[njs] Added code of conduct.

2024-05-28 Thread noreply
details: https://hg.nginx.org/njs/rev/773c816a7360 branches: changeset: 2343:773c816a7360 user: Dmitry Volyntsev date: Tue May 28 18:00:10 2024 -0700 description: Added code of conduct. diffstat: CODE_OF_CONDUCT.md | 79 ++ 1

[njs] Fixed RegExp.prototype[@@replace]().

2024-05-28 Thread noreply
details: https://hg.nginx.org/njs/rev/cb1baa3906f8 branches: changeset: 2342:cb1baa3906f8 user: Dmitry Volyntsev date: Tue May 28 15:49:39 2024 -0700 description: Fixed RegExp.prototype[@@replace](). With replacement containing "$'", "$\`" and Unicode characters. The similar issue

[njs] Added CI based on GitHub Actions.

2024-05-28 Thread noreply
details: https://hg.nginx.org/njs/rev/29ffafd582a7 branches: changeset: 2341:29ffafd582a7 user: Konstantin Pavlov date: Fri Apr 05 13:27:37 2024 -0700 description: Added CI based on GitHub Actions. diffstat: .github/workflows/check-pr.yml | 86

[njs] Test262: improved skipping of tests.

2024-05-28 Thread noreply
details: https://hg.nginx.org/njs/rev/881a1c4cd2fb branches: changeset: 2340:881a1c4cd2fb user: Dmitry Volyntsev date: Tue May 28 14:16:14 2024 -0700 description: Test262: improved skipping of tests. The skipped tests (which are expected to fail) are not executed in order to make

Re: [PATCH 1 of 2] Rewritten host header validation to follow generic parsing rules

2024-05-28 Thread J Carter
Hello Sergey, On Mon, 27 May 2024 14:21:43 +0400 Sergey Kandaurov wrote: > # HG changeset patch > # User Sergey Kandaurov > # Date 1716805272 -14400 > # Mon May 27 14:21:12 2024 +0400 > # Node ID e82a7318ed48fdbc1273771bc96357e9dc232975 > # Parent f58b6f6362387eeace46043a6fc0bceb56a6786a

[nginx] Upstream: variables support in proxy_limit_rate and friends.

2024-05-27 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/2e9588d65dd9 branches: changeset: 9249:2e9588d65dd9 user: J Carter date: Sat Nov 25 21:57:09 2023 + description: Upstream: variables support in proxy_limit_rate and friends. diffstat: src/http/modules/ngx_http_fastcgi_module.c | 8

Re: [PATCH] Proxy: altered limit_rate to support variables

2024-05-27 Thread Roman Arutyunyan
Hi, On Tue, Dec 26, 2023 at 07:07:37PM +0400, Sergey Kandaurov wrote: > > > On 26 Nov 2023, at 03:37, J Carter wrote: > > > > # HG changeset patch > > # User J Carter > > # Date 1700949429 0 > > # Sat Nov 25 21:57:09 2023 + > > # Node ID 98306e705015758eab0a05103d90e6bdb1da2819 > > #

[nginx] Optimized chain link usage (ticket #2614).

2024-05-27 Thread Roman Arutyunyan
details: https://hg.nginx.org/nginx/rev/f7d53c7f7014 branches: changeset: 9248:f7d53c7f7014 user: Roman Arutyunyan date: Thu May 23 19:15:38 2024 +0400 description: Optimized chain link usage (ticket #2614). Previously chain links could sometimes be dropped instead of being reused,

Re: I think I found a fix for the memory leak issue on gRPC module

2024-05-27 Thread Sergey Kandaurov
On Mon, May 27, 2024 at 02:06:58PM +0400, Roman Arutyunyan wrote: > Hi, > # HG changeset patch > # User Roman Arutyunyan > # Date 1716477338 -14400 > # Thu May 23 19:15:38 2024 +0400 > # Node ID f7d53c7f70140b1cd1eaf51ce4346a873692f879 > # Parent f58b6f6362387eeace46043a6fc0bceb56a6786a >

[PATCH 2 of 2] Stream: do not reallocate a parsed SNI host

2024-05-27 Thread Sergey Kandaurov
# HG changeset patch # User Sergey Kandaurov # Date 1716805288 -14400 # Mon May 27 14:21:28 2024 +0400 # Node ID 88fa18a0f05f7dead38a127bb24e5cf861f3d66d # Parent e82a7318ed48fdbc1273771bc96357e9dc232975 Stream: do not reallocate a parsed SNI host. Unlike in http SNI callback, it doesn't

[PATCH 1 of 2] Rewritten host header validation to follow generic parsing rules

2024-05-27 Thread Sergey Kandaurov
# HG changeset patch # User Sergey Kandaurov # Date 1716805272 -14400 # Mon May 27 14:21:12 2024 +0400 # Node ID e82a7318ed48fdbc1273771bc96357e9dc232975 # Parent f58b6f6362387eeace46043a6fc0bceb56a6786a Rewritten host header validation to follow generic parsing rules. It now uses a

