Home
last modified time | relevance | path

Searched hist:52 (Results 1 – 25 of 72) sorted by relevance

123

/unit/pkg/rpm/rpmbuild/SOURCES/
H A Dunit-debug.service2027:04ae78e6813d Thu Dec 02 05:52:00 UTC 2021 Andrei Belov <defan@nginx.com> Packages: added systemd service for debug binary.
/unit/pkg/deb/debian/
H A Dunit-debug.service2027:04ae78e6813d Thu Dec 02 05:52:00 UTC 2021 Andrei Belov <defan@nginx.com> Packages: added systemd service for debug binary.
H A Dcopyrightdiff 1335:b8dcb1e8e379 Mon Jan 27 13:52:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Updated copyright notice.
/unit/src/
H A Dnxt_list.cdiff 108:f87c1c4e22be Wed Jun 28 20:52:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Fixed building on Solaris broken in changeset 4077decf847b.
H A Dnxt_clone.hdiff 1595:d1884e46cf71 Wed Sep 16 16:52:00 UTC 2020 Tiago Natel de Moura <t.nateldemoura@f5.com> Isolation: remove redundant macro.
diff 1306:3604d05e48be Fri Dec 06 16:52:00 UTC 2019 Tiago Natel <t.nateldemoura@f5.com> Isolation: allowed the use of credentials with unpriv userns.

The setuid/setgid syscalls requires root capabilities but if the kernel
supports unprivileged user namespace then the child process has the full
set of capabilities in the new namespace, then we can allow setting "user"
and "group" in such cases (this is a common security use case).

Tests were added to ensure user gets meaningful error messages for
uid/gid mapping misconfigurations.
H A Dnxt_conn.cdiff 386:d9e23ae1617d Mon Nov 27 14:52:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> A number of engine connections is decreased on connection close.
diff 109:8c3114bcbd3e Thu Jun 29 12:52:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Using static and constant linger structure.
H A Dnxt_credential.hdiff 1306:3604d05e48be Fri Dec 06 16:52:00 UTC 2019 Tiago Natel <t.nateldemoura@f5.com> Isolation: allowed the use of credentials with unpriv userns.

The setuid/setgid syscalls requires root capabilities but if the kernel
supports unprivileged user namespace then the child process has the full
set of capabilities in the new namespace, then we can allow setting "user"
and "group" in such cases (this is a common security use case).

Tests were added to ensure user gets meaningful error messages for
uid/gid mapping misconfigurations.
H A Dnxt_credential.cdiff 1306:3604d05e48be Fri Dec 06 16:52:00 UTC 2019 Tiago Natel <t.nateldemoura@f5.com> Isolation: allowed the use of credentials with unpriv userns.

The setuid/setgid syscalls requires root capabilities but if the kernel
supports unprivileged user namespace then the child process has the full
set of capabilities in the new namespace, then we can allow setting "user"
and "group" in such cases (this is a common security use case).

Tests were added to ensure user gets meaningful error messages for
uid/gid mapping misconfigurations.
H A Dnxt_conn_close.cdiff 109:8c3114bcbd3e Thu Jun 29 12:52:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> Using static and constant linger structure.
H A Dnxt_thread.cdiff 737:8ca436f03869 Fri Jul 27 14:52:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Removed implicit call of nxt_thread() in nxt_thread_tid().

Explicit is better than implicit © The Zen of Python.

The nxt_thread_tid(NULL) call was used only twice in the code
and such behaviour was specific to nxt_thread_tid() function.
H A Dnxt_random.cdiff 737:8ca436f03869 Fri Jul 27 14:52:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Removed implicit call of nxt_thread() in nxt_thread_tid().

Explicit is better than implicit © The Zen of Python.

The nxt_thread_tid(NULL) call was used only twice in the code
and such behaviour was specific to nxt_thread_tid() function.
H A Dnxt_lib.cdiff 1306:3604d05e48be Fri Dec 06 16:52:00 UTC 2019 Tiago Natel <t.nateldemoura@f5.com> Isolation: allowed the use of credentials with unpriv userns.

The setuid/setgid syscalls requires root capabilities but if the kernel
supports unprivileged user namespace then the child process has the full
set of capabilities in the new namespace, then we can allow setting "user"
and "group" in such cases (this is a common security use case).

