<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nginx.git/src, branch release-1.3.13</title>
<subtitle>nginx</subtitle>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/'/>
<entry>
<title>Proxy: fixed do_write handling in previous commit.</title>
<updated>2013-02-18T15:08:46+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-18T15:08:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=82d48e1eba774747a72c997a4e22f068f95e6cc7'/>
<id>82d48e1eba774747a72c997a4e22f068f95e6cc7</id>
<content type='text'>
As rightfully complained by MSVC, do_write variable was used uninitialized.
Correct fix is to set it's initial value based on event happened.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
As rightfully complained by MSVC, do_write variable was used uninitialized.
Correct fix is to set it's initial value based on event happened.
</pre>
</div>
</content>
</entry>
<entry>
<title>Proxy: support for connection upgrade (101 Switching Protocols).</title>
<updated>2013-02-18T13:50:52+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-18T13:50:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=08a73b4aadebd9405ac52ec1f6eef5ca1fe8c11a'/>
<id>08a73b4aadebd9405ac52ec1f6eef5ca1fe8c11a</id>
<content type='text'>
This allows to proxy WebSockets by using configuration like this:

    location /chat/ {
        proxy_pass http://backend;
        proxy_http_version 1.1;
        proxy_set_header Upgrade $http_upgrade;
        proxy_set_header Connection "upgrade";
    }

Connection upgrade is allowed as long as it was requested by a client
via the Upgrade request header.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This allows to proxy WebSockets by using configuration like this:

    location /chat/ {
        proxy_pass http://backend;
        proxy_http_version 1.1;
        proxy_set_header Upgrade $http_upgrade;
        proxy_set_header Connection "upgrade";
    }

Connection upgrade is allowed as long as it was requested by a client
via the Upgrade request header.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed false memset warning on Linux with -O3 (ticket #275).</title>
<updated>2013-02-13T14:39:46+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-13T14:39:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=d2c9f4554f201bde00281d58d4de600a0e8877a1'/>
<id>d2c9f4554f201bde00281d58d4de600a0e8877a1</id>
<content type='text'>
Prodded by John Leach.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Prodded by John Leach.
</pre>
</div>
</content>
</entry>
<entry>
<title>Added support for {SHA} passwords (ticket #50).</title>
<updated>2013-02-07T12:09:56+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-07T12:09:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=a2b987e79f099e34ddc5206b2b7c85f7405e5b74'/>
<id>a2b987e79f099e34ddc5206b2b7c85f7405e5b74</id>
<content type='text'>
Note: use of {SHA} passwords is discouraged as {SHA} password scheme is
vulnerable to attacks using rainbow tables.  Use of {SSHA}, $apr1$ or
crypt() algorithms as supported by OS is recommended instead.

The {SHA} password scheme support is added to avoid the need of changing
the scheme recorded in password files from {SHA} to {SSHA} because such
a change hides security problem with {SHA} passwords.

Patch by Louis Opter, with minor changes.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Note: use of {SHA} passwords is discouraged as {SHA} password scheme is
vulnerable to attacks using rainbow tables.  Use of {SSHA}, $apr1$ or
crypt() algorithms as supported by OS is recommended instead.

The {SHA} password scheme support is added to avoid the need of changing
the scheme recorded in password files from {SHA} to {SSHA} because such
a change hides security problem with {SHA} passwords.

Patch by Louis Opter, with minor changes.
</pre>
</div>
</content>
</entry>
<entry>
<title>Version bump.</title>
<updated>2013-02-07T12:09:09+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-07T12:09:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=6cb9bbe71cf0f3f4e31a5d768042ad3e5eb24199'/>
<id>6cb9bbe71cf0f3f4e31a5d768042ad3e5eb24199</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>GeoIP: removed pseudo-support of "proxy" and "netspeed" databases.</title>
<updated>2013-02-04T16:44:22+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-02-04T16:44:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=75e5d13ec6b900ea01c044cb4147126bf237a5c9'/>
<id>75e5d13ec6b900ea01c044cb4147126bf237a5c9</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>FastCGI: proper handling of split fastcgi end request.</title>
<updated>2013-02-01T14:41:50+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-01T14:41:50+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=aad0a1dba6e05766005a60b893c53e52fb056795'/>
<id>aad0a1dba6e05766005a60b893c53e52fb056795</id>
<content type='text'>
If fastcgi end request record was split between several network packets,
with fastcgi_keep_conn it was possible that connection was saved in incorrect
state (e.g. with padding bytes not yet read).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If fastcgi end request record was split between several network packets,
with fastcgi_keep_conn it was possible that connection was saved in incorrect
state (e.g. with padding bytes not yet read).
</pre>
</div>
</content>
</entry>
<entry>
<title>FastCGI: unconditional state transitions.</title>
<updated>2013-02-01T14:41:07+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-01T14:41:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=e8efec0e5e154fc21ba3d1d8b08a94c2eba6e757'/>
<id>e8efec0e5e154fc21ba3d1d8b08a94c2eba6e757</id>
<content type='text'>
Checks for f-&gt;padding before state transitions make code hard to follow,
remove them and make sure we always do another loop iteration after
f-&gt;state is set to ngx_http_fastcgi_st_padding.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Checks for f-&gt;padding before state transitions make code hard to follow,
remove them and make sure we always do another loop iteration after
f-&gt;state is set to ngx_http_fastcgi_st_padding.
</pre>
</div>
</content>
</entry>
<entry>
<title>FastCGI: fixed wrong connection close with fastcgi_keep_conn.</title>
<updated>2013-02-01T14:40:19+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-01T14:40:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=1c5fce75186ae792b76d055223cd0a70ac7370b0'/>
<id>1c5fce75186ae792b76d055223cd0a70ac7370b0</id>
<content type='text'>
With fastcgi_keep_conn it was possible that connection was closed after
FCGI_STDERR record with zero padding and without any further data read yet.
This happended as f-&gt;state was set to ngx_http_fastcgi_st_padding and then
"break" happened, resulting in p-&gt;length being set to f-&gt;padding, i.e. 0
(which in turn resulted in connection close).

Fix is to make sure we continue the loop after f-&gt;state is set.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
With fastcgi_keep_conn it was possible that connection was closed after
FCGI_STDERR record with zero padding and without any further data read yet.
This happended as f-&gt;state was set to ngx_http_fastcgi_st_padding and then
"break" happened, resulting in p-&gt;length being set to f-&gt;padding, i.e. 0
(which in turn resulted in connection close).

Fix is to make sure we continue the loop after f-&gt;state is set.
</pre>
</div>
</content>
</entry>
<entry>
<title>Request body: fixed client_body_in_file_only.</title>
<updated>2013-02-01T14:38:18+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-01T14:38:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=e97e4124e372d2db118d984988632d28f8966130'/>
<id>e97e4124e372d2db118d984988632d28f8966130</id>
<content type='text'>
After introduction of chunked request body reading support in 1.3.9 (r4931),
the rb-&gt;bufs wasn't set if request body was fully preread while calling the
ngx_http_read_client_request_body() function.

Reported by Yichun Zhang (agentzh).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
After introduction of chunked request body reading support in 1.3.9 (r4931),
the rb-&gt;bufs wasn't set if request body was fully preread while calling the
ngx_http_read_client_request_body() function.

Reported by Yichun Zhang (agentzh).
</pre>
</div>
</content>
</entry>
</feed>
