nginx/src/http/ngx_http.c

927 lines
27 KiB
C
Raw Normal View History

2002-08-16 23:27:03 +08:00
/*
* Copyright (C) Igor Sysoev
*/
2002-08-20 22:48:28 +08:00
#include <ngx_config.h>
2003-06-03 23:42:58 +08:00
#include <ngx_core.h>
2003-06-11 23:28:34 +08:00
#include <ngx_event.h>
2002-08-16 23:27:03 +08:00
#include <ngx_http.h>
2003-05-27 20:18:54 +08:00
static char *ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf);
static int ngx_libc_cdecl ngx_cmp_server_names(const void *one,
const void *two);
static ngx_int_t ngx_http_add_address(ngx_conf_t *cf,
ngx_http_in_port_t *in_port, ngx_http_listen_t *lscf,
ngx_http_core_srv_conf_t *cscf);
static ngx_int_t ngx_http_add_names(ngx_conf_t *cf,
ngx_http_in_addr_t *in_addr, ngx_http_core_srv_conf_t *cscf);
2004-07-19 03:11:20 +08:00
static char *ngx_http_merge_locations(ngx_conf_t *cf,
ngx_array_t *locations, void **loc_conf, ngx_http_module_t *module,
ngx_uint_t ctx_index);
2003-01-09 13:36:00 +08:00
ngx_uint_t ngx_http_max_module;
2003-12-19 16:15:11 +08:00
ngx_uint_t ngx_http_total_requests;
uint64_t ngx_http_total_sent;
2003-01-09 13:36:00 +08:00
2003-01-10 14:09:20 +08:00
2004-06-16 23:32:11 +08:00
ngx_int_t (*ngx_http_top_header_filter) (ngx_http_request_t *r);
ngx_int_t (*ngx_http_top_body_filter) (ngx_http_request_t *r, ngx_chain_t *ch);
2003-01-09 13:36:00 +08:00
static ngx_command_t ngx_http_commands[] = {
{ ngx_string("http"),
NGX_MAIN_CONF|NGX_CONF_BLOCK|NGX_CONF_NOARGS,
ngx_http_block,
0,
0,
NULL },
2003-01-09 13:36:00 +08:00
ngx_null_command
2003-01-09 13:36:00 +08:00
};
2004-04-13 00:38:09 +08:00
static ngx_core_module_t ngx_http_module_ctx = {
ngx_string("http"),
NULL,
NULL
};
2004-04-13 00:38:09 +08:00
2003-01-09 13:36:00 +08:00
ngx_module_t ngx_http_module = {
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
NGX_MODULE_V1,
2004-04-13 00:38:09 +08:00
&ngx_http_module_ctx, /* module context */
2003-01-09 13:36:00 +08:00
ngx_http_commands, /* module directives */
2003-05-27 20:18:54 +08:00
NGX_CORE_MODULE, /* module type */
NULL, /* init master */
2003-07-11 12:50:59 +08:00
NULL, /* init module */
NULL, /* init process */
NULL, /* init thread */
NULL, /* exit thread */
NULL, /* exit process */
NULL, /* exit master */
NGX_MODULE_V1_PADDING
2003-01-09 13:36:00 +08:00
};
static char *
ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
2003-01-09 13:36:00 +08:00
{
char *rv;
ngx_uint_t mi, m, s, l, p, a, n, key;
ngx_uint_t port_found, addr_found;
ngx_uint_t virtual_names, separate_binding;
2003-12-26 04:26:58 +08:00
ngx_conf_t pcf;
2003-05-20 00:39:14 +08:00
ngx_array_t in_ports;
2003-06-11 23:28:34 +08:00
ngx_listening_t *ls;
2003-12-26 04:26:58 +08:00
ngx_http_listen_t *lscf;
2003-05-20 00:39:14 +08:00
ngx_http_module_t *module;
2003-12-01 04:03:18 +08:00
ngx_http_handler_pt *h;
2003-05-20 00:39:14 +08:00
ngx_http_conf_ctx_t *ctx;
ngx_http_in_port_t *in_port, *inport;
ngx_http_in_addr_t *in_addr, *inaddr;
2003-12-26 04:26:58 +08:00
ngx_http_server_name_t *s_name, *name;
2003-06-11 23:28:34 +08:00
ngx_http_core_srv_conf_t **cscfp, *cscf;
2004-07-27 02:31:43 +08:00
ngx_http_core_loc_conf_t *clcf;
