/unit/pkg/rpm/ |
H A D | Makefile.php | diff 1144:b651ff72ffe0 Fri Aug 23 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: bump release for 1.10.0-2. diff 912:23693ac60089 Thu Jan 24 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: fixed control socket path after 7012b4fd5113. diff 788:5e8b61d5e99e Thu Sep 27 12:05:00 UTC 2018 Andrei Belov <defan@nginx.com> Packages: updated to 1.4-2. diff 787:1f5e8efe6934 Thu Sep 27 12:04:00 UTC 2018 Andrei Belov <defan@nginx.com> Packages: adjusted post-install banners.
|
H A D | Makefile.perl | diff 1144:b651ff72ffe0 Fri Aug 23 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: bump release for 1.10.0-2. diff 912:23693ac60089 Thu Jan 24 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: fixed control socket path after 7012b4fd5113. diff 788:5e8b61d5e99e Thu Sep 27 12:05:00 UTC 2018 Andrei Belov <defan@nginx.com> Packages: updated to 1.4-2. diff 787:1f5e8efe6934 Thu Sep 27 12:04:00 UTC 2018 Andrei Belov <defan@nginx.com> Packages: adjusted post-install banners.
|
/unit/src/ |
H A D | nxt_signal.c | diff 53:0b10a73d4993 Wed May 31 12:26:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Skeleton of router configuration and request processing. diff 12:477899a6661b Tue Feb 07 17:04:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Event engines refactoring.
|
H A D | nxt_macosx_sendfile.c | diff 62:5e1efcc7b740 Wed Jun 14 12:18:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_conn_... functions and structures have been renamed to nxt_conn_... diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
|
H A D | nxt_devpoll_engine.c | diff 62:5e1efcc7b740 Wed Jun 14 12:18:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_conn_... functions and structures have been renamed to nxt_conn_... 12:477899a6661b Tue Feb 07 17:04:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Event engines refactoring.
|
H A D | nxt_event_conn_job_sendfile.c | diff 771:f349b2d68e75 Thu Sep 20 12:05:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> Added SSL/TLS support on connection level. diff 62:5e1efcc7b740 Wed Jun 14 12:18:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_conn_... functions and structures have been renamed to nxt_conn_... diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring. diff 12:477899a6661b Tue Feb 07 17:04:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Event engines refactoring.
|
H A D | nxt_listen_socket.c | diff 1451:0a8840921fd0 Wed Apr 08 12:15:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Controller: improved handling of unix domain control socket.
One of the ways to detect Unit's startup and subsequent readiness to accept commands relies on waiting for the control socket file to be created. Earlier, it was unreliable due to a race condition between the client's connect() and the daemon's listen() calls after the socket's bind() call.
Now, unix domain listening sockets are created with a nxt_listen_socket_create() call as follows:
s = socket(); unlink("path/to/socket.tmp") bind(s, "path/to/socket.tmp"); listen(s); rename("path/to/socket.tmp", "path/to/socket");
This eliminates a time-lapse when the socket file is already created but nobody is listening on it yet, which therefore prevents the condition described above.
Also, it allows reliably detecting whether the socket is being used or simply wasn't cleaned after the daemon stopped abruptly. A successful connection to the socket file means the daemon has been started; otherwise, the file can be overwritten. diff 1450:d431a2d91caa Wed Apr 08 12:15:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Controller: fixed cleaning up of control socket file in some cases.
Previously, the unix domain control socket file might have been left in the file system after a failed nxt_listen_socket_create() call. diff 1449:8bcb79f5d69d Wed Apr 08 12:15:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Removed unused code related to testing of address binding. diff 771:f349b2d68e75 Thu Sep 20 12:05:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> Added SSL/TLS support on connection level. diff 494:7c83ddcc1c42 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Fixed formatting in nxt_sprintf() and logging. diff 493:745222d540a2 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Using size_t for the field width type of the "%*s" specifier. diff 62:5e1efcc7b740 Wed Jun 14 12:18:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_conn_... functions and structures have been renamed to nxt_conn_... diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
|
H A D | nxt_socket.c | diff 1449:8bcb79f5d69d Wed Apr 08 12:15:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Removed unused code related to testing of address binding. diff 494:7c83ddcc1c42 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Fixed formatting in nxt_sprintf() and logging. diff 493:745222d540a2 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Using size_t for the field width type of the "%*s" specifier. diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
|
H A D | nxt_thread_pool.c | diff 494:7c83ddcc1c42 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Fixed formatting in nxt_sprintf() and logging. diff 53:0b10a73d4993 Wed May 31 12:26:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Skeleton of router configuration and request processing.
