details: https://hg.nginx.org/nginx/rev/4f30f75dbdf3 branches: changeset: 7685:4f30f75dbdf3 user: Ruslan Ermilov <ru@nginx.com> date: Tue Jul 21 20:34:29 2020 +0300 description: Core: close PID file when writing fails. Reported by Jinhua Tan. diffstat: src/core/ngx_cycle.c | 7 +++++-- 1 files changed, 5 insertions(+), 2 deletions(-) diffs (35 lines): diff -r 32a343635b5by ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/c5840ca2063d branches: changeset: 7673:c5840ca2063d user: Ruslan Ermilov <ru@nginx.com> date: Fri Jul 03 16:16:47 2020 +0300 description: HTTP/2: lingering close after GOAWAY. After sending the GOAWAY frame, a connection is now closed using the lingering close mechanism. This allows for the reliable delivery of the GOAWAY frames, whileby ru@nginx.com - Nginx Development
On Mon, Jun 15, 2020 at 08:48:41AM +0000, Eran Kornblau wrote: > Hi > > Something I noticed today while looking at the code, it probably won't matter to anyone ever... > But just sending for the sake of perfection :) > > Thanks! > > Eran Committed, thanks! https://hg.nginx.org/nginx/rev/7e0719fb528b > # HG changeset patch > # User erankor <erankor@gmail.com&gby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/7e0719fb528b branches: changeset: 7671:7e0719fb528b user: Eran Kornblau <erankor@gmail.com> date: Mon Jun 15 03:58:31 2020 -0400 description: Fixed potential leak of temp pool. In case ngx_hash_add_key() fails, need to goto failed instead of returning, so that temp_pool will be destoryed. diffstat: src/http/ngx_http.c | 4 ++-- 1 filby ru@nginx.com - Nginx Development
On Thu, May 21, 2020 at 09:45:24PM +0800, Jim T wrote: > Hello! > > As far as I understand it, `ngx_create_pidfile` is a function that works > independently. There is no action to close the pid file externally, so we > need to close the pid file when the writing it failed. There are also > reports here https://github.com/nginx/nginx/pull/52. > > # HG changeset patch >by ru@nginx.com - Nginx Development
Hi there, On Mon, Apr 27, 2020 at 04:26:31PM -0700, Thibault Charbonnier wrote: > On 4/25/20 6:12 PM, Maxim Dounin wrote: > > A better approach might be to check parent's pid instead, much > > like we do when handling the changebin signal on unix (see > > src/os/unix/ngx_process.c). > > Great! Thanks for the suggestion. Below is a revised approach for the > patchby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/7cbf6389194b branches: changeset: 7663:7cbf6389194b user: Ruslan Ermilov <ru@nginx.com> date: Mon Jun 01 22:31:23 2020 +0300 description: Fixed SIGQUIT not removing listening UNIX sockets (closes #753). Listening UNIX sockets were not removed on graceful shutdown, preventing the next runs. The fix is to replace the custom socket closingby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/9c038f5e0464 branches: changeset: 7662:9c038f5e0464 user: Ruslan Ermilov <ru@nginx.com> date: Mon Jun 01 20:19:27 2020 +0300 description: Fixed removing of listening UNIX sockets when "changing binary". When changing binary, sending a SIGTERM to the new binary's master process should not remove inherited UNIX sockets unless theby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/716eddd74bc2 branches: changeset: 7647:716eddd74bc2 user: Ruslan Ermilov <ru@nginx.com> date: Thu Apr 23 15:10:26 2020 +0300 description: gRPC: WINDOW_UPDATE after END_STREAM handling (ticket #1797). As per https://tools.ietf.org/html/rfc7540#section-6.9, WINDOW_UPDATE received after a frame with the END_STREAM flag should be handled andby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/2096b21fcd10 branches: changeset: 7646:2096b21fcd10 user: Ruslan Ermilov <ru@nginx.com> date: Thu Apr 23 15:10:24 2020 +0300 description: gRPC: RST_STREAM(NO_ERROR) handling (ticket #1792). As per https://tools.ietf.org/html/rfc7540#section-8.1, : A server can send a complete response