2003-12-26 04:26:58 +08:00
ngx_http_core_main_conf_t *cmcf;
#if (NGX_WIN32)
2003-06-11 23:28:34 +08:00
ngx_iocp_conf_t *iocpcf;
#endif
2003-05-20 00:39:14 +08:00
/* the main http context */
ctx = ngx_pcalloc(cf->pool, sizeof(ngx_http_conf_ctx_t));
if (ctx == NULL) {
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
2003-05-16 23:27:48 +08:00
*(ngx_http_conf_ctx_t **) conf = ctx;
2003-05-20 00:39:14 +08:00
/* count the number of the http modules and set up their indices */
2003-04-08 23:40:10 +08:00
ngx_http_max_module = 0;
2003-05-20 00:39:14 +08:00
for (m = 0; ngx_modules[m]; m++) {
2003-05-27 20:18:54 +08:00
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
2003-01-09 13:36:00 +08:00
continue;
}
2003-05-27 20:18:54 +08:00
ngx_modules[m]->ctx_index = ngx_http_max_module++;
2003-01-09 13:36:00 +08:00
}
/* the http main_conf context, it is the same in the all http contexts */
ctx->main_conf = ngx_pcalloc(cf->pool,
sizeof(void *) * ngx_http_max_module);
if (ctx->main_conf == NULL) {
return NGX_CONF_ERROR;
}
/*
* the http null srv_conf context, it is used to merge
* the server{}s' srv_conf's
*/
ctx->srv_conf = ngx_pcalloc(cf->pool, sizeof(void *) * ngx_http_max_module);
if (ctx->srv_conf == NULL) {
return NGX_CONF_ERROR;
}
2003-05-16 23:27:48 +08:00
/*
* the http null loc_conf context, it is used to merge
* the server{}s' loc_conf's
*/
2003-05-16 23:27:48 +08:00
ctx->loc_conf = ngx_pcalloc(cf->pool, sizeof(void *) * ngx_http_max_module);
if (ctx->loc_conf == NULL) {
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
2003-05-20 00:39:14 +08:00
/*
* create the main_conf's, the null srv_conf's, and the null loc_conf's
* of the all http modules
*/
2003-05-20 00:39:14 +08:00
for (m = 0; ngx_modules[m]; m++) {
2003-05-27 20:18:54 +08:00
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
2003-01-09 13:36:00 +08:00
continue;
}
2003-05-27 20:18:54 +08:00
module = ngx_modules[m]->ctx;
mi = ngx_modules[m]->ctx_index;
2003-05-20 00:39:14 +08:00
if (module->create_main_conf) {
ctx->main_conf[mi] = module->create_main_conf(cf);
if (ctx->main_conf[mi] == NULL) {
return NGX_CONF_ERROR;
}
2003-05-20 00:39:14 +08:00
}
if (module->create_srv_conf) {
ctx->srv_conf[mi] = module->create_srv_conf(cf);
if (ctx->srv_conf[mi] == NULL) {
return NGX_CONF_ERROR;
}
2003-05-20 00:39:14 +08:00
}
2003-01-09 13:36:00 +08:00
if (module->create_loc_conf) {
ctx->loc_conf[mi] = module->create_loc_conf(cf);
if (ctx->loc_conf[mi] == NULL) {
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
}
}
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
pcf = *cf;
cf->ctx = ctx;
for (m = 0; ngx_modules[m]; m++) {
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
continue;
}
module = ngx_modules[m]->ctx;
mi = ngx_modules[m]->ctx_index;
if (module->preconfiguration) {
if (module->preconfiguration(cf) != NGX_OK) {
return NGX_CONF_ERROR;
}
}
}
2003-05-20 00:39:14 +08:00
/* parse inside the http{} block */
2003-05-27 20:18:54 +08:00
cf->module_type = NGX_HTTP_MODULE;
2003-05-15 01:13:13 +08:00
cf->cmd_type = NGX_HTTP_MAIN_CONF;
2003-01-09 13:36:00 +08:00
rv = ngx_conf_parse(cf, NULL);
if (rv != NGX_CONF_OK) {