|
H A D | nxt_array.c | diff 1563:d32bc428f46b Wed Aug 12 23:46:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Basic variables support. diff 146:24354fd871d5 Wed Jul 12 17:32:00 UTC 2017 Max Romanov <max.romanov@nginx.com> Array elements reallocation fixed.
|
H A D | nxt_file.c | diff 2645:c71a1acff7e9 Mon Nov 06 18:43:00 UTC 2023 Andrew Clayton <a.clayton@nginx.com> Add nxt_file_chown()
This wraps chown(2) but takes the user/owner and group as strings.
It's a little long winded as it uses the thread safe versions of getpwnam()/getgrname() which require a little more work.
This function will be used by the following commit that allows to set the permissions of the Unix domain control socket.
We need to cast uid & gid to long in the call to nxt_thread_log_alert() to appease clang-ast as it's adamant that uid/gid are unsigned ints, but chown(2) takes -1 for these values to indicate don't change this item, and it'd be nice to show them in the error message.
Note that getpwnam()/getgrname() don't define "not found" as an error as per their man page
The formulation given above under "RETURN VALUE" is from POSIX.1-2001. It does not call "not found" an error, and hence does not specify what value errno might have in this situation. But that makes it impossible to recognize errors. One might argue that according to POSIX errno should be left unchanged if an entry is not found. Experiments on var‐ ious UNIX-like systems show that lots of different values occur in this situation: 0, ENOENT, EBADF, ESRCH, EWOULDBLOCK, EPERM, and probably others.
Thus if we log an error from these functions we can end up with the slightly humorous error message
2024/02/12 15:15:12 [alert] 99404#99404 getpwnam_r("noddy", ...) failed (0: Success) (User not found) while creating listening socket on unix:/opt/unit/control.unit.sock
Reviewed-by: Zhidao Hong <z.hong@f5.com> Signed-off-by: Andrew Clayton <a.clayton@nginx.com> diff 2645:c71a1acff7e9 Mon Nov 06 18:43:00 UTC 2023 Andrew Clayton <a.clayton@nginx.com> Add nxt_file_chown()
This wraps chown(2) but takes the user/owner and group as strings.
It's a little long winded as it uses the thread safe versions of getpwnam()/getgrname() which require a little more work.
This function will be used by the following commit that allows to set the permissions of the Unix domain control socket.
We need to cast uid & gid to long in the call to nxt_thread_log_alert() to appease clang-ast as it's adamant that uid/gid are unsigned ints, but chown(2) takes -1 for these values to indicate don't change this item, and it'd be nice to show them in the error message.
Note that getpwnam()/getgrname() don't define "not found" as an error as per their man page
The formulation given above under "RETURN VALUE" is from POSIX.1-2001. It does not call "not found" an error, and hence does not specify what value errno might have in this situation. But that makes it impossible to recognize errors. One might argue that according to POSIX errno should be left unchanged if an entry is not found. Experiments on var‐ ious UNIX-like systems show that lots of different values occur in this situation: 0, ENOENT, EBADF, ESRCH, EWOULDBLOCK, EPERM, and probably others.
Thus if we log an error from these functions we can end up with the slightly humorous error message
2024/02/12 15:15:12 [alert] 99404#99404 getpwnam_r("noddy", ...) failed (0: Success) (User not found) while creating listening socket on unix:/opt/unit/control.unit.sock
Reviewed-by: Zhidao Hong <z.hong@f5.com> Signed-off-by: Andrew Clayton <a.clayton@nginx.com> diff 521:93dc4a28dd37 Wed Feb 07 12:34:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Style fixes. diff 494:7c83ddcc1c42 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Fixed formatting in nxt_sprintf() and logging. diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
|
H A D | nxt_port_socket.c | diff 1996:35873fa78fed Tue Nov 09 12:48:00 UTC 2021 Tiago Natel de Moura <t.nateldemoura@f5.com> Introduced SCM_CREDENTIALS / SCM_CREDS in the socket control msgs. diff 1907:75ddb2d89b42 Thu Jul 01 13:23:00 UTC 2021 Max Romanov <max.romanov@nginx.com> Fixing memory and descriptor leakage in case of port send failure.