prior to the client : sending an entire request if tby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/ed3a10cf88e8 branches: changeset: 7645:ed3a10cf88e8 user: Ruslan Ermilov <ru@nginx.com> date: Thu Apr 23 15:10:21 2020 +0300 description: Version bump. diffstat: src/core/nginx.h | 4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diffs (14 lines): diff -r 3a860f22c879 -r ed3a10cf88e8 src/core/nginx.h --- a/src/core/nginx.h Tby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/681b78a98a52 branches: changeset: 7638:681b78a98a52 user: Ruslan Ermilov <ru@nginx.com> date: Wed Apr 08 01:02:17 2020 +0300 description: The new auth_delay directive for delaying unauthorized requests. The request processing is delayed by a timer. Since nginx updates internal time once at the start of each event loop iteration, this noby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/0cb942c1c1aa branches: changeset: 7637:0cb942c1c1aa user: Ruslan Ermilov <ru@nginx.com> date: Fri Mar 13 02:12:10 2020 +0300 description: Auth basic: explicitly zero out password buffer. diffstat: src/http/modules/ngx_http_auth_basic_module.c | 37 +++++++++++++------------- 1 files changed, 18 insertions(+), 19 deletions(-) diffs (9by ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/2a9aeb3426c3 branches: changeset: 7636:2a9aeb3426c3 user: Ruslan Ermilov <ru@nginx.com> date: Mon Mar 16 12:41:41 2020 +0300 description: Version bump. diffstat: src/core/nginx.h | 4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diffs (14 lines): diff -r 4eb606b4a5b5 -r 2a9aeb3426c3 src/core/nginx.h --- a/src/core/nginx.h Tby ru@nginx.com - Nginx Development
On Mon, Jan 20, 2020 at 08:27:42PM +0800, Zexuan Luo wrote: > # HG changeset patch > # User spacewander <spacewanderlzx@gmail.com> > # Date 1579523127 -28800 > # Mon Jan 20 20:25:27 2020 +0800 > # Branch ident > # Node ID 86dbfc59e9c01608244c4fdc0d9a87fd9d330648 > # Parent 4fb5603514f2d324c50cb7e12c6ed0dc8935de0f > Keep remote port unchanged if real address doesby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/8a7b59347401 branches: changeset: 7618:8a7b59347401 user: Daniil Bondarev <bondarev@amazon.com> date: Tue Jan 14 14:20:08 2020 +0300 description: HTTP/2: removed ngx_debug_point() call. With the recent change to prevent frames flood in d4448892a294, nginx will finalize the connection with NGX_HTTP_V2_INTERNAL_ERROR whenever floodby ru@nginx.com - Nginx Development
On Tue, Dec 24, 2019 at 08:00:26PM +0100, Marcin Kozlowski wrote: > Thanks. > > Works. For the reference, this is the code I used: > > ngx_uint_t n; > ngx_table_elt_t **h; > ngx_array_t a; > a = req->headers_in.x_forwarded_for; > n = a.nelts; > h = a.elts; > > > for (i = 0; i<n; i++) { > ngx_log_error(NGX_LOG_ERR, req->connecby ru@nginx.com - Nginx Development
On Mon, Dec 23, 2019 at 11:04:43PM +0100, Marcin Kozlowski wrote: > Hi List, > > How to get x_forwarded_for sent in the request in NGINX module (NAXSI in > particular): > > My attempt: > > ngx_log_error(NGX_LOG_ERR, req->connection->log, > 0, "test %s", (char *)req->headers_in.x_forwarded_for.elts); > > The bigger problem I am tby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/4718a646187a branches: changeset: 7608:4718a646187a user: Sergey A. Osokin <osa@FreeBSD.org.ru> date: Mon Dec 23 18:56:21 2019 +0300 description: Update manpage, sort command line options. diffstat: docs/man/nginx.8 | 15 ++++++++------- 1 files changed, 8 insertions(+), 7 deletions(-) diffs (49 lines): diff -r d0d6cf5031a3 -r 4718aby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/d0d6cf5031a3 branches: changeset: 7607:d0d6cf5031a3 user: Ruslan Ermilov <ru@nginx.com> date: Mon Dec 23 15:45:46 2019 +0300 description: Discard request body when redirecting to a URL via error_page. Reported by Bert JW Regeer and Francisco Oca Gonzalez. diffstat: src/http/ngx_http_special_response.c | 6 ++++++ 1 files changed, 6 iby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/db8df9cd84c8 branches: changeset: 7606:db8df9cd84c8 user: Ruslan Ermilov <ru@nginx.com> date: Mon Dec 16 15:19:01 2019 +0300 description: Rewrite: disallow empty replacements. While empty replacements were caught at run-time, parsing code of the "rewrite" directive expects that a minimum length of the "replacement" arby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/02a539522be4 branches: changeset: 7605:02a539522be4 user: Ruslan Ermilov <ru@nginx.com> date: Mon Dec 16 15:19:01 2019 +0300 description: Tolerate '\0' in URI when mapping URI to path. If a rewritten URI has the null character, only a part of URI was copied to a memory buffer allocated for path. In some setups this could be exploited toby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/7aa20af4ac00 branches: changeset: 7604:7aa20af4ac00 user: Ruslan Ermilov <ru@nginx.com> date: Mon Dec 16 15:19:01 2019 +0300 description: Rewrite: fixed segfault with rewritten URI and "alias". The "alias" directive cannot be used in the same location where URI was rewritten. This has been detected in the "rewriby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/e55e28e6998f branches: changeset: 7603:e55e28e6998f user: Ruslan Ermilov <ru@nginx.com> date: Mon Dec 16 15:19:01 2019 +0300 description: Fixed request finalization in ngx_http_index_handler(). Returning 500 instead of NGX_ERROR is preferable here because header has not yet been sent to the client. diffstat: src/http/modules/ngx_http_by ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/b399246ea45d branches: changeset: 7602:b399246ea45d user: Ruslan Ermilov <ru@nginx.com> date: Mon Dec 16 15:19:01 2019 +0300 description: Saved some memory allocations. In configurations when "root" has variables, some modules unnecessarily allocated memory for the "Location" header value. diffstat: src/http/moduleby ru@nginx.com - Nginx Development
details: https://hg.nginx.org/nginx/rev/c1a7d3672653 branches: changeset: 7601:c1a7d3672653 user: Ruslan Ermilov <ru@nginx.com> date: Mon Dec 16 15:19:01 2019 +0300 description: Dav: fixed Location in successful MKCOL response. Instead of reducing URI length to not include the terminating '\0' character in 6ddaac3e0bf7, restore the terminating '/' character. diffstat: src/hby ru@nginx.com - Nginx Development
On Wed, Dec 18, 2019 at 06:35:35PM +0100, Gábor Boskovits wrote: > Hello Maxim, > > Maxim Dounin <mdounin@mdounin.ru> ezt írta (időpont: 2019. dec. 18., > Sze, 18:24): > > > > Hello! > > > > On Mon, Dec 16, 2019 at 03:02:37PM +0100, Gábor Boskovits wrote: > > > > > On berlin.guix.gnu.org we observed a regression upon upgrading nginx >by ru@nginx.com - Nginx Development
On Mon, Dec 16, 2019 at 05:45:55PM +0000, Jasper Wallace wrote: > We are having intermittent problems uploading files via nginx to a > flask backend over http2: > > 2019/12/16 16:07:08 27658#27658: *1 event timer: 3, old: > 1576512608187, new: 1576512608301 > 2019/12/16 16:07:08 27658#27658: *1 http2 idle handler > 2019/12/16 16:07:08 27658#27658: *1 http2 flood detected wby ru@nginx.com - Nginx Mailing List - English
On Sun, Dec 01, 2019 at 04:41:23AM +0300, Sergey A. Osokin wrote: > # HG changeset patch > # User Sergey A. Osokin <osa@FreeBSD.org.ru> > # Date 1575163872 -10800 > # Sun Dec 01 04:31:12 2019 +0300 > # Node ID 477a78d1b14e415a80b6bfb3d829eb408f33f390 > # Parent d13eddd9e2529b4bc30dc00aad959bd10ced4c33 > Update nginx(8) manual page. > Sort the command line optionby ru@nginx.com - Nginx Development
On Mon, Nov 11, 2019 at 05:23:55PM +0300, Михаил Монашёв wrote: > Здравствуйте. > > Оказалось, что client_max_body_size не работает внутри if-а . > > Хотел ограничивать размер GET- и POST-запросов, не ограничивая размер > PUT-запросов, поступающих сby ru@nginx.com - Nginx Mailing List - Russian