Home
last modified time | relevance | path

Searched hist:13 (Results 151 – 175 of 451) sorted by path

12345678910>>...19

/unit/src/
H A Dnxt_fiber.cdiff 611:323e11065f83 Wed Apr 04 15:13:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Style: capitalized letters in hexadecimal literals.
diff 6:6b3ce47b7663 Mon Jan 30 13:47:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_timer has been renamed to nxt_timer.
H A Dnxt_fiber.hdiff 6:6b3ce47b7663 Mon Jan 30 13:47:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> nxt_event_timer has been renamed to nxt_timer.
H A Dnxt_file.cdiff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
H A Dnxt_file.hdiff 611:323e11065f83 Wed Apr 04 15:13:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Style: capitalized letters in hexadecimal literals.
diff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
H A Dnxt_freebsd_sendfile.cdiff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
H A Dnxt_fs.cdiff 2216:231b36f0062c Thu Oct 06 12:13:00 UTC 2022 Andrew Clayton <a.clayton@nginx.com> Fixed the build on MacOS (and others).

@alejandro-colomar reported that the build was broken on MacOS

cc -o build/unitd -pipe -fPIC -fvisibility=hidden -O -W -Wall -Wextra -Wno-unused-parameter -Wwrite-strings -fstrict-aliasing -Wstrict-overflow=5 -Wmissing-prototypes -Werror -g \
build/src/nxt_main.o build/libnxt.a \
\
\
-L/usr/local/Cellar/pcre2/10.40/lib -lpcre2-8
Undefined symbols for architecture x86_64:
"_nxt_fs_mkdir_parent", referenced from:
_nxt_runtime_pid_file_create in libnxt.a(nxt_runtime.o)
_nxt_runtime_controller_socket in libnxt.a(nxt_controller.o)
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
make: *** [build/unitd] Error 1

This was due to commit 57fc920 ("Socket: Created control socket & pid file
directories.").

This happened because this commit introduced the usage of
nxt_fs_mkdir_parent() in core code which uses nxt_fs_mkdir(), both of
these are defined in src/nxt_fs.c. It turns out however that this file
doesn't get built on MacOS (or any system that isn't Linux or that
lacks a FreeBSD compatible nmount(2) system call) due to the following

In auto/sources we have

if [ $NXT_HAVE_ROOTFS = YES ]; then
NXT_LIB_SRCS="$NXT_LIB_SRCS src/nxt_fs.c"
fi

NXT_HAVE_ROOTFS is set in auto/isolation

If [ $NXT_HAVE_MOUNT = YES -a $NXT_HAVE_UNMOUNT = YES ]; then
NXT_HAVE_ROOTFS=YES

cat << END >> $NXT_AUTO_CONFIG_H
#ifndef NXT_HAVE_ISOLATION_ROOTFS
#define NXT_HAVE_ISOLATION_ROOTFS 1
#endif
END

fi

While we do have a check for a generic umount(2) which is found on
MacOS, for mount(2) we currently only check for the Linux mount(2) and
FreeBSD nmount(2) system calls. So NXT_HAVE_ROOTFS is set to NO on MacOS
and we don't build src/nxt_fs.c

This fixes the immediate build issue by taking the mount/umount OS
support out of nxt_fs.c into a new nxt_fs_mount.c file which is guarded
by the above while we now build nxt_fs.c unconditionally.

This should fix the build on any _supported_ system.

Reported-by: Alejandro Colomar <alx@nginx.com>
Fixes: 57fc920 ("Socket: Created control socket & pid file directories.")
Signed-off-by: Andrew Clayton <a.clayton@nginx.com>
1489:4a3ec07f4b19 Thu May 28 13:57:00 UTC 2020 Tiago Natel de Moura <t.nateldemoura@f5.com> Added "rootfs" feature.
H A Dnxt_fs.hdiff 2216:231b36f0062c Thu Oct 06 12:13:00 UTC 2022 Andrew Clayton <a.clayton@nginx.com> Fixed the build on MacOS (and others).