*cf = pcf;
2003-01-09 13:36:00 +08:00
return rv;
}
2003-01-09 13:36:00 +08:00
/*
* init http{} main_conf's, merge the server{}s' srv_conf's
* and its location{}s' loc_conf's
*/
2003-05-20 00:39:14 +08:00
2003-05-27 20:18:54 +08:00
cmcf = ctx->main_conf[ngx_http_core_module.ctx_index];
2003-05-30 22:27:59 +08:00
cscfp = cmcf->servers.elts;
2003-05-20 00:39:14 +08:00
for (m = 0; ngx_modules[m]; m++) {
2003-05-27 20:18:54 +08:00
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
2003-05-20 00:39:14 +08:00
continue;
}
2003-05-30 22:27:59 +08:00
module = ngx_modules[m]->ctx;
2003-05-27 20:18:54 +08:00
mi = ngx_modules[m]->ctx_index;
2003-05-20 00:39:14 +08:00
/* init http{} main_conf's */
if (module->init_main_conf) {
2003-07-21 05:15:59 +08:00
rv = module->init_main_conf(cf, ctx->main_conf[mi]);
2003-05-20 00:39:14 +08:00
if (rv != NGX_CONF_OK) {
2003-11-11 01:17:31 +08:00
*cf = pcf;
2003-05-20 00:39:14 +08:00
return rv;
}
}
for (s = 0; s < cmcf->servers.nelts; s++) {
/* merge the server{}s' srv_conf's */
if (module->merge_srv_conf) {
2003-07-21 05:15:59 +08:00
rv = module->merge_srv_conf(cf,
2003-05-20 00:39:14 +08:00
ctx->srv_conf[mi],
cscfp[s]->ctx->srv_conf[mi]);
if (rv != NGX_CONF_OK) {
2003-11-11 01:17:31 +08:00
*cf = pcf;
2003-05-20 00:39:14 +08:00
return rv;
}
}
if (module->merge_loc_conf) {
/* merge the server{}'s loc_conf */
2003-07-21 05:15:59 +08:00
rv = module->merge_loc_conf(cf,
2003-05-20 00:39:14 +08:00
ctx->loc_conf[mi],
cscfp[s]->ctx->loc_conf[mi]);
if (rv != NGX_CONF_OK) {
2003-11-11 01:17:31 +08:00
*cf = pcf;
2003-05-20 00:39:14 +08:00
return rv;
}
/* merge the locations{}' loc_conf's */
2004-07-19 03:11:20 +08:00
rv = ngx_http_merge_locations(cf, &cscfp[s]->locations,
cscfp[s]->ctx->loc_conf,
module, mi);
if (rv != NGX_CONF_OK) {
*cf = pcf;
return rv;
}
2003-05-20 00:39:14 +08:00
}
2003-01-28 23:56:37 +08:00
}
}
2003-05-20 00:39:14 +08:00
2003-10-13 00:49:16 +08:00
/* init lists of the handlers */
2003-01-28 23:56:37 +08:00
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
if (ngx_array_init(&cmcf->phases[NGX_HTTP_POST_READ_PHASE].handlers,
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
cmcf->phases[NGX_HTTP_POST_READ_PHASE].type = NGX_OK;
if (ngx_array_init(&cmcf->phases[NGX_HTTP_SERVER_REWRITE_PHASE].handlers,
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
cmcf->phases[NGX_HTTP_SERVER_REWRITE_PHASE].type = NGX_OK;
2003-10-10 23:10:50 +08:00
/* the special find config phase for a single handler */
if (ngx_array_init(&cmcf->phases[NGX_HTTP_FIND_CONFIG_PHASE].handlers,
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2004-06-25 00:07:04 +08:00
2003-12-01 04:03:18 +08:00
cmcf->phases[NGX_HTTP_FIND_CONFIG_PHASE].type = NGX_OK;
h = ngx_array_push(&cmcf->phases[NGX_HTTP_FIND_CONFIG_PHASE].handlers);
if (h == NULL) {
return NGX_CONF_ERROR;
}
2003-12-01 04:03:18 +08:00
*h = ngx_http_find_location_config;
2003-10-10 23:10:50 +08:00
2003-12-01 04:03:18 +08:00
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
if (ngx_array_init(&cmcf->phases[NGX_HTTP_REWRITE_PHASE].handlers,
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
