, 2.1  - MINOR   : tools: fix parsing "us" unit for timers
 - 2.1   - MINOR   : http_fetch: make hdr_ip() resistant to 
empty fields
 - 2.0, 2.1  - MINOR   : server: free srv.lb_nodes in 
free_server
 - 2.1   - MINOR   : resolvers: Unlink DNS resolution to 
set RMAINT on SRV resolution
 - 2.0, 2.1, 2.3 - MINOR   : htx: Preserve HTX flags when draining 
data from an HTX message

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: NOTICE: 31 bug fixes in queue for next release

2019-01-05 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.0 was issued on 2018/12/19.  There are currently 31 patches in 
the queue cut down this way:
- 6 MAJOR, first one merged on 2019/01/04
- 20 MEDIUM, first one merged on 2019/01/04
- 5 MINOR, first one merged on 2019/01/04

Thus the computed ideal release date for 1.9.1 would be 2019/01/18, which is in 
two weeks or less.

The current list of patches in the queue is:
- MAJOR   : htx: Return the good block address after a defrag
- MAJOR   : servers: Use the list api correctly to avoid crashes.
- MAJOR   : stream-int: Update the stream expiration date in 
stream_int_notify()
- MAJOR   : sessions: Use an unlimited number of servers for the conn list.
- MAJOR   : servers: Correctly use LIST_ELEM().
- MAJOR   : connections: Close the connection before freeing it.
- MEDIUM  : servers: Don't try to reuse connection if we switched server.
- MEDIUM  : mux_h2: Don't add to the idle list if we're full.
- MEDIUM  : proto-htx: Set SI_FL_NOHALF on server side when request is done
- MEDIUM  : server: Also copy "check-sni" for server templates.
- MEDIUM  : log: don't mark log FDs as non-blocking on terminals
- MEDIUM  : mux-h1: make HTX chunking consistent with H2
- MEDIUM  : tasks: Decrement tasks_run_queue in tasklet_free().
- MEDIUM  : mux-h2: Don't forget to quit the send list on error reports
- MEDIUM  : servers: Flag the stream_interface on handshake error.
- MEDIUM  : h2: Don't forget to quit the sending_list if 
SUB_CALL_UNSUBSCRIBE.
- MEDIUM  : mux-h1: use per-direction flags to indicate transitions
- MEDIUM  : mux-h2: mark that we have too many CS once we have more than 
the max
- MEDIUM  : mux-h1: don't enforce chunked encoding on requests
- MEDIUM  : servers: Fail if we fail to allocate a conn_stream.
- MEDIUM  : mux-h2: don't needlessly wake up the demux on short frames
- MEDIUM  : mux-h1: Add a task to handle connection timeouts
- MEDIUM  : dns: overflowed dns name start position causing invalid dns 
error
- MEDIUM  : mux-h2: always restart reading if data are available
- MEDIUM  : dns: Don't prevent reading the last byte of the payload in 
dns_validate_response()
- MEDIUM  : cache: Be sure to end the forwarding when XFER length is unknown
- MINOR   : mux-h2: make empty HEADERS frame return a connection error
- MINOR   : htx: send the proper authenticate header when using 
http-request auth
- MINOR   : mux-h2: don't check the CS count in h2c_bck_handle_headers()
- MINOR   : compression/htx: Don't add the last block of data if it is empty
- MINOR   : compression/htx: Don't compress responses with unknown body 
length

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: NOTICE: 22 bug fixes in queue for next release

2019-01-26 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.2 was issued on 2019/01/16.  There are currently 22 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/01/26
- 8 MEDIUM, first one merged on 2019/01/21
- 13 MINOR, first one merged on 2019/01/21

Thus the computed ideal release date for 1.9.3 would be 2019/02/09, which is in 
two weeks or less.

The current list of patches in the queue is:
- MAJOR   : mux-h2: don't destroy the stream on failed allocation in 
h2_snd_buf()
- MEDIUM  : mux-h2: properly abort on trailers decoding errors
- MEDIUM  : connections: Add the CO_FL_CONNECTED flag if a send succeeded.
- MEDIUM  : checks: fix recent regression on agent-check making it crash
- MEDIUM  : mux-h2/htx: Respect the channel's reserve
- MEDIUM  : servers: Make assign_tproxy_address work when ALPN is set.
- MEDIUM  : backend: never try to attach to a mux having no more stream 
available
- MEDIUM  : ssl: Fix handling of TLS 1.3 KeyUpdate messages
- MEDIUM  : backend: also remove from idle list muxes that have no more room
- MINOR   : mux-h2: refuse to allocate a stream with too high an ID
- MINOR   : server: don't always trust srv_check_health when loading a 
server state
- MINOR   : mux-h2: make it possible to set the error code on an already 
closed stream
- MINOR   : mux-h2: always check the stream ID limit in h2_avail_streams()
- MINOR   : mux-h1: Apply the reserve on the channel's buffer only
- MINOR   : hpack: return a compression error on invalid table size updates
- MINOR   : stream: take care of synchronous errors when trying to send
- MINOR   : mux-h2: headers-type frames in HREM are always a connection 
error
- MINOR   : mux-h2: CONTINUATION in closed state must always return GOAWAY
- MINOR   : proto-htx: Return an error if all headers cannot be received at 
once
- MINOR   : startup: certain goto paths in init_pollers fail to free
- MINOR   : mux-h1: avoid copying output over itself in zero-copy
- MINOR   : check: Wake the check task if the check is finished in 
wake_srv_chk()

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 10 bug fixes in queue for next release

2019-02-02 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.17 was issued on 2019/01/08.  There are currently 10 patches 
in the queue cut down this way:
- 1 MAJOR, first one merged on 2019/01/28
- 3 MEDIUM, first one merged on 2019/01/28
- 6 MINOR, first one merged on 2019/01/28

Thus the computed ideal release date for 1.8.18 would be 2019/02/11, which is 
in one week or less.

