Package: h2o / 2.2.5+dfsg2-3~bpo9+1

Metadata

Package Version Patches format
h2o 2.2.5+dfsg2-3~bpo9+1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
link against system libyaml.patch | (download)

CMakeLists.txt | 5 3 + 2 - 0 !
1 file changed, 3 insertions(+), 2 deletions(-)

 use the system libyaml instance
 Do not statically link against LibYAML, use dynamic linking against the system
 instance instead.
use etc ssl certs.patch | (download)

CMakeLists.txt | 2 1 + 1 - 0 !
lib/handler/configurator/proxy.c | 9 4 + 5 - 0 !
2 files changed, 5 insertions(+), 6 deletions(-)

 on debian systems, use /etc/ssl/certs for tls verification
 Instead of shipping a dedicated CA bundle, use /etc/ssl/certs for
 verification by default.
link against wslay.patch | (download)

CMakeLists.txt | 6 3 + 3 - 0 !
1 file changed, 3 insertions(+), 3 deletions(-)

 this is the temporarily solution to link against wslay
tests force TLSv1.2 on s_client invocations.patch | (download)

t/40memcached-session-resumption.t | 2 1 + 1 - 0 !
t/40session-ticket.t | 2 1 + 1 - 0 !
t/40ssl-cipher-suite.t | 2 1 + 1 - 0 !
3 files changed, 3 insertions(+), 3 deletions(-)

 [patch] tests: force tlsv1.2 on s_client invocations

The tests are not ready (yet) to handle TLSv1.3 support in OpenSSL, so
make s_client use TLSv1.2 explicitly.

Note that we could pass -no_tls1_3 instead, but this would break with
older (pre-1.1.1) OpenSSL versions.

link libh2o with wslay.patch | (download)

CMakeLists.txt | 5 5 + 0 - 0 !
1 file changed, 5 insertions(+)

 link libh2o and libh2o-evloop against wslay
Bug-Debian: https://bugs.debian.org/908124
fix_CVE 2019_1.patch | (download)

include/h2o/http2_internal.h | 4 2 + 2 - 0 !
lib/http2/connection.c | 25 23 + 2 - 0 !
2 files changed, 25 insertions(+), 4 deletions(-)

 [patch] stop the read side when amount of unsent, non-flow-controlled
 data goes above 512KB.