2003-04-25 22:43:13 +08:00
|
|
|
|
2004-09-28 16:34:51 +08:00
|
|
|
/*
|
2004-09-30 00:00:49 +08:00
|
|
|
* Copyright (C) Igor Sysoev
|
2012-01-18 23:07:43 +08:00
|
|
|
* Copyright (C) Nginx, Inc.
|
2004-09-28 16:34:51 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
2003-04-28 23:06:39 +08:00
|
|
|
#include <ngx_config.h>
|
|
|
|
#include <ngx_core.h>
|
|
|
|
#include <ngx_http.h>
|
2003-04-25 22:43:13 +08:00
|
|
|
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
static void ngx_http_read_client_request_body_handler(ngx_http_request_t *r);
|
|
|
|
static ngx_int_t ngx_http_do_read_client_request_body(ngx_http_request_t *r);
|
2012-11-21 09:08:11 +08:00
|
|
|
static ngx_int_t ngx_http_write_request_body(ngx_http_request_t *r);
|
2007-08-06 23:37:22 +08:00
|
|
|
static ngx_int_t ngx_http_read_discarded_request_body(ngx_http_request_t *r);
|
2012-11-21 09:08:11 +08:00
|
|
|
static ngx_int_t ngx_http_discard_request_body_filter(ngx_http_request_t *r,
|
|
|
|
ngx_buf_t *b);
|
2008-12-26 21:43:42 +08:00
|
|
|
static ngx_int_t ngx_http_test_expect(ngx_http_request_t *r);
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
static ngx_int_t ngx_http_request_body_filter(ngx_http_request_t *r,
|
|
|
|
ngx_chain_t *in);
|
|
|
|
static ngx_int_t ngx_http_request_body_length_filter(ngx_http_request_t *r,
|
|
|
|
ngx_chain_t *in);
|
|
|
|
static ngx_int_t ngx_http_request_body_chunked_filter(ngx_http_request_t *r,
|
|
|
|
ngx_chain_t *in);
|
2003-04-25 22:43:13 +08:00
|
|
|
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
ngx_int_t
|
|
|
|
ngx_http_read_client_request_body(ngx_http_request_t *r,
|
|
|
|
ngx_http_client_body_handler_pt post_handler)
|
2003-04-25 22:43:13 +08:00
|
|
|
{
|
2006-07-08 00:33:19 +08:00
|
|
|
size_t preread;
|
|
|
|
ssize_t size;
|
2012-11-21 08:57:16 +08:00
|
|
|
ngx_int_t rc;
|
2013-02-01 22:38:18 +08:00
|
|
|
ngx_buf_t *b;
|
2016-03-01 20:18:07 +08:00
|
|
|
ngx_chain_t out;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
ngx_http_request_body_t *rb;
|
2004-04-02 00:20:53 +08:00
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
2004-03-30 01:43:58 +08:00
|
|
|
|
2009-08-27 00:04:05 +08:00
|
|
|
r->main->count++;
|
|
|
|
|
2016-04-01 20:56:03 +08:00
|
|
|
if (r != r->main || r->request_body || r->discard_body) {
|
|
|
|
r->request_body_no_buffering = 0;
|
|
|
|
post_handler(r);
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
2008-12-26 21:43:42 +08:00
|
|
|
if (ngx_http_test_expect(r) != NGX_OK) {
|
2012-11-21 08:57:16 +08:00
|
|
|
rc = NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
goto done;
|
2008-12-26 21:43:42 +08:00
|
|
|
}
|
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
rb = ngx_pcalloc(r->pool, sizeof(ngx_http_request_body_t));
|
|
|
|
if (rb == NULL) {
|
2012-11-21 08:57:16 +08:00
|
|
|
rc = NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
goto done;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* set by ngx_pcalloc():
|
|
|
|
*
|
|
|
|
* rb->bufs = NULL;
|
|
|
|
* rb->buf = NULL;
|
2012-11-21 09:08:11 +08:00
|
|
|
* rb->free = NULL;
|
|
|
|
* rb->busy = NULL;
|
|
|
|
* rb->chunked = NULL;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
*/
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
rb->rest = -1;
|
|
|
|
rb->post_handler = post_handler;
|
|
|
|
|
|
|
|
r->request_body = rb;
|
|
|
|
|
|
|
|
if (r->headers_in.content_length_n < 0 && !r->headers_in.chunked) {
|
2015-03-24 02:09:19 +08:00
|
|
|
r->request_body_no_buffering = 0;
|
2012-11-21 09:08:11 +08:00
|
|
|
post_handler(r);
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
2017-04-24 19:17:13 +08:00
|
|
|
#if (NGX_HTTP_V2)
|
|
|
|
if (r->stream) {
|
|
|
|
rc = ngx_http_v2_read_request_body(r);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2006-04-14 17:53:38 +08:00
|
|
|
preread = r->header_in->last - r->header_in->pos;
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2006-04-14 17:53:38 +08:00
|
|
|
if (preread) {
|
2004-03-27 00:13:01 +08:00
|
|
|
|
|
|
|
/* there is the pre-read part of the request body */
|
|
|
|
|
2006-04-14 17:53:38 +08:00
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
|
|
"http client request body preread %uz", preread);
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
out.buf = r->header_in;
|
|
|
|
out.next = NULL;
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
rc = ngx_http_request_body_filter(r, &out);
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (rc != NGX_OK) {
|
2012-11-21 08:57:16 +08:00
|
|
|
goto done;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
r->request_length += preread - (r->header_in->last - r->header_in->pos);
|
2003-10-28 05:01:00 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (!r->headers_in.chunked
|
|
|
|
&& rb->rest > 0
|
|
|
|
&& rb->rest <= (off_t) (r->header_in->end - r->header_in->last))
|
|
|
|
{
|
|
|
|
/* the whole request body may be placed in r->header_in */
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2013-03-14 20:30:26 +08:00
|
|
|
b = ngx_calloc_buf(r->pool);
|
|
|
|
if (b == NULL) {
|
|
|
|
rc = NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
b->temporary = 1;
|
|
|
|
b->start = r->header_in->pos;
|
|
|
|
b->pos = r->header_in->pos;
|
|
|
|
b->last = r->header_in->last;
|
|
|
|
b->end = r->header_in->end;
|
|
|
|
|
|
|
|
rb->buf = b;
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
r->read_event_handler = ngx_http_read_client_request_body_handler;
|
2012-11-27 02:01:49 +08:00
|
|
|
r->write_event_handler = ngx_http_request_empty_handler;
|
2004-03-30 23:59:50 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
rc = ngx_http_do_read_client_request_body(r);
|
|
|
|
goto done;
|
2003-04-25 22:43:13 +08:00
|
|
|
}
|
2003-10-28 05:01:00 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
} else {
|
|
|
|
/* set rb->rest */
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (ngx_http_request_body_filter(r, NULL) != NGX_OK) {
|
|
|
|
rc = NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
2007-01-20 00:13:15 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (rb->rest == 0) {