The current list of patches in the queue is:
- MAJOR   : cache: fix confusion between zero and uninitialized cache key
- MEDIUM  : ssl: missing allocation failure checks loading tls key file
- MEDIUM  : ssl: Fix handling of TLS 1.3 KeyUpdate messages
- MEDIUM  : ssl: Disable anti-replay protection and set max data with 0RTT.
- MINOR   : server: don't always trust srv_check_health when loading a 
server state
- MINOR   : check: Wake the check task if the check is finished in 
wake_srv_chk()
- MINOR   : stick_table: Prevent conn_cur from underflowing
- MINOR   : backend: BE_LB_LKUP_CHTREE is a value, not a bit
- MINOR   : backend: don't use url_param_name as a hint for BE_LB_ALGO_PH
- MINOR   : backend: balance uri specific options were lost across defaults

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: INFO: 31 bug fixes in queue for next release

2019-02-02 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.3 was issued on 2019/01/29.  There are currently 31 patches in 
the queue cut down this way:
- 24 MEDIUM, first one merged on 2019/02/01
- 7 MINOR, first one merged on 2019/02/01

Thus the computed ideal release date for 1.9.4 would be 2019/03/01, which is in 
four weeks or less.

The current list of patches in the queue is:
- MEDIUM  : servers: Close the connection if we failed to install the mux.
- MEDIUM  : mux-h1: Don't add "transfer-encoding" if message-body is 
forbidden
- MEDIUM  : mux-h2: fix two half-closed to closed transitions
- MEDIUM  : peers: Handle mux creation failure.
- MEDIUM  : checks: Don't try to set ALPN if connection failed.
- MEDIUM  : h2: In h2_send(), stop the loop if we failed to alloc a buf.
- MEDIUM  : buffer: Make sure b_is_null handles buffers waiting for 
allocation.
- MEDIUM  : connections: Don't forget to remove CO_FL_SESS_IDLE.
- MEDIUM  : mux-h2: do not abort HEADERS frame before decoding them
- MEDIUM  : checks: Check that conn_install_mux succeeded.
- MEDIUM  : mux-h2: only close connection on request frames on closed 
streams
- MEDIUM  : mux-h2: wait for the mux buffer to be empty before closing the 
connection
- MEDIUM  : servers: Don't add an incomplete conn to the server idle list.
- MEDIUM  : servers: Only destroy a conn_stream we just allocated.
- MEDIUM  : htx: check the HTX compatibility in dynamic use-backend rules
- MEDIUM  : mux-h2: do not close the connection on aborted streams
- MEDIUM  : mux-h2: make sure never to send GOAWAY on too old streams
- MEDIUM  : backend: always release the previous connection into its own 
target srv_list
- MEDIUM  : mux-h2: wake up flow-controlled streams on initial window update
- MEDIUM  : mux-h2: always omit :scheme and :path for the CONNECT method
- MEDIUM  : mux-h2: properly consider the peer's advertised 
max-concurrent-streams
- MEDIUM  : stream: Don't forget to free s->unique_id in stream_free().
- MEDIUM  : mux-h2: always set :authority on request output
- MEDIUM  : compression: Rewrite strong ETags
- MINOR   : mux-h2: always compare content-length to the sum of DATA frames
- MINOR   : stream: don't close the front connection when facing a backend 
error
- MINOR   : mux-h2: make sure response HEADERS are not received in other 
states than OPEN and HLOC
- MINOR   : server: fix logic flaw in idle connection list management
- MINOR   : deinit: tcp_rep.inspect_rules not deinit, add to deinit
- MINOR   : mux-h2: make sure request trailers on aborted streams don't 
break the connection
- MINOR   : backend: check srv_conn before dereferencing it

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 42 bug fixes in queue for next release

2019-03-14 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.4 was issued on 2019/02/06.  There are currently 42 patches in 
the queue cut down this way:
- 1 BUG, first one merged on 2019/02/10
- 6 MAJOR, first one merged on 2019/02/10
- 20 MEDIUM, first one merged on 2019/02/10
- 15 MINOR, first one merged on 2019/02/10

Thus the computed ideal release date for 1.9.5 would be 2019/02/24, which was 
two weeks ago.

The current list of patches in the queue is:
- BUG : 51d: In Hash Trie, multi header matching was affected by the 
header names stored globaly.
- MAJOR   : listener: Make sure the listener exist before using it.
- MAJOR   : cache/htx: Set the start-line offset when a cached object is 
served
- MAJOR   : mux-h2: fix race condition between close on both ends
- MAJOR   : spoe: Don't try to get agent config during SPOP healthcheck
- MAJOR   : fd/threads, task/threads: ensure all spin locks are unlocked
- MAJOR   : stream: avoid double free on unique_id
- MEDIUM  : htx: count the amount of copied data towards the final count
- MEDIUM  : logs: Only attempt to free startup_logs once.
- MEDIUM  : server: initialize the idle conns list after parsing the config
- MEDIUM  : server: initialize the orphaned conns lists and tasks at the end
- MEDIUM  : mux-h1: Report the right amount of data xferred in h1_rcv_buf()
- MEDIUM  : proto_htx: Fix functions applying regex filters on HTX messages
- MEDIUM  : h2/htx: verify that :path doesn't contain invalid chars
- MEDIUM  : cache: Get objects from the cache only for GET and HEAD requests
- MEDIUM  : h2/htx: Correctly handle interim responses when HTX is enabled
- MEDIUM  : proto_htx: Fix data size update if end of the cookie is removed
- MEDIUM  : http_fetch: fix the "base" and "base32" fetch methods in HTX 
mode
- MEDIUM  : servers: Add a per-thread counter of idle connections.
- MEDIUM  : listeners: Don't call fd_stop_recv() if fd_updt is NULL.
- MEDIUM  : 51d: fix possible segfault on deinit_51degrees()
- MEDIUM  : servers: Use atomic operations when handling curr_idle_conns.
- MEDIUM  : h2: advertise to servers that we don't support push
- MEDIUM  : mux-h2/htx: send an empty DATA frame on empty HTX trailers
- MEDIUM  : http_fetch: fix "req.body_len" and "req.body_size" fetch 
methods in HTX mode
- MEDIUM  : spoe: initialization depending on nbthread must be done last
- MEDIUM  : mux-h2/htx: Always set CS flags before exiting h2_rcv_buf()
- MINOR   : ssl: fix warning about ssl-min/max-ver support
- MINOR   : channel: Set CF_WROTE_DATA when outgoing data are skipped
- MINOR   : lua: initialize the correct idle conn lists for the SSL sockets
- MINOR   : checks: make external-checks restore the original 
rlim_fd_cur/max
- MINOR   : config: Reinforce validity check when a process number is parsed
- MINOR   : mux-h2: Don't add ":status" pseudo-header on trailers
- MINOR   : spoe: do not assume agent->rt is valid on exit
- MINOR   : mux-h1: Add "transfer-encoding" header on outgoing requests if 
needed
- MINOR   : listener: keep accept rate counters accurate under saturation
- MINOR   : mworker: be careful to restore the original rlim_fd_cur/max on 
reload
- MINOR   : proto-htx: Consider a XFER_LEN message as chunked by default
- MINOR   : mux-h1: verify the request's version before dropping 
connection: keep-alive
- MINOR   : init: never lower rlim_fd_max
- MINOR   : cache/htx: Return only the headers of cached objects to HEAD 
requests
- MINOR   : mux-h1: Always initilize h1m variable in h1_process_input()

