nginx/src/http/ngx_http.c

1003 lines
28 KiB
C
Raw Normal View History

2002-08-16 23:27:03 +08:00
/*
* Copyright (C) Igor Sysoev
*/
2002-08-20 22:48:28 +08:00
#include <ngx_config.h>
2003-06-03 23:42:58 +08:00
#include <ngx_core.h>
2003-06-11 23:28:34 +08:00
#include <ngx_event.h>
2002-08-16 23:27:03 +08:00
#include <ngx_http.h>
2003-05-27 20:18:54 +08:00
static char *ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf);
static ngx_int_t ngx_http_add_address(ngx_conf_t *cf,
ngx_http_conf_in_port_t *in_port, ngx_http_listen_t *lscf,
ngx_http_core_srv_conf_t *cscf);
static ngx_int_t ngx_http_add_names(ngx_conf_t *cf,
ngx_http_conf_in_addr_t *in_addr, ngx_http_core_srv_conf_t *cscf);
2004-07-19 03:11:20 +08:00
static char *ngx_http_merge_locations(ngx_conf_t *cf,
ngx_array_t *locations, void **loc_conf, ngx_http_module_t *module,
ngx_uint_t ctx_index);
static int ngx_libc_cdecl ngx_http_cmp_conf_in_addrs(const void *one,
const void *two);
static int ngx_libc_cdecl ngx_http_cmp_dns_wildcards(const void *one,
const void *two);
2003-01-09 13:36:00 +08:00
ngx_uint_t ngx_http_max_module;
2003-12-19 16:15:11 +08:00
ngx_uint_t ngx_http_total_requests;
uint64_t ngx_http_total_sent;
2003-01-09 13:36:00 +08:00
2003-01-10 14:09:20 +08:00
2004-06-16 23:32:11 +08:00
ngx_int_t (*ngx_http_top_header_filter) (ngx_http_request_t *r);
ngx_int_t (*ngx_http_top_body_filter) (ngx_http_request_t *r, ngx_chain_t *ch);
2003-01-09 13:36:00 +08:00
static ngx_command_t ngx_http_commands[] = {
{ ngx_string("http"),
NGX_MAIN_CONF|NGX_CONF_BLOCK|NGX_CONF_NOARGS,
ngx_http_block,
0,
0,
NULL },
2003-01-09 13:36:00 +08:00
ngx_null_command
2003-01-09 13:36:00 +08:00
};
2004-04-13 00:38:09 +08:00
static ngx_core_module_t ngx_http_module_ctx = {
ngx_string("http"),
NULL,
NULL
};
2004-04-13 00:38:09 +08:00
2003-01-09 13:36:00 +08:00
ngx_module_t ngx_http_module = {
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
NGX_MODULE_V1,
2004-04-13 00:38:09 +08:00
&ngx_http_module_ctx, /* module context */
2003-01-09 13:36:00 +08:00
ngx_http_commands, /* module directives */
2003-05-27 20:18:54 +08:00
NGX_CORE_MODULE, /* module type */
NULL, /* init master */
2003-07-11 12:50:59 +08:00
NULL, /* init module */
NULL, /* init process */
NULL, /* init thread */
NULL, /* exit thread */
NULL, /* exit process */
NULL, /* exit master */
NGX_MODULE_V1_PADDING
2003-01-09 13:36:00 +08:00
};
static char *
ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
2003-01-09 13:36:00 +08:00
{
char *rv;
u_char ch;
ngx_int_t rc;
ngx_uint_t mi, m, s, l, p, a, i;
ngx_uint_t last, bind_all, done;
2003-12-26 04:26:58 +08:00
ngx_conf_t pcf;
2003-05-20 00:39:14 +08:00
ngx_array_t in_ports;
ngx_hash_init_t hash;
2003-06-11 23:28:34 +08:00
ngx_listening_t *ls;
2003-12-26 04:26:58 +08:00
ngx_http_listen_t *lscf;
2003-05-20 00:39:14 +08:00
ngx_http_module_t *module;
ngx_http_in_port_t *hip;
2003-12-01 04:03:18 +08:00
ngx_http_handler_pt *h;
2003-05-20 00:39:14 +08:00
ngx_http_conf_ctx_t *ctx;
ngx_http_conf_in_port_t *in_port;
ngx_http_conf_in_addr_t *in_addr;
ngx_hash_keys_arrays_t ha;
ngx_http_server_name_t *name;
ngx_http_virtual_names_t *vn;
2003-06-11 23:28:34 +08:00
ngx_http_core_srv_conf_t **cscfp, *cscf;
2004-07-27 02:31:43 +08:00
ngx_http_core_loc_conf_t *clcf;
2003-12-26 04:26:58 +08:00
ngx_http_core_main_conf_t *cmcf;
#if (NGX_WIN32)
2003-06-11 23:28:34 +08:00
ngx_iocp_conf_t *iocpcf;
#endif
2003-05-20 00:39:14 +08:00
/* the main http context */
