Mercurial > hg > nginx-vendor-1-0
comparison src/http/modules/perl/nginx.xs @ 638:692f4d4d7f10 NGINX_1_0_9
nginx 1.0.9
*) Change: now the 0x7F-0x1F characters are escaped as \xXX in an
access_log.
*) Change: now SIGWINCH signal works only in daemon mode.
*) Feature: "proxy/fastcgi/scgi/uwsgi_ignore_headers" directives support
the following additional values: X-Accel-Limit-Rate,
X-Accel-Buffering, X-Accel-Charset.
*) Feature: decrease of memory consumption if SSL is used.
*) Feature: accept filters are now supported on NetBSD.
*) Feature: the "uwsgi_buffering" and "scgi_buffering" directives.
Thanks to Peter Smit.
*) Bugfix: a segmentation fault occurred on start or while
reconfiguration if the "ssl" directive was used at http level and
there was no "ssl_certificate" defined.
*) Bugfix: some UTF-8 characters were processed incorrectly.
Thanks to Alexey Kuts.
*) Bugfix: the ngx_http_rewrite_module directives specified at "server"
level were executed twice if no matching locations were defined.
*) Bugfix: a socket leak might occurred if "aio sendfile" was used.
*) Bugfix: connections with fast clients might be closed after
send_timeout if file AIO was used.
*) Bugfix: in the ngx_http_autoindex_module.
*) Bugfix: the module ngx_http_mp4_module did not support seeking on
32-bit platforms.
*) Bugfix: non-cacheable responses might be cached if
"proxy_cache_bypass" directive was used.
Thanks to John Ferlito.
*) Bugfix: cached responses with an empty body were returned
incorrectly; the bug had appeared in 0.8.31.
*) Bugfix: 201 responses of the ngx_http_dav_module were incorrect; the
bug had appeared in 0.8.32.
*) Bugfix: in the "return" directive.
*) Bugfix: the "ssl_verify_client", "ssl_verify_depth", and
"ssl_prefer_server_ciphers" directives might work incorrectly if SNI
was used.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Tue, 01 Nov 2011 00:00:00 +0400 |
parents | 8214eaef3530 |
children | ad25218fd14b |
comparison
equal
deleted
inserted
replaced
637:ea7441793bba | 638:692f4d4d7f10 |
---|---|
472 { | 472 { |
473 r->headers_out.content_length_n = (off_t) SvIV(value); | 473 r->headers_out.content_length_n = (off_t) SvIV(value); |
474 r->headers_out.content_length = header; | 474 r->headers_out.content_length = header; |
475 } | 475 } |
476 | 476 |
477 if (header->key.len == sizeof("Content-Encoding") - 1 | |
478 && ngx_strncasecmp(header->key.data, "Content-Encoding", | |
479 sizeof("Content-Encoding") - 1) == 0) | |
480 { | |
481 r->headers_out.content_encoding = header; | |
482 } | |
483 | |
477 | 484 |
478 void | 485 void |
479 filename(r) | 486 filename(r) |
480 CODE: | 487 CODE: |
481 | 488 |
834 hash = ngx_hash_strlow(lowcase, p, len); | 841 hash = ngx_hash_strlow(lowcase, p, len); |
835 | 842 |
836 var.len = len; | 843 var.len = len; |
837 var.data = lowcase; | 844 var.data = lowcase; |
838 | 845 |
839 #if (NGX_LOG_DEBUG) | 846 #if (NGX_DEBUG) |
840 | 847 |
841 if (value) { | 848 if (value) { |
842 ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 849 ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
843 "perl variable: \"%V\"=\"%V\"", &var, &val); | 850 "perl variable: \"%V\"=\"%V\"", &var, &val); |
844 } else { | 851 } else { |