2002-08-16 23:27:03 +08:00
|
|
|
|
2004-09-28 16:34:51 +08:00
|
|
|
/*
|
2004-09-30 00:00:49 +08:00
|
|
|
* Copyright (C) Igor Sysoev
|
2012-01-18 23:07:43 +08:00
|
|
|
* Copyright (C) Nginx, Inc.
|
2004-09-28 16:34:51 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
2002-08-20 22:48:28 +08:00
|
|
|
#include <ngx_config.h>
|
2003-06-03 23:42:58 +08:00
|
|
|
#include <ngx_core.h>
|
2002-08-16 23:27:03 +08:00
|
|
|
#include <ngx_http.h>
|
|
|
|
|
|
|
|
|
2003-05-27 20:18:54 +08:00
|
|
|
static char *ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf);
|
2008-05-22 17:57:47 +08:00
|
|
|
static ngx_int_t ngx_http_init_phases(ngx_conf_t *cf,
|
|
|
|
ngx_http_core_main_conf_t *cmcf);
|
|
|
|
static ngx_int_t ngx_http_init_headers_in_hash(ngx_conf_t *cf,
|
|
|
|
ngx_http_core_main_conf_t *cmcf);
|
|
|
|
static ngx_int_t ngx_http_init_phase_handlers(ngx_conf_t *cf,
|
|
|
|
ngx_http_core_main_conf_t *cmcf);
|
2008-05-22 19:07:08 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
static ngx_int_t ngx_http_add_addresses(ngx_conf_t *cf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_core_srv_conf_t *cscf, ngx_http_conf_port_t *port,
|
2009-10-22 00:47:44 +08:00
|
|
|
ngx_http_listen_opt_t *lsopt);
|
2004-10-21 23:34:38 +08:00
|
|
|
static ngx_int_t ngx_http_add_address(ngx_conf_t *cf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_core_srv_conf_t *cscf, ngx_http_conf_port_t *port,
|
2009-10-22 00:47:44 +08:00
|
|
|
ngx_http_listen_opt_t *lsopt);
|
2009-10-22 00:27:48 +08:00
|
|
|
static ngx_int_t ngx_http_add_server(ngx_conf_t *cf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_core_srv_conf_t *cscf, ngx_http_conf_addr_t *addr);
|
2008-05-22 19:07:08 +08:00
|
|
|
|
2010-08-02 23:28:04 +08:00
|
|
|
static char *ngx_http_merge_servers(ngx_conf_t *cf,
|
|
|
|
ngx_http_core_main_conf_t *cmcf, ngx_http_module_t *module,
|
|
|
|
ngx_uint_t ctx_index);
|
2004-07-19 03:11:20 +08:00
|
|
|
static char *ngx_http_merge_locations(ngx_conf_t *cf,
|
2008-05-24 22:14:13 +08:00
|
|
|
ngx_queue_t *locations, void **loc_conf, ngx_http_module_t *module,
|
2005-03-04 22:06:57 +08:00
|
|
|
ngx_uint_t ctx_index);
|
2008-05-24 22:14:13 +08:00
|
|
|
static ngx_int_t ngx_http_init_locations(ngx_conf_t *cf,
|
|
|
|
ngx_http_core_srv_conf_t *cscf, ngx_http_core_loc_conf_t *pclcf);
|
|
|
|
static ngx_int_t ngx_http_init_static_location_trees(ngx_conf_t *cf,
|
|
|
|
ngx_http_core_loc_conf_t *pclcf);
|
|
|
|
static ngx_int_t ngx_http_cmp_locations(const ngx_queue_t *one,
|
|
|
|
const ngx_queue_t *two);
|
|
|
|
static ngx_int_t ngx_http_join_exact_locations(ngx_conf_t *cf,
|
|
|
|
ngx_queue_t *locations);
|
|
|
|
static void ngx_http_create_locations_list(ngx_queue_t *locations,
|
|
|
|
ngx_queue_t *q);
|
|
|
|
static ngx_http_location_tree_node_t *
|
|
|
|
ngx_http_create_locations_tree(ngx_conf_t *cf, ngx_queue_t *locations,
|
|
|
|
size_t prefix);
|
2008-05-22 19:07:08 +08:00
|
|
|
|
|
|
|
static ngx_int_t ngx_http_optimize_servers(ngx_conf_t *cf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_core_main_conf_t *cmcf, ngx_array_t *ports);
|
2009-02-19 00:17:12 +08:00
|
|
|
static ngx_int_t ngx_http_server_names(ngx_conf_t *cf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_core_main_conf_t *cmcf, ngx_http_conf_addr_t *addr);
|
|
|
|
static ngx_int_t ngx_http_cmp_conf_addrs(const void *one, const void *two);
|
2005-12-27 01:07:48 +08:00
|
|
|
static int ngx_libc_cdecl ngx_http_cmp_dns_wildcards(const void *one,
|
|
|
|
const void *two);
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
static ngx_int_t ngx_http_init_listening(ngx_conf_t *cf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_conf_port_t *port);
|
|
|
|
static ngx_listening_t *ngx_http_add_listening(ngx_conf_t *cf,
|
|
|
|
ngx_http_conf_addr_t *addr);
|
|
|
|
static ngx_int_t ngx_http_add_addrs(ngx_conf_t *cf, ngx_http_port_t *hport,
|
|
|
|
ngx_http_conf_addr_t *addr);
|
|
|
|
#if (NGX_HAVE_INET6)
|
|
|
|
static ngx_int_t ngx_http_add_addrs6(ngx_conf_t *cf, ngx_http_port_t *hport,
|
|
|
|
ngx_http_conf_addr_t *addr);
|
|
|
|
#endif
|
2008-05-22 19:07:08 +08:00
|
|
|
|
2005-12-27 01:07:48 +08:00
|
|
|
ngx_uint_t ngx_http_max_module;
|
2003-12-19 16:15:11 +08:00
|
|
|
|
2003-01-10 14:09:20 +08:00
|
|
|
|
2004-06-16 23:32:11 +08:00
|
|
|
ngx_int_t (*ngx_http_top_header_filter) (ngx_http_request_t *r);
|
|
|
|
ngx_int_t (*ngx_http_top_body_filter) (ngx_http_request_t *r, ngx_chain_t *ch);
|
2003-01-09 13:36:00 +08:00
|
|
|
|
|
|
|
|
2008-08-12 21:11:36 +08:00
|
|
|
ngx_str_t ngx_http_html_default_types[] = {
|
|
|
|
ngx_string("text/html"),
|
|
|
|
ngx_null_string
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2003-01-09 13:36:00 +08:00
|
|
|
static ngx_command_t ngx_http_commands[] = {
|
|
|
|
|
2005-03-04 22:06:57 +08:00
|
|
|
{ ngx_string("http"),
|
|
|
|
NGX_MAIN_CONF|NGX_CONF_BLOCK|NGX_CONF_NOARGS,
|
|
|
|
ngx_http_block,
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
NULL },
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2005-03-04 22:06:57 +08:00
|
|
|
ngx_null_command
|
2003-01-09 13:36:00 +08:00
|
|
|
};
|
|
|
|
|
2005-11-15 21:30:52 +08:00
|
|
|
|
2004-04-13 00:38:09 +08:00
|
|
|
static ngx_core_module_t ngx_http_module_ctx = {
|
|
|
|
ngx_string("http"),
|
|
|
|
NULL,
|
|
|
|
NULL
|
2005-11-15 21:30:52 +08:00
|
|
|
};
|
2004-04-13 00:38:09 +08:00
|
|
|
|
2003-01-09 13:36:00 +08:00
|
|
|
|
|
|
|
ngx_module_t ngx_http_module = {
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
NGX_MODULE_V1,
|
2004-04-13 00:38:09 +08:00
|
|
|
&ngx_http_module_ctx, /* module context */
|
2003-01-09 13:36:00 +08:00
|
|
|
ngx_http_commands, /* module directives */
|
2003-05-27 20:18:54 +08:00
|
|
|
NGX_CORE_MODULE, /* module type */
|
2005-09-08 22:36:09 +08:00
|
|
|
NULL, /* init master */
|
2003-07-11 12:50:59 +08:00
|
|
|
NULL, /* init module */
|
2005-09-08 22:36:09 +08:00
|
|
|
NULL, /* init process */
|
|
|
|
NULL, /* init thread */
|
|
|
|
NULL, /* exit thread */
|
|
|
|
NULL, /* exit process */
|
|
|
|
NULL, /* exit master */
|
|
|
|
NGX_MODULE_V1_PADDING
|
2003-01-09 13:36:00 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2005-03-04 22:06:57 +08:00
|
|
|
static char *
|
|
|
|
ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
|
2003-01-09 13:36:00 +08:00
|
|
|
{
|
2004-09-09 23:40:48 +08:00
|
|
|
char *rv;
|
2008-05-22 19:07:08 +08:00
|
|
|
ngx_uint_t mi, m, s;
|
2003-12-26 04:26:58 +08:00
|
|
|
ngx_conf_t pcf;
|
2003-05-20 00:39:14 +08:00
|
|
|
ngx_http_module_t *module;
|
|
|
|
ngx_http_conf_ctx_t *ctx;
|
2008-05-24 22:14:13 +08:00
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
2008-05-22 19:07:08 +08:00
|
|
|
ngx_http_core_srv_conf_t **cscfp;
|
2003-12-26 04:26:58 +08:00
|
|
|
ngx_http_core_main_conf_t *cmcf;
|
2003-05-20 00:39:14 +08:00
|
|
|
|
|
|
|
/* the main http context */
|
2004-12-21 20:30:30 +08:00
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
ctx = ngx_pcalloc(cf->pool, sizeof(ngx_http_conf_ctx_t));
|
|
|
|
if (ctx == NULL) {
|
2005-02-04 03:33:37 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2003-05-16 23:27:48 +08:00
|
|
|
*(ngx_http_conf_ctx_t **) conf = ctx;
|
|
|
|
|
2005-02-04 03:33:37 +08:00
|
|
|
|
2003-05-20 00:39:14 +08:00
|
|
|
/* count the number of the http modules and set up their indices */
|
|
|
|
|
2003-04-08 23:40:10 +08:00
|
|
|
ngx_http_max_module = 0;
|
2003-05-20 00:39:14 +08:00
|
|
|
for (m = 0; ngx_modules[m]; m++) {
|
2003-05-27 20:18:54 +08:00
|
|
|
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
|
2003-01-09 13:36:00 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2003-05-27 20:18:54 +08:00
|
|
|
ngx_modules[m]->ctx_index = ngx_http_max_module++;
|
2003-01-09 13:36:00 +08:00
|
|
|
}
|
|
|
|
|
2004-12-21 20:30:30 +08:00
|
|
|
|
2005-02-04 03:33:37 +08:00
|
|
|
/* the http main_conf context, it is the same in the all http contexts */
|
|
|
|
|
|
|
|
ctx->main_conf = ngx_pcalloc(cf->pool,
|
|
|
|
sizeof(void *) * ngx_http_max_module);
|
|
|
|
if (ctx->main_conf == NULL) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* the http null srv_conf context, it is used to merge
|
|
|
|
* the server{}s' srv_conf's
|
|
|
|
*/
|
|
|
|
|
|
|
|
ctx->srv_conf = ngx_pcalloc(cf->pool, sizeof(void *) * ngx_http_max_module);
|
|
|
|
if (ctx->srv_conf == NULL) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
2003-05-16 23:27:48 +08:00
|
|
|
|
2005-02-04 03:33:37 +08:00
|
|
|
/*
|
|
|
|
* the http null loc_conf context, it is used to merge
|
|
|
|
* the server{}s' loc_conf's
|
|
|
|
*/
|
2003-05-16 23:27:48 +08:00
|
|
|
|
2005-02-04 03:33:37 +08:00
|
|
|
ctx->loc_conf = ngx_pcalloc(cf->pool, sizeof(void *) * ngx_http_max_module);
|
|
|
|
if (ctx->loc_conf == NULL) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2003-05-20 00:39:14 +08:00
|
|
|
|
2005-02-04 03:33:37 +08:00
|
|
|
/*
|
|
|
|
* create the main_conf's, the null srv_conf's, and the null loc_conf's
|
|
|
|
* of the all http modules
|
|
|
|
*/
|
2003-05-20 00:39:14 +08:00
|
|
|
|
|
|
|
for (m = 0; ngx_modules[m]; m++) {
|
2003-05-27 20:18:54 +08:00
|
|
|
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
|
2003-01-09 13:36:00 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2003-05-27 20:18:54 +08:00
|
|
|
module = ngx_modules[m]->ctx;
|
|
|
|
mi = ngx_modules[m]->ctx_index;
|
2003-05-20 00:39:14 +08:00
|
|
|
|
|
|
|
if (module->create_main_conf) {
|
2005-03-19 20:38:37 +08:00
|
|
|
ctx->main_conf[mi] = module->create_main_conf(cf);
|
|
|
|
if (ctx->main_conf[mi] == NULL) {
|
2005-02-04 03:33:37 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
2003-05-20 00:39:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (module->create_srv_conf) {
|
2005-03-19 20:38:37 +08:00
|
|
|
ctx->srv_conf[mi] = module->create_srv_conf(cf);
