<ChangeLog> *) Security: now SSL/TLS renegotiation is disabled. Thanks to Maxim Dounin. *) Bugfix: nginx sent gzipped responses to clients those do not support gzip, if "gzip_static on" and "gzip_vary off"; the bug had appeared in 0.7.63. *) Bugfix: if names .domain.tld, .sub.domain.tld, and .domain-some.tld were defined, then the name .sub.domain.tld was matched by .domain.tld. *) Bugfix: segmentation fault and infinite looping in resolver. *) Bugfix: in resolver. Thanks to Artem Bokhan. *) Bugfix: resolver cache poisoning. Thanks to Matthew Dempsky. *) Bugfix: memory leak in