ctx = ngx_pcalloc(cf->pool, sizeof(ngx_http_conf_ctx_t));
if (ctx == NULL) {
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
2003-05-16 23:27:48 +08:00
*(ngx_http_conf_ctx_t **) conf = ctx;
2003-05-20 00:39:14 +08:00
/* count the number of the http modules and set up their indices */
2003-04-08 23:40:10 +08:00
ngx_http_max_module = 0;
2003-05-20 00:39:14 +08:00
for (m = 0; ngx_modules[m]; m++) {
2003-05-27 20:18:54 +08:00
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
2003-01-09 13:36:00 +08:00
continue;
}
2003-05-27 20:18:54 +08:00
ngx_modules[m]->ctx_index = ngx_http_max_module++;
2003-01-09 13:36:00 +08:00
}
/* the http main_conf context, it is the same in the all http contexts */
ctx->main_conf = ngx_pcalloc(cf->pool,
sizeof(void *) * ngx_http_max_module);
if (ctx->main_conf == NULL) {
return NGX_CONF_ERROR;
}
/*
* the http null srv_conf context, it is used to merge
* the server{}s' srv_conf's
*/
ctx->srv_conf = ngx_pcalloc(cf->pool, sizeof(void *) * ngx_http_max_module);
if (ctx->srv_conf == NULL) {
return NGX_CONF_ERROR;
}
2003-05-16 23:27:48 +08:00
/*
* the http null loc_conf context, it is used to merge
* the server{}s' loc_conf's
*/
2003-05-16 23:27:48 +08:00
ctx->loc_conf = ngx_pcalloc(cf->pool, sizeof(void *) * ngx_http_max_module);
if (ctx->loc_conf == NULL) {
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
2003-05-20 00:39:14 +08:00
/*
* create the main_conf's, the null srv_conf's, and the null loc_conf's
* of the all http modules
*/
2003-05-20 00:39:14 +08:00
for (m = 0; ngx_modules[m]; m++) {
2003-05-27 20:18:54 +08:00
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
2003-01-09 13:36:00 +08:00
continue;
}
2003-05-27 20:18:54 +08:00
module = ngx_modules[m]->ctx;
mi = ngx_modules[m]->ctx_index;
2003-05-20 00:39:14 +08:00
if (module->create_main_conf) {
ctx->main_conf[mi] = module->create_main_conf(cf);
if (ctx->main_conf[mi] == NULL) {
return NGX_CONF_ERROR;
}
2003-05-20 00:39:14 +08:00
}
if (module->create_srv_conf) {
ctx->srv_conf[mi] = module->create_srv_conf(cf);
if (ctx->srv_conf[mi] == NULL) {
return NGX_CONF_ERROR;
}
2003-05-20 00:39:14 +08:00
}
2003-01-09 13:36:00 +08:00
if (module->create_loc_conf) {
ctx->loc_conf[mi] = module->create_loc_conf(cf);
if (ctx->loc_conf[mi] == NULL) {
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
}
}
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
pcf = *cf;
cf->ctx = ctx;
for (m = 0; ngx_modules[m]; m++) {
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
continue;
}
module = ngx_modules[m]->ctx;
mi = ngx_modules[m]->ctx_index;
if (module->preconfiguration) {
if (module->preconfiguration(cf) != NGX_OK) {
return NGX_CONF_ERROR;
}
}
}
2003-05-20 00:39:14 +08:00
/* parse inside the http{} block */
2003-05-27 20:18:54 +08:00
cf->module_type = NGX_HTTP_MODULE;
2003-05-15 01:13:13 +08:00
cf->cmd_type = NGX_HTTP_MAIN_CONF;
2003-01-09 13:36:00 +08:00
rv = ngx_conf_parse(cf, NULL);
if (rv != NGX_CONF_OK) {
*cf = pcf;
2003-01-09 13:36:00 +08:00
return rv;
}
2003-01-09 13:36:00 +08:00
/*
* init http{} main_conf's, merge the server{}s' srv_conf's
* and its location{}s' loc_conf's
*/
2003-05-20 00:39:14 +08:00
2003-05-27 20:18:54 +08:00
cmcf = ctx->main_conf[ngx_http_core_module.ctx_index];
2003-05-30 22:27:59 +08:00
cscfp = cmcf->servers.elts;
2003-05-20 00:39:14 +08:00
for (m = 0; ngx_modules[m]; m++) {
2003-05-27 20:18:54 +08:00
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
2003-05-20 00:39:14 +08:00