|
|
|
|
if (ctx->srv_conf[mi] == NULL) {
|
2005-02-04 03:33:37 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
2003-05-20 00:39:14 +08:00
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
|
|
|
|
if (module->create_loc_conf) {
|
2005-03-19 20:38:37 +08:00
|
|
|
ctx->loc_conf[mi] = module->create_loc_conf(cf);
|
|
|
|
if (ctx->loc_conf[mi] == NULL) {
|
2005-02-04 03:33:37 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
pcf = *cf;
|
|
|
|
cf->ctx = ctx;
|
|
|
|
|
|
|
|
for (m = 0; ngx_modules[m]; m++) {
|
|
|
|
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
module = ngx_modules[m]->ctx;
|
|
|
|
|
|
|
|
if (module->preconfiguration) {
|
|
|
|
if (module->preconfiguration(cf) != NGX_OK) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2005-02-04 03:33:37 +08:00
|
|
|
|
2003-05-20 00:39:14 +08:00
|
|
|
/* parse inside the http{} block */
|
|
|
|
|
2003-05-27 20:18:54 +08:00
|
|
|
cf->module_type = NGX_HTTP_MODULE;
|
2003-05-15 01:13:13 +08:00
|
|
|
cf->cmd_type = NGX_HTTP_MAIN_CONF;
|
2003-01-09 13:36:00 +08:00
|
|
|
rv = ngx_conf_parse(cf, NULL);
|
|
|
|
|
2003-11-10 04:03:38 +08:00
|
|
|
if (rv != NGX_CONF_OK) {
|
2008-05-24 22:14:13 +08:00
|
|
|
goto failed;
|
2003-11-10 04:03:38 +08:00
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2003-11-10 04:03:38 +08:00
|
|
|
/*
|
|
|
|
* init http{} main_conf's, merge the server{}s' srv_conf's
|
|
|
|
* and its location{}s' loc_conf's
|
|
|
|
*/
|
2003-05-20 00:39:14 +08:00
|
|
|
|
2003-05-27 20:18:54 +08:00
|
|
|
cmcf = ctx->main_conf[ngx_http_core_module.ctx_index];
|
2003-05-30 22:27:59 +08:00
|
|
|
cscfp = cmcf->servers.elts;
|
2003-05-20 00:39:14 +08:00
|
|
|
|
|
|
|
for (m = 0; ngx_modules[m]; m++) {
|
2003-05-27 20:18:54 +08:00
|
|
|
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
|
2003-05-20 00:39:14 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2003-05-30 22:27:59 +08:00
|
|
|
module = ngx_modules[m]->ctx;
|
2003-05-27 20:18:54 +08:00
|
|
|
mi = ngx_modules[m]->ctx_index;
|
2003-05-20 00:39:14 +08:00
|
|
|
|
|
|
|
/* init http{} main_conf's */
|
|
|
|
|
|
|
|
if (module->init_main_conf) {
|
2003-07-21 05:15:59 +08:00
|
|
|
rv = module->init_main_conf(cf, ctx->main_conf[mi]);
|
2003-05-20 00:39:14 +08:00
|
|
|
if (rv != NGX_CONF_OK) {
|
2008-05-24 22:14:13 +08:00
|
|
|
goto failed;
|
2003-05-20 00:39:14 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-02 23:28:04 +08:00
|
|
|
rv = ngx_http_merge_servers(cf, cmcf, module, mi);
|
|
|
|
if (rv != NGX_CONF_OK) {
|
|
|
|
goto failed;
|
2003-01-28 23:56:37 +08:00
|
|
|
}
|
|
|
|
}
|
2003-05-20 00:39:14 +08:00
|
|
|
|
2005-02-04 03:33:37 +08:00
|
|
|
|
2008-05-24 22:14:13 +08:00
|
|
|
/* create location trees */
|
|
|
|
|
|
|
|
for (s = 0; s < cmcf->servers.nelts; s++) {
|
|
|
|
|
|
|
|
clcf = cscfp[s]->ctx->loc_conf[ngx_http_core_module.ctx_index];
|
|
|
|
|
|
|
|
if (ngx_http_init_locations(cf, cscfp[s], clcf) != NGX_OK) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_http_init_static_location_trees(cf, clcf) != NGX_OK) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-05-22 17:57:47 +08:00
|
|
|
if (ngx_http_init_phases(cf, cmcf) != NGX_OK) {
|
2005-02-04 03:33:37 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
2008-05-22 17:57:47 +08:00
|
|
|
if (ngx_http_init_headers_in_hash(cf, cmcf) != NGX_OK) {
|
2006-05-11 22:43:47 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
|
|
|
|
for (m = 0; ngx_modules[m]; m++) {
|
|
|
|
if (ngx_modules[m]->type != NGX_HTTP_MODULE) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
module = ngx_modules[m]->ctx;
|
|
|
|
|
|
|
|
if (module->postconfiguration) {
|
|
|
|
if (module->postconfiguration(cf) != NGX_OK) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
nginx-0.3.8-RELEASE import
*) Security: nginx now checks URI got from a backend in
"X-Accel-Redirect" header line or in SSI file for the "/../" paths
and zeroes.
*) Change: nginx now does not treat the empty user name in the
"Authorization" header line as valid one.
*) Feature: the "ssl_session_timeout" directives of the
ngx_http_ssl_module and ngx_imap_ssl_module.
*) Feature: the "auth_http_header" directive of the
ngx_imap_auth_http_module.
*) Feature: the "add_header" directive.
*) Feature: the ngx_http_realip_module.
*) Feature: the new variables to use in the "log_format" directive:
$bytes_sent, $apache_bytes_sent, $status, $time_gmt, $uri,
$request_time, $request_length, $upstream_status,
$upstream_response_time, $gzip_ratio, $uid_got, $uid_set,
$connection, $pipe, and $msec. The parameters in the "%name" form
will be canceled soon.
*) Change: now the false variable values in the "if" directive are the
empty string "" and string starting with "0".
*) Bugfix: while using proxied or FastCGI-server nginx may leave
connections and temporary files with client requests in open state.
*) Bugfix: the worker processes did not flush the buffered logs on
graceful exit.
*) Bugfix: if the request URI was changes by the "rewrite" directive
and the request was proxied in location given by regular expression,
then the incorrect request was transferred to backend; the bug had
appeared in 0.2.6.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" header.
*) Bugfix: nginx may stop to accept requests if the "rtsig" method and
several worker processes were used.
*) Bugfix: the "\"" and "\'" escape symbols were incorrectly handled in
SSI commands.
*) Bugfix: if the response was ended just after the SSI command and
gzipping was used, then the response did not transferred complete or
did not transferred at all.
2005-11-10 01:25:55 +08:00
|
|
|
if (ngx_http_variables_init_vars(cf) != NGX_OK) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* http{}'s cf->ctx was needed while the configuration merging
|
|
|
|
* and in postconfiguration process
|
|
|
|
*/
|
|
|
|
|
|
|
|
*cf = pcf;
|
|
|
|
|
2005-04-08 23:18:55 +08:00
|
|
|
|
2008-05-22 17:57:47 +08:00
|
|
|
if (ngx_http_init_phase_handlers(cf, cmcf) != NGX_OK) {
|
2006-08-30 18:39:17 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
/* optimize the lists of ports, addresses and server names */
|
|
|
|
|
2009-10-21 16:19:46 +08:00
|
|
|
if (ngx_http_optimize_servers(cf, cmcf, cmcf->ports) != NGX_OK) {
|
2008-05-22 19:07:08 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_CONF_OK;
|
2008-05-24 22:14:13 +08:00
|
|
|
|
|
|
|
failed:
|
|
|
|
|
|
|
|
*cf = pcf;
|
|
|
|
|
|
|
|
return rv;
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_init_phases(ngx_conf_t *cf, ngx_http_core_main_conf_t *cmcf)
|
|
|
|
{
|
|
|
|
if (ngx_array_init(&cmcf->phases[NGX_HTTP_POST_READ_PHASE].handlers,
|
|
|
|
cf->pool, 1, sizeof(ngx_http_handler_pt))
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_array_init(&cmcf->phases[NGX_HTTP_SERVER_REWRITE_PHASE].handlers,
|
|
|
|
cf->pool, 1, sizeof(ngx_http_handler_pt))
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_array_init(&cmcf->phases[NGX_HTTP_REWRITE_PHASE].handlers,
|
|
|
|
cf->pool, 1, sizeof(ngx_http_handler_pt))
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_array_init(&cmcf->phases[NGX_HTTP_PREACCESS_PHASE].handlers,
|
|
|
|
cf->pool, 1, sizeof(ngx_http_handler_pt))
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_array_init(&cmcf->phases[NGX_HTTP_ACCESS_PHASE].handlers,
|
|
|
|
cf->pool, 2, sizeof(ngx_http_handler_pt))
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_array_init(&cmcf->phases[NGX_HTTP_CONTENT_PHASE].handlers,
|
|
|
|
cf->pool, 4, sizeof(ngx_http_handler_pt))
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_array_init(&cmcf->phases[NGX_HTTP_LOG_PHASE].handlers,
|
|
|
|
cf->pool, 1, sizeof(ngx_http_handler_pt))
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_init_headers_in_hash(ngx_conf_t *cf, ngx_http_core_main_conf_t *cmcf)
|
|
|
|
{
|
|
|
|
ngx_array_t headers_in;
|
|
|
|
ngx_hash_key_t *hk;
|
|
|
|
ngx_hash_init_t hash;
|
|
|
|
ngx_http_header_t *header;
|
|
|
|
|
|
|
|
if (ngx_array_init(&headers_in, cf->temp_pool, 32, sizeof(ngx_hash_key_t))
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (header = ngx_http_headers_in; header->name.len; header++) {
|
|
|
|
hk = ngx_array_push(&headers_in);
|
|
|
|
if (hk == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
hk->key = header->name;
|
|
|
|
hk->key_hash = ngx_hash_key_lc(header->name.data, header->name.len);
|
|
|
|
hk->value = header;
|
|
|
|
}
|
|
|
|
|
|
|
|
hash.hash = &cmcf->headers_in_hash;
|
|
|
|
hash.key = ngx_hash_key_lc;
|
|
|
|
hash.max_size = 512;
|
|
|
|
hash.bucket_size = ngx_align(64, ngx_cacheline_size);
|
|
|
|
hash.name = "headers_in_hash";
|
|
|
|
hash.pool = cf->pool;
|
|
|
|
hash.temp_pool = NULL;
|
|
|
|
|
|
|
|
if (ngx_hash_init(&hash, headers_in.elts, headers_in.nelts) != NGX_OK) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_init_phase_handlers(ngx_conf_t *cf, ngx_http_core_main_conf_t *cmcf)
|
|
|
|
{
|
|
|
|
ngx_int_t j;
|
|
|
|
ngx_uint_t i, n;
|
|
|
|
ngx_uint_t find_config_index, use_rewrite, use_access;
|
|
|
|
ngx_http_handler_pt *h;
|
|
|
|
ngx_http_phase_handler_t *ph;
|
|
|
|
ngx_http_phase_handler_pt checker;
|
|
|
|
|
|
|
|
cmcf->phase_engine.server_rewrite_index = (ngx_uint_t) -1;
|
|
|
|
cmcf->phase_engine.location_rewrite_index = (ngx_uint_t) -1;
|
|
|
|
find_config_index = 0;
|
|
|
|
use_rewrite = cmcf->phases[NGX_HTTP_REWRITE_PHASE].handlers.nelts ? 1 : 0;
|
|
|
|
use_access = cmcf->phases[NGX_HTTP_ACCESS_PHASE].handlers.nelts ? 1 : 0;
|
|
|
|
|
2008-12-15 18:56:48 +08:00
|
|
|
n = use_rewrite + use_access + cmcf->try_files + 1 /* find config phase */;
|
2008-05-22 19:07:08 +08:00
|
|
|
|
|
|
|
for (i = 0; i < NGX_HTTP_LOG_PHASE; i++) {
|
|
|
|
n += cmcf->phases[i].handlers.nelts;
|
|
|
|
}
|
|
|
|
|
|
|
|
ph = ngx_pcalloc(cf->pool,
|
|