Re: Inquiry about QUIC Congestion Control Algorithms Development

2024-05-27 Thread Roman Arutyunyan
Hi, > Hi, > > I've been following the development of the QUIC protocol within Nginx, and I > am particularly interested in the implementation of advanced congestion > control algorithms such as BBR and CUBIC. > > Considering the impact that these algorithms can have on network performance, >

Re: I think I found a fix for the memory leak issue on gRPC module

2024-05-27 Thread Sergey Kandaurov
On Wed, May 22, 2024 at 06:14:26PM +0400, Roman Arutyunyan wrote: > Hi, > > Indeed there's a problem there. We have similar problems in other places as > well. Attached is a patch that fixes all I could find. > > I did some testing for the sub_filter with the following config. Small >

Re: I think I found a fix for the memory leak issue on gRPC module

2024-05-27 Thread Roman Arutyunyan
Hi, Following an internal discussion with Sergey, here's an updated version of the patch. On Thu, May 23, 2024 at 01:42:24PM +0400, Roman Arutyunyan wrote: > Hi, > > On Wed, May 22, 2024 at 06:14:26PM +0400, Roman Arutyunyan wrote: > > Hi, > > > > Indeed there's a problem there. We have

Re: [PATCH] Memcached: memcached_flags_set directive

2024-05-26 Thread J Carter
Fixed a typo in patch description, and overlooked buffer overflow... # HG changeset patch # User J Carter # Date 1716779649 -3600 # Mon May 27 04:14:09 2024 +0100 # Node ID e2ebeb2b05062369626e2de1ba753f318f821d9c # Parent f58b6f6362387eeace46043a6fc0bceb56a6786a Memcached:

[PATCH] Memcached: memcached_flags_set directive

2024-05-26 Thread J Carter
# HG changeset patch # User J Carter # Date 1716779649 -3600 # Mon May 27 04:14:09 2024 +0100 # Node ID e90301dd1516b6dfa5b2b0beec05cfe2b567ea1e # Parent f58b6f6362387eeace46043a6fc0bceb56a6786a Memcached: memcached_flags_set directive. This directive creates a variable that returns the

Re: [PATCH] Tests: ssl_engine_keys.t improved

2024-05-26 Thread Sergey Kandaurov
[ extraneous "Cc: PATCH, ssl_engine_keys.t" removed ] On Tue, May 07, 2024 at 11:32:45PM +0300, o.de...@wbsrv.ru wrote: > # HG changeset patch > # User Oksana Deeva > # Date 1715111756 -10800 > # Tue May 07 22:55:56 2024 +0300 > # Node ID e5014b423e1391dd1078d064361a0b28d1a488d0 > # Parent

Inquiry about QUIC Congestion Control Algorithms Development

2024-05-26 Thread 李焯坚
Hi, I've been following the development of the QUIC protocol within Nginx, and I am particularly interested in the implementation of advanced congestion control algorithms such as BBR and CUBIC. Considering the impact that these algorithms can have on network performance, especially in

[njs] Fetch: fixed heap-buffer-overflow in Headers.get().

2024-05-24 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/f75f670905f0 branches: changeset: 2339:f75f670905f0 user: Dmitry Volyntsev date: Thu May 23 22:50:34 2024 -0700 description: Fetch: fixed heap-buffer-overflow in Headers.get(). Previously, when more than one header with the same name added to a

[njs] Added fast path in njs_chb_utf8_length() for ASCII input.

2024-05-24 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/437fc09db765 branches: changeset: 2338:437fc09db765 user: Dmitry Volyntsev date: Thu May 23 22:50:19 2024 -0700 description: Added fast path in njs_chb_utf8_length() for ASCII input. diffstat: src/njs_chb.h| 19

[njs] Fixed retval handling after an exception.

2024-05-23 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/585756e8cafe branches: changeset: 2337:585756e8cafe user: Dmitry Volyntsev date: Wed May 22 23:08:15 2024 -0700 description: Fixed retval handling after an exception. Previously, some functions set a retval too early. If this happened before

Re: I think I found a fix for the memory leak issue on gRPC module

2024-05-23 Thread Roman Arutyunyan
Hi, On Wed, May 22, 2024 at 06:14:26PM +0400, Roman Arutyunyan wrote: > Hi, > > Indeed there's a problem there. We have similar problems in other places as > well. Attached is a patch that fixes all I could find. > > I did some testing for the sub_filter with the following config. Small >

[njs] Improved String.prototype.replaceAll() for readability.

2024-05-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/077a5b2f30d8 branches: changeset: 2336:077a5b2f30d8 user: Dmitry Volyntsev date: Wed May 22 17:26:16 2024 -0700 description: Improved String.prototype.replaceAll() for readability. diffstat: src/njs_string.c | 44

[njs] Fixed String.prototype.replaceAll() with zero length argument.

2024-05-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/e496851c0fe7 branches: changeset: 2335:e496851c0fe7 user: Dmitry Volyntsev date: Wed May 22 17:26:08 2024 -0700 description: Fixed String.prototype.replaceAll() with zero length argument. This fixes #712 issue on Github. diffstat:

[njs] Aligned StringIndexOf() implementation with the spec.