continue;
}
2003-05-30 22:27:59 +08:00
module = ngx_modules[m]->ctx;
2003-05-27 20:18:54 +08:00
mi = ngx_modules[m]->ctx_index;
2003-05-20 00:39:14 +08:00
/* init http{} main_conf's */
if (module->init_main_conf) {
2003-07-21 05:15:59 +08:00
rv = module->init_main_conf(cf, ctx->main_conf[mi]);
2003-05-20 00:39:14 +08:00
if (rv != NGX_CONF_OK) {
2003-11-11 01:17:31 +08:00
*cf = pcf;
2003-05-20 00:39:14 +08:00
return rv;
}
}
for (s = 0; s < cmcf->servers.nelts; s++) {
/* merge the server{}s' srv_conf's */
if (module->merge_srv_conf) {
2003-07-21 05:15:59 +08:00
rv = module->merge_srv_conf(cf,
2003-05-20 00:39:14 +08:00
ctx->srv_conf[mi],
cscfp[s]->ctx->srv_conf[mi]);
if (rv != NGX_CONF_OK) {
2003-11-11 01:17:31 +08:00
*cf = pcf;
2003-05-20 00:39:14 +08:00
return rv;
}
}
if (module->merge_loc_conf) {
/* merge the server{}'s loc_conf */
2003-07-21 05:15:59 +08:00
rv = module->merge_loc_conf(cf,
2003-05-20 00:39:14 +08:00
ctx->loc_conf[mi],
cscfp[s]->ctx->loc_conf[mi]);
if (rv != NGX_CONF_OK) {
2003-11-11 01:17:31 +08:00
*cf = pcf;
2003-05-20 00:39:14 +08:00
return rv;
}
/* merge the locations{}' loc_conf's */
2004-07-19 03:11:20 +08:00
rv = ngx_http_merge_locations(cf, &cscfp[s]->locations,
cscfp[s]->ctx->loc_conf,
module, mi);
if (rv != NGX_CONF_OK) {
*cf = pcf;
return rv;
}
2003-05-20 00:39:14 +08:00
}
2003-01-28 23:56:37 +08:00
}
}
2003-05-20 00:39:14 +08:00
2003-10-13 00:49:16 +08:00
/* init lists of the handlers */
2003-01-28 23:56:37 +08:00
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
if (ngx_array_init(&cmcf->phases[NGX_HTTP_POST_READ_PHASE].handlers,
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
cmcf->phases[NGX_HTTP_POST_READ_PHASE].type = NGX_OK;
if (ngx_array_init(&cmcf->phases[NGX_HTTP_SERVER_REWRITE_PHASE].handlers,
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
cmcf->phases[NGX_HTTP_SERVER_REWRITE_PHASE].type = NGX_OK;
2003-10-10 23:10:50 +08:00
/* the special find config phase for a single handler */
if (ngx_array_init(&cmcf->phases[NGX_HTTP_FIND_CONFIG_PHASE].handlers,
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2004-06-25 00:07:04 +08:00
2003-12-01 04:03:18 +08:00
cmcf->phases[NGX_HTTP_FIND_CONFIG_PHASE].type = NGX_OK;
h = ngx_array_push(&cmcf->phases[NGX_HTTP_FIND_CONFIG_PHASE].handlers);
if (h == NULL) {
return NGX_CONF_ERROR;
}
2003-12-01 04:03:18 +08:00
*h = ngx_http_find_location_config;
2003-10-10 23:10:50 +08:00
2003-12-01 04:03:18 +08:00
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
if (ngx_array_init(&cmcf->phases[NGX_HTTP_REWRITE_PHASE].handlers,
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
cmcf->phases[NGX_HTTP_REWRITE_PHASE].type = NGX_OK;
if (ngx_array_init(&cmcf->phases[NGX_HTTP_PREACCESS_PHASE].handlers,
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
cmcf->phases[NGX_HTTP_PREACCESS_PHASE].type = NGX_OK;
if (ngx_array_init(&cmcf->phases[NGX_HTTP_ACCESS_PHASE].handlers,
cf->pool, 2, sizeof(ngx_http_handler_pt))
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2004-06-25 00:07:04 +08:00
cmcf->phases[NGX_HTTP_ACCESS_PHASE].type = NGX_DECLINED;
if (ngx_array_init(&cmcf->phases[NGX_HTTP_CONTENT_PHASE].handlers,
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
cf->pool, 4, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-12-01 04:03:18 +08:00
cmcf->phases[NGX_HTTP_CONTENT_PHASE].type = NGX_OK;
2003-10-10 23:10:50 +08:00
2003-03-21 00:09:44 +08:00
if (ngx_array_init(&cmcf->phases[NGX_HTTP_LOG_PHASE].handlers,
