|  | 20e69718ce | fixed a bug in slab_defrag.patch for the nginx core that we may incorrectly access the padding area between the end of pool->pages and pool->start. thanks Shuxin Yang for the catch. | 2014-05-07 13:11:06 -07:00 |  | 
			
				
					|  | 05334f1b5b | updated the slab_defrag patch (for nginx) with better comments. thanks Shuxin for the suggestions. | 2014-05-06 16:25:56 -07:00 |  | 
			
				
					|  | 91549c16b4 | updated the slab_defrag patch (for nginx) a bit. | 2014-05-06 14:24:24 -07:00 |  | 
			
				
					|  | 1dbd0b24d2 | apply the slab_defrag patch to the nginx core by default. | 2014-05-06 13:16:59 -07:00 |  | 
			
				
					|  | 9c3a123035 | upgraded nginx core to 1.7.0. | 2014-05-03 12:59:19 -07:00 |  | 
			
				
					|  | b0f1e786c1 | upgraded the nginx core to 1.5.12. | 2014-04-03 17:36:53 -07:00 |  | 
			
				
					|  | 37ba2b1015 | backported the patch to the nginx core for the latest SPDY security vulnerability (CVE-2014-0133). | 2014-03-19 17:38:31 -07:00 |  | 
			
				
					|  | d21cc33749 | nginx: disabled the -Werror option for clang too. thanks Hamish Forbes for the report. | 2014-03-13 20:58:54 -07:00 |  | 
			
				
					|  | e36d505d80 | upgraded the patches for nginx 1.5.11. | 2014-03-08 15:02:35 -08:00 |  | 
			
				
					|  | 227e4e0da2 | upgraded nginx core to 1.5.9. | 2014-01-27 22:11:50 -08:00 |  | 
			
				
					|  | 676150c81b | bugfix: setting $args might not make ngx_proxy (and others) honour the change. applied the setting_args_invalidates_uri patch to fix this issue. thanks rvsw for the report. | 2014-01-23 12:06:48 -08:00 |  | 
			
				
					|  | c9d9e4a8dd | updated the resolve-names-with-a-trailing-dot patch according to the feedback from Piotr Sikora and Ruslan Ermilov. | 2014-01-10 12:06:37 -08:00 |  | 
			
				
					|  | 9a3e9dbffd | bugfix: nginx's builtin resolver did not accept domain names with a trailing dot. | 2014-01-08 11:50:58 -08:00 |  | 
			
				
					|  | 1eb135cc6a | upraded the nginx core to 1.5.8. | 2013-12-18 13:44:42 -08:00 |  | 
			
				
					|  | 4bab759ea3 | optimize: shortened the server string "ngx_openresty" to "openresty". | 2013-12-15 16:28:50 -08:00 |  | 
			
				
					|  | 8cec47f755 | upgraded the nginx core to 1.5.7. | 2013-12-15 13:21:56 -08:00 |  | 
			
				
					|  | 0528788543 | feature: added new configure option --with-pcre-conf-opt=OPTIONS to the nginx core to allow custom PCRE ./configure build options. thanks Lance Li for the original patch in #39. | 2013-12-10 10:19:00 -08:00 |  | 
			
				
					|  | 2fb9ed5c1d | updated the larger_max_error_str patch to allow NGX_MAX_ERROR_STR to be redefined from the outside. | 2013-12-05 20:36:53 -08:00 |  | 
			
				
					|  | 1728ca8c66 | feature: applied the larger_max_error_str patch to the nginx core to allow error log messages up to 4096 bytes. | 2013-12-05 20:33:30 -08:00 |  | 
			
				
					|  | 633abb71bf | upgraded the patch "variables_in_redis_pass" to ngx_http_redis 0.3.7. | 2013-12-03 12:06:31 -08:00 |  | 
			
				
					|  | 8b86c72ea2 | applied the official patch patch.2013.space.txt for the Nginx core to fix the security issue CVE-2013-4547. | 2013-11-20 21:05:36 -08:00 |  | 
			
				
					|  | b694456ef3 | bugfix: applied the cache_manager_exit patch to the nginx core to fix an issue when the cache manager process is shutting down. | 2013-11-04 13:08:57 -08:00 |  | 
			
				
					|  | 68d1241d12 | updated the gzip_flush_bug patch to fix the issue in the ngx_gunzip module. thanks Maxim Dounin for the catch. | 2013-10-28 15:30:52 -07:00 |  | 
			
				
					|  | f35f66a487 | feature: added patch nginx-1.4.3-proxy_host_port_vars to make $proxy_host and $proxy_port accessible for dynamic languages like Lua and Perl. | 2013-10-27 15:37:11 -07:00 |  | 
			
				
					|  | aac5d5e49e | updated nginx-1.4.3-gzip_flush_bug.patch according to Maxim Dounin's feedback. | 2013-10-27 15:00:06 -07:00 |  | 
			
				
					|  | 8bc4bf391a | updated the gzip_flush_bug patch according to the feedback from Maxim Dounin. | 2013-10-26 17:24:51 -07:00 |  | 
			