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: INFO: 3 bug fixes in queue for next release

2019-03-23 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.5 was issued on 2019/03/19.  There are currently 3 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2019/03/21

Thus the computed ideal release date for 1.9.6 would be 2019/04/20, which is in 
four weeks or less.

The current list of patches in the queue is:
- MEDIUM  : mux-h2: Don't bother keeping the h2s if detaching and nothing 
to send.
- MEDIUM  : mux-h2: Make sure we destroyed the h2s once shutr/shutw is done.
- MEDIUM  : mux-h2: Use the right list in h2_stop_senders().

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 7 bug fixes in queue for next release

2019-03-23 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.19 was issued on 2019/02/11.  There are currently 7 patches in 
the queue cut down this way:
- 2 MAJOR, first one merged on 2019/03/11
- 3 MEDIUM, first one merged on 2019/03/11
- 2 MINOR, first one merged on 2019/03/11

Thus the computed ideal release date for 1.8.20 would be 2019/03/25, which was 
within the last week.

The current list of patches in the queue is:
- MAJOR   : spoe: Fix initialization of thread-dependent fields
- MAJOR   : listener: Make sure the listener exist before using it.
- MEDIUM  : 51d: fix possible segfault on deinit_51degrees()
- MEDIUM  : threads/fd: do not forget to take into account epoll_fd/pipes
- MEDIUM  : logs: Only attempt to free startup_logs once.
- MINOR   : listener: keep accept rate counters accurate under saturation
- MINOR   : ssl: fix warning about ssl-min/max-ver support

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 7 bug fixes in queue for next release

2019-03-30 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.19 was issued on 2019/02/11.  There are currently 7 patches in 
the queue cut down this way:
- 2 MAJOR, first one merged on 2019/03/11
- 3 MEDIUM, first one merged on 2019/03/11
- 2 MINOR, first one merged on 2019/03/11

Thus the computed ideal release date for 1.8.20 would be 2019/03/25, which was 
one week ago.

The current list of patches in the queue is:
- MAJOR   : listener: Make sure the listener exist before using it.
- MAJOR   : spoe: Fix initialization of thread-dependent fields
- MEDIUM  : 51d: fix possible segfault on deinit_51degrees()
- MEDIUM  : threads/fd: do not forget to take into account epoll_fd/pipes
- MEDIUM  : logs: Only attempt to free startup_logs once.
- MINOR   : ssl: fix warning about ssl-min/max-ver support
- MINOR   : listener: keep accept rate counters accurate under saturation

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: INFO: 3 bug fixes in queue for next release

2019-04-06 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.6 was issued on 2019/03/29.  There are currently 3 patches in 
the queue cut down this way:
- 1 MEDIUM, first one merged on 2019/04/03
- 2 MINOR, first one merged on 2019/04/03

Thus the computed ideal release date for 1.9.7 would be 2019/05/01, which is in 
four weeks or less.

The current list of patches in the queue is:
- MEDIUM  : peers: fix a case where peer session is not cleanly reset on 
release.
- MINOR   : htx: Preserve empty HTX messages with an unprocessed parsing 
error
- MINOR   : cli: correctly handle abns in 'show cli sockets'

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 7 bug fixes in queue for next release

2019-04-06 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.19 was issued on 2019/02/11.  There are currently 7 patches in 
the queue cut down this way:
- 2 MAJOR, first one merged on 2019/03/11
- 3 MEDIUM, first one merged on 2019/03/11
- 2 MINOR, first one merged on 2019/03/11

Thus the computed ideal release date for 1.8.20 would be 2019/03/25, which was 
two weeks ago.

The current list of patches in the queue is:
- MAJOR   : spoe: Fix initialization of thread-dependent fields
- MAJOR   : listener: Make sure the listener exist before using it.
- MEDIUM  : logs: Only attempt to free startup_logs once.
- MEDIUM  : 51d: fix possible segfault on deinit_51degrees()
- MEDIUM  : threads/fd: do not forget to take into account epoll_fd/pipes
- MINOR   : listener: keep accept rate counters accurate under saturation
- MINOR   : ssl: fix warning about ssl-min/max-ver support

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: NOTICE: 5 bug fixes in queue for next release

2019-04-13 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.6 was issued on 2019/03/29.  There are currently 5 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2019/04/03
- 2 MINOR, first one merged on 2019/04/03

Thus the computed ideal release date for 1.9.7 would be 2019/05/01, which is in 
three weeks or less.

The current list of patches in the queue is:
- MEDIUM  : h2: Don't attempt to recv from h2_process_demux if we 
subscribed.
- MEDIUM  : peers: fix a case where peer session is not cleanly reset on 
release.
- MEDIUM  : htx: fix random premature abort of data transfers
- MINOR   : htx: Preserve empty HTX messages with an unprocessed parsing 
error
- MINOR   : cli: correctly handle abns in 'show cli sockets'

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 7 bug fixes in queue for next release

2019-04-13 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.19 was issued on 2019/02/11.  There are currently 7 patches in 
the queue cut down this way:
- 2 MAJOR, first one merged on 2019/03/11
- 3 MEDIUM, first one merged on 2019/03/11
- 2 MINOR, first one merged on 2019/03/11

Thus the computed ideal release date for 1.8.20 would be 2019/03/25, which was 
three weeks ago.

