comparison src/http/ngx_http_request.c @ 366:babd3d9efb62 NGINX_0_6_27

nginx 0.6.27 *) Change: now by default the rtsig method is not built on Linux 2.6.18+. *) Change: now a request method is not changed while redirection to a named location via an "error_page" directive. *) Feature: the "resolver" and "resolver_timeout" directives in SMTP proxy. *) Feature: the "post_action" directive supports named locations. *) Bugfix: a segmentation fault occurred in worker process, if a request was redirected from proxy, FastCGI, or memcached location to static named locations. *) Bugfix: browsers did not repeat SSL handshake if there is no valid client certificate in first handshake. Thanks to Alexander V. Inyukhin. *) Bugfix: if response code 495-497 was redirected via an "error_page" directive without code change, then nginx tried to allocate too many memory. *) Bugfix: memory leak in long-lived non buffered connections. *) Bugfix: memory leak in resolver. *) Bugfix: a segmentation fault occurred in worker process, if a request was redirected from proxy, FastCGI, or memcached location to static named locations. *) Bugfix: in the $proxy_host and $proxy_port variables caching. Thanks to Sergey Bochenkov. *) Bugfix: a "proxy_pass" directive with variables used incorrectly the same port as in another "proxy_pass" directive with the same host name and without variables. Thanks to Sergey Bochenkov. *) Bugfix: an alert "sendmsg() failed (9: Bad file descriptor)" on some 64-bit platforms while reconfiguration. *) Bugfix: a segmentation fault occurred in worker process, if empty stub block was used second time in SSI. *) Bugfix: in copying URI part contained escaped symbols into arguments.
author Igor Sysoev <http://sysoev.ru>
date Wed, 12 Mar 2008 00:00:00 +0300
parents a39aab45a53f
children 6639b93e81b2
comparison
equal deleted inserted replaced
365:9b0140fa1132 366:babd3d9efb62
1428 1428
1429 if (rc != X509_V_OK) { 1429 if (rc != X509_V_OK) {
1430 ngx_log_error(NGX_LOG_INFO, c->log, 0, 1430 ngx_log_error(NGX_LOG_INFO, c->log, 0,
1431 "client SSL certificate verify error: (%l:%s)", 1431 "client SSL certificate verify error: (%l:%s)",
1432 rc, X509_verify_cert_error_string(rc)); 1432 rc, X509_verify_cert_error_string(rc));
1433
1434 ngx_ssl_remove_cached_session(sscf->ssl.ctx,
1435 (SSL_get0_session(c->ssl->connection)));
1436
1433 ngx_http_finalize_request(r, NGX_HTTPS_CERT_ERROR); 1437 ngx_http_finalize_request(r, NGX_HTTPS_CERT_ERROR);
1434 return; 1438 return;
1435 } 1439 }
1436 1440
1437 if (SSL_get_peer_certificate(c->ssl->connection) 1441 if (SSL_get_peer_certificate(c->ssl->connection)
1438 == NULL) 1442 == NULL)
1439 { 1443 {
1440 ngx_log_error(NGX_LOG_INFO, c->log, 0, 1444 ngx_log_error(NGX_LOG_INFO, c->log, 0,
1441 "client sent no required SSL certificate"); 1445 "client sent no required SSL certificate");
1446
1447 ngx_ssl_remove_cached_session(sscf->ssl.ctx,
1448 (SSL_get0_session(c->ssl->connection)));
1449
1442 ngx_http_finalize_request(r, NGX_HTTPS_NO_CERT); 1450 ngx_http_finalize_request(r, NGX_HTTPS_NO_CERT);
1443 return; 1451 return;
1444 } 1452 }
1445 } 1453 }
1446 } 1454 }
2446 r->header_only = 1; 2454 r->header_only = 1;
2447 r->post_action = 1; 2455 r->post_action = 1;
2448 2456
2449 r->read_event_handler = ngx_http_block_reading; 2457 r->read_event_handler = ngx_http_block_reading;
2450 2458
2451 ngx_http_internal_redirect(r, &clcf->post_action, NULL); 2459 if (clcf->post_action.data[0] == '/') {
2460 ngx_http_internal_redirect(r, &clcf->post_action, NULL);
2461
2462 } else {
2463 ngx_http_named_location(r, &clcf->post_action);
2464 }
2452 2465
2453 return NGX_OK; 2466 return NGX_OK;
2454 } 2467 }
2455 2468
2456 2469