Re: [PATCH 4 of 4] QUIC: avoided pool usage in token calculation

2022-05-30 Thread Roman Arutyunyan
On Mon, Feb 21, 2022 at 02:10:34PM +0300, Vladimir Homutov wrote: > Patch subject is complete summary. > > > src/event/quic/ngx_event_quic_output.c| 11 +-- > src/event/quic/ngx_event_quic_tokens.c| 22 -- > src/event/quic/ngx_event_quic_tokens.h| 14 ++

Re: [PATCH 3 of 4] QUIC: removed ngx_quic_keys_new()

2022-05-30 Thread Roman Arutyunyan
On Mon, Feb 21, 2022 at 02:10:33PM +0300, Vladimir Homutov wrote: > The ngx_quic_keys_t structure is now exposed. > This allows to use it in contexts where no pool/connection is available, > i.e. early packet processing. > > > src/event/quic/ngx_event_quic.c| 2 +- > src/event/quic

Re: [PATCH 2 of 4] QUIC: avoided pool usage in ngx_quic_protection.c

2022-05-30 Thread Roman Arutyunyan
On Mon, Feb 21, 2022 at 02:10:32PM +0300, Vladimir Homutov wrote: > Patch subject is complete summary. > > > src/event/quic/ngx_event_quic.c| 2 +- > src/event/quic/ngx_event_quic_output.c | 2 +- > src/event/quic/ngx_event_quic_protection.c | 37 > -

Re: [PATCH 1 of 4] QUIC: fixed-length buffers for secrets

2022-05-30 Thread Roman Arutyunyan
On Tue, Feb 22, 2022 at 01:23:27PM +0300, Vladimir Homutov wrote: > On Mon, Feb 21, 2022 at 05:51:42PM +0300, Sergey Kandaurov wrote: > > On Mon, Feb 21, 2022 at 02:10:31PM +0300, Vladimir Homutov wrote: > > > Patch subject is complete summary. > > > > > > > > > src/event/quic/ngx_event_quic_prote

Re: [PATCH] Upstream: handling of certificates specified as an empty string

2022-05-30 Thread Sergey Kandaurov
> On 27 May 2022, at 08:26, Pavel Pautov via nginx-devel > wrote: > > Hi, > > Shall we restore original behavior for stream proxy as well? > Fixed, tnx. The relevant part: diff --git a/src/stream/ngx_stream_proxy_module.c b/src/stream/ngx_stream_proxy_module.c --- a/src/stream/ngx_stream

[nginx] Upstream: fixed build without http cache (broken by cd73509f21e2).

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/e0cfab501dd1 branches: changeset: 8040:e0cfab501dd1 user: Maxim Dounin date: Tue May 31 00:14:11 2022 +0300 description: Upstream: fixed build without http cache (broken by cd73509f21e2). diffstat: src/http/ngx_http_upstream.c | 9 +

[nginx] Headers filter: improved memory allocation error handling.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/e64a1f32065b branches: changeset: 8039:e64a1f32065b user: Maxim Dounin date: Mon May 30 21:25:57 2022 +0300 description: Headers filter: improved memory allocation error handling. diffstat: src/http/modules/ngx_http_headers_filter_module.c |

[nginx] Multiple WWW-Authenticate headers with "satisfy any;".

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/711737177b77 branches: changeset: 8038:711737177b77 user: Maxim Dounin date: Mon May 30 21:25:56 2022 +0300 description: Multiple WWW-Authenticate headers with "satisfy any;". If a module adds multiple WWW-Authenticate headers (ticket #485) to

[nginx] Auth request: multiple WWW-Authenticate headers (ticket #485).

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/8272c823a7d0 branches: changeset: 8037:8272c823a7d0 user: Maxim Dounin date: Mon May 30 21:25:54 2022 +0300 description: Auth request: multiple WWW-Authenticate headers (ticket #485). When using auth_request with an upstream server which retur

[nginx] Upstream: multiple WWW-Authenticate headers (ticket #485).

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/f739c8142fb2 branches: changeset: 8036:f739c8142fb2 user: Maxim Dounin date: Mon May 30 21:25:53 2022 +0300 description: Upstream: multiple WWW-Authenticate headers (ticket #485). When using proxy_intercept_errors and an error page for error 4

[nginx] Upstream: handling of multiple Vary headers (ticket #1423).

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/cd73509f21e2 branches: changeset: 8035:cd73509f21e2 user: Maxim Dounin date: Mon May 30 21:25:51 2022 +0300 description: Upstream: handling of multiple Vary headers (ticket #1423). Previously, only the last header value was used when caching.

