aboutsummaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAge
...
* Removed NGX_OLD_THREADS from select and poll modules.Ruslan Ermilov2015-03-26
| | | | These modules can't be compiled on win32.
* Removed "worker_threads" and "thread_stack_size" directives.Ruslan Ermilov2015-03-26
|
* Removed unused thread-local-storage code.Ruslan Ermilov2015-03-26
|
* Removed ngx_threaded and related code.Ruslan Ermilov2015-03-26
|
* Upstream: get rid of questionable micro-optimization in ip_hash.Ruslan Ermilov2015-04-16
| | | | | | | | If a peer was initially skipped due to max_fails, there's no reason not to try it again if enough time has passed, and the next_upstream logic is in action. This also reduces diffs with NGINX Plus.
* Core: ensure that ngx_config.h is always included first.Sergey Kandaurov2015-04-16
| | | | | This fixes compilation of various 3rd party modules when nginx is configured with threads.
* Version bump.Maxim Dounin2015-04-16
|
* Upstream: the "zone" directive.Ruslan Ermilov2015-04-14
| | | | | Upstreams with the "zone" directive are kept in shared memory, with a consistent view of all worker processes.
* Upstreams: locking.Ruslan Ermilov2015-04-14
|
* Core: read/write locks.Ruslan Ermilov2015-03-21
|
* Upstream: store peers as a linked list.Ruslan Ermilov2015-04-10
| | | | This is an API change.
* Upstream: track the number of active connections to upstreams.Ruslan Ermilov2015-04-10
| | | | This also simplifies the implementation of the least_conn module.
* Fixed build, broken by 8b7f062a3fe6.Ruslan Ermilov2015-04-16
| | | | Casting a "const char *" to "char *" doesn't work on older gcc versions.
* Core: added OpenSSL version information to "nginx -V" output.Vladimir Homutov2015-04-16
|
* Version bump.Vladimir Homutov2015-04-16
|
* Core: guard against spinlock usage without atomic ops.Ruslan Ermilov2015-03-26
| | | | The new thread pools code uses spinlocks.
* Core: limited levels of subdirectory hierarchy used for temp files.Sergey Kandaurov2015-04-07
| | | | | | | | Similar to ngx_http_file_cache_set_slot(), the last component of file->name with a fixed length of 10 bytes, as generated in ngx_create_temp_path(), is used as a source for the names of intermediate subdirectories with each one taking its own part. Ensure that the sum of specified levels with slashes fits into the length (ticket #731).
* Core: removed excessive initialization in ngx_conf_set_path_slot().Sergey Kandaurov2015-04-07
| | | | Level hierarchy is pre-zeroed in ngx_pcalloc() of the surrounding ngx_path_t.
* Core: fixed error handling on ngx_conf_full_name() failure.Sergey Kandaurov2015-04-07
|
* Upstream: abbreviated SSL handshake may interact badly with Nagle.Ruslan Ermilov2015-04-07
|
* Request body: always flush buffers if request buffering is off.Valentin Bartenev2015-04-06
| | | | | | This fixes unbuffered proxying to SSL backends, since it prevents ngx_ssl_send_chain() from accumulation of request body in the SSL buffer.
* Used the correct type for the AIO preload handler return value.Valentin Bartenev2015-04-06
|
* OCSP stapling: missing free calls.Filipe da Silva2015-04-01
| | | | | | Missing call to X509_STORE_CTX_free when X509_STORE_CTX_init fails. Missing call to OCSP_CERTID_free when OCSP_request_add0_id fails. Possible leaks in vary particular scenariis of memory shortage.
* Cache: added support for reading of the header in thread pools.Valentin Bartenev2015-04-01
|
* Fixed invalid access to complex value defined as an empty string.Sergey Kandaurov2015-03-31
| | | | Found by Valgrind.
* Events: fixed possible crash on start or reload.Valentin Bartenev2015-03-27
| | | | | The main thread could wake up and start processing the notify event before the handler was set.
* Events: made posted events macros safe.Valentin Bartenev2015-03-27
|
* SPDY: always push pending data.Valentin Bartenev2015-03-23
| | | | | | | | | | | | This helps to avoid suboptimal behavior when a client waits for a control frame or more data to increase window size, but the frames have been delayed in the socket buffer. The delays can be caused by bad interaction between Nagle's algorithm on nginx side and delayed ACK on the client side or by TCP_CORK/TCP_NOPUSH if SPDY was working without SSL and sendfile() was used. The pushing code is now very similar to ngx_http_set_keepalive().
