view src/os/win32/nginx_icon32.xpm @ 5402:4d0c70541784

SPDY: fixed connection leak while waiting for request body. If an error occurs in a SPDY connection, the c->error flag is set on every fake request connection, and its read or write event handler is called, in order to finalize it. But while waiting for a request body, it was a no-op since the read event handler ngx_http_request_handler() calls r->read_event_handler that had been set to ngx_http_block_reading().
author Valentin Bartenev <vbart@nginx.com>
date Tue, 01 Oct 2013 00:00:57 +0400
parents 7e24168b0853
children
line wrap: on
line source

/* XPM */
static char * nginx_xpm[] = {
"32 32 2 2",
/* colors */
"   c none",
"GG c #009900",
/* pixels */
"                                                                ",
"                                                                ",
"                                                                ",
"                                                                ",
"                  GGGGGGGGGGGGGGGGGGGGGGGGGGGG                  ",
"                GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG                ",
"                GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG                ",
"              GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG              ",
"              GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG              ",
"            GGGGGGGGGG                    GGGGGGGGGG            ",
"            GGGGGGGGGG                    GGGGGGGGGG            ",
"          GGGGGGGGGG                        GGGGGGGGGG          ",
"          GGGGGGGGGG                        GGGGGGGGGG          ",
"        GGGGGGGGGG                                              ",
"        GGGGGGGGGG                                              ",
"      GGGGGGGGGG            GGGGGGGGGGGGGGGGGGGGGGGGGGGGGG      ",
"      GGGGGGGGGG          GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG      ",
"        GGGGGGGGGG        GGGGGGGGGGGGGGGGGGGGGGGGGGGGGG        ",
"        GGGGGGGGGG        GGGGGGGGGGGGGGGGGGGGGGGGGGGGGG        ",
"          GGGGGGGGGG        GGGGGGGGGGGGGGGGGGGGGGGGGG          ",
"          GGGGGGGGGG                        GGGGGGGGGG          ",
"            GGGGGGGGGG                    GGGGGGGGGG            ",
"            GGGGGGGGGG                    GGGGGGGGGG            ",
"              GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG              ",
"              GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG              ",
"                GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG                ",
"                GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG                ",
"                  GGGGGGGGGGGGGGGGGGGGGGGGGGGG                  ",
"                                                                ",
"                                                                ",
"                                                                ",
"                                                                "