The current list of patches in the queue is:
- MAJOR   : spoe: Fix initialization of thread-dependent fields
- MAJOR   : listener: Make sure the listener exist before using it.
- MEDIUM  : threads/fd: do not forget to take into account epoll_fd/pipes
- MEDIUM  : 51d: fix possible segfault on deinit_51degrees()
- MEDIUM  : logs: Only attempt to free startup_logs once.
- MINOR   : listener: keep accept rate counters accurate under saturation
- MINOR   : ssl: fix warning about ssl-min/max-ver support

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 7 bug fixes in queue for next release

2019-04-20 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.19 was issued on 2019/02/11.  There are currently 7 patches in 
the queue cut down this way:
- 2 MAJOR, first one merged on 2019/03/11
- 3 MEDIUM, first one merged on 2019/03/11
- 2 MINOR, first one merged on 2019/03/11

Thus the computed ideal release date for 1.8.20 would be 2019/03/25, which was 
four weeks ago.

The current list of patches in the queue is:
- MAJOR   : listener: Make sure the listener exist before using it.
- MAJOR   : spoe: Fix initialization of thread-dependent fields
- MEDIUM  : threads/fd: do not forget to take into account epoll_fd/pipes
- MEDIUM  : 51d: fix possible segfault on deinit_51degrees()
- MEDIUM  : logs: Only attempt to free startup_logs once.
- MINOR   : listener: keep accept rate counters accurate under saturation
- MINOR   : ssl: fix warning about ssl-min/max-ver support

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: NOTICE: 55 bug fixes in queue for next release

2019-04-20 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.6 was issued on 2019/03/29.  There are currently 55 patches in 
the queue cut down this way:
- 3 MAJOR, first one merged on 2019/04/16
- 36 MEDIUM, first one merged on 2019/04/03
- 16 MINOR, first one merged on 2019/04/03

Thus the computed ideal release date for 1.9.7 would be 2019/04/30, which is in 
two weeks or less.

The current list of patches in the queue is:
- MAJOR   : task: make sure never to delete a queued task
- MAJOR   : http_fetch: Get the channel depending on the keyword used
- MAJOR   : lb/threads: fix insufficient locking on round-robin LB
- MEDIUM  : tasks: Make sure we modify global_tasks_mask with the rq_lock.
- MEDIUM  : maps: only try to parse the default value when it's present
- MEDIUM  : htx: Don't return the start-line if the HTX message is empty
- MEDIUM  : stream: Don't clear the stream_interface flags in 
si_update_both.
- MEDIUM  : listener: use a self-locked list for the dequeue lists
- MEDIUM  : stream: Don't request a server connection if a shutw was 
scheduled
- MEDIUM  : list: fix LIST_POP_LOCKED's removal of the last pointer
- MEDIUM  : streams: Store prev_state before calling si_update_both().
- MEDIUM  : thread/http: Add missing locks in set-map and add-acl HTTP rules
- MEDIUM  : list: add missing store barriers when updating elements and head
- MEDIUM  : list: fix again LIST_ADDQ_LOCKED
- MEDIUM  : htx: Defrag if blocks position is changed and the payloads wrap
- MEDIUM  : streams: Don't remove the SI_FL_ERR flag in si_update_both().
- MEDIUM  : mux-h1: Enable TCP splicing to exchange data only
- MEDIUM  : tasks: Make sure we set TASK_QUEUED before adding a task to the 
rq.
- MEDIUM  : map: Fix memory leak in the map converter
- MEDIUM  : peers: fix a case where peer session is not cleanly reset on 
release.
- MEDIUM  : h2: Don't attempt to recv from h2_process_demux if we 
subscribed.
- MEDIUM  : pattern: assign pattern IDs after checking the config validity
- MEDIUM  : task/threads: address a fairness issue between local and global 
tasks
- MEDIUM  : streams: Only re-run process_stream if we're in a connected 
state.
- MEDIUM  : h1: Don't parse chunks CRLF if not enough data are available
- MEDIUM  : list: correct fix for LIST_POP_LOCKED's removal of last element
- MEDIUM  : h2: Make sure we're not already in the send_list in 
h2_subscribe().
- MEDIUM  : list: fix the rollback on addq in the locked liss
- MEDIUM  : htx: Fix the process of HTTP CONNECT with h2 connections
- MEDIUM  : mux-h1: Notify the stream waiting for TCP splicing if ibuf is 
empty
- MEDIUM  : applets: Don't use task_in_rq().
- MEDIUM  : spoe: Queue message only if no SPOE applet is attached to the 
stream
- MEDIUM  : spoe: Return an error if nothing is encoded for fragmented 
messages
- MEDIUM  : list: fix incorrect pointer unlocking in LIST_DEL_LOCKED()
- MEDIUM  : stream_interface: Don't bother doing chk_rcv/snd if not 
connected.
- MEDIUM  : htx: fix random premature abort of data transfers
- MEDIUM  : listener: make sure the listener never accepts too many conns
- MEDIUM  : htx: Don't crush blocks payload when append is done on a data 
block
- MEDIUM  : lists: Properly handle the case we're removing the first elt.
- MINOR   : spoe: Be sure to set tv_request when each message fragment is 
encoded
- MINOR   : mworker: ensure that we still quits with SIGINT
- MINOR   : ssl: Fix 48 byte TLS ticket key rotation
- MINOR   : tasks: make sure the first task to be queued keeps its nice 
value
- MINOR   : htx: Preserve empty HTX messages with an unprocessed parsing 
error
- MINOR   : da: Get the request channel to call CHECK_HTTP_MESSAGE_FIRST()
- MINOR   : acl: properly detect pattern type SMP_T_ADDR
- MINOR   : mworker: disable busy polling in the master process
- MINOR   : mux-h1: Don't switch the parser in busy mode if other side has 
done
- MINOR   : http_fetch/htx: Allow permissive sample prefetch for the HTX
- MINOR   : mux-h1: Process input even if the input buffer is empty
- MINOR   : mworker: don't exit with an ambiguous value
- MINOR   : 51d: Get the request channel to call CHECK_HTTP_MESSAGE_FIRST()
- MINOR   : threads: fix the process range of thread masks
- MINOR   : mux-h1: Handle the flag CS_FL_KILL_CONN during a shutdown 
read/write
    - MINOR   : cli: correctly handle abns in 'show cli sockets'

---
The hap

stable-bot: WARNING: 33 bug fixes in queue for next release

2019-04-27 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.19 was issued on 2019/02/11.  There are currently 33 patches 
in the queue cut down this way:
- 5 MAJOR, first one merged on 2019/03/11
- 19 MEDIUM, first one merged on 2019/03/11
- 9 MINOR, first one merged on 2019/03/11

Thus the computed ideal release date for 1.8.20 would be 2019/03/25, which was 
five weeks ago.

