summaryrefslogtreecommitdiffhomepage
AgeCommit message (Collapse)AuthorFilesLines
2011-08-30Unsatisfiable range with start value greater than content lengthIgor Sysoev1-5/+1
was not properly skipped. The bug has been introduced in r4057.
2011-08-30ngx_http_range_parse() should be static.Igor Sysoev1-2/+2
2011-08-30Ranges processing small optimization.Igor Sysoev1-8/+9
2011-08-30Now unsatisfiable ranges are processed according to RFC 2616.Igor Sysoev1-6/+8
2011-08-30Ranges processing small optimization.Igor Sysoev1-24/+15
2011-08-30Style fix.Igor Sysoev1-2/+2
2011-08-26Now if total size of all ranges is greater than source response size,Igor Sysoev1-12/+21
then nginx disables ranges and returns just the source response. This fix should not affect well-behaving applications but will defeat DoS attempts exploiting malicious byte ranges.
2011-08-25Cache size accounting fix: actual cache size on disk was less thanIgor Sysoev1-0/+1
needed by sum of sizes of files loaded by worker processes themselves while cache loader was running. The bug has been introduced in r3900.
2011-08-23Better handling of various per-server ssl options with SNI.Maxim Dounin1-0/+18
SSL_set_SSL_CTX() doesn't touch values cached within ssl connection structure, it only changes certificates (at least as of now, OpenSSL 1.0.0d and earlier). As a result settings like ssl_verify_client, ssl_verify_depth, ssl_prefer_server_ciphers are only configurable on per-socket basis while with SNI it should be possible to specify them different for two servers listening on the same socket. Workaround is to explicitly re-apply settings we care about from context to ssl connection in servername callback. Note that SSL_clear_options() is only available in OpenSSL 0.9.8m+. I.e. with older versions it is not possible to clear ssl_prefer_server_ciphers option if it's set in default server for a socket.
2011-08-23Version bump.Igor Sysoev2-3/+3
2011-08-23Restore the lost negation.Ruslan Ermilov1-1/+1
2011-08-23Removing incomplete draft documentation from release tarball and zip.Igor Sysoev1-0/+6
2011-08-23Grammar fixes in CHANGES.Igor Sysoev1-8/+8
2011-08-23CHANGES conversion from KOI8-R to UTF-8.Igor Sysoev4-2676/+2676
2011-08-23Grammar fixes in CHANGES.Igor Sysoev1-9/+9
2011-08-23XSLT regeneration for the previous commit.Igor Sysoev1-1/+1
2011-08-23Traling spaces removal in text CHANGES files.Igor Sysoev1-1/+2
2011-08-23XSLT regeneration for r4023.Igor Sysoev1-7/+12
2011-08-23Get rid of " <br/>" hacks.Ruslan Ermilov1-10/+10
2011-08-23- support <br/> in the middle of inputRuslan Ermilov1-9/+18
- fixed "<br>" lookup (eliminates the need in " <br/>" hacks) - fixed maximum length for unbreakable input - fixed space lookup (allows a space at column 77 to break a line)
2011-08-22release-1.1.1 tagIgor Sysoev1-0/+1
2011-08-22nginx-1.1.1-RELEASErelease-1.1.1Igor Sysoev1-1/+145
2011-08-22SIGWINCH/NOACCEPT signal is disabled now in non-daemon mode.Igor Sysoev1-2/+7
Non-daemon mode is currently used by supervisord, daemontools and so on or during debugging. The NOACCEPT signal is only used for online upgrade which is not supported when nginx is run under supervisord, etc., so this change should not break existant setups.
2011-08-22The change in adaptive loader behaviour introduced in r3975:Igor Sysoev1-40/+26
now cache loader processes either as many files as specified by loader_files or works no more than time specified by loader_threshold during each iteration. loader_threshold was previously used to decrease loader_files or to increase loader_timeout and this might eventually result in downgrading loader_files to 1 and increasing loader_timeout to large values causing loading cache for forever.
2011-08-22Fix buffer overrun under Windows.Maxim Dounin1-1/+2
2011-08-21Move SO_ACCEPTFILTER and TCP_DEFER_ACCEPT checks into configure.Maxim Dounin4-11/+24
NetBSD 5.0+ has SO_ACCEPTFILTER support merged from FreeBSD, and having accept filter check in FreeBSD-specific ngx_freebsd_config.h prevents it from being used on NetBSD. Therefore move the check into configure (and do the same for Linux-specific TCP_DEFER_ACCEPT, just to be in line).
2011-08-19Fix ignored headers handling in fastcgi/scgi/uwsgi.Maxim Dounin3-3/+27
The bug had appeared in r3561 (fastcgi), r3638 (scgi), r3567 (uwsgi).
