<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nginx.git/src/event, branch release-1.7.6</title>
<subtitle>nginx</subtitle>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/'/>
<entry>
<title>SSL: session id context now includes certificate hash.</title>
<updated>2014-09-15T13:59:47+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-09-15T13:59:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=6ec0f4d85b7fa4b74e7c758563b673fc19628411'/>
<id>6ec0f4d85b7fa4b74e7c758563b673fc19628411</id>
<content type='text'>
This prevents inappropriate session reuse in unrelated server{}
blocks, while preserving ability to restore sessions on other servers
when using TLS Session Tickets.

Additionally, session context is now set even if there is no session cache
configured.  This is needed as it's also used for TLS Session Tickets.

Thanks to Antoine Delignat-Lavaud and Piotr Sikora.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This prevents inappropriate session reuse in unrelated server{}
blocks, while preserving ability to restore sessions on other servers
when using TLS Session Tickets.

Additionally, session context is now set even if there is no session cache
configured.  This is needed as it's also used for TLS Session Tickets.

Thanks to Antoine Delignat-Lavaud and Piotr Sikora.
</pre>
</div>
</content>
</entry>
<entry>
<title>Upstream: limited next_upstream time and tries (ticket #544).</title>
<updated>2014-09-12T14:50:47+00:00</updated>
<author>
<name>Roman Arutyunyan</name>
<email>arut@nginx.com</email>
</author>
<published>2014-09-12T14:50:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=02ce6c415f07ea8d7fa6b59a17ee2f02e77ab66b'/>
<id>02ce6c415f07ea8d7fa6b59a17ee2f02e77ab66b</id>
<content type='text'>
The new directives {proxy,fastcgi,scgi,uwsgi,memcached}_next_upstream_tries
and {proxy,fastcgi,scgi,uwsgi,memcached}_next_upstream_timeout limit
the number of upstreams tried and the maximum time spent for these tries
when searching for a valid upstream.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The new directives {proxy,fastcgi,scgi,uwsgi,memcached}_next_upstream_tries
and {proxy,fastcgi,scgi,uwsgi,memcached}_next_upstream_timeout limit
the number of upstreams tried and the maximum time spent for these tries
when searching for a valid upstream.
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: guard use of all SSL options for bug workarounds.</title>
<updated>2014-09-03T21:49:55+00:00</updated>
<author>
<name>Piotr Sikora</name>
<email>piotr@cloudflare.com</email>
</author>
<published>2014-09-03T21:49:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=2af7181b3bb5b4bd84ca448f300c6aaf3dff4681'/>
<id>2af7181b3bb5b4bd84ca448f300c6aaf3dff4681</id>
<content type='text'>
Some of the OpenSSL forks (read: BoringSSL) started removing unused,
no longer necessary and/or not really working bug workarounds along
with the SSL options and defines for them.

Instead of fixing nginx build after each removal, be proactive
and guard use of all SSL options for bug workarounds.

Signed-off-by: Piotr Sikora &lt;piotr@cloudflare.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Some of the OpenSSL forks (read: BoringSSL) started removing unused,
no longer necessary and/or not really working bug workarounds along
with the SSL options and defines for them.

Instead of fixing nginx build after each removal, be proactive
and guard use of all SSL options for bug workarounds.

Signed-off-by: Piotr Sikora &lt;piotr@cloudflare.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Events: processing of posted events changed from LIFO to FIFO.</title>
<updated>2014-09-01T14:20:18+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2014-09-01T14:20:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=37d24e7e3be648a6f73bad18dcf53798a7a1aeb0'/>
<id>37d24e7e3be648a6f73bad18dcf53798a7a1aeb0</id>
<content type='text'>
In theory, this can provide a bit better distribution of latencies.

Also it simplifies the code, since ngx_queue_t is now used instead
of custom implementation.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In theory, this can provide a bit better distribution of latencies.

Also it simplifies the code, since ngx_queue_t is now used instead
of custom implementation.
</pre>
</div>
</content>
</entry>
<entry>
<title>Events: removed broken thread support from posted events.</title>
<updated>2014-09-01T14:20:03+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2014-09-01T14:20:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=2a81e0556611188a1b9b3e1240a06928dcebc1a2'/>
<id>2a81e0556611188a1b9b3e1240a06928dcebc1a2</id>
<content type='text'>
It's mostly dead code.  And the idea of thread support for this task has
been deprecated.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It's mostly dead code.  And the idea of thread support for this task has
been deprecated.
</pre>
</div>
</content>
</entry>
<entry>
<title>Events: removed unused variable in ngx_poll_process_events().</title>
<updated>2014-08-10T13:44:46+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-08-10T13:44:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=870b962382c2c207e04bd799c19a98ee68b2d441'/>
<id>870b962382c2c207e04bd799c19a98ee68b2d441</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Events: format specifier fixes.</title>
<updated>2014-08-07T13:04:43+00:00</updated>
<author>
<name>Yves Crespin</name>
<email>yves.crespin@e-quartz.fr</email>
</author>
<published>2014-08-07T13:04:43+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=3c0c66c5d868ca4cd2679adf0990f8692be8111b'/>
<id>3c0c66c5d868ca4cd2679adf0990f8692be8111b</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Events: changed nevents type to unsigned in poll module.</title>
<updated>2014-08-07T12:56:57+00:00</updated>
<author>
<name>Yves Crespin</name>
<email>yves.crespin@e-quartz.fr</email>
</author>
<published>2014-08-07T12:56:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=6a58555ca87a916c9c9956bdc600142485a40aab'/>
<id>6a58555ca87a916c9c9956bdc600142485a40aab</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: let it build against LibreSSL.</title>
<updated>2014-07-30T11:32:16+00:00</updated>
<author>
<name>Piotr Sikora</name>
<email>piotr@cloudflare.com</email>
</author>
<published>2014-07-30T11:32:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=9ed633b9303d3af2980cf49d145459d2ea888ec7'/>
<id>9ed633b9303d3af2980cf49d145459d2ea888ec7</id>
<content type='text'>
LibreSSL developers decided that LibreSSL is OpenSSL-2.0.0, so tests
for OpenSSL-1.0.2+ are now passing, even though the library doesn't
provide functions that are expected from that version of OpenSSL.

Signed-off-by: Piotr Sikora &lt;piotr@cloudflare.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
LibreSSL developers decided that LibreSSL is OpenSSL-2.0.0, so tests
for OpenSSL-1.0.2+ are now passing, even though the library doesn't
provide functions that are expected from that version of OpenSSL.

Signed-off-by: Piotr Sikora &lt;piotr@cloudflare.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: let it build against BoringSSL.</title>
<updated>2014-07-30T11:32:15+00:00</updated>
<author>
<name>Piotr Sikora</name>
<email>piotr@cloudflare.com</email>
</author>
<published>2014-07-30T11:32:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=0dcfca0301d05b3d5d973c5bdcd24acd14bd2a35'/>
<id>0dcfca0301d05b3d5d973c5bdcd24acd14bd2a35</id>
<content type='text'>
This change adds support for using BoringSSL as a drop-in replacement
for OpenSSL without adding support for any of the BoringSSL-specific
features.

Signed-off-by: Piotr Sikora &lt;piotr@cloudflare.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This change adds support for using BoringSSL as a drop-in replacement
for OpenSSL without adding support for any of the BoringSSL-specific
features.

Signed-off-by: Piotr Sikora &lt;piotr@cloudflare.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