2024-05-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/bc09b884022d branches: changeset: 2334:bc09b884022d user: Dmitry Volyntsev date: Tue May 21 23:41:10 2024 -0700 description: Aligned StringIndexOf() implementation with the spec. When searchValue is empty the function should return early when

[njs] Removed code for byte strings in built-in functions.

2024-05-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/2d098d2a1c85 branches: changeset: 2333:2d098d2a1c85 user: Dmitry Volyntsev date: Tue May 21 23:41:10 2024 -0700 description: Removed code for byte strings in built-in functions. diffstat: src/njs_array.c | 52

[njs] Avoid creating byte strings explicitly.

2024-05-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/27da19960b72 branches: changeset: 2332:27da19960b72 user: Dmitry Volyntsev date: Tue May 21 23:38:19 2024 -0700 description: Avoid creating byte strings explicitly. Previously, calls like njs_string_new(,,,0) produced byte strings by explicitly

Re: I think I found a fix for the memory leak issue on gRPC module

2024-05-22 Thread Roman Arutyunyan
Hi, Indeed there's a problem there. We have similar problems in other places as well. Attached is a patch that fixes all I could find. I did some testing for the sub_filter with the following config. Small buffers exaggerate the problem. http { server { listen 8000;

[nginx] Configure: fixed building libatomic test.

2024-05-21 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/f58b6f636238 branches: changeset: 9247:f58b6f636238 user: Edgar Bonet date: Thu May 16 11:15:10 2024 +0200 description: Configure: fixed building libatomic test. Using "long *" instead of "AO_t *" leads either to -Wincompatible-pointer-types

[njs] HTTP: fixed handling of 0 length request body.

2024-05-20 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/286dbef3c0b2 branches: changeset: 2331:286dbef3c0b2 user: Dmitry Volyntsev date: Mon May 20 16:44:10 2024 -0700 description: HTTP: fixed handling of 0 length request body. Previously, when r.requestBuffer was passed as a body argument to

Re: [PATCH] Fix compile error in configure script

2024-05-20 Thread Edgar Bonet
Hello! On 2024-05-20, Sergey Kandaurov wrote: > Concerning type compatibility, C11 gives a definition on what types > are compatible. [...] Thank-you for sharing these findings! > I like the patch, but would like to adjust the commit log: > there some styles issues and over-quoting. Also,

Re: [PATCH] Fix compile error in configure script

2024-05-20 Thread Sergey Kandaurov
On Sat, May 18, 2024 at 02:43:52PM +0200, Edgar Bonet wrote: > Hello! > > Yesterday, I wrote: > > My understanding is that the compiler considers 'int' and 'long' to be > > incompatible types [... On ILP32,] 'size_t' being an 'unsigned int', > > it is incompatible with 'long'. > > > > On LP64

Re: [PATCH] Fix compile error in configure script

2024-05-18 Thread Edgar Bonet
Hello! Yesterday, I wrote: > My understanding is that the compiler considers 'int' and 'long' to be > incompatible types [... On ILP32,] 'size_t' being an 'unsigned int', > it is incompatible with 'long'. > > On LP64 (your typical 64-bit Linux/Mac), 'size_t' is a 'unsigned > long', which is

[njs] Removing njs_string_set() from builtin functions.

2024-05-17 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/8851a78723dc branches: changeset: 2330:8851a78723dc user: Dmitry Volyntsev date: Fri May 17 21:54:50 2024 -0700 description: Removing njs_string_set() from builtin functions. This is the last function that produced byte strings. diffstat:

[njs] Change: removed byte strings API.

2024-05-17 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/4e0553f7ea68 branches: changeset: 2329:4e0553f7ea68 user: Dmitry Volyntsev date: Fri May 17 21:54:50 2024 -0700 description: Change: removed byte strings API. These functions are unsafe because they produce byte strings. Byte strings may not

[njs] Optimized string creation with ASCII input.

2024-05-17 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/dec46ad52e9a branches: changeset: 2328:dec46ad52e9a user: Dmitry Volyntsev date: Fri May 17 21:54:49 2024 -0700 description: Optimized string creation with ASCII input. diffstat: src/njs_string.c | 12 1 files changed, 12

[njs] Added string creation benchmark.

2024-05-17 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/f474755a4dce branches: changeset: 2327:f474755a4dce user: Dmitry Volyntsev date: Fri May 17 18:36:12 2024 -0700 description: Added string creation benchmark. diffstat: src/test/njs_benchmark.c | 159

Re: [PATCH] Fix compile error in configure script

2024-05-17 Thread Edgar Bonet
Hello! Sergey Kandaurov wrote: > > objs/autotest.c:9:48: error: passing argument 1 > > of 'AO_compare_and_swap' from incompatible pointer type > > [-Wincompatible-pointer-types] > > Where did you try to build? I experienced this when building for arm and i686, both cross-compiled from x86_64.

