On Mon, Feb 21, 2022 at 02:10:34PM +0300, Vladimir Homutov wrote:
> Patch subject is complete summary.
>
>
> src/event/quic/ngx_event_quic_output.c| 11 +--
> src/event/quic/ngx_event_quic_tokens.c| 22 --
> src/event/quic/ngx_event_quic_tokens.h| 14 ++
On Mon, Feb 21, 2022 at 02:10:33PM +0300, Vladimir Homutov wrote:
> The ngx_quic_keys_t structure is now exposed.
> This allows to use it in contexts where no pool/connection is available,
> i.e. early packet processing.
>
>
> src/event/quic/ngx_event_quic.c| 2 +-
> src/event/quic
On Mon, Feb 21, 2022 at 02:10:32PM +0300, Vladimir Homutov wrote:
> Patch subject is complete summary.
>
>
> src/event/quic/ngx_event_quic.c| 2 +-
> src/event/quic/ngx_event_quic_output.c | 2 +-
> src/event/quic/ngx_event_quic_protection.c | 37
> -
On Tue, Feb 22, 2022 at 01:23:27PM +0300, Vladimir Homutov wrote:
> On Mon, Feb 21, 2022 at 05:51:42PM +0300, Sergey Kandaurov wrote:
> > On Mon, Feb 21, 2022 at 02:10:31PM +0300, Vladimir Homutov wrote:
> > > Patch subject is complete summary.
> > >
> > >
> > > src/event/quic/ngx_event_quic_prote
> On 27 May 2022, at 08:26, Pavel Pautov via nginx-devel
> wrote:
>
> Hi,
>
> Shall we restore original behavior for stream proxy as well?
>
Fixed, tnx. The relevant part:
diff --git a/src/stream/ngx_stream_proxy_module.c
b/src/stream/ngx_stream_proxy_module.c
--- a/src/stream/ngx_stream
details: https://hg.nginx.org/nginx/rev/e0cfab501dd1
branches:
changeset: 8040:e0cfab501dd1
user: Maxim Dounin
date: Tue May 31 00:14:11 2022 +0300
description:
Upstream: fixed build without http cache (broken by cd73509f21e2).
diffstat:
src/http/ngx_http_upstream.c | 9 +
details: https://hg.nginx.org/nginx/rev/e64a1f32065b
branches:
changeset: 8039:e64a1f32065b
user: Maxim Dounin
date: Mon May 30 21:25:57 2022 +0300
description:
Headers filter: improved memory allocation error handling.
diffstat:
src/http/modules/ngx_http_headers_filter_module.c |
details: https://hg.nginx.org/nginx/rev/711737177b77
branches:
changeset: 8038:711737177b77
user: Maxim Dounin
date: Mon May 30 21:25:56 2022 +0300
description:
Multiple WWW-Authenticate headers with "satisfy any;".
If a module adds multiple WWW-Authenticate headers (ticket #485) to
details: https://hg.nginx.org/nginx/rev/8272c823a7d0
branches:
changeset: 8037:8272c823a7d0
user: Maxim Dounin
date: Mon May 30 21:25:54 2022 +0300
description:
Auth request: multiple WWW-Authenticate headers (ticket #485).
When using auth_request with an upstream server which retur
details: https://hg.nginx.org/nginx/rev/f739c8142fb2
branches:
changeset: 8036:f739c8142fb2
user: Maxim Dounin
date: Mon May 30 21:25:53 2022 +0300
description:
Upstream: multiple WWW-Authenticate headers (ticket #485).
When using proxy_intercept_errors and an error page for error 4
details: https://hg.nginx.org/nginx/rev/cd73509f21e2
branches:
changeset: 8035:cd73509f21e2
user: Maxim Dounin
date: Mon May 30 21:25:51 2022 +0300
description:
Upstream: handling of multiple Vary headers (ticket #1423).
Previously, only the last header value was used when caching.
details: https://hg.nginx.org/nginx/rev/413dbda22f7d
branches:
changeset: 8034:413dbda22f7d
user: Maxim Dounin
date: Mon May 30 21:25:49 2022 +0300
description:
Upstream: duplicate headers ignored or properly linked.