cmcf->phases[NGX_HTTP_REWRITE_PHASE].type = NGX_OK;
if (ngx_array_init(&cmcf->phases[NGX_HTTP_ACCESS_PHASE].handlers,
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
cf->pool, 4, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2004-06-25 00:07:04 +08:00
cmcf->phases[NGX_HTTP_ACCESS_PHASE].type = NGX_DECLINED;
if (ngx_array_init(&cmcf->phases[NGX_HTTP_CONTENT_PHASE].handlers,
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
cf->pool, 4, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-12-01 04:03:18 +08:00
cmcf->phases[NGX_HTTP_CONTENT_PHASE].type = NGX_OK;
2003-10-10 23:10:50 +08:00
2003-03-21 00:09:44 +08:00
cmcf->headers_in_hash.max_size = 100;
cmcf->headers_in_hash.bucket_limit = 1;
cmcf->headers_in_hash.bucket_size = sizeof(ngx_http_header_t);
cmcf->headers_in_hash.name = "http headers_in";
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
if (ngx_hash_init(&cmcf->headers_in_hash, cf->pool, ngx_http_headers_in, 0)
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
ngx_log_debug2(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"http headers_in hash size: %ui, max buckets per entry: %ui",
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
cmcf->headers_in_hash.hash_size,
cmcf->headers_in_hash.min_buckets);
for (m = 0; ngx_modules[m]; m++) {
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
continue;
}
module = ngx_modules[m]->ctx;
mi = ngx_modules[m]->ctx_index;
if (module->postconfiguration) {
if (module->postconfiguration(cf) != NGX_OK) {
return NGX_CONF_ERROR;
}
}
}
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
if (ngx_http_variables_init_vars(cf) != NGX_OK) {
return NGX_CONF_ERROR;
}
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
/*
* http{}'s cf->ctx was needed while the configuration merging
* and in postconfiguration process
*/
*cf = pcf;
2004-01-23 17:26:18 +08:00
/*
* create the lists of ports, addresses and server names
* to quickly find the server core module configuration at run-time
2004-01-23 17:26:18 +08:00
*/
2003-01-28 23:56:37 +08:00
if (ngx_array_init(&in_ports, cf->pool, 2, sizeof(ngx_http_in_port_t))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
2003-05-15 23:42:53 +08:00
/* "server" directives */
2003-05-30 22:27:59 +08:00
cscfp = cmcf->servers.elts;
2003-05-20 00:39:14 +08:00
for (s = 0; s < cmcf->servers.nelts; s++) {
2003-01-09 13:36:00 +08:00
2003-05-15 23:42:53 +08:00
/* "listen" directives */
2003-05-30 22:27:59 +08:00
lscf = cscfp[s]->listen.elts;
2003-05-20 00:39:14 +08:00
for (l = 0; l < cscfp[s]->listen.nelts; l++) {
2003-01-09 13:36:00 +08:00
port_found = 0;
/* AF_INET only */
2003-05-30 22:27:59 +08:00
in_port = in_ports.elts;
2003-01-09 13:36:00 +08:00
for (p = 0; p < in_ports.nelts; p++) {
if (lscf[l].port == in_port[p].port) {
2003-05-15 23:42:53 +08:00
/* the port is already in the port list */
2003-01-09 13:36:00 +08:00
port_found = 1;
addr_found = 0;
2003-05-30 22:27:59 +08:00
in_addr = in_port[p].addrs.elts;
2003-05-15 23:42:53 +08:00
for (a = 0; a < in_port[p].addrs.nelts; a++) {
2003-01-09 13:36:00 +08:00
if (lscf[l].addr == in_addr[a].addr) {
2003-05-15 23:42:53 +08:00