Re: [PATCH] Fix compile error in configure script

2024-05-17 Thread Sergey Kandaurov
> On 16 May 2024, at 13:25, Edgar Bonet wrote: > > # HG changeset patch > # User Edgar Bonet > # Date 1715850910 -7200 > # Thu May 16 11:15:10 2024 +0200 > # Node ID c2c3b0d74b1a7d3f967421c72760b5c573afcd81 > # Parent 89093b003fcb54c7f8dc66042f17bc4dea4e7709 > Fix compile error in

[PATCH] Fix compile error in configure script

2024-05-16 Thread Edgar Bonet
# HG changeset patch # User Edgar Bonet # Date 1715850910 -7200 # Thu May 16 11:15:10 2024 +0200 # Node ID c2c3b0d74b1a7d3f967421c72760b5c573afcd81 # Parent 89093b003fcb54c7f8dc66042f17bc4dea4e7709 Fix compile error in configure script Building with GCC 14 fails at the configure step with:

Re: limiting number of HTTP request headers

2024-05-16 Thread Liu Dongmiao
Hi max, If you use njs, then you can use `r.headersIn` or `r.rawHeadersIn` https://nginx.org/en/docs/njs/reference.html#r_headers_in https://nginx.org/en/docs/njs/reference.html#r_raw_headers_in Regards, Liu Maksim Yevmenkin 于2024年5月16日周四 08:28写道: > > Hello! > > Could the community share their

limiting number of HTTP request headers

2024-05-15 Thread Maksim Yevmenkin
Hello! Could the community share their thoughts on introducing a directive to cap the number of HTTP request headers? While we currently have the ability to limit client HTTP request buffer size, having more specific control over the number of headers could be advantageous. Thanks, max

Discussion: websocket over http2 / http3?

2024-05-13 Thread Liu Dongmiao
Hi, websocket over http2 is defined in RFC8441, chrome and firefox support it. https://chromestatus.com/feature/6251293127475200 websocket over http3 is defined in RFC9220, neither of chrome nor firefox support it. https://chromestatus.com/feature/5080537855688704 Is there any plan to support

Re: [patch] reject http header without colon (:) in the header name

2024-05-13 Thread Ben Kallus
> nginx is about as popular as GWS, same reasoning might be considered. What I'm saying is exceptional about GWS is not its popularity. Of course, Nginx (and Apache) are similarly popular. I'm arguing that because GWS is by design a single-purpose web server that serves the interest of a single

Re: [patch] reject http header without colon (:) in the header name

2024-05-13 Thread Илья Шипицин
nginx is about as popular as GWS, same reasoning might be considered. btw, do you suggest to 1) introduce new behaviour by some setting (default is unchanged) 2) change default behaviour ? and I'm quite curious why do you want to change current behaviour пн, 13 мая 2024 г. в 16:30, Ben Kallus

Re: [patch] reject http header without colon (:) in the header name

2024-05-13 Thread Ben Kallus
Okay; I should have been more specific. I meant that nginx is unique among *general-purpose* web servers. GWS is something of an special case; it also accepts requests with no Host header, and doesn't validate the version string (e.g., HTTP/1.9 is accepted). Google has opted into these

Re: [patch] reject http header without colon (:) in the header name

2024-05-13 Thread Roman Arutyunyan
Hi, On Tue, May 07, 2024 at 05:58:34PM -0400, Ben Kallus wrote: > Nginx is the only widely-used HTTP server that ignores invalid > field-lines. This behavior makes it trivial to fingerprint. A simple test shows that google server gws does the same. > I never reported this in the past because I

[njs] Configure: fixed QuickJS detection with --with-quickjs flag.

2024-05-09 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/02369792b032 branches: changeset: 2326:02369792b032 user: Dmitry Volyntsev date: Thu May 09 12:58:57 2024 -0700 description: Configure: fixed QuickJS detection with --with-quickjs flag. diffstat: auto/quickjs | 2 +- 1 files changed, 1

Re: [patch] reject http header without colon (:) in the header name

2024-05-07 Thread Ben Kallus
Nginx is the only widely-used HTTP server that ignores invalid field-lines. This behavior makes it trivial to fingerprint. I never reported this in the past because I assumed Maxim wouldn't care about that sort of thing. Now that he's out of the picture, maybe others will see things differently?

[patch] reject http header without colon (:) in the header name

2024-05-07 Thread Maksim Yevmenkin
hello, it appears that nginx would happily accept http header without colon (:) in the header name. the patch below tries to address this. thanks max == --- a/ports/netflix/nginx/files/nginx/src/http/ngx_http_parse.c +++ b/ports/netflix/nginx/files/nginx/src/http/ngx_http_parse.c @@ -941,14

[PATCH] Tests: ssl_engine_keys.t improved

2024-05-07 Thread o . deeva
# HG changeset patch # User Oksana Deeva # Date 1715111756 -10800 # Tue May 07 22:55:56 2024 +0300 # Node ID e5014b423e1391dd1078d064361a0b28d1a488d0 # Parent 2a607a31f583add7adfa1ac434a3f793d327ca6b Tests: ssl_engine_keys.t improved diff -r 2a607a31f583 -r e5014b423e13 ssl_engine_keys.t

Re: [PATCH]HTTP/2 connection not properly closing during graceful shutdown

2024-05-05 Thread kasei
Hello, Thanks for your confirmation and explanations. The following is a modified patch. In my test it would send GOAWAY(on stream id 0), same as the previous one, but call ngx_http_v2_finalize_connection instead of set c->close. # HG changeset patch # User Kasei Wang # Date 1714965008 -28800

