Hi,

this is haproxy update, the two temporary patches are unnecessary now.

Kind regards.
Index: Makefile
===================================================================
RCS file: /cvs/ports/net/haproxy/Makefile,v
retrieving revision 1.30
diff -u -p -r1.30 Makefile
--- Makefile    15 Jun 2016 06:55:58 -0000      1.30
+++ Makefile    27 Jun 2016 08:16:46 -0000
@@ -2,7 +2,7 @@
 
 COMMENT =      reliable, high performance TCP/HTTP load balancer
 
-DISTNAME =     haproxy-1.6.5
+DISTNAME =     haproxy-1.6.6
 REVISION =     0
 CATEGORIES =   net www
 HOMEPAGE =     http://www.haproxy.org/
Index: distinfo
===================================================================
RCS file: /cvs/ports/net/haproxy/distinfo,v
retrieving revision 1.17
diff -u -p -r1.17 distinfo
--- distinfo    13 May 2016 03:34:28 -0000      1.17
+++ distinfo    27 Jun 2016 08:16:46 -0000
@@ -1,2 +1,2 @@
-SHA256 (haproxy-1.6.5.tar.gz) = xLP7k4h0q7u9UngghxF8wlkCY694/c6G1k5KEaz+hd4=
-SIZE (haproxy-1.6.5.tar.gz) = 1563272
+SHA256 (haproxy-1.6.6.tar.gz) = /bA9YweMw8aIu205/HXcwVjWU1bkyOHEWQM+vt3/VfU=
+SIZE (haproxy-1.6.6.tar.gz) = 1565046
Index: patches/patch-include_types_proto_http_h
===================================================================
RCS file: patches/patch-include_types_proto_http_h
diff -N patches/patch-include_types_proto_http_h
--- patches/patch-include_types_proto_http_h    15 Jun 2016 06:55:58 -0000      
1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,15 +0,0 @@
-$OpenBSD: patch-include_types_proto_http_h,v 1.1 2016/06/15 06:55:58 jasper 
Exp $
-
-Security fix for CVE-2016-5360
-http://git.haproxy.org/?p=haproxy-1.6.git;a=commitdiff;h=60f01f8c89e4fb2723d5a9f2046286e699567e0b
-
---- include/types/proto_http.h.orig    Tue May 10 15:42:00 2016
-+++ include/types/proto_http.h Tue Jun 14 15:10:23 2016
-@@ -362,7 +362,6 @@ struct http_txn {
-       unsigned int flags;             /* transaction flags */
-       enum http_meth_t meth;          /* HTTP method */
-       /* 1 unused byte here */
--      short rule_deny_status;         /* HTTP status from rule when denying */
-       short status;                   /* HTTP status from the server, 
negative if from proxy */
- 
-       char *uri;                      /* first line if log needed, NULL 
otherwise */
Index: patches/patch-src_proto_http_c
===================================================================
RCS file: patches/patch-src_proto_http_c
diff -N patches/patch-src_proto_http_c
--- patches/patch-src_proto_http_c      15 Jun 2016 06:55:58 -0000      1.3
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,77 +0,0 @@
-$OpenBSD: patch-src_proto_http_c,v 1.3 2016/06/15 06:55:58 jasper Exp $
-
-Security fix for CVE-2016-5360
-http://git.haproxy.org/?p=haproxy-1.6.git;a=commitdiff;h=60f01f8c89e4fb2723d5a9f2046286e699567e0b
-
---- src/proto_http.c.orig      Tue May 10 15:42:00 2016
-+++ src/proto_http.c   Tue Jun 14 15:10:23 2016
-@@ -3490,10 +3490,12 @@ static int http_transform_header(struct stream* s, str
-  * further processing of the request (auth, deny, ...), and defaults to
-  * HTTP_RULE_RES_STOP if it executed all rules or stopped on an allow, or
-  * HTTP_RULE_RES_CONT if the last rule was reached. It may set the TX_CLTARPIT
-- * on txn->flags if it encounters a tarpit rule.
-+ * on txn->flags if it encounters a tarpit rule. If <deny_status> is not NULL
-+ * and a deny/tarpit rule is matched, it will be filled with this rule's deny
-+ * status.
-  */
- enum rule_result
--http_req_get_intercept_rule(struct proxy *px, struct list *rules, struct 
stream *s)
-+http_req_get_intercept_rule(struct proxy *px, struct list *rules, struct 
stream *s, int *deny_status)
- {
-       struct session *sess = strm_sess(s);
-       struct http_txn *txn = s->txn;
-@@ -3539,12 +3541,14 @@ resume_execution:
-                       return HTTP_RULE_RES_STOP;
- 
-               case ACT_ACTION_DENY:
--                      txn->rule_deny_status = rule->deny_status;
-+                      if (deny_status)
-+                              *deny_status = rule->deny_status;
-                       return HTTP_RULE_RES_DENY;
- 
-               case ACT_HTTP_REQ_TARPIT:
-                       txn->flags |= TX_CLTARPIT;
--                      txn->rule_deny_status = rule->deny_status;
-+                      if (deny_status)
-+                              *deny_status = rule->deny_status;
-                       return HTTP_RULE_RES_DENY;
- 
-               case ACT_HTTP_REQ_AUTH:
-@@ -4303,6 +4307,7 @@ int http_process_req_common(struct stream *s, struct c
-       struct redirect_rule *rule;
-       struct cond_wordlist *wl;
-       enum rule_result verdict;
-+      int deny_status = HTTP_ERR_403;
- 
-       if (unlikely(msg->msg_state < HTTP_MSG_BODY)) {
-               /* we need more data */
-@@ -4323,7 +4328,7 @@ int http_process_req_common(struct stream *s, struct c
- 
-       /* evaluate http-request rules */
-       if (!LIST_ISEMPTY(&px->http_req_rules)) {
--              verdict = http_req_get_intercept_rule(px, &px->http_req_rules, 
s);
-+              verdict = http_req_get_intercept_rule(px, &px->http_req_rules, 
s, &deny_status);
- 
-               switch (verdict) {
-               case HTTP_RULE_RES_YIELD: /* some data miss, call the function 
later. */
-@@ -4369,7 +4374,7 @@ int http_process_req_common(struct stream *s, struct c
- 
-               /* parse the whole stats request and extract the relevant 
information */
-               http_handle_stats(s, req);
--              verdict = http_req_get_intercept_rule(px, 
&px->uri_auth->http_req_rules, s);
-+              verdict = http_req_get_intercept_rule(px, 
&px->uri_auth->http_req_rules, s, &deny_status);
-               /* not all actions implemented: deny, allow, auth */
- 
-               if (verdict == HTTP_RULE_RES_DENY) /* stats http-request deny */
-@@ -4500,9 +4505,9 @@ int http_process_req_common(struct stream *s, struct c
-               manage_client_side_cookies(s, req);
- 
-       txn->flags |= TX_CLDENY;
--      txn->status = http_err_codes[txn->rule_deny_status];
-+      txn->status = http_err_codes[deny_status];
-       s->logs.tv_request = now;
--      stream_int_retnclose(&s->si[0], http_error_message(s, 
txn->rule_deny_status));
-+      stream_int_retnclose(&s->si[0], http_error_message(s, deny_status));
-       stream_inc_http_err_ctr(s);
-       sess->fe->fe_counters.denied_req++;
-       if (sess->fe != s->be)

Reply via email to