|
|
|
|
/* the whole request body was pre-read */
|
2015-03-24 02:09:19 +08:00
|
|
|
r->request_body_no_buffering = 0;
|
2012-11-21 09:08:11 +08:00
|
|
|
post_handler(r);
|
|
|
|
return NGX_OK;
|
2006-04-14 17:53:38 +08:00
|
|
|
}
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2012-11-27 02:01:08 +08:00
|
|
|
if (rb->rest < 0) {
|
|
|
|
ngx_log_error(NGX_LOG_ALERT, r->connection->log, 0,
|
|
|
|
"negative request body rest");
|
|
|
|
rc = NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
clcf = ngx_http_get_module_loc_conf(r, ngx_http_core_module);
|
|
|
|
|
2006-04-14 17:53:38 +08:00
|
|
|
size = clcf->client_body_buffer_size;
|
|
|
|
size += size >> 2;
|
2004-03-27 00:13:01 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
/* TODO: honor r->request_body_in_single_buf */
|
|
|
|
|
|
|
|
if (!r->headers_in.chunked && rb->rest < size) {
|
2006-07-08 00:33:19 +08:00
|
|
|
size = (ssize_t) rb->rest;
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2006-04-14 17:53:38 +08:00
|
|
|
if (r->request_body_in_single_buf) {
|
|
|
|
size += preread;
|
|
|
|
}
|
|
|
|
|
2003-10-27 16:53:49 +08:00
|
|
|
} else {
|
2004-04-02 00:20:53 +08:00
|
|
|
size = clcf->client_body_buffer_size;
|
2003-10-27 16:53:49 +08:00
|
|
|
}
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
rb->buf = ngx_create_temp_buf(r->pool, size);
|
|
|
|
if (rb->buf == NULL) {
|
2012-11-21 08:57:16 +08:00
|
|
|
rc = NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
goto done;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
}
|
2003-04-25 22:43:13 +08:00
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
r->read_event_handler = ngx_http_read_client_request_body_handler;
|
2012-11-27 02:01:49 +08:00
|
|
|
r->write_event_handler = ngx_http_request_empty_handler;
|
2005-03-19 20:38:37 +08:00
|
|
|
|
2012-11-21 08:57:16 +08:00
|
|
|
rc = ngx_http_do_read_client_request_body(r);
|
|
|
|
|
|
|
|
done:
|
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
if (r->request_body_no_buffering
|
|
|
|
&& (rc == NGX_OK || rc == NGX_AGAIN))
|
|
|
|
{
|
|
|
|
if (rc == NGX_OK) {
|
|
|
|
r->request_body_no_buffering = 0;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
/* rc == NGX_AGAIN */
|
|
|
|
r->reading_body = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
r->read_event_handler = ngx_http_block_reading;
|
|
|
|
post_handler(r);
|
|
|
|
}
|
|
|
|
|
2012-11-21 08:57:16 +08:00
|
|
|
if (rc >= NGX_HTTP_SPECIAL_RESPONSE) {
|
|
|
|
r->main->count--;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
2003-04-25 22:43:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
ngx_int_t
|
|
|
|
ngx_http_read_unbuffered_request_body(ngx_http_request_t *r)
|
|
|
|
{
|
|
|
|
ngx_int_t rc;
|
|
|
|
|
2016-04-01 20:57:10 +08:00
|
|
|
#if (NGX_HTTP_V2)
|
|
|
|
if (r->stream) {
|
|
|
|
rc = ngx_http_v2_read_unbuffered_request_body(r);
|
|
|
|
|
|
|
|
if (rc == NGX_OK) {
|
|
|
|
r->reading_body = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
if (r->connection->read->timedout) {
|
|
|
|
r->connection->timedout = 1;
|
|
|
|
return NGX_HTTP_REQUEST_TIME_OUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = ngx_http_do_read_client_request_body(r);
|
|
|
|
|
|
|
|
if (rc == NGX_OK) {
|
|
|
|
r->reading_body = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
static void
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
ngx_http_read_client_request_body_handler(ngx_http_request_t *r)
|
2004-03-19 13:25:53 +08:00
|
|
|
{
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
ngx_int_t rc;
|
2004-03-19 13:25:53 +08:00
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
if (r->connection->read->timedout) {
|
2005-11-15 21:30:52 +08:00
|
|
|
r->connection->timedout = 1;
|
2007-01-25 16:45:04 +08:00
|
|
|
ngx_http_finalize_request(r, NGX_HTTP_REQUEST_TIME_OUT);
|
2004-03-30 23:59:50 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
rc = ngx_http_do_read_client_request_body(r);
|
2004-03-19 13:25:53 +08:00
|
|
|
|
|
|
|
if (rc >= NGX_HTTP_SPECIAL_RESPONSE) {
|
2007-01-25 16:45:04 +08:00
|
|
|
ngx_http_finalize_request(r, rc);
|
2004-03-19 13:25:53 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
static ngx_int_t
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
ngx_http_do_read_client_request_body(ngx_http_request_t *r)
|
2003-04-25 22:43:13 +08:00
|
|
|
{
|
2012-11-21 09:08:11 +08:00
|
|
|
off_t rest;
|
2004-03-16 15:10:12 +08:00
|
|
|
size_t size;
|
|
|
|
ssize_t n;
|
2012-11-21 09:08:11 +08:00
|
|
|
ngx_int_t rc;
|
2016-03-01 20:18:07 +08:00
|
|
|
ngx_chain_t out;
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
ngx_connection_t *c;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
ngx_http_request_body_t *rb;
|
2003-10-28 05:01:00 +08:00
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
2003-10-27 16:53:49 +08:00
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
c = r->connection;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
rb = r->request_body;
|
2003-10-27 16:53:49 +08:00
|
|
|
|
2004-03-17 05:26:01 +08:00
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_HTTP, c->log, 0,
|
|
|
|
"http read client request body");
|
|
|
|
|
|
|
|
for ( ;; ) {
|
2006-11-14 04:40:17 +08:00
|
|
|
for ( ;; ) {
|
|
|
|
if (rb->buf->last == rb->buf->end) {
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
if (rb->buf->pos != rb->buf->last) {
|
2012-11-21 09:08:11 +08:00
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
/* pass buffer to request body filter chain */
|
2012-11-21 09:08:11 +08:00
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
out.buf = rb->buf;
|
|
|
|
out.next = NULL;
|
2012-11-21 09:08:11 +08:00
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
rc = ngx_http_request_body_filter(r, &out);
|
|
|
|
|
|
|
|
if (rc != NGX_OK) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
/* update chains */
|
|
|
|
|
|
|
|
rc = ngx_http_request_body_filter(r, NULL);
|
|
|
|
|
|
|
|
if (rc != NGX_OK) {
|
|
|
|
return rc;
|
|
|
|
}
|
