For post-unlock, as nothing seems critical. Announcement at [0], changelog at [1]. Probably the most interesting part is that they now use EVP_AEAD interfaces for QUIC.
The patch update is noiser than usual because of a small change in the surrounding code. It still runs fine. OK? Lucas [0]: https://www.mail-archive.com/haproxy@formilux.org/msg45314.html [1]: https://git.haproxy.org/?p=haproxy-3.0.git;a=blob_plain;f=CHANGELOG;h=94b8b9580b8bf9fde54c28e73cc299b601ee828a;hb=HEAD diff refs/heads/master 1028662be27369584f01c854702b6ab80bd64347 commit - f827ea88bac5095f5080effb6dd76d9793b28f1f commit + 1028662be27369584f01c854702b6ab80bd64347 blob - f8bba57c3e06bf6ddc6571815b7ec870cf358984 blob + 22c9f838ed5ac57344c3e0e78cc399311a97cfb3 --- net/haproxy/Makefile +++ net/haproxy/Makefile @@ -1,6 +1,6 @@ COMMENT = reliable, high performance TCP/HTTP load balancer -DISTNAME = haproxy-3.0.4 +DISTNAME = haproxy-3.0.5 CATEGORIES = net www HOMEPAGE = https://www.haproxy.org/ MAINTAINER = Lucas Gabriel Vuotto <lu...@sexy.is> blob - af21fd7be05d0040d192e7eff202403963a826cf blob + d0475928ad847d94980fab6a142dc907f25efcc0 --- net/haproxy/distinfo +++ net/haproxy/distinfo @@ -1,2 +1,2 @@ -SHA256 (haproxy-3.0.4.tar.gz) = qr/ZitpyG7+2j3gFWGztA3P7TI1z4Y+qlAVaFsIJaTY= -SIZE (haproxy-3.0.4.tar.gz) = 4689835 +SHA256 (haproxy-3.0.5.tar.gz) = rjgiHoWuugOKcl7771v+XnZnG6eVnl63TDn9B55dAC4= +SIZE (haproxy-3.0.5.tar.gz) = 4698022 blob - 3a3bb18aa12dd0433f376a4af1419356e5bf8a8c blob + 2808d3a5be66dedae04b6334e5e3a28b65f1d835 --- net/haproxy/patches/patch-include_haproxy_quic_tls_h +++ net/haproxy/patches/patch-include_haproxy_quic_tls_h @@ -4,10 +4,10 @@ https://github.com/haproxy/haproxy/issues/2569 Index: include/haproxy/quic_tls.h --- include/haproxy/quic_tls.h.orig +++ include/haproxy/quic_tls.h -@@ -140,7 +140,7 @@ static inline const EVP_CIPHER *tls_aead(const SSL_CIP - return EVP_aes_128_gcm(); - case TLS1_3_CK_AES_256_GCM_SHA384: +@@ -156,7 +156,7 @@ static inline const QUIC_AEAD *tls_aead(const SSL_CIPH return EVP_aes_256_gcm(); + #endif + -#if !defined(OPENSSL_IS_AWSLC) && (!defined(LIBRESSL_VERSION_NUMBER) || LIBRESSL_VERSION_NUMBER >= 0x4000000fL) +#if !defined(OPENSSL_IS_AWSLC) /* WT: LibreSSL has an issue with CHACHA20 running in-place till 3.9.2