@alejandro-colomar reported that the build was broken on MacOS

cc -o build/unitd -pipe -fPIC -fvisibility=hidden -O -W -Wall -Wextra -Wno-unused-parameter -Wwrite-strings -fstrict-aliasing -Wstrict-overflow=5 -Wmissing-prototypes -Werror -g \
build/src/nxt_main.o build/libnxt.a \
\
\
-L/usr/local/Cellar/pcre2/10.40/lib -lpcre2-8
Undefined symbols for architecture x86_64:
"_nxt_fs_mkdir_parent", referenced from:
_nxt_runtime_pid_file_create in libnxt.a(nxt_runtime.o)
_nxt_runtime_controller_socket in libnxt.a(nxt_controller.o)
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
make: *** [build/unitd] Error 1

This was due to commit 57fc920 ("Socket: Created control socket & pid file
directories.").

This happened because this commit introduced the usage of
nxt_fs_mkdir_parent() in core code which uses nxt_fs_mkdir(), both of
these are defined in src/nxt_fs.c. It turns out however that this file
doesn't get built on MacOS (or any system that isn't Linux or that
lacks a FreeBSD compatible nmount(2) system call) due to the following

In auto/sources we have

if [ $NXT_HAVE_ROOTFS = YES ]; then
NXT_LIB_SRCS="$NXT_LIB_SRCS src/nxt_fs.c"
fi

NXT_HAVE_ROOTFS is set in auto/isolation

If [ $NXT_HAVE_MOUNT = YES -a $NXT_HAVE_UNMOUNT = YES ]; then
NXT_HAVE_ROOTFS=YES

cat << END >> $NXT_AUTO_CONFIG_H
#ifndef NXT_HAVE_ISOLATION_ROOTFS
#define NXT_HAVE_ISOLATION_ROOTFS 1
#endif
END

fi

While we do have a check for a generic umount(2) which is found on
MacOS, for mount(2) we currently only check for the Linux mount(2) and
FreeBSD nmount(2) system calls. So NXT_HAVE_ROOTFS is set to NO on MacOS
and we don't build src/nxt_fs.c

This fixes the immediate build issue by taking the mount/umount OS
support out of nxt_fs.c into a new nxt_fs_mount.c file which is guarded
by the above while we now build nxt_fs.c unconditionally.

This should fix the build on any _supported_ system.

Reported-by: Alejandro Colomar <alx@nginx.com>
Fixes: 57fc920 ("Socket: Created control socket & pid file directories.")
Signed-off-by: Andrew Clayton <a.clayton@nginx.com>
1489:4a3ec07f4b19 Thu May 28 13:57:00 UTC 2020 Tiago Natel de Moura <t.nateldemoura@f5.com> Added "rootfs" feature.
H A Dnxt_fs_mount.c2216:231b36f0062c Thu Oct 06 12:13:00 UTC 2022 Andrew Clayton <a.clayton@nginx.com> Fixed the build on MacOS (and others).

@alejandro-colomar reported that the build was broken on MacOS

cc -o build/unitd -pipe -fPIC -fvisibility=hidden -O -W -Wall -Wextra -Wno-unused-parameter -Wwrite-strings -fstrict-aliasing -Wstrict-overflow=5 -Wmissing-prototypes -Werror -g \
build/src/nxt_main.o build/libnxt.a \
\
\
-L/usr/local/Cellar/pcre2/10.40/lib -lpcre2-8
Undefined symbols for architecture x86_64:
"_nxt_fs_mkdir_parent", referenced from:
_nxt_runtime_pid_file_create in libnxt.a(nxt_runtime.o)
_nxt_runtime_controller_socket in libnxt.a(nxt_controller.o)
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
make: *** [build/unitd] Error 1

This was due to commit 57fc920 ("Socket: Created control socket & pid file
directories.").

This happened because this commit introduced the usage of
nxt_fs_mkdir_parent() in core code which uses nxt_fs_mkdir(), both of
these are defined in src/nxt_fs.c. It turns out however that this file
doesn't get built on MacOS (or any system that isn't Linux or that
lacks a FreeBSD compatible nmount(2) system call) due to the following

In auto/sources we have

if [ $NXT_HAVE_ROOTFS = YES ]; then
NXT_LIB_SRCS="$NXT_LIB_SRCS src/nxt_fs.c"
fi

NXT_HAVE_ROOTFS is set in auto/isolation

If [ $NXT_HAVE_MOUNT = YES -a $NXT_HAVE_UNMOUNT = YES ]; then
NXT_HAVE_ROOTFS=YES

cat << END >> $NXT_AUTO_CONFIG_H
#ifndef NXT_HAVE_ISOLATION_ROOTFS
#define NXT_HAVE_ISOLATION_ROOTFS 1
#endif
END

fi

While we do have a check for a generic umount(2) which is found on
MacOS, for mount(2) we currently only check for the Linux mount(2) and
FreeBSD nmount(2) system calls. So NXT_HAVE_ROOTFS is set to NO on MacOS
and we don't build src/nxt_fs.c