The current list of patches in the queue is:
- MAJOR   : listener: Make sure the listener exist before using it.
- MAJOR   : spoe: Fix initialization of thread-dependent fields
- MAJOR   : http_fetch: Get the channel depending on the keyword used
- MAJOR   : stats: Fix how huge POST data are read from the channel
- MAJOR   : checks: segfault during tcpcheck_main
- MEDIUM  : listener: use a self-locked list for the dequeue lists
- MEDIUM  : listener: make sure the listener never accepts too many conns
- MEDIUM  : list: fix the rollback on addq in the locked liss
- MEDIUM  : logs: Only attempt to free startup_logs once.
- MEDIUM  : pattern: assign pattern IDs after checking the config validity
- MEDIUM  : ssl: ability to set TLS 1.3 ciphers using 
ssl-default-server-ciphersuites
- MEDIUM  : list: fix LIST_POP_LOCKED's removal of the last pointer
- MEDIUM  : list: add missing store barriers when updating elements and head
- MEDIUM  : lists: Properly handle the case we're removing the first elt.
- MEDIUM  : maps: only try to parse the default value when it's present
- MEDIUM  : peers: fix a case where peer session is not cleanly reset on 
release.
- MEDIUM  : 51d: fix possible segfault on deinit_51degrees()
- MEDIUM  : thread/http: Add missing locks in set-map and add-acl HTTP rules
- MEDIUM  : list: fix incorrect pointer unlocking in LIST_DEL_LOCKED()
- MEDIUM  : list: fix again LIST_ADDQ_LOCKED
- MEDIUM  : list: correct fix for LIST_POP_LOCKED's removal of last element
- MEDIUM  : spoe: Return an error if nothing is encoded for fragmented 
messages
- MEDIUM  : spoe: Queue message only if no SPOE applet is attached to the 
stream
- MEDIUM  : threads/fd: do not forget to take into account epoll_fd/pipes
- MINOR   : acl: properly detect pattern type SMP_T_ADDR
- MINOR   : spoe: Don't systematically wakeup SPOE stream in the applet 
handler
- MINOR   : da: Get the request channel to call CHECK_HTTP_MESSAGE_FIRST()
- MINOR   : 51d: Get the request channel to call CHECK_HTTP_MESSAGE_FIRST()
- MINOR   : cli: correctly handle abns in 'show cli sockets'
- MINOR   : http/counters: fix missing increment of fe->srv_aborts
- MINOR   : ssl: fix warning about ssl-min/max-ver support
- MINOR   : listener: keep accept rate counters accurate under saturation
- MINOR   : threads: fix the process range of thread masks

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: NOTICE: 6 bug fixes in queue for next release

2019-05-04 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.20 was issued on 2019/04/25.  There are currently 6 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/04/30
- 4 MEDIUM, first one merged on 2019/04/29
- 1 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.8.21 would be 2019/05/14, which is 
in two weeks or less.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: NOTICE: 14 bug fixes in queue for next release

2019-05-04 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.7 was issued on 2019/04/25.  There are currently 14 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/04/30
- 9 MEDIUM, first one merged on 2019/04/29
- 4 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.9.8 would be 2019/05/14, which is in 
two weeks or less.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MEDIUM  : channels: Don't forget to reset output in channel_erase().
- MEDIUM  : pattern: fix memory leak in regex pattern functions
- MEDIUM  : servers: fix typo "src" instead of "srv"
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : mux-h2: properly deal with too large headers frames
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MEDIUM  : connections: Make sure we remove CO_FL_SESS_IDLE on disown.
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MINOR   : haproxy: fix rule->file memory leak
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request
- MINOR   : checks: free memory allocated for tasklets
- MINOR   : log: properly free memory on logformat parse error and deinit()

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 34 bug fixes in queue for next release

2019-05-11 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.7 was issued on 2019/04/25.  There are currently 34 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/04/30
- 21 MEDIUM, first one merged on 2019/04/29
- 12 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.9.8 would be 2019/05/14, which is in 
one week or less.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MEDIUM  : checks: make sure the warmup task takes the server lock
- MEDIUM  : h2: Make sure we set send_list to NULL in h2_detach().
- MEDIUM  : mux-h2: properly deal with too large headers frames
- MEDIUM  : h2: Revamp the way send subscriptions works.
- MEDIUM  : streams: Don't add CF_WRITE_ERROR if early data were rejected.
- MEDIUM  : h2/htx: never leave a trailers block alone with no EOM block
- MEDIUM  : connections: Make sure we remove CO_FL_SESS_IDLE on disown.
- MEDIUM  : ssl: Use the early_data API the right way.
- MEDIUM  : h2: Don't check send_wait to know if we're in the send_list.
- MEDIUM  : channels: Don't forget to reset output in channel_erase().
- MEDIUM  : servers: fix typo "src" instead of "srv"
- MEDIUM  : http: Use pointer to the begining of input to parse message 
headers
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MEDIUM  : ssl: Don't attempt to use early data with libressl.
- MEDIUM  : pattern: fix memory leak in regex pattern functions
- MEDIUM  : spoe: Be sure the sample is found before setting its context
- MEDIUM  : h2/htx: always fail on too large trailers
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : mux-h2/htx: never wait for EOM when processing trailers
- MINOR   : logs/threads: properly split the log area upon startup
- MINOR   : mux-h1: Fix the parsing of trailers
- MINOR   : mux-h2: fix the condition to close a cs-less h2s on the backend
- MINOR   : mworker/ssl: close OpenSSL FDs on reload
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request
- MINOR   : log: properly free memory on logformat parse error and deinit()
- MINOR   : mux-h2: rely on trailers output not input to turn them to empty 
data
- MINOR   : stream: Attach the read side on the response as soon as possible
- MINOR   : checks: free memory allocated for tasklets
- MINOR   : htx: Never transfer more than expected in htx_xfer_blks()
- MINOR   : haproxy: fix rule->file memory leak
- MINOR   : activity: always initialize the profiling variable