/* the address is already in the address list */
2003-05-15 23:42:53 +08:00
if (ngx_http_add_names(cf, &in_addr[a], cscfp[s])
!= NGX_OK)
{
return NGX_CONF_ERROR;
2003-01-09 13:36:00 +08:00
}
2004-01-23 17:26:18 +08:00
/*
* check the duplicate "default" server
* for this address:port
2004-01-23 17:26:18 +08:00
*/
2003-05-15 23:42:53 +08:00
if (lscf[l].conf.default_server) {
if (in_addr[a].conf.default_server) {
2003-01-09 13:36:00 +08:00
ngx_log_error(NGX_LOG_ERR, cf->log, 0,
"the duplicate default server in %V:%d",
&lscf[l].file_name, lscf[l].line);
2003-01-09 13:36:00 +08:00
return NGX_CONF_ERROR;
}
2003-05-20 00:39:14 +08:00
in_addr[a].core_srv_conf = cscfp[s];
in_addr[a].conf.default_server = 1;
2003-01-09 13:36:00 +08:00
}
addr_found = 1;
break;
2003-05-15 23:42:53 +08:00
} else if (in_addr[a].addr == INADDR_ANY) {
/* the INADDR_ANY is always the last address */
inaddr = ngx_array_push(&in_port[p].addrs);
if (inaddr == NULL) {
return NGX_CONF_ERROR;
}
in_addr = in_port[p].addrs.elts;
2004-01-23 17:26:18 +08:00
/*
* the INADDR_ANY must be the last resort
* so we move it to the end of the address list
* and put the new address in its place
2004-01-23 17:26:18 +08:00
*/
2003-05-15 23:42:53 +08:00
2003-01-09 13:36:00 +08:00
ngx_memcpy(inaddr, &in_addr[a],
sizeof(ngx_http_in_addr_t));
2003-05-15 23:42:53 +08:00
in_addr[a].addr = lscf[l].addr;
in_addr[a].names.elts = NULL;
in_addr[a].hash = NULL;
in_addr[a].wildcards.elts = NULL;
2003-05-20 00:39:14 +08:00
in_addr[a].core_srv_conf = cscfp[s];
in_addr[a].conf = lscf[l].conf;
2003-05-15 23:42:53 +08:00
if (ngx_http_add_names(cf, &in_addr[a], cscfp[s])
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
addr_found = 1;
break;
}
}
if (!addr_found) {
2003-05-15 23:42:53 +08:00
2004-01-23 17:26:18 +08:00
/*
* add the address to the addresses list that
* bound to this port
*/
2003-05-15 23:42:53 +08:00
if (ngx_http_add_address(cf, &in_port[p], &lscf[l],
cscfp[s]) != NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
}
}
}
if (!port_found) {
2003-05-15 23:42:53 +08:00
/* add the port to the in_port list */
in_port = ngx_array_push(&in_ports);
if (in_port == NULL) {
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
in_port->port = lscf[l].port;
in_port->addrs.elts = NULL;
2003-01-09 13:36:00 +08:00
in_port->port_text.data = ngx_palloc(cf->pool, 7);
if (in_port->port_text.data == NULL) {
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
in_port->port_text.len = ngx_sprintf(in_port->port_text.data,
":%d", in_port->port)
- in_port->port_text.data;
2003-05-15 23:42:53 +08:00
if (ngx_http_add_address(cf, in_port, &lscf[l], cscfp[s])
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
}
}
}
/* optimize the lists of ports, addresses and server names */
2003-01-28 23:56:37 +08:00
2003-01-09 13:36:00 +08:00
/* AF_INET only */
2003-05-30 22:27:59 +08:00
in_port = in_ports.elts;
2003-01-09 13:36:00 +08:00
for (p = 0; p < in_ports.nelts; p++) {
separate_binding = 0;
/*
* check whether all name-based servers have the same configuraiton
* as the default server, or some servers restrict the host names
*/
2003-05-15 23:42:53 +08:00
