Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


    Last release 3.0.3 was issued on 2024-07-11.  There are currently 13 
patches in the queue cut down this way:
    - 1 MAJOR, first one merged on 2024-07-29
    - 6 MEDIUM, first one merged on 2024-07-29
    - 6 MINOR, first one merged on 2024-07-29

Thus the computed ideal release date for 3.0.4 would be 2024-08-12, which was 
three weeks ago.

    Last release 2.9.9 was issued on 2024-06-14.  There are currently 30 
patches in the queue cut down this way:
    - 1 MAJOR, first one merged on 2024-07-29
    - 14 MEDIUM, first one merged on 2024-07-02
    - 15 MINOR, first one merged on 2024-07-02

Thus the computed ideal release date for 2.9.10 would be 2024-07-30, which was 
five weeks ago.

    Last release 2.8.10 was issued on 2024-06-14.  There are currently 34 
patches in the queue cut down this way:
    - 12 MEDIUM, first one merged on 2024-07-03
    - 22 MINOR, first one merged on 2024-07-03

Thus the computed ideal release date for 2.8.11 would be 2024-08-28, which was 
within the last week.

    Last release 2.6.18 was issued on 2024-06-18.  There are currently 20 
patches in the queue cut down this way:
    - 8 MEDIUM, first one merged on 2024-06-19
    - 12 MINOR, first one merged on 2024-07-03

Thus the computed ideal release date for 2.6.19 would be 2024-09-17, which is 
in two weeks or less.

The current list of patches in the queue is:
 - 2.9, 3.0                  - MAJOR   : mux-h2: force a hard error upon short 
read with pending error
 - 2.6, 2.8, 2.9             - MEDIUM  : spoe: Be sure to create a SPOE applet 
if none on the current thread
 - 2.8, 2.9, 3.0             - MEDIUM  : ssl_sock: fix deadlock in 
ssl_sock_load_ocsp() on error path
 - 2.9                       - MEDIUM  : stick-table: Decrement the ref count 
inside lock to kill a session
 - 2.9                       - MEDIUM  : proxy: fix email-alert invalid free
 - 2.6, 2.8, 2.9             - MEDIUM  : h3: ensure the ":scheme" pseudo header 
is totally valid
 - 2.8, 2.9                  - MEDIUM  : quic: fix possible exit from 
qc_check_dcid() without unlocking
 - 2.8, 2.9, 3.0             - MEDIUM  : debug/cli: fix "show threads" crashing 
with low thread counts
 - 3.0                       - MEDIUM  : quic: prevent crash on accept queue 
full
 - 2.6, 2.8, 2.9, 3.0            - MEDIUM  : jwt: Clear SSL error queue on 
error when checking the signature
 - 2.6, 2.8, 2.9, 3.0            - MEDIUM  : queue: deal with a rare TOCTOU in 
assign_server_and_queue()
 - 2.6, 2.8, 2.9             - MEDIUM  : h3: ensure the ":method" pseudo header 
is totally valid
 - 2.6, 2.8, 2.9             - MEDIUM  : h1: Reject empty Transfer-encoding 
header
 - 2.8, 2.9                  - MEDIUM  : bwlim: Be sure to never set the 
analyze expiration date in past
 - 2.6, 2.8, 2.9, 3.0            - MEDIUM  : init: fix fd_hard_limit default in 
compute_ideal_maxconn
 - 2.8, 2.9                  - MEDIUM  : quic: fix race-condition in 
quic_get_cid_tid()
 - 2.6                       - MEDIUM  : cli: fix cli_output_msg() regression
 - 2.8                       - MINOR   : proxy: fix log_tag leak on deinit()
 - 2.8, 2.9                  - MINOR   : h3: fix crash on STOP_SENDING receive 
after GOAWAY emission
 - 2.6, 2.8, 2.9             - MINOR   : mux-quic: fix crash on qcs SD alloc 
failure
 - 2.8                       - MINOR   : proxy: fix check_{command,path} leak 
on deinit()
 - 2.8, 2.9, 3.0             - MINOR   : session: Eval L4/L5 rules defined in 
the default section
 - 2.6, 2.8, 2.9             - MINOR   : h1: Fail to parse empty transfer 
coding names
 - 2.8                       - MINOR   : proxy: fix server_id_hdr_name leak on 
deinit()
 - 2.6, 2.8, 2.9             - MINOR   : h1: Reject empty coding name as last 
transfer-encoding value
 - 2.8                       - MINOR   : proxy: fix source interface and usesrc 
leaks on deinit()
 - 2.6, 2.8, 2.9             - MINOR   : hlua: report proper context upon error 
in hlua_cli_io_handler_fct()
 - 2.8, 2.9                  - MINOR   : quic: fix race condition in 
qc_check_dcid()
 - 3.0                       - MINOR   : quic: Non optimal first datagram.
 - 2.6, 2.8, 2.9, 3.0            - MINOR   : stick-table: fix crash for 
src_inc_gpc() without stkcounter
 - 2.6, 2.8, 2.9, 3.0            - MINOR   : quic: Lack of precision when 
computing K (cubic only cc)
 - 2.8, 2.9                  - MINOR   : quic: fix race-condition on trace for 
CID retrieval
 - 2.6, 2.8, 2.9             - MINOR   : jwt: don't try to load files with HMAC 
algorithm
 - 2.8                       - MINOR   : proxy: fix header_unique_id leak on 
deinit()
 - 2.6, 2.8, 2.9             - MINOR   : quic: fix BUG_ON() on Tx pkt alloc 
failure
 - 2.6, 2.8, 2.9             - MINOR   : jwt: fix variable initialisation
 - 2.6, 2.8, 2.9, 3.0            - MINOR   : server: Don't warn fallback IP is 
used during init-addr resolution
 - 2.6, 2.8, 2.9, 3.0            - MINOR   : cli: Atomically inc the global 
request counter between CLI commands
 - 2.6, 2.8                  - MINOR   : quic: fix computed length of emitted 
STREAM frames
 - 2.8                       - MINOR   : proxy: fix dyncookie_key leak on 
deinit()

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.


Reply via email to