Most of the known duplicate upstream response headers are now igno
details: https://hg.nginx.org/nginx/rev/2bf7792c262e
branches:
changeset: 8033:2bf7792c262e
user: Maxim Dounin
date: Mon May 30 21:25:48 2022 +0300
description:
Upstream: header handlers can now return parsing errors.
With this change, duplicate Content-Length and Transfer-Encoding
details: https://hg.nginx.org/nginx/rev/2025aae94739
branches:
changeset: 8032:2025aae94739
user: Maxim Dounin
date: Mon May 30 21:25:46 2022 +0300
description:
Upstream: all known headers in u->headers_in are linked lists now.
diffstat:
src/http/modules/ngx_http_proxy_module.c |
details: https://hg.nginx.org/nginx/rev/d26db4f82d7d
branches:
changeset: 8031:d26db4f82d7d
user: Maxim Dounin
date: Mon May 30 21:25:45 2022 +0300
description:
All known output headers can be linked lists now.
The h->next pointer properly provided as NULL in all cases where known
o
details: https://hg.nginx.org/nginx/rev/cdc2724858ca
branches:
changeset: 8030:cdc2724858ca
user: Maxim Dounin
date: Mon May 30 21:25:43 2022 +0300
description:
Upstream: simplified Accept-Ranges handling.
The u->headers_in.accept_ranges field is not used anywhere and hence removed.
details: https://hg.nginx.org/nginx/rev/e0027c8438b0
branches:
changeset: 8029:e0027c8438b0
user: Maxim Dounin
date: Mon May 30 21:25:42 2022 +0300
description:
Upstream: simplified Content-Encoding handling.
Since introduction of offset handling in ngx_http_upstream_copy_header_lin
details: https://hg.nginx.org/nginx/rev/27d12017f300
branches:
changeset: 8028:27d12017f300
user: Maxim Dounin
date: Mon May 30 21:25:40 2022 +0300
description:
Upstream: style.
diffstat:
src/http/ngx_http_upstream.c | 24 +---
1 files changed, 17 insertions(+
details: https://hg.nginx.org/nginx/rev/ca78312db071
branches:
changeset: 8027:ca78312db071
user: Maxim Dounin
date: Mon May 30 21:25:38 2022 +0300
description:
Perl: combining unknown headers during $r->header_in() lookup.
diffstat:
src/http/modules/perl/nginx.xs | 84 ++
details: https://hg.nginx.org/nginx/rev/8b3860b52bb3
branches:
changeset: 8026:8b3860b52bb3
user: Maxim Dounin
date: Mon May 30 21:25:36 2022 +0300
description:
Perl: all known input headers are handled identically.
As all known input headers are now linked lists, these are now hand
details: https://hg.nginx.org/nginx/rev/c263f9ffa1fd
branches:
changeset: 8025:c263f9ffa1fd
user: Maxim Dounin
date: Mon May 30 21:25:35 2022 +0300
description:
All non-unique input headers are now linked lists.
The ngx_http_process_multi_header_lines() function is removed, as it is
details: https://hg.nginx.org/nginx/rev/ef6a3a99a81a
branches:
changeset: 8024:ef6a3a99a81a
user: Maxim Dounin
date: Mon May 30 21:25:33 2022 +0300
description:
Reworked multi headers to use linked lists.
Multi headers are now using linked lists instead of arrays. Notably,
the foll
details: https://hg.nginx.org/nginx/rev/08b3ea81ff5f
branches:
changeset: 8023:08b3ea81ff5f
user: Maxim Dounin
date: Mon May 30 21:25:32 2022 +0300
description:
Combining unknown headers during variables lookup (ticket #1316).
Previously, $http_*, $sent_http_*, $sent_trailer_*, $ups
details: https://hg.nginx.org/nginx/rev/8b7a96fdd54c
branches:
changeset: 8022:8b7a96fdd54c
user: Maxim Dounin
date: Mon May 30 21:25:30 2022 +0300
description:
Uwsgi: combining headers with identical names (ticket #1724).
