Hi, This is a friendly bot that watches fixes pending for the next haproxy-stable release! One such e-mail is sent periodically once patches are waiting in the last maintenance branch, and an ideal release date is computed based on the severity of these fixes and their merge date. Responses to this mail must be sent to the mailing list.
Last release 3.0.3 was issued on 2024-07-11. There are currently 13 patches in the queue cut down this way: - 1 MAJOR, first one merged on 2024-07-29 - 6 MEDIUM, first one merged on 2024-07-29 - 6 MINOR, first one merged on 2024-07-29 Thus the computed ideal release date for 3.0.4 would be 2024-08-12, which was three weeks ago. Last release 2.9.9 was issued on 2024-06-14. There are currently 30 patches in the queue cut down this way: - 1 MAJOR, first one merged on 2024-07-29 - 14 MEDIUM, first one merged on 2024-07-02 - 15 MINOR, first one merged on 2024-07-02 Thus the computed ideal release date for 2.9.10 would be 2024-07-30, which was five weeks ago. Last release 2.8.10 was issued on 2024-06-14. There are currently 34 patches in the queue cut down this way: - 12 MEDIUM, first one merged on 2024-07-03 - 22 MINOR, first one merged on 2024-07-03 Thus the computed ideal release date for 2.8.11 would be 2024-08-28, which was within the last week. Last release 2.6.18 was issued on 2024-06-18. There are currently 20 patches in the queue cut down this way: - 8 MEDIUM, first one merged on 2024-06-19 - 12 MINOR, first one merged on 2024-07-03 Thus the computed ideal release date for 2.6.19 would be 2024-09-17, which is in two weeks or less. The current list of patches in the queue is: - 2.9, 3.0 - MAJOR : mux-h2: force a hard error upon short read with pending error - 2.6, 2.8, 2.9 - MEDIUM : spoe: Be sure to create a SPOE applet if none on the current thread - 2.8, 2.9, 3.0 - MEDIUM : ssl_sock: fix deadlock in ssl_sock_load_ocsp() on error path - 2.9 - MEDIUM : stick-table: Decrement the ref count inside lock to kill a session - 2.9 - MEDIUM : proxy: fix email-alert invalid free - 2.6, 2.8, 2.9 - MEDIUM : h3: ensure the ":scheme" pseudo header is totally valid - 2.8, 2.9 - MEDIUM : quic: fix possible exit from qc_check_dcid() without unlocking - 2.8, 2.9, 3.0 - MEDIUM : debug/cli: fix "show threads" crashing with low thread counts - 3.0 - MEDIUM : quic: prevent crash on accept queue full - 2.6, 2.8, 2.9, 3.0 - MEDIUM : jwt: Clear SSL error queue on error when checking the signature - 2.6, 2.8, 2.9, 3.0 - MEDIUM : queue: deal with a rare TOCTOU in assign_server_and_queue() - 2.6, 2.8, 2.9 - MEDIUM : h3: ensure the ":method" pseudo header is totally valid - 2.6, 2.8, 2.9 - MEDIUM : h1: Reject empty Transfer-encoding header - 2.8, 2.9 - MEDIUM : bwlim: Be sure to never set the analyze expiration date in past - 2.6, 2.8, 2.9, 3.0 - MEDIUM : init: fix fd_hard_limit default in compute_ideal_maxconn - 2.8, 2.9 - MEDIUM : quic: fix race-condition in quic_get_cid_tid() - 2.6 - MEDIUM : cli: fix cli_output_msg() regression - 2.8 - MINOR : proxy: fix log_tag leak on deinit() - 2.8, 2.9 - MINOR : h3: fix crash on STOP_SENDING receive after GOAWAY emission - 2.6, 2.8, 2.9 - MINOR : mux-quic: fix crash on qcs SD alloc failure - 2.8 - MINOR : proxy: fix check_{command,path} leak on deinit() - 2.8, 2.9, 3.0 - MINOR : session: Eval L4/L5 rules defined in the default section - 2.6, 2.8, 2.9 - MINOR : h1: Fail to parse empty transfer coding names - 2.8 - MINOR : proxy: fix server_id_hdr_name leak on deinit() - 2.6, 2.8, 2.9 - MINOR : h1: Reject empty coding name as last transfer-encoding value - 2.8 - MINOR : proxy: fix source interface and usesrc leaks on deinit() - 2.6, 2.8, 2.9 - MINOR : hlua: report proper context upon error in hlua_cli_io_handler_fct() - 2.8, 2.9 - MINOR : quic: fix race condition in qc_check_dcid() - 3.0 - MINOR : quic: Non optimal first datagram. - 2.6, 2.8, 2.9, 3.0 - MINOR : stick-table: fix crash for src_inc_gpc() without stkcounter - 2.6, 2.8, 2.9, 3.0 - MINOR : quic: Lack of precision when computing K (cubic only cc) - 2.8, 2.9 - MINOR : quic: fix race-condition on trace for CID retrieval - 2.6, 2.8, 2.9 - MINOR : jwt: don't try to load files with HMAC algorithm - 2.8 - MINOR : proxy: fix header_unique_id leak on deinit() - 2.6, 2.8, 2.9 - MINOR : quic: fix BUG_ON() on Tx pkt alloc failure - 2.6, 2.8, 2.9 - MINOR : jwt: fix variable initialisation - 2.6, 2.8, 2.9, 3.0 - MINOR : server: Don't warn fallback IP is used during init-addr resolution - 2.6, 2.8, 2.9, 3.0 - MINOR : cli: Atomically inc the global request counter between CLI commands - 2.6, 2.8 - MINOR : quic: fix computed length of emitted STREAM frames - 2.8 - MINOR : proxy: fix dyncookie_key leak on deinit() -- The haproxy stable-bot is freely provided by HAProxy Technologies to help improve the quality of each HAProxy release. If you have any issue with these emails or if you want to suggest some improvements, please post them on the list so that the solutions suiting the most users can be found.