aboutsummaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAge
* SPDY: do not reject headers with empty value (ticket #396).Valentin Bartenev2013-08-15
| | | | | | | | | | | | | | | A quote from SPDY draft 2 specification: "The length of each name and value must be greater than zero. A receiver of a zero-length name or value must send a RST_STREAM with code PROTOCOL error." But it appears that Chrome browser allows sending requests over SPDY/2 connection using JavaScript that contain headers with empty values. For better compatibility across SPDY clients and to be compliant with HTTP, such headers are no longer rejected. Also, it is worth noting that in SPDY draft 3 the statement has been changed so that it permits empty values for headers.
* SPDY: fixed corruption of headers with names longer than 255.Valentin Bartenev2013-08-15
| | | | | It is a bad idea to put zero byte in position where the length of the next header name can be stored before it was parsed.
* Unbreak building on Linux without sendfile64() support.Valentin Bartenev2013-08-15
| | | | | | | | | | | | It was broken in 8e446a2daf48 when the NGX_SENDFILE_LIMIT constant was added to ngx_linux_sendfile_chain.c having the same name as already defined one in ngx_linux_config.h. The newer is needed to overcome a bug in old Linux kernels by limiting the number of bytes to send per sendfile() syscall. The older is used with sendfile() on ancient kernels that works with 32-bit offsets only. One of these renamed to NGX_SENDFILE_MAXSIZE.
* Referer module: fixed regex matching against HTTPS referers.Sergey Kandaurov2013-08-13
| | | | | | | | When matching a compiled regex against value in the "Referer" header field, the length was calculated incorrectly for strings that start from "https://". This might cause matching to fail for regexes with end-of-line anchors. Patch by Liangbin Li.
* Don't lose pointer to first nonempty buf in ngx_*_sendfile_chain().Gleb Smirnoff2013-08-08
| | | | | | | | In ngx_*_sendfile_chain() when calculating pointer to a first non-zero sized buf, use "in" as iterator. This fixes processing of zero sized buf(s) after EINTR. Otherwise function can return zero sized buf to caller, and later ngx_http_write_filter() logs warning.
* API change: removed the ngx_conf_full_name() function.Valentin Bartenev2013-08-06
| | | | The ngx_get_full_name() should be used instead.
* Replaced ngx_conf_full_name() with ngx_get_full_name().Valentin Bartenev2013-08-06
| | | | The ngx_get_full_name() function takes more readable arguments list.
* Fixed memory leaks in the root and auth_basic_user_file directives.Valentin Bartenev2013-08-06
| | | | | | | | If a relative path is set by variables, then the ngx_conf_full_name() function was called while processing requests, which causes allocations from the cycle pool. A new function that takes pool as an argument was introduced.
* Image filter: use "application/json" MIME type for JSON output.Valentin Bartenev2013-08-05
| | | | | As it is defined by RFC 4627, and allows for various browser tools like JSONView to display JSON well-formatted.
* Core: guard use of AI_ADDRCONFIG.Ruslan Ermilov2013-08-05
| | | | | | Some systems (notably NetBSD and OpenBSD) lack AI_ADDRCONFIG support. Reported by Piotr Sikora.
* Fixed build with signed socklen_t and unix sockets.Maxim Dounin2013-08-05
| | | | | | | | This seems to be the case at least under Cygwin, where build was broken by 05ba5bce31e0 (1.5.3). Reported by Kevin Worthington, http://mailman.nginx.org/pipermail/nginx/2013-August/040028.html.
* Core: only resolve address families configured on the local system.Ruslan Ermilov2013-08-05
| | | | | | | | | | | | | | | This is done by passing AI_ADDRCONFIG to getaddrinfo(). On Linux, setting net.ipv6.conf.all.disable_ipv6 to 1 will now be respected. On FreeBSD, AI_ADDRCONFIG filtering is currently implemented by attempting to create a datagram socket for the corresponding family, which succeeds even if the system doesn't in fact have any addresses of that family configured. That is, if the system with IPv6 support in the kernel doesn't have IPv6 addresses configured, AI_ADDRCONFIG will filter out IPv6 only inside a jail without IPv6 addresses or with IPv6 disabled.
* MIME: use "application/javascript" for .js files.Valentin Bartenev2013-07-31
| | | | | | | | | Though there are several MIME types commonly used for JavaScript nowadays, the most common being "text/javascript", "application/javascript", and currently used by nginx "application/x-javascript", RFC 4329 prefers "application/javascript". The "charset_types" directive's default value was adjusted accordingly.
