Mercurial > hg > nginx-vendor-1-0
comparison src/http/ngx_http_script.c @ 638:692f4d4d7f10 NGINX_1_0_9
nginx 1.0.9
*) Change: now the 0x7F-0x1F characters are escaped as \xXX in an
access_log.
*) Change: now SIGWINCH signal works only in daemon mode.
*) Feature: "proxy/fastcgi/scgi/uwsgi_ignore_headers" directives support
the following additional values: X-Accel-Limit-Rate,
X-Accel-Buffering, X-Accel-Charset.
*) Feature: decrease of memory consumption if SSL is used.
*) Feature: accept filters are now supported on NetBSD.
*) Feature: the "uwsgi_buffering" and "scgi_buffering" directives.
Thanks to Peter Smit.
*) Bugfix: a segmentation fault occurred on start or while
reconfiguration if the "ssl" directive was used at http level and
there was no "ssl_certificate" defined.
*) Bugfix: some UTF-8 characters were processed incorrectly.
Thanks to Alexey Kuts.
*) Bugfix: the ngx_http_rewrite_module directives specified at "server"
level were executed twice if no matching locations were defined.
*) Bugfix: a socket leak might occurred if "aio sendfile" was used.
*) Bugfix: connections with fast clients might be closed after
send_timeout if file AIO was used.
*) Bugfix: in the ngx_http_autoindex_module.
*) Bugfix: the module ngx_http_mp4_module did not support seeking on
32-bit platforms.
*) Bugfix: non-cacheable responses might be cached if
"proxy_cache_bypass" directive was used.
Thanks to John Ferlito.
*) Bugfix: cached responses with an empty body were returned
incorrectly; the bug had appeared in 0.8.31.
*) Bugfix: 201 responses of the ngx_http_dav_module were incorrect; the
bug had appeared in 0.8.32.
*) Bugfix: in the "return" directive.
*) Bugfix: the "ssl_verify_client", "ssl_verify_depth", and
"ssl_prefer_server_ciphers" directives might work incorrectly if SNI
was used.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Tue, 01 Nov 2011 00:00:00 +0400 |
parents | 8dc007eddbcf |
children | ad25218fd14b |
comparison
equal
deleted
inserted
replaced
637:ea7441793bba | 638:692f4d4d7f10 |
---|---|
1104 if (e->log || (r->connection->log->log_level & NGX_LOG_DEBUG_HTTP)) { | 1104 if (e->log || (r->connection->log->log_level & NGX_LOG_DEBUG_HTTP)) { |
1105 ngx_log_error(NGX_LOG_NOTICE, r->connection->log, 0, | 1105 ngx_log_error(NGX_LOG_NOTICE, r->connection->log, 0, |
1106 "rewritten redirect: \"%V\"", &e->buf); | 1106 "rewritten redirect: \"%V\"", &e->buf); |
1107 } | 1107 } |
1108 | 1108 |
1109 ngx_http_clear_location(r); | |
1110 | |
1109 r->headers_out.location = ngx_list_push(&r->headers_out.headers); | 1111 r->headers_out.location = ngx_list_push(&r->headers_out.headers); |
1110 if (r->headers_out.location == NULL) { | 1112 if (r->headers_out.location == NULL) { |
1111 e->ip = ngx_http_script_exit; | 1113 e->ip = ngx_http_script_exit; |
1112 e->status = NGX_HTTP_INTERNAL_SERVER_ERROR; | 1114 e->status = NGX_HTTP_INTERNAL_SERVER_ERROR; |
1113 return; | 1115 return; |