2003-05-30 22:27:59 +08:00
in_addr = in_port[p].addrs.elts;
2003-05-15 23:42:53 +08:00
for (a = 0; a < in_port[p].addrs.nelts; a++) {
2003-01-09 13:36:00 +08:00
if (in_addr[a].conf.bind) {
separate_binding = 1;
}
2003-01-09 13:36:00 +08:00
virtual_names = 0;
2003-05-30 22:27:59 +08:00
name = in_addr[a].names.elts;
2003-01-09 13:36:00 +08:00
for (n = 0; n < in_addr[a].names.nelts; n++) {
if (in_addr[a].core_srv_conf != name[n].core_srv_conf
|| name[n].core_srv_conf->restrict_host_names
!= NGX_HTTP_RESTRICT_HOST_OFF)
{
2003-01-09 13:36:00 +08:00
virtual_names = 1;
break;
}
}
if (!virtual_names) {
name = in_addr[a].wildcards.elts;
for (n = 0; n < in_addr[a].wildcards.nelts; n++) {
if (in_addr[a].core_srv_conf != name[n].core_srv_conf
|| name[n].core_srv_conf->restrict_host_names
!= NGX_HTTP_RESTRICT_HOST_OFF)
{
virtual_names = 1;
break;
}
}
}
2004-01-23 17:26:18 +08:00
/*
* if all name-based servers have the same configuration
* as the default server, and no servers restrict the host names
* then we do not need to check them at run-time at all
2004-01-23 17:26:18 +08:00
*/
2003-05-15 23:42:53 +08:00
2003-01-09 13:36:00 +08:00
if (!virtual_names) {
in_addr[a].names.nelts = 0;
continue;
}
ngx_qsort(in_addr[a].names.elts, in_addr[a].names.nelts,
sizeof(ngx_http_server_name_t), ngx_cmp_server_names);
/* create a hash for many names */
if (in_addr[a].names.nelts > cmcf->server_names_hash_threshold) {
in_addr[a].hash = ngx_palloc(cf->pool,
cmcf->server_names_hash
* sizeof(ngx_array_t));
if (in_addr[a].hash == NULL) {
return NGX_CONF_ERROR;
}
for (n = 0; n < cmcf->server_names_hash; n++) {
if (ngx_array_init(&in_addr[a].hash[n], cf->pool, 4,
sizeof(ngx_http_server_name_t)) != NGX_OK)
{
return NGX_CONF_ERROR;
}
}
name = in_addr[a].names.elts;
for (s = 0; s < in_addr[a].names.nelts; s++) {
ngx_http_server_names_hash_key(key, name[s].name.data,
name[s].name.len,
cmcf->server_names_hash);
s_name = ngx_array_push(&in_addr[a].hash[key]);
if (s_name == NULL) {
return NGX_CONF_ERROR;
}
name = in_addr[a].names.elts;
*s_name = name[s];
}
2003-01-09 13:36:00 +08:00
}
}
2004-01-23 17:26:18 +08:00
/*
* if there is the binding to the "*:port" then we need to bind()
* to the "*:port" only and ignore the other bindings
2004-01-23 17:26:18 +08:00
*/
2003-05-15 23:42:53 +08:00
if (in_addr[a - 1].addr == INADDR_ANY && !separate_binding) {
2003-05-15 23:42:53 +08:00
a--;
2003-01-09 13:36:00 +08:00
} else {
2003-05-15 23:42:53 +08:00
a = 0;
2003-01-09 13:36:00 +08:00
}
2003-05-30 22:27:59 +08:00
in_addr = in_port[p].addrs.elts;
2003-05-15 23:42:53 +08:00
while (a < in_port[p].addrs.nelts) {
2003-01-09 13:36:00 +08:00
ls = ngx_listening_inet_stream_socket(cf, in_addr[a].addr,
in_port[p].port);
if (ls == NULL) {
return NGX_CONF_ERROR;
}
ls->addr_ntop = 1;
2003-01-09 13:36:00 +08:00
ls->handler = ngx_http_init_connection;
2003-07-21 05:15:59 +08:00
2003-06-11 23:28:34 +08:00
cscf = in_addr[a].core_srv_conf;
ls->pool_size = cscf->connection_pool_size;
ls->post_accept_timeout = cscf->client_header_timeout;
2003-06-11 23:28:34 +08:00
2003-07-21 05:15:59 +08:00
clcf = cscf->ctx->loc_conf[ngx_http_core_module.ctx_index];
