summaryrefslogtreecommitdiffhomepage
path: root/src/nxt_application.c (follow)
AgeCommit message (Collapse)AuthorFilesLines
2021-12-01Fixing prototype process crash.Max Romanov1-0/+2
A prototype stores linked application processes structures. When an application process terminates, it's removed from the list. To avoid double removal, the pointer to the next element should be set to NULL. The issue was introduced in c8790d2a89bb.
2021-11-24Sending shared port to application prototype.Max Romanov1-0/+3
Application process started with shared port (and queue) already configured. But still waits for PORT_ACK message from router to start request processing (so-called "ready state"). Waiting for router confirmation is necessary. Otherwise, the application may produce response and send it to router before the router have the information about the application process. This is a subject of further optimizations.
2021-11-09Introducing application prototype processes.Tiago Natel de Moura1-13/+438
2021-11-02Improved logging of app module load errors.Valentin Bartenev1-5/+22
2021-10-28Moving request limit control to libunit.Max Romanov1-1/+5
Introducting application graceful stop. For now only used when application process reach request limit value. This closes #585 issue on GitHub.
2020-10-29Isolation: mounting of procfs by default when using "rootfs".Tiago Natel de Moura1-7/+10
2020-10-28Preserving the app port write socket.Max Romanov1-1/+1
The socket is required for intercontextual communication in multithreaded apps.
2020-08-20Moved isolation related code to "nxt_isolation.c".Tiago Natel de Moura1-581/+4
2020-08-11Moving file descriptor blocking to libunit.Max Romanov1-6/+0
The default libunit behavior relies on blocking the recv() call for port file descriptors, which an application may override if needed. For external applications, port file descriptors were toggled to blocking mode before the exec() call. If the exec() call failed, descriptor remained blocked, so the process hanged while trying to read from it. This patch moves file descriptor mode switch inside libunit.
2020-08-11Libunit refactoring: port management.Max Romanov1-1/+13
- Changed the port management callbacks to notifications, which e. g. avoids the need to call the libunit function - Added context and library instance reference counts for a safer resource release - Added the router main port initialization
2020-07-23Fixing main and application port structs file descriptor init.Max Romanov1-0/+2
Correct value for non-initialized file descriptor is -1, because most of the checks in libunit compares file descriptor with -1 before performing an action. Using 0 as default value, may cause to close file descriptor #0, this may affect application logic. It is not required to list this patch in changelog because impact is not seen by end users.
2020-07-22Fixing buffer overflow check in discovery.Max Romanov1-1/+1
Incorrect check prevents Unit to start without modules. This issue was introduced in 4a3ec07f4b19.
2020-06-23Isolation: fixed build when features aren't detected.Tiago Natel de Moura1-93/+110
2020-05-28Added "rootfs" feature.Tiago Natel de Moura1-38/+443
2020-03-09Refactor of process management.Tiago Natel de Moura1-19/+344
The process abstraction has changed to: setup(task, process) start(task, process_data) prefork(task, process, mp) The prefork() occurs in the main process right before fork. The file src/nxt_main_process.c is completely free of process specific logic. The creation of a process now supports a PROCESS_CREATED state. The The setup() function of each process can set its state to either created or ready. If created, a MSG_PROCESS_CREATED is sent to main process, where external setup can be done (required for rootfs under container). The core processes (discovery, controller and router) doesn't need external setup, then they all proceeds to their start() function straight away. In the case of applications, the load of the module happens at the process setup() time and The module's init() function has changed to be the start() of the process. The module API has changed to: setup(task, process, conf) start(task, data) As a direct benefit of the PROCESS_CREATED message, the clone(2) of processes using pid namespaces now doesn't need to create a pipe to make the child block until parent setup uid/gid mappings nor it needs to receive the child pid.
2019-10-22Fixing process crash in case of module load error.Max Romanov1-0/+3
This is related to #330 issue on GitHub.
