Home
last modified time | relevance | path

Searched hist:12 (Results 26 – 50 of 510) sorted by relevance

12345678910>>...21

/unit/pkg/rpm/
H A DMakefile.phpdiff 1144:b651ff72ffe0 Fri Aug 23 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: bump release for 1.10.0-2.
diff 912:23693ac60089 Thu Jan 24 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: fixed control socket path after 7012b4fd5113.
diff 788:5e8b61d5e99e Thu Sep 27 12:05:00 UTC 2018 Andrei Belov <defan@nginx.com> Packages: updated to 1.4-2.
diff 787:1f5e8efe6934 Thu Sep 27 12:04:00 UTC 2018 Andrei Belov <defan@nginx.com> Packages: adjusted post-install banners.
H A DMakefile.perldiff 1144:b651ff72ffe0 Fri Aug 23 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: bump release for 1.10.0-2.
diff 912:23693ac60089 Thu Jan 24 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: fixed control socket path after 7012b4fd5113.
diff 788:5e8b61d5e99e Thu Sep 27 12:05:00 UTC 2018 Andrei Belov <defan@nginx.com> Packages: updated to 1.4-2.
diff 787:1f5e8efe6934 Thu Sep 27 12:04:00 UTC 2018 Andrei Belov <defan@nginx.com> Packages: adjusted post-install banners.
/unit/src/
H A Dnxt_signal.cdiff 53:0b10a73d4993 Wed May 31 12:26:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Skeleton of router configuration and request processing.
diff 12:477899a6661b Tue Feb 07 17:04:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Event engines refactoring.
H A Dnxt_macosx_sendfile.cdiff 62:5e1efcc7b740 Wed Jun 14 12:18:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_conn_... functions and structures have been renamed
to nxt_conn_...
diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
H A Dnxt_devpoll_engine.cdiff 62:5e1efcc7b740 Wed Jun 14 12:18:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_conn_... functions and structures have been renamed
to nxt_conn_...
12:477899a6661b Tue Feb 07 17:04:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Event engines refactoring.
H A Dnxt_event_conn_job_sendfile.cdiff 771:f349b2d68e75 Thu Sep 20 12:05:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> Added SSL/TLS support on connection level.
diff 62:5e1efcc7b740 Wed Jun 14 12:18:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_conn_... functions and structures have been renamed
to nxt_conn_...
diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
diff 12:477899a6661b Tue Feb 07 17:04:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Event engines refactoring.
H A Dnxt_listen_socket.cdiff 1451:0a8840921fd0 Wed Apr 08 12:15:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Controller: improved handling of unix domain control socket.

One of the ways to detect Unit's startup and subsequent readiness to accept
commands relies on waiting for the control socket file to be created.
Earlier, it was unreliable due to a race condition between the client's
connect() and the daemon's listen() calls after the socket's bind() call.

Now, unix domain listening sockets are created with a nxt_listen_socket_create()
call as follows:

s = socket();
unlink("path/to/socket.tmp")
bind(s, "path/to/socket.tmp");
listen(s);
rename("path/to/socket.tmp", "path/to/socket");

This eliminates a time-lapse when the socket file is already created but nobody
is listening on it yet, which therefore prevents the condition described above.

Also, it allows reliably detecting whether the socket is being used or simply
wasn't cleaned after the daemon stopped abruptly. A successful connection to
the socket file means the daemon has been started; otherwise, the file can be
overwritten.
diff 1450:d431a2d91caa Wed Apr 08 12:15:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Controller: fixed cleaning up of control socket file in some cases.

