summaryrefslogtreecommitdiffhomepage
path: root/src (follow)
AgeCommit message (Collapse)AuthorFilesLines
2019-04-01Adding syntax sugar.Max Romanov5-654/+882
With exceptions and overloads.
2019-03-25Turning off port read event state after main process fork.Max Romanov1-0/+1
Master port stores two file descriptors and works as a read port on the master process side. After a fork, the port switches into write mode and the read socket closes, but the same event structure is used for the write socket. However, the inherited structure remained in read state, telling the epoll engine to use MOD operation instead of ADD. The patch resets read event state, so the engine may write using proper ADD operation.
2019-03-22Ignoring EPERM error when changing application process uid/gid.Max Romanov1-16/+33
This closes #228 issue on GitHub.
2019-03-22Destroying pool in case of error.Max Romanov2-2/+2
This closes #233 issue on GitHub. Thanks to 洪志道 (Hong Zhi Dao).
2019-03-22Style fixing.Max Romanov1-0/+1
This closes #233 issue on GitHub. Thanks to 洪志道 (Hong Zhi Dao).
2019-03-21Adjusting request schema value according to connection tls state.Max Romanov13-31/+82
This closes #223 issue on GitHub.
2019-03-18Removing unused local variable.Max Romanov1-7/+0
2019-03-18Setting request error flag in error handler.Max Romanov1-0/+2
Absence of this flag is the reason of memory leak in case when client disconnected before receiving all response data.
2019-03-11Style.Andrey Zelenkov20-48/+48
2019-03-06Removed unnecessary abstraction layer.Alexander Borisov6-260/+127
2019-03-05Improving port message fragment recognition.Max Romanov1-16/+36
This is required to assemble fragmented messages correctly. Stream identifier is unique only for messages generated within a process, but the (stream, pid) pair should be enough to avoid collisions. Adding reply_port seems redundant because it's enough to add stream to a pid. This closes #199 issue on GitHub. Thanks to 洪志道 (Hong Zhi Dao).
2019-03-05Fixing EAGAIN processing for port message send.Max Romanov1-8/+26
Sending large plain (exceeding port's max_size, not in shared memory) messages causes message fragmentation. First message fragment is sent successfully, but the next fragment may fail with the EAGAIN error. In this case, the message has to be pushed back to queue head for additional processing. Related to #167 issue on GitHub.
2019-03-05Handling ENOBUFS error same was as EAGAIN.Max Romanov2-2/+12
Unlike EAGAIN, ENOBUFS returned on OSX when trying to send many relatively small (64 bytes) fragments. Found during investigation of #167 issue on GitHub.
2019-03-05Including port message header into message size limit.Max Romanov1-0/+2
Before this fix, large plain message (i.e. configuration) send may fail with the 'Message too big' error, because internal fragmentation implementation does not account for 16 byte message header. This closes #167 issue on GitHub.
2019-03-01Fixed TLS connections hanging.Igor Sysoev1-4/+2
After event is delivered from the kernel its further processing is blocked. Non-ready TSL I/O operation should mark connection I/O state as not ready to unblock events and to allow their further processing. Otherwise the connection hangs.
2019-03-01README.JSR-340 legal notice to save our ughm.. bottoms of bodies.Valentin Bartenev1-0/+16
2019-03-01Perl: added implementation delayed response and streaming body.Alexander Borisov1-16/+176
2019-02-28Made QUERY_STRING mandatory.Valentin Bartenev4-17/+7
According to CGI/1.1 RFC 3875: The server MUST set this variable; if the Script-URI does not include a query component, the QUERY_STRING MUST be defined as an empty string (""). Python's PEP 333(3) allows omitting it in WSGI interface; PHP docs force no requirements; PSGI and Rack specifications require it even if empty. When nginx proxies requests over FastCGI, it always provides QUERY_STRING. and some PHP apps have been observed to fail if it is missing (see issue #201 on GitHub). A drawback of this change (besides a small overhead) is that there will be no easy way to tell a missing query string from an empty one (i.e. requests with or without the "?" character); yet, it's negligible compared to the possible benefits of wider application compatibility. This closes #226 issue on GitHub.
2019-02-28Fixed timer and event race condition.Igor Sysoev5-8/+17
When idle timeout occurs at the same time as a request comes in, the timer handler closes connection while the read event triggers request processing, and this eventually leads to segmentation fault.
2019-02-28Preserving message 'share' field when pushing to queue.Max Romanov1-0/+1
As far as I understand, this field is important to control the number of buffers send in a single write attempt. Furthermore, having uninitialized field is always bad. This closes #204 issue on GitHub. Thanks to 洪志道 (Hong Zhi Dao).
2019-02-28Introducing Java Servlet Container beta.Max Romanov51-1/+10694
2019-02-28Various libunit fixes.Max Romanov1-8/+26
This patch contains various logging improvements and bugfixes found during Java module development.