ls->log = *clcf->err_log;
ls->log.data = &ls->addr_text;
ls->log.handler = ngx_accept_log_error;
2003-07-21 05:15:59 +08:00
#if (NGX_WIN32)
2003-07-07 14:11:50 +08:00
iocpcf = ngx_event_get_conf(cf->cycle->conf_ctx, ngx_iocp_module);
2003-06-11 23:28:34 +08:00
if (iocpcf->acceptex_read) {
ls->post_accept_buffer_size = cscf->client_header_buffer_size;
}
#endif
ls->backlog = in_addr[a].conf.backlog;
ls->rcvbuf = in_addr[a].conf.rcvbuf;
ls->sndbuf = in_addr[a].conf.sndbuf;
#if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
ls->accept_filter = in_addr[a].conf.accept_filter;
#endif
#if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
ls->deferred_accept = in_addr[a].conf.deferred_accept;
#endif
2003-01-09 13:36:00 +08:00
ls->ctx = ctx;
2003-05-15 23:42:53 +08:00
if (in_port[p].addrs.nelts > 1) {
2003-05-30 22:27:59 +08:00
in_addr = in_port[p].addrs.elts;
2003-05-15 23:42:53 +08:00
if (in_addr[in_port[p].addrs.nelts - 1].addr != INADDR_ANY) {
2004-01-23 17:26:18 +08:00
/*
* if this port has not the "*:port" binding then create
* the separate ngx_http_in_port_t for the all bindings
*/
2003-05-15 23:42:53 +08:00
inport = ngx_palloc(cf->pool, sizeof(ngx_http_in_port_t));
if (inport == NULL) {
return NGX_CONF_ERROR;
}
2003-05-15 23:42:53 +08:00
inport->port = in_port[p].port;
inport->port_text = in_port[p].port_text;
2003-05-15 23:42:53 +08:00
/* init list of the addresses ... */
if (ngx_array_init(&inport->addrs, cf->pool, 1,
sizeof(ngx_http_in_addr_t)) != NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-05-15 23:42:53 +08:00
/* ... and set up it with the first address */
inport->addrs.nelts = 1;
inport->addrs.elts = in_port[p].addrs.elts;
ls->servers = inport;
/* prepare for the next cycle */
2003-06-12 13:54:39 +08:00
in_port[p].addrs.elts = (char *) in_port[p].addrs.elts
+ in_port[p].addrs.size;
2003-05-15 23:42:53 +08:00
in_port[p].addrs.nelts--;
in_addr = (ngx_http_in_addr_t *) in_port[p].addrs.elts;
a = 0;
continue;
2003-01-09 13:36:00 +08:00
}
}
2003-05-15 23:42:53 +08:00
ls->servers = &in_port[p];
a++;
2003-01-09 13:36:00 +08:00
}
}
#if (NGX_DEBUG0)
{
u_char address[20];
ngx_uint_t p, a, nn;
2003-05-30 22:27:59 +08:00
in_port = in_ports.elts;
2003-01-30 01:02:48 +08:00
for (p = 0; p < in_ports.nelts; p++) {
2004-02-12 01:08:49 +08:00
ngx_log_debug2(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"port: %d %p", in_port[p].port, &in_port[p]);
2003-05-30 22:27:59 +08:00
in_addr = in_port[p].addrs.elts;
2003-05-15 23:42:53 +08:00
for (a = 0; a < in_port[p].addrs.nelts; a++) {
ngx_inet_ntop(AF_INET, &in_addr[a].addr, address, 20);
ngx_log_debug3(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"%s:%d %p",
address, in_port[p].port, in_addr[a].core_srv_conf);
2003-05-30 22:27:59 +08:00
s_name = in_addr[a].names.elts;
for (n = 0; n < in_addr[a].names.nelts; n++) {
ngx_log_debug4(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"%s:%d %V %p",
address, in_port[p].port, &s_name[n].name,
2004-02-12 01:08:49 +08:00
s_name[n].core_srv_conf);
2003-05-30 22:27:59 +08:00
}
2003-01-30 01:02:48 +08:00
}
}
}
2004-02-12 01:08:49 +08:00