Re: [PATCH] Stream pass: disabled passing from or to udp

2024-05-03 Thread Sergey Kandaurov
> On 3 May 2024, at 20:30, Roman Arutyunyan wrote: > > Hi, > > On Fri, May 03, 2024 at 08:24:16PM +0400, Sergey Kandaurov wrote: >> >>> On 26 Apr 2024, at 15:15, Roman Arutyunyan wrote: >>> >>> # HG changeset patch >>> # User Roman Arutyunyan >>> # Date 1714057362 -14400 >>> # Thu Apr

[nginx] Stream pass: disabled passing from or to udp.

2024-05-03 Thread Roman Arutyunyan
details: https://hg.nginx.org/nginx/rev/89093b003fcb branches: changeset: 9246:89093b003fcb user: Roman Arutyunyan date: Fri May 03 20:26:05 2024 +0400 description: Stream pass: disabled passing from or to udp. Passing from udp was not possible for the most part due to preread

Re: [PATCH] Stream pass: disabled passing from or to udp

2024-05-03 Thread Roman Arutyunyan
Hi, On Fri, May 03, 2024 at 08:24:16PM +0400, Sergey Kandaurov wrote: > > > On 26 Apr 2024, at 15:15, Roman Arutyunyan wrote: > > > > # HG changeset patch > > # User Roman Arutyunyan > > # Date 1714057362 -14400 > > # Thu Apr 25 19:02:42 2024 +0400 > > # Branch stable-1.26 > > wrong

[nginx] SSL: fixed possible configuration overwrite loading "engine:" keys.

2024-05-03 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/c4792b0f1976 branches: changeset: 9245:c4792b0f1976 user: Sergey Kandaurov date: Fri May 03 20:29:01 2024 +0400 description: SSL: fixed possible configuration overwrite loading "engine:" keys. When loading certificate keys via

[nginx] HTTP/3: fixed handling of malformed request body length.

2024-05-03 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/690f46d3bc1f branches: changeset: 9244:690f46d3bc1f user: Sergey Kandaurov date: Fri May 03 20:28:32 2024 +0400 description: HTTP/3: fixed handling of malformed request body length. Previously, a request body larger than declared in

[nginx] Version bump.

2024-05-03 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/ff0312de0112 branches: changeset: 9243:ff0312de0112 user: Sergey Kandaurov date: Fri May 03 20:28:22 2024 +0400 description: Version bump. diffstat: src/core/nginx.h | 4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diffs (14

Re: [PATCH] Stream pass: disabled passing from or to udp

2024-05-03 Thread Sergey Kandaurov
> On 26 Apr 2024, at 15:15, Roman Arutyunyan wrote: > > # HG changeset patch > # User Roman Arutyunyan > # Date 1714057362 -14400 > # Thu Apr 25 19:02:42 2024 +0400 > # Branch stable-1.26 wrong branch > # Node ID a60cd9c99efcc1204e6d395104beb39883308c93 > # Parent

Re: [PATCH] SSL: fixed possible configuration overwrite loading "engine:" keys

2024-05-03 Thread Roman Arutyunyan
Hi, On Fri, May 03, 2024 at 04:28:17AM +0400, Sergey Kandaurov wrote: > # HG changeset patch > # User Sergey Kandaurov > # Date 1714670294 -14400 > # Thu May 02 21:18:14 2024 +0400 > # Node ID e00aeabf2b29b891891fd150a01c82b0763c57c0 > # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 >

[PATCH] SSL: fixed possible configuration overwrite loading "engine:" keys

2024-05-02 Thread Sergey Kandaurov
# HG changeset patch # User Sergey Kandaurov # Date 1714670294 -14400 # Thu May 02 21:18:14 2024 +0400 # Node ID e00aeabf2b29b891891fd150a01c82b0763c57c0 # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 SSL: fixed possible configuration overwrite loading "engine:" keys. When loading

[PATCH] Configure: increase the default optimization level to -O2

2024-05-02 Thread Piotr Sikora via nginx-devel
# HG changeset patch # User Piotr Sikora # Date 1714589900 0 # Wed May 01 18:58:20 2024 + # Node ID 429191aad8d3ab8f70d40dfdd7684a256357bc48 # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 Configure: increase the default optimization level to -O2. Signed-off-by: Piotr Sikora diff

[PATCH] Configure: postpone running the test binary

2024-05-02 Thread Piotr Sikora via nginx-devel
# HG changeset patch # User Piotr Sikora # Date 1714589827 0 # Wed May 01 18:57:07 2024 + # Node ID 2d5e754e3a4e7a59eaf7f653ad4fd5346f53eab4 # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 Configure: postpone running the test binary. Previously, the ./configure script would attempt

[PATCH] Configure: build C++ test module using C++ compiler

2024-05-02 Thread Piotr Sikora via nginx-devel
# HG changeset patch # User Piotr Sikora # Date 1714589815 0 # Wed May 01 18:56:55 2024 + # Node ID 787e1adea9aa7f681884657f119e864af0be3e0d # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 Configure: build C++ test module using C++ compiler. This fixes build when using C compiler

