comparison src/http/modules/ngx_http_access_module.c @ 122:d25a1d6034f1 NGINX_0_3_8

nginx 0.3.8 *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; bug appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
author Igor Sysoev <http://sysoev.ru>
date Wed, 09 Nov 2005 00:00:00 +0300
parents 71c46860eb55
children 4cd3e70c4d60
comparison
equal deleted inserted replaced
121:737953b238a4 122:d25a1d6034f1
12 /* AF_INET only */ 12 /* AF_INET only */
13 13
14 typedef struct { 14 typedef struct {
15 in_addr_t mask; 15 in_addr_t mask;
16 in_addr_t addr; 16 in_addr_t addr;
17 unsigned deny; 17 ngx_uint_t deny; /* unsigned deny:1; */
18 } ngx_http_access_rule_t; 18 } ngx_http_access_rule_t;
19 19
20 20
21 typedef struct { 21 typedef struct {
22 ngx_array_t *rules; /* array of ngx_http_access_rule_t */ 22 ngx_array_t *rules; /* array of ngx_http_access_rule_t */
104 104
105 rule = alcf->rules->elts; 105 rule = alcf->rules->elts;
106 for (i = 0; i < alcf->rules->nelts; i++) { 106 for (i = 0; i < alcf->rules->nelts; i++) {
107 107
108 ngx_log_debug3(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, 108 ngx_log_debug3(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
109 "%08XD %08XD %08XD", 109 "access: %08XD %08XD %08XD",
110 sin->sin_addr.s_addr, rule[i].mask, rule[i].addr); 110 sin->sin_addr.s_addr, rule[i].mask, rule[i].addr);
111 111
112 if ((sin->sin_addr.s_addr & rule[i].mask) == rule[i].addr) { 112 if ((sin->sin_addr.s_addr & rule[i].mask) == rule[i].addr) {
113 if (rule[i].deny) { 113 if (rule[i].deny) {
114 ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, 114 ngx_log_error(NGX_LOG_ERR, r->connection->log, 0,