Previously, the unix domain control socket file might have been left
in the file system after a failed nxt_listen_socket_create() call.
diff 1449:8bcb79f5d69d Wed Apr 08 12:15:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Removed unused code related to testing of address binding.
diff 771:f349b2d68e75 Thu Sep 20 12:05:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> Added SSL/TLS support on connection level.
diff 494:7c83ddcc1c42 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Fixed formatting in nxt_sprintf() and logging.
diff 493:745222d540a2 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Using size_t for the field width type of the "%*s" specifier.
diff 62:5e1efcc7b740 Wed Jun 14 12:18:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_conn_... functions and structures have been renamed
to nxt_conn_...
diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
H A Dnxt_socket.cdiff 1449:8bcb79f5d69d Wed Apr 08 12:15:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Removed unused code related to testing of address binding.
diff 494:7c83ddcc1c42 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Fixed formatting in nxt_sprintf() and logging.
diff 493:745222d540a2 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Using size_t for the field width type of the "%*s" specifier.
diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
H A Dnxt_thread_pool.cdiff 494:7c83ddcc1c42 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Fixed formatting in nxt_sprintf() and logging.
diff 53:0b10a73d4993 Wed May 31 12:26:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Skeleton of router configuration and request processing.
H A Dnxt_array.cdiff 1563:d32bc428f46b Wed Aug 12 23:46:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Basic variables support.
diff 146:24354fd871d5 Wed Jul 12 17:32:00 UTC 2017 Max Romanov <max.romanov@nginx.com> Array elements reallocation fixed.
H A Dnxt_file.cdiff 2645:c71a1acff7e9 Mon Nov 06 18:43:00 UTC 2023 Andrew Clayton <a.clayton@nginx.com> Add nxt_file_chown()

This wraps chown(2) but takes the user/owner and group as strings.

It's a little long winded as it uses the thread safe versions of
getpwnam()/getgrname() which require a little more work.

This function will be used by the following commit that allows to set
the permissions of the Unix domain control socket.

We need to cast uid & gid to long in the call to nxt_thread_log_alert()
to appease clang-ast as it's adamant that uid/gid are unsigned ints, but
chown(2) takes -1 for these values to indicate don't change this item,
and it'd be nice to show them in the error message.

Note that getpwnam()/getgrname() don't define "not found" as an error as
per their man page

The formulation given above under "RETURN VALUE" is from POSIX.1-2001.
It does not call "not found" an error, and hence does not specify what
value errno might have in this situation. But that makes it impossible
to recognize errors. One might argue that according to POSIX errno
should be left unchanged if an entry is not found. Experiments on var‐
ious UNIX-like systems show that lots of different values occur in this
situation: 0, ENOENT, EBADF, ESRCH, EWOULDBLOCK, EPERM, and probably
others.

Thus if we log an error from these functions we can end up with the
slightly humorous error message

2024/02/12 15:15:12 [alert] 99404#99404 getpwnam_r("noddy", ...) failed (0: Success) (User not found) while creating listening socket on unix:/opt/unit/control.unit.sock

Reviewed-by: Zhidao Hong <z.hong@f5.com>
Signed-off-by: Andrew Clayton <a.clayton@nginx.com>
diff 2645:c71a1acff7e9 Mon Nov 06 18:43:00 UTC 2023 Andrew Clayton <a.clayton@nginx.com> Add nxt_file_chown()

This wraps chown(2) but takes the user/owner and group as strings.

It's a little long winded as it uses the thread safe versions of
getpwnam()/getgrname() which require a little more work.

This function will be used by the following commit that allows to set
the permissions of the Unix domain control socket.

We need to cast uid & gid to long in the call to nxt_thread_log_alert()
to appease clang-ast as it's adamant that uid/gid are unsigned ints, but
chown(2) takes -1 for these values to indicate don't change this item,
and it'd be nice to show them in the error message.

Note that getpwnam()/getgrname() don't define "not found" as an error as
per their man page

The formulation given above under "RETURN VALUE" is from POSIX.1-2001.
It does not call "not found" an error, and hence does not specify what
value errno might have in this situation. But that makes it impossible
to recognize errors. One might argue that according to POSIX errno
should be left unchanged if an entry is not found. Experiments on var‐
ious UNIX-like systems show that lots of different values occur in this
situation: 0, ENOENT, EBADF, ESRCH, EWOULDBLOCK, EPERM, and probably
others.

Thus if we log an error from these functions we can end up with the
slightly humorous error message

2024/02/12 15:15:12 [alert] 99404#99404 getpwnam_r("noddy", ...) failed (0: Success) (User not found) while creating listening socket on unix:/opt/unit/control.unit.sock

Reviewed-by: Zhidao Hong <z.hong@f5.com>
Signed-off-by: Andrew Clayton <a.clayton@nginx.com>
diff 521:93dc4a28dd37 Wed Feb 07 12:34:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Style fixes.
diff 494:7c83ddcc1c42 Wed Jan 24 12:16:00 UTC 2018 Sergey Kandaurov <pluknet@nginx.com> Fixed formatting in nxt_sprintf() and logging.
diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
H A Dnxt_port_socket.cdiff 1996:35873fa78fed Tue Nov 09 12:48:00 UTC 2021 Tiago Natel de Moura <t.nateldemoura@f5.com> Introduced SCM_CREDENTIALS / SCM_CREDS in the socket control msgs.
diff 1907:75ddb2d89b42 Thu Jul 01 13:23:00 UTC 2021 Max Romanov <max.romanov@nginx.com> Fixing memory and descriptor leakage in case of port send failure.

