Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


    Last release 2.3.5 was issued on 2021-02-06.  There are currently 23 
patches in the queue cut down this way:
    - 6 MEDIUM, first one merged on 2021-02-22
    - 17 MINOR, first one merged on 2021-02-22

Thus the computed ideal release date for 2.3.6 would be 2021-03-22, which is in 
four weeks or less.

    Last release 2.1.11 was issued on 2021-01-08.  There are currently 19 
patches in the queue cut down this way:
    - 7 MEDIUM, first one merged on 2021-01-26
    - 12 MINOR, first one merged on 2021-01-26

Thus the computed ideal release date for 2.1.12 would be 2021-03-23, which is 
in four weeks or less.

    Last release 2.0.20 was issued on 2021-01-08.  There are currently 15 
patches in the queue cut down this way:
    - 7 MEDIUM, first one merged on 2021-01-28
    - 8 MINOR, first one merged on 2021-01-28

Thus the computed ideal release date for 2.0.21 would be 2021-03-25, which is 
in four weeks or less.

The current list of patches in the queue is:
 - 2.3                       - MEDIUM  : mux-h1: Always set CS_FL_EOI for 
response in MSG_DONE state
 - 2.3                       - MEDIUM  : config: don't pick unset values from 
last defaults section
 - 2.3                       - MEDIUM  : lists: Avoid an infinite loop in 
MT_LIST_TRY_ADDQ().
 - 2.1                       - MEDIUM  : ssl/cli: abort ssl cert is freeing the 
old store
 - 2.0, 2.1                  - MEDIUM  : filters/htx: Fix data forwarding when 
payload length is unknown
 - 2.3                       - MEDIUM  : checks: don't needlessly take the 
server lock in health_adjust()
 - 2.0, 2.1                  - MEDIUM  : mux-h2: fix read0 handling on partial 
frames
 - 2.0, 2.1                  - MEDIUM  : ssl: check a connection's status 
before computing a handshake
 - 2.0, 2.1                  - MEDIUM  : mux-h2: handle remaining read0 cases
 - 2.3                       - MEDIUM  : spoe: Resolve the sink if a SPOE logs 
in a ring buffer
 - 2.3                       - MEDIUM  : mux-h1: Fix handling of responses to 
CONNECT other than 200-ok
 - 2.0                       - MEDIUM  : mux-h2: Be sure to enter in demux loop 
even if dbuf is empty
 - 2.0, 2.1                  - MEDIUM  : mux-h2: do not quit the demux loop 
before setting END_REACHED
 - 2.0, 2.1                  - MEDIUM  : stats: add missing INF_BUILD_INFO 
definition
 - 2.3                       - MINOR   : checks: properly handle wrapping time 
in __health_adjust()
 - 2.3                       - MINOR   : ssl/cli: potential null pointer 
dereference in "set ssl cert"
 - 2.3                       - MINOR   : server: Init params before parsing a 
new server-state line
 - 2.3                       - MINOR   : backend: hold correctly lock when 
killing idle conn
 - 2.0, 2.1                  - MINOR   : stick-table: Always call 
smp_fetch_src() with a valid arg list
 - 2.0, 2.1                  - MINOR   : mworker: define _GNU_SOURCE for 
strsignal()
 - 2.3                       - MINOR   : cfgparse: do not mention "addr:port" 
as supported on proxy lines
 - 2.3                       - MINOR   : server: Remove RMAINT from admin state 
when loading server state
 - 2.3                       - MINOR   : server: Be sure to cut the last parsed 
field of a server-state line
 - 2.3                       - MINOR   : tools: Fix a memory leak on error path 
in parse_dotted_uints()
 - 2.0, 2.1                  - MINOR   : init: Use a dynamic buffer to set 
HAPROXY_CFGFILES env variable
 - 2.1                       - MINOR   : ssl: init tmp chunk correctly in 
ssl_sock_load_sctl_from_file()
 - 2.0, 2.1                  - MINOR   : sample: Memory leak of sample_expr 
structure in case of error
 - 2.3                       - MINOR   : http-ana: Don't increment HTTP error 
counter on internal errors
 - 2.0, 2.1                  - MINOR   : config: fix leak on 
proxy.conn_src.bind_hdr_name
 - 2.3                       - MINOR   : sample: Always consider zero size 
string samples as unsafe
 - 2.1                       - MINOR   : init: enforce strict-limits when using 
master-worker
 - 2.3                       - MINOR   : server: Don't call fopen() with 
server-state filepath set to NULL
 - 2.3                       - MINOR   : http-rules: Always replace the 
response status on a return action
 - 2.3                       - MINOR   : intops: fix mul32hi()'s off-by-one
 - 2.3                       - MINOR   : session: atomically increment the 
tracked sessions counter
 - 2.3                       - MINOR   : stats: revert the change on ST_CONVDONE
 - 2.0, 2.1                  - MINOR   : peers: Wrong "new_conn" value for 
"show peers" CLI command.
 - 2.3                       - MINOR   : server: Fix server-state-file-name 
directive
 - 2.3                       - MINOR   : server: re-align state file fields 
number
 - 2.1                       - MINOR   : mux_h2: missing space between "st" and 
".flg" in the "show fd" helper
 - 2.0, 2.1                  - MINOR   : xxhash: make sure armv6 uses memcpy()
 - 2.0, 2.1                  - MINOR   : sample: check alloc_trash_chunk return 
value in concat()
 - 2.1                       - MINOR   : threads: Fixes the number of possible 
cpus report for Mac.

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.

Reply via email to