2012-11-21 09:08:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (rb->busy != NULL) {
|
2015-03-24 02:09:19 +08:00
|
|
|
if (r->request_body_no_buffering) {
|
|
|
|
if (c->read->timer_set) {
|
|
|
|
ngx_del_timer(c->read);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_handle_read_event(c->read, 0) != NGX_OK) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
rb->buf->pos = rb->buf->start;
|
2006-11-14 04:40:17 +08:00
|
|
|
rb->buf->last = rb->buf->start;
|
2004-03-17 05:26:01 +08:00
|
|
|
}
|
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
size = rb->buf->end - rb->buf->last;
|
2012-11-21 09:08:11 +08:00
|
|
|
rest = rb->rest - (rb->buf->last - rb->buf->pos);
|
2003-10-28 05:01:00 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if ((off_t) size > rest) {
|
|
|
|
size = (size_t) rest;
|
2006-11-14 04:40:17 +08:00
|
|
|
}
|
2003-11-03 06:56:18 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
n = c->recv(c, rb->buf->last, size);
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, c->log, 0,
|
|
|
|
"http client request body recv %z", n);
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
if (n == NGX_AGAIN) {
|
|
|
|
break;
|
|
|
|
}
|
2004-03-19 13:25:53 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
if (n == 0) {
|
|
|
|
ngx_log_error(NGX_LOG_INFO, c->log, 0,
|
2012-04-13 03:35:41 +08:00
|
|
|
"client prematurely closed connection");
|
2006-11-14 04:40:17 +08:00
|
|
|
}
|
2003-10-28 05:01:00 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
if (n == 0 || n == NGX_ERROR) {
|
|
|
|
c->error = 1;
|
|
|
|
return NGX_HTTP_BAD_REQUEST;
|
|
|
|
}
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
rb->buf->last += n;
|
|
|
|
r->request_length += n;
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (n == rest) {
|
|
|
|
/* pass buffer to request body filter chain */
|
|
|
|
|
|
|
|
out.buf = rb->buf;
|
|
|
|
out.next = NULL;
|
|
|
|
|
|
|
|
rc = ngx_http_request_body_filter(r, &out);
|
|
|
|
|
|
|
|
if (rc != NGX_OK) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
if (rb->rest == 0) {
|
|
|
|
break;
|
|
|
|
}
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
if (rb->buf->last < rb->buf->end) {
|
|
|
|
break;
|
|
|
|
}
|
2004-03-23 14:01:52 +08:00
|
|
|
}
|
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, c->log, 0,
|
2007-02-15 22:13:24 +08:00
|
|
|
"http client request body rest %O", rb->rest);
|
2006-11-14 04:40:17 +08:00
|
|
|
|
|
|
|
if (rb->rest == 0) {
|
2004-03-17 05:26:01 +08:00
|
|
|
break;
|
|
|
|
}
|
2003-04-25 22:43:13 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
if (!c->read->ready) {
|
2015-03-24 02:09:19 +08:00
|
|
|
|
|
|
|
if (r->request_body_no_buffering
|
|
|
|
&& rb->buf->pos != rb->buf->last)
|
|
|
|
{
|
|
|
|
/* pass buffer to request body filter chain */
|
|
|
|
|
|
|
|
out.buf = rb->buf;
|
|
|
|
out.next = NULL;
|
|
|
|
|
|
|
|
rc = ngx_http_request_body_filter(r, &out);
|
|
|
|
|
|
|
|
if (rc != NGX_OK) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
clcf = ngx_http_get_module_loc_conf(r, ngx_http_core_module);
|
|
|
|
ngx_add_timer(c->read, clcf->client_body_timeout);
|
2004-03-19 13:25:53 +08:00
|
|
|
|
2008-12-10 01:27:48 +08:00
|
|
|
if (ngx_handle_read_event(c->read, 0) != NGX_OK) {
|
2006-11-14 04:40:17 +08:00
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
nginx-0.3.8-RELEASE import
*) Security: nginx now checks URI got from a backend in
"X-Accel-Redirect" header line or in SSI file for the "/../" paths
and zeroes.
*) Change: nginx now does not treat the empty user name in the
"Authorization" header line as valid one.
*) Feature: the "ssl_session_timeout" directives of the
ngx_http_ssl_module and ngx_imap_ssl_module.
*) Feature: the "auth_http_header" directive of the
ngx_imap_auth_http_module.
*) Feature: the "add_header" directive.
*) Feature: the ngx_http_realip_module.
*) Feature: the new variables to use in the "log_format" directive:
$bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri,
$request_time, $request_length, $upstream_status,
$upstream_response_time, $gzip_ratio, $uid_got, $uid_set,
$connection, $pipe, and $msec. The parameters in the "%name" form
will be canceled soon.
*) Change: now the false variable values in the "if" directive are the
empty string "" and string starting with "0".
*) Bugfix: while using proxied or FastCGI-server nginx may leave
connections and temporary files with client requests in open state.
*) Bugfix: the worker processes did not flush the buffered logs on
graceful exit.
*) Bugfix: if the request URI was changes by the "rewrite" directive
and the request was proxied in location given by regular expression,
then the incorrect request was transferred to backend; the bug had
appeared in 0.2.6.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" header.
*) Bugfix: nginx may stop to accept requests if the "rtsig" method and
several worker processes were used.
*) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in
SSI commands.
*) Bugfix: if the response was ended just after the SSI command and
gzipping was used, then the response did not transferred complete or
did not transferred at all.
2005-11-10 01:25:55 +08:00
|
|
|
|
2006-11-14 04:40:17 +08:00
|
|
|
return NGX_AGAIN;
|
nginx-0.3.8-RELEASE import
*) Security: nginx now checks URI got from a backend in
"X-Accel-Redirect" header line or in SSI file for the "/../" paths
and zeroes.
*) Change: nginx now does not treat the empty user name in the
"Authorization" header line as valid one.
*) Feature: the "ssl_session_timeout" directives of the
ngx_http_ssl_module and ngx_imap_ssl_module.
*) Feature: the "auth_http_header" directive of the
ngx_imap_auth_http_module.
*) Feature: the "add_header" directive.
*) Feature: the ngx_http_realip_module.
*) Feature: the new variables to use in the "log_format" directive:
$bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri,
$request_time, $request_length, $upstream_status,
$upstream_response_time, $gzip_ratio, $uid_got, $uid_set,
$connection, $pipe, and $msec. The parameters in the "%name" form
will be canceled soon.