In rare cases, when the destination process had finished running but no
notification of this was received yet, send could fail with an error, and the
send message structure with file descriptors could leak.

The leakage was periodically reproduced by respawn tests on FreeBSD 12.
diff 1560:ef3da1be976d Wed Aug 12 10:37:00 UTC 2020 Max Romanov <max.romanov@nginx.com> Fixing issues found by static analyzer.
diff 1005:7000543fffde Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Improving port message fragment recognition.

This is required to assemble fragmented messages correctly. Stream
identifier is unique only for messages generated within a process, but
the (stream, pid) pair should be enough to avoid collisions. Adding
reply_port seems redundant because it's enough to add stream to a pid.

This closes #199 issue on GitHub.
Thanks to 洪志道 (Hong Zhi Dao).
diff 1004:306ceaf8927d Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Fixing EAGAIN processing for port message send.

Sending large plain (exceeding port's max_size, not in shared memory) messages
causes message fragmentation. First message fragment is sent successfully,
but the next fragment may fail with the EAGAIN error. In this case, the
message has to be pushed back to queue head for additional processing.

Related to #167 issue on GitHub.
diff 1002:ba4c745528cf Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Including port message header into message size limit.

Before this fix, large plain message (i.e. configuration) send may fail
with the 'Message too big' error, because internal fragmentation
implementation does not account for 16 byte message header.

This closes #167 issue on GitHub.
diff 613:e5dd7bc63d59 Thu Apr 05 12:49:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Style.
diff 521:93dc4a28dd37 Wed Feb 07 12:34:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Style fixes.
diff 429:3ea130ed206e Thu Dec 28 12:58:00 UTC 2017 Max Romanov <max.romanov@nginx.com> Removed unused variable assignment.

Found by Coverity (CID 215301).
diff 389:3f222d4a7df8 Thu Nov 02 12:32:00 UTC 2017 Max Romanov <max.romanov@nginx.com> Fixing build on Solaris.
H A Dnxt_main.hdiff 2216:231b36f0062c Thu Oct 06 12:13:00 UTC 2022 Andrew Clayton <a.clayton@nginx.com> Fixed the build on MacOS (and others).

@alejandro-colomar reported that the build was broken on MacOS

cc -o build/unitd -pipe -fPIC -fvisibility=hidden -O -W -Wall -Wextra -Wno-unused-parameter -Wwrite-strings -fstrict-aliasing -Wstrict-overflow=5 -Wmissing-prototypes -Werror -g \
build/src/nxt_main.o build/libnxt.a \
\
\
-L/usr/local/Cellar/pcre2/10.40/lib -lpcre2-8
Undefined symbols for architecture x86_64:
"_nxt_fs_mkdir_parent", referenced from:
_nxt_runtime_pid_file_create in libnxt.a(nxt_runtime.o)
_nxt_runtime_controller_socket in libnxt.a(nxt_controller.o)
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
make: *** [build/unitd] Error 1

This was due to commit 57fc920 ("Socket: Created control socket & pid file
directories.").

This happened because this commit introduced the usage of
nxt_fs_mkdir_parent() in core code which uses nxt_fs_mkdir(), both of
these are defined in src/nxt_fs.c. It turns out however that this file
doesn't get built on MacOS (or any system that isn't Linux or that
lacks a FreeBSD compatible nmount(2) system call) due to the following

In auto/sources we have

if [ $NXT_HAVE_ROOTFS = YES ]; then
NXT_LIB_SRCS="$NXT_LIB_SRCS src/nxt_fs.c"
fi

NXT_HAVE_ROOTFS is set in auto/isolation

If [ $NXT_HAVE_MOUNT = YES -a $NXT_HAVE_UNMOUNT = YES ]; then
NXT_HAVE_ROOTFS=YES

cat << END >> $NXT_AUTO_CONFIG_H
#ifndef NXT_HAVE_ISOLATION_ROOTFS
#define NXT_HAVE_ISOLATION_ROOTFS 1
#endif
END

fi

While we do have a check for a generic umount(2) which is found on
MacOS, for mount(2) we currently only check for the Linux mount(2) and
FreeBSD nmount(2) system calls. So NXT_HAVE_ROOTFS is set to NO on MacOS
and we don't build src/nxt_fs.c

This fixes the immediate build issue by taking the mount/umount OS
support out of nxt_fs.c into a new nxt_fs_mount.c file which is guarded
by the above while we now build nxt_fs.c unconditionally.