* Version bump.Sergey Kandaurov2013-07-31
|
* Perl: fixed syntax usage for C preprocessor directives.Sergey Kandaurov2013-07-29
| | | | | | | | As per perlxs, C preprocessor directives should be at the first non-whitespace of a line to avoid interpreting them as comments. #if and #endif are moved so that there are no blank lines before them to retain them as part of the function body.
* Upstream: reliably detect connection failures with SSL peers.Ruslan Ermilov2013-07-29
|
* Upstream: no last buffer on errors.Maxim Dounin2013-07-25
| | | | | | | | | | | | | | | | | Previously, after sending a header we always sent a last buffer and finalized a request with code 0, even in case of errors. In some cases this resulted in a loss of ability to detect the response wasn't complete (e.g. if Content-Length was removed from a response by gzip filter). This change tries to propogate to a client information that a response isn't complete in such cases. In particular, with this change we no longer pretend a returned response is complete if we wasn't able to create a temporary file. If an error code suggests the error wasn't fatal, we flush buffered data and disable keepalive, then finalize request normally. This allows to to propogate information about a problem to a client, while still sending all the data we've got from an upstream.
* Upstream: request finalization rework.Maxim Dounin2013-07-25
| | | | | | | No semantic changes expected, though some checks are done differently. In particular, the r->cached flag is no longer explicitly checked. Instead, we relay on u->header_sent not being set if a response is sent from a cache.
* Upstream: NGX_HTTP_CLIENT_CLOSED_REQUEST no longer reset to 0.Maxim Dounin2013-07-25
| | | | | | The NGX_HTTP_CLIENT_CLOSED_REQUEST code is allowed to happen after we started sending a response (much like NGX_HTTP_REQUEST_TIME_OUT), so there is no need to reset response code to 0 in this case.
* Upstream: added check if a response is complete.Maxim Dounin2013-07-25
| | | | | | | | | | | | Checks were added to both buffered and unbuffered code paths to detect and complain if a response is incomplete. Appropriate error codes are now passed to ngx_http_upstream_finalize_request(). With this change in unbuffered mode we now use u->length set to -1 as an indicator that EOF is allowed per protocol and used to indicate response end (much like its with p->length in buffered mode). Proxy module was changed to set u->length to 1 (instead of previously used -1) in case of chunked transfer encoding used to comply with the above.
* Upstream: u->length now defaults to -1 (API change).Maxim Dounin2013-07-25
| | | | | | | | That is, by default we assume that response end is signalled by a connection close. This seems to be better default, and in line with u->pipe->length behaviour. Memcached module was modified accordingly.
* Upstream: fixed store/cache of unfinished responses.Maxim Dounin2013-07-25
| | | | | | | | | | | | | In case of upstream eof, only responses with u->pipe->length == -1 are now cached/stored. This ensures that unfinished chunked responses are not cached. Note well - previously used checks for u->headers_in.content_length_n are preserved. This provides an additional level of protection if protol data disagree with Content-Length header provided (e.g., a FastCGI response is sent with wrong Content-Length, or an incomple SCGI or uwsgi response), as well as protects from storing of responses to HEAD requests. This should be reconsidered if we'll consider caching of responses to HEAD requests.
* Upstream: replaced u->pipe->temp_file with p->temp_file.Maxim Dounin2013-07-25
| | | | While here, redundant parentheses removed. No functional changes.
* Upstream: NGX_ERROR after pipe errors.Maxim Dounin2013-07-25
|
* Upstream: NGX_HTTP_GATEWAY_TIME_OUT after upstream timeouts.Maxim Dounin2013-07-25
| | | | | | | | | | | There is no real difference from previously used 0 as NGX_HTTP_* will become 0 in ngx_http_upstream_finalize_request(), but the change preserves information about a timeout a bit longer. Previous use of ETIMEDOUT in one place was just wrong. Note well that with cacheable responses there will be a difference (code in ngx_http_upstream_finalize_request() will store the error in cache), though this change doesn't touch cacheable case.
* Upstream: ngx_http_upstream_finalize_request(NGX_ERROR) on errors.Maxim Dounin2013-07-25
| | | | | | | Previously, ngx_http_upstream_finalize_request(0) was used in most cases after errors. While with current code there is no difference, use of NGX_ERROR allows to pass a bit more information into ngx_http_upstream_finalize_request().
* Upstream: consistent error handling after u->input_filter_init().Maxim Dounin2013-07-25
| | | | | | In all cases ngx_http_upstream_finalize_request() with NGX_ERROR now used. Previously used NGX_HTTP_INTERNAL_SERVER_ERROR in the subrequest in memory case don't cause any harm, but inconsistent with other uses.
* Upstream: busy lock remnants removed.Maxim Dounin2013-07-25
|
* Upstream: stale comments removed.Maxim Dounin2013-06-13
|
* Gzip: clearing of c->buffered if all data are flushed.Maxim Dounin2013-07-25
| | | | | This allows to finalize unfinished responses while still sending as much data as available.