|
|
n * sizeof(ngx_http_phase_handler_t) + sizeof(void *));
|
|
|
|
if (ph == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmcf->phase_engine.handlers = ph;
|
|
|
|
n = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < NGX_HTTP_LOG_PHASE; i++) {
|
|
|
|
h = cmcf->phases[i].handlers.elts;
|
|
|
|
|
|
|
|
switch (i) {
|
|
|
|
|
|
|
|
case NGX_HTTP_SERVER_REWRITE_PHASE:
|
|
|
|
if (cmcf->phase_engine.server_rewrite_index == (ngx_uint_t) -1) {
|
|
|
|
cmcf->phase_engine.server_rewrite_index = n;
|
|
|
|
}
|
2010-06-18 23:15:20 +08:00
|
|
|
checker = ngx_http_core_rewrite_phase;
|
2008-05-22 19:07:08 +08:00
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NGX_HTTP_FIND_CONFIG_PHASE:
|
|
|
|
find_config_index = n;
|
|
|
|
|
|
|
|
ph->checker = ngx_http_core_find_config_phase;
|
|
|
|
n++;
|
|
|
|
ph++;
|
|
|
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
case NGX_HTTP_REWRITE_PHASE:
|
|
|
|
if (cmcf->phase_engine.location_rewrite_index == (ngx_uint_t) -1) {
|
|
|
|
cmcf->phase_engine.location_rewrite_index = n;
|
|
|
|
}
|
2010-06-18 23:15:20 +08:00
|
|
|
checker = ngx_http_core_rewrite_phase;
|
2008-05-22 19:07:08 +08:00
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NGX_HTTP_POST_REWRITE_PHASE:
|
|
|
|
if (use_rewrite) {
|
|
|
|
ph->checker = ngx_http_core_post_rewrite_phase;
|
|
|
|
ph->next = find_config_index;
|
|
|
|
n++;
|
|
|
|
ph++;
|
|
|
|
}
|
|
|
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
case NGX_HTTP_ACCESS_PHASE:
|
|
|
|
checker = ngx_http_core_access_phase;
|
|
|
|
n++;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NGX_HTTP_POST_ACCESS_PHASE:
|
|
|
|
if (use_access) {
|
|
|
|
ph->checker = ngx_http_core_post_access_phase;
|
|
|
|
ph->next = n;
|
|
|
|
ph++;
|
|
|
|
}
|
|
|
|
|
|
|
|
continue;
|
|
|
|
|
2008-12-15 18:56:48 +08:00
|
|
|
case NGX_HTTP_TRY_FILES_PHASE:
|
|
|
|
if (cmcf->try_files) {
|
|
|
|
ph->checker = ngx_http_core_try_files_phase;
|
|
|
|
n++;
|
|
|
|
ph++;
|
|
|
|
}
|
|
|
|
|
|
|
|
continue;
|
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
case NGX_HTTP_CONTENT_PHASE:
|
|
|
|
checker = ngx_http_core_content_phase;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
checker = ngx_http_core_generic_phase;
|
|
|
|
}
|
|
|
|
|
|
|
|
n += cmcf->phases[i].handlers.nelts;
|
|
|
|
|
|
|
|
for (j = cmcf->phases[i].handlers.nelts - 1; j >=0; j--) {
|
|
|
|
ph->checker = checker;
|
|
|
|
ph->handler = h[j];
|
|
|
|
ph->next = n;
|
|
|
|
ph++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-08-02 23:28:04 +08:00
|
|
|
static char *
|
|
|
|
ngx_http_merge_servers(ngx_conf_t *cf, ngx_http_core_main_conf_t *cmcf,
|
|
|
|
ngx_http_module_t *module, ngx_uint_t ctx_index)
|
|
|
|
{
|
|
|
|
char *rv;
|
|
|
|
ngx_uint_t s;
|
|
|
|
ngx_http_conf_ctx_t *ctx, saved;
|
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
|
|
|
ngx_http_core_srv_conf_t **cscfp;
|
|
|
|
|
|
|
|
cscfp = cmcf->servers.elts;
|
|
|
|
ctx = (ngx_http_conf_ctx_t *) cf->ctx;
|
|
|
|
saved = *ctx;
|
|
|
|
rv = NGX_CONF_OK;
|
|
|
|
|
|
|
|
for (s = 0; s < cmcf->servers.nelts; s++) {
|
|
|
|
|
|
|
|
/* merge the server{}s' srv_conf's */
|
|
|
|
|
|
|
|
ctx->srv_conf = cscfp[s]->ctx->srv_conf;
|
|
|
|
|
|
|
|
if (module->merge_srv_conf) {
|
|
|
|
rv = module->merge_srv_conf(cf, saved.srv_conf[ctx_index],
|
|
|
|
cscfp[s]->ctx->srv_conf[ctx_index]);
|
|
|
|
if (rv != NGX_CONF_OK) {
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (module->merge_loc_conf) {
|
|
|
|
|
|
|
|
/* merge the server{}'s loc_conf */
|
|
|
|
|
|
|
|
ctx->loc_conf = cscfp[s]->ctx->loc_conf;
|
|
|
|
|
|
|
|
rv = module->merge_loc_conf(cf, saved.loc_conf[ctx_index],
|
|
|
|
cscfp[s]->ctx->loc_conf[ctx_index]);
|
|
|
|
if (rv != NGX_CONF_OK) {
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* merge the locations{}' loc_conf's */
|
|
|
|
|
|
|
|
clcf = cscfp[s]->ctx->loc_conf[ngx_http_core_module.ctx_index];
|
|
|
|
|
|
|
|
rv = ngx_http_merge_locations(cf, clcf->locations,
|
|
|
|
cscfp[s]->ctx->loc_conf,
|
|
|
|
module, ctx_index);
|
|
|
|
if (rv != NGX_CONF_OK) {
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
failed:
|
|
|
|
|
|
|
|
*ctx = saved;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-05-24 22:14:13 +08:00
|
|
|
static char *
|
|
|
|
ngx_http_merge_locations(ngx_conf_t *cf, ngx_queue_t *locations,
|
|
|
|
void **loc_conf, ngx_http_module_t *module, ngx_uint_t ctx_index)
|
|
|
|
{
|
|
|
|
char *rv;
|
|
|
|
ngx_queue_t *q;
|
2010-08-02 23:28:04 +08:00
|
|
|
ngx_http_conf_ctx_t *ctx, saved;
|
2008-05-24 22:14:13 +08:00
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
|
|
|
ngx_http_location_queue_t *lq;
|
|
|
|
|
|
|
|
if (locations == NULL) {
|
|
|
|
return NGX_CONF_OK;
|
|
|
|
}
|
|
|
|
|
2010-08-02 23:28:04 +08:00
|
|
|
ctx = (ngx_http_conf_ctx_t *) cf->ctx;
|
|
|
|
saved = *ctx;
|
|
|
|
|
2008-05-24 22:14:13 +08:00
|
|
|
for (q = ngx_queue_head(locations);
|
|
|
|
q != ngx_queue_sentinel(locations);
|
|
|
|
q = ngx_queue_next(q))
|
|
|
|
{
|
|
|
|
lq = (ngx_http_location_queue_t *) q;
|
|
|
|
|
|
|
|
clcf = lq->exact ? lq->exact : lq->inclusive;
|
2010-08-02 23:28:04 +08:00
|
|
|
ctx->loc_conf = clcf->loc_conf;
|
2008-05-24 22:14:13 +08:00
|
|
|
|
|
|
|
rv = module->merge_loc_conf(cf, loc_conf[ctx_index],
|
|
|
|
clcf->loc_conf[ctx_index]);
|
|
|
|
if (rv != NGX_CONF_OK) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = ngx_http_merge_locations(cf, clcf->locations, clcf->loc_conf,
|
|
|
|
module, ctx_index);
|
|
|
|
if (rv != NGX_CONF_OK) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-02 23:28:04 +08:00
|
|
|
*ctx = saved;
|
|
|
|
|
2008-05-24 22:14:13 +08:00
|
|
|
return NGX_CONF_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_init_locations(ngx_conf_t *cf, ngx_http_core_srv_conf_t *cscf,
|
|
|
|
ngx_http_core_loc_conf_t *pclcf)
|
|
|
|
{
|
|
|
|
ngx_uint_t n;
|
|
|
|
ngx_queue_t *q, *locations, *named, tail;
|
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
|
|
|
ngx_http_location_queue_t *lq;
|
|
|
|
ngx_http_core_loc_conf_t **clcfp;
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
ngx_uint_t r;
|
|
|
|
ngx_queue_t *regex;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
locations = pclcf->locations;
|
|
|
|
|
|
|
|
if (locations == NULL) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_queue_sort(locations, ngx_http_cmp_locations);
|
|
|
|
|
|
|
|
named = NULL;
|
|
|
|
n = 0;
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
regex = NULL;
|
|
|
|
r = 0;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
for (q = ngx_queue_head(locations);
|
|
|
|
q != ngx_queue_sentinel(locations);
|
|
|
|
q = ngx_queue_next(q))
|
|
|
|
{
|
|
|
|
lq = (ngx_http_location_queue_t *) q;
|
|
|
|
|
|
|
|
clcf = lq->exact ? lq->exact : lq->inclusive;
|
|
|
|
|
|
|
|
if (ngx_http_init_locations(cf, NULL, clcf) != NGX_OK) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
|
|
|
|
if (clcf->regex) {
|
|
|
|
r++;
|
|
|
|
|
|
|
|
if (regex == NULL) {
|
|
|
|
regex = q;
|
|
|
|
}
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (clcf->named) {
|
|
|
|
n++;
|
|
|
|
|
|
|
|
if (named == NULL) {
|
|
|
|
named = q;
|
|
|
|
}
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (clcf->noname) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (q != ngx_queue_sentinel(locations)) {
|
|
|
|
ngx_queue_split(locations, q, &tail);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (named) {
|
|
|
|
clcfp = ngx_palloc(cf->pool,
|
|
|
|
(n + 1) * sizeof(ngx_http_core_loc_conf_t **));
|
|
|
|
if (clcfp == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
cscf->named_locations = clcfp;
|
|
|
|
|
|
|
|
for (q = named;
|
|
|
|
q != ngx_queue_sentinel(locations);
|
|
|
|
q = ngx_queue_next(q))
|
|
|
|
{
|
|
|
|
lq = (ngx_http_location_queue_t *) q;
|
|
|
|
|
|
|
|
*(clcfp++) = lq->exact;
|
|
|
|
}
|
|
|
|
|
|
|
|
*clcfp = NULL;
|
|
|
|
|
|
|
|
ngx_queue_split(locations, named, &tail);
|
|
|
|
}
|
|
|
|
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
|
|
|
|
if (regex) {
|
|
|
|
|
|
|
|
clcfp = ngx_palloc(cf->pool,
|
|
|
|
(r + 1) * sizeof(ngx_http_core_loc_conf_t **));
|
|
|
|
if (clcfp == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
pclcf->regex_locations = clcfp;
|
|
|
|
|
|
|
|
for (q = regex;
|
|
|
|
q != ngx_queue_sentinel(locations);
|
|
|
|
q = ngx_queue_next(q))
|
|
|
|
{
|
|
|
|
lq = (ngx_http_location_queue_t *) q;
|
|
|
|
|
|
|
|
*(clcfp++) = lq->exact;
|
|
|
|
}
|
|
|
|
|
|
|
|
*clcfp = NULL;
|
|
|
|
|
|
|
|
ngx_queue_split(locations, regex, &tail);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_init_static_location_trees(ngx_conf_t *cf,
|
|
|
|
ngx_http_core_loc_conf_t *pclcf)
|
|
|
|
{
|
|
|
|
ngx_queue_t *q, *locations;
|
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
|
|
|
ngx_http_location_queue_t *lq;
|
|
|
|
|
|
|
|
locations = pclcf->locations;
|
|
|
|
|
|
|
|
if (locations == NULL) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_queue_empty(locations)) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (q = ngx_queue_head(locations);
|
|
|
|
q != ngx_queue_sentinel(locations);
|
|
|
|
q = ngx_queue_next(q))
|
|
|
|
{
|
|
|
|
lq = (ngx_http_location_queue_t *) q;
|
|
|
|
|
|
|
|
clcf = lq->exact ? lq->exact : lq->inclusive;
|
|
|
|
|
|
|
|
if (ngx_http_init_static_location_trees(cf, clcf) != NGX_OK) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ngx_http_join_exact_locations(cf, locations) != NGX_OK) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_http_create_locations_list(locations, ngx_queue_head(locations));
|
|
|
|
|
|
|
|
pclcf->static_locations = ngx_http_create_locations_tree(cf, locations, 0);
|
|
|
|
if (pclcf->static_locations == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
ngx_int_t
|
|
|
|
