Skip to content

update nginx #2

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 136 commits into from
Aug 10, 2017
Merged

update nginx #2

merged 136 commits into from
Aug 10, 2017

Conversation

splitice
Copy link
Owner

No description provided.

agentzh and others added 30 commits September 24, 2016 12:30
…ve 8 bytes for every key-value pair on 64-bit systems, for example.
Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…ly call malloc_trim(1) every N requests when malloc_trim() is available.

By default, "lua_malloc_trim 1000" is configured.

This should fix the glibc oddity of holding too much freed memory
when it fails to use brk() to allocate memory in the data segment.
…, send_timeout, read_timeout).

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
… their own shm-based data structures for the Lua land usage (that is, to create custom siblings to lua_shared_dict).

thanks helloyi and doujiang for the patches.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
… test modes.

now we use MOCKEAGAIN_WRITE_TIMEOUT_PATTERN feature instead of sending mega bytes of data.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…ow only allowed in the http {} context.

Use of these session hooks in the server {} scope did not make much
sense since server name dispatch happens *after* ssl session resumption.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
… requests to avoid segfaults.

When setting a multi-value header during bad requests, the value isn't
added into the header's array. Despite failing to be set, the size of the
array is still incremented. Later, if Nginx attempts to iterate over the
array, a segfault will occur.

e21d9b5 established a pattern of silently ignoring the header being set.
I've moved the check for a bad request into `ngx_http_lua_set_input_header`
so that setting a header value is ignored for both types of headers.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…worker_by_lua* contexts.

thanks kraml for the report in #876.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…ct when lua_code_cache is off.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…iang Zhu. also removed the copyright notice in this module since it is already granted.
agentzh and others added 28 commits June 26, 2017 12:13
…c with msec precision through the decimal part) for each error log entry.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…rrent request with arbitrary HTTP response status codes via ngx.exit().

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
now it is now consistent with what Google Chrome's JavaScript API function
encodeURIComponent() does. See: https://tools.ietf.org/html/rfc2396.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…listen on the same port or unix domain socket file path *and* some of them are using ssl_certificate_by_lua* configurations while some are not. thanks petrovich-ua for the report and original patch in #1055.
…ons fail.

as discussed in #1098.

Signed-off-by: skyever <[email protected]>
Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
… in the "check leak" test mode since there is a known memory leak in this case.
…d. thanks Kyra Zimmer for the original patch.
…ssage "semaphore gc wait queue is not empty" might be logged.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…ccessible on the Lua land.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…ns after the downstream cosocket object is closed. thanks Dejiang Zhu for the report.
ngx.escape_uri should also escape RFC 3986 section 2.2 Reserved Characters.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
…1124"

Commit f170505 breaks the compatibility
with RFC 3986. Here is two reasons:
1. Quote from RFC 3986 Section 2.2:
> A subset of the reserved characters (gen-delims) is used as
delimiters of the generic URI components described in Section 3

Note that RFC 3986 says 'a subset of the reserved characters
(gen-delims)', not all the reserved characters. The characters escaped
in that commit are 'sub-delims'. They are not required to be escaped
according to Section 2.2.

2. Refer to RFC 3986 "Appendix A.  Collected ABNF for URI", sub-delims
could be used as part of query and other components. This use case shows
that sub-delims are valid in some component of URI. Therefore, it would
be better if we don't escape them for URI component.

Signed-off-by: Yichun Zhang (agentzh) <[email protected]>
@splitice splitice merged commit cdd2ae9 into splitice:master Aug 10, 2017
splitice pushed a commit that referenced this pull request Apr 1, 2022
==openresty==70603==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x621000001500,0x621000002181) and [0x62100000187f, 0x621000002500) overlap
    #0 0x7f3db1899ffe  (/lib64/libasan.so.5+0x99ffe)
    #1 0x9da926  (/usr/local/openresty-debug/nginx/sbin/nginx+0x9da926)
    #2 0x9dd1a1  (/usr/local/openresty-debug/nginx/sbin/nginx+0x9dd1a1)
    openresty#3 0x4c89c6  (/usr/local/openresty-debug/nginx/sbin/nginx+0x4c89c6)
    openresty#4 0x5d1e4e  (/usr/local/openresty-debug/nginx/sbin/nginx+0x5d1e4e)
    openresty#5 0x4c89c6  (/usr/local/openresty-debug/nginx/sbin/nginx+0x4c89c6)
    openresty#6 0x5b8583  (/usr/local/openresty-debug/nginx/sbin/nginx+0x5b8583)
    openresty#7 0x4c89c6  (/usr/local/openresty-debug/nginx/sbin/nginx+0x4c89c6)
    openresty#8 0x4b4419  (/usr/local/openresty-debug/nginx/sbin/nginx+0x4b4419)
    openresty#9 0x427f16  (/usr/local/openresty-debug/nginx/sbin/nginx+0x427f16)
    openresty#10 0x7f3daff27554  (/lib64/libc.so.6+0x22554)
    openresty#11 0x42d537  (/usr/local/openresty-debug/nginx/sbin/nginx+0x42d537)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.