Hi List,
How to get x_forwarded_for sent in the request in NGINX module (NAXSI in
particular):
My attempt:
ngx_log_error(NGX_LOG_ERR, req->connection->log,
0, "test %s", (char *)req->headers_in.x_forwarded_for.elts);
The bigger problem I am trying to solve with NAXSI is this:
Hello!
On Wed, Dec 18, 2019 at 08:24:25PM +0300, Maxim Dounin wrote:
> On Mon, Dec 16, 2019 at 03:02:37PM +0100, Gábor Boskovits wrote:
>
> > On berlin.guix.gnu.org we observed a regression upon upgrading nginx
> > to 1.17.5. The problem was, when pipelining request to a proxy using
> > tls, we
# HG changeset patch
# User Joe Konno
# Date 1577125916 28800
# Mon Dec 23 10:31:56 2019 -0800
# Node ID e5427bbc1db2b49424025400783c80f5c75be5fe
# Parent f609c0ac2972f6f451ffe2d17e268ec80802ec94
ngx_cpuinfo: x86: CPUID to set ngx_cacheline_size
Previously, vendor string information was
details: https://hg.nginx.org/nginx/rev/82c1339e2637
branches:
changeset: 7610:82c1339e2637
user: Maxim Dounin
date: Mon Dec 23 21:25:17 2019 +0300
description:
HTTP/2: fixed socket leak with queued frames (ticket #1689).
If a stream is closed with queued frames, it is possible
details: https://hg.nginx.org/nginx/rev/8e64e11aaca0
branches:
changeset: 7611:8e64e11aaca0
user: Maxim Dounin
date: Mon Dec 23 21:25:21 2019 +0300
description:
HTTP/2: introduced separate handler to retry stream close.
When ngx_http_v2_close_stream_handler() is used to retry
details: https://hg.nginx.org/nginx/rev/f609c0ac2972
branches:
changeset: 7609:f609c0ac2972
user: Maxim Dounin
date: Mon Dec 23 20:39:27 2019 +0300
description:
Dav: added checks for chunked to body presence conditions.
These checks were missed when chunked support was introduced.
details: https://hg.nginx.org/nginx/rev/4718a646187a
branches:
changeset: 7608:4718a646187a
user: Sergey A. Osokin
date: Mon Dec 23 18:56:21 2019 +0300
description:
Update manpage, sort command line options.
diffstat:
docs/man/nginx.8 | 15 ---
1 files changed, 8
details: https://hg.nginx.org/nginx/rev/d0d6cf5031a3
branches:
changeset: 7607:d0d6cf5031a3
user: Ruslan Ermilov
date: Mon Dec 23 15:45:46 2019 +0300
description:
Discard request body when redirecting to a URL via error_page.
Reported by Bert JW Regeer and Francisco Oca Gonzalez.
details: https://hg.nginx.org/njs/rev/1023383de2d6
branches:
changeset: 1286:1023383de2d6
user: Dmitry Volyntsev
date: Mon Dec 16 15:18:51 2019 +0300
description:
Fixed stack-use-after-free in njs_value_property_set().
diffstat:
src/njs_object.h | 9 +++--
details: https://hg.nginx.org/njs/rev/99f9008e1b17
branches:
changeset: 1288:99f9008e1b17
user: Dmitry Volyntsev
date: Tue Dec 17 18:22:50 2019 +0300
description:
Shell: fixed output of large values for last evaluated expression.
diffstat:
src/njs_shell.c | 3 ++-
1 files
details: https://hg.nginx.org/njs/rev/61bf7a31e685
branches:
changeset: 1287:61bf7a31e685
user: Alexander Borisov
date: Tue Dec 17 10:35:11 2019 +0300
description:
Introduced the Promise object.
Implemented according to the specification without: Promise.all(),
details: https://hg.nginx.org/njs/rev/9c1ef5ab7a1f
branches:
changeset: 1284:9c1ef5ab7a1f
user: Valentin Bartenev
date: Thu Dec 12 18:50:27 2019 +0300
description:
Introduced nullish coalescing operator.
diffstat:
src/njs_disassembler.c | 12 ++
src/njs_generator.c
details: https://hg.nginx.org/njs/rev/a0adc224673d
branches:
changeset: 1285:a0adc224673d
user: Dmitry Volyntsev
date: Mon Dec 16 15:18:51 2019 +0300
description:
Fixed Array.prototype.join().
Resulting string length of Array.prototype.join() was invalid
when joined values are not
details: https://hg.nginx.org/nginx/rev/db8df9cd84c8
branches:
changeset: 7606:db8df9cd84c8
user: Ruslan Ermilov
date: Mon Dec 16 15:19:01 2019 +0300
description:
Rewrite: disallow empty replacements.
While empty replacements were caught at run-time, parsing code
of the "rewrite"
details: https://hg.nginx.org/nginx/rev/02a539522be4
branches:
changeset: 7605:02a539522be4
user: Ruslan Ermilov
date: Mon Dec 16 15:19:01 2019 +0300
description:
Tolerate '\0' in URI when mapping URI to path.
If a rewritten URI has the null character, only a part of URI was
copied
details: https://hg.nginx.org/nginx/rev/7aa20af4ac00
branches:
changeset: 7604:7aa20af4ac00
user: Ruslan Ermilov
date: Mon Dec 16 15:19:01 2019 +0300
description:
Rewrite: fixed segfault with rewritten URI and "alias".
The "alias" directive cannot be used in the same location where
details: https://hg.nginx.org/nginx/rev/e55e28e6998f
branches:
changeset: 7603:e55e28e6998f
user: Ruslan Ermilov
date: Mon Dec 16 15:19:01 2019 +0300
description:
Fixed request finalization in ngx_http_index_handler().
Returning 500 instead of NGX_ERROR is preferable here because
details: https://hg.nginx.org/nginx/rev/b399246ea45d
branches:
changeset: 7602:b399246ea45d
user: Ruslan Ermilov
date: Mon Dec 16 15:19:01 2019 +0300
description:
Saved some memory allocations.
In configurations when "root" has variables, some modules unnecessarily
allocated memory
details: https://hg.nginx.org/nginx/rev/c1a7d3672653
branches:
changeset: 7601:c1a7d3672653
user: Ruslan Ermilov
date: Mon Dec 16 15:19:01 2019 +0300
description:
Dav: fixed Location in successful MKCOL response.
Instead of reducing URI length to not include the terminating '\0'
Hello!
On Thu, Dec 19, 2019 at 09:01:10AM -0800, Maksim Yevmenkin wrote:
> hello,
>
> [...]
>
> > > > > Thanks for the report, it indeed looks like a bug introduced
> > > > > in 9d2ad2fb4423.
> > > > >
> > > > > The problem is that c->read->handler is overwritted when switching
> > > > > to
20 matches
Mail list logo