In rare cases, when the destination process had finished running but no notification of this was received yet, send could fail with an error, and the send message structure with file descriptors could leak.
The leakage was periodically reproduced by respawn tests on FreeBSD 12. diff 1560:ef3da1be976d Wed Aug 12 10:37:00 UTC 2020 Max Romanov <max.romanov@nginx.com> Fixing issues found by static analyzer. diff 1005:7000543fffde Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Improving port message fragment recognition.
This is required to assemble fragmented messages correctly. Stream identifier is unique only for messages generated within a process, but the (stream, pid) pair should be enough to avoid collisions. Adding reply_port seems redundant because it's enough to add stream to a pid.
This closes #199 issue on GitHub. Thanks to 洪志道 (Hong Zhi Dao). diff 1004:306ceaf8927d Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Fixing EAGAIN processing for port message send.
Sending large plain (exceeding port's max_size, not in shared memory) messages causes message fragmentation. First message fragment is sent successfully, but the next fragment may fail with the EAGAIN error. In this case, the message has to be pushed back to queue head for additional processing.
Related to #167 issue on GitHub. diff 1002:ba4c745528cf Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Including port message header into message size limit.
Before this fix, large plain message (i.e. configuration) send may fail with the 'Message too big' error, because internal fragmentation implementation does not account for 16 byte message header.
This closes #167 issue on GitHub. diff 613:e5dd7bc63d59 Thu Apr 05 12:49:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Style. diff 521:93dc4a28dd37 Wed Feb 07 12:34:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Style fixes. diff 429:3ea130ed206e Thu Dec 28 12:58:00 UTC 2017 Max Romanov <max.romanov@nginx.com> Removed unused variable assignment.
Found by Coverity (CID 215301). diff 389:3f222d4a7df8 Thu Nov 02 12:32:00 UTC 2017 Max Romanov <max.romanov@nginx.com> Fixing build on Solaris.
|
H A D | nxt_main.h | diff 2216:231b36f0062c Thu Oct 06 12:13:00 UTC 2022 Andrew Clayton <a.clayton@nginx.com> Fixed the build on MacOS (and others).
@alejandro-colomar reported that the build was broken on MacOS
cc -o build/unitd -pipe -fPIC -fvisibility=hidden -O -W -Wall -Wextra -Wno-unused-parameter -Wwrite-strings -fstrict-aliasing -Wstrict-overflow=5 -Wmissing-prototypes -Werror -g \ build/src/nxt_main.o build/libnxt.a \ \ \ -L/usr/local/Cellar/pcre2/10.40/lib -lpcre2-8 Undefined symbols for architecture x86_64: "_nxt_fs_mkdir_parent", referenced from: _nxt_runtime_pid_file_create in libnxt.a(nxt_runtime.o) _nxt_runtime_controller_socket in libnxt.a(nxt_controller.o) ld: symbol(s) not found for architecture x86_64 clang: error: linker command failed with exit code 1 (use -v to see invocation) make: *** [build/unitd] Error 1
This was due to commit 57fc920 ("Socket: Created control socket & pid file directories.").
This happened because this commit introduced the usage of nxt_fs_mkdir_parent() in core code which uses nxt_fs_mkdir(), both of these are defined in src/nxt_fs.c. It turns out however that this file doesn't get built on MacOS (or any system that isn't Linux or that lacks a FreeBSD compatible nmount(2) system call) due to the following
In auto/sources we have
if [ $NXT_HAVE_ROOTFS = YES ]; then NXT_LIB_SRCS="$NXT_LIB_SRCS src/nxt_fs.c" fi
NXT_HAVE_ROOTFS is set in auto/isolation
If [ $NXT_HAVE_MOUNT = YES -a $NXT_HAVE_UNMOUNT = YES ]; then NXT_HAVE_ROOTFS=YES
cat << END >> $NXT_AUTO_CONFIG_H #ifndef NXT_HAVE_ISOLATION_ROOTFS #define NXT_HAVE_ISOLATION_ROOTFS 1 #endif END
fi
While we do have a check for a generic umount(2) which is found on MacOS, for mount(2) we currently only check for the Linux mount(2) and FreeBSD nmount(2) system calls. So NXT_HAVE_ROOTFS is set to NO on MacOS and we don't build src/nxt_fs.c
This fixes the immediate build issue by taking the mount/umount OS support out of nxt_fs.c into a new nxt_fs_mount.c file which is guarded by the above while we now build nxt_fs.c unconditionally.