cf->pool, 1, sizeof(ngx_http_handler_pt))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
cmcf->phases[NGX_HTTP_LOG_PHASE].type = NGX_OK;
cmcf->headers_in_hash.max_size = 100;
cmcf->headers_in_hash.bucket_limit = 1;
cmcf->headers_in_hash.bucket_size = sizeof(ngx_http_header_t);
cmcf->headers_in_hash.name = "http headers_in";
if (ngx_hash0_init(&cmcf->headers_in_hash, cf->pool, ngx_http_headers_in, 0)
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
ngx_log_debug2(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"http headers_in hash size: %ui, max buckets per entry: %ui",
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
cmcf->headers_in_hash.hash_size,
cmcf->headers_in_hash.min_buckets);
for (m = 0; ngx_modules[m]; m++) {
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
continue;
}
module = ngx_modules[m]->ctx;
mi = ngx_modules[m]->ctx_index;
if (module->postconfiguration) {
if (module->postconfiguration(cf) != NGX_OK) {
return NGX_CONF_ERROR;
}
}
}
nginx-0.3.8-RELEASE import *) Security: nginx now checks URI got from a backend in "X-Accel-Redirect" header line or in SSI file for the "/../" paths and zeroes. *) Change: nginx now does not treat the empty user name in the "Authorization" header line as valid one. *) Feature: the "ssl_session_timeout" directives of the ngx_http_ssl_module and ngx_imap_ssl_module. *) Feature: the "auth_http_header" directive of the ngx_imap_auth_http_module. *) Feature: the "add_header" directive. *) Feature: the ngx_http_realip_module. *) Feature: the new variables to use in the "log_format" directive: $bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri, $request_time, $request_length, $upstream_status, $upstream_response_time, $gzip_ratio, $uid_got, $uid_set, $connection, $pipe, and $msec. The parameters in the "%name" form will be canceled soon. *) Change: now the false variable values in the "if" directive are the empty string "" and string starting with "0". *) Bugfix: while using proxied or FastCGI-server nginx may leave connections and temporary files with client requests in open state. *) Bugfix: the worker processes did not flush the buffered logs on graceful exit. *) Bugfix: if the request URI was changes by the "rewrite" directive and the request was proxied in location given by regular expression, then the incorrect request was transferred to backend; the bug had appeared in 0.2.6. *) Bugfix: the "expires" directive did not remove the previous "Expires" header. *) Bugfix: nginx may stop to accept requests if the "rtsig" method and several worker processes were used. *) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in SSI commands. *) Bugfix: if the response was ended just after the SSI command and gzipping was used, then the response did not transferred complete or did not transferred at all.
2005-11-10 01:25:55 +08:00
if (ngx_http_variables_init_vars(cf) != NGX_OK) {
return NGX_CONF_ERROR;
}
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
/*
* http{}'s cf->ctx was needed while the configuration merging
* and in postconfiguration process
*/
*cf = pcf;
2004-01-23 17:26:18 +08:00
/*
* create the lists of ports, addresses and server names
* to quickly find the server core module configuration at run-time
2004-01-23 17:26:18 +08:00
*/
2003-01-28 23:56:37 +08:00
if (ngx_array_init(&in_ports, cf->temp_pool, 2,
sizeof(ngx_http_conf_in_port_t))
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
