Home
last modified time | relevance | path

Searched hist:38 (Results 1 – 25 of 50) sorted by relevance

12

/unit/test/
H A Dtest_respawn.pydiff 1769:b7cd1517081e Fri Jan 08 10:38:00 UTC 2021 Tiago Natel de Moura <t.nateldemoura@f5.com> Tests: fixed test_respawn.py to act upon test processes.

Running `test_respawn_` test cases on a machine with Unit
daemon in background would fail tests because `ps ax` was
used without filtering out other unit instances.

This patch also prevents from tests killing other Unit
processes not related to tests.
1471:38ede0766e1a Tue May 12 16:59:00 UTC 2020 Andrei Zeliankou <zelenkov@nginx.com> Tests: added respawn tests.
H A Dtest_python_environment.pydiff 1017:887a4bbabf1e Tue Mar 26 20:38:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: style.
H A Dtest_ruby_isolation.pydiff 1737:9be01e5d6ce5 Tue Dec 08 16:38:00 UTC 2020 Tiago Natel de Moura <t.nateldemoura@f5.com> Tests: fixed ruby isolation.

While alternating between running priv and unpriv tests
locally, it happens that unpriv tests can't bind mount
or create sub directories inside directories created
by root. This patch fixes this by pointing "rootfs"
to temporary directory.

Now the priv and unpriv test uses the same test function.
H A Dtest_go_application.pydiff 1017:887a4bbabf1e Tue Mar 26 20:38:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: style.
H A Dtest_python_basic.pydiff 1017:887a4bbabf1e Tue Mar 26 20:38:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: style.
H A Dtest_php_basic.pydiff 1017:887a4bbabf1e Tue Mar 26 20:38:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: style.
H A Dtest_http_header.pydiff 1017:887a4bbabf1e Tue Mar 26 20:38:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: style.
H A Dtest_configuration.pydiff 1017:887a4bbabf1e Tue Mar 26 20:38:00 UTC 2019 Andrey Zelenkov <zelenkov@nginx.com> Tests: style.
diff 1006:25028f521ae1 Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Introducing one more large config test, but without sockets.
/unit/src/
H A Dnxt_thread_pool.cdiff 157:38ae841c09ae Fri Jul 14 17:34:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Thread pools: various fixes.
H A Dnxt_cert.cdiff 1821:e1b1c9b16820 Wed Mar 24 13:38:00 UTC 2021 Valentin Bartenev <vbart@nginx.com> Certificates: moved SAN processing to a separate function.

No functional changes.
diff 1820:e969cea13cc3 Wed Mar 24 13:38:00 UTC 2021 Valentin Bartenev <vbart@nginx.com> Certficates: fixed counting DNS SAN entries.

Previously, entries of any type were counted during object allocation
but only DNS type entries were actually processed. As a result,
if some certificate entries had another type, returning information
about the certificate caused uninitialized memory access.
H A Dnxt_socketpair.cdiff 1003:a7122e3c6e06 Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Handling ENOBUFS error same was as EAGAIN.

Unlike EAGAIN, ENOBUFS returned on OSX when trying to send many relatively
small (64 bytes) fragments.

Found during investigation of #167 issue on GitHub.
H A Dnxt_errno.hdiff 1003:a7122e3c6e06 Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Handling ENOBUFS error same was as EAGAIN.

Unlike EAGAIN, ENOBUFS returned on OSX when trying to send many relatively
small (64 bytes) fragments.

Found during investigation of #167 issue on GitHub.
H A Dnxt_port_socket.cdiff 1005:7000543fffde Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Improving port message fragment recognition.

This is required to assemble fragmented messages correctly. Stream
identifier is unique only for messages generated within a process, but
the (stream, pid) pair should be enough to avoid collisions. Adding
reply_port seems redundant because it's enough to add stream to a pid.

This closes #199 issue on GitHub.
Thanks to 洪志道 (Hong Zhi Dao).
diff 1004:306ceaf8927d Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Fixing EAGAIN processing for port message send.

Sending large plain (exceeding port's max_size, not in shared memory) messages
causes message fragmentation. First message fragment is sent successfully,
but the next fragment may fail with the EAGAIN error. In this case, the
message has to be pushed back to queue head for additional processing.

Related to #167 issue on GitHub.
diff 1002:ba4c745528cf Tue Mar 05 12:38:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Including port message header into message size limit.

Before this fix, large plain message (i.e. configuration) send may fail
with the 'Message too big' error, because internal fragmentation
implementation does not account for 16 byte message header.

This closes #167 issue on GitHub.
H A Dnxt_http_variables.cdiff 2110:048281cd3d73 Thu May 26 12:38:00 UTC 2022 Alejandro Colomar <alx.manpages@gmail.com> Var: Added $request_uri (as in NGINX).

