comparison src/http/modules/perl/ngx_http_perl_module.c @ 526:0161f3197817 NGINX_0_8_15

nginx 0.8.15 *) Security: a segmentation fault might occur in worker process while specially crafted request handling. Thanks to Chris Ries. *) Bugfix: if names .domain.tld, .sub.domain.tld, and .domain-some.tld were defined, then the name .sub.domain.tld was matched by .domain.tld. *) Bugfix: in transparency support in the ngx_http_image_filter_module. *) Bugfix: in file AIO. *) Bugfix: in X-Accel-Redirect usage; the bug had appeared in 0.8.11. *) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.
author Igor Sysoev <http://sysoev.ru>
date Mon, 14 Sep 2009 00:00:00 +0400
parents 80f7156c2965
children 005a70f9573b
comparison
equal deleted inserted replaced
525:1b64f9884263 526:0161f3197817
236 236
237 ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, 237 ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
238 "perl handler done: %i", rc); 238 "perl handler done: %i", rc);
239 239
240 if (rc == NGX_DONE) { 240 if (rc == NGX_DONE) {
241 ngx_http_finalize_request(r, rc);
241 return; 242 return;
242 } 243 }
243 244
244 if (rc > 600) { 245 if (rc > 600) {
245 rc = NGX_OK; 246 rc = NGX_OK;
255 256
256 ctx->filename.data = NULL; 257 ctx->filename.data = NULL;
257 ctx->redirect_uri.len = 0; 258 ctx->redirect_uri.len = 0;
258 259
259 if (ctx->done || ctx->next) { 260 if (ctx->done || ctx->next) {
261 ngx_http_finalize_request(r, NGX_DONE);
260 return; 262 return;
261 } 263 }
262 264
263 if (uri.len) { 265 if (uri.len) {
264 ngx_http_internal_redirect(r, &uri, &args); 266 ngx_http_internal_redirect(r, &uri, &args);
267 ngx_http_finalize_request(r, NGX_DONE);
265 return; 268 return;
266 } 269 }
267 270
268 if (rc == NGX_OK || rc == NGX_HTTP_OK) { 271 if (rc == NGX_OK || rc == NGX_HTTP_OK) {
269 ngx_http_send_special(r, NGX_HTTP_LAST); 272 ngx_http_send_special(r, NGX_HTTP_LAST);