proxy_bind with hostname from /etc/hosts possible?

2017-03-13 Thread larsg
Hi! is it possible to use an hostname from local /etc/hosts as proxy_bind value? In our current Background: We use nginx 1.8.1 as reverse proxy. In order to overcome the "Overcoming Ephemeral Port Exhaustion" problem (64k+ connections), we use proxy_bind to iterate over all loccally available IP

Re: coredump in 1.10.3

2017-03-13 Thread Alexey Ivanov
We have couple of these per week, I was blaming our third party modules, but seems like vanilla is also affected. > On Mar 13, 2017, at 7:22 AM, George . wrote: > > Yes, for me it looks like memory corruption and really hard to guess with > only bt. > We will run with

Re: coredump in 1.10.3

2017-03-13 Thread George .
Yes, for me it looks like memory corruption and really hard to guess with only bt. We will run with in-memory debug, but we have to wait till next core. I'll update you when we have more info. On Mon, Mar 13, 2017 at 3:55 PM, Valentin V. Bartenev wrote: > On Monday 13 March

Re: Reverse Proxy with 500k connections

2017-03-13 Thread larsg
Hi Guys, we solved the problem and I wanted to give you feedback about the solution. Finally it was an problem with our linux ip routes. After implementing source based policy routing this nginx configuration worked. Thank you for your support! Kind Regards Lars Summary of Solution:

Re: Conflict between form-input-nginx-module and nginx-auth-request-module?

2017-03-13 Thread Maxim Dounin
Hello! On Sat, Mar 11, 2017 at 05:13:38AM +, Yongtao You via nginx wrote: > To answer my own question, even though I still don't see why it has anything > to do with the auth-request module, but the reason requests are timing out is > because form-input module called

[njs] Miscellaneous non-functional changes in nxt_mem_cache_pool.

2017-03-13 Thread Igor Sysoev
details: http://hg.nginx.org/njs/rev/243c9c96511a branches: changeset: 313:243c9c96511a user: Igor Sysoev date: Mon Mar 13 16:32:40 2017 +0300 description: Miscellaneous non-functional changes in nxt_mem_cache_pool. diffstat: nxt/nxt_mem_cache_pool.c | 125

[njs] Using nxt_rbtree_destroy_next() iterator for nxt_mem_cache_pool

2017-03-13 Thread Igor Sysoev
details: http://hg.nginx.org/njs/rev/6bda82d5bd54 branches: changeset: 312:6bda82d5bd54 user: Igor Sysoev date: Sun Mar 12 22:40:13 2017 +0300 description: Using nxt_rbtree_destroy_next() iterator for nxt_mem_cache_pool destruction without rbtree rebalancing.

Re: coredump in 1.10.3

2017-03-13 Thread George .
it our build from nginx repository it a vanilla source On Mon, Mar 13, 2017 at 3:30 PM, Thomas Ward wrote: > Eww, that looks like a backport exploded. > > Do me a favor and file a bug in Ubuntu for this with `ubuntu-bug nginx` so > the retraced can trace the core dump. > >

Re: coredump in 1.10.3

2017-03-13 Thread George .
Hi Maxim Unfortunately I guess it will be hard to reproduce it quickly because it happened on production machine with heavy traffic. About the gdb warring - it't not a problem: causes because I've copied binary to folder were we've collected the core itself: -rwxr-xr-x 1 cdnuser cdnuser

Re: coredump in 1.10.3

2017-03-13 Thread Thomas Ward
Eww, that looks like a backport exploded. Do me a favor and file a bug in Ubuntu for this with `ubuntu-bug nginx` so the retraced can trace the core dump. Thomas *Sent from my iPhone. Please excuse any typos, as they are likely to happen by accident.* > On Mar 13, 2017, at 09:24, George

Re: coredump in 1.10.3

2017-03-13 Thread George .
Hi Valentin, Sorry, I've sent the mail incidentally before I complete it ;) ssl_proxy_cores # ./nginx -V nginx version: nginx/1.10.3 built by gcc 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.4) built with OpenSSL 1.0.2g 1 Mar 2016 (running with OpenSSL 1.0.2g-fips 1 Mar 2016) TLS SNI support

Re: coredump in 1.10.3

2017-03-13 Thread Maxim Dounin
Hello! On Mon, Mar 13, 2017 at 03:06:17PM +0200, George . wrote: > Hi all, > > We've found two different coredumps in production machines running 1.10.3 > handing ssl and http v2 traffic. > > Here is the backtrace of version compiles with -O0 -g -ggdb > > > > warning: exec file is newer

Re: OAuth Access token validation

2017-03-13 Thread B.R. via nginx
nginx can authenticate users based on subrequests to an identity server, yes, RTFM: https://nginx.org/en/docs/http/ngx_http_auth_request_module.html If you want to use JSON Web Tokens, only the non-FOSS version will be able to help you: https://nginx.org/en/docs/http/ngx_http_auth_jwt_module.html

OAuth Access token validation

2017-03-13 Thread nginxsantos
Hi, Does Nginx provide the support for verifying the access token in the incoming request from an Identity Server? Regards, Santos Posted at Nginx Forum: https://forum.nginx.org/read.php?2,272899,272899#msg-272899 ___ nginx mailing list