This should fix the build on any _supported_ system.

Reported-by: Alejandro Colomar <alx@nginx.com>
Fixes: 57fc920 ("Socket: Created control socket & pid file directories.")
Signed-off-by: Andrew Clayton <a.clayton@nginx.com>
diff 2175:e83cff38d672 Wed Aug 03 12:42:00 UTC 2022 Alejandro Colomar <alx.manpages@gmail.com> Removed dead code.

nxt_sockaddr_ntop() stopped being used in commit (git) 029942f4eb71.
It has been replaced mostly by nxt_sockaddr_text().

commit 029942f4eb7196c2cff0d0e26bc6ff274138f7d8
Author: Igor Sysoev <igor@sysoev.ru>
Date: Wed Feb 22 15:09:59 2017 +0300

I/O operations refactoring.

nxt_job_sockaddr_parse() stopped being used in commit (git) 794248090a74.

commit 794248090a74f31cbfcf24ea8c835df2d4d21073
Author: Igor Sysoev <igor@sysoev.ru>
Date: Wed Mar 4 14:04:08 2020 +0300

Legacy upstream code removed.

Also, remove functions and types used only by those two functions:

nxt_job_sockaddr_unix_parse()
nxt_job_sockaddr_inet6_parse()
nxt_job_sockaddr_inet_parse()
nxt_job_sockaddr_parse_t
nxt_job_resolve()
nxt_job_resolve_t
diff 1563:d32bc428f46b Wed Aug 12 23:46:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Basic variables support.
diff 1182:325b315e48c4 Thu Sep 19 12:25:00 UTC 2019 Tiago de Bem Natel de Moura <t.nateldemoura@f5.com> Initial applications isolation support using Linux namespaces.
diff 933:6d72c218a055 Mon Feb 11 12:42:00 UTC 2019 Valentin Bartenev <vbart@nginx.com> Merged with the 1.7 branch.
diff 791:b9bae52453f1 Fri Sep 28 12:05:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Version bump.
diff 771:f349b2d68e75 Thu Sep 20 12:05:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> Added SSL/TLS support on connection level.
diff 694:478a380a3ef5 Wed Jun 13 12:42:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Version bump.
diff 638:cf29192f67b9 Thu Apr 12 16:39:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Version bump.
diff 542:c64a6a11764d Mon Feb 12 13:58:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Version bump.
/unit/pkg/contrib/src/njs/
H A DMakefilediff 2431:4867740e5282 Tue Apr 11 22:48:00 UTC 2023 Konstantin Pavlov <thresh@nginx.com> contrib: updated njs to 0.7.12.
2276:65654d061155 Tue Nov 29 14:12:00 UTC 2022 Konstantin Pavlov <thresh@nginx.com> Added contribs and njs.
/unit/pkg/deb/
H A DMakefile.jsc-commondiff 2493:e488432971bb Thu Jun 08 00:39:00 UTC 2023 Konstantin Pavlov <thresh@nginx.com> Packages: added Debian 12 "bookworm" support.
diff 2487:7fb8b559a687 Thu Jun 08 00:39:00 UTC 2023 Konstantin Pavlov <thresh@nginx.com> Packages: added Debian 12 "bookworm" support.
diff 1974:199a11eceb3c Thu Oct 21 12:28:00 UTC 2021 Andrei Belov <defan@nginx.com> Packages: removed support for EOL'ed Debian/Ubuntu distros.

While here, default debhelper compat level bumped to 11 (this is the
version installed out of the box on Ubuntu 18.04 "bionic" which is
the oldest one from supported distros).
diff 1887:0a32914bf7bf Thu May 27 10:12:00 UTC 2021 Andrei Belov <defan@nginx.com> Packages: added Ubuntu 21.04 "hirsute" support.
diff 1694:191d30e37005 Mon Nov 09 13:12:00 UTC 2020 Andrei Belov <defan@nginx.com> Packages: added Ubuntu 20.10 "groovy" support.
diff 1144:b651ff72ffe0 Fri Aug 23 12:18:00 UTC 2019 Andrei Belov <defan@nginx.com> Packages: bump release for 1.10.0-2.
/unit/test/
H A Dtest_python_basic.pydiff 2488:55440e02a873 Mon Jun 12 13:16:00 UTC 2023 Andrei Zeliankou <zelenkov@nginx.com> Tests: prerequisites checking reworked.