Tests were added to ensure user gets meaningful error messages for
uid/gid mapping misconfigurations.
/unit/src/test/
H A Dnxt_clone_test.c1306:3604d05e48be Fri Dec 06 16:52:00 UTC 2019 Tiago Natel <t.nateldemoura@f5.com> Isolation: allowed the use of credentials with unpriv userns.

The setuid/setgid syscalls requires root capabilities but if the kernel
supports unprivileged user namespace then the child process has the full
set of capabilities in the new namespace, then we can allow setting "user"
and "group" in such cases (this is a common security use case).

Tests were added to ensure user gets meaningful error messages for
uid/gid mapping misconfigurations.
H A Dnxt_tests.cdiff 1306:3604d05e48be Fri Dec 06 16:52:00 UTC 2019 Tiago Natel <t.nateldemoura@f5.com> Isolation: allowed the use of credentials with unpriv userns.

The setuid/setgid syscalls requires root capabilities but if the kernel
supports unprivileged user namespace then the child process has the full
set of capabilities in the new namespace, then we can allow setting "user"
and "group" in such cases (this is a common security use case).

Tests were added to ensure user gets meaningful error messages for
uid/gid mapping misconfigurations.
H A Dnxt_tests.hdiff 1306:3604d05e48be Fri Dec 06 16:52:00 UTC 2019 Tiago Natel <t.nateldemoura@f5.com> Isolation: allowed the use of credentials with unpriv userns.

The setuid/setgid syscalls requires root capabilities but if the kernel
supports unprivileged user namespace then the child process has the full
set of capabilities in the new namespace, then we can allow setting "user"
and "group" in such cases (this is a common security use case).

Tests were added to ensure user gets meaningful error messages for
uid/gid mapping misconfigurations.
/unit/auto/
H A Dssltlsdiff 1942:296628096d6c Tue Aug 17 23:52:00 UTC 2021 Andrey Suvorov <a.suvorov@f5.com> Added TLS session tickets support.
H A Dsummarydiff 805:9d08482cca9c Wed Oct 17 12:52:00 UTC 2018 Max Romanov <max.romanov@nginx.com> Installing libunit headers and static library.
/unit/
H A DNOTICEdiff 1335:b8dcb1e8e379 Mon Jan 27 13:52:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Updated copyright notice.
/unit/pkg/deb/
H A DMakefile.godiff 2107:cd075799fad9 Thu May 26 06:52:00 UTC 2022 Konstantin Pavlov <thresh@nginx.com> Packaging: Go: use GO111MODULE=auto in build instructions.
diff 1333:7b483cf5cb09 Thu Dec 26 14:52:00 UTC 2019 Andrei Belov <defan@nginx.com> Merged with the default branch.
/unit/pkg/rpm/
H A DMakefile.python37diff 1333:7b483cf5cb09 Thu Dec 26 14:52:00 UTC 2019 Andrei Belov <defan@nginx.com> Merged with the default branch.
H A DMakefile.godiff 2107:cd075799fad9 Thu May 26 06:52:00 UTC 2022 Konstantin Pavlov <thresh@nginx.com> Packaging: Go: use GO111MODULE=auto in build instructions.
diff 1333:7b483cf5cb09 Thu Dec 26 14:52:00 UTC 2019 Andrei Belov <defan@nginx.com> Merged with the default branch.
H A DMakefile.python36diff 1333:7b483cf5cb09 Thu Dec 26 14:52:00 UTC 2019 Andrei Belov <defan@nginx.com> Merged with the default branch.
/unit/test/node/write_before_write_head/
H A Dapp.jsdiff 896:52a353327b3f Tue Dec 25 13:35:00 UTC 2018 Andrey Zelenkov <zelenkov@nginx.com> Tests: test_node_application_write_before_writeHead reworked.

Added res.end() call in application and response status check.
Also, renamed to test_node_application_write_before_write_head.
/unit/pkg/deb/debian.module/
H A Drules.indiff 1333:7b483cf5cb09 Thu Dec 26 14:52:00 UTC 2019 Andrei Belov <defan@nginx.com> Merged with the default branch.
/unit/pkg/docker/
H A DDockerfile.jsc11diff 1946:54ffe5ce4fb3 Thu Aug 19 14:52:00 UTC 2021 Valentin Bartenev <vbart@nginx.com> Generated Dockerfiles for Unit 1.25.0.

123