[nginx] Upstream: duplicate headers ignored or properly linked.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/413dbda22f7d branches: changeset: 8034:413dbda22f7d user: Maxim Dounin date: Mon May 30 21:25:49 2022 +0300 description: Upstream: duplicate headers ignored or properly linked. Most of the known duplicate upstream response headers are now igno

[nginx] Upstream: header handlers can now return parsing errors.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/2bf7792c262e branches: changeset: 8033:2bf7792c262e user: Maxim Dounin date: Mon May 30 21:25:48 2022 +0300 description: Upstream: header handlers can now return parsing errors. With this change, duplicate Content-Length and Transfer-Encoding

[nginx] Upstream: all known headers in u->headers_in are linked lists now.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/2025aae94739 branches: changeset: 8032:2025aae94739 user: Maxim Dounin date: Mon May 30 21:25:46 2022 +0300 description: Upstream: all known headers in u->headers_in are linked lists now. diffstat: src/http/modules/ngx_http_proxy_module.c |

[nginx] All known output headers can be linked lists now.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/d26db4f82d7d branches: changeset: 8031:d26db4f82d7d user: Maxim Dounin date: Mon May 30 21:25:45 2022 +0300 description: All known output headers can be linked lists now. The h->next pointer properly provided as NULL in all cases where known o

[nginx] Upstream: simplified Accept-Ranges handling.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/cdc2724858ca branches: changeset: 8030:cdc2724858ca user: Maxim Dounin date: Mon May 30 21:25:43 2022 +0300 description: Upstream: simplified Accept-Ranges handling. The u->headers_in.accept_ranges field is not used anywhere and hence removed.

[nginx] Upstream: simplified Content-Encoding handling.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/e0027c8438b0 branches: changeset: 8029:e0027c8438b0 user: Maxim Dounin date: Mon May 30 21:25:42 2022 +0300 description: Upstream: simplified Content-Encoding handling. Since introduction of offset handling in ngx_http_upstream_copy_header_lin

[nginx] Upstream: style.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/27d12017f300 branches: changeset: 8028:27d12017f300 user: Maxim Dounin date: Mon May 30 21:25:40 2022 +0300 description: Upstream: style. diffstat: src/http/ngx_http_upstream.c | 24 +--- 1 files changed, 17 insertions(+

[nginx] Perl: combining unknown headers during $r->header_in() lookup.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/ca78312db071 branches: changeset: 8027:ca78312db071 user: Maxim Dounin date: Mon May 30 21:25:38 2022 +0300 description: Perl: combining unknown headers during $r->header_in() lookup. diffstat: src/http/modules/perl/nginx.xs | 84 ++

[nginx] Perl: all known input headers are handled identically.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/8b3860b52bb3 branches: changeset: 8026:8b3860b52bb3 user: Maxim Dounin date: Mon May 30 21:25:36 2022 +0300 description: Perl: all known input headers are handled identically. As all known input headers are now linked lists, these are now hand

[nginx] All non-unique input headers are now linked lists.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/c263f9ffa1fd branches: changeset: 8025:c263f9ffa1fd user: Maxim Dounin date: Mon May 30 21:25:35 2022 +0300 description: All non-unique input headers are now linked lists. The ngx_http_process_multi_header_lines() function is removed, as it is

[nginx] Reworked multi headers to use linked lists.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/ef6a3a99a81a branches: changeset: 8024:ef6a3a99a81a user: Maxim Dounin date: Mon May 30 21:25:33 2022 +0300 description: Reworked multi headers to use linked lists. Multi headers are now using linked lists instead of arrays. Notably, the foll

[nginx] Combining unknown headers during variables lookup (ticket #1316).

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/08b3ea81ff5f branches: changeset: 8023:08b3ea81ff5f user: Maxim Dounin date: Mon May 30 21:25:32 2022 +0300 description: Combining unknown headers during variables lookup (ticket #1316). Previously, $http_*, $sent_http_*, $sent_trailer_*, $ups

[nginx] Uwsgi: combining headers with identical names (ticket #1724).

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/8b7a96fdd54c branches: changeset: 8022:8b7a96fdd54c user: Maxim Dounin date: Mon May 30 21:25:30 2022 +0300 description: Uwsgi: combining headers with identical names (ticket #1724). The uwsgi specification states that "The uwsgi block vars re

[nginx] SCGI: combining headers with identical names (ticket #1724).

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/75af96daee97 branches: changeset: 8021:75af96daee97 user: Maxim Dounin date: Mon May 30 21:25:28 2022 +0300 description: SCGI: combining headers with identical names (ticket #1724). SCGI specification explicitly forbids headers with duplicate

[nginx] FastCGI: combining headers with identical names (ticket #1724).

