Pardon my meticulousness, but I would dispute your observation of
Explicit Invocation in favor of Implicit Invocation.
Also, Virtual Machine pattern seems to be missing from your list.
I also would like to share my impression of your paper:
- I think you need a more substantial body of knowle
details: http://hg.nginx.org/njs/rev/d055824ff0f7
branches:
changeset: 204:d055824ff0f7
user: Igor Sysoev
date: Mon Oct 17 23:29:15 2016 +0300
description:
Relative addresses have been added to disassembler output.
diffstat:
njs/njs_disassembler.c | 125
details: http://hg.nginx.org/njs/rev/59b3b4a0b535
branches:
changeset: 207:59b3b4a0b535
user: Igor Sysoev
date: Tue Oct 18 15:48:22 2016 +0300
description:
Invalid Unicode code point processing has been fixed.
diffstat:
njs/njs_parser.c | 3 +++
njs/test/njs_unit_test.c |
details: http://hg.nginx.org/njs/rev/b2a23cf748f8
branches:
changeset: 206:b2a23cf748f8
user: Igor Sysoev
date: Tue Oct 18 15:48:19 2016 +0300
description:
A fix of function name usage.
diffstat:
njs/njs_generator.c | 9 ++---
njs/njs_parser.c| 1 +
njs/njs_variable.h |
details: http://hg.nginx.org/njs/rev/462f7d2113f9
branches:
changeset: 205:462f7d2113f9
user: Igor Sysoev
date: Tue Oct 18 15:48:13 2016 +0300
description:
Fixes in generating "continue" and "break" statements.
diffstat:
njs/njs_generator.c | 8
njs/test/njs_unit_te
details: http://hg.nginx.org/nginx/rev/f88a145b093e
branches: stable-1.10
changeset: 6749:f88a145b093e
user: Valentin Bartenev
date: Fri May 20 18:41:17 2016 +0300
description:
HTTP/2: the "421 Misdirected Request" response (closes #848).
Since 4fbef397c753 nginx rejects with the 400
details: http://hg.nginx.org/nginx/rev/d4e6c9d8c56b
branches: stable-1.10
changeset: 6748:d4e6c9d8c56b
user: Maxim Dounin
date: Tue Oct 18 17:19:51 2016 +0300
description:
Version bump.
diffstat:
src/core/nginx.h | 4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diffs (1
details: http://hg.nginx.org/nginx/rev/cb330cd39030
branches: stable-1.10
changeset: 6750:cb330cd39030
user: Valentin Bartenev
date: Tue May 24 17:37:52 2016 +0300
description:
HTTP/2: implemented preread buffer for request body (closes #959).
Previously, the stream's window was kept
details: http://hg.nginx.org/nginx/rev/0708285115fa
branches: stable-1.10
changeset: 6752:0708285115fa
user: Valentin Bartenev
date: Thu Jun 16 20:55:11 2016 +0300
description:
HTTP/2: fixed a segfault while processing unbuffered upload.
The ngx_http_v2_finalize_connection() closes c
details: http://hg.nginx.org/nginx/rev/696dbfb0490a
branches: stable-1.10
changeset: 6751:696dbfb0490a
user: Valentin Bartenev
date: Tue May 24 21:54:32 2016 +0300
description:
HTTP/2: unbreak build on MSVC.
diffstat:
src/http/v2/ngx_http_v2.c | 2 +-
1 files changed, 1 insertions
details: http://hg.nginx.org/nginx/rev/20485a482bc0
branches: stable-1.10
changeset: 6753:20485a482bc0
user: Valentin Bartenev
date: Thu Jun 16 20:55:11 2016 +0300
description:
HTTP/2: prevented double termination of a stream.
According to RFC 7540, an endpoint should not send more t
details: http://hg.nginx.org/nginx/rev/12b1df4c9944
branches: stable-1.10
changeset: 6754:12b1df4c9944
user: Valentin Bartenev
date: Thu Jun 16 20:55:11 2016 +0300
description:
HTTP/2: avoid adding Content-Length for requests without body.
There is no reason to add the "Content-Lengt
details: http://hg.nginx.org/nginx/rev/ee43fa9aff66
branches: stable-1.10
changeset: 6759:ee43fa9aff66
user: Valentin Bartenev
date: Tue Jul 19 20:22:44 2016 +0300
description:
HTTP/2: always send GOAWAY while worker is shutting down.
Previously, if the worker process exited, GOAWAY
details: http://hg.nginx.org/nginx/rev/de636b710cb1
branches: stable-1.10
changeset: 6758:de636b710cb1
user: Maxim Dounin
date: Tue Jul 05 18:30:56 2016 +0300
description:
Updated PCRE used for win32 builds.
diffstat:
misc/GNUmakefile | 2 +-
1 files changed, 1 insertions(+), 1 de
details: http://hg.nginx.org/nginx/rev/078f17b2535b
branches: stable-1.10
changeset: 6762:078f17b2535b
user: Valentin Bartenev
date: Tue Jul 19 20:30:21 2016 +0300
description:
HTTP/2: avoid sending output queue if there's nothing to send.