This fixes the immediate build issue by taking the mount/umount OS
support out of nxt_fs.c into a new nxt_fs_mount.c file which is guarded
by the above while we now build nxt_fs.c unconditionally.

This should fix the build on any _supported_ system.

Reported-by: Alejandro Colomar <alx@nginx.com>
Fixes: 57fc920 ("Socket: Created control socket & pid file directories.")
Signed-off-by: Andrew Clayton <a.clayton@nginx.com>
H A Dnxt_fs_mount.h2216:231b36f0062c Thu Oct 06 12:13:00 UTC 2022 Andrew Clayton <a.clayton@nginx.com> Fixed the build on MacOS (and others).

@alejandro-colomar reported that the build was broken on MacOS

cc -o build/unitd -pipe -fPIC -fvisibility=hidden -O -W -Wall -Wextra -Wno-unused-parameter -Wwrite-strings -fstrict-aliasing -Wstrict-overflow=5 -Wmissing-prototypes -Werror -g \
build/src/nxt_main.o build/libnxt.a \
\
\
-L/usr/local/Cellar/pcre2/10.40/lib -lpcre2-8
Undefined symbols for architecture x86_64:
"_nxt_fs_mkdir_parent", referenced from:
_nxt_runtime_pid_file_create in libnxt.a(nxt_runtime.o)
_nxt_runtime_controller_socket in libnxt.a(nxt_controller.o)
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
make: *** [build/unitd] Error 1

This was due to commit 57fc920 ("Socket: Created control socket & pid file
directories.").

This happened because this commit introduced the usage of
nxt_fs_mkdir_parent() in core code which uses nxt_fs_mkdir(), both of
these are defined in src/nxt_fs.c. It turns out however that this file
doesn't get built on MacOS (or any system that isn't Linux or that
lacks a FreeBSD compatible nmount(2) system call) due to the following

In auto/sources we have

if [ $NXT_HAVE_ROOTFS = YES ]; then
NXT_LIB_SRCS="$NXT_LIB_SRCS src/nxt_fs.c"
fi

NXT_HAVE_ROOTFS is set in auto/isolation

If [ $NXT_HAVE_MOUNT = YES -a $NXT_HAVE_UNMOUNT = YES ]; then
NXT_HAVE_ROOTFS=YES

cat << END >> $NXT_AUTO_CONFIG_H
#ifndef NXT_HAVE_ISOLATION_ROOTFS
#define NXT_HAVE_ISOLATION_ROOTFS 1
#endif
END

fi

While we do have a check for a generic umount(2) which is found on
MacOS, for mount(2) we currently only check for the Linux mount(2) and
FreeBSD nmount(2) system calls. So NXT_HAVE_ROOTFS is set to NO on MacOS
and we don't build src/nxt_fs.c

This fixes the immediate build issue by taking the mount/umount OS
support out of nxt_fs.c into a new nxt_fs_mount.c file which is guarded
by the above while we now build nxt_fs.c unconditionally.

This should fix the build on any _supported_ system.

Reported-by: Alejandro Colomar <alx@nginx.com>
Fixes: 57fc920 ("Socket: Created control socket & pid file directories.")
Signed-off-by: Andrew Clayton <a.clayton@nginx.com>
H A Dnxt_gnutls.cdiff 2078:0996dd223cdd Sat Dec 18 23:58:00 UTC 2021 Alejandro Colomar <alx.manpages@gmail.com> Fixed indentation.

Some lines (incorrectly) had an indentation of 3 or 5, or 7 or 9,
or 11 or 13, or 15 or 17 spaces instead of 4, 8, 12, or 16. Fix them.

