Skip to content
Permalink
Branch: master
Commits on Feb 11, 2020
Commits on Jan 17, 2020
Commits on Sep 30, 2019
  1. Core: removed dead code in ngx_rbtree_delete().

    vl-homutov committed Sep 30, 2019
    The result of ngx_rbtree_min() is always a node with the left child equal to
    sentinel, thus the check is unnecessary.
  2. Version bump.

    vl-homutov committed Sep 30, 2019
Commits on Apr 24, 2019
  1. Version bump.

    vl-homutov committed Apr 24, 2019
Commits on Apr 9, 2019
Commits on Jan 17, 2019
  1. Added the ngx_http_test_required_predicates() function.

    vl-homutov committed Jan 17, 2019
    In contrast to ngx_http_test_predicates(), it requires all values to be
    non-empty and not equal to "0".
  2. Version bump.

    vl-homutov committed Jan 17, 2019
Commits on Dec 25, 2018
Commits on Nov 21, 2018
  1. Upstream: revised upstream response time variables.

    vl-homutov committed Nov 21, 2018
    Variables now do not depend on presence of the HTTP status code in response.
    If the corresponding event occurred, variables contain time between request
    creation and the event, and "-" otherwise.
    
    Previously, intermediate value of the $upstream_response_time variable held
    unix timestamp.
Commits on Nov 13, 2018
  1. Version bump.

    vl-homutov committed Nov 13, 2018
Commits on Nov 12, 2018
  1. Stream: proxy_requests directive.

    vl-homutov committed Nov 12, 2018
    The directive allows to drop binding between a client and existing UDP stream
    session after receiving a specified number of packets.  First packet from the
    same client address and port will start a new session.  Old session continues
    to exist and will terminate at moment defined by configuration: either after
    receiving the expected number of responses, or after timeout, as specified by
    the "proxy_responses" and/or "proxy_timeout" directives.
    
    By default, proxy_requests is zero (disabled).
  2. Stream: session completion check code moved to a separate function.

    vl-homutov committed Nov 12, 2018
    The code refactored to simplify the ngx_stream_proxy_process() function
    and facilitate adding new session termination conditions.
Commits on Nov 7, 2018
  1. Stream: fixed possible use of a freed connection.

    vl-homutov committed Nov 7, 2018
    The session handler may result in session termination, thus a connection
    pool (from which c->udp was allocated) may be destroyed.
Commits on Oct 3, 2018
  1. Upstream: proxy_socket_keepalive and friends.

    vl-homutov committed Oct 3, 2018
    The directives enable the use of the SO_KEEPALIVE option on
    upstream connections.  By default, the value is left unchanged.
  2. Version bump.

    vl-homutov committed Oct 3, 2018
Commits on Aug 24, 2018
  1. Upstream: fixed request chain traversal (ticket #1618).

    vl-homutov committed Aug 24, 2018
    The problem does not manifest itself currently, because in case of
    non-buffered reading, chain link created by u->create_request method
    consists of a single element.
    
    Found by PVS-Studio.
Commits on Jun 15, 2018
  1. Upstream: ngx_http_upstream_random module.

    vl-homutov committed Jun 15, 2018
    The module implements random load-balancing algorithm with optional second
    choice.  In the latter case, the best of two servers is chosen, accounting
    number of connections and server weight.
    
    Example:
    
    upstream u {
        random [two [least_conn]];
    
        server 127.0.0.1:8080;
        server 127.0.0.1:8081;
        server 127.0.0.1:8082;
        server 127.0.0.1:8083;
    }
Commits on May 14, 2018
  1. Syslog: install cleanup handler only once.

    vl-homutov committed May 14, 2018
    If a socket was re-opened due to an error (02c2352d5b01 and fa0e093b64d7),
    additional cleanup handler was installed each time.
Commits on May 8, 2018
  1. Syslog: re-open syslog udp socket on send error (ticket #1477).

    vl-homutov committed May 8, 2018
    Previously, only unix domain sockets were reopened to tolerate cases when
    local syslog server was restarted.  It makes sense to treat other cases
    (for example, local IP address changes) similarly.
Commits on Apr 2, 2018
  1. Core: fixed build, broken by 63e91f263a49.

    vl-homutov committed Apr 2, 2018
    Both Solaris and Windows define "s_addr" as a macro.
Commits on Mar 27, 2018
  1. Core: style.

    vl-homutov committed Mar 27, 2018
Commits on Mar 22, 2018
  1. Core: added processing of version 2 of the PROXY protocol.

    vl-homutov committed Mar 22, 2018
    The protocol used on inbound connection is auto-detected and corresponding
    parser is used to extract passed addresses.  TLV parameters are ignored.
    
    The maximum supported size of PROXY protocol header is 107 bytes
    (similar to version 1).
Commits on Mar 1, 2018
  1. Access log: support for disabling escaping (ticket #1450).

    vl-homutov committed Mar 1, 2018
    Based on patches by Johannes Baiter <johannes.baiter@bsb-muenchen.de>
    and Calin Don.
Commits on Feb 22, 2018
Commits on Feb 15, 2018
Commits on Apr 3, 2017
  1. Mail: configurable socket buffer sizes.

    vl-homutov committed Apr 3, 2017
    The "rcvbuf" and "sndbuf" parameters are now supported by
    the "listen" directive.
  2. Stream: configurable socket buffer sizes.

    vl-homutov committed Apr 3, 2017
    The "rcvbuf" and "sndbuf" parameters are now supported by
    the "listen" directive.
Commits on Jan 26, 2017
  1. Version bump.

    vl-homutov committed Jan 26, 2017
Commits on Jan 25, 2017
  1. Upstream: removed compatibility shims from ngx_http_upstream_t.

    vl-homutov committed Jan 25, 2017
    The type is no longer modified in NGINX Plus.
Commits on Jan 19, 2017
  1. Stream: client SSL certificates were not checked in some cases.

    vl-homutov committed Jan 19, 2017
    If ngx_stream_ssl_init_connection() succeeded immediately, the check was not
    done.
    
    The bug had appeared in 1.11.8 (41cb1b64561d).
  2. Stream: fixed handling of non-ssl sessions.

    vl-homutov committed Jan 19, 2017
    A missing check could cause ngx_stream_ssl_handler() to be applied
    to a non-ssl session, which resulted in a null pointer dereference
    if ssl_verify_client is enabled.
    
    The bug had appeared in 1.11.8 (41cb1b64561d).
Commits on Jan 11, 2017
Commits on Dec 20, 2016
  1. Stream: client SSL certificates verification support.

    vl-homutov committed Dec 20, 2016
    New directives: "ssl_verify_client", "ssl_verify_depth",
    "ssl_client_certificate", "ssl_trusted_certificate", and
    "ssl_crl".
    
    New variables: $ssl_client_cert, $ssl_client_raw_cert,
    $ssl_client_s_dn, $ssl_client_i_dn, $ssl_client_serial,
    $ssl_client_fingerprint, $ssl_client_verify, $ssl_client_v_start,
    $ssl_client_v_end, and $ssl_client_v_remain.
Older
You can’t perform that action at this time.