*) Change: now the false variable values in the "if" directive are the
empty string "" and string starting with "0".
*) Bugfix: while using proxied or FastCGI-server nginx may leave
connections and temporary files with client requests in open state.
*) Bugfix: the worker processes did not flush the buffered logs on
graceful exit.
*) Bugfix: if the request URI was changes by the "rewrite" directive
and the request was proxied in location given by regular expression,
then the incorrect request was transferred to backend; the bug had
appeared in 0.2.6.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" header.
*) Bugfix: nginx may stop to accept requests if the "rtsig" method and
several worker processes were used.
*) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in
SSI commands.
*) Bugfix: if the response was ended just after the SSI command and
gzipping was used, then the response did not transferred complete or
did not transferred at all.
2005-11-10 01:25:55 +08:00
|
|
|
}
|
2003-04-25 22:43:13 +08:00
|
|
|
}
|
|
|
|
|
nginx-0.3.8-RELEASE import
*) Security: nginx now checks URI got from a backend in
"X-Accel-Redirect" header line or in SSI file for the "/../" paths
and zeroes.
*) Change: nginx now does not treat the empty user name in the
"Authorization" header line as valid one.
*) Feature: the "ssl_session_timeout" directives of the
ngx_http_ssl_module and ngx_imap_ssl_module.
*) Feature: the "auth_http_header" directive of the
ngx_imap_auth_http_module.
*) Feature: the "add_header" directive.
*) Feature: the ngx_http_realip_module.
*) Feature: the new variables to use in the "log_format" directive:
$bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri,
$request_time, $request_length, $upstream_status,
$upstream_response_time, $gzip_ratio, $uid_got, $uid_set,
$connection, $pipe, and $msec. The parameters in the "%name" form
will be canceled soon.
*) Change: now the false variable values in the "if" directive are the
empty string "" and string starting with "0".
*) Bugfix: while using proxied or FastCGI-server nginx may leave
connections and temporary files with client requests in open state.
*) Bugfix: the worker processes did not flush the buffered logs on
graceful exit.
*) Bugfix: if the request URI was changes by the "rewrite" directive
and the request was proxied in location given by regular expression,
then the incorrect request was transferred to backend; the bug had
appeared in 0.2.6.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" header.
*) Bugfix: nginx may stop to accept requests if the "rtsig" method and
several worker processes were used.
*) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in
SSI commands.
*) Bugfix: if the response was ended just after the SSI command and
gzipping was used, then the response did not transferred complete or
did not transferred at all.
2005-11-10 01:25:55 +08:00
|
|
|
if (c->read->timer_set) {
|
|
|
|
ngx_del_timer(c->read);
|
|
|
|
}
|
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
if (!r->request_body_no_buffering) {
|
|
|
|
r->read_event_handler = ngx_http_block_reading;
|
|
|
|
rb->post_handler(r);
|
|
|
|
}
|
2004-03-19 13:25:53 +08:00
|
|
|
|
|
|
|
return NGX_OK;
|
2003-04-25 22:43:13 +08:00
|
|
|
}
|
2006-04-14 17:53:38 +08:00
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
2012-11-21 09:08:11 +08:00
|
|
|
ngx_http_write_request_body(ngx_http_request_t *r)
|
2006-04-14 17:53:38 +08:00
|
|
|
{
|
|
|
|
ssize_t n;
|
2015-03-24 02:09:12 +08:00
|
|
|
ngx_chain_t *cl, *ln;
|
2006-04-14 17:53:38 +08:00
|
|
|
ngx_temp_file_t *tf;
|
|
|
|
ngx_http_request_body_t *rb;
|
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
|
|
|
|
|
|
|
rb = r->request_body;
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
|
|
"http write client request body, bufs %p", rb->bufs);
|
|
|
|
|
2006-04-14 17:53:38 +08:00
|
|
|
if (rb->temp_file == NULL) {
|
|
|
|
tf = ngx_pcalloc(r->pool, sizeof(ngx_temp_file_t));
|
|
|
|
if (tf == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
clcf = ngx_http_get_module_loc_conf(r, ngx_http_core_module);
|
|
|
|
|
|
|
|
tf->file.fd = NGX_INVALID_FILE;
|
|
|
|
tf->file.log = r->connection->log;
|
|
|
|
tf->path = clcf->client_body_temp_path;
|
|
|
|
tf->pool = r->pool;
|
|
|
|
tf->warn = "a client request body is buffered to a temporary file";
|
2006-04-19 23:30:56 +08:00
|
|
|
tf->log_level = r->request_body_file_log_level;
|
2006-04-14 17:53:38 +08:00
|
|
|
tf->persistent = r->request_body_in_persistent_file;
|
2007-01-25 16:45:04 +08:00
|
|
|
tf->clean = r->request_body_in_clean_file;
|
2006-04-14 17:53:38 +08:00
|
|
|
|
|
|
|
if (r->request_body_file_group_access) {
|
2007-01-19 03:52:18 +08:00
|
|
|
tf->access = 0660;
|
2006-04-14 17:53:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
rb->temp_file = tf;
|
2012-11-21 08:55:50 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (rb->bufs == NULL) {
|
2012-11-21 08:55:50 +08:00
|
|
|
/* empty body with r->request_body_in_file_only */
|
|
|
|
|
|
|
|
if (ngx_create_temp_file(&tf->file, tf->path, tf->pool,
|
|
|
|
tf->persistent, tf->clean, tf->access)
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
2006-04-14 17:53:38 +08:00
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (rb->bufs == NULL) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
n = ngx_write_chain_to_temp_file(rb->temp_file, rb->bufs);