ngx_http_add_location(ngx_conf_t *cf, ngx_queue_t **locations,
|
|
|
|
ngx_http_core_loc_conf_t *clcf)
|
|
|
|
{
|
|
|
|
ngx_http_location_queue_t *lq;
|
|
|
|
|
|
|
|
if (*locations == NULL) {
|
|
|
|
*locations = ngx_palloc(cf->temp_pool,
|
|
|
|
sizeof(ngx_http_location_queue_t));
|
|
|
|
if (*locations == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_queue_init(*locations);
|
|
|
|
}
|
|
|
|
|
|
|
|
lq = ngx_palloc(cf->temp_pool, sizeof(ngx_http_location_queue_t));
|
|
|
|
if (lq == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (clcf->exact_match
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
|| clcf->regex
|
|
|
|
#endif
|
|
|
|
|| clcf->named || clcf->noname)
|
|
|
|
{
|
|
|
|
lq->exact = clcf;
|
|
|
|
lq->inclusive = NULL;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
lq->exact = NULL;
|
|
|
|
lq->inclusive = clcf;
|
|
|
|
}
|
|
|
|
|
|
|
|
lq->name = &clcf->name;
|
|
|
|
lq->file_name = cf->conf_file->file.name.data;
|
|
|
|
lq->line = cf->conf_file->line;
|
|
|
|
|
|
|
|
ngx_queue_init(&lq->list);
|
|
|
|
|
|
|
|
ngx_queue_insert_tail(*locations, &lq->queue);
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_cmp_locations(const ngx_queue_t *one, const ngx_queue_t *two)
|
|
|
|
{
|
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_http_core_loc_conf_t *first, *second;
|
|
|
|
ngx_http_location_queue_t *lq1, *lq2;
|
|
|
|
|
|
|
|
lq1 = (ngx_http_location_queue_t *) one;
|
|
|
|
lq2 = (ngx_http_location_queue_t *) two;
|
|
|
|
|
|
|
|
first = lq1->exact ? lq1->exact : lq1->inclusive;
|
|
|
|
second = lq2->exact ? lq2->exact : lq2->inclusive;
|
|
|
|
|
|
|
|
if (first->noname && !second->noname) {
|
|
|
|
/* shift no named locations to the end */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!first->noname && second->noname) {
|
|
|
|
/* shift no named locations to the end */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (first->noname || second->noname) {
|
|
|
|
/* do not sort no named locations */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (first->named && !second->named) {
|
|
|
|
/* shift named locations to the end */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!first->named && second->named) {
|
|
|
|
/* shift named locations to the end */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (first->named && second->named) {
|
|
|
|
return ngx_strcmp(first->name.data, second->name.data);
|
|
|
|
}
|
|
|
|
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
|
|
|
|
if (first->regex && !second->regex) {
|
|
|
|
/* shift the regex matches to the end */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!first->regex && second->regex) {
|
|
|
|
/* shift the regex matches to the end */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (first->regex || second->regex) {
|
|
|
|
/* do not sort the regex matches */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
rc = ngx_strcmp(first->name.data, second->name.data);
|
|
|
|
|
|
|
|
if (rc == 0 && !first->exact_match && second->exact_match) {
|
|
|
|
/* an exact match must be before the same inclusive one */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_join_exact_locations(ngx_conf_t *cf, ngx_queue_t *locations)
|
|
|
|
{
|
|
|
|
ngx_queue_t *q, *x;
|
|
|
|
ngx_http_location_queue_t *lq, *lx;
|
|
|
|
|
|
|
|
q = ngx_queue_head(locations);
|
|
|
|
|
|
|
|
while (q != ngx_queue_last(locations)) {
|
|
|
|
|
|
|
|
x = ngx_queue_next(q);
|
|
|
|
|
|
|
|
lq = (ngx_http_location_queue_t *) q;
|
|
|
|
lx = (ngx_http_location_queue_t *) x;
|
|
|
|
|
|
|
|
if (ngx_strcmp(lq->name->data, lx->name->data) == 0) {
|
|
|
|
|
|
|
|
if ((lq->exact && lx->exact) || (lq->inclusive && lx->inclusive)) {
|
|
|
|
ngx_log_error(NGX_LOG_EMERG, cf->log, 0,
|
|
|
|
"duplicate location \"%V\" in %s:%ui",
|
|
|
|
lx->name, lx->file_name, lx->line);
|
|
|
|
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
lq->inclusive = lx->inclusive;
|
|
|
|
|
|
|
|
ngx_queue_remove(x);
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
q = ngx_queue_next(q);
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
ngx_http_create_locations_list(ngx_queue_t *locations, ngx_queue_t *q)
|
|
|
|
{
|
|
|
|
u_char *name;
|
|
|
|
size_t len;
|
|
|
|
ngx_queue_t *x, tail;
|
|
|
|
ngx_http_location_queue_t *lq, *lx;
|
|
|
|
|
|
|
|
if (q == ngx_queue_last(locations)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
lq = (ngx_http_location_queue_t *) q;
|
|
|
|
|
|
|
|
if (lq->inclusive == NULL) {
|
|
|
|
ngx_http_create_locations_list(locations, ngx_queue_next(q));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
len = lq->name->len;
|
|
|
|
name = lq->name->data;
|
|
|
|
|
|
|
|
for (x = ngx_queue_next(q);
|
|
|
|
x != ngx_queue_sentinel(locations);
|
|
|
|
x = ngx_queue_next(x))
|
|
|
|
{
|
|
|
|
lx = (ngx_http_location_queue_t *) x;
|
|
|
|
|
|
|
|
if (len > lx->name->len
|
|
|
|
|| (ngx_strncmp(name, lx->name->data, len) != 0))
|
|
|
|
{
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
q = ngx_queue_next(q);
|
|
|
|
|
|
|
|
if (q == x) {
|
|
|
|
ngx_http_create_locations_list(locations, x);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_queue_split(locations, q, &tail);
|
|
|
|
ngx_queue_add(&lq->list, &tail);
|
|
|
|
|
|
|
|
if (x == ngx_queue_sentinel(locations)) {
|
|
|
|
ngx_http_create_locations_list(&lq->list, ngx_queue_head(&lq->list));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_queue_split(&lq->list, x, &tail);
|
|
|
|
ngx_queue_add(locations, &tail);
|
|
|
|
|
|
|
|
ngx_http_create_locations_list(&lq->list, ngx_queue_head(&lq->list));
|
|
|
|
|
|
|
|
ngx_http_create_locations_list(locations, x);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* to keep cache locality for left leaf nodes, allocate nodes in following
|
|
|
|
* order: node, left subtree, right subtree, inclusive subtree
|
|
|
|
*/
|
|
|
|
|
|
|
|
static ngx_http_location_tree_node_t *
|
|
|
|
ngx_http_create_locations_tree(ngx_conf_t *cf, ngx_queue_t *locations,
|
|
|
|
size_t prefix)
|
|
|
|
{
|
|
|
|
size_t len;
|
|
|
|
ngx_queue_t *q, tail;
|
|
|
|
ngx_http_location_queue_t *lq;
|
|
|
|
ngx_http_location_tree_node_t *node;
|
|
|
|
|
|
|
|
q = ngx_queue_middle(locations);
|
|
|
|
|
|
|
|
lq = (ngx_http_location_queue_t *) q;
|
|
|
|
len = lq->name->len - prefix;
|
|
|
|
|
2008-06-17 23:00:30 +08:00
|
|
|
node = ngx_palloc(cf->pool,
|
|
|
|
offsetof(ngx_http_location_tree_node_t, name) + len);
|
2008-05-24 22:14:13 +08:00
|
|
|
if (node == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2008-05-27 17:37:40 +08:00
|
|
|
node->left = NULL;
|
|
|
|
node->right = NULL;
|
|
|
|
node->tree = NULL;
|
2008-05-24 22:14:13 +08:00
|
|
|
node->exact = lq->exact;
|
|
|
|
node->inclusive = lq->inclusive;
|
|
|
|
|
|
|
|
node->auto_redirect = (u_char) ((lq->exact && lq->exact->auto_redirect)
|
|
|
|
|| (lq->inclusive && lq->inclusive->auto_redirect));
|
|
|
|
|
|
|
|
node->len = (u_char) len;
|
|
|
|
ngx_memcpy(node->name, &lq->name->data[prefix], len);
|
|
|
|
|
|
|
|
ngx_queue_split(locations, q, &tail);
|
|
|
|
|
|
|
|
if (ngx_queue_empty(locations)) {
|
|
|
|
/*
|
|
|
|
* ngx_queue_split() insures that if left part is empty,
|
|
|
|
* then right one is empty too
|
|
|
|
*/
|
|
|
|
goto inclusive;
|
|
|
|
}
|
|
|
|
|
|
|
|
node->left = ngx_http_create_locations_tree(cf, locations, prefix);
|
|
|
|
if (node->left == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_queue_remove(q);
|
|
|
|
|
|
|
|
if (ngx_queue_empty(&tail)) {
|
|
|
|
goto inclusive;
|
|
|
|
}
|
|
|
|
|
|
|
|
node->right = ngx_http_create_locations_tree(cf, &tail, prefix);
|
|
|
|
if (node->right == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
inclusive:
|
|
|
|
|
|
|
|
if (ngx_queue_empty(&lq->list)) {
|
|
|
|
return node;
|
|
|
|
}
|
|
|
|
|
|
|
|
node->tree = ngx_http_create_locations_tree(cf, &lq->list, prefix + len);
|
|
|
|
if (node->tree == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return node;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-10-21 16:19:46 +08:00
|
|
|
ngx_int_t
|
|
|
|
ngx_http_add_listen(ngx_conf_t *cf, ngx_http_core_srv_conf_t *cscf,
|
2009-10-22 00:47:44 +08:00
|
|
|
ngx_http_listen_opt_t *lsopt)
|
2008-05-22 19:07:08 +08:00
|
|
|
{
|
2009-10-21 16:19:46 +08:00
|
|
|
in_port_t p;
|
|
|
|
ngx_uint_t i;
|
|
|
|
struct sockaddr *sa;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
ngx_http_conf_port_t *port;
|
|
|
|
ngx_http_core_main_conf_t *cmcf;
|
|
|
|
#if (NGX_HAVE_INET6)
|
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
#endif
|
2004-10-21 23:34:38 +08:00
|
|
|
|
2009-10-21 16:19:46 +08:00
|
|
|
cmcf = ngx_http_conf_get_module_main_conf(cf, ngx_http_core_module);
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-10-21 16:19:46 +08:00
|
|
|
if (cmcf->ports == NULL) {
|
|
|
|
cmcf->ports = ngx_array_create(cf->temp_pool, 2,
|
|
|
|
sizeof(ngx_http_conf_port_t));
|
|
|
|
if (cmcf->ports == NULL) {
|
|
|
|
return NGX_ERROR;
|
2009-02-19 00:17:12 +08:00
|
|
|
}
|
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-12-22 23:15:45 +08:00
|
|
|
sa = &lsopt->u.sockaddr;
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
switch (sa->sa_family) {
|
|
|
|
|
|
|
|
#if (NGX_HAVE_INET6)
|
|
|
|
case AF_INET6:
|
2009-12-22 23:15:45 +08:00
|
|
|
sin6 = &lsopt->u.sockaddr_in6;
|
2009-02-21 15:02:02 +08:00
|
|
|
p = sin6->sin6_port;
|
|
|
|
break;
|
|
|
|
#endif
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-10-26 19:43:32 +08:00
|
|
|
#if (NGX_HAVE_UNIX_DOMAIN)
|
|
|
|
case AF_UNIX:
|
|
|
|
p = 0;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
default: /* AF_INET */
|
2009-12-22 23:15:45 +08:00
|
|
|
sin = &lsopt->u.sockaddr_in;
|
2009-02-21 15:02:02 +08:00
|
|
|
p = sin->sin_port;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2009-10-21 16:19:46 +08:00
