aboutsummaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAge
* Merged implementations of ngx_unix_recv().Valentin Bartenev2016-04-08
| | | | | There's no real need in two separate implementations, with and without kqueue support.
* Fixed small inconsistency in handling EOF among receive functions.Valentin Bartenev2016-04-08
| | | | Now all functions always drop the ready flag in this case.
* Merged implementations of ngx_udp_unix_recv().Valentin Bartenev2016-04-08
| | | | | There's no real need in two separate implementations, with and without kqueue support.
* Fixed spelling.Josh Soref2016-04-07
|
* Version bump.Ruslan Ermilov2016-04-07
|
* HTTP/2: support for unbuffered upload of request body.Valentin Bartenev2016-04-01
|
* HTTP/2: rewritten handling of request body.Valentin Bartenev2016-04-01
| | | | | | | | | | | | | There are two improvements: 1. Support for request body filters; 2. Receiving of request body is started only after the ngx_http_read_client_request_body() call. The last one fixes the problem when the client_max_body_size value might not be respected from the right location if the location was changed either during the process of receiving body or after the whole body had been received.
* HTTP/2: sending RST_STREAM with NO_ERROR to discard request body.Valentin Bartenev2016-04-01
| | | | | | | | | | | | | | RFC 7540 states that "A server can send a complete response prior to the client sending an entire request if the response does not depend on any portion of the request that has not been sent and received. When this is true, a server MAY request that the client abort transmission of a request without error by sending a RST_STREAM with an error code of NO_ERROR after sending a complete response (i.e., a frame with the END_STREAM flag)." This should prevent a client from blocking on the stream window, since it isn't maintained for closed streams. Currently, quite big initial stream windows are used, so such blocking is very unlikly, but that will be changed in the further patches.
* Core: removed incorrect GCC 2.7 check.Maxim Dounin2016-04-01
| | | | | | | | It was broken since introduction (__GNU__ instead of __GNUC__) and did nothing. Moreover, GCC 2.7 is happy with the normal version of the code. Reported by Joel Cunningham, http://mailman.nginx.org/pipermail/nginx-devel/2016-March/007964.html.
* SSL: SSLeay_version() is deprecated in OpenSSL 1.1.0.Maxim Dounin2016-03-31
| | | | | | | | SSLeay_version() and SSLeay() are no longer available if OPENSSL_API_COMPAT is set to 0x10100000L. Switched to using OpenSSL_version() instead. Additionally, we now compare version strings instead of version numbers, and this correctly works for LibreSSL as well.
* SSL: X509 was made opaque in OpenSSL 1.1.0.Sergey Kandaurov2016-03-31
| | | | | To increment reference counters we now use newly introduced X509_up_ref() function.
* SSL: EVP_MD_CTX was made opaque in OpenSSL 1.1.0.Sergey Kandaurov2016-03-31
|
* SSL: RSA_generate_key() is deprecated in OpenSSL 1.1.0.Maxim Dounin2016-03-31
| | | | OpenSSL removed support for all 40 and 56 bit ciphers.
* SSL: initialization changes for OpenSSL 1.1.0.Maxim Dounin2016-03-31
| | | | | | | | | | | | | | OPENSSL_config() deprecated in OpenSSL 1.1.0. Additionally, SSL_library_init(), SSL_load_error_strings() and OpenSSL_add_all_algorithms() are no longer available if OPENSSL_API_COMPAT is set to 0x10100000L. The OPENSSL_init_ssl() function is now used instead with appropriate arguments to trigger the same behaviour. The configure test changed to use SSL_CTX_set_options(). Deinitialization now happens automatically in OPENSSL_cleanup() called via atexit(3), so we no longer call EVP_cleanup() and ENGINE_cleanup() directly.
* SSL: get_session callback changed in OpenSSL 1.1.0.Maxim Dounin2016-03-31
|
* SSL: guarded error codes not present in OpenSSL 1.1.0.Maxim Dounin2016-03-31
|
* SSL: reasonable version for LibreSSL.Maxim Dounin2016-03-31
| | | | | | | | | | LibreSSL defines OPENSSL_VERSION_NUMBER to 0x20000000L, but uses an old API derived from OpenSSL at the time LibreSSL forked. As a result, every version check we use to test for new API elements in newer OpenSSL versions requires an explicit check for LibreSSL. To reduce clutter, redefine OPENSSL_VERSION_NUMBER to 0x1000107fL if LibreSSL is used. The same is done by FreeBSD port of LibreSSL.
* Removed the prototype mysql module.Ruslan Ermilov2016-03-31
|
* Fixed ngx_os_signal_process() prototype.Ruslan Ermilov2016-03-31
|
* Fixed ngx_pid_t formatting in ngx_sprintf() and logging.Sergey Kandaurov2016-03-31
|
* Fixed format specifiers in ngx_sprintf().Sergey Kandaurov2016-03-31
|
* Fixed logging.Sergey Kandaurov2016-03-31
|
* Events: fixed logging.Sergey Kandaurov2016-03-31
|
* Fixed logging with variable field width.Sergey Kandaurov2016-03-31
|
* Fixed logging in close error handling.Sergey Kandaurov2016-03-31
|
* Events: fixed test building with eventport on OS X.Ruslan Ermilov2016-03-30
| | | | Broken in d17f0584006f (1.9.13).