This should fix the build on any _supported_ system.
Reported-by: Alejandro Colomar <alx@nginx.com> Fixes: 57fc920 ("Socket: Created control socket & pid file directories.") Signed-off-by: Andrew Clayton <a.clayton@nginx.com> diff 2175:e83cff38d672 Wed Aug 03 12:42:00 UTC 2022 Alejandro Colomar <alx.manpages@gmail.com> Removed dead code.
nxt_sockaddr_ntop() stopped being used in commit (git) 029942f4eb71. It has been replaced mostly by nxt_sockaddr_text().
commit 029942f4eb7196c2cff0d0e26bc6ff274138f7d8 Author: Igor Sysoev <igor@sysoev.ru> Date: Wed Feb 22 15:09:59 2017 +0300
I/O operations refactoring.
nxt_job_sockaddr_parse() stopped being used in commit (git) 794248090a74.
commit 794248090a74f31cbfcf24ea8c835df2d4d21073 Author: Igor Sysoev <igor@sysoev.ru> Date: Wed Mar 4 14:04:08 2020 +0300
Legacy upstream code removed.
Also, remove functions and types used only by those two functions:
nxt_job_sockaddr_unix_parse() nxt_job_sockaddr_inet6_parse() nxt_job_sockaddr_inet_parse() nxt_job_sockaddr_parse_t nxt_job_resolve() nxt_job_resolve_t diff 1563:d32bc428f46b Wed Aug 12 23:46:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Basic variables support. diff 1182:325b315e48c4 Thu Sep 19 12:25:00 UTC 2019 Tiago de Bem Natel de Moura <t.nateldemoura@f5.com> Initial applications isolation support using Linux namespaces. diff 933:6d72c218a055 Mon Feb 11 12:42:00 UTC 2019 Valentin Bartenev <vbart@nginx.com> Merged with the 1.7 branch. diff 791:b9bae52453f1 Fri Sep 28 12:05:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Version bump. diff 771:f349b2d68e75 Thu Sep 20 12:05:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> Added SSL/TLS support on connection level. diff 694:478a380a3ef5 Wed Jun 13 12:42:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Version bump. diff 638:cf29192f67b9 Thu Apr 12 16:39:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Version bump. diff 542:c64a6a11764d Mon Feb 12 13:58:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Version bump.
|
/unit/pkg/contrib/src/njs/ |
H A D | Makefile | diff 2431:4867740e5282 Tue Apr 11 22:48:00 UTC 2023 Konstantin Pavlov <thresh@nginx.com> contrib: updated njs to 0.7.12. 2276:65654d061155 Tue Nov 29 14:12:00 UTC 2022 Konstantin Pavlov <thresh@nginx.com> Added contribs and njs.
|
/unit/pkg/deb/ |
H A D | Makefile.jsc-common | diff 2493:e488432971bb Thu Jun 08 00:39:00 UTC 2023 Konstantin Pavlov <thresh@nginx.com> Packages: added Debian 12 "bookworm" support. diff 2487:7fb8b559a687 Thu Jun 08 00:39:00 UTC 2023 Konstantin Pavlov <thresh@nginx.com> Packages: added Debian 12 "bookworm" support. diff 1974:199a11eceb3c Thu Oct 21 12:28:00 UTC 2021 Andrei Belov <defan@nginx.com> Packages: removed support for EOL'ed Debian/Ubuntu distros.
While here, default debhelper compat level bumped to 11 (this is the version installed out of the box on Ubuntu 18.04 "bionic" which is the oldest one from supported distros). diff 1887:0a32914bf7bf Thu May 27 10:12:00 UTC 2021 Andrei Belov <defan@nginx.com> Packages: added Ubuntu 21.04 "hirsute" support. diff 1694:191d30e37005 Mon Nov 09 13:12:00 UTC 2020 Andrei Belov <defan@nginx.com> Packages: added Ubuntu 20.10 "groovy" support. diff 1144:b651ff72ffe0 Fri Aug 23 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: bump release for 1.10.0-2.
|
/unit/test/ |
H A D | test_python_basic.py | diff 2488:55440e02a873 Mon Jun 12 13:16:00 UTC 2023 Andrei Zeliankou <zelenkov@nginx.com> Tests: prerequisites checking reworked.