|
|
|
port = cmcf->ports->elts;
|
|
|
|
for (i = 0; i < cmcf->ports->nelts; i++) {
|
2009-02-21 15:02:02 +08:00
|
|
|
|
|
|
|
if (p != port[i].port || sa->sa_family != port[i].family) {
|
2009-02-19 00:17:12 +08:00
|
|
|
continue;
|
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-05-18 04:13:29 +08:00
|
|
|
/* a port is already in the port list */
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-10-22 00:47:44 +08:00
|
|
|
return ngx_http_add_addresses(cf, cscf, &port[i], lsopt);
|
2009-02-19 00:17:12 +08:00
|
|
|
}
|
2004-10-21 23:34:38 +08:00
|
|
|
|
2009-05-18 04:13:29 +08:00
|
|
|
/* add a port to the port list */
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-10-21 16:19:46 +08:00
|
|
|
port = ngx_array_push(cmcf->ports);
|
2009-02-21 15:02:02 +08:00
|
|
|
if (port == NULL) {
|
2009-02-19 00:17:12 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
port->family = sa->sa_family;
|
|
|
|
port->port = p;
|
|
|
|
port->addrs.elts = NULL;
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-10-22 00:47:44 +08:00
|
|
|
return ngx_http_add_address(cf, cscf, port, lsopt);
|
2009-02-19 00:17:12 +08:00
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_add_addresses(ngx_conf_t *cf, ngx_http_core_srv_conf_t *cscf,
|
2009-10-22 00:47:44 +08:00
|
|
|
ngx_http_conf_port_t *port, ngx_http_listen_opt_t *lsopt)
|
2009-02-19 00:17:12 +08:00
|
|
|
{
|
2009-02-21 15:02:02 +08:00
|
|
|
u_char *p;
|
|
|
|
size_t len, off;
|
2009-10-22 18:17:54 +08:00
|
|
|
ngx_uint_t i, default_server;
|
2009-02-21 15:02:02 +08:00
|
|
|
struct sockaddr *sa;
|
|
|
|
ngx_http_conf_addr_t *addr;
|
2009-10-26 19:43:32 +08:00
|
|
|
#if (NGX_HAVE_UNIX_DOMAIN)
|
|
|
|
struct sockaddr_un *saun;
|
|
|
|
#endif
|
2010-09-27 19:48:12 +08:00
|
|
|
#if (NGX_HTTP_SSL)
|
|
|
|
ngx_uint_t ssl;
|
|
|
|
#endif
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
/*
|
2011-09-19 22:48:29 +08:00
|
|
|
* we cannot compare whole sockaddr struct's as kernel
|
2009-02-21 15:02:02 +08:00
|
|
|
* may fill some fields in inherited sockaddr struct's
|
|
|
|
*/
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-12-22 23:15:45 +08:00
|
|
|
sa = &lsopt->u.sockaddr;
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
switch (sa->sa_family) {
|
|
|
|
|
|
|
|
#if (NGX_HAVE_INET6)
|
|
|
|
case AF_INET6:
|
|
|
|
off = offsetof(struct sockaddr_in6, sin6_addr);
|
|
|
|
len = 16;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2009-10-26 19:43:32 +08:00
|
|
|
#if (NGX_HAVE_UNIX_DOMAIN)
|
|
|
|
case AF_UNIX:
|
|
|
|
off = offsetof(struct sockaddr_un, sun_path);
|
|
|
|
len = sizeof(saun->sun_path);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
default: /* AF_INET */
|
|
|
|
off = offsetof(struct sockaddr_in, sin_addr);
|
|
|
|
len = 4;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2009-12-22 23:15:45 +08:00
|
|
|
p = lsopt->u.sockaddr_data + off;
|
2009-02-21 15:02:02 +08:00
|
|
|
|
|
|
|
addr = port->addrs.elts;
|
|
|
|
|
|
|
|
for (i = 0; i < port->addrs.nelts; i++) {
|
|
|
|
|
2009-12-22 23:15:45 +08:00
|
|
|
if (ngx_memcmp(p, addr[i].opt.u.sockaddr_data + off, len) != 0) {
|
2009-02-19 00:17:12 +08:00
|
|
|
continue;
|
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
/* the address is already in the address list */
|
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
if (ngx_http_add_server(cf, cscf, &addr[i]) != NGX_OK) {
|
2009-02-19 00:17:12 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2009-10-22 18:17:54 +08:00
|
|
|
/* preserve default_server bit during listen options overwriting */
|
|
|
|
default_server = addr[i].opt.default_server;
|
|
|
|
|
2010-09-27 19:48:12 +08:00
|
|
|
#if (NGX_HTTP_SSL)
|
2010-09-28 14:50:52 +08:00
|
|
|
ssl = lsopt->ssl || addr[i].opt.ssl;
|
2010-09-27 19:48:12 +08:00
|
|
|
#endif
|
|
|
|
|
2009-10-22 16:14:02 +08:00
|
|
|
if (lsopt->set) {
|
|
|
|
|
|
|
|
if (addr[i].opt.set) {
|
|
|
|
ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
|
2011-09-24 04:15:27 +08:00
|
|
|
"duplicate listen options for %s", addr[i].opt.addr);
|
2009-10-22 16:14:02 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
addr[i].opt = *lsopt;
|
2009-10-22 03:16:38 +08:00
|
|
|
}
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
/* check the duplicate "default" server for this address:port */
|
2009-02-19 00:17:12 +08:00
|
|
|
|
2009-10-22 00:47:44 +08:00
|
|
|
if (lsopt->default_server) {
|
2009-02-19 00:17:12 +08:00
|
|
|
|
2009-10-22 18:17:54 +08:00
|
|
|
if (default_server) {
|
2009-10-21 16:19:46 +08:00
|
|
|
ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
|
2009-10-22 03:13:27 +08:00
|
|
|
"a duplicate default server for %s", addr[i].opt.addr);
|
2008-05-22 19:07:08 +08:00
|
|
|
return NGX_ERROR;
|
2003-01-09 13:36:00 +08:00
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-10-22 18:17:54 +08:00
|
|
|
default_server = 1;
|
2009-10-22 00:52:10 +08:00
|
|
|
addr[i].default_server = cscf;
|
2003-01-09 13:36:00 +08:00
|
|
|
}
|
2009-02-19 00:17:12 +08:00
|
|
|
|
2009-10-22 18:17:54 +08:00
|
|
|
addr[i].opt.default_server = default_server;
|
2010-09-27 19:48:12 +08:00
|
|
|
#if (NGX_HTTP_SSL)
|
|
|
|
addr[i].opt.ssl = ssl;
|
|
|
|
#endif
|
2009-10-22 18:17:54 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
return NGX_OK;
|
2003-01-09 13:36:00 +08:00
|
|
|
}
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
/* add the address to the addresses list that bound to this port */
|
2009-02-19 00:17:12 +08:00
|
|
|
|
2009-10-22 00:47:44 +08:00
|
|
|
return ngx_http_add_address(cf, cscf, port, lsopt);
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
2004-10-21 23:34:38 +08:00
|
|
|
|
2003-01-28 23:56:37 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
/*
|
|
|
|
* add the server address, the server names and the server core module
|
2009-05-18 04:13:29 +08:00
|
|
|
* configurations to the port list
|
2008-05-22 19:07:08 +08:00
|
|
|
*/
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_add_address(ngx_conf_t *cf, ngx_http_core_srv_conf_t *cscf,
|
2009-10-22 00:47:44 +08:00
|
|
|
ngx_http_conf_port_t *port, ngx_http_listen_opt_t *lsopt)
|
2008-05-22 19:07:08 +08:00
|
|
|
{
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_conf_addr_t *addr;
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
if (port->addrs.elts == NULL) {
|
|
|
|
if (ngx_array_init(&port->addrs, cf->temp_pool, 4,
|
|
|
|
sizeof(ngx_http_conf_addr_t))
|
2008-05-22 19:07:08 +08:00
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
addr = ngx_array_push(&port->addrs);
|
|
|
|
if (addr == NULL) {
|
2008-05-22 19:07:08 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2009-10-22 00:47:44 +08:00
|
|
|
addr->opt = *lsopt;
|
2009-02-21 15:02:02 +08:00
|
|
|
addr->hash.buckets = NULL;
|
|
|
|
addr->hash.size = 0;
|
|
|
|
addr->wc_head = NULL;
|
|
|
|
addr->wc_tail = NULL;
|
2008-05-22 19:07:08 +08:00
|
|
|
#if (NGX_PCRE)
|
2009-02-21 15:02:02 +08:00
|
|
|
addr->nregex = 0;
|
|
|
|
addr->regex = NULL;
|
2008-05-22 19:07:08 +08:00
|
|
|
#endif
|
2009-10-22 00:52:10 +08:00
|
|
|
addr->default_server = cscf;
|
2009-10-22 00:27:48 +08:00
|
|
|
addr->servers.elts = NULL;
|
2008-05-22 19:07:08 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
return ngx_http_add_server(cf, cscf, addr);
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
/* add the server core module configuration to the address:port */
|
2008-05-22 19:07:08 +08:00
|
|
|
|
|
|
|
static ngx_int_t
|
2009-10-22 00:27:48 +08:00
|
|
|
ngx_http_add_server(ngx_conf_t *cf, ngx_http_core_srv_conf_t *cscf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_conf_addr_t *addr)
|
2008-05-22 19:07:08 +08:00
|
|
|
{
|
2009-10-22 16:15:16 +08:00
|
|
|
ngx_uint_t i;
|
2009-10-22 00:27:48 +08:00
|
|
|
ngx_http_core_srv_conf_t **server;
|
2008-05-22 19:07:08 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
if (addr->servers.elts == NULL) {
|
|
|
|
if (ngx_array_init(&addr->servers, cf->temp_pool, 4,
|
|
|
|
sizeof(ngx_http_core_srv_conf_t *))
|
2008-05-22 19:07:08 +08:00
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2009-10-22 16:15:16 +08:00
|
|
|
|
|
|
|
} else {
|
|
|
|
server = addr->servers.elts;
|
|
|
|
for (i = 0; i < addr->servers.nelts; i++) {
|
|
|
|
if (server[i] == cscf) {
|
|
|
|
ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
|
|
|
|
"a duplicate listen %s", addr->opt.addr);
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
}
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
server = ngx_array_push(&addr->servers);
|
|
|
|
if (server == NULL) {
|
|
|
|
return NGX_ERROR;
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
*server = cscf;
|
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_optimize_servers(ngx_conf_t *cf, ngx_http_core_main_conf_t *cmcf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_array_t *ports)
|
2008-05-22 19:07:08 +08:00
|
|
|
{
|
2009-10-28 18:47:00 +08:00
|
|
|
ngx_uint_t p, a;
|
2009-10-22 00:27:48 +08:00
|
|
|
ngx_http_conf_port_t *port;
|
|
|
|
ngx_http_conf_addr_t *addr;
|
2008-05-22 19:07:08 +08:00
|
|
|
|
2009-10-28 18:45:40 +08:00
|
|
|
if (ports == NULL) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
port = ports->elts;
|
|
|
|
for (p = 0; p < ports->nelts; p++) {
|
2008-05-22 19:07:08 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_sort(port[p].addrs.elts, (size_t) port[p].addrs.nelts,
|
|
|
|
sizeof(ngx_http_conf_addr_t), ngx_http_cmp_conf_addrs);
|
2005-06-16 02:33:41 +08:00
|
|
|
|
2004-10-21 23:34:38 +08:00
|
|
|
/*
|
2009-02-19 00:17:12 +08:00
|
|
|
* check whether all name-based servers have the same
|
2012-04-03 15:37:31 +08:00
|
|
|
* configuration as a default server for given address:port
|
2004-10-21 23:34:38 +08:00
|
|
|
*/
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