2011-08-19XSLT regeneration for r3998.Ruslan Ermilov1-11/+30
2011-08-19- Added missing dependencies for the CHANGES{,ru} targets.Ruslan Ermilov1-6/+7
- Pass string params to xsltproc. - Removed extraneous rule bodies.
2011-08-18Complain on invalid log levels.Maxim Dounin1-3/+7
Previously only first log level was required to be correct, while error_log directive in fact accepts list of levels (e.g. one may specify "error_log ... debug_core debug_http;"). This resulted in (avoidable) wierd behaviour on missing semicolon after error_log directive, e.g. error_log /path/to/log info index index.php; silently skipped index directive and it's arguments (trying to interpret them as log levels without checking to be correct).
2011-08-18Upstream: properly allocate memory for tried flags.Maxim Dounin1-3/+8
Previous allocation only took into account number of non-backup servers, and this caused memory corruption with many backup servers. See report here: http://mailman.nginx.org/pipermail/nginx/2011-May/026531.html
2011-08-18Fixing cpu hog with all upstream servers marked "down".Maxim Dounin1-1/+5
The following configuration causes nginx to hog cpu due to infinite loop in ngx_http_upstream_get_peer(): upstream backend { server 127.0.0.1:8080 down; server 127.0.0.1:8080 down; } server { ... location / { proxy_pass http://backend; } } Make sure we don't loop infinitely in ngx_http_upstream_get_peer() but stop after resetting peer weights once. Return 0 if we are stuck. This is guaranteed to work as peer 0 always exists, and eventually ngx_http_upstream_get_round_robin_peer() will do the right thing falling back to backup servers or returning NGX_BUSY.
2011-08-18Fixing proxy_set_body and proxy_pass_request_body with SSL.Maxim Dounin1-2/+1
Flush flag wasn't set in constructed buffer and this prevented any data from being actually sent to upstream due to SSL buffering. Make sure we always set flush in the last buffer we are going to sent. See here for report: http://nginx.org/pipermail/nginx-ru/2011-June/041552.html
2011-08-18Fix names of the referer hash size directives introduced in r3940.Igor Sysoev1-1/+1
2011-08-18Rebuild manpage only if needed.Maxim Dounin1-1/+3
2011-08-18Fix body with request_body_in_single_buf.Maxim Dounin1-1/+3
If there were preread data and request body was big enough first part of the request body was duplicated. See report here: http://mailman.nginx.org/pipermail/nginx/2011-July/027756.html
2011-08-18Correctly set body if it's preread and there are extra data.Maxim Dounin1-0/+1
Previously all available data was used as body, resulting in garbage after real body e.g. in case of pipelined requests. Make sure to use only as many bytes as request's Content-Length specifies.
2011-08-18Lower optimization level for Sun Studio before 12.1.Maxim Dounin1-5/+17
At least Sun Studio 12 has problems with bit-fields exposed by nginx code (caught by test suite). They seems to be fixed in Sun Studio 12.1. As a workaround use "-fast -xalias_level=any" for older versions, it resolves the problem.
2011-08-17Detect POSIX semaphores in librt on Solaris (ticket #3).Maxim Dounin1-0/+13
Patch by Denis Ivanov.
2011-08-13Configure: catch up with new Linux version numbering (ticket #5).Maxim Dounin1-1/+3
Catch up with new Linux version numbering scheme as announced at [1] and suppress unrecognized versions to actually use default 0. [1] https://lkml.org/lkml/2011/5/29/204
2011-08-10- Replaced explicit link to bugtracker with a support linkRuslan Ermilov1-11/+10
(which will soon link to Trac). - Commented out reference to non-existing nginx.conf(5).
2011-08-10Mention our preferred way of accepting bug reports.Ruslan Ermilov1-3/+4
2011-08-09Don't ignore xmllint errors.Ruslan Ermilov1-1/+1
2011-08-09Regen after makefile changes.Ruslan Ermilov3-31/+37
2011-08-05using sed instead of perlIgor Sysoev1-1/+1
2011-08-05skeleton for documentation processingIgor Sysoev10-0/+271
2011-08-05update documentation build procedureIgor Sysoev1-6/+7
2011-08-05fix gzip quantity: "q=0." and "q=1." are valid values according to RFCIgor Sysoev1-1/+1
2011-08-04refactor gzip quantity introduced in r3981: it ignored "q=1.000"Igor Sysoev1-27/+36
2011-08-04A new fix for the case when ssl_session_cache defined, but ssl is notIgor Sysoev5-10/+7
enabled in any server. The previous r1033 does not help when unused zone becomes used after reconfiguration, so it is backed out. The initial thought was to make SSL modules independed from SSL implementation and to keep OpenSSL code dependance as much as in separate files.