[PATCH] Configure: fix build on Windows using non-MSVC compilers

2024-05-02 Thread Piotr Sikora via nginx-devel
# HG changeset patch # User Piotr Sikora # Date 1714589717 0 # Wed May 01 18:55:17 2024 + # Node ID 43b04ece77b7132db868122a20c99c8ba89adfb5 # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 Configure: fix build on Windows using non-MSVC compilers. Previously, kernel32 and user32

[PATCH] Configure: always test with provided C compiler options

2024-05-02 Thread Piotr Sikora via nginx-devel
# HG changeset patch # User Piotr Sikora # Date 1714589692 0 # Wed May 01 18:54:52 2024 + # Node ID df39b5d3c3a0c670f3d94e623351b6c659f5be84 # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 Configure: always test with provided C compiler options. Previously, build in auto/include

[PATCH] Configure: fix warnings in a few feature tests

2024-05-02 Thread Piotr Sikora via nginx-devel
# HG changeset patch # User Piotr Sikora # Date 1714589586 0 # Wed May 01 18:53:06 2024 + # Node ID c083cd8ead811426c6f7bd7c4ab58a413d80be52 # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 Configure: fix warnings in a few feature tests. Signed-off-by: Piotr Sikora diff -r

[PATCH] Configure: test --with-cc-opt options

2024-05-02 Thread Piotr Sikora via nginx-devel
# HG changeset patch # User Piotr Sikora # Date 1714589524 0 # Wed May 01 18:52:04 2024 + # Node ID 0d5498e86bf8a7f119ed83dbc0789be37d728334 # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 Configure: test --with-cc-opt options. Previously, invalid C compiler options would fail with

[PATCH] QUIC: fix build against musl-libc when using Clang

2024-05-02 Thread Piotr Sikora via nginx-devel
# HG changeset patch # User Piotr Sikora # Date 1714589495 0 # Wed May 01 18:51:35 2024 + # Node ID 962cddbaecf02b9c213dca492a74b23924b8f24c # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 QUIC: fix build against musl-libc when using Clang. Signed-off-by: Piotr Sikora diff -r

[njs] QuickJS: added zlib module.

2024-05-01 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/f146b5dc21cc branches: changeset: 2325:f146b5dc21cc user: Dmitry Volyntsev date: Wed May 01 17:31:01 2024 -0700 description: QuickJS: added zlib module. diffstat: auto/init | 1 + auto/make |42 +-

Re: [PATCH]HTTP/2 connection not properly closing during graceful shutdown

2024-04-30 Thread Roman Arutyunyan
Hi, On Tue, Apr 23, 2024 at 06:02:08PM +0800, Kasei Wang wrote: > Hello, > > I found that there is a slight probability of HTTP/2 connections not > properly closing during graceful shutdown, leading to worker processes > in shutting down state remaining stuck for an extended period. After >

[njs] Tests: fixed typo in stream_js_dup_set.t introduced in be271e8d0b3b.

2024-04-29 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/18fc657411ca branches: changeset: 2324:18fc657411ca user: Dmitry Volyntsev date: Fri Apr 26 16:48:19 2024 -0700 description: Tests: fixed typo in stream_js_dup_set.t introduced in be271e8d0b3b. Previously, with typo the test was always skipped.

[njs] Fetch: fixed request Host header when the port is non-standard.

2024-04-29 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/7456fe29ac0a branches: changeset: 2323:7456fe29ac0a user: Dmitry Volyntsev date: Fri Apr 26 16:48:17 2024 -0700 description: Fetch: fixed request Host header when the port is non-standard. This fixes #707 issue on Github. diffstat:

[njs] Allowing to use custom allocator in njs_chb_t.

2024-04-29 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/622387b5b612 branches: changeset: 2322:622387b5b612 user: Dmitry Volyntsev date: Fri Apr 26 16:27:52 2024 -0700 description: Allowing to use custom allocator in njs_chb_t. diffstat: external/njs_query_string_module.c | 6 +++---

Re: [PATCH] proxy_cache_lock: Make lock timer configurable

2024-04-27 Thread Roy Teeuwen
Any update on getting this PR merged? I'm also facing the same issue > On 21 Mar 2024, at 08:30, Nejc Lovrencic wrote: > > # HG changeset patch > # User Nejc Lovrencic > # Date 1711005111 -3600 > # Thu Mar 21 08:11:51 2024 +0100 > # Node ID 8d38e6642e82bb219bb5b586f1dcca5222a036e8 > #

[PATCH] Stream pass: disabled passing from or to udp

2024-04-26 Thread Roman Arutyunyan
# HG changeset patch # User Roman Arutyunyan # Date 1714057362 -14400 # Thu Apr 25 19:02:42 2024 +0400 # Branch stable-1.26 # Node ID a60cd9c99efcc1204e6d395104beb39883308c93 # Parent cdf74ac25b47ec928b53aa82ccc1c3d288a2f81c Stream pass: disabled passing from or to udp. Passing from udp