addr = port[p].addrs.elts;
|
|
|
|
for (a = 0; a < port[p].addrs.nelts; a++) {
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
if (addr[a].servers.nelts > 1
|
2009-03-20 00:07:40 +08:00
|
|
|
#if (NGX_PCRE)
|
2009-10-22 00:52:10 +08:00
|
|
|
|| addr[a].default_server->captures
|
2009-03-20 00:07:40 +08:00
|
|
|
#endif
|
2009-10-22 00:27:48 +08:00
|
|
|
)
|
|
|
|
{
|
2009-02-21 15:02:02 +08:00
|
|
|
if (ngx_http_server_names(cf, cmcf, &addr[a]) != NGX_OK) {
|
2009-02-19 00:17:12 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2004-12-21 20:30:30 +08:00
|
|
|
}
|
2009-02-19 00:17:12 +08:00
|
|
|
}
|
2004-12-21 20:30:30 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
if (ngx_http_init_listening(cf, &port[p]) != NGX_OK) {
|
2009-02-19 00:17:12 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_server_names(ngx_conf_t *cf, ngx_http_core_main_conf_t *cmcf,
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_conf_addr_t *addr)
|
2009-02-19 00:17:12 +08:00
|
|
|
{
|
2009-10-22 00:27:48 +08:00
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_uint_t n, s;
|
|
|
|
ngx_hash_init_t hash;
|
|
|
|
ngx_hash_keys_arrays_t ha;
|
|
|
|
ngx_http_server_name_t *name;
|
|
|
|
ngx_http_core_srv_conf_t **cscfp;
|
2009-02-19 00:17:12 +08:00
|
|
|
#if (NGX_PCRE)
|
2009-10-22 00:27:48 +08:00
|
|
|
ngx_uint_t regex, i;
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
regex = 0;
|
|
|
|
#endif
|
2006-03-10 20:51:52 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
ngx_memzero(&ha, sizeof(ngx_hash_keys_arrays_t));
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
ha.temp_pool = ngx_create_pool(16384, cf->log);
|
|
|
|
if (ha.temp_pool == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
ha.pool = cf->pool;
|
2004-12-21 20:30:30 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
if (ngx_hash_keys_array_init(&ha, NGX_HASH_LARGE) != NGX_OK) {
|
|
|
|
goto failed;
|
|
|
|
}
|
2007-08-13 03:48:12 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
cscfp = addr->servers.elts;
|
|
|
|
|
|
|
|
for (s = 0; s < addr->servers.nelts; s++) {
|
2004-12-21 20:30:30 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
name = cscfp[s]->server_names.elts;
|
|
|
|
|
|
|
|
for (n = 0; n < cscfp[s]->server_names.nelts; n++) {
|
2004-12-21 20:30:30 +08:00
|
|
|
|
2007-08-13 03:48:12 +08:00
|
|
|
#if (NGX_PCRE)
|
2009-10-22 00:27:48 +08:00
|
|
|
if (name[n].regex) {
|
|
|
|
regex++;
|
|
|
|
continue;
|
|
|
|
}
|
2007-08-13 03:48:12 +08:00
|
|
|
#endif
|
|
|
|
|
2009-10-22 00:52:10 +08:00
|
|
|
rc = ngx_hash_add_key(&ha, &name[n].name, name[n].server,
|
2009-10-22 00:27:48 +08:00
|
|
|
NGX_HASH_WILDCARD_KEY);
|
2004-12-21 20:30:30 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
if (rc == NGX_ERROR) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2004-12-21 20:30:30 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
if (rc == NGX_DECLINED) {
|
|
|
|
ngx_log_error(NGX_LOG_EMERG, cf->log, 0,
|
|
|
|
"invalid server name or wildcard \"%V\" on %s",
|
|
|
|
&name[n].name, addr->opt.addr);
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
if (rc == NGX_BUSY) {
|
2010-12-13 04:11:31 +08:00
|
|
|
ngx_log_error(NGX_LOG_WARN, cf->log, 0,
|
2009-10-22 00:27:48 +08:00
|
|
|
"conflicting server name \"%V\" on %s, ignored",
|
|
|
|
&name[n].name, addr->opt.addr);
|
|
|
|
}
|
2009-02-19 00:17:12 +08:00
|
|
|
}
|
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
hash.key = ngx_hash_key_lc;
|
|
|
|
hash.max_size = cmcf->server_names_hash_max_size;
|
|
|
|
hash.bucket_size = cmcf->server_names_hash_bucket_size;
|
|
|
|
hash.name = "server_names_hash";
|
|
|
|
hash.pool = cf->pool;
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
if (ha.keys.nelts) {
|
2009-02-21 15:02:02 +08:00
|
|
|
hash.hash = &addr->hash;
|
2009-02-19 00:17:12 +08:00
|
|
|
hash.temp_pool = NULL;
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
if (ngx_hash_init(&hash, ha.keys.elts, ha.keys.nelts) != NGX_OK) {
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
if (ha.dns_wc_head.nelts) {
|
2007-06-12 03:49:22 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
ngx_qsort(ha.dns_wc_head.elts, (size_t) ha.dns_wc_head.nelts,
|
|
|
|
sizeof(ngx_hash_key_t), ngx_http_cmp_dns_wildcards);
|
2007-06-12 03:49:22 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
hash.hash = NULL;
|
|
|
|
hash.temp_pool = ha.temp_pool;
|
2007-06-12 03:49:22 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
if (ngx_hash_wildcard_init(&hash, ha.dns_wc_head.elts,
|
|
|
|
ha.dns_wc_head.nelts)
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
goto failed;
|
|
|
|
}
|
2007-06-12 03:49:22 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
addr->wc_head = (ngx_hash_wildcard_t *) hash.hash;
|
2009-02-19 00:17:12 +08:00
|
|
|
}
|
2007-06-12 03:49:22 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
if (ha.dns_wc_tail.nelts) {
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
ngx_qsort(ha.dns_wc_tail.elts, (size_t) ha.dns_wc_tail.nelts,
|
|
|
|
sizeof(ngx_hash_key_t), ngx_http_cmp_dns_wildcards);
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
hash.hash = NULL;
|
|
|
|
hash.temp_pool = ha.temp_pool;
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
if (ngx_hash_wildcard_init(&hash, ha.dns_wc_tail.elts,
|
|
|
|
ha.dns_wc_tail.nelts)
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
|
|
|
goto failed;
|
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
addr->wc_tail = (ngx_hash_wildcard_t *) hash.hash;
|
2009-02-19 00:17:12 +08:00
|
|
|
}
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
ngx_destroy_pool(ha.temp_pool);
|
2007-08-13 03:48:12 +08:00
|
|
|
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
if (regex == 0) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
2007-08-13 03:48:12 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
addr->nregex = regex;
|
|
|
|
addr->regex = ngx_palloc(cf->pool, regex * sizeof(ngx_http_server_name_t));
|
|
|
|
if (addr->regex == NULL) {
|
2009-02-19 00:17:12 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-10-22 00:27:48 +08:00
|
|
|
i = 0;
|
|
|
|
|
|
|
|
for (s = 0; s < addr->servers.nelts; s++) {
|
|
|
|
|
|
|
|
name = cscfp[s]->server_names.elts;
|
|
|
|
|
|
|
|
for (n = 0; n < cscfp[s]->server_names.nelts; n++) {
|
|
|
|
if (name[n].regex) {
|
|
|
|
addr->regex[i++] = name[n];
|
|
|
|
}
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-19 00:17:12 +08:00
|
|
|
#endif
|
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
return NGX_OK;
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
failed:
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
ngx_destroy_pool(ha.temp_pool);
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2004-09-07 02:45:00 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
static ngx_int_t
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_cmp_conf_addrs(const void *one, const void *two)
|
2008-05-22 19:07:08 +08:00
|
|
|
{
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_conf_addr_t *first, *second;
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
first = (ngx_http_conf_addr_t *) one;
|
|
|
|
second = (ngx_http_conf_addr_t *) two;
|
2003-07-21 05:15:59 +08:00
|
|
|
|
2009-10-21 16:48:04 +08:00
|
|
|
if (first->opt.wildcard) {
|
2009-02-21 15:02:02 +08:00
|
|
|
/* a wildcard address must be the last resort, shift it to the end */
|
2008-05-22 19:07:08 +08:00
|
|
|
return 1;
|
|
|
|
}
|
2003-06-11 23:28:34 +08:00
|
|
|
|
2012-07-17 12:47:34 +08:00
|
|
|
if (second->opt.wildcard) {
|
|
|
|
/* a wildcard address must be the last resort, shift it to the end */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-10-21 16:48:04 +08:00
|
|
|
if (first->opt.bind && !second->opt.bind) {
|
2008-05-22 19:07:08 +08:00
|
|
|
/* shift explicit bind()ed addresses to the start */
|
|
|
|
return -1;
|
|
|
|
}
|
2005-09-23 19:02:22 +08:00
|
|
|
|
2009-10-21 16:48:04 +08:00
|
|
|
if (!first->opt.bind && second->opt.bind) {
|
2008-05-22 19:07:08 +08:00
|
|
|
/* shift explicit bind()ed addresses to the start */
|
|
|
|
return 1;
|
|
|
|
}
|
2003-07-21 05:15:59 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
/* do not sort by default */
|
2007-12-10 20:09:51 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2003-06-11 23:28:34 +08:00
|
|
|
|
2005-06-16 02:33:41 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
static int ngx_libc_cdecl
|
|
|
|
ngx_http_cmp_dns_wildcards(const void *one, const void *two)
|
|
|
|
{
|
|
|
|
ngx_hash_key_t *first, *second;
|
2005-06-16 02:33:41 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
first = (ngx_hash_key_t *) one;
|
|
|
|
second = (ngx_hash_key_t *) two;
|
2005-06-16 02:33:41 +08:00
|
|
|
|
2009-09-12 17:28:37 +08:00
|
|
|
return ngx_dns_strcmp(first->key.data, second->key.data);
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
static ngx_int_t
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_init_listening(ngx_conf_t *cf, ngx_http_conf_port_t *port)
|
2008-05-22 19:07:08 +08:00
|
|
|
{
|
2009-02-24 15:29:55 +08:00
|
|
|
ngx_uint_t i, last, bind_wildcard;
|
2008-05-22 19:07:08 +08:00
|
|
|
ngx_listening_t *ls;
|
2009-02-21 15:02:02 +08:00
|
|
|
ngx_http_port_t *hport;
|
|
|
|
ngx_http_conf_addr_t *addr;
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
addr = port->addrs.elts;
|
|
|
|
last = port->addrs.nelts;
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
/*
|
2009-02-21 15:02:02 +08:00
|
|
|
* If there is a binding to an "*:port" then we need to bind() to
|
|
|
|
* the "*:port" only and ignore other implicit bindings. The bindings
|
|
|
|
* have been already sorted: explicit bindings are on the start, then
|
|
|
|
* implicit bindings go, and wildcard binding is in the end.
