Revision tags: 1.32.0-1, 1.32.0 |
|
#
2646:b003301015ea |
| 06-Nov-2023 |
Andrew Clayton |
Allow to set the permissions of the Unix domain control socket
Several users in GitHub have asked for the ability to set the permissions of the unitd UNIX Domain control socket.
This can of course
Allow to set the permissions of the Unix domain control socket
Several users in GitHub have asked for the ability to set the permissions of the unitd UNIX Domain control socket.
This can of course be done externally, but can be done much cleaner by Unit itself.
This commit adds three new options
--control-mode Set the mode of the socket, e.g 644
--control-user Set the user/owner of the socket, e.g unit
--control-group Set the group of the socket, e.g unit
Of course these only have an affect when using a UNIX Domain Socket for the control socket.
Requested-by: michaelkosir <https://github.com/michaelkosir> Requested-by: chopanovv <https://github.com/chopanovv> Link: <https://github.com/nginx/unit/issues/254> Link: <https://github.com/nginx/unit/issues/980> Closes: https://github.com/nginx/unit/issues/840 Tested-by: Liam Crilly <liam.crilly@nginx.com> Reviewed-by: Zhidao Hong <z.hong@f5.com> Signed-off-by: Andrew Clayton <a.clayton@nginx.com>
show more ...
|
Revision tags: 1.31.1-1, 1.31.1, 1.31.0-1, 1.31.0, 1.30.0-1, 1.30.0 |
|
#
2450:14277f21a722 |
| 08-May-2023 |
Zhidao HONG |
NJS: supported loadable modules.
|
Revision tags: 1.29.1-1, 1.29.1, 1.29.0-1, 1.29.0 |
|
#
2248:67f848571b9f |
| 22-Nov-2022 |
Zhidao HONG |
NJS: added http request prototype.
|
Revision tags: 1.28.0-1, 1.28.0, 1.27.0-1, 1.27.0, 1.26.1-1, 1.26.1, 1.26.0-1, 1.26.0 |
|
#
1998:c8790d2a89bb |
| 09-Nov-2021 |
Tiago Natel de Moura |
Introducing application prototype processes.
|
#
1997:a8a3f1d243ee |
| 09-Nov-2021 |
Tiago Natel de Moura |
Changed nxt_process_* for reuse.
This enables the reuse of process creation functions.
|
#
1969:be6409cdb028 |
| 09-Oct-2021 |
Zhidao HONG |
Configuration: automatic migration to the new "share" behavior.
|
Revision tags: 1.25.0-1, 1.25.0, 1.24.0-1, 1.24.0, 1.23.0-1, 1.23.0, 1.22.0-1, 1.22.0, 1.21.0-1, 1.21.0, 1.20.0-1, 1.20.0, 1.19.0-1, 1.19.0 |
|
#
1563:d32bc428f46b |
| 12-Aug-2020 |
Valentin Bartenev |
Basic variables support.
|
Revision tags: 1.18.0-1, 1.18.0 |
|
#
1488:6976d36be926 |
| 09-Mar-2020 |
Tiago Natel de Moura |
Refactor of process management.
The process abstraction has changed to:
setup(task, process) start(task, process_data) prefork(task, process, mp)
The prefork() occurs in the main process rig
Refactor of process management.
The process abstraction has changed to:
setup(task, process) start(task, process_data) prefork(task, process, mp)
The prefork() occurs in the main process right before fork.
The file src/nxt_main_process.c is completely free of process specific logic.
The creation of a process now supports a PROCESS_CREATED state. The The setup() function of each process can set its state to either created or ready. If created, a MSG_PROCESS_CREATED is sent to main process, where external setup can be done (required for rootfs under container).
The core processes (discovery, controller and router) doesn't need external setup, then they all proceeds to their start() function straight away.
In the case of applications, the load of the module happens at the process setup() time and The module's init() function has changed to be the start() of the process.
The module API has changed to:
setup(task, process, conf) start(task, data)
As a direct benefit of the PROCESS_CREATED message, the clone(2) of processes using pid namespaces now doesn't need to create a pipe to make the child block until parent setup uid/gid mappings nor it needs to receive the child pid.
show more ...
|
Revision tags: 1.17.0-1, 1.17.0, 1.16.0-1, 1.16.0 |
|
#
1403:1cee885b7f10 |
| 12-Mar-2020 |
Max Romanov |
Using disk file to store large request body.
This closes #386 on GitHub.
|
Revision tags: 1.15.0-1, 1.15.0, 1.14.0-1, 1.14.0 |
|
#
1305:966d691dab2c |
| 06-Dec-2019 |
Tiago Natel |
Moved credential-related code to nxt_credential.c.