2019-07-17Exiting application process in case of pre_init stage error.Max Romanov1-4/+1
2019-03-06Removed unnecessary abstraction layer.Alexander Borisov1-28/+0
2019-02-28Introducing Java Servlet Container beta.Max Romanov1-0/+14
2018-10-09Renamed "go" application type to "external".Valentin Bartenev1-4/+4
There's nothing specific to Go language. This type of application object can be used to run any external application that utilizes libunit API.
2018-08-06Unit application library.Max Romanov1-427/+49
Library now used in all language modules. Old 'nxt_app_*' code removed. See src/test/nxt_unit_app_test.c for usage sample.
2018-07-12Enabled body buffer shared memory segmentation.Max Romanov1-23/+22
Changeset #699 fixes shared memory allocation: continous buffer with requested size should be allocated or function failed. For body longer than 10 Mb, this allocation will definitely fails. For body buffer it is not required to send it in a single continous buffer, so, need to request minimum reasonable amount of shared memory and try to extend it, if possible or allocate next buffer.
2018-06-25Introduced nxt_length() macro.Valentin Bartenev1-4/+4
2018-05-28Configuration of environment variables for application processes.Valentin Bartenev1-0/+47
2018-05-21Added SERVER_SOFTWARE request meta-variable.Valentin Bartenev1-0/+3
2018-04-20Fixed segfault when two modules have the same type and version.Valentin Bartenev1-1/+1
The bug appeared in 217e48a3b091. This closes #104 issue on GitHub.
2018-04-17Added missing checks if nxt_port_rpc_register_handler() failed.Valentin Bartenev1-0/+4
This closes #97 issue on GitHub. Thanks to 洪志道 (Hong Zhi Dao).
2018-04-05Handling error return from application 'run()' function.Max Romanov1-1/+7
Server error response generated or connection closed.
2018-04-04Changed version processing for modules.Alexander Borisov1-8/+10
2018-03-21Added Ruby support.Alexander Borisov1-0/+3
2018-03-05Reduced number of critical log levels.Valentin Bartenev1-10/+5
2018-02-14Fixed race condition while discovering modules.Valentin Bartenev1-20/+42
Previously, the discovery process might exit before the main process received a list of available modules.
2018-01-31Added Perl support.Alexander Borisov1-3/+3
2018-01-24Fixed formatting in nxt_sprintf() and logging.Sergey Kandaurov1-1/+1
2018-01-24Using size_t for the field width type of the "%*s" specifier.Sergey Kandaurov1-3/+5
2017-12-28Removed duplicate declaration.Igor Sysoev1-1/+1
2017-12-28HTTP keep-alive connections support.Igor Sysoev1-207/+16
2017-12-28Changed nxt_mp_retain() and nxt_mp_release() interfaces.Igor Sysoev1-1/+1
2017-12-27Implementing the ability to cancel request before worker starts processing it.Max Romanov1-61/+31
2017-12-27Introducing application 'atexit' hook.Max Romanov1-1/+12
Finalizing Python interpreter. This closes #65 issue on GitHub.
2017-12-25HTTP parser: reworked header fields handling.Valentin Bartenev1-46/+45
2017-12-07Fixed protocol version string handling in router.Valentin Bartenev1-1/+1
2017-10-18Added the debug option to module compatibility vector.Igor Sysoev1-1/+1
2017-10-10Optimized application type handling.Valentin Bartenev1-23/+41
2017-10-05Improved applications versions handling.Valentin Bartenev1-3/+9
2017-10-04Using request mem pool for req<->app link.Max Romanov1-1/+1
Request <-> application link structure (nxt_req_app_link_t) used to register the request in application request queue (nxt_app_t.requests) and generate application-specific port message. Now it is allocated from request pool. This pool created for request parsing and used to allocate and store information specific to this request.
2017-09-16Fixed memory leak caused by mempool related to request context.Valentin Bartenev1-7/+3
The previous attempt of fixing this in e5a65b58101f hasn't been really successful, because the actual memory leak was caused not by the request parse context itself, but its memory pool.
2017-09-15Fixing memory leak of request parse context.Max Romanov1-8/+26
2017-09-06Style fixes.Igor Sysoev1-8/+7
2017-09-05Double connection close attempt fix.Max Romanov1-2/+2