Prerequisites check moved to the module level to simplify class structure.
Discovery and prerequisites checks functions moved to the separate files.
Introduced "require" fixture to provide per-test requirements check.
diff 1122:453858a43730 Wed Aug 14 12:53:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: fixed port reusing to avoid access issues.
diff 512:29572dff1948 Mon Feb 05 12:39:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: adjusted check_version()'s.
diff 495:879868522dbf Wed Jan 24 12:43:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: using "expectedFailure" decorator instead of assertTry().
diff 484:8d447add66e1 Wed Jan 17 12:52:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: using LF line ending for test files.
diff 413:ee77e227904d Wed Dec 13 12:26:00 UTC 2017 Andrey Zelenkov <zelenkov@nginx.com> Tests: removed unused decorators.
407:cc82c7d5cbc7 Wed Dec 06 12:36:00 UTC 2017 Andrey Zelenkov <zelenkov@nginx.com> Tests: added basic PHP tests.
H A Dtest_php_basic.pydiff 2488:55440e02a873 Mon Jun 12 13:16:00 UTC 2023 Andrei Zeliankou <zelenkov@nginx.com> Tests: prerequisites checking reworked.

Prerequisites check moved to the module level to simplify class structure.
Discovery and prerequisites checks functions moved to the separate files.
Introduced "require" fixture to provide per-test requirements check.
diff 1122:453858a43730 Wed Aug 14 12:53:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: fixed port reusing to avoid access issues.
diff 512:29572dff1948 Mon Feb 05 12:39:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: adjusted check_version()'s.
diff 495:879868522dbf Wed Jan 24 12:43:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: using "expectedFailure" decorator instead of assertTry().
diff 484:8d447add66e1 Wed Jan 17 12:52:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: using LF line ending for test files.
diff 413:ee77e227904d Wed Dec 13 12:26:00 UTC 2017 Andrey Zelenkov <zelenkov@nginx.com> Tests: removed unused decorators.
407:cc82c7d5cbc7 Wed Dec 06 12:36:00 UTC 2017 Andrey Zelenkov <zelenkov@nginx.com> Tests: added basic PHP tests.
/unit/pkg/docker/
H A Ddocker-entrypoint.shdiff 2438:216e2a374742 Wed Apr 12 23:00:00 UTC 2023 Konstantin Pavlov <thresh@nginx.com> Docker: made curl fail with non-zero exit code on server errors.
diff 2227:6fb5db4f1d97 Thu Oct 27 12:30:00 UTC 2022 Alejandro Colomar <alx@nginx.com> Fixed path for sed(1).

Some distros provide it in /bin/sed and others in both /bin/sed
and /usr/bin/sed. Use the more available one.

Reported-by: Konstantin Pavlov <thresh@nginx.com>
Fixes: ac64ffde5718 "Improved readability of <docker-entrypoint.sh>."
Signed-off-by: Alejandro Colomar <alx@nginx.com>
diff 1511:0b1c33be02c3 Mon Jul 13 12:06:00 UTC 2020 Konstantin Pavlov <thresh@nginx.com> Docker: run entrypoint scripts for unitd-debug as well.
1219:351740203e88 Thu Oct 03 12:08:00 UTC 2019 Konstantin Pavlov <thresh@nginx.com> Docker: added an entrypoint to make configuration easier.
Docker images now accept shell scripts, json files and certificate chain
bundles to provide configuration on a container start by placing them
into /docker-entrypoint.d/ directory.
/unit/test/perl/body_array/
H A Dpsgi.pl544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
/unit/test/perl/body_empty/
H A Dpsgi.pl544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
/unit/test/perl/body_io_empty/
H A Dpsgi.pl544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
/unit/test/perl/body_io_file/
H A Dfile544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
H A Dpsgi.pl544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
/unit/test/perl/errors_print/
H A Dpsgi.pl544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.
/unit/test/perl/header_pairs/
H A Dpsgi.pl544:c4bbb14c5bdb Mon Feb 12 16:32:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: perl module.

12345678910>>...21