				
					|  | 1df484be52 | bugfix: applied the cache_lock_hang_in_subreq patch to the nginx core to fix the request hang when using proxy_cache_lock in subrequests and the cache lock timeout happens. | 2013-10-26 14:54:50 -07:00 |  | 
			
				
					|  | 4308a5ca45 | bugfix: applied the gzip_flush_bug.patch to the nginx core. see also http://mailman.nginx.org/pipermail/nginx-devel/2013-October/004429.html | 2013-10-25 17:31:39 -07:00 |  | 
			
				
					|  | 274b1b6778 | bugfix: backported Maxim Dounin's patch to fix an issue in the ngx_gzip module: it did not clear r->connection->buffered when the pending data was already flushed out. this could hang ngx_lua's ngx.flush(true) call, for example. | 2013-10-19 20:49:06 -07:00 |  | 
			
				
					|  | 35e053cb6c | upgraded the nginx core to 1.4.3. | 2013-10-17 16:15:42 -07:00 |  | 
			
				
					|  | 221130defc | updated patches for nginx 1.5.4. | 2013-08-30 16:02:05 -07:00 |  | 
			
				
					|  | 921fd6d675 | checked in the patches for nginx 1.5.3; also applied the unix_socket_accept_over_read patch the nginx cores older than 1.5.3. | 2013-08-30 12:41:13 -07:00 |  | 
			
				
					|  | 3d547529fd | upgraded the nginx core to 1.4.2. | 2013-08-06 22:29:52 -07:00 |  | 
			
				
					|  | 96abf202e4 | bugfix: we did not initialize c->addr_text properly in nginx-1.4.1-unix_socket_accept_over_read.patch. | 2013-07-10 13:13:57 -07:00 |  | 
			
				
					|  | cee1aca97f | checked in nginx-1.4.1-unix_socket_accept_over_read.patch. | 2013-07-09 18:16:35 -07:00 |  | 
			
				
					|  | 3a7529d7d0 | fixed patches/nginx-1.4.1-no_pool.patch which did not apply at all. | 2013-06-11 16:51:01 -07:00 |  | 
			
				
					|  | 4cdd11476b | applied the patch gcc-maybe-uninitialized-warning.patch for nginx to fix a gcc warning with gcc 4.7.3/4.7.2. | 2013-06-11 13:05:30 -07:00 |  | 
			
				
					|  | c312ba38b3 | added patches for nginx 1.4.1. | 2013-06-10 16:35:04 -07:00 |  | 
			
				
					|  | 24d8c2265e | feature: applied the invalid_referer_hash patch to the nginx core to make the $invalid_referer variable accessible in embedded dynamic languages like Perl and Lua. thanks Fry-kun for requesting this. | 2013-05-21 16:19:10 -07:00 |  | 
			
				
					|  | 6ce2a28c23 | Merge branch 'tmp' | 2013-05-13 12:42:41 -07:00 |  | 
			
				
					|  | 07fbdad118 | applied the official patch for the nginx security vulnerability CVE-2013-2070. | 2013-05-13 12:37:43 -07:00 |  | 
			
				
					|  | ca9f8d0622 | updated the dtrace patch to reflect recent changes. | 2013-05-13 12:09:47 -07:00 |  | 
			
				
					|  | 529f4c854c | always enable debuginfo in the bundled LuaJIT 2.0 build and Lua 5.1 build to support Nginx Systemtap Toolkit. | 2013-04-20 23:10:26 -07:00 |  | 
			
				
					|  | aadd93ff24 | upgraded the nginx core to 1.2.8. | 2013-04-20 22:41:46 -07:00 |  | 
			
				
					|  | 49d9d9b778 | nginx-1.2.7-upstream_truncation.patch: worked around an issue in ngx_event_pipe_copy_input_filter because it does not set p->upstream_done when p->length <= 0 like ngx_http_proxy_copy_filter. | 2013-04-08 16:50:48 -07:00 |  | 
			
				
					|  | 13efb24106 | bugfix: ngx_uwsgi and ngx_scgi did set u->length but not u->pipe->length, thus leading to truncation false positives. | 2013-04-07 15:58:23 -07:00 |  | 
			
				
					|  | 3be0b7f0e1 | bugfix: upstream_truncation.patch: 1. 504 error code in ngx_http_upstream_finalize_request resulted in calling special response handler even when the response header has been sent; 2. use 502 status code in ngx_http_upstream_finalize_request when upstream data truncation happens. | 2013-04-06 18:02:44 -07:00 |  | 
			
				
					|  | 5fb8647d23 | renamed upstream-truncation.patch to upstream_trauncation.patch and also added a test for the case that r->upstream->pipe is NULL. | 2013-04-05 12:48:59 -07:00 |  | 
			
				
					|  | e7053c9ca9 | updated the dtrace patch to make the stap function ngx_chain_dump() print out info about the "last_buf" and "last_in_chain" flags in bufs. | 2013-04-04 18:26:27 -07:00 |  | 
			
				
					|  | 042e2fd27b | renamed the "nonbuffered-upstream-truncation" patch to "upstream-truncation" patch; also fixed issues with chunked upstream response bodies. thanks Andy Yuan for reporting this issue in #24. | 2013-04-04 18:25:00 -07:00 |  |