Mercurial > hg > nginx-vendor-0-7
comparison src/http/modules/ngx_http_proxy_module.c @ 502:89dc5654117c NGINX_0_7_63
nginx 0.7.63
*) Security: now "/../" are disabled in "Destination" request header
line.
*) Change: minimum supported OpenSSL version is 0.9.7.
*) Change: the "ask" parameter of the "ssl_verify_client" directive was
changed to the "optional" parameter and now it checks a client
certificate if it was offered.
Thanks to Brice Figureau.
*) Feature: now the "-V" switch shows TLS SNI support.
*) Feature: the $ssl_client_verify variable.
Thanks to Brice Figureau.
*) Feature: the "ssl_crl" directive.
Thanks to Brice Figureau.
*) Bugfix: the $ssl_client_cert variable usage corrupted memory; the
bug had appeared in 0.7.7.
Thanks to Sergey Zhuravlev.
*) Feature: now the start cache loader runs in a separate process; this
should improve large caches handling.
*) Feature: now temporary files and permanent storage area may reside
at different file systems.
*) Bugfix: nginx counted incorrectly disk cache size.
*) Change: now directive "gzip_disable msie6" does not disable gzipping
for MSIE 6.0 SV1.
*) Bugfix: nginx always added "Vary: Accept-Encoding" response header
line, if both "gzip_static" and "gzip_vary" were on.
*) Feature: the "proxy" parameter of the "geo" directive.
*) Feature: the ngx_http_geoip_module.
*) Feature: the "limit_rate_after" directive.
Thanks to Ivan Debnar.
*) Feature: the "limit_req_log_level" and "limit_conn_log_level"
directives.
*) Bugfix: now "limit_req" directive conforms to the leaky bucket
algorithm.
Thanks to Maxim Dounin.
*) Bugfix: in ngx_http_limit_req_module.
Thanks to Maxim Dounin.
*) Bugfix: now nginx allows underscores in a request method.
*) Bugfix: "proxy_pass_header" and "fastcgi_pass_header" directives did
not pass to a client the "X-Accel-Redirect", "X-Accel-Limit-Rate",
"X-Accel-Buffering", and "X-Accel-Charset" lines from backend
response header.
Thanks to Maxim Dounin.
*) Bugfix: in handling "Last-Modified" and "Accept-Ranges" backend
response header lines; the bug had appeared in 0.7.44.
Thanks to Maxim Dounin.
*) Feature: the "image_filter_transparency" directive.
*) Feature: the "image_filter" directive supports variables for setting
size.
*) Bugfix: in PNG alpha-channel support in the
ngx_http_image_filter_module.
*) Bugfix: in transparency support in the ngx_http_image_filter_module.
*) Feature: now several "perl_modules" directives may be used.
*) Bugfix: ngx_http_perl_module responses did not work in subrequests.
*) Bugfix: nginx sent '\0' in a "Location" response header line on
MKCOL request.
Thanks to Xie Zhenye.
*) Bugfix: an "error_page" directive did not redirect a 413 error; the
bug had appeared in 0.6.10.
*) Bugfix: in memory allocation error handling.
Thanks to Maxim Dounin and Kirill A. Korinskiy.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Mon, 26 Oct 2009 00:00:00 +0300 |
parents | ef5c97e49c35 |
children | b9fdcaf2062b |
comparison
equal
deleted
inserted
replaced
501:dc87c92181c7 | 502:89dc5654117c |
---|---|
588 ngx_int_t rc; | 588 ngx_int_t rc; |
589 ngx_http_upstream_t *u; | 589 ngx_http_upstream_t *u; |
590 ngx_http_proxy_ctx_t *ctx; | 590 ngx_http_proxy_ctx_t *ctx; |
591 ngx_http_proxy_loc_conf_t *plcf; | 591 ngx_http_proxy_loc_conf_t *plcf; |
592 | 592 |
593 u = ngx_pcalloc(r->pool, sizeof(ngx_http_upstream_t)); | 593 if (ngx_http_upstream_create(r) != NGX_OK) { |
594 if (u == NULL) { | |
595 return NGX_HTTP_INTERNAL_SERVER_ERROR; | 594 return NGX_HTTP_INTERNAL_SERVER_ERROR; |
596 } | 595 } |
597 | |
598 r->upstream = u; | |
599 | 596 |
600 ctx = ngx_pcalloc(r->pool, sizeof(ngx_http_proxy_ctx_t)); | 597 ctx = ngx_pcalloc(r->pool, sizeof(ngx_http_proxy_ctx_t)); |
601 if (ctx == NULL) { | 598 if (ctx == NULL) { |
602 return NGX_ERROR; | 599 return NGX_ERROR; |
603 } | 600 } |
604 | 601 |
605 ngx_http_set_ctx(r, ctx, ngx_http_proxy_module); | 602 ngx_http_set_ctx(r, ctx, ngx_http_proxy_module); |
606 | 603 |
607 plcf = ngx_http_get_module_loc_conf(r, ngx_http_proxy_module); | 604 plcf = ngx_http_get_module_loc_conf(r, ngx_http_proxy_module); |
605 | |
606 u = r->upstream; | |
608 | 607 |
609 if (plcf->proxy_lengths == 0) { | 608 if (plcf->proxy_lengths == 0) { |
610 ctx->vars = plcf->vars; | 609 ctx->vars = plcf->vars; |
611 u->schema = plcf->vars.schema; | 610 u->schema = plcf->vars.schema; |
612 #if (NGX_HTTP_SSL) | 611 #if (NGX_HTTP_SSL) |
616 } else { | 615 } else { |
617 if (ngx_http_proxy_eval(r, ctx, plcf) != NGX_OK) { | 616 if (ngx_http_proxy_eval(r, ctx, plcf) != NGX_OK) { |
618 return NGX_HTTP_INTERNAL_SERVER_ERROR; | 617 return NGX_HTTP_INTERNAL_SERVER_ERROR; |
619 } | 618 } |
620 } | 619 } |
621 | |
622 u->peer.log = r->connection->log; | |
623 u->peer.log_error = NGX_ERROR_ERR; | |
624 #if (NGX_THREADS) | |
625 u->peer.lock = &r->connection->lock; | |
626 #endif | |
627 | 620 |
628 u->output.tag = (ngx_buf_tag_t) &ngx_http_proxy_module; | 621 u->output.tag = (ngx_buf_tag_t) &ngx_http_proxy_module; |
629 | 622 |
630 u->conf = &plcf->upstream; | 623 u->conf = &plcf->upstream; |
631 | 624 |
1882 { | 1875 { |
1883 ngx_http_proxy_loc_conf_t *conf; | 1876 ngx_http_proxy_loc_conf_t *conf; |
1884 | 1877 |
1885 conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_proxy_loc_conf_t)); | 1878 conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_proxy_loc_conf_t)); |
1886 if (conf == NULL) { | 1879 if (conf == NULL) { |
1887 return NGX_CONF_ERROR; | 1880 return NULL; |
1888 } | 1881 } |
1889 | 1882 |
1890 /* | 1883 /* |
1891 * set by ngx_pcalloc(): | 1884 * set by ngx_pcalloc(): |
1892 * | 1885 * |