Mercurial > hg > nginx-vendor-0-8
comparison src/http/ngx_http_request.c @ 366:babd3d9efb62 NGINX_0_6_27
nginx 0.6.27
*) Change: now by default the rtsig method is not built on
Linux 2.6.18+.
*) Change: now a request method is not changed while redirection to a
named location via an "error_page" directive.
*) Feature: the "resolver" and "resolver_timeout" directives in SMTP
proxy.
*) Feature: the "post_action" directive supports named locations.
*) Bugfix: a segmentation fault occurred in worker process, if a
request was redirected from proxy, FastCGI, or memcached location to
static named locations.
*) Bugfix: browsers did not repeat SSL handshake if there is no valid
client certificate in first handshake.
Thanks to Alexander V. Inyukhin.
*) Bugfix: if response code 495-497 was redirected via an "error_page"
directive without code change, then nginx tried to allocate too many
memory.
*) Bugfix: memory leak in long-lived non buffered connections.
*) Bugfix: memory leak in resolver.
*) Bugfix: a segmentation fault occurred in worker process, if a
request was redirected from proxy, FastCGI, or memcached location to
static named locations.
*) Bugfix: in the $proxy_host and $proxy_port variables caching.
Thanks to Sergey Bochenkov.
*) Bugfix: a "proxy_pass" directive with variables used incorrectly the
same port as in another "proxy_pass" directive with the same host
name and without variables.
Thanks to Sergey Bochenkov.
*) Bugfix: an alert "sendmsg() failed (9: Bad file descriptor)" on some
64-bit platforms while reconfiguration.
*) Bugfix: a segmentation fault occurred in worker process, if empty
stub block was used second time in SSI.
*) Bugfix: in copying URI part contained escaped symbols into arguments.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Wed, 12 Mar 2008 00:00:00 +0300 |
parents | a39aab45a53f |
children | 6639b93e81b2 |
comparison
equal
deleted
inserted
replaced
365:9b0140fa1132 | 366:babd3d9efb62 |
---|---|
1428 | 1428 |
1429 if (rc != X509_V_OK) { | 1429 if (rc != X509_V_OK) { |
1430 ngx_log_error(NGX_LOG_INFO, c->log, 0, | 1430 ngx_log_error(NGX_LOG_INFO, c->log, 0, |
1431 "client SSL certificate verify error: (%l:%s)", | 1431 "client SSL certificate verify error: (%l:%s)", |
1432 rc, X509_verify_cert_error_string(rc)); | 1432 rc, X509_verify_cert_error_string(rc)); |
1433 | |
1434 ngx_ssl_remove_cached_session(sscf->ssl.ctx, | |
1435 (SSL_get0_session(c->ssl->connection))); | |
1436 | |
1433 ngx_http_finalize_request(r, NGX_HTTPS_CERT_ERROR); | 1437 ngx_http_finalize_request(r, NGX_HTTPS_CERT_ERROR); |
1434 return; | 1438 return; |
1435 } | 1439 } |
1436 | 1440 |
1437 if (SSL_get_peer_certificate(c->ssl->connection) | 1441 if (SSL_get_peer_certificate(c->ssl->connection) |
1438 == NULL) | 1442 == NULL) |
1439 { | 1443 { |
1440 ngx_log_error(NGX_LOG_INFO, c->log, 0, | 1444 ngx_log_error(NGX_LOG_INFO, c->log, 0, |
1441 "client sent no required SSL certificate"); | 1445 "client sent no required SSL certificate"); |
1446 | |
1447 ngx_ssl_remove_cached_session(sscf->ssl.ctx, | |
1448 (SSL_get0_session(c->ssl->connection))); | |
1449 | |
1442 ngx_http_finalize_request(r, NGX_HTTPS_NO_CERT); | 1450 ngx_http_finalize_request(r, NGX_HTTPS_NO_CERT); |
1443 return; | 1451 return; |
1444 } | 1452 } |
1445 } | 1453 } |
1446 } | 1454 } |
2446 r->header_only = 1; | 2454 r->header_only = 1; |
2447 r->post_action = 1; | 2455 r->post_action = 1; |
2448 | 2456 |
2449 r->read_event_handler = ngx_http_block_reading; | 2457 r->read_event_handler = ngx_http_block_reading; |
2450 | 2458 |
2451 ngx_http_internal_redirect(r, &clcf->post_action, NULL); | 2459 if (clcf->post_action.data[0] == '/') { |
2460 ngx_http_internal_redirect(r, &clcf->post_action, NULL); | |
2461 | |
2462 } else { | |
2463 ngx_http_named_location(r, &clcf->post_action); | |
2464 } | |
2452 | 2465 |
2453 return NGX_OK; | 2466 return NGX_OK; |
2454 } | 2467 } |
2455 | 2468 |
2456 | 2469 |