* Style.Ruslan Ermilov2016-03-30
|
* Version bump.Ruslan Ermilov2016-03-30
|
* Win32: replaced NGX_EXDEV with more appropriate error code.Maxim Dounin2016-03-29
| | | | | | | | | | | | | Correct error code for NGX_EXDEV on Windows is ERROR_NOT_SAME_DEVICE, "The system cannot move the file to a different disk drive". Previously used ERROR_WRONG_DISK is about wrong diskette in the drive and is not appropriate. There is no real difference though, as MoveFile() is able to copy files between disk drives, and will fail with ERROR_ACCESS_DENIED when asked to copy directories. The ERROR_NOT_SAME_DEVICE error is only used by MoveFileEx() when called without the MOVEFILE_COPY_ALLOWED flag.
* Win32: additional error code NGX_EEXIST_FILE (ticket #910).Maxim Dounin2016-03-29
| | | | | | | | | | On Windows there are two possible error codes which correspond to the EEXIST error code: ERROR_FILE_EXISTS used by CreateFile(CREATE_NEW), and ERROR_ALREADY_EXISTS used by CreateDirectory(). MoveFile() seems to use both: ERROR_ALREADY_EXISTS when moving within one filesystem, and ERROR_FILE_EXISTS when copying a file to a different drive.
* Upstream: proxy_next_upstream non_idempotent.Maxim Dounin2016-03-28
| | | | | | | By default, requests with non-idempotent methods (POST, LOCK, PATCH) are no longer retried in case of errors if a request was already sent to a backend. Previous behaviour can be restored by using "proxy_next_upstream ... non_idempotent".
* Upstream: cached connections now tested against next_upstream.Maxim Dounin2016-03-28
| | | | | | | | Much like normal connections, cached connections are now tested against u->conf->next_upstream, and u->state->status is now always set. This allows to disable additional tries even with upstream keepalive by using "proxy_next_upstream off".
* Fixed --test-build-*.Ruslan Ermilov2016-03-28
| | | | | | | | | Fixes various aspects of --test-build-devpoll, --test-build-eventport, and --test-build-epoll. In particular, if --test-build-devpoll was used on Linux, then "devpoll" event method would be preferred over "epoll". Also, wrong definitions of event macros were chosen.
* Sub filter: fixed allocation alignment.Roman Arutyunyan2016-03-28
|
* Core: allow strings without null-termination in ngx_parse_url().Piotr Sikora2016-02-26
| | | | | | | | | | This fixes buffer over-read while using variables in the "proxy_pass", "fastcgi_pass", "scgi_pass", and "uwsgi_pass" directives, where result of string evaluation isn't null-terminated. Found with MemorySanitizer. Signed-off-by: Piotr Sikora <piotrsikora@google.com>
* Fixed socket inheritance on reload and binary upgrade.Roman Arutyunyan2016-03-25
| | | | | | | | | | On nginx reload or binary upgrade, an attempt is made to inherit listen sockets from the previous configuration. Previously, no check for socket type was made and the inherited socket could have the wrong type. On binary upgrade, socket type was not detected at all. Wrong socket type could lead to errors on that socket due to different logic and unsupported syscalls. For example, a UDP socket, inherited as TCP, lead to the following error after arrival of a datagram: "accept() failed (102: Operation not supported on socket)".
* Stream: additional logging for UDP.Vladimir Homutov2016-03-18
|
* Win32: fixed build after 384154fc634f.Dmitry Volyntsev2016-03-23
|
* Stream: detect port absence in proxy_pass with IP literal.Roman Arutyunyan2016-03-23
| | | | This is a clone of http commit 26c127bab5ef.
* Resolver: added support for SRV records.Dmitry Volyntsev2016-03-23
|
* Resolver: do not enable resolve timer if provided timeout is zero.Dmitry Volyntsev2016-03-23
|
* Resolver: introduced valid field in resolver responses.Dmitry Volyntsev2016-03-23
| | | | | It hints the amount of time a response could be considered as valid.
* Core: introduced the NGX_DEBUG_PALLOC macro.Valentin Bartenev2016-03-23
| | | | | | | It allows to turn off accumulation of small pool allocations into a big preallocated chunk of memory. This is useful for debugging memory access with sanitizer, since such accumulation can cover buffer overruns from being detected.
* Core: use ngx_palloc_small() to allocate ngx_pool_large_t.Valentin Bartenev2016-03-23
| | | | | | | | This structure cannot be allocated as a large block anyway, otherwise that will result in infinite recursion, since each large allocation requires to allocate another ngx_pool_large_t. The room for the structure is guaranteed by the NGX_MIN_POOL_SIZE constant.
* Core: introduced the ngx_palloc_small() function.Valentin Bartenev2016-03-23
| | | | | It deduplicates some code for allocations from memory pool. No functional changes.
* Core: moved logging before freeing large blocks of pool.Valentin Bartenev2016-03-23
| | | | | This fixes use-after-free memory access with enabled debug log when pool->log is allocated as a large block.
* Backed out server_tokens changes.Maxim Dounin2016-03-22
| | | | Backed out changesets: cf3e75cfa951, 6b72414dfb4f, 602dc42035fe, e5076b96fd01.
* Cache: fixed slots accounting error introduced in c9d680b00744.Dmitry Volyntsev2016-03-23
|
* Reconsidered server_tokens with an empty value.Ruslan Ermilov2016-03-22
| | | | An empty value will be treated as "off".
* HTTP/2: improved debugging of sending control frames.Valentin Bartenev2016-03-21
|