Re: Leaky NGINX Plugin Advice

2024-04-25 Thread Roman Arutyunyan
Hello, As this is a development-related question, a better list for it is nginx-devel@nginx.org . > On 23 Apr 2024, at 1:40 PM, Alex Hussein-Kershaw (HE/HIM) via nginx > wrote: > > Hi Folks, > > I've inherited an nginx plugin, written against 0.7.69 that has

Re: [PROPOSAL]: Extend list of Stream phases

2024-04-25 Thread Roman Arutyunyan
Hi Andrey, > On 11 Apr 2024, at 3:27 AM, Andrey Kulikov wrote: > > Hello, > > Consider the following test-case: > I, as admin, would like to limit access to certain resources, based on Client > TLS certificate content, fields, etc... > > Solution for HTTP: Easy! > There is

[nginx] release-1.26.0 tag

2024-04-23 Thread Roman Arutyunyan
details: https://hg.nginx.org/nginx/rev/cdf74ac25b47 branches: stable-1.26 changeset: 9242:cdf74ac25b47 user: Roman Arutyunyan date: Tue Apr 23 18:04:32 2024 +0400 description: release-1.26.0 tag diffstat: .hgtags | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) diffs (8

[nginx] nginx-1.26.0-RELEASE

2024-04-23 Thread Roman Arutyunyan
details: https://hg.nginx.org/nginx/rev/a58202a8c41b branches: stable-1.26 changeset: 9241:a58202a8c41b user: Roman Arutyunyan date: Tue Apr 23 17:40:08 2024 +0400 description: nginx-1.26.0-RELEASE diffstat: docs/xml/nginx/changes.xml | 14 ++ 1 files changed, 14

[nginx] Stable branch.

2024-04-23 Thread Roman Arutyunyan
details: https://hg.nginx.org/nginx/rev/52f427a4c97e branches: stable-1.26 changeset: 9240:52f427a4c97e user: Roman Arutyunyan date: Tue Apr 23 17:31:41 2024 +0400 description: Stable branch. diffstat: src/core/nginx.h | 4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-)

Re: [PATCH] HTTP/3: fixed handling of malformed request body length

2024-04-23 Thread Roman Arutyunyan
Hi, On Tue, Apr 23, 2024 at 05:14:54PM +0400, Sergey Kandaurov wrote: > > > On 22 Apr 2024, at 19:00, Sergey Kandaurov wrote: > > > > # HG changeset patch > > # User Sergey Kandaurov > > # Date 1713798017 -14400 > > # Mon Apr 22 19:00:17 2024 +0400 > > # Node ID

Re: [PATCH] HTTP/3: fixed handling of malformed request body length

2024-04-23 Thread Sergey Kandaurov
> On 22 Apr 2024, at 19:00, Sergey Kandaurov wrote: > > # HG changeset patch > # User Sergey Kandaurov > # Date 1713798017 -14400 > # Mon Apr 22 19:00:17 2024 +0400 > # Node ID 754e32eaca24ad751e2a94790e1afd55202c1aba > # Parent 9f84f2e49c624e82e054a2dcd48723119c44029c > HTTP/3: fixed

[PATCH]HTTP/2 connection not properly closing during graceful shutdown

2024-04-23 Thread Kasei Wang
Hello, I found that there is a slight probability of HTTP/2 connections not properly closing during graceful shutdown, leading to worker processes in shutting down state remaining stuck for an extended period. After investigation, the issue appears to stem from the following: 1. worker processes

[njs] Configure: fixed default path QuickJS discovery typo.

2024-04-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/a97a9f3b3cea branches: changeset: 2321:a97a9f3b3cea user: Dmitry Volyntsev date: Mon Apr 22 18:59:03 2024 -0700 description: Configure: fixed default path QuickJS discovery typo. The issue was introduced in 1c8b6b9bc06c (0.8.4). This closes

[njs] Zlib: improved tests with zlib-ng.

2024-04-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/0cb259f67ade branches: changeset: 2320:0cb259f67ade user: Dmitry Volyntsev date: Mon Apr 22 17:52:14 2024 -0700 description: Zlib: improved tests with zlib-ng. This fixes #704 issue on Github. diffstat: src/test/njs_unit_test.c | 13

[njs] Zlib: fixed inflate().

2024-04-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/d640adf691a7 branches: changeset: 2319:d640adf691a7 user: Dmitry Volyntsev date: Mon Apr 22 17:52:06 2024 -0700 description: Zlib: fixed inflate(). Previously, the function might fail to return the last part of the compressed content. This

[njs] Modules: improved checking for duplicate js_set variables.

2024-04-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/be271e8d0b3b branches: changeset: 2318:be271e8d0b3b user: Dmitry Volyntsev date: Mon Apr 22 17:51:45 2024 -0700 description: Modules: improved checking for duplicate js_set variables. Since 6fb1aca4eeaf (0.8.4) the identical js_set variables

[njs] Version bump.