Prerequisites check moved to the module level to simplify class structure. Discovery and prerequisites checks functions moved to the separate files. Introduced "require" fixture to provide per-test requirements check. diff 1122:453858a43730 Wed Aug 14 12:53:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: fixed port reusing to avoid access issues. diff 512:29572dff1948 Mon Feb 05 12:39:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: adjusted check_version()'s. diff 495:879868522dbf Wed Jan 24 12:43:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: using "expectedFailure" decorator instead of assertTry(). diff 484:8d447add66e1 Wed Jan 17 12:52:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: using LF line ending for test files. diff 413:ee77e227904d Wed Dec 13 12:26:00 UTC 2017 Andrey Zelenkov <zelenkov@nginx.com> Tests: removed unused decorators. 407:cc82c7d5cbc7 Wed Dec 06 12:36:00 UTC 2017 Andrey Zelenkov <zelenkov@nginx.com> Tests: added basic PHP tests.
|
H A D | test_php_basic.py | diff 2488:55440e02a873 Mon Jun 12 13:16:00 UTC 2023 Andrei Zeliankou <zelenkov@nginx.com> Tests: prerequisites checking reworked.
Prerequisites check moved to the module level to simplify class structure. Discovery and prerequisites checks functions moved to the separate files. Introduced "require" fixture to provide per-test requirements check. diff 1122:453858a43730 Wed Aug 14 12:53:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: fixed port reusing to avoid access issues. diff 512:29572dff1948 Mon Feb 05 12:39:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: adjusted check_version()'s. diff 495:879868522dbf Wed Jan 24 12:43:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: using "expectedFailure" decorator instead of assertTry(). diff 484:8d447add66e1 Wed Jan 17 12:52:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: using LF line ending for test files. diff 413:ee77e227904d Wed Dec 13 12:26:00 UTC 2017 Andrey Zelenkov <zelenkov@nginx.com> Tests: removed unused decorators. 407:cc82c7d5cbc7 Wed Dec 06 12:36:00 UTC 2017 Andrey Zelenkov <zelenkov@nginx.com> Tests: added basic PHP tests.
|
/unit/pkg/docker/ |
H A D | docker-entrypoint.sh | diff 2438:216e2a374742 Wed Apr 12 23:00:00 UTC 2023 Konstantin Pavlov <thresh@nginx.com> Docker: made curl fail with non-zero exit code on server errors. diff 2227:6fb5db4f1d97 Thu Oct 27 12:30:00 UTC 2022 Alejandro Colomar <alx@nginx.com> Fixed path for sed(1).
Some distros provide it in /bin/sed and others in both /bin/sed and /usr/bin/sed. Use the more available one.
Reported-by: Konstantin Pavlov <thresh@nginx.com> Fixes: ac64ffde5718 "Improved readability of <docker-entrypoint.sh>." Signed-off-by: Alejandro Colomar <alx@nginx.com> diff 1511:0b1c33be02c3 Mon Jul 13 12:06:00 UTC 2020 Konstantin Pavlov <thresh@nginx.com> Docker: run entrypoint scripts for unitd-debug as well. 1219:351740203e88 Thu Oct 03 12:08:00 UTC 2019 Konstantin Pavlov <thresh@nginx.com> Docker: added an entrypoint to make configuration easier. Docker images now accept shell scripts, json files and certificate chain bundles to provide configuration on a container start by placing them into /docker-entrypoint.d/ directory.
|
/unit/test/perl/body_array/ |
H A D | psgi.pl | 544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
|
/unit/test/perl/body_empty/ |
H A D | psgi.pl | 544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
|
/unit/test/perl/body_io_empty/ |
H A D | psgi.pl | 544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
|
/unit/test/perl/body_io_file/ |
H A D | file | 544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
|
H A D | psgi.pl | 544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
|
/unit/test/perl/errors_print/ |
H A D | psgi.pl | 544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
|
/unit/test/perl/header_pairs/ |
H A D | psgi.pl | 544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
|