|
2006-04-14 17:53:38 +08:00
|
|
|
|
|
|
|
/* TODO: n == 0 or not complete and level event */
|
|
|
|
|
|
|
|
if (n == NGX_ERROR) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
rb->temp_file->offset += n;
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
/* mark all buffers as written */
|
|
|
|
|
2015-03-24 02:09:12 +08:00
|
|
|
for (cl = rb->bufs; cl; /* void */) {
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
cl->buf->pos = cl->buf->last;
|
2015-03-24 02:09:12 +08:00
|
|
|
|
|
|
|
ln = cl;
|
|
|
|
cl = cl->next;
|
|
|
|
ngx_free_chain(r->pool, ln);
|
2012-11-21 09:08:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
rb->bufs = NULL;
|
|
|
|
|
2006-04-14 17:53:38 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
ngx_int_t
|
2007-08-06 23:37:22 +08:00
|
|
|
ngx_http_discard_request_body(ngx_http_request_t *r)
|
2006-04-14 17:53:38 +08:00
|
|
|
{
|
|
|
|
ssize_t size;
|
2012-11-21 09:08:11 +08:00
|
|
|
ngx_int_t rc;
|
2006-04-14 17:53:38 +08:00
|
|
|
ngx_event_t *rev;
|
|
|
|
|
2016-04-01 20:56:03 +08:00
|
|
|
if (r != r->main || r->discard_body || r->request_body) {
|
2013-03-20 18:36:57 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
2016-04-01 20:56:03 +08:00
|
|
|
#if (NGX_HTTP_V2)
|
|
|
|
if (r->stream) {
|
|
|
|
r->stream->skip_data = 1;
|
2006-04-14 17:53:38 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
2016-04-01 20:56:03 +08:00
|
|
|
#endif
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2008-12-26 21:43:42 +08:00
|
|
|
if (ngx_http_test_expect(r) != NGX_OK) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
2006-04-14 17:53:38 +08:00
|
|
|
rev = r->connection->read;
|
|
|
|
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_HTTP, rev->log, 0, "http set discard body");
|
|
|
|
|
|
|
|
if (rev->timer_set) {
|
|
|
|
ngx_del_timer(rev);
|
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (r->headers_in.content_length_n <= 0 && !r->headers_in.chunked) {
|
2006-04-14 17:53:38 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
size = r->header_in->last - r->header_in->pos;
|
|
|
|
|
2012-11-27 01:59:30 +08:00
|
|
|
if (size || r->headers_in.chunked) {
|
2012-11-21 09:08:11 +08:00
|
|
|
rc = ngx_http_discard_request_body_filter(r, r->header_in);
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
if (rc != NGX_OK) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (r->headers_in.content_length_n == 0) {
|
2006-04-14 17:53:38 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-27 02:00:14 +08:00
|
|
|
rc = ngx_http_read_discarded_request_body(r);
|
|
|
|
|
|
|
|
if (rc == NGX_OK) {
|
2012-11-21 08:57:56 +08:00
|
|
|
r->lingering_close = 0;
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
2012-11-27 02:00:14 +08:00
|
|
|
if (rc >= NGX_HTTP_SPECIAL_RESPONSE) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* rc == NGX_AGAIN */
|
2012-11-21 08:57:56 +08:00
|
|
|
|
2009-10-20 00:12:13 +08:00
|
|
|
r->read_event_handler = ngx_http_discarded_request_body_handler;
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2008-12-10 01:27:48 +08:00
|
|
|
if (ngx_handle_read_event(rev, 0) != NGX_OK) {
|
2006-04-14 17:53:38 +08:00
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
2012-11-21 08:57:56 +08:00
|
|
|
r->count++;
|
|
|
|
r->discard_body = 1;
|
2007-08-07 18:53:27 +08:00
|
|
|
|
|
|
|
return NGX_OK;
|
2006-04-14 17:53:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-10-20 00:12:13 +08:00
|
|
|
void
|
|
|
|
ngx_http_discarded_request_body_handler(ngx_http_request_t *r)
|
2006-04-14 17:53:38 +08:00
|
|
|
{
|
2007-08-07 18:53:27 +08:00
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_msec_t timer;
|
|
|
|
ngx_event_t *rev;
|
|
|
|
ngx_connection_t *c;
|
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2007-08-07 18:53:27 +08:00
|
|
|
c = r->connection;
|
|
|
|
rev = c->read;
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2007-08-07 18:53:27 +08:00
|
|
|
if (rev->timedout) {
|
|
|
|
c->timedout = 1;
|
|
|
|
c->error = 1;
|
2009-10-20 00:06:57 +08:00
|
|
|
ngx_http_finalize_request(r, NGX_ERROR);
|
2007-08-07 18:53:27 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (r->lingering_time) {
|
2013-05-13 21:39:45 +08:00
|
|
|
timer = (ngx_msec_t) r->lingering_time - (ngx_msec_t) ngx_time();
|
2007-08-07 18:53:27 +08:00
|
|
|
|
2013-05-13 21:39:45 +08:00
|
|
|
if ((ngx_msec_int_t) timer <= 0) {
|
2007-08-07 18:53:27 +08:00
|
|
|
r->discard_body = 0;
|
2009-10-02 19:32:56 +08:00
|
|
|
r->lingering_close = 0;
|
2009-10-20 00:06:57 +08:00
|
|
|
ngx_http_finalize_request(r, NGX_ERROR);
|
2006-04-14 17:53:38 +08:00
|
|
|
return;
|
|
|
|
}
|
2007-08-07 18:53:27 +08:00
|
|
|
|
|
|
|
} else {
|
|
|
|
timer = 0;
|
2006-04-14 17:53:38 +08:00
|
|
|
}
|
|
|
|
|
2007-08-07 18:53:27 +08:00
|
|
|
rc = ngx_http_read_discarded_request_body(r);
|
|
|
|
|
|
|
|
if (rc == NGX_OK) {
|
|
|
|
r->discard_body = 0;
|
2009-10-02 19:32:56 +08:00
|
|
|
r->lingering_close = 0;
|
2009-10-20 00:06:57 +08:00
|
|
|
ngx_http_finalize_request(r, NGX_DONE);
|
2007-08-07 18:53:27 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-11-27 02:00:14 +08:00
|
|
|
if (rc >= NGX_HTTP_SPECIAL_RESPONSE) {
|
|
|
|
c->error = 1;
|
|
|
|
ngx_http_finalize_request(r, NGX_ERROR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-08-07 18:53:27 +08:00
|
|
|
/* rc == NGX_AGAIN */
|