This supports a new variable $request_uri that contains the path
and the query (See RFC 3986, section 3). Its contents are percent
encoded. This is useful for example to redirect HTTP to HTTPS:

{
"return": "301",
"location": "https://$host$request_uri"
}

When <http://example.com/foo%23bar?baz> is requested, the server
redirects to <https://example.com/foo%23bar?baz>.

===

Testing:

//diff --git a/src/nxt_http_return.c b/src/nxt_http_return.c
//index 82c9156..adeb3a1 100644
//--- a/src/nxt_http_return.c
//+++ b/src/nxt_http_return.c
//@@ -196,6 +196,7 @@ nxt_http_return_send_ready(nxt_task_t *task,
void *obj, void *data)
// field->value = ctx->encoded.start;
// field->value_length = ctx->encoded.length;
// }
//+ fprintf(stderr, "ALX: target[%1$i]: <%2$.*1$s>\n",
(int)r->target.length, r->target.start);
//
// r->state = &nxt_http_return_send_state;
//

{
"listeners": {
"*:81": {
"pass": "routes/ru"
}
},

"routes": {
"ru": [{
"action": {
"return": 301,
"location": "$request_uri"
}
}]
}
}

$ curl -i http://localhost:81/*foo%2Abar?baz#arg
HTTP/1.1 301 Moved Permanently
Location: /*foo%2Abar?baz
Server: Unit/1.27.0
Date: Mon, 30 May 2022 16:04:30 GMT
Content-Length: 0

$ sudo cat /usr/local/unit.log | grep ALX
ALX: target[15]: </*foo%2Abar?baz>
H A Dnxt_mp.cdiff 832:4f5daf367ff7 Sat Nov 10 04:38:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Fixed "freed pointer is out of pool" alerts.

The issue was caused by misplacement of allocated blocks in rbtree due
to broken comparison function if the distance between two allocations
did not fit into intptr_t. As the result, nxt_mp_free() could have
failed to find the allocation.

In particular, it was mostly observed when Unit was compiled with
musl C library on 32-bits systems.

This closes #118 issue on GitHub.
/unit/pkg/deb/debian.module/
H A Dunit.example-python3.6-config441:2206b023fae3 Thu Dec 28 17:38:00 UTC 2017 Andrei Belov <defan@nginx.com> Packages: added support for Ubuntu 17.10.
H A Drules-noarch.indiff 442:3f841e1db4a7 Thu Dec 28 17:38:00 UTC 2017 Andrei Belov <defan@nginx.com> Packages: hardening flags for deb.
H A Drules.indiff 442:3f841e1db4a7 Thu Dec 28 17:38:00 UTC 2017 Andrei Belov <defan@nginx.com> Packages: hardening flags for deb.
/unit/pkg/deb/
H A DMakefile.python36441:2206b023fae3 Thu Dec 28 17:38:00 UTC 2017 Andrei Belov <defan@nginx.com> Packages: added support for Ubuntu 17.10.
H A DMakefilediff 441:2206b023fae3 Thu Dec 28 17:38:00 UTC 2017 Andrei Belov <defan@nginx.com> Packages: added support for Ubuntu 17.10.
diff 440:759444c75bce Thu Dec 28 17:38:00 UTC 2017 Andrei Belov <defan@nginx.com> Packages: added python 3.4 module on Debian 8.
/unit/
H A Dversiondiff 1951:863363011a94 Tue Aug 24 11:38:00 UTC 2021 Valentin Bartenev <vbart@nginx.com> Version bump.
diff 1230:7d73ecd65b70 Mon Oct 07 15:38:00 UTC 2019 Valentin Bartenev <vbart@nginx.com> Version bump.
/unit/pkg/deb/debian/
H A Drules.indiff 442:3f841e1db4a7 Thu Dec 28 17:38:00 UTC 2017 Andrei Belov <defan@nginx.com> Packages: hardening flags for deb.
/unit/auto/modules/
H A Dnodejsdiff 806:6b647daed063 Thu Oct 18 10:38:00 UTC 2018 Alexander Borisov <alexander.borisov@nginx.com> Fixed Makefile target for NodeJS.
/unit/pkg/rpm/
H A Dunit.module.spec.indiff 443:2b933f0bc77d Thu Dec 28 17:38:00 UTC 2017 Andrei Belov <defan@nginx.com> Packages: hardening flags for rpm.
/unit/auto/
H A Doptionsdiff 225:6f59f917d940 Thu Aug 24 15:38:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Renamed configure option --no-unix-domain to --no-unix-sockets.

12