2024-04-22 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/b73f99c7bc54 branches: changeset: 2317:b73f99c7bc54 user: Dmitry Volyntsev date: Mon Apr 22 17:51:24 2024 -0700 description: Version bump. diffstat: src/njs.h | 4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diffs (14 lines):

[PATCH] HTTP/3: fixed handling of malformed request body length

2024-04-22 Thread Sergey Kandaurov
# HG changeset patch # User Sergey Kandaurov # Date 1713798017 -14400 # Mon Apr 22 19:00:17 2024 +0400 # Node ID 754e32eaca24ad751e2a94790e1afd55202c1aba # Parent 9f84f2e49c624e82e054a2dcd48723119c44029c HTTP/3: fixed handling of malformed request body length. Previously, a request body

[PATCH 2 of 4] HTTP: added MPTCP support

2024-04-18 Thread Dourov Maxime
# HG changeset patch # User maxime # Date 1713355399 -7200 # Wed Apr 17 14:03:19 2024 +0200 # Node ID 69e3909234d76c6888fba539f9bbbecc9858a7ab # Parent b7cbe9281f9d6911fd40a894ebc4ac2d701d8fa4 HTTP: added MPTCP support. Multipath TCP (MPTCP), standardized in RFC8684 [1], is a TCP extension

[PATCH 4 of 4] Stream: added MPTCP support

2024-04-18 Thread Dourov Maxime
# HG changeset patch # User maxime # Date 1713355437 -7200 # Wed Apr 17 14:03:57 2024 +0200 # Node ID e2a045fb5e3f6362b9f62cf2353f9db34e031202 # Parent f7ea7c665964b50f1ef6f3964c3fce9596afac20 Stream: added MPTCP support. Multipath TCP (MPTCP), standardized in RFC8684 [1], is a TCP

[PATCH 3 of 4] Mail: added MPTCP support

2024-04-18 Thread Dourov Maxime
# HG changeset patch # User maxime # Date 1713355424 -7200 # Wed Apr 17 14:03:44 2024 +0200 # Node ID f7ea7c665964b50f1ef6f3964c3fce9596afac20 # Parent 69e3909234d76c6888fba539f9bbbecc9858a7ab Mail: added MPTCP support. Multipath TCP (MPTCP), standardized in RFC8684 [1], is a TCP extension

[PATCH 1 of 4] Core: added socket protocol

2024-04-18 Thread Dourov Maxime
# HG changeset patch # User maxime # Date 1713355365 -7200 # Wed Apr 17 14:02:45 2024 +0200 # Node ID b7cbe9281f9d6911fd40a894ebc4ac2d701d8fa4 # Parent 49dce50fad40bf09db81ca2a35983ecd7b740e43 Core: added socket protocol. This patch updates the creation of listening sockets to use a new

[PATCH 0 of 4] Add MPTCP support

2024-04-18 Thread Dourov Maxime
Multipath TCP (MPTCP), standardized in RFC8684 [1], is a TCP extension that enables a TCP connection to use different paths. Multipath TCP has been used for several use cases. On smartphones, MPTCP enables seamless handovers between cellular and Wi-Fi networks while preserving established

[nginx] release-1.25.5 tag

2024-04-16 Thread Roman Arutyunyan
details: https://hg.nginx.org/nginx/rev/49dce50fad40 branches: changeset: 9239:49dce50fad40 user: Roman Arutyunyan date: Tue Apr 16 18:29:59 2024 +0400 description: release-1.25.5 tag diffstat: .hgtags | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) diffs (8 lines):

[nginx] nginx-1.25.5-RELEASE

2024-04-16 Thread Roman Arutyunyan
details: https://hg.nginx.org/nginx/rev/8618e4d900cc branches: changeset: 9238:8618e4d900cc user: Roman Arutyunyan date: Tue Apr 16 18:27:50 2024 +0400 description: nginx-1.25.5-RELEASE diffstat: docs/xml/nginx/changes.xml | 77 ++ 1

[njs] Added tag 0.8.4 for changeset 11d956c1577c

2024-04-15 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/7133f0400019 branches: changeset: 2316:7133f0400019 user: Dmitry Volyntsev date: Mon Apr 15 16:44:33 2024 -0700 description: Added tag 0.8.4 for changeset 11d956c1577c diffstat: .hgtags | 1 + 1 files changed, 1 insertions(+), 0 deletions(-)

[njs] Version 0.8.4.

2024-04-15 Thread Dmitry Volyntsev
details: https://hg.nginx.org/njs/rev/11d956c1577c branches: changeset: 2315:11d956c1577c user: Dmitry Volyntsev date: Mon Apr 15 16:40:21 2024 -0700 description: Version 0.8.4. diffstat: CHANGES | 21 + 1 files changed, 21 insertions(+), 0 deletions(-)

Re: nginx web server configuration file for Suprema BioStar 2 Door Access System

2024-04-15 Thread Turritopsis Dohrnii Teo En Ming via nginx-devel
Noted with thanks. Regards, Mr. Turritopsis Dohrnii Teo En Ming Targeted Individual in Singapore On Saturday, March 9th, 2024 at 3:57 PM, Muhammad Nuzaihan wrote: > Hello, > > I don't think nginx uses Java key store and that's specific only for > Java applications. you should ask your

  1   2   3   4   5   6   7   8   9   10   >