|
|
|
|
2008-12-10 01:27:48 +08:00
|
|
|
if (ngx_handle_read_event(rev, 0) != NGX_OK) {
|
2007-09-02 00:41:52 +08:00
|
|
|
c->error = 1;
|
2009-10-20 00:06:57 +08:00
|
|
|
ngx_http_finalize_request(r, NGX_ERROR);
|
2007-08-07 18:53:27 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (timer) {
|
|
|
|
|
|
|
|
clcf = ngx_http_get_module_loc_conf(r, ngx_http_core_module);
|
|
|
|
|
|
|
|
timer *= 1000;
|
|
|
|
|
|
|
|
if (timer > clcf->lingering_timeout) {
|
|
|
|
timer = clcf->lingering_timeout;
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_add_timer(rev, timer);
|
2006-04-14 17:53:38 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
2007-08-06 23:37:22 +08:00
|
|
|
ngx_http_read_discarded_request_body(ngx_http_request_t *r)
|
2006-04-14 17:53:38 +08:00
|
|
|
{
|
2012-11-21 09:08:11 +08:00
|
|
|
size_t size;
|
|
|
|
ssize_t n;
|
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_buf_t b;
|
|
|
|
u_char buffer[NGX_HTTP_DISCARD_BUFFER_SIZE];
|
2006-04-14 17:53:38 +08:00
|
|
|
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
|
|
"http read discarded body");
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
ngx_memzero(&b, sizeof(ngx_buf_t));
|
|
|
|
|
|
|
|
b.temporary = 1;
|
|
|
|
|
2009-09-25 19:55:33 +08:00
|
|
|
for ( ;; ) {
|
2007-08-06 23:18:24 +08:00
|
|
|
if (r->headers_in.content_length_n == 0) {
|
2007-08-06 23:31:00 +08:00
|
|
|
r->read_event_handler = ngx_http_block_reading;
|
2007-08-06 23:18:24 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2009-09-25 19:55:33 +08:00
|
|
|
if (!r->connection->read->ready) {
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
size = (size_t) ngx_min(r->headers_in.content_length_n,
|
|
|
|
NGX_HTTP_DISCARD_BUFFER_SIZE);
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2007-08-06 23:18:24 +08:00
|
|
|
n = r->connection->recv(r->connection, buffer, size);
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2007-08-06 23:18:24 +08:00
|
|
|
if (n == NGX_ERROR) {
|
|
|
|
r->connection->error = 1;
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
2006-04-14 17:53:38 +08:00
|
|
|
|
2007-08-06 23:18:24 +08:00
|
|
|
if (n == NGX_AGAIN) {
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
2007-08-27 23:38:46 +08:00
|
|
|
if (n == 0) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
b.pos = buffer;
|
|
|
|
b.last = buffer + n;
|
|
|
|
|
|
|
|
rc = ngx_http_discard_request_body_filter(r, &b);
|
|
|
|
|
|
|
|
if (rc != NGX_OK) {
|
2012-11-27 02:00:14 +08:00
|
|
|
return rc;
|
2012-11-21 09:08:11 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_discard_request_body_filter(ngx_http_request_t *r, ngx_buf_t *b)
|
|
|
|
{
|
|
|
|
size_t size;
|
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_http_request_body_t *rb;
|
|
|
|
|
|
|
|
if (r->headers_in.chunked) {
|
|
|
|
|
|
|
|
rb = r->request_body;
|
|
|
|
|
|
|
|
if (rb == NULL) {
|
|
|
|
|
|
|
|
rb = ngx_pcalloc(r->pool, sizeof(ngx_http_request_body_t));
|
|
|
|
if (rb == NULL) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
rb->chunked = ngx_pcalloc(r->pool, sizeof(ngx_http_chunked_t));
|
2012-11-27 02:01:08 +08:00
|
|
|
if (rb->chunked == NULL) {
|
2012-11-21 09:08:11 +08:00
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
r->request_body = rb;
|
|
|
|
}
|
|
|
|
|
|
|
|
for ( ;; ) {
|
|
|
|
|
|
|
|
rc = ngx_http_parse_chunked(r, b, rb->chunked);
|
|
|
|
|
|
|
|
if (rc == NGX_OK) {
|
|
|
|
|
|
|
|
/* a chunk has been parsed successfully */
|
|
|
|
|
|
|
|
size = b->last - b->pos;
|
|
|
|
|
|
|
|
if ((off_t) size > rb->chunked->size) {
|
2013-09-05 00:48:23 +08:00
|
|
|
b->pos += (size_t) rb->chunked->size;
|
2012-11-21 09:08:11 +08:00
|
|
|
rb->chunked->size = 0;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
rb->chunked->size -= size;
|
|
|
|
b->pos = b->last;
|
|
|
|
}
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rc == NGX_DONE) {
|
|
|
|
|
|
|
|
/* a whole response has been parsed successfully */
|
|
|
|
|
|
|
|
r->headers_in.content_length_n = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rc == NGX_AGAIN) {
|
|
|
|
|
|
|
|
/* set amount of data we want to see next time */
|
|
|
|
|
|
|
|
r->headers_in.content_length_n = rb->chunked->length;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* invalid */
|
|
|
|
|
|
|
|
ngx_log_error(NGX_LOG_ERR, r->connection->log, 0,
|
|
|
|
"client sent invalid chunked body");
|
|
|
|
|
|
|
|
return NGX_HTTP_BAD_REQUEST;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
size = b->last - b->pos;
|
|
|
|
|
|
|
|
if ((off_t) size > r->headers_in.content_length_n) {
|
2013-09-05 00:48:23 +08:00
|
|
|
b->pos += (size_t) r->headers_in.content_length_n;
|
2012-11-21 09:08:11 +08:00
|
|
|
r->headers_in.content_length_n = 0;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
b->pos = b->last;
|
|
|
|
r->headers_in.content_length_n -= size;
|
|
|
|
}
|
2009-09-25 19:55:33 +08:00
|
|
|
}
|
2012-11-21 09:08:11 +08:00
|
|
|
|
|
|
|
return NGX_OK;
|
2006-04-14 17:53:38 +08:00
|
|
|
}
|
2008-12-26 21:43:42 +08:00
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_test_expect(ngx_http_request_t *r)
|
|
|
|
{
|
|
|
|
ngx_int_t n;
|
|
|
|
ngx_str_t *expect;
|
|
|
|
|
|
|
|
if (r->expect_tested
|
|
|
|
|| r->headers_in.expect == NULL
|
2017-04-24 19:17:13 +08:00
|
|
|
|| r->http_version < NGX_HTTP_VERSION_11
|
|
|
|
#if (NGX_HTTP_V2)
|
|
|
|