* SPDY: fixed error handling in ngx_http_spdy_send_output_queue().Valentin Bartenev2015-03-23
|
* Version bump.Maxim Dounin2015-03-26
|
* Proxy: fixed proxy_request_buffering and chunked with preread body.Maxim Dounin2015-03-26
| | | | | | | If any preread body bytes were sent in the first chain, chunk size was incorrectly added before the whole chain, including header, resulting in an invalid request sent to upstream. Fixed to properly add chunk size after the header.
* Upstream: uwsgi_request_buffering, scgi_request_buffering.Maxim Dounin2015-03-23
|
* FastCGI: fastcgi_request_buffering.Maxim Dounin2015-03-23
|
* Proxy: proxy_request_buffering chunked support.Maxim Dounin2015-03-23
|
* Request body: unbuffered reading.Maxim Dounin2015-03-23
| | | | | | | | | | | The r->request_body_no_buffering flag was introduced. It instructs client request body reading code to avoid reading the whole body, and to call post_handler early instead. The caller should use the ngx_http_read_unbuffered_request_body() function to read remaining parts of the body. Upstream module is now able to use this mode, if configured with the proxy_request_buffering directive.
* Request body: filters support.Maxim Dounin2015-03-23
|
* Request body: moved request body writing to save filter.Maxim Dounin2015-03-23
|
* Request body: free chain links in ngx_http_write_request_body().Maxim Dounin2015-03-23
|
* Output chain: free chain links in ngx_chain_writer().Maxim Dounin2015-03-23
|
* Output chain: zero size buf alerts in ngx_chain_writer().Maxim Dounin2015-03-23
| | | | | Now we log a "zero size buf in chain writer" alert if we encounter a zero sized buffer in ngx_chain_writer(), and skip the buffer.
* Format specifier fixed for file size of buffers.Maxim Dounin2015-03-23
|
* Proxy: fixed proxy_set_body with proxy_cache.Maxim Dounin2015-03-23
| | | | | | | | | | | | If the last header evaluation resulted in an empty header, the e.skip flag was set and was not reset when we've switched to evaluation of body_values. This incorrectly resulted in body values being skipped instead of producing some correct body as set by proxy_set_body. Fix is to properly reset the e.skip flag. As the problem only appeared if the last potentially non-empty header happened to be empty, it only manifested itself if proxy_set_body was used with proxy_cache.
* Thread pools: implemented graceful exiting of threads.Valentin Bartenev2015-03-23
|
* Thread pools: removed unused pointer to memory pool.Valentin Bartenev2015-03-23
| | | | No functional changes.
* Thread pools: keep waiting tasks mutex in ngx_thread_pool_t.Valentin Bartenev2015-03-23
| | | | | | It's not needed for completed tasks queue since the previous change. No functional changes.
* Thread pools: replaced completed tasks queue mutex with spinlock.Valentin Bartenev2015-03-23
|
* Removed stub implementation of win32 mutexes.Ruslan Ermilov2015-03-23
|
* SSL: use of SSL_MODE_NO_AUTO_CHAIN.Maxim Dounin2015-03-23
| | | | | | | | | The SSL_MODE_NO_AUTO_CHAIN mode prevents OpenSSL from automatically building a certificate chain on the fly if there is no certificate chain explicitly provided. Before this change, certificates provided via the ssl_client_certificate and ssl_trusted_certificate directives were used by OpenSSL to automatically build certificate chains, resulting in unexpected (and in some cases unneeded) chains being sent to clients.
* SSL: avoid SSL_CTX_set_tmp_rsa_callback() call with LibreSSL.Maxim Dounin2015-03-23
| | | | | | | | LibreSSL removed support for export ciphers and a call to SSL_CTX_set_tmp_rsa_callback() results in an error left in the error queue. This caused alerts "ignoring stale global SSL error (...called a function you should not call) while SSL handshaking" on a first connection in each worker process.
* SSL: clear protocol options.Maxim Dounin2015-03-23
| | | | | | | | LibreSSL 2.1.1+ started to set SSL_OP_NO_SSLv3 option by default on new contexts. This makes sure to clear it to make it possible to use SSLv3 with LibreSSL if enabled in nginx config. Prodded by Kuramoto Eiji.