Particularly this fixes alerts on OS X and N
details: http://hg.nginx.org/nginx/rev/73e62bd2ce69
branches: stable-1.10
changeset: 6761:73e62bd2ce69
user: Valentin Bartenev
date: Tue Jul 19 20:22:44 2016 +0300
description:
HTTP/2: always handle streams in error state.
Previously, a stream could be closed by timeout if it was can
details: http://hg.nginx.org/nginx/rev/cc327c3caf4a
branches: stable-1.10
changeset: 6757:cc327c3caf4a
user: Roman Arutyunyan
date: Sat Jul 02 15:59:53 2016 +0300
description:
Sub filter: eliminate unnecessary buffering.
Previously, when a buffer was processed by the sub filter, its
details: http://hg.nginx.org/nginx/rev/521f5aa6e8fb
branches: stable-1.10
changeset: 6756:521f5aa6e8fb
user: Roman Arutyunyan
date: Sat Jul 02 15:59:52 2016 +0300
description:
Sub filter: introduced the ngx_http_sub_match() function.
No functional changes.
diffstat:
src/http/modul
details: http://hg.nginx.org/nginx/rev/4f8ad0faab3c
branches: stable-1.10
changeset: 6763:4f8ad0faab3c
user: Valentin Bartenev
date: Tue Jul 19 20:31:09 2016 +0300
description:
HTTP/2: fixed send timer handling.
Checking for return value of c->send_chain() isn't sufficient since ther
details: http://hg.nginx.org/nginx/rev/e2f13011343e
branches: stable-1.10
changeset: 6755:e2f13011343e
user: Valentin Bartenev
date: Thu Jun 16 20:55:11 2016 +0300
description:
HTTP/2: fixed the "http request count is zero" alert.
When the stream is terminated the HEADERS frame can s
details: http://hg.nginx.org/nginx/rev/9d61ecbe979e
branches: stable-1.10
changeset: 6760:9d61ecbe979e
user: Valentin Bartenev
date: Tue Jul 19 20:22:44 2016 +0300
description:
HTTP/2: prevented output of the HEADERS frame for canceled streams.
It's useless to generate HEADERS if the
details: http://hg.nginx.org/nginx/rev/85c3740b6745
branches: stable-1.10
changeset: 6765:85c3740b6745
user: Valentin Bartenev
date: Tue Jul 19 20:34:17 2016 +0300
description:
HTTP/2: flushing of the SSL buffer in transition to the idle state.
It fixes potential connection leak if s
details: http://hg.nginx.org/nginx/rev/edffb7defebe
branches: stable-1.10
changeset: 6764:edffb7defebe
user: Valentin Bartenev
date: Tue Jul 19 20:34:02 2016 +0300
description:
HTTP/2: refactored ngx_http_v2_send_output_queue().
Now it returns NGX_AGAIN if there's still data to be se
details: http://hg.nginx.org/nginx/rev/e0d1c1e05eef
branches: stable-1.10
changeset: 6767:e0d1c1e05eef
user: Sergey Kandaurov
date: Mon Aug 22 18:53:21 2016 +0300
description:
SSL: adopted session ticket handling for OpenSSL 1.1.0.
Return 1 in the SSL_CTX_set_tlsext_ticket_key_cb() c
details: http://hg.nginx.org/nginx/rev/12c65ff24fd3
branches: stable-1.10
changeset: 6766:12c65ff24fd3
user: Sergey Kandaurov
date: Mon Aug 08 13:44:49 2016 +0300
description:
SSL: guarded SSL_R_NO_CIPHERS_PASSED not present in OpenSSL 1.1.0.
It was removed in OpenSSL 1.1.0 Beta 3 (p
details: http://hg.nginx.org/nginx/rev/d9c180fcbfa7
branches: stable-1.10
changeset: 6768:d9c180fcbfa7
user: Maxim Dounin
date: Thu Sep 01 20:05:23 2016 +0300
description:
Event pipe: do not set file's thread_handler if not needed.
This fixes a problem with aio threads and sendfile w
details: http://hg.nginx.org/nginx/rev/131bc715ce87
branches: stable-1.10
changeset: 6770:131bc715ce87
user: Maxim Dounin
date: Tue Oct 18 17:25:38 2016 +0300
description:
SSL: default DH parameters compatible with OpenSSL 1.1.0.