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 6 bug fixes in queue for next release

2019-05-11 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.20 was issued on 2019/04/25.  There are currently 6 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/04/30
- 4 MEDIUM, first one merged on 2019/04/29
- 1 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.8.21 would be 2019/05/14, which is 
in one week or less.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: INFO: 1 bug fixes in queue for next release

2019-05-18 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.8 was issued on 2019/05/13.  There are currently 1 patches in 
the queue cut down this way:
- 1 MINOR, first one merged on 2019/05/16

Thus the computed ideal release date for 1.9.9 would be 2019/06/13, which is in 
four weeks or less.

The current list of patches in the queue is:
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 7 bug fixes in queue for next release

2019-05-18 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.20 was issued on 2019/04/25.  There are currently 7 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/04/30
- 4 MEDIUM, first one merged on 2019/04/29
- 2 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.8.21 would be 2019/05/14, which was 
within the last week.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: NOTICE: 10 bug fixes in queue for next release

2019-05-25 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.8 was issued on 2019/05/13.  There are currently 10 patches in 
the queue cut down this way:
- 6 MEDIUM, first one merged on 2019/05/21
- 4 MINOR, first one merged on 2019/05/16

Thus the computed ideal release date for 1.9.9 would be 2019/06/13, which is in 
three weeks or less.

The current list of patches in the queue is:
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : proto-htx: Not forward too much data when 1xx reponses are 
handled
- MEDIUM  : WURFL: segfault in wurfl-get() with missing info.
- MEDIUM  : dns: make the port numbers unsigned
- MEDIUM  : threads: Fix build for 32bits arch with dwcas.
- MEDIUM  : streams: Don't switch from SI_ST_CON to SI_ST_DIS on read0.
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : htx: Remove a forgotten while loop in htx_defrag()
- MINOR   : mux-h2: Count EOM in bytes sent when a HEADERS frame is 
formatted
- MINOR   : mux-h1: Report EOI instead EOS on parsing error or H2 upgrade

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 9 bug fixes in queue for next release

2019-05-25 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.20 was issued on 2019/04/25.  There are currently 9 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/04/30
- 6 MEDIUM, first one merged on 2019/04/29
- 2 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.8.21 would be 2019/05/14, which was 
one week ago.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : dns: make the port numbers unsigned
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 14 bug fixes in queue for next release

2019-06-01 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.8 was issued on 2019/05/13.  There are currently 14 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/05/27
- 8 MEDIUM, first one merged on 2019/05/21
- 5 MINOR, first one merged on 2019/05/16

Thus the computed ideal release date for 1.9.9 would be 2019/06/10, which is in 
one week or less.

The current list of patches in the queue is:
- MAJOR   : lb/threads: make sure the avoided server is not full on second 
pass
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : threads: Fix build for 32bits arch with dwcas.
- MEDIUM  : dns: make the port numbers unsigned
- MEDIUM  : proto-htx: Not forward too much data when 1xx reponses are 
handled
- MEDIUM  : streams: Don't switch from SI_ST_CON to SI_ST_DIS on read0.
- MEDIUM  : queue: fix the tree walk in pendconn_redistribute.
- MEDIUM  : WURFL: segfault in wurfl-get() with missing info.
- MEDIUM  : threads: fix double-word CAS on non-optimized 32-bit platforms
- MINOR   : ssl_sock: Fix memory leak when disabling compression
- MINOR   : mux-h2: Count EOM in bytes sent when a HEADERS frame is 
formatted
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : mux-h1: Report EOI instead EOS on parsing error or H2 upgrade
- MINOR   : htx: Remove a forgotten while loop in htx_defrag()

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 11 bug fixes in queue for next release

2019-06-01 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.20 was issued on 2019/04/25.  There are currently 11 patches 
in the queue cut down this way:
- 2 MAJOR, first one merged on 2019/04/30
- 6 MEDIUM, first one merged on 2019/04/29
- 3 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.8.21 would be 2019/05/14, which was 
two weeks ago.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MAJOR   : lb/threads: make sure the avoided server is not full on second 
pass
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MEDIUM  : dns: make the port numbers unsigned
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request
- MINOR   : ssl_sock: Fix memory leak when disabling compression

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 11 bug fixes in queue for next release

2019-06-08 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.20 was issued on 2019/04/25.  There are currently 11 patches 
in the queue cut down this way:
- 2 MAJOR, first one merged on 2019/04/30
- 6 MEDIUM, first one merged on 2019/04/29
- 3 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.8.21 would be 2019/05/14, which was 
three weeks ago.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MAJOR   : lb/threads: make sure the avoided server is not full on second 
pass
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : dns: make the port numbers unsigned
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request
- MINOR   : ssl_sock: Fix memory leak when disabling compression

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 30 bug fixes in queue for next release

2019-06-08 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.8 was issued on 2019/05/13.  There are currently 30 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/05/27
- 17 MEDIUM, first one merged on 2019/05/21
- 12 MINOR, first one merged on 2019/05/16

Thus the computed ideal release date for 1.9.9 would be 2019/06/10, which was 
within the last week.