#endif
2003-01-30 01:02:48 +08:00
2003-01-09 13:36:00 +08:00
return NGX_CONF_OK;
}
2004-07-19 03:11:20 +08:00
static int ngx_libc_cdecl
ngx_cmp_server_names(const void *one, const void *two)
{
ngx_http_server_name_t *first = (ngx_http_server_name_t *) one;
ngx_http_server_name_t *second = (ngx_http_server_name_t *) two;
return ngx_strcmp(first->name.data, second->name.data);
}
/*
* add the server address, the server names and the server core module
* configurations to the port (in_port)
*/
static ngx_int_t
ngx_http_add_address(ngx_conf_t *cf, ngx_http_in_port_t *in_port,
ngx_http_listen_t *lscf, ngx_http_core_srv_conf_t *cscf)
{
ngx_http_in_addr_t *in_addr;
if (in_port->addrs.elts == NULL) {
if (ngx_array_init(&in_port->addrs, cf->pool, 4,
sizeof(ngx_http_in_addr_t)) != NGX_OK)
{
return NGX_ERROR;
}
}
in_addr = ngx_array_push(&in_port->addrs);
if (in_addr == NULL) {
return NGX_ERROR;
}
in_addr->addr = lscf->addr;
in_addr->names.elts = NULL;
in_addr->hash = NULL;
in_addr->wildcards.elts = NULL;
in_addr->core_srv_conf = cscf;
in_addr->conf = lscf->conf;
#if (NGX_DEBUG)
{
u_char text[20];
ngx_inet_ntop(AF_INET, &in_addr->addr, text, 20);
ngx_log_debug2(NGX_LOG_DEBUG_HTTP, cf->log, 0, "address: %s:%d",
text, in_port->port);
}
#endif
return ngx_http_add_names(cf, in_addr, cscf);
}
/*
* add the server names and the server core module
* configurations to the address:port (in_addr)
*/
static ngx_int_t
ngx_http_add_names(ngx_conf_t *cf, ngx_http_in_addr_t *in_addr,
ngx_http_core_srv_conf_t *cscf)
{
ngx_uint_t i, n;
ngx_array_t *array;
ngx_http_server_name_t *server_names, *name;
if (in_addr->names.elts == NULL) {
if (ngx_array_init(&in_addr->names, cf->pool, 4,
sizeof(ngx_http_server_name_t)) != NGX_OK)
{
return NGX_ERROR;
}
}
if (in_addr->wildcards.elts == NULL) {
if (ngx_array_init(&in_addr->wildcards, cf->pool, 1,
sizeof(ngx_http_server_name_t)) != NGX_OK)
{
return NGX_ERROR;
}
}
server_names = cscf->server_names.elts;
for (i = 0; i < cscf->server_names.nelts; i++) {
for (n = 0; n < server_names[i].name.len; n++) {
server_names[i].name.data[n] =
ngx_tolower(server_names[i].name.data[n]);
}
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"name: %V", &server_names[i].name);
/* TODO: duplicate names can be checked here */
if (server_names[i].wildcard) {
array = &in_addr->wildcards;
} else {
array = &in_addr->names;
}
name = ngx_array_push(array);
if (name == NULL) {
return NGX_ERROR;
}
server_names = cscf->server_names.elts;
*name = server_names[i];
}
return NGX_OK;
}
static char *
ngx_http_merge_locations(ngx_conf_t *cf, ngx_array_t *locations,
void **loc_conf, ngx_http_module_t *module, ngx_uint_t ctx_index)
2004-07-19 03:11:20 +08:00
{
char *rv;
ngx_uint_t i;
ngx_http_core_loc_conf_t **clcfp;
clcfp = /* (ngx_http_core_loc_conf_t **) */ locations->elts;
for (i = 0; i < locations->nelts; i++) {
rv = module->merge_loc_conf(cf, loc_conf[ctx_index],
clcfp[i]->loc_conf[ctx_index]);
if (rv != NGX_CONF_OK) {
return rv;
}
rv = ngx_http_merge_locations(cf, &clcfp[i]->locations,
clcfp[i]->loc_conf, module, ctx_index);
if (rv != NGX_CONF_OK) {
return rv;
}
}
return NGX_CONF_OK;
}