2003-05-15 23:42:53 +08:00
/* "server" directives */
2003-05-30 22:27:59 +08:00
cscfp = cmcf->servers.elts;
2003-05-20 00:39:14 +08:00
for (s = 0; s < cmcf->servers.nelts; s++) {
2003-01-09 13:36:00 +08:00
2003-05-15 23:42:53 +08:00
/* "listen" directives */
2003-05-30 22:27:59 +08:00
lscf = cscfp[s]->listen.elts;
2003-05-20 00:39:14 +08:00
for (l = 0; l < cscfp[s]->listen.nelts; l++) {
2003-01-09 13:36:00 +08:00
/* AF_INET only */
2003-05-30 22:27:59 +08:00
in_port = in_ports.elts;
2003-01-09 13:36:00 +08:00
for (p = 0; p < in_ports.nelts; p++) {
if (lscf[l].port != in_port[p].port) {
continue;
}
2003-05-15 23:42:53 +08:00
/* the port is already in the port list */
2003-01-09 13:36:00 +08:00
in_addr = in_port[p].addrs.elts;
for (a = 0; a < in_port[p].addrs.nelts; a++) {
2003-01-09 13:36:00 +08:00
if (lscf[l].addr != in_addr[a].addr) {
continue;
}
2003-05-15 23:42:53 +08:00
/* the address is already in the address list */
2003-05-15 23:42:53 +08:00
if (ngx_http_add_names(cf, &in_addr[a], cscfp[s]) != NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
/*
* check the duplicate "default" server
* for this address:port
*/
2003-05-15 23:42:53 +08:00
if (lscf[l].conf.default_server) {
if (in_addr[a].default_server) {
ngx_log_error(NGX_LOG_ERR, cf->log, 0,
"the duplicate default server in %V:%d",
&lscf[l].file_name, lscf[l].line);
2003-01-09 13:36:00 +08:00
return NGX_CONF_ERROR;
}
in_addr[a].core_srv_conf = cscfp[s];
in_addr[a].default_server = 1;
2003-01-09 13:36:00 +08:00
}
goto found;
}
2003-05-15 23:42:53 +08:00
/*
* add the address to the addresses list that
* bound to this port
*/
2003-05-15 23:42:53 +08:00
if (ngx_http_add_address(cf, &in_port[p], &lscf[l], cscfp[s])
!= NGX_OK)
{
return NGX_CONF_ERROR;
}
2003-01-09 13:36:00 +08:00
goto found;
}
2003-01-09 13:36:00 +08:00
/* add the port to the in_port list */
2003-01-09 13:36:00 +08:00
in_port = ngx_array_push(&in_ports);
if (in_port == NULL) {
return NGX_CONF_ERROR;
}
2003-05-15 23:42:53 +08:00
in_port->port = lscf[l].port;
in_port->addrs.elts = NULL;
if (ngx_http_add_address(cf, in_port, &lscf[l], cscfp[s]) != NGX_OK)
{
return NGX_CONF_ERROR;
2003-01-09 13:36:00 +08:00
}
found:
continue;
2003-01-09 13:36:00 +08:00
}
}
/* optimize the lists of ports, addresses and server names */
2003-01-28 23:56:37 +08:00
2003-01-09 13:36:00 +08:00
/* AF_INET only */
2003-05-30 22:27:59 +08:00
in_port = in_ports.elts;
2003-01-09 13:36:00 +08:00
for (p = 0; p < in_ports.nelts; p++) {
ngx_qsort(in_port[p].addrs.elts, (size_t) in_port[p].addrs.nelts,
sizeof(ngx_http_conf_in_addr_t), ngx_http_cmp_conf_in_addrs);
/*
* check whether all name-based servers have the same configuraiton
* as the default server,
* or some servers restrict the host names,
* or some servers disable optimizing the host names
*/
2003-05-15 23:42:53 +08:00
2003-05-30 22:27:59 +08:00
in_addr = in_port[p].addrs.elts;
2003-05-15 23:42:53 +08:00
for (a = 0; a < in_port[p].addrs.nelts; a++) {
2003-01-09 13:36:00 +08:00
2003-05-30 22:27:59 +08:00
name = in_addr[a].names.elts;
for (s = 0; s < in_addr[a].names.nelts; s++) {
if (in_addr[a].core_srv_conf != name[s].core_srv_conf
|| name[s].core_srv_conf->optimize_host_names == 0
|| name[s].core_srv_conf->restrict_host_names
!= NGX_HTTP_RESTRICT_HOST_OFF)
{
goto virtual_names;
}
}
2004-01-23 17:26:18 +08:00
/*
* if all name-based servers have the same configuration
* as the default server,
* and no servers restrict the host names,
