Mercurial > hg > nginx-vendor-0-7
comparison src/http/modules/ngx_http_geo_module.c @ 326:9fc4ab6673f9 NGINX_0_6_7
nginx 0.6.7
*) Change: now the paths specified in the "include",
"auth_basic_user_file", "perl_modules", "ssl_certificate",
"ssl_certificate_key", and "ssl_client_certificate" directives are
relative to directory of nginx configuration file nginx.conf, but
not to nginx prefix directory.
*) Change: the --sysconfdir=PATH option in configure was canceled.
*) Change: the special make target "upgrade1" was defined for online
upgrade of 0.1.x versions.
*) Feature: the "server_name" and "valid_referers" directives support
regular expressions.
*) Feature: the "server" directive in the "upstream" context supports
the "backup" parameter.
*) Feature: the ngx_http_perl_module supports the
$r->discard_request_body.
*) Feature: the "add_header Last-Modified ..." directive changes the
"Last-Modified" response header line.
*) Bugfix: if an response different than 200 was returned to an request
with body and connection went to the keep-alive state after the
request, then nginx returned 400 for the next request.
*) Bugfix: a segmentation fault occurred in worker process if invalid
address was set in the "auth_http" directive.
*) Bugfix: now nginx uses default listen backlog value 511 on all
platforms except FreeBSD.
Thanks to Jiang Hong.
*) Bugfix: a worker process may got caught in an endless loop, if an
"server" inside "upstream" block was marked as "down"; bug appeared
in 0.6.6.
*) Bugfix: now Solaris sendfilev() is not used to transfer the client
request body to FastCGI-server via the unix domain socket.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Wed, 15 Aug 2007 00:00:00 +0400 |
parents | f7cd062ee035 |
children | 390b8f8309d6 |
comparison
equal
deleted
inserted
replaced
325:f395c7a4c8a8 | 326:9fc4ab6673f9 |
---|---|
210 if (ngx_strcmp(value[0].data, "default") == 0) { | 210 if (ngx_strcmp(value[0].data, "default") == 0) { |
211 cidrin.addr = 0; | 211 cidrin.addr = 0; |
212 cidrin.mask = 0; | 212 cidrin.mask = 0; |
213 | 213 |
214 } else { | 214 } else { |
215 if (ngx_ptocidr(&value[0], &cidrin) == NGX_ERROR) { | 215 rc = ngx_ptocidr(&value[0], &cidrin); |
216 | |
217 if (rc == NGX_ERROR) { | |
216 ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, | 218 ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, |
217 "invalid parameter \"%V\"", &value[0]); | 219 "invalid parameter \"%V\"", &value[0]); |
218 return NGX_CONF_ERROR; | 220 return NGX_CONF_ERROR; |
221 } | |
222 | |
223 if (rc == NGX_DONE) { | |
224 ngx_conf_log_error(NGX_LOG_WARN, cf, 0, | |
225 "low address bits of %V are meaningless", | |
226 &value[0]); | |
219 } | 227 } |
220 | 228 |
221 cidrin.addr = ntohl(cidrin.addr); | 229 cidrin.addr = ntohl(cidrin.addr); |
222 cidrin.mask = ntohl(cidrin.mask); | 230 cidrin.mask = ntohl(cidrin.mask); |
223 } | 231 } |