Found with:

$ find src -type f | xargs grep -n '^ [^ ]';
$ find src -type f | xargs grep -n '^ [^ *]';
$ find src -type f | xargs grep -n '^ [^ ]';
$ find src -type f | xargs grep -n '^ [^ *]';
$ find src -type f | xargs grep -n '^ [^ +]';
$ find src -type f | xargs grep -n '^ [^ *+]';
$ find src -type f | xargs grep -n '^ [^ +]';
$ find src -type f | xargs grep -n '^ [^ *+]';
H A Dnxt_h1proto.cdiff 2078:0996dd223cdd Sat Dec 18 23:58:00 UTC 2021 Alejandro Colomar <alx.manpages@gmail.com> Fixed indentation.

Some lines (incorrectly) had an indentation of 3 or 5, or 7 or 9,
or 11 or 13, or 15 or 17 spaces instead of 4, 8, 12, or 16. Fix them.

Found with:

$ find src -type f | xargs grep -n '^ [^ ]';
$ find src -type f | xargs grep -n '^ [^ *]';
$ find src -type f | xargs grep -n '^ [^ ]';
$ find src -type f | xargs grep -n '^ [^ *]';
$ find src -type f | xargs grep -n '^ [^ +]';
$ find src -type f | xargs grep -n '^ [^ *+]';
$ find src -type f | xargs grep -n '^ [^ +]';
$ find src -type f | xargs grep -n '^ [^ *+]';
diff 1709:1fe93c17d23f Tue Nov 17 13:50:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> HTTP parser: allowed more characters in header field names.

Previously, all requests that contained in header field names characters other
than alphanumeric, or "-", or "_" were rejected with a 400 "Bad Request" error
response.

Now, the parser allows the same set of characters as specified in RFC 7230,
including: "!", "#", "$", "%", "&", "'", "*", "+", ".", "^", "`", "|", and "~".
Header field names that contain only these characters are considered valid.

Also, there's a new option introduced: "discard_unsafe_fields". It accepts
boolean value and it is set to "true" by default.

When this option is "true", all header field names that contain characters
in valid range, but other than alphanumeric or "-" are skipped during parsing.
When the option is "false", these header fields aren't skipped.

Requests with non-valid characters in header field names according to
RFC 7230 are rejected regardless of "discard_unsafe_fields" setting.

This closes #422 issue on GitHub.
diff 1619:6d08a02c7300 Wed Sep 30 13:36:00 UTC 2020 Max Romanov <max.romanov@nginx.com> Fixing router connection pool leakage.

The connection's local socket address is allocated from the connection
pool before the request is passed to the application; however, with keep-alive
connections, this field was unconditionally reset by a socket configuration
value that could be NULL. For the next request, the address was allocated
again from the same connection pool. Nonetheless, all leaked addresses
were released when the connection was closed.

The issue introduced in changeset 5c7dd85fabd5.
diff 1534:dd6867b3a02e Wed Aug 05 13:11:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Improved mkstemp() error reporting.

The invocation parameters should be logged as well, notably the path of the file
that is failed to be created.

Also, log level changed to ALERT as it's quite critical error.
diff 1271:d9c8ee25590a Thu Nov 14 13:40:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Processing inconsistent proxied response length.

Keepalive connection is disabled if upstream response length
differs from specified in the "Content-Length" field value.
diff 1270:9efa309be18b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Initial proxy support.
diff 1269:41331471eee7 Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Introduced chained buffer completion handlers.
diff 1268:dc403927ab0b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Using event engine memory buffers in HTTP/1 layer.
diff 1265:01b50813093d Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Using request task.
diff 1131:ec7d924d8dfb Tue Aug 20 13:31:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Introducing websocket support in router and libunit.
H A Dnxt_h1proto.hdiff 1270:9efa309be18b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Initial proxy support.
1131:ec7d924d8dfb Tue Aug 20 13:31:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Introducing websocket support in router and libunit.
H A Dnxt_h1proto_websocket.cdiff 1269:41331471eee7 Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Introduced chained buffer completion handlers.
diff 1268:dc403927ab0b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Using event engine memory buffers in HTTP/1 layer.
1131:ec7d924d8dfb Tue Aug 20 13:31:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Introducing websocket support in router and libunit.
H A Dnxt_hpux_sendfile.cdiff 13:3a52b2c3d3f1 Wed Feb 22 12:09:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> I/O operations refactoring.
H A Dnxt_http.hdiff 2147:7bf58b1b18c4 Wed Jul 13 20:32:00 UTC 2022 Zhidao HONG <z.hong@f5.com> Var: dynamic variables support.