* and no servers disable optimizing the host names
* then we do not need to check them at run-time at all
2004-01-23 17:26:18 +08:00
*/
2003-05-15 23:42:53 +08:00
in_addr[a].names.nelts = 0;
continue;
virtual_names:
ha.temp_pool = ngx_create_pool(16384, cf->log);
if (ha.temp_pool == NULL) {
return NGX_CONF_ERROR;
}
ha.pool = cf->pool;
if (ngx_hash_keys_array_init(&ha, NGX_HASH_LARGE) != NGX_OK) {
ngx_destroy_pool(ha.temp_pool);
return NGX_CONF_ERROR;
}
name = in_addr[a].names.elts;
for (s = 0; s < in_addr[a].names.nelts; s++) {
ch = name[s].name.data[0];
if (ch == '*' || ch == '.') {
continue;
}
rc = ngx_hash_add_key(&ha, &name[s].name, name[s].core_srv_conf,
0);
if (rc == NGX_ERROR) {
return NGX_CONF_ERROR;
}
if (rc == NGX_BUSY) {
ngx_log_error(NGX_LOG_WARN, cf->log, 0,
"conflicting server name \"%V\", ignored",
&name[s].name);
}
}
for (s = 0; s < in_addr[a].names.nelts; s++) {
ch = name[s].name.data[0];
if (ch != '*' && ch != '.') {
continue;
}
rc = ngx_hash_add_key(&ha, &name[s].name, name[s].core_srv_conf,
NGX_HASH_WILDCARD_KEY);
if (rc == NGX_ERROR) {
return NGX_CONF_ERROR;
}
if (rc == NGX_BUSY) {
ngx_log_error(NGX_LOG_WARN, cf->log, 0,
"conflicting server name \"%V\", ignored",
&name[s].name);
}
2003-01-09 13:36:00 +08:00
}
hash.key = ngx_hash_key_lc;
hash.max_size = cmcf->server_names_hash_max_size;
hash.bucket_size = cmcf->server_names_hash_bucket_size;
hash.name = "server_names_hash";
hash.pool = cf->pool;
if (ha.keys.nelts) {
hash.hash = &in_addr[a].hash;
hash.temp_pool = NULL;
if (ngx_hash_init(&hash, ha.keys.elts, ha.keys.nelts) != NGX_OK)
{
ngx_destroy_pool(ha.temp_pool);
return NGX_CONF_ERROR;
}
}
if (ha.dns_wildcards.nelts) {
ngx_qsort(ha.dns_wildcards.elts,
(size_t) ha.dns_wildcards.nelts,
sizeof(ngx_hash_key_t),
ngx_http_cmp_dns_wildcards);
hash.hash = NULL;
hash.temp_pool = ha.temp_pool;
if (ngx_hash_wildcard_init(&hash, ha.dns_wildcards.elts,
ha.dns_wildcards.nelts)
!= NGX_OK)
{
ngx_destroy_pool(ha.temp_pool);
return NGX_CONF_ERROR;
}
in_addr[a].dns_wildcards = (ngx_hash_wildcard_t *) hash.hash;
}
ngx_destroy_pool(ha.temp_pool);
2003-01-09 13:36:00 +08:00
}
in_addr = in_port[p].addrs.elts;
last = in_port[p].addrs.nelts;
2004-01-23 17:26:18 +08:00
/*
* if there is the binding to the "*:port" then we need to bind()
* to the "*:port" only and ignore the other bindings
2004-01-23 17:26:18 +08:00
*/
2003-05-15 23:42:53 +08:00
if (in_addr[last - 1].addr == INADDR_ANY) {
in_addr[last - 1].bind = 1;
bind_all = 0;
2003-01-09 13:36:00 +08:00
} else {
bind_all = 1;
2003-01-09 13:36:00 +08:00
}
for (a = 0; a < last; /* void */ ) {
if (!bind_all && !in_addr[a].bind) {
a++;
continue;
}
2003-01-09 13:36:00 +08:00
ls = ngx_listening_inet_stream_socket(cf, in_addr[a].addr,
in_port[p].port);
if (ls == NULL) {
return NGX_CONF_ERROR;
}
ls->addr_ntop = 1;
2003-01-09 13:36:00 +08:00
ls->handler = ngx_http_init_connection;
2003-07-21 05:15:59 +08:00
2003-06-11 23:28:34 +08:00
cscf = in_addr[a].core_srv_conf;
ls->pool_size = cscf->connection_pool_size;
ls->post_accept_timeout = cscf->client_header_timeout;
2003-06-11 23:28:34 +08:00
2003-07-21 05:15:59 +08:00
clcf = cscf->ctx->loc_conf[ngx_http_core_module.ctx_index];
ls->log = *clcf->err_log;
ls->log.data = &ls->addr_text;
ls->log.handler = ngx_accept_log_error;
2003-07-21 05:15:59 +08:00
#if (NGX_WIN32)
2003-07-07 14:11:50 +08:00
iocpcf = ngx_event_get_conf(cf->cycle->conf_ctx, ngx_iocp_module);
2003-06-11 23:28:34 +08:00