* Event pipe: fixed writing cache header to a temp file.Maxim Dounin2013-07-25
| | | | | | | | | | With previous code the p->temp_file->offset wasn't adjusted if a temp file was written by the code in ngx_event_pipe_write_to_downstream() after an EOF, resulting in cache not being used with empty scgi and uwsgi responses with Content-Length set to 0. Fix it to call ngx_event_pipe_write_chain_to_temp_file() there instead of calling ngx_write_chain_to_temp_file() directly.
* Fixed ngx_http_test_reading() to finalize request properly.Maxim Dounin2013-06-14
| | | | | | | Previous code called ngx_http_finalize_request() with rc = 0. This is ok if a response status was already set, but resulted in "000" being logged if it wasn't. In particular this happened with limit_req if a connection was prematurely closed during limit_req delay.
* Sub filter: fixed matching after a partial match.Maxim Dounin2013-07-25
| | | | | | | | | After a failed partial match we now check if there is another partial match in previously matched substring to fix cases like "aab" in "aaab". The ctx->saved string is now always sent if it's present on return from the ngx_http_sub_parse() function (and reset accordingly). This allows to release parts of previously matched data.
* Sub filter: fixed incomplete last buffer on partial match.Maxim Dounin2013-07-25
| | | | | | If a pattern was partially matched at a response end, partially matched string wasn't send. E.g., a response "fo" was truncated to an empty response if partially mathed by a pattern "foo".
* Sub filter: flush buffers handling.Maxim Dounin2013-07-25
|
* Sub filter: switched to ngx_chain_get_free_buf().Maxim Dounin2013-07-25
| | | | No functional changes.
* Sub filter: stale comments removed.Maxim Dounin2013-07-25
|
* On DragonFlyBSD, TCP_KEEPIDLE and TCP_KEEPINTVL are in msecs.Ruslan Ermilov2013-07-25
| | | | Based on a patch by Sepherosa Ziehau.
* Style: reuse one int variable in ngx_configure_listening_sockets().Ruslan Ermilov2013-07-25
| | | | No functional changes.
* SPDY: fixed segfault with "client_body_in_file_only" enabled.Valentin Bartenev2013-07-24
| | | | | | | | | | It is possible to send FLAG_FIN in additional empty data frame, even if it is known from the content-length header that request body is empty. And Firefox actually behaves like this (see ticket #357). To simplify code we sacrificed our microoptimization that did not work right due to missing check in the ngx_http_spdy_state_data() function for rb->buf set to NULL.
* Xslt: exsltRegisterAll() moved to preconfiguration.Maxim Dounin2013-07-19
| | | | | | The exsltRegisterAll() needs to be called before XSLT stylesheets are compiled, else stylesheet compilation hooks will not work. This change fixes EXSLT Functions extension.
* Events: honor NGX_USE_GREEDY_EVENT when kqueue support is enabled.Valentin Bartenev2013-07-13
| | | | | | Currently this flag is needed for epoll and rtsig, and though these methods usually present on different platforms than kqueue, nginx can be compiled to support all of them.
* Style.Maxim Dounin2013-07-11
|
* Core: fixed possible use of an uninitialized variable.Vladimir Homutov2013-07-11
| | | | | | | | The call to ngx_sock_ntop() in ngx_connection_local_sockaddr() might be performed with the uninitialized "len" variable. The fix is to initialize variable to the size of corresponding socket address type. The issue was introduced in commit 05ba5bce31e0.
* Core: extended ngx_sock_ntop() with socklen parameter.Vladimir Homutov2013-07-11
| | | | | | On Linux, sockaddr length is required to process unix socket addresses properly due to unnamed sockets (which don't have sun_path set at all) and abstract namespace sockets.
* Make macros safe.Gleb Smirnoff2013-07-05
|
* Upstream: updated list of ngx_event_connect_peer() return values.Ruslan Ermilov2013-07-03
| | | | | ngx_http_upstream_get_keepalive_peer() may return NGX_DONE to indicate that the cached keepalive connection is reused.
* Core: consolidated log-related code.Vladimir Homutov2013-06-28
| | | | | The stderr redirection code is moved to ngx_log_redirect_stderr(). The opening of the default log code is moved to ngx_log_open_default().
* Version bump.Maxim Dounin2013-07-02
|
* Fixed ngx_http_parse_chunked() minimal length calculation.Maxim Dounin2013-06-28
| | | | | | | | Minimal data length we expect for further calls was calculated incorrectly if parsing stopped right after parsing chunk size. This might in theory affect clients and/or backends using LF instead of CRLF. Patch by Dmitry Popov.