Mercurial > hg > nginx-vendor-0-7
comparison src/http/modules/ngx_http_proxy_module.c @ 366:babd3d9efb62 NGINX_0_6_27
nginx 0.6.27
*) Change: now by default the rtsig method is not built on
Linux 2.6.18+.
*) Change: now a request method is not changed while redirection to a
named location via an "error_page" directive.
*) Feature: the "resolver" and "resolver_timeout" directives in SMTP
proxy.
*) Feature: the "post_action" directive supports named locations.
*) Bugfix: a segmentation fault occurred in worker process, if a
request was redirected from proxy, FastCGI, or memcached location to
static named locations.
*) Bugfix: browsers did not repeat SSL handshake if there is no valid
client certificate in first handshake.
Thanks to Alexander V. Inyukhin.
*) Bugfix: if response code 495-497 was redirected via an "error_page"
directive without code change, then nginx tried to allocate too many
memory.
*) Bugfix: memory leak in long-lived non buffered connections.
*) Bugfix: memory leak in resolver.
*) Bugfix: a segmentation fault occurred in worker process, if a
request was redirected from proxy, FastCGI, or memcached location to
static named locations.
*) Bugfix: in the $proxy_host and $proxy_port variables caching.
Thanks to Sergey Bochenkov.
*) Bugfix: a "proxy_pass" directive with variables used incorrectly the
same port as in another "proxy_pass" directive with the same host
name and without variables.
Thanks to Sergey Bochenkov.
*) Bugfix: an alert "sendmsg() failed (9: Bad file descriptor)" on some
64-bit platforms while reconfiguration.
*) Bugfix: a segmentation fault occurred in worker process, if empty
stub block was used second time in SSI.
*) Bugfix: in copying URI part contained escaped symbols into arguments.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Wed, 12 Mar 2008 00:00:00 +0300 |
parents | a39aab45a53f |
children | 820f6378fc00 |
comparison
equal
deleted
inserted
replaced
365:9b0140fa1132 | 366:babd3d9efb62 |
---|---|
442 | 442 |
443 | 443 |
444 static ngx_http_variable_t ngx_http_proxy_vars[] = { | 444 static ngx_http_variable_t ngx_http_proxy_vars[] = { |
445 | 445 |
446 { ngx_string("proxy_host"), NULL, ngx_http_proxy_host_variable, 0, | 446 { ngx_string("proxy_host"), NULL, ngx_http_proxy_host_variable, 0, |
447 NGX_HTTP_VAR_CHANGEABLE|NGX_HTTP_VAR_NOHASH, 0 }, | 447 NGX_HTTP_VAR_CHANGEABLE|NGX_HTTP_VAR_NOCACHEABLE|NGX_HTTP_VAR_NOHASH, 0 }, |
448 | 448 |
449 { ngx_string("proxy_port"), NULL, ngx_http_proxy_port_variable, 0, | 449 { ngx_string("proxy_port"), NULL, ngx_http_proxy_port_variable, 0, |
450 NGX_HTTP_VAR_CHANGEABLE|NGX_HTTP_VAR_NOHASH, 0 }, | 450 NGX_HTTP_VAR_CHANGEABLE|NGX_HTTP_VAR_NOCACHEABLE|NGX_HTTP_VAR_NOHASH, 0 }, |
451 | 451 |
452 { ngx_string("proxy_add_x_forwarded_for"), NULL, | 452 { ngx_string("proxy_add_x_forwarded_for"), NULL, |
453 ngx_http_proxy_add_x_forwarded_for_variable, 0, NGX_HTTP_VAR_NOHASH, 0 }, | 453 ngx_http_proxy_add_x_forwarded_for_variable, 0, NGX_HTTP_VAR_NOHASH, 0 }, |
454 | 454 |
455 #if 0 | 455 #if 0 |
609 } | 609 } |
610 | 610 |
611 r->upstream->resolved->host = u.host; | 611 r->upstream->resolved->host = u.host; |
612 r->upstream->resolved->port = (in_port_t) (u.no_port ? u.default_port: | 612 r->upstream->resolved->port = (in_port_t) (u.no_port ? u.default_port: |
613 u.port); | 613 u.port); |
614 r->upstream->resolved->default_port = u.default_port; | |
614 | 615 |
615 return NGX_OK; | 616 return NGX_OK; |
616 } | 617 } |
617 | 618 |
618 | 619 |