|  | 43ae08a6c4 | bugfix: applied a patch to fix a bug in the standard ngx_geoip module where its nginx variables like $geoip_latitude might randomly take empty values when they should take perfect values. see http://mailman.nginx.org/pipermail/nginx-devel/2014-July/005642.html | 2014-07-25 15:03:42 -07:00 |  | 
			
				
					|  | f26ae39115 | bugfix: applied a patch to the nginx core to ensure the ssl handshake procedure in ngx_proxy is always protected by a timer for timeout errors. see http://mailman.nginx.org/pipermail/nginx-devel/2014-July/005627.html | 2014-07-22 17:10:22 -07:00 |  | 
			
				
					|  | cc4a307f0e | upgraded the nginx core to 1.7.3. | 2014-07-13 20:35:52 -07:00 |  | 
			
				
					|  | b824a3cb59 | upgraded the nginx core to 1.7.2. | 2014-06-17 16:57:10 -07:00 |  | 
			
				
					|  | 39407386ea | removed the cve-2013-2070 patch which is useless for nginx 1.7.0. | 2014-05-22 13:32:19 -07:00 |  | 
			
				
					|  | e37973502e | bugfix: updated the dtrace patch because systemtap 2.5 no longer accepts the -xnolib option in its dtrace utility. | 2014-05-18 15:46:20 -07:00 |  | 
			
				
					|  | 52e622a26c | bugfix: our "prev_slab" field of ngx_slab_page_t could get out of sync in the slab_defrag patch for nginx. thanks Shuxin Yang for the catch. | 2014-05-09 15:15:44 -07:00 |  | 
			
				
					|  | 20e69718ce | fixed a bug in slab_defrag.patch for the nginx core that we may incorrectly access the padding area between the end of pool->pages and pool->start. thanks Shuxin Yang for the catch. | 2014-05-07 13:11:06 -07:00 |  | 
			
				
					|  | 05334f1b5b | updated the slab_defrag patch (for nginx) with better comments. thanks Shuxin for the suggestions. | 2014-05-06 16:25:56 -07:00 |  | 
			
				
					|  | 91549c16b4 | updated the slab_defrag patch (for nginx) a bit. | 2014-05-06 14:24:24 -07:00 |  | 
			
				
					|  | 1dbd0b24d2 | apply the slab_defrag patch to the nginx core by default. | 2014-05-06 13:16:59 -07:00 |  | 
			
				
					|  | 9c3a123035 | upgraded nginx core to 1.7.0. | 2014-05-03 12:59:19 -07:00 |  | 
			
				
					|  | b0f1e786c1 | upgraded the nginx core to 1.5.12. | 2014-04-03 17:36:53 -07:00 |  | 
			
				
					|  | 37ba2b1015 | backported the patch to the nginx core for the latest SPDY security vulnerability (CVE-2014-0133). | 2014-03-19 17:38:31 -07:00 |  | 
			
				
					|  | d21cc33749 | nginx: disabled the -Werror option for clang too. thanks Hamish Forbes for the report. | 2014-03-13 20:58:54 -07:00 |  | 
			
				
					|  | e36d505d80 | upgraded the patches for nginx 1.5.11. | 2014-03-08 15:02:35 -08:00 |  | 
			
				
					|  | 227e4e0da2 | upgraded nginx core to 1.5.9. | 2014-01-27 22:11:50 -08:00 |  | 
			
				
					|  | 676150c81b | bugfix: setting $args might not make ngx_proxy (and others) honour the change. applied the setting_args_invalidates_uri patch to fix this issue. thanks rvsw for the report. | 2014-01-23 12:06:48 -08:00 |  | 
			
				
					|  | c9d9e4a8dd | updated the resolve-names-with-a-trailing-dot patch according to the feedback from Piotr Sikora and Ruslan Ermilov. | 2014-01-10 12:06:37 -08:00 |  | 
			
				
					|  | 9a3e9dbffd | bugfix: nginx's builtin resolver did not accept domain names with a trailing dot. | 2014-01-08 11:50:58 -08:00 |  | 
			
				
					|  | 1eb135cc6a | upraded the nginx core to 1.5.8. | 2013-12-18 13:44:42 -08:00 |  | 
			
				
					|  | 4bab759ea3 | optimize: shortened the server string "ngx_openresty" to "openresty". | 2013-12-15 16:28:50 -08:00 |  | 
			
				
					|  | 8cec47f755 | upgraded the nginx core to 1.5.7. | 2013-12-15 13:21:56 -08:00 |  | 
			
				
					|  | 0528788543 | feature: added new configure option --with-pcre-conf-opt=OPTIONS to the nginx core to allow custom PCRE ./configure build options. thanks Lance Li for the original patch in #39. | 2013-12-10 10:19:00 -08:00 |  | 
			
				
					|  | 2fb9ed5c1d | updated the larger_max_error_str patch to allow NGX_MAX_ERROR_STR to be redefined from the outside. | 2013-12-05 20:36:53 -08:00 |  | 
			