The current list of patches in the queue is:
- MAJOR   : lb/threads: make sure the avoided server is not full on second 
pass
- MEDIUM  : connection: Use the session to get the origin address if needed.
- MEDIUM  : mux-h1: Don't skip the TCP splicing when there is no more data 
to read
- MEDIUM  : queue: fix the tree walk in pendconn_redistribute.
- MEDIUM  : mux-h1: only check input data for the current stream, not next 
one
- MEDIUM  : streams: Don't switch from SI_ST_CON to SI_ST_DIS on read0.
- MEDIUM  : h2: Don't forget to set h2s->cs to NULL after having free'd cs.
- MEDIUM  : threads: Fix build for 32bits arch with dwcas.
- MEDIUM  : threads: fix double-word CAS on non-optimized 32-bit platforms
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : WURFL: segfault in wurfl-get() with missing info.
- MEDIUM  : vars: make the tcp/http unset-var() action support conditions
- MEDIUM  : vars: make sure the scope is always valid when accessing vars
- MEDIUM  : connection: fix multiple handshake polling issues
- MEDIUM  : http: fix "http-request reject" when not final
- MEDIUM  : mux-h1: Don't switch the mux in BUSY mode on 1xx messages
- MEDIUM  : dns: make the port numbers unsigned
- MEDIUM  : proto-htx: Not forward too much data when 1xx reponses are 
handled
- MINOR   : mux-h2: Count EOM in bytes sent when a HEADERS frame is 
formatted
- MINOR   : mux-h1: Wake up the mux if it is busy when a 1xx response is 
handled
- MINOR   : peers: Wrong stick-table update message building.
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : deinit/threads: make hard-stop-after perform a clean exit
- MINOR   : mux-h1: Don't send more data than expected
- MINOR   : htx: Remove a forgotten while loop in htx_defrag()
- MINOR   : mux-h1: errflag must be set on H1S and not H1M during output 
processing
- MINOR   : mux-h1: Report EOI instead EOS on parsing error or H2 upgrade
- MINOR   : time: make sure only one thread sets global_now at boot
- MINOR   : ssl_sock: Fix memory leak when disabling compression
- MINOR   : channel/htx: Don't alter channel during forward for empty HTX 
message

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 30 bug fixes in queue for next release

2019-06-15 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.8 was issued on 2019/05/13.  There are currently 30 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/05/27
- 17 MEDIUM, first one merged on 2019/05/21
- 12 MINOR, first one merged on 2019/05/16

Thus the computed ideal release date for 1.9.9 would be 2019/06/10, which was 
one week ago.

The current list of patches in the queue is:
- MAJOR   : lb/threads: make sure the avoided server is not full on second 
pass
- MEDIUM  : connection: Use the session to get the origin address if needed.
- MEDIUM  : vars: make the tcp/http unset-var() action support conditions
- MEDIUM  : mux-h1: only check input data for the current stream, not next 
one
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : connection: fix multiple handshake polling issues
- MEDIUM  : vars: make sure the scope is always valid when accessing vars
- MEDIUM  : h2: Don't forget to set h2s->cs to NULL after having free'd cs.
- MEDIUM  : threads: Fix build for 32bits arch with dwcas.
- MEDIUM  : threads: fix double-word CAS on non-optimized 32-bit platforms
- MEDIUM  : queue: fix the tree walk in pendconn_redistribute.
- MEDIUM  : mux-h1: Don't switch the mux in BUSY mode on 1xx messages
- MEDIUM  : dns: make the port numbers unsigned
- MEDIUM  : http: fix "http-request reject" when not final
- MEDIUM  : mux-h1: Don't skip the TCP splicing when there is no more data 
to read
- MEDIUM  : proto-htx: Not forward too much data when 1xx reponses are 
handled
- MEDIUM  : WURFL: segfault in wurfl-get() with missing info.
- MEDIUM  : streams: Don't switch from SI_ST_CON to SI_ST_DIS on read0.
- MINOR   : channel/htx: Don't alter channel during forward for empty HTX 
message
- MINOR   : peers: Wrong stick-table update message building.
- MINOR   : mux-h2: Count EOM in bytes sent when a HEADERS frame is 
formatted
- MINOR   : deinit/threads: make hard-stop-after perform a clean exit
- MINOR   : mux-h1: Don't send more data than expected
- MINOR   : mux-h1: errflag must be set on H1S and not H1M during output 
processing
- MINOR   : mux-h1: Wake up the mux if it is busy when a 1xx response is 
handled
- MINOR   : time: make sure only one thread sets global_now at boot
- MINOR   : ssl_sock: Fix memory leak when disabling compression
- MINOR   : htx: Remove a forgotten while loop in htx_defrag()
- MINOR   : mux-h1: Report EOI instead EOS on parsing error or H2 upgrade
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 11 bug fixes in queue for next release

2019-06-15 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.20 was issued on 2019/04/25.  There are currently 11 patches 
in the queue cut down this way:
- 2 MAJOR, first one merged on 2019/04/30
- 6 MEDIUM, first one merged on 2019/04/29
- 3 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.8.21 would be 2019/05/14, which was 
four weeks ago.

The current list of patches in the queue is:
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MAJOR   : lb/threads: make sure the avoided server is not full on second 
pass
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MEDIUM  : dns: make the port numbers unsigned
- MINOR   : ssl_sock: Fix memory leak when disabling compression
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 50 bug fixes in queue for next release - 1.9

2019-06-22 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.9.8 was issued on 2019/05/13.  There are currently 50 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/05/27
- 28 MEDIUM, first one merged on 2019/05/21
- 21 MINOR, first one merged on 2019/05/16

Thus the computed ideal release date for 1.9.9 would be 2019/06/10, which was 
two weeks ago.