This is required to avoid include cycles, as some nxt_clone_* functions depend on the credential structures, but nxt_process depends on clone struc
Moved credential-related code to nxt_credential.c.
This is required to avoid include cycles, as some nxt_clone_* functions depend on the credential structures, but nxt_process depends on clone structures.
show more ...
|
Revision tags: 1.13.0-1, 1.13.0 |
|
#
1254:aae6699f4eee |
| 29-Oct-2019 |
Hong Zhi Dao |
Process port refactoring.
- Introduced nxt_runtime_process_port_create(). - Moved nxt_process_use() into nxt_process.c from nxt_runtime.c. - Renamed nxt_runtime_process_remove_pid() as nxt_runtime_p
Process port refactoring.
- Introduced nxt_runtime_process_port_create(). - Moved nxt_process_use() into nxt_process.c from nxt_runtime.c. - Renamed nxt_runtime_process_remove_pid() as nxt_runtime_process_remove(). - Some public functions transformed to static.
This closes #327 issue on GitHub.
show more ...
|
Revision tags: 1.12.0-1, 1.12.0, 1.11.0-2, 1.11.0-1, 1.11.0 |
|
#
1182:325b315e48c4 |
| 19-Sep-2019 |
Tiago de Bem Natel de Moura |
Initial applications isolation support using Linux namespaces.
|
Revision tags: 1.10.0-2, 1.10.0-1, 1.10.0, 1.9.0-1, 1.9.0, 1.8.0-1, 1.8.0, 1.7.1-1, 1.7.1, 1.7-1, 1.7, 1.6-1, 1.6, 1.5-1, 1.5 |
|
#
818:a0f73599f4e8 |
| 23-Oct-2018 |
Valentin Bartenev |
Removed unused "--upstream" command line option.
|
Revision tags: 1.4-2, 1.4 |
|
#
774:b21709350c49 |
| 20-Sep-2018 |
Valentin Bartenev |
Controller: certificates storage interface.
|
#
771:f349b2d68e75 |
| 20-Sep-2018 |
Igor Sysoev |
Added SSL/TLS support on connection level.
|
#
743:e0f0cd7d244a |
| 06-Aug-2018 |
Max Romanov |
Unit application library.
Library now used in all language modules. Old 'nxt_app_*' code removed.
See src/test/nxt_unit_app_test.c for usage sample.
|
Revision tags: 1.3 |
|
#
697:b73f6d3709c2 |
| 18-Jun-2018 |
Igor Sysoev |
Fixed exit status on start failure.
This and previous commit close #131 issue on GitHub.
|
#
696:9476693a47bd |
| 18-Jun-2018 |
Igor Sysoev |
Removing Unix control socket on start failure.
The bug had appeared in 5cc5002a788e when process type has been converted to bitmask. This commit reverts the type back to a number.
This commit is re
Removing Unix control socket on start failure.
The bug had appeared in 5cc5002a788e when process type has been converted to bitmask. This commit reverts the type back to a number.
This commit is related to #131 issue on GitHub.
show more ...
|
#
695:300072a70e40 |
| 18-Jun-2018 |
Igor Sysoev |
Removed unused single process type.
|
Revision tags: 1.2, 1.1, 1.0 |
|
#
593:ef19a2b0f508 |
| 29-Mar-2018 |
Igor Sysoev |
Removed unused macros and functions.
|
Revision tags: 0.7, 0.6, 0.5, 0.4, 0.3 |
|
#
421:b57f61ecf2ec |
| 27-Dec-2017 |
Max Romanov |
Introducing application 'atexit' hook.
Finalizing Python interpreter.
This closes #65 issue on GitHub.
|
Revision tags: 0.2 |
|
#
349:ae438f16b44e |
| 04-Oct-2017 |
Max Romanov |
Introducing process use counter.
This helps to decouple process removal from port memory pool cleanups.
|
#
343:9fa845db60fb |
| 04-Oct-2017 |
Max Romanov |
Introducing use counters for port and app. Thread safe port write.
Use counter helps to simplify logic around port and application free.
Port 'post' function introduced to simplify post execution
Introducing use counters for port and app. Thread safe port write.
Use counter helps to simplify logic around port and application free.
Port 'post' function introduced to simplify post execution of particular function to original port engine's thread.
Write message queue is protected by mutex which makes port write operation thread safe.
show more ...
|
#
314:6cf55ca61038 |
| 10-Sep-2017 |
Valentin Bartenev |
Configuration persistence.
Now configuration survives server reloads.
|
Revision tags: 0.1 |
|
#
240:36bafba970b5 |
| 28-Aug-2017 |
Igor Sysoev |
The master process has been renamed to the main process.
|