				
					|  | 1728ca8c66 | feature: applied the larger_max_error_str patch to the nginx core to allow error log messages up to 4096 bytes. | 2013-12-05 20:33:30 -08:00 |  | 
			
				
					|  | 633abb71bf | upgraded the patch "variables_in_redis_pass" to ngx_http_redis 0.3.7. | 2013-12-03 12:06:31 -08:00 |  | 
			
				
					|  | 8b86c72ea2 | applied the official patch patch.2013.space.txt for the Nginx core to fix the security issue CVE-2013-4547. | 2013-11-20 21:05:36 -08:00 |  | 
			
				
					|  | b694456ef3 | bugfix: applied the cache_manager_exit patch to the nginx core to fix an issue when the cache manager process is shutting down. | 2013-11-04 13:08:57 -08:00 |  | 
			
				
					|  | 68d1241d12 | updated the gzip_flush_bug patch to fix the issue in the ngx_gunzip module. thanks Maxim Dounin for the catch. | 2013-10-28 15:30:52 -07:00 |  | 
			
				
					|  | f35f66a487 | feature: added patch nginx-1.4.3-proxy_host_port_vars to make $proxy_host and $proxy_port accessible for dynamic languages like Lua and Perl. | 2013-10-27 15:37:11 -07:00 |  | 
			
				
					|  | aac5d5e49e | updated nginx-1.4.3-gzip_flush_bug.patch according to Maxim Dounin's feedback. | 2013-10-27 15:00:06 -07:00 |  | 
			
				
					|  | 8bc4bf391a | updated the gzip_flush_bug patch according to the feedback from Maxim Dounin. | 2013-10-26 17:24:51 -07:00 |  | 
			
				
					|  | 1df484be52 | bugfix: applied the cache_lock_hang_in_subreq patch to the nginx core to fix the request hang when using proxy_cache_lock in subrequests and the cache lock timeout happens. | 2013-10-26 14:54:50 -07:00 |  | 
			
				
					|  | 4308a5ca45 | bugfix: applied the gzip_flush_bug.patch to the nginx core. see also http://mailman.nginx.org/pipermail/nginx-devel/2013-October/004429.html | 2013-10-25 17:31:39 -07:00 |  | 
			
				
					|  | 274b1b6778 | bugfix: backported Maxim Dounin's patch to fix an issue in the ngx_gzip module: it did not clear r->connection->buffered when the pending data was already flushed out. this could hang ngx_lua's ngx.flush(true) call, for example. | 2013-10-19 20:49:06 -07:00 |  | 
			
				
					|  | 35e053cb6c | upgraded the nginx core to 1.4.3. | 2013-10-17 16:15:42 -07:00 |  | 
			
				
					|  | 221130defc | updated patches for nginx 1.5.4. | 2013-08-30 16:02:05 -07:00 |  | 
			
				
					|  | 921fd6d675 | checked in the patches for nginx 1.5.3; also applied the unix_socket_accept_over_read patch the nginx cores older than 1.5.3. | 2013-08-30 12:41:13 -07:00 |  | 
			
				
					|  | 3d547529fd | upgraded the nginx core to 1.4.2. | 2013-08-06 22:29:52 -07:00 |  | 
			
				
					|  | 96abf202e4 | bugfix: we did not initialize c->addr_text properly in nginx-1.4.1-unix_socket_accept_over_read.patch. | 2013-07-10 13:13:57 -07:00 |  | 
			
				
					|  | cee1aca97f | checked in nginx-1.4.1-unix_socket_accept_over_read.patch. | 2013-07-09 18:16:35 -07:00 |  | 
			
				
					|  | 3a7529d7d0 | fixed patches/nginx-1.4.1-no_pool.patch which did not apply at all. | 2013-06-11 16:51:01 -07:00 |  | 
			
				
					|  | 4cdd11476b | applied the patch gcc-maybe-uninitialized-warning.patch for nginx to fix a gcc warning with gcc 4.7.3/4.7.2. | 2013-06-11 13:05:30 -07:00 |  | 
			
				
					|  | c312ba38b3 | added patches for nginx 1.4.1. | 2013-06-10 16:35:04 -07:00 |  | 
			
				
					|  | 24d8c2265e | feature: applied the invalid_referer_hash patch to the nginx core to make the $invalid_referer variable accessible in embedded dynamic languages like Perl and Lua. thanks Fry-kun for requesting this. | 2013-05-21 16:19:10 -07:00 |  | 
			
				
					|  | 6ce2a28c23 | Merge branch 'tmp' | 2013-05-13 12:42:41 -07:00 |  | 
			
				
					|  | 07fbdad118 | applied the official patch for the nginx security vulnerability CVE-2013-2070. | 2013-05-13 12:37:43 -07:00 |  | 
			
				
					|  | ca9f8d0622 | updated the dtrace patch to reflect recent changes. | 2013-05-13 12:09:47 -07:00 |  | 
			
				
					|  | 529f4c854c | always enable debuginfo in the bundled LuaJIT 2.0 build and Lua 5.1 build to support Nginx Systemtap Toolkit. | 2013-04-20 23:10:26 -07:00 |  |