This commit adds the variables $arg_NAME, $header_NAME, and $cookie_NAME.
diff 2123:36000da0aa5b Thu May 19 13:18:00 UTC 2022 Zhidao HONG <z.hong@f5.com> HTTP: generalized uri encoding.

No functional changes.
diff 2104:2ae3c205fcad Wed May 18 13:18:00 UTC 2022 Zhidao HONG <z.hong@f5.com> HTTP: generalized argument and cookie parsing.

No functional changes.
diff 2078:0996dd223cdd Sat Dec 18 23:58:00 UTC 2021 Alejandro Colomar <alx.manpages@gmail.com> Fixed indentation.

Some lines (incorrectly) had an indentation of 3 or 5, or 7 or 9,
or 11 or 13, or 15 or 17 spaces instead of 4, 8, 12, or 16. Fix them.

Found with:

$ find src -type f | xargs grep -n '^ [^ ]';
$ find src -type f | xargs grep -n '^ [^ *]';
$ find src -type f | xargs grep -n '^ [^ ]';
$ find src -type f | xargs grep -n '^ [^ *]';
$ find src -type f | xargs grep -n '^ [^ +]';
$ find src -type f | xargs grep -n '^ [^ *+]';
$ find src -type f | xargs grep -n '^ [^ +]';
$ find src -type f | xargs grep -n '^ [^ *+]';
diff 1954:8f18a05d4c58 Tue Sep 07 13:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: refactored variable pass.

Since the "pass" option supports both strings and variables, a generic
nxt_var_t structure can be used in the configuration phase, and the "name"
field in actions is redundant.

No functional changes.
diff 1954:8f18a05d4c58 Tue Sep 07 13:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: refactored variable pass.

Since the "pass" option supports both strings and variables, a generic
nxt_var_t structure can be used in the configuration phase, and the "name"
field in actions is redundant.

No functional changes.
diff 1854:aebe76640568 Thu Apr 22 05:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: grouped app and share fields in nxt_http_action_t.

This is a prerequisite for further introduction of openat2() features.
No functional changes.
diff 1271:d9c8ee25590a Thu Nov 14 13:40:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Processing inconsistent proxied response length.

Keepalive connection is disabled if upstream response length
differs from specified in the "Content-Length" field value.
diff 1270:9efa309be18b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Initial proxy support.
diff 1265:01b50813093d Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Using request task.
H A Dnxt_http_chunk_parse.cdiff 704:1fcac04f0a15 Mon Jun 25 13:56:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> Removed '\r' and '\n' artifact macros.
diff 611:323e11065f83 Wed Apr 04 15:13:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Style: capitalized letters in hexadecimal literals.
H A Dnxt_http_error.cdiff 1270:9efa309be18b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Initial proxy support.
diff 923:1677bee5ae71 Fri Jan 18 13:18:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Testing correct value.
diff 906:0e35dd137f90 Fri Jan 18 13:18:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Testing correct value.
diff 768:d1f741314614 Tue Sep 18 13:28:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Fixed more typos.

Thanks to 洪志道 (Hong Zhi Dao).
diff 703:2d536dde84d2 Mon Jun 25 13:51:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Introduced nxt_length() macro.
diff 608:d756231f2cb3 Tue Apr 03 13:28:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> HTTP: using r->mem_pool retention counter for response buffers.
431:5817734dd9b9 Thu Dec 28 13:01:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> HTTP keep-alive connections support.
H A Dnxt_http_js.c2248:67f848571b9f Tue Nov 22 02:13:00 UTC 2022 Zhidao HONG <z.hong@f5.com> NJS: added http request prototype.
H A Dnxt_http_parse.cdiff 1709:1fe93c17d23f Tue Nov 17 13:50:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> HTTP parser: allowed more characters in header field names.

Previously, all requests that contained in header field names characters other
than alphanumeric, or "-", or "_" were rejected with a 400 "Bad Request" error
response.

Now, the parser allows the same set of characters as specified in RFC 7230,
including: "!", "#", "$", "%", "&", "'", "*", "+", ".", "^", "`", "|", and "~".
Header field names that contain only these characters are considered valid.

Also, there's a new option introduced: "discard_unsafe_fields". It accepts
boolean value and it is set to "true" by default.