|
2008-05-22 19:07:08 +08:00
|
|
|
*/
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-10-21 16:48:04 +08:00
|
|
|
if (addr[last - 1].opt.wildcard) {
|
|
|
|
addr[last - 1].opt.bind = 1;
|
2009-02-21 15:02:02 +08:00
|
|
|
bind_wildcard = 1;
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
} else {
|
2009-02-21 15:02:02 +08:00
|
|
|
bind_wildcard = 0;
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-24 15:29:55 +08:00
|
|
|
i = 0;
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-24 15:29:55 +08:00
|
|
|
while (i < last) {
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-10-21 16:48:04 +08:00
|
|
|
if (bind_wildcard && !addr[i].opt.bind) {
|
2009-02-24 15:29:55 +08:00
|
|
|
i++;
|
2008-05-22 19:07:08 +08:00
|
|
|
continue;
|
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-24 15:29:55 +08:00
|
|
|
ls = ngx_http_add_listening(cf, &addr[i]);
|
2008-05-22 19:07:08 +08:00
|
|
|
if (ls == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
hport = ngx_pcalloc(cf->pool, sizeof(ngx_http_port_t));
|
|
|
|
if (hport == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2003-05-15 23:42:53 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
ls->servers = hport;
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-24 15:29:55 +08:00
|
|
|
if (i == last - 1) {
|
2009-02-21 15:02:02 +08:00
|
|
|
hport->naddrs = last;
|
2005-12-27 01:07:48 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
} else {
|
|
|
|
hport->naddrs = 1;
|
2009-02-24 15:29:55 +08:00
|
|
|
i = 0;
|
2003-01-09 13:36:00 +08:00
|
|
|
}
|
2009-02-21 15:02:02 +08:00
|
|
|
|
|
|
|
switch (ls->sockaddr->sa_family) {
|
|
|
|
|
|
|
|
#if (NGX_HAVE_INET6)
|
|
|
|
case AF_INET6:
|
|
|
|
if (ngx_http_add_addrs6(cf, hport, addr) != NGX_OK) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default: /* AF_INET */
|
|
|
|
if (ngx_http_add_addrs(cf, hport, addr) != NGX_OK) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
break;
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
2009-02-21 15:02:02 +08:00
|
|
|
|
|
|
|
addr++;
|
|
|
|
last--;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_listening_t *
|
|
|
|
ngx_http_add_listening(ngx_conf_t *cf, ngx_http_conf_addr_t *addr)
|
|
|
|
{
|
|
|
|
ngx_listening_t *ls;
|
|
|
|
ngx_http_core_loc_conf_t *clcf;
|
|
|
|
ngx_http_core_srv_conf_t *cscf;
|
|
|
|
|
2009-12-22 23:15:45 +08:00
|
|
|
ls = ngx_create_listening(cf, &addr->opt.u.sockaddr, addr->opt.socklen);
|
2009-02-21 15:02:02 +08:00
|
|
|
if (ls == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ls->addr_ntop = 1;
|
|
|
|
|
|
|
|
ls->handler = ngx_http_init_connection;
|
|
|
|
|
2009-10-22 00:52:10 +08:00
|
|
|
cscf = addr->default_server;
|
2009-02-21 15:02:02 +08:00
|
|
|
ls->pool_size = cscf->connection_pool_size;
|
|
|
|
ls->post_accept_timeout = cscf->client_header_timeout;
|
2003-01-09 13:36:00 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
clcf = cscf->ctx->loc_conf[ngx_http_core_module.ctx_index];
|
|
|
|
|
2009-04-30 21:53:42 +08:00
|
|
|
ls->logp = clcf->error_log;
|
2009-02-21 15:02:02 +08:00
|
|
|
ls->log.data = &ls->addr_text;
|
|
|
|
ls->log.handler = ngx_accept_log_error;
|
|
|
|
|
|
|
|
#if (NGX_WIN32)
|
|
|
|
{
|
2011-09-27 20:07:09 +08:00
|
|
|
ngx_iocp_conf_t *iocpcf = NULL;
|
2009-02-21 15:02:02 +08:00
|
|
|
|
2011-09-27 20:07:09 +08:00
|
|
|
if (ngx_get_conf(cf->cycle->conf_ctx, ngx_events_module)) {
|
|
|
|
iocpcf = ngx_event_get_conf(cf->cycle->conf_ctx, ngx_iocp_module);
|
|
|
|
}
|
|
|
|
if (iocpcf && iocpcf->acceptex_read) {
|
2009-02-21 15:02:02 +08:00
|
|
|
ls->post_accept_buffer_size = cscf->client_header_buffer_size;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-10-21 16:19:46 +08:00
|
|
|
ls->backlog = addr->opt.backlog;
|
|
|
|
ls->rcvbuf = addr->opt.rcvbuf;
|
|
|
|
ls->sndbuf = addr->opt.sndbuf;
|
2004-07-19 03:11:20 +08:00
|
|
|
|
2011-12-05 16:06:15 +08:00
|
|
|
ls->keepalive = addr->opt.so_keepalive;
|
|
|
|
#if (NGX_HAVE_KEEPALIVE_TUNABLE)
|
|
|
|
ls->keepidle = addr->opt.tcp_keepidle;
|
|
|
|
ls->keepintvl = addr->opt.tcp_keepintvl;
|
|
|
|
ls->keepcnt = addr->opt.tcp_keepcnt;
|
|
|
|
#endif
|
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
#if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
|
2009-10-21 16:19:46 +08:00
|
|
|
ls->accept_filter = addr->opt.accept_filter;
|
2008-05-22 19:07:08 +08:00
|
|
|
#endif
|
2004-07-19 03:11:20 +08:00
|
|
|
|
2008-05-22 19:07:08 +08:00
|
|
|
#if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
|
2009-10-21 16:19:46 +08:00
|
|
|
ls->deferred_accept = addr->opt.deferred_accept;
|
2008-05-22 19:07:08 +08:00
|
|
|
#endif
|
2008-05-22 17:57:47 +08:00
|
|
|
|
2009-03-13 22:20:34 +08:00
|
|
|
#if (NGX_HAVE_INET6 && defined IPV6_V6ONLY)
|
2009-10-21 16:19:46 +08:00
|
|
|
ls->ipv6only = addr->opt.ipv6only;
|
2009-03-13 22:20:34 +08:00
|
|
|
#endif
|
|
|
|
|
2010-07-05 21:49:16 +08:00
|
|
|
#if (NGX_HAVE_SETFIB)
|
|
|
|
ls->setfib = addr->opt.setfib;
|
|
|
|
#endif
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
return ls;
|
|
|
|
}
|
2008-05-22 17:57:47 +08:00
|
|
|
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_add_addrs(ngx_conf_t *cf, ngx_http_port_t *hport,
|
|
|
|
ngx_http_conf_addr_t *addr)
|
|
|
|
{
|
|
|
|
ngx_uint_t i;
|
|
|
|
ngx_http_in_addr_t *addrs;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
ngx_http_virtual_names_t *vn;
|
2008-05-22 17:57:47 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
hport->addrs = ngx_pcalloc(cf->pool,
|
|
|
|
hport->naddrs * sizeof(ngx_http_in_addr_t));
|
|
|
|
if (hport->addrs == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
2008-05-22 17:57:47 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
addrs = hport->addrs;
|
2008-05-22 17:57:47 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
for (i = 0; i < hport->naddrs; i++) {
|
2008-05-22 17:57:47 +08:00
|
|
|
|
2009-12-22 23:15:45 +08:00
|
|
|
sin = &addr[i].opt.u.sockaddr_in;
|
2009-02-21 15:02:02 +08:00
|
|
|
addrs[i].addr = sin->sin_addr.s_addr;
|
2009-10-22 00:52:10 +08:00
|
|
|
addrs[i].conf.default_server = addr[i].default_server;
|
2009-02-21 15:02:02 +08:00
|
|
|
#if (NGX_HTTP_SSL)
|
2009-10-21 16:48:04 +08:00
|
|
|
addrs[i].conf.ssl = addr[i].opt.ssl;
|
2009-02-21 15:02:02 +08:00
|
|
|
#endif
|
2008-05-22 17:57:47 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
if (addr[i].hash.buckets == NULL
|
|
|
|
&& (addr[i].wc_head == NULL
|
|
|
|
|| addr[i].wc_head->hash.buckets == NULL)
|
2009-03-19 23:46:27 +08:00
|
|
|
&& (addr[i].wc_tail == NULL
|
2009-03-20 00:07:40 +08:00
|
|
|
|| addr[i].wc_tail->hash.buckets == NULL)
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
&& addr[i].nregex == 0
|
|
|
|
#endif
|
|
|
|
)
|
2008-05-22 19:07:08 +08:00
|
|
|
{
|
2009-02-21 15:02:02 +08:00
|
|
|
continue;
|
2008-05-22 19:07:08 +08:00
|
|
|
}
|
2008-05-22 17:57:47 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
vn = ngx_palloc(cf->pool, sizeof(ngx_http_virtual_names_t));
|
|
|
|
if (vn == NULL) {
|
2008-05-22 17:57:47 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2009-04-09 21:56:16 +08:00
|
|
|
addrs[i].conf.virtual_names = vn;
|
2008-05-22 17:57:47 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
vn->names.hash = addr[i].hash;
|
|
|
|
vn->names.wc_head = addr[i].wc_head;
|
|
|
|
vn->names.wc_tail = addr[i].wc_tail;
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
vn->nregex = addr[i].nregex;
|
|
|
|
vn->regex = addr[i].regex;
|
2008-09-01 22:19:01 +08:00
|
|
|
#endif
|
2009-02-21 15:02:02 +08:00
|
|
|
}
|
2008-09-01 22:19:01 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
2008-05-22 17:57:47 +08:00
|
|
|
|
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