|| r->stream != NULL
|
|
|
|
#endif
|
|
|
|
)
|
2008-12-26 21:43:42 +08:00
|
|
|
{
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
r->expect_tested = 1;
|
|
|
|
|
|
|
|
expect = &r->headers_in.expect->value;
|
|
|
|
|
|
|
|
if (expect->len != sizeof("100-continue") - 1
|
|
|
|
|| ngx_strncasecmp(expect->data, (u_char *) "100-continue",
|
|
|
|
sizeof("100-continue") - 1)
|
|
|
|
!= 0)
|
|
|
|
{
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
|
|
"send 100 Continue");
|
|
|
|
|
|
|
|
n = r->connection->send(r->connection,
|
|
|
|
(u_char *) "HTTP/1.1 100 Continue" CRLF CRLF,
|
|
|
|
sizeof("HTTP/1.1 100 Continue" CRLF CRLF) - 1);
|
|
|
|
|
|
|
|
if (n == sizeof("HTTP/1.1 100 Continue" CRLF CRLF) - 1) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we assume that such small packet should be send successfully */
|
|
|
|
|
2017-02-09 00:35:31 +08:00
|
|
|
r->connection->error = 1;
|
|
|
|
|
2008-12-26 21:43:42 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2012-11-21 09:08:11 +08:00
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_request_body_filter(ngx_http_request_t *r, ngx_chain_t *in)
|
|
|
|
{
|
|
|
|
if (r->headers_in.chunked) {
|
|
|
|
return ngx_http_request_body_chunked_filter(r, in);
|
|
|
|
|
|
|
|
} else {
|
|
|
|
return ngx_http_request_body_length_filter(r, in);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_request_body_length_filter(ngx_http_request_t *r, ngx_chain_t *in)
|
|
|
|
{
|
|
|
|
size_t size;
|
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_buf_t *b;
|
|
|
|
ngx_chain_t *cl, *tl, *out, **ll;
|
|
|
|
ngx_http_request_body_t *rb;
|
|
|
|
|
|
|
|
rb = r->request_body;
|
|
|
|
|
|
|
|
if (rb->rest == -1) {
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
|
|
"http request body content length filter");
|
|
|
|
|
|
|
|
rb->rest = r->headers_in.content_length_n;
|
|
|
|
}
|
|
|
|
|
|
|
|
out = NULL;
|
|
|
|
ll = &out;
|
|
|
|
|
|
|
|
for (cl = in; cl; cl = cl->next) {
|
|
|
|
|
2014-01-04 07:32:22 +08:00
|
|
|
if (rb->rest == 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
tl = ngx_chain_get_free_buf(r->pool, &rb->free);
|
|
|
|
if (tl == NULL) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
b = tl->buf;
|
|
|
|
|
|
|
|
ngx_memzero(b, sizeof(ngx_buf_t));
|
|
|
|
|
|
|
|
b->temporary = 1;
|
|
|
|
b->tag = (ngx_buf_tag_t) &ngx_http_read_client_request_body;
|
2013-03-14 20:28:53 +08:00
|
|
|
b->start = cl->buf->pos;
|
2012-11-21 09:08:11 +08:00
|
|
|
b->pos = cl->buf->pos;
|
|
|
|
b->last = cl->buf->last;
|
|
|
|
b->end = cl->buf->end;
|
2015-04-07 00:20:36 +08:00
|
|
|
b->flush = r->request_body_no_buffering;
|
2012-11-21 09:08:11 +08:00
|
|
|
|
|
|
|
size = cl->buf->last - cl->buf->pos;
|
|
|
|
|
|
|
|
if ((off_t) size < rb->rest) {
|
|
|
|
cl->buf->pos = cl->buf->last;
|
|
|
|
rb->rest -= size;
|
|
|
|
|
|
|
|
} else {
|
2013-09-05 00:48:23 +08:00
|
|
|
cl->buf->pos += (size_t) rb->rest;
|
2012-11-21 09:08:11 +08:00
|
|
|
rb->rest = 0;
|
|
|
|
b->last = cl->buf->pos;
|
|
|
|
b->last_buf = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
*ll = tl;
|
|
|
|
ll = &tl->next;
|
|
|
|
}
|
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
rc = ngx_http_top_request_body_filter(r, out);
|
2012-11-21 09:08:11 +08:00
|
|
|
|
|
|
|
ngx_chain_update_chains(r->pool, &rb->free, &rb->busy, &out,
|
|
|
|
(ngx_buf_tag_t) &ngx_http_read_client_request_body);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_request_body_chunked_filter(ngx_http_request_t *r, ngx_chain_t *in)
|
|
|
|
{
|
|
|
|
size_t size;
|
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_buf_t *b;
|
|
|
|
ngx_chain_t *cl, *out, *tl, **ll;
|
|
|
|
ngx_http_request_body_t *rb;
|
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
|
|
|
|
|
|
|
rb = r->request_body;
|
|
|
|
|
|
|
|
if (rb->rest == -1) {
|
|
|
|
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
|
|
"http request body chunked filter");
|
|
|
|
|
|
|
|
rb->chunked = ngx_pcalloc(r->pool, sizeof(ngx_http_chunked_t));
|
|
|
|
if (rb->chunked == NULL) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
r->headers_in.content_length_n = 0;
|
|
|
|
rb->rest = 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
out = NULL;
|
|
|
|
ll = &out;
|
|
|
|
|
|
|
|
for (cl = in; cl; cl = cl->next) {
|
|
|
|
|
|
|
|
for ( ;; ) {
|
|
|
|
|
|
|
|
ngx_log_debug7(NGX_LOG_DEBUG_EVENT, r->connection->log, 0,
|
|
|
|
"http body chunked buf "
|
2015-03-24 00:28:54 +08:00
|
|
|
"t:%d f:%d %p, pos %p, size: %z file: %O, size: %O",
|
2012-11-21 09:08:11 +08:00
|
|
|
cl->buf->temporary, cl->buf->in_file,
|
|
|
|
cl->buf->start, cl->buf->pos,
|
|
|
|
cl->buf->last - cl->buf->pos,
|
|
|
|
cl->buf->file_pos,
|
|
|
|
cl->buf->file_last - cl->buf->file_pos);
|
|
|
|
|
|
|
|
rc = ngx_http_parse_chunked(r, cl->buf, rb->chunked);
|
|
|
|
|
|
|
|
if (rc == NGX_OK) {
|
|
|
|
|
|
|
|
/* a chunk has been parsed successfully */
|
|
|
|
|
|
|
|
clcf = ngx_http_get_module_loc_conf(r, ngx_http_core_module);
|
|
|
|
|
|
|
|
if (clcf->client_max_body_size
|
|
|
|
&& clcf->client_max_body_size
|
2014-03-03 21:39:53 +08:00
|
|
|
- r->headers_in.content_length_n < rb->chunked->size)
|
2012-11-21 09:08:11 +08:00
|
|
|
{
|
|
|
|
ngx_log_error(NGX_LOG_ERR, r->connection->log, 0,
|
|
|
|
"client intended to send too large chunked "
|
2014-03-03 21:39:53 +08:00
|
|
|
"body: %O+%O bytes",
|
|
|
|