2019-02-28Removing app data debug message.Max Romanov1-4/+0
This message produces too many noise in log and complicates analysis.
2019-02-28Reusing fragmented message buffers.Max Romanov1-1/+9
Fragmented message non-mmap buffer chain not freed nor reused before this fix. This closes #206 on GitHub. Thanks to 洪志道 (Hong Zhi Dao).
2019-02-27Perl: added processing for IO:Handle-like object.Alexander Borisov1-3/+109
The application can return the body as an IO:Handle-like object without file descriptor.
2019-02-27Fixed processing of SERVER_NAME after 77aad2c142a0.Valentin Bartenev11-167/+54
Previously, the nxt_router_prepare_msg() function expected server host among other headers unmodified. It's not true anymore since normalization of the Host header has been introduced in 77aad2c142a0. The nxt_unit_split_host() function was removed. It didn't work correctly with IPv6 literals. Anyway, after 77aad2c142a0 the port splitting is done in router while Host header processing.
2019-02-27Controller: added "routes" configuration.Valentin Bartenev1-0/+186
2019-02-27Controller: added "pass" configuration option.Valentin Bartenev1-0/+62
2019-02-27Initial routing implementation.Igor Sysoev5-40/+978
2019-02-26Introduced nxt_memcpy_upcase().Igor Sysoev2-0/+15
2019-02-26Introduced nxt_conf_array_qsort().Igor Sysoev2-0/+18
2019-02-26Introduced nxt_conf_array_elements_count().Igor Sysoev2-0/+8
2019-02-26Keepalive mode is disabled on HTTP header parsing errors.Igor Sysoev1-0/+2
2019-02-26Fixed violation of the strict aliasing rules in 5d0edd35c4ce.Valentin Bartenev1-5/+6
In order to reduce number of operations over rb-tree and process them in batches simultaneously, all the timers changes are temporary stored in array. While processing of these changes, the same memory is also used for storing pointers to postpone timers adding. As the same block of memory has been referenced by two different types of pointers (nxt_timer_change_t * and nxt_timer_t **), some compilers may reorder operations with these pointers and produce broken code. See ticket #221 on GitHub for a particular case. Now the same "nxt_timer_change_t" structure is used in both cases. Also, reverted the -fno-strict-aliasing flag, which has been introduced in ef76227ec159 as a workaround for this issue.
2019-02-25RPC error message size fixed.Max Romanov1-1/+1
In case of RPC error, special error message passed to handler. Field 'size' expected to be 0 in this case because in contains fake empty buffer.
2019-02-25Disabled useless code in nxt_router_listen_socket_error().Valentin Bartenev1-4/+8
It doesn't do anything useful, among creating a JSON message and logging it to debug log. Besides that it causes segmentation fault if the RPC handler is triggered with an empty buffer due to exiting of the main process.
2019-02-23Removed surplus check for NUL in nxt_http_validate_host().Valentin Bartenev1-1/+0
Such header fields are already rejected by HTTP parser.
2019-02-22Improvement and unification of version processing in build scripts.Alexander Borisov3-6/+3
This also eliminates expressions that incompatible with BSD make, thus fixing installation of Node.js module on FreeBSD (broken by dace60fc4926).
2019-02-22TLS certificates should be freed per listener.Igor Sysoev1-6/+9
This fixes memory leak if configuration uses more than one TLS cerificate.
2019-02-21Initializing incoming buffer queue in a proper place.Sergey Kandaurov1-2/+2
In case nxt_unit_tracking_read() failed, execution would jump to the error path, where it could try to release buffers from uninitialized yet incoming_buf queue.
2019-02-19Validation and normalization of request host.Valentin Bartenev3-11/+112
2019-02-18Ignoring HUP signal in main process.Igor Sysoev1-0/+11
2019-02-18Fixed memory leak on response body sending failure.Igor Sysoev3-3/+4
2019-02-18Rejecting requests with duplicate "Content-Length".Valentin Bartenev1-5/+8
2019-02-07Rejecting requests with invalid "Content-Length".Valentin Bartenev1-3/+9
2019-01-21Fixed processing Unix listening socket failures.Igor Sysoev1-16/+13
This is related to issue #198 on GitHub.
2019-01-18Testing correct value.Igor Sysoev1-1/+1
2018-12-24Version bump.Valentin Bartenev1-2/+2
2018-12-20Python: fixed error reporting on initialization of applications.Valentin Bartenev1-11/+10
PyErr_Print() writes traceback to "sys.stderr", which is a file object that can buffer the output. If the process exits immediately, the buffer can be destroyed before flushing to the log. As a result, the user doesn't see the traceback. Now Py_Finalize() is also called in case of any errors during initialization. It finalizes the interpreter and flushes all data.
2018-12-20Python: cleanup of nxt_python_init().Valentin Bartenev1-10/+3
- Removed surplus NULL assignments; - Added missing nxt_slow_path(); - Style cleanup.