#if (NGX_HAVE_INET6)
|
|
|
|
|
|
|
|
static ngx_int_t
|
|
|
|
ngx_http_add_addrs6(ngx_conf_t *cf, ngx_http_port_t *hport,
|
|
|
|
ngx_http_conf_addr_t *addr)
|
|
|
|
{
|
|
|
|
ngx_uint_t i;
|
|
|
|
ngx_http_in6_addr_t *addrs6;
|
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
ngx_http_virtual_names_t *vn;
|
|
|
|
|
|
|
|
hport->addrs = ngx_pcalloc(cf->pool,
|
|
|
|
hport->naddrs * sizeof(ngx_http_in6_addr_t));
|
|
|
|
if (hport->addrs == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
addrs6 = hport->addrs;
|
|
|
|
|
|
|
|
for (i = 0; i < hport->naddrs; i++) {
|
|
|
|
|
2009-12-22 23:15:45 +08:00
|
|
|
sin6 = &addr[i].opt.u.sockaddr_in6;
|
2009-02-21 15:02:02 +08:00
|
|
|
addrs6[i].addr6 = sin6->sin6_addr;
|
2009-10-22 00:52:10 +08:00
|
|
|
addrs6[i].conf.default_server = addr[i].default_server;
|
2009-02-21 15:02:02 +08:00
|
|
|
#if (NGX_HTTP_SSL)
|
2009-10-21 16:48:04 +08:00
|
|
|
addrs6[i].conf.ssl = addr[i].opt.ssl;
|
2004-10-21 23:34:38 +08:00
|
|
|
#endif
|
2009-02-21 15:02:02 +08:00
|
|
|
|
|
|
|
if (addr[i].hash.buckets == NULL
|
|
|
|
&& (addr[i].wc_head == NULL
|
|
|
|
|| addr[i].wc_head->hash.buckets == NULL)
|
2010-12-13 05:10:59 +08:00
|
|
|
&& (addr[i].wc_tail == NULL
|
2010-12-13 05:13:27 +08:00
|
|
|
|| addr[i].wc_tail->hash.buckets == NULL)
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
&& addr[i].nregex == 0
|
|
|
|
#endif
|
|
|
|
)
|
2009-02-21 15:02:02 +08:00
|
|
|
{
|
|
|
|
continue;
|
2004-12-21 20:30:30 +08:00
|
|
|
}
|
2007-08-13 03:48:12 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
vn = ngx_palloc(cf->pool, sizeof(ngx_http_virtual_names_t));
|
|
|
|
if (vn == NULL) {
|
|
|
|
return NGX_ERROR;
|
2004-12-21 20:30:30 +08:00
|
|
|
}
|
|
|
|
|
2009-04-09 21:56:16 +08:00
|
|
|
addrs6[i].conf.virtual_names = vn;
|
2004-10-21 23:34:38 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
vn->names.hash = addr[i].hash;
|
|
|
|
vn->names.wc_head = addr[i].wc_head;
|
|
|
|
vn->names.wc_tail = addr[i].wc_tail;
|
|
|
|
#if (NGX_PCRE)
|
|
|
|
vn->nregex = addr[i].nregex;
|
|
|
|
vn->regex = addr[i].regex;
|
|
|
|
#endif
|
2004-10-21 23:34:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
2008-08-04 19:29:09 +08:00
|
|
|
|
2009-02-21 15:02:02 +08:00
|
|
|
#endif
|
|
|
|
|
2008-08-04 19:29:09 +08:00
|
|
|
|
|
|
|
char *
|
|
|
|
ngx_http_types_slot(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
|
|
|
|
{
|
|
|
|
char *p = conf;
|
|
|
|
|
|
|
|
ngx_array_t **types;
|
|
|
|
ngx_str_t *value, *default_type;
|
|
|
|
ngx_uint_t i, n, hash;
|
|
|
|
ngx_hash_key_t *type;
|
|
|
|
|
|
|
|
types = (ngx_array_t **) (p + cmd->offset);
|
|
|
|
|
2009-11-30 21:15:10 +08:00
|
|
|
if (*types == (void *) -1) {
|
|
|
|
return NGX_CONF_OK;
|
|
|
|
}
|
|
|
|
|
2008-08-04 19:29:09 +08:00
|
|
|
default_type = cmd->post;
|
|
|
|
|
|
|
|
if (*types == NULL) {
|
|
|
|
*types = ngx_array_create(cf->temp_pool, 1, sizeof(ngx_hash_key_t));
|
|
|
|
if (*types == NULL) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (default_type) {
|
|
|
|
type = ngx_array_push(*types);
|
|
|
|
if (type == NULL) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
type->key = *default_type;
|
|
|
|
type->key_hash = ngx_hash_key(default_type->data,
|
|
|
|
default_type->len);
|
|
|
|
type->value = (void *) 4;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
value = cf->args->elts;
|
|
|
|
|
|
|
|
for (i = 1; i < cf->args->nelts; i++) {
|
|
|
|
|
2009-11-30 21:15:10 +08:00
|
|
|
if (value[i].len == 1 && value[i].data[0] == '*') {
|
|
|
|
*types = (void *) -1;
|
|
|
|
return NGX_CONF_OK;
|
|
|
|
}
|
|
|
|
|
2008-08-04 19:29:09 +08:00
|
|
|
hash = ngx_hash_strlow(value[i].data, value[i].data, value[i].len);
|
|
|
|
value[i].data[value[i].len] = '\0';
|
|
|
|
|
|
|
|
type = (*types)->elts;
|
|
|
|
for (n = 0; n < (*types)->nelts; n++) {
|
|
|
|
|
|
|
|
if (ngx_strcmp(value[i].data, type[n].key.data) == 0) {
|
|
|
|
ngx_conf_log_error(NGX_LOG_WARN, cf, 0,
|
|
|
|
"duplicate MIME type \"%V\"", &value[i]);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type = ngx_array_push(*types);
|
|
|
|
if (type == NULL) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
type->key = value[i];
|
|
|
|
type->key_hash = hash;
|
|
|
|
type->value = (void *) 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_CONF_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
char *
|
2009-11-30 21:15:10 +08:00
|
|
|
ngx_http_merge_types(ngx_conf_t *cf, ngx_array_t **keys, ngx_hash_t *types_hash,
|
|
|
|
ngx_array_t **prev_keys, ngx_hash_t *prev_types_hash,
|
2008-08-04 19:29:09 +08:00
|
|
|
ngx_str_t *default_types)
|
|
|
|
{
|
|
|
|
ngx_hash_init_t hash;
|
|
|
|
|
2009-11-30 21:15:10 +08:00
|
|
|
if (*keys) {
|
|
|
|
|
|
|
|
if (*keys == (void *) -1) {
|
|
|
|
return NGX_CONF_OK;
|
|
|
|
}
|
2008-08-04 19:29:09 +08:00
|
|
|
|
2008-08-14 00:25:48 +08:00
|
|
|
hash.hash = types_hash;
|
|
|
|
hash.key = NULL;
|
|
|
|
hash.max_size = 2048;
|
|
|
|
hash.bucket_size = 64;
|
|
|
|
hash.name = "test_types_hash";
|
|
|
|
hash.pool = cf->pool;
|
|
|
|
hash.temp_pool = NULL;
|
2008-08-04 19:29:09 +08:00
|
|
|
|
2009-11-30 21:15:10 +08:00
|
|
|
if (ngx_hash_init(&hash, (*keys)->elts, (*keys)->nelts) != NGX_OK) {
|
2008-08-04 19:29:09 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
2008-08-14 00:25:48 +08:00
|
|
|
|
|
|
|
return NGX_CONF_OK;
|
2008-08-04 19:29:09 +08:00
|
|
|
}
|
|
|
|
|
2008-08-14 00:25:48 +08:00
|
|
|
if (prev_types_hash->buckets == NULL) {
|
2008-08-04 19:29:09 +08:00
|
|
|
|
2009-11-30 21:15:10 +08:00
|
|
|
if (*prev_keys == NULL) {
|
2008-08-14 00:25:48 +08:00
|
|
|
|
2009-11-30 21:15:10 +08:00
|
|
|
if (ngx_http_set_default_types(cf, prev_keys, default_types)
|
2008-08-14 00:25:48 +08:00
|
|
|
!= NGX_OK)
|
|
|
|
{
|
2008-09-01 22:05:20 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
2009-11-30 21:15:10 +08:00
|
|
|
|
|
|
|
} else if (*prev_keys == (void *) -1) {
|
|
|
|
*keys = *prev_keys;
|
|
|
|
return NGX_CONF_OK;
|
2008-08-14 00:25:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
hash.hash = prev_types_hash;
|
|
|
|
hash.key = NULL;
|
|
|
|
hash.max_size = 2048;
|
|
|
|
hash.bucket_size = 64;
|
|
|
|
hash.name = "test_types_hash";
|
|
|
|
hash.pool = cf->pool;
|
|
|
|
hash.temp_pool = NULL;
|
|
|
|
|
2009-11-30 21:15:10 +08:00
|
|
|
if (ngx_hash_init(&hash, (*prev_keys)->elts, (*prev_keys)->nelts)
|
|
|
|
!= NGX_OK)
|
|
|
|
{
|
2008-08-14 00:25:48 +08:00
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
2008-08-04 19:29:09 +08:00
|
|
|
}
|
|
|
|
|
2008-08-14 00:25:48 +08:00
|
|
|
*types_hash = *prev_types_hash;
|
|
|
|
|
2008-08-04 19:29:09 +08:00
|
|
|
return NGX_CONF_OK;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-08-14 00:25:48 +08:00
|
|
|
ngx_int_t
|
2008-08-04 19:29:09 +08:00
|
|
|
ngx_http_set_default_types(ngx_conf_t *cf, ngx_array_t **types,
|
|
|
|
ngx_str_t *default_type)
|
|
|
|
{
|
|
|
|
ngx_hash_key_t *type;
|
|
|
|
|
|
|
|
*types = ngx_array_create(cf->temp_pool, 1, sizeof(ngx_hash_key_t));
|
|
|
|
if (*types == NULL) {
|
2008-08-14 00:25:48 +08:00
|
|
|
return NGX_ERROR;
|
2008-08-04 19:29:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
while (default_type->len) {
|
|
|
|
|
|
|
|
type = ngx_array_push(*types);
|
|
|
|
if (type == NULL) {
|
2008-08-14 00:25:48 +08:00
|
|
|
return NGX_ERROR;
|
2008-08-04 19:29:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
type->key = *default_type;
|
|
|
|
type->key_hash = ngx_hash_key(default_type->data,
|
|
|
|
default_type->len);
|
|
|
|
type->value = (void *) 4;
|
|
|
|
|
|
|
|
default_type++;
|
|
|
|
}
|
|
|
|
|
2008-08-14 00:25:48 +08:00
|
|
|
return NGX_OK;
|
2008-08-04 19:29:09 +08:00
|
|
|
}
|