r->headers_in.content_length_n,
|
|
|
|
rb->chunked->size);
|
2012-11-21 09:08:11 +08:00
|
|
|
|
|
|
|
r->lingering_close = 1;
|
|
|
|
|
|
|
|
return NGX_HTTP_REQUEST_ENTITY_TOO_LARGE;
|
|
|
|
}
|
|
|
|
|
|
|
|
tl = ngx_chain_get_free_buf(r->pool, &rb->free);
|
|
|
|
if (tl == NULL) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
b = tl->buf;
|
|
|
|
|
|
|
|
ngx_memzero(b, sizeof(ngx_buf_t));
|
|
|
|
|
|
|
|
b->temporary = 1;
|
|
|
|
b->tag = (ngx_buf_tag_t) &ngx_http_read_client_request_body;
|
2013-03-14 20:28:53 +08:00
|
|
|
b->start = cl->buf->pos;
|
2012-11-21 09:08:11 +08:00
|
|
|
b->pos = cl->buf->pos;
|
|
|
|
b->last = cl->buf->last;
|
|
|
|
b->end = cl->buf->end;
|
2015-04-07 00:20:36 +08:00
|
|
|
b->flush = r->request_body_no_buffering;
|
2012-11-21 09:08:11 +08:00
|
|
|
|
|
|
|
*ll = tl;
|
|
|
|
ll = &tl->next;
|
|
|
|
|
|
|
|
size = cl->buf->last - cl->buf->pos;
|
|
|
|
|
|
|
|
if ((off_t) size > rb->chunked->size) {
|
2013-09-05 00:48:23 +08:00
|
|
|
cl->buf->pos += (size_t) rb->chunked->size;
|
2012-11-21 09:08:11 +08:00
|
|
|
r->headers_in.content_length_n += rb->chunked->size;
|
|
|
|
rb->chunked->size = 0;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
rb->chunked->size -= size;
|
|
|
|
r->headers_in.content_length_n += size;
|
|
|
|
cl->buf->pos = cl->buf->last;
|
|
|
|
}
|
|
|
|
|
|
|
|
b->last = cl->buf->pos;
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rc == NGX_DONE) {
|
|
|
|
|
|
|
|
/* a whole response has been parsed successfully */
|
|
|
|
|
|
|
|
rb->rest = 0;
|
|
|
|
|
|
|
|
tl = ngx_chain_get_free_buf(r->pool, &rb->free);
|
|
|
|
if (tl == NULL) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
b = tl->buf;
|
|
|
|
|
|
|
|
ngx_memzero(b, sizeof(ngx_buf_t));
|
|
|
|
|
|
|
|
b->last_buf = 1;
|
|
|
|
|
|
|
|
*ll = tl;
|
|
|
|
ll = &tl->next;
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rc == NGX_AGAIN) {
|
|
|
|
|
|
|
|
/* set rb->rest, amount of data we want to see next time */
|
|
|
|
|
|
|
|
rb->rest = rb->chunked->length;
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* invalid */
|
|
|
|
|
|
|
|
ngx_log_error(NGX_LOG_ERR, r->connection->log, 0,
|
|
|
|
"client sent invalid chunked body");
|
|
|
|
|
|
|
|
return NGX_HTTP_BAD_REQUEST;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
rc = ngx_http_top_request_body_filter(r, out);
|
2012-11-21 09:08:11 +08:00
|
|
|
|
|
|
|
ngx_chain_update_chains(r->pool, &rb->free, &rb->busy, &out,
|
|
|
|
(ngx_buf_tag_t) &ngx_http_read_client_request_body);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
ngx_int_t
|
2012-11-21 09:08:11 +08:00
|
|
|
ngx_http_request_body_save_filter(ngx_http_request_t *r, ngx_chain_t *in)
|
|
|
|
{
|
2016-03-01 20:18:07 +08:00
|
|
|
ngx_buf_t *b;
|
2012-11-21 09:08:11 +08:00
|
|
|
ngx_chain_t *cl;
|
|
|
|
ngx_http_request_body_t *rb;
|
|
|
|
|
|
|
|
rb = r->request_body;
|
|
|
|
|
|
|
|
#if (NGX_DEBUG)
|
|
|
|
|
2017-02-09 00:36:03 +08:00
|
|
|
#if 0
|
2012-11-21 09:08:11 +08:00
|
|
|
for (cl = rb->bufs; cl; cl = cl->next) {
|
|
|
|
ngx_log_debug7(NGX_LOG_DEBUG_EVENT, r->connection->log, 0,
|
|
|
|
"http body old buf t:%d f:%d %p, pos %p, size: %z "
|
2015-03-24 00:28:54 +08:00
|
|
|
"file: %O, size: %O",
|
2012-11-21 09:08:11 +08:00
|
|
|
cl->buf->temporary, cl->buf->in_file,
|
|
|
|
cl->buf->start, cl->buf->pos,
|
|
|
|
cl->buf->last - cl->buf->pos,
|
|
|
|
cl->buf->file_pos,
|
|
|
|
cl->buf->file_last - cl->buf->file_pos);
|
|
|
|
}
|
2017-02-09 00:36:03 +08:00
|
|
|
#endif
|
2012-11-21 09:08:11 +08:00
|
|
|
|
|
|
|
for (cl = in; cl; cl = cl->next) {
|
|
|
|
ngx_log_debug7(NGX_LOG_DEBUG_EVENT, r->connection->log, 0,
|
|
|
|
"http body new buf t:%d f:%d %p, pos %p, size: %z "
|
2015-03-24 00:28:54 +08:00
|
|
|
"file: %O, size: %O",
|
2012-11-21 09:08:11 +08:00
|
|
|
cl->buf->temporary, cl->buf->in_file,
|
|
|
|
cl->buf->start, cl->buf->pos,
|
|
|
|
cl->buf->last - cl->buf->pos,
|
|
|
|
cl->buf->file_pos,
|
|
|
|
cl->buf->file_last - cl->buf->file_pos);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* TODO: coalesce neighbouring buffers */
|
|
|
|
|
2012-11-27 02:01:08 +08:00
|
|
|
if (ngx_chain_add_copy(r->pool, &rb->bufs, in) != NGX_OK) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
2012-11-21 09:08:11 +08:00
|
|
|
|
2016-03-01 20:18:07 +08:00
|
|
|
if (r->request_body_no_buffering) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rb->rest > 0) {
|
|
|
|
|
|
|
|
if (rb->buf && rb->buf->last == rb->buf->end
|
|
|
|
&& ngx_http_write_request_body(r) != NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* rb->rest == 0 */
|
|
|
|
|
|
|
|
if (rb->temp_file || r->request_body_in_file_only) {
|
|
|
|
|
2015-03-24 02:09:19 +08:00
|
|
|
if (ngx_http_write_request_body(r) != NGX_OK) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
2016-03-01 20:18:07 +08:00
|
|
|
|
|
|
|
if (rb->temp_file->file.offset != 0) {
|
|
|
|
|
|
|
|
cl = ngx_chain_get_free_buf(r->pool, &rb->free);
|
|
|
|
if (cl == NULL) {
|
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
b = cl->buf;
|
|
|
|
|
|
|
|
ngx_memzero(b, sizeof(ngx_buf_t));
|
|
|
|
|
|
|
|
b->in_file = 1;
|
|
|
|
b->file_last = rb->temp_file->file.offset;
|
|
|
|
b->file = &rb->temp_file->file;
|
|
|
|
|
|
|
|
rb->bufs = cl;
|
|
|
|
}
|
2015-03-24 02:09:19 +08:00
|
|
|
}
|
|
|
|
|
2012-11-21 09:08:11 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|