if (iocpcf->acceptex_read) {
ls->post_accept_buffer_size = cscf->client_header_buffer_size;
}
#endif
ls->backlog = in_addr[a].listen_conf->backlog;
ls->rcvbuf = in_addr[a].listen_conf->rcvbuf;
ls->sndbuf = in_addr[a].listen_conf->sndbuf;
#if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
ls->accept_filter = in_addr[a].listen_conf->accept_filter;
#endif
#if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
ls->deferred_accept = in_addr[a].listen_conf->deferred_accept;
#endif
2003-01-09 13:36:00 +08:00
ls->ctx = ctx;
hip = ngx_palloc(cf->pool, sizeof(ngx_http_in_port_t));
if (hip == NULL) {
return NGX_CONF_ERROR;
}
2003-05-15 23:42:53 +08:00
hip->port = in_port[p].port;
2003-05-15 23:42:53 +08:00
hip->port_text.data = ngx_palloc(cf->pool, 7);
if (hip->port_text.data == NULL) {
return NGX_CONF_ERROR;
}
2003-05-15 23:42:53 +08:00
ls->servers = hip;
2003-05-15 23:42:53 +08:00
hip->port_text.len = ngx_sprintf(hip->port_text.data, ":%d",
hip->port)
- hip->port_text.data;
2003-05-15 23:42:53 +08:00
in_addr = in_port[p].addrs.elts;
2003-05-15 23:42:53 +08:00
if (in_addr[a].bind && in_addr[a].addr != INADDR_ANY) {
hip->naddrs = 1;
done = 0;
2003-05-15 23:42:53 +08:00
} else if (in_port[p].addrs.nelts > 1
&& in_addr[last - 1].addr == INADDR_ANY)
{
hip->naddrs = last;
done = 1;
2003-05-15 23:42:53 +08:00
} else {
hip->naddrs = 1;
done = 0;
}
2003-05-15 23:42:53 +08:00
#if 0
ngx_log_error(NGX_LOG_ALERT, cf->log, 0,
"%ui: %V %d %ui %ui",
a, &ls->addr_text, in_addr[a].bind,
hip->naddrs, last);
#endif
2003-05-15 23:42:53 +08:00
hip->addrs = ngx_pcalloc(cf->pool,
hip->naddrs * sizeof(ngx_http_in_addr_t));
if (hip->addrs == NULL) {
return NGX_CONF_ERROR;
}
2003-05-15 23:42:53 +08:00
for (i = 0; i < hip->naddrs; i++) {
hip->addrs[i].addr = in_addr[i].addr;
hip->addrs[i].core_srv_conf = in_addr[i].core_srv_conf;
2003-05-15 23:42:53 +08:00
if (in_addr[i].hash.buckets == NULL
&& (in_addr[i].dns_wildcards == NULL
|| in_addr[i].dns_wildcards->hash.buckets == NULL))
{
2003-05-15 23:42:53 +08:00
continue;
2003-01-09 13:36:00 +08:00
}
vn = ngx_palloc(cf->pool, sizeof(ngx_http_virtual_names_t));
if (vn == NULL) {
return NGX_CONF_ERROR;
}
hip->addrs[i].virtual_names = vn;
vn->hash = in_addr[i].hash;
vn->dns_wildcards = in_addr[i].dns_wildcards;
2003-01-09 13:36:00 +08:00
}
2003-05-15 23:42:53 +08:00
if (done) {
break;
}
in_addr++;
in_port[p].addrs.elts = in_addr;
last--;
a = 0;
2003-01-09 13:36:00 +08:00
}
}
#if 0
{
u_char address[20];
ngx_uint_t p, a;
2003-05-30 22:27:59 +08:00
in_port = in_ports.elts;
2003-01-30 01:02:48 +08:00
for (p = 0; p < in_ports.nelts; p++) {
2004-02-12 01:08:49 +08:00
ngx_log_debug2(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"port: %d %p", in_port[p].port, &in_port[p]);
2003-05-30 22:27:59 +08:00
in_addr = in_port[p].addrs.elts;
2003-05-15 23:42:53 +08:00
for (a = 0; a < in_port[p].addrs.nelts; a++) {
ngx_inet_ntop(AF_INET, &in_addr[a].addr, address, 20);
ngx_log_debug3(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"%s:%d %p",
address, in_port[p].port, in_addr[a].core_srv_conf);
name = in_addr[a].names.elts;
2003-05-30 22:27:59 +08:00
for (n = 0; n < in_addr[a].names.nelts; n++) {
ngx_log_debug4(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"%s:%d %V %p",
address, in_port[p].port, &name[n].name,
name[n].core_srv_conf);
2003-05-30 22:27:59 +08:00
}
2003-01-30 01:02:48 +08:00
}
}
}
2004-02-12 01:08:49 +08:00
#endif
2003-01-30 01:02:48 +08:00
2003-01-09 13:36:00 +08:00