When this option is "true", all header field names that contain characters
in valid range, but other than alphanumeric or "-" are skipped during parsing.
When the option is "false", these header fields aren't skipped.

Requests with non-valid characters in header field names according to
RFC 7230 are rejected regardless of "discard_unsafe_fields" setting.

This closes #422 issue on GitHub.
diff 1270:9efa309be18b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Initial proxy support.
diff 704:1fcac04f0a15 Mon Jun 25 13:56:00 UTC 2018 Igor Sysoev <igor@sysoev.ru> Removed '\r' and '\n' artifact macros.
diff 623:d9631fc41049 Tue Apr 10 13:51:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> HTTP parser: saving partial method.

This is useful for log purposes.
diff 622:8ba4abc08034 Tue Apr 10 13:51:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> HTTP parser: saving unsupported version.

This is useful for log purposes.
diff 621:944d059f7a4b Tue Apr 10 13:51:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> HTTP parser: correct "target" for partial or invalid request line.
diff 611:323e11065f83 Wed Apr 04 15:13:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> Style: capitalized letters in hexadecimal literals.
diff 454:82c827d1cd13 Tue Jan 09 13:50:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> HTTP parser: allowing underscore in header field names.
diff 60:b80bfbd9bddc Tue Jun 13 17:11:00 UTC 2017 Valentin Bartenev <vbart@nginx.com> HTTP parser: decoupled header fields processing.
diff 38:c47bca12f947 Tue Apr 25 13:57:00 UTC 2017 Valentin Bartenev <vbart@nginx.com> HTTP parser: fixed minimum length optimization in headers hash.
H A Dnxt_http_parse.hdiff 1709:1fe93c17d23f Tue Nov 17 13:50:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> HTTP parser: allowed more characters in header field names.

Previously, all requests that contained in header field names characters other
than alphanumeric, or "-", or "_" were rejected with a 400 "Bad Request" error
response.

Now, the parser allows the same set of characters as specified in RFC 7230,
including: "!", "#", "$", "%", "&", "'", "*", "+", ".", "^", "`", "|", and "~".
Header field names that contain only these characters are considered valid.

Also, there's a new option introduced: "discard_unsafe_fields". It accepts
boolean value and it is set to "true" by default.

When this option is "true", all header field names that contain characters
in valid range, but other than alphanumeric or "-" are skipped during parsing.
When the option is "false", these header fields aren't skipped.

Requests with non-valid characters in header field names according to
RFC 7230 are rejected regardless of "discard_unsafe_fields" setting.

This closes #422 issue on GitHub.
diff 1270:9efa309be18b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Initial proxy support.
diff 60:b80bfbd9bddc Tue Jun 13 17:11:00 UTC 2017 Valentin Bartenev <vbart@nginx.com> HTTP parser: decoupled header fields processing.
H A Dnxt_http_proxy.cdiff 1271:d9c8ee25590a Thu Nov 14 13:40:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Processing inconsistent proxied response length.

Keepalive connection is disabled if upstream response length
differs from specified in the "Content-Length" field value.
1270:9efa309be18b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Initial proxy support.
H A Dnxt_http_request.cdiff 2147:7bf58b1b18c4 Wed Jul 13 20:32:00 UTC 2022 Zhidao HONG <z.hong@f5.com> Var: dynamic variables support.

This commit adds the variables $arg_NAME, $header_NAME, and $cookie_NAME.
diff 2123:36000da0aa5b Thu May 19 13:18:00 UTC 2022 Zhidao HONG <z.hong@f5.com> HTTP: generalized uri encoding.

No functional changes.
diff 2104:2ae3c205fcad Wed May 18 13:18:00 UTC 2022 Zhidao HONG <z.hong@f5.com> HTTP: generalized argument and cookie parsing.

No functional changes.
diff 1954:8f18a05d4c58 Tue Sep 07 13:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: refactored variable pass.

Since the "pass" option supports both strings and variables, a generic
nxt_var_t structure can be used in the configuration phase, and the "name"
field in actions is redundant.

No functional changes.
diff 1954:8f18a05d4c58 Tue Sep 07 13:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: refactored variable pass.

Since the "pass" option supports both strings and variables, a generic
nxt_var_t structure can be used in the configuration phase, and the "name"
field in actions is redundant.

