Mercurial > hg > nginx-ranges
comparison src/http/modules/ngx_http_access_module.c @ 122:d25a1d6034f1 NGINX_0_3_8
nginx 0.3.8
*) Security: nginx now checks URI got from a backend in
"X-Accel-Redirect" header line or in SSI file for the "/../" paths
and zeroes.
*) Change: nginx now does not treat the empty user name in the
"Authorization" header line as valid one.
*) Feature: the "ssl_session_timeout" directives of the
ngx_http_ssl_module and ngx_imap_ssl_module.
*) Feature: the "auth_http_header" directive of the
ngx_imap_auth_http_module.
*) Feature: the "add_header" directive.
*) Feature: the ngx_http_realip_module.
*) Feature: the new variables to use in the "log_format" directive:
$bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri,
$request_time, $request_length, $upstream_status,
$upstream_response_time, $gzip_ratio, $uid_got, $uid_set,
$connection, $pipe, and $msec. The parameters in the "%name" form
will be canceled soon.
*) Change: now the false variable values in the "if" directive are the
empty string "" and string starting with "0".
*) Bugfix: while using proxied or FastCGI-server nginx may leave
connections and temporary files with client requests in open state.
*) Bugfix: the worker processes did not flush the buffered logs on
graceful exit.
*) Bugfix: if the request URI was changes by the "rewrite" directive
and the request was proxied in location given by regular expression,
then the incorrect request was transferred to backend; bug appeared
in 0.2.6.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" header.
*) Bugfix: nginx may stop to accept requests if the "rtsig" method and
several worker processes were used.
*) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in
SSI commands.
*) Bugfix: if the response was ended just after the SSI command and
gzipping was used, then the response did not transferred complete or
did not transferred at all.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Wed, 09 Nov 2005 00:00:00 +0300 |
parents | 71c46860eb55 |
children | 4cd3e70c4d60 |
comparison
equal
deleted
inserted
replaced
121:737953b238a4 | 122:d25a1d6034f1 |
---|---|
12 /* AF_INET only */ | 12 /* AF_INET only */ |
13 | 13 |
14 typedef struct { | 14 typedef struct { |
15 in_addr_t mask; | 15 in_addr_t mask; |
16 in_addr_t addr; | 16 in_addr_t addr; |
17 unsigned deny; | 17 ngx_uint_t deny; /* unsigned deny:1; */ |
18 } ngx_http_access_rule_t; | 18 } ngx_http_access_rule_t; |
19 | 19 |
20 | 20 |
21 typedef struct { | 21 typedef struct { |
22 ngx_array_t *rules; /* array of ngx_http_access_rule_t */ | 22 ngx_array_t *rules; /* array of ngx_http_access_rule_t */ |
104 | 104 |
105 rule = alcf->rules->elts; | 105 rule = alcf->rules->elts; |
106 for (i = 0; i < alcf->rules->nelts; i++) { | 106 for (i = 0; i < alcf->rules->nelts; i++) { |
107 | 107 |
108 ngx_log_debug3(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 108 ngx_log_debug3(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
109 "%08XD %08XD %08XD", | 109 "access: %08XD %08XD %08XD", |
110 sin->sin_addr.s_addr, rule[i].mask, rule[i].addr); | 110 sin->sin_addr.s_addr, rule[i].mask, rule[i].addr); |
111 | 111 |
112 if ((sin->sin_addr.s_addr & rule[i].mask) == rule[i].addr) { | 112 if ((sin->sin_addr.s_addr & rule[i].mask) == rule[i].addr) { |
113 if (rule[i].deny) { | 113 if (rule[i].deny) { |
114 ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, | 114 ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, |