return NGX_CONF_OK;
}
2004-07-19 03:11:20 +08:00
/*
* add the server address, the server names and the server core module
* configurations to the port (in_port)
*/
static ngx_int_t
ngx_http_add_address(ngx_conf_t *cf, ngx_http_conf_in_port_t *in_port,
ngx_http_listen_t *lscf, ngx_http_core_srv_conf_t *cscf)
{
ngx_http_conf_in_addr_t *in_addr;
if (in_port->addrs.elts == NULL) {
if (ngx_array_init(&in_port->addrs, cf->temp_pool, 4,
sizeof(ngx_http_conf_in_addr_t)) != NGX_OK)
{
return NGX_ERROR;
}
}
in_addr = ngx_array_push(&in_port->addrs);
if (in_addr == NULL) {
return NGX_ERROR;
}
in_addr->addr = lscf->addr;
in_addr->hash.buckets = NULL;
in_addr->hash.size = 0;
in_addr->dns_wildcards = NULL;
in_addr->names.elts = NULL;
in_addr->core_srv_conf = cscf;
in_addr->default_server = lscf->conf.default_server;
in_addr->bind = lscf->conf.bind;
in_addr->listen_conf = &lscf->conf;
#if (NGX_DEBUG)
{
u_char text[20];
ngx_inet_ntop(AF_INET, &in_addr->addr, text, 20);
ngx_log_debug2(NGX_LOG_DEBUG_HTTP, cf->log, 0, "address: %s:%d",
text, in_port->port);
}
#endif
return ngx_http_add_names(cf, in_addr, cscf);
}
/*
* add the server names and the server core module
* configurations to the address:port (in_addr)
*/
static ngx_int_t
ngx_http_add_names(ngx_conf_t *cf, ngx_http_conf_in_addr_t *in_addr,
ngx_http_core_srv_conf_t *cscf)
{
ngx_uint_t i, n;
ngx_http_server_name_t *server_names, *name;
if (in_addr->names.elts == NULL) {
if (ngx_array_init(&in_addr->names, cf->temp_pool, 4,
sizeof(ngx_http_server_name_t)) != NGX_OK)
{
return NGX_ERROR;
}
}
server_names = cscf->server_names.elts;
for (i = 0; i < cscf->server_names.nelts; i++) {
for (n = 0; n < server_names[i].name.len; n++) {
server_names[i].name.data[n] =
ngx_tolower(server_names[i].name.data[n]);
}
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, cf->log, 0,
"name: %V", &server_names[i].name);
name = ngx_array_push(&in_addr->names);
if (name == NULL) {
return NGX_ERROR;
}
server_names = cscf->server_names.elts;
*name = server_names[i];
}
return NGX_OK;
}
static char *
ngx_http_merge_locations(ngx_conf_t *cf, ngx_array_t *locations,
void **loc_conf, ngx_http_module_t *module, ngx_uint_t ctx_index)
2004-07-19 03:11:20 +08:00
{
char *rv;
ngx_uint_t i;
ngx_http_core_loc_conf_t **clcfp;
clcfp = locations->elts;
2004-07-19 03:11:20 +08:00
for (i = 0; i < locations->nelts; i++) {
rv = module->merge_loc_conf(cf, loc_conf[ctx_index],
clcfp[i]->loc_conf[ctx_index]);
if (rv != NGX_CONF_OK) {
return rv;
}
rv = ngx_http_merge_locations(cf, &clcfp[i]->locations,
clcfp[i]->loc_conf, module, ctx_index);
if (rv != NGX_CONF_OK) {
return rv;
}
}
return NGX_CONF_OK;
}
static int ngx_libc_cdecl
ngx_http_cmp_conf_in_addrs(const void *one, const void *two)
{
ngx_http_conf_in_addr_t *first, *second;
first = (ngx_http_conf_in_addr_t *) one;
second = (ngx_http_conf_in_addr_t *) two;
if (first->addr == INADDR_ANY) {
/* the INADDR_ANY must be the last resort, shift it to the end */
return 1;
}
if (first->bind && !second->bind) {
/* shift explicit bind()ed addresses to the start */
return -1;
}
if (!first->bind && second->bind) {
/* shift explicit bind()ed addresses to the start */
return 1;
}
/* do not sort by default */
return 0;
}
static int ngx_libc_cdecl
ngx_http_cmp_dns_wildcards(const void *one, const void *two)
{
ngx_hash_key_t *first, *second;
first = (ngx_hash_key_t *) one;
second = (ngx_hash_key_t *) two;
return ngx_strcmp(first->key.data, second->key.data);
}