This is a direct commit to stable as there is no corre
details: http://hg.nginx.org/nginx/rev/5ba99eff0f33
branches: stable-1.10
changeset: 6769:5ba99eff0f33
user: Maxim Dounin
date: Tue Oct 11 16:52:48 2016 +0300
description:
Updated OpenSSL used for win32 builds.
diffstat:
misc/GNUmakefile | 2 +-
1 files changed, 1 insertions(+), 1
details: http://hg.nginx.org/njs/rev/fa9ced8246e5
branches:
changeset: 208:fa9ced8246e5
user: Igor Sysoev
date: Tue Oct 18 17:44:01 2016 +0300
description:
Array.indexOf() and Array.lastIndexOf() have been fixed.
diffstat:
njs/njs_array.c | 2 +-
njs/test/njs_unit_test.c
details: http://hg.nginx.org/nginx/rev/b98f9fdee487
branches: stable-1.10
changeset: 6771:b98f9fdee487
user: Maxim Dounin
date: Tue Oct 18 18:03:12 2016 +0300
description:
nginx-1.10.2-RELEASE
diffstat:
docs/xml/nginx/changes.xml | 115 +
details: http://hg.nginx.org/nginx/rev/9f6b75651432
branches: stable-1.10
changeset: 6772:9f6b75651432
user: Maxim Dounin
date: Tue Oct 18 18:03:13 2016 +0300
description:
release-1.10.2 tag
diffstat:
.hgtags | 1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diffs (8 lines)
details: http://hg.nginx.org/nginx/rev/bcb107bb89cd
branches:
changeset: 6774:bcb107bb89cd
user: Rob N ?
date: Sat Oct 08 18:05:00 2016 +1100
description:
Mail: support SASL EXTERNAL (RFC 4422).
This is needed to allow TLS client certificate auth to work. With
ssl_verify_client conf
details: http://hg.nginx.org/nginx/rev/73b451d304c0
branches:
changeset: 6773:73b451d304c0
user: Maxim Dounin
date: Tue Oct 18 19:38:46 2016 +0300
description:
Mail: extensible auth methods in pop3 module.
diffstat:
src/mail/ngx_mail_pop3_module.c | 94 +++
details: http://hg.nginx.org/nginx/rev/8081e1f3ab8b
branches:
changeset: 6775:8081e1f3ab8b
user: Valentin Bartenev
date: Tue Oct 18 20:46:06 2016 +0300
description:
SSL: overcame possible buffer over-read in ngx_ssl_error().
It appeared that ERR_error_string_n() cannot handle zero b
Hello!
On Thu, Oct 13, 2016 at 04:45:23PM +0800, 月耳 wrote:
> # HG changeset patch
> # User hucongcong
> # Date 1476342771 -28800
> # Thu Oct 13 15:12:51 2016 +0800
> # Node ID 93bad8b82169245db6d4fe4e6b6c823221ee6a38
> # Parent 7cdf69d012f02a80c94d930b29c71847e203e4d6
> Http mp4: replace s
Hey,
> # HG changeset patch
> # User Piotr Sikora
> # Date 1471428975 25200
> # Wed Aug 17 03:16:15 2016 -0700
> # Node ID 653b04653271346c63ab5f3daced807228eed5ac
> # Parent c131f20c9562387f94a268440594c288725d3ba8
> SSL: define NGX_SSL_VERIFY constants.
>
> No binary changes.
>
> Signed-o
Hey,
> # HG changeset patch
> # User Piotr Sikora
> # Date 1471428980 25200
> # Wed Aug 17 03:16:20 2016 -0700
> # Node ID 788c6187bdbd72787ba24505731e42b6a2307be3
> # Parent 653b04653271346c63ab5f3daced807228eed5ac
> SSL: pull common SSL defines into OpenSSL module.
>
> Those values are Op
Hey,
> # HG changeset patch
> # User Piotr Sikora
> # Date 1471428985 25200
> # Wed Aug 17 03:16:25 2016 -0700
> # Node ID 99c2f52beae28567bf2f8501d1a182cd20004c71
> # Parent 788c6187bdbd72787ba24505731e42b6a2307be3
> SSL: pull common SSL options into OpenSSL module.
>
> No functional chang
Hello!
On Tue, Oct 18, 2016 at 01:58:01PM -0700, Piotr Sikora wrote:
> Hey,
>
> > # HG changeset patch
> > # User Piotr Sikora
> > # Date 1471428975 25200
> > # Wed Aug 17 03:16:15 2016 -0700
> > # Node ID 653b04653271346c63ab5f3daced807228eed5ac
> > # Parent c131f20c9562387f94a268440594c
Hey Maxim,
> You may want to take a look at this message:
>
> http://mailman.nginx.org/pipermail/nginx-devel/2016-September/008757.html
How is that related to the commit in question?
Please note that I pinged you on 3 out of 6 commits, which I'm
interested in getting in, regardless of ngx_ssl_ve
Hello!
Thanks for reminding me! Illegal character should be checked
also error detection in configration parser is needed.
Considering that ngx_atofp() was used in some 3rd party modules,
Would nginx-devel accept a new function like ngx_ato??() or
lround(strtod()), or just let strtod() alone?
41 matches
Mail list logo