The current list of patches in the queue is:
- MAJOR   : lb/threads: make sure the avoided server is not full on second 
pass
- MEDIUM  : mux-h1: only check input data for the current stream, not next 
one
- MEDIUM  : h2: Don't forget to set h2s->cs to NULL after having free'd cs.
- MEDIUM  : queue: fix the tree walk in pendconn_redistribute.
- MEDIUM  : streams: Don't switch from SI_ST_CON to SI_ST_DIS on read0.
- MEDIUM  : mux-h1: Don't skip the TCP splicing when there is no more data 
to read
- MEDIUM  : proto_htx: Introduce the state ENDING during forwarding
- MEDIUM  : h2/htx: Update data length of the HTX when the cookie list is 
built
- MEDIUM  : proto-htx: Not forward too much data when 1xx reponses are 
handled
- MEDIUM  : vars: make the tcp/http unset-var() action support conditions
- MEDIUM  : WURFL: segfault in wurfl-get() with missing info.
- MEDIUM  : connection: Use the session to get the origin address if needed.
- MEDIUM  : mux-h2: Reset padlen when several frames are demux
- MEDIUM  : lb_fwlc: Don't test the server's lb_tree from outside the lock
- MEDIUM  : connections: Don't call shutdown() if we want to disable linger.
- MEDIUM  : connection: fix multiple handshake polling issues
- MEDIUM  : threads: fix double-word CAS on non-optimized 32-bit platforms
- MEDIUM  : http: fix "http-request reject" when not final
- MEDIUM  : dns: make the port numbers unsigned
- MEDIUM  : mux-h1: Don't switch the mux in BUSY mode on 1xx messages
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : compression/htx: Fix the adding of the last data block
- MEDIUM  : threads: Fix build for 32bits arch with dwcas.
- MEDIUM  : connections: Don't try to send early data if we have no mux.
- MEDIUM  : mux-h2: Remove the padding length when a DATA frame size is 
checked
- MEDIUM  : compression: Set Vary: Accept-Encoding for compressed responses
- MEDIUM  : mux-h2: make sure the connection timeout is always set
- MEDIUM  : connections: Don't use ALPN to pick mux when in mode TCP.
- MEDIUM  : vars: make sure the scope is always valid when accessing vars
- MINOR   : mux-h2: Count EOM in bytes sent when a HEADERS frame is 
formatted
- MINOR   : flt_trace/htx: Only apply the random forwarding on the message 
body.
- MINOR   : deinit/threads: make hard-stop-after perform a clean exit
- MINOR   : channel/htx: Don't alter channel during forward for empty HTX 
message
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : 51d/htx: The _51d_fetch method, and the methods it calls are 
now HTX aware.
- MINOR   : http-rules: mention "deny_status" for "deny" in the error 
message
- MINOR   : mux-h1: errflag must be set on H1S and not H1M during output 
processing
- MINOR   : peers: Wrong stick-table update message building.
- MINOR   : channel/htx: Call channel_htx_full() from channel_full()
- MINOR   : ssl_sock: Fix memory leak when disabling compression
- MINOR   : time: make sure only one thread sets global_now at boot
- MINOR   : lua/htx: Make txn.req_req_* and txn.res_rep_* HTX aware
- MINOR   : htx: Remove a forgotten while loop in htx_defrag()
- MINOR   : mux-h1: Report EOI instead EOS on parsing error or H2 upgrade
- MINOR   : fl_trace/htx: Be sure to always forward trailers and EOM
- MINOR   : mux-h1: Add the header connection in lower case in outgoing 
messages
- MINOR   : http: Use the global value to limit the number of parsed headers
- MINOR   : mux-h1: Wake up the mux if it is busy when a 1xx response is 
handled
- MINOR   : mux-h1: Wake busy mux for I/O when message is fully sent
- MINOR   : mux-h1: Don't send more data than expected

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: WARNING: 20 bug fixes in queue for next release - 1.8

2019-06-22 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 1.8.20 was issued on 2019/04/25.  There are currently 20 patches 
in the queue cut down this way:
- 2 MAJOR, first one merged on 2019/04/30
- 13 MEDIUM, first one merged on 2019/04/29
- 5 MINOR, first one merged on 2019/04/29

Thus the computed ideal release date for 1.8.21 would be 2019/05/14, which was 
five weeks ago.

The current list of patches in the queue is:
- MAJOR   : lb/threads: make sure the avoided server is not full on second 
pass
- MAJOR   : map/acl: real fix segfault during show map/acl on CLI
- MEDIUM  : mux-h2: make sure the connection timeout is always set
- MEDIUM  : lb_fwlc: Don't test the server's lb_tree from outside the lock
- MEDIUM  : contrib/modsecurity: If host header is NULL, don't try to 
strdup it
- MEDIUM  : dns: make the port numbers unsigned
- MEDIUM  : vars: make sure the scope is always valid when accessing vars
- MEDIUM  : spoe: Don't use the SPOE applet after releasing it
- MEDIUM  : vars: make the tcp/http unset-var() action support conditions
- MEDIUM  : port_range: Make the ring buffer lock-free.
- MEDIUM  : spoe: arg len encoded in previous frag frame but len changed
- MEDIUM  : http: fix "http-request reject" when not final
- MEDIUM  : listener: Fix how unlimited number of consecutive accepts is 
handled
- MEDIUM  : compression: Set Vary: Accept-Encoding for compressed responses
- MEDIUM  : connection: fix multiple handshake polling issues
- MINOR   : ssl_sock: Fix memory leak when disabling compression
- MINOR   : http_fetch: Rely on the smp direction for "cookie()" and "hdr()"
- MINOR   : http: Call stream_inc_be_http_req_ctr() only one time per 
request
- MINOR   : deinit/threads: make hard-stop-after perform a clean exit
- MINOR   : http-rules: mention "deny_status" for "deny" in the error 
message

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



stable-bot: NOTICE: 9 bug fixes in queue for next release - 2.0

2019-06-22 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.

Last release 2.0.0 was issued on 2019/06/16.  There are currently 9 patches in 
the queue cut down this way:
- 1 MAJOR, first one merged on 2019/06/21
- 6 MEDIUM, first one merged on 2019/06/17
- 2 MINOR, first one merged on 2019/06/17

Thus the computed ideal release date for 2.0.1 would be 2019/07/05, which is in 
two weeks or less.

The current list of patches in the queue is:
- MAJOR   : sample: Wrong stick-table name parsing in "if/unless" ACL 
condition.
- MEDIUM  : mux-h2: Remove the padding length when a DATA frame size is 
checked
- MEDIUM  : lb_fwlc: Don't test the server's lb_tree from outside the lock
- MEDIUM  : compression: Set Vary: Accept-Encoding for compressed responses
- MEDIUM  : mux-h2: Reset padlen when several frames are demux
- MEDIUM  : h2/htx: Update data length of the HTX when the cookie list is 
built
- MEDIUM  : htx: Fully update HTX message when the block value is changed
- MINOR   : mux-h1: Add the header connection in lower case in outgoing 
messages
- MINOR   : lua/htx: Make txn.req_req_* and txn.res_rep_* HTX aware

---
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



  1   2   3   >