The uwsgi specification states that "The uwsgi block vars re
details: https://hg.nginx.org/nginx/rev/75af96daee97
branches:
changeset: 8021:75af96daee97
user: Maxim Dounin
date: Mon May 30 21:25:28 2022 +0300
description:
SCGI: combining headers with identical names (ticket #1724).
SCGI specification explicitly forbids headers with duplicate
details: https://hg.nginx.org/nginx/rev/f8f6b9fee66a
branches:
changeset: 8020:f8f6b9fee66a
user: Maxim Dounin
date: Mon May 30 21:25:27 2022 +0300
description:
FastCGI: combining headers with identical names (ticket #1724).
FastCGI responder is expected to receive CGI/1.1 environme
details: https://hg.nginx.org/nginx/rev/0e562a332529
branches:
changeset: 8019:0e562a332529
user: Maxim Dounin
date: Mon May 30 21:25:25 2022 +0300
description:
Perl: fixed $r->header_in("Connection").
Previously, the r->header_in->connection pointer was never set despite
being pres
> On 18 May 2022, at 10:57, Roman Arutyunyan wrote:
>
> # HG changeset patch
> # User Roman Arutyunyan
> # Date 1652856132 -14400
> # Wed May 18 10:42:12 2022 +0400
> # Branch quic
> # Node ID a0f2d69f1fe43dfc718262235bf04d7b05f1fd68
> # Parent 67ae4b649f2e38a44b245b7a842cf396c8250f02
>
# HG changeset patch
# User Maxim Dounin
# Date 1653942033 -10800
# Mon May 30 23:20:33 2022 +0300
# Node ID d5363be9fa61e0327574b8aa1342c874efd027b0
# Parent cd40709c91e245036e7f71a6c3e5190d9533be75
Mp4: fixed potential overflow in ngx_http_mp4_crop_stts_data().
Both "count" and "duration"
On Mon, May 30, 2022 at 06:55:15PM +0800, 朱宇 wrote:
> Hi,
>
>
> in "src/event/quic/bpf/ngx_quic_reuseport_helper.c", if can not find socket
> by dcid (cookie), udp packet will be distributed by kernel.
>
>
> so when nginx-quic reload, how to avoid new quic connecion packet distributed
> to old w
Hi Husain,
On Mon, May 30, 2022 at 07:30:10AM +, Dalroti, Husain wrote:
> Hi Team,
>
> Is it possible to pass lua variable in proxy pass directive which we define
> using set_by_lua_file directive ?
>
> Example :
> set_by_lua_file $ref test.lua;
> proxy_pass '$ref';
>
> Below is lua code :
> On 18 May 2022, at 10:57, Roman Arutyunyan wrote:
>
> # HG changeset patch
> # User Roman Arutyunyan
> # Date 1652852691 -14400
> # Wed May 18 09:44:51 2022 +0400
> # Branch quic
> # Node ID 67ae4b649f2e38a44b245b7a842cf396c8250f02
> # Parent c2f5d79cde64457f1fa7344c56a5248a677a7e46
>
Hi,
in "src/event/quic/bpf/ngx_quic_reuseport_helper.c", if can not find socket by
dcid (cookie), udp packet will be distributed by kernel.
so when nginx-quic reload, how to avoid new quic connecion packet distributed
to old workers which result in old worker processes can't exit?
thanks_
details: https://hg.nginx.org/nginx/rev/5119c8150478
branches:
changeset: 8018:5119c8150478
user: Marcus Ball
date: Mon May 30 02:38:07 2022 +0300
description:
Fixed runtime handling of systems without EPOLLRDHUP support.
In 7583:efd71d49bde0 (nginx 1.17.5) along with introduction o
details: https://hg.nginx.org/nginx/rev/6206bca52d73
branches:
changeset: 8017:6206bca52d73
user: Maxim Dounin
date: Mon May 30 02:37:59 2022 +0300
description:
Version bump.
diffstat:
src/core/nginx.h | 4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diffs (14 lines):
Hi Team,
Is it possible to pass lua variable in proxy pass directive which we define
using set_by_lua_file directive ?
Example :
set_by_lua_file $ref test.lua;
proxy_pass '$ref';
Below is lua code :
local function main()
local host="https://example.com";
return host
end
return main()
36 matches
Mail list logo