No functional changes.
diff 1854:aebe76640568 Thu Apr 22 05:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: grouped app and share fields in nxt_http_action_t.

This is a prerequisite for further introduction of openat2() features.
No functional changes.
diff 1270:9efa309be18b Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Initial proxy support.
diff 1269:41331471eee7 Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Introduced chained buffer completion handlers.
diff 1265:01b50813093d Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Using request task.
diff 1264:30b289d97479 Thu Nov 14 13:39:00 UTC 2019 Igor Sysoev <igor@sysoev.ru> Replacing pass with action.
H A Dnxt_http_response.cdiff 1131:ec7d924d8dfb Tue Aug 20 13:31:00 UTC 2019 Max Romanov <max.romanov@nginx.com> Introducing websocket support in router and libunit.
diff 543:85c9c538983c Mon Feb 12 13:58:00 UTC 2018 Valentin Bartenev <vbart@nginx.com> HTTP: the Date response header.
431:5817734dd9b9 Thu Dec 28 13:01:00 UTC 2017 Igor Sysoev <igor@sysoev.ru> HTTP keep-alive connections support.
H A Dnxt_http_return.cdiff 2147:7bf58b1b18c4 Wed Jul 13 20:32:00 UTC 2022 Zhidao HONG <z.hong@f5.com> Var: dynamic variables support.

This commit adds the variables $arg_NAME, $header_NAME, and $cookie_NAME.
H A Dnxt_http_route.cdiff 2147:7bf58b1b18c4 Wed Jul 13 20:32:00 UTC 2022 Zhidao HONG <z.hong@f5.com> Var: dynamic variables support.

This commit adds the variables $arg_NAME, $header_NAME, and $cookie_NAME.
diff 2123:36000da0aa5b Thu May 19 13:18:00 UTC 2022 Zhidao HONG <z.hong@f5.com> HTTP: generalized uri encoding.

No functional changes.
diff 2104:2ae3c205fcad Wed May 18 13:18:00 UTC 2022 Zhidao HONG <z.hong@f5.com> HTTP: generalized argument and cookie parsing.

No functional changes.
diff 2078:0996dd223cdd Sat Dec 18 23:58:00 UTC 2021 Alejandro Colomar <alx.manpages@gmail.com> Fixed indentation.

Some lines (incorrectly) had an indentation of 3 or 5, or 7 or 9,
or 11 or 13, or 15 or 17 spaces instead of 4, 8, 12, or 16. Fix them.

Found with:

$ find src -type f | xargs grep -n '^ [^ ]';
$ find src -type f | xargs grep -n '^ [^ *]';
$ find src -type f | xargs grep -n '^ [^ ]';
$ find src -type f | xargs grep -n '^ [^ *]';
$ find src -type f | xargs grep -n '^ [^ +]';
$ find src -type f | xargs grep -n '^ [^ *+]';
$ find src -type f | xargs grep -n '^ [^ +]';
$ find src -type f | xargs grep -n '^ [^ *+]';
diff 1954:8f18a05d4c58 Tue Sep 07 13:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: refactored variable pass.

Since the "pass" option supports both strings and variables, a generic
nxt_var_t structure can be used in the configuration phase, and the "name"
field in actions is redundant.

No functional changes.
diff 1954:8f18a05d4c58 Tue Sep 07 13:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: refactored variable pass.

Since the "pass" option supports both strings and variables, a generic
nxt_var_t structure can be used in the configuration phase, and the "name"
field in actions is redundant.

No functional changes.
diff 1854:aebe76640568 Thu Apr 22 05:13:00 UTC 2021 Zhidao HONG <z.hong@f5.com> Router: grouped app and share fields in nxt_http_action_t.

This is a prerequisite for further introduction of openat2() features.
No functional changes.
diff 1564:73812b96c9c8 Thu Aug 13 00:45:00 UTC 2020 Valentin Bartenev <vbart@nginx.com> Fixed typo in return value check.

Found by Coverity (CID 361277).
diff 1474:9af10e099d09 Wed May 13 22:29:00 UTC 2020 Axel Duch <axel.duch@nginx.com> Router: decode uri and args.
diff 1326:09f9d521f71f Tue Dec 24 13:59:00 UTC 2019 Axel Duch <axel.duch@nginx.com> Router: introducing routing on listener address.

12345678910>>...19