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/f8f6b9fee66a branches: changeset: 8020:f8f6b9fee66a user: Maxim Dounin date: Mon May 30 21:25:27 2022 +0300 description: FastCGI: combining headers with identical names (ticket #1724). FastCGI responder is expected to receive CGI/1.1 environme

[nginx] Perl: fixed $r->header_in("Connection").

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/0e562a332529 branches: changeset: 8019:0e562a332529 user: Maxim Dounin date: Mon May 30 21:25:25 2022 +0300 description: Perl: fixed $r->header_in("Connection"). Previously, the r->header_in->connection pointer was never set despite being pres

Re: [PATCH 2 of 2] QUIC: init_streams() callback

2022-05-30 Thread Sergey Kandaurov
> On 18 May 2022, at 10:57, Roman Arutyunyan wrote: > > # HG changeset patch > # User Roman Arutyunyan > # Date 1652856132 -14400 > # Wed May 18 10:42:12 2022 +0400 > # Branch quic > # Node ID a0f2d69f1fe43dfc718262235bf04d7b05f1fd68 > # Parent 67ae4b649f2e38a44b245b7a842cf396c8250f02 >

[PATCH] Mp4: fixed potential overflow in ngx_http_mp4_crop_stts_data()

2022-05-30 Thread Maxim Dounin
# HG changeset patch # User Maxim Dounin # Date 1653942033 -10800 # Mon May 30 23:20:33 2022 +0300 # Node ID d5363be9fa61e0327574b8aa1342c874efd027b0 # Parent cd40709c91e245036e7f71a6c3e5190d9533be75 Mp4: fixed potential overflow in ngx_http_mp4_crop_stts_data(). Both "count" and "duration"

Re: how to avoid new quic connection distributed to old workers when nginx-quic reload

2022-05-30 Thread Vladimir Homutov via nginx-devel
On Mon, May 30, 2022 at 06:55:15PM +0800, 朱宇 wrote: > Hi, > > > in "src/event/quic/bpf/ngx_quic_reuseport_helper.c", if can not find socket > by dcid (cookie), udp packet will be distributed by kernel. > > > so when nginx-quic reload, how to avoid new quic connecion packet distributed > to old w

Re: Pass Lua variable in proxy pass directive

2022-05-30 Thread Sergey A. Osokin
Hi Husain, On Mon, May 30, 2022 at 07:30:10AM +, Dalroti, Husain wrote: > Hi Team, > > Is it possible to pass lua variable in proxy pass directive which we define > using set_by_lua_file directive ? > > Example : > set_by_lua_file $ref test.lua; > proxy_pass '$ref'; > > Below is lua code :

Re: [PATCH 1 of 2] QUIC: reusable and idle modes for main connection

2022-05-30 Thread Sergey Kandaurov
> On 18 May 2022, at 10:57, Roman Arutyunyan wrote: > > # HG changeset patch > # User Roman Arutyunyan > # Date 1652852691 -14400 > # Wed May 18 09:44:51 2022 +0400 > # Branch quic > # Node ID 67ae4b649f2e38a44b245b7a842cf396c8250f02 > # Parent c2f5d79cde64457f1fa7344c56a5248a677a7e46 >

how to avoid new quic connection distributed to old workers when nginx-quic reload

2022-05-30 Thread 朱宇
Hi, in "src/event/quic/bpf/ngx_quic_reuseport_helper.c", if can not find socket by dcid (cookie), udp packet will be distributed by kernel. so when nginx-quic reload, how to avoid new quic connecion packet distributed to old workers which result in old worker processes can't exit? thanks_

[nginx] Fixed runtime handling of systems without EPOLLRDHUP support.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/5119c8150478 branches: changeset: 8018:5119c8150478 user: Marcus Ball date: Mon May 30 02:38:07 2022 +0300 description: Fixed runtime handling of systems without EPOLLRDHUP support. In 7583:efd71d49bde0 (nginx 1.17.5) along with introduction o

[nginx] Version bump.

2022-05-30 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/6206bca52d73 branches: changeset: 8017:6206bca52d73 user: Maxim Dounin date: Mon May 30 02:37:59 2022 +0300 description: Version bump. diffstat: src/core/nginx.h | 4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diffs (14 lines):

Pass Lua variable in proxy pass directive

2022-05-30 Thread Dalroti, Husain
Hi Team, Is it possible to pass lua variable in proxy pass directive which we define using set_by_lua_file directive ? Example : set_by_lua_file $ref test.lua; proxy_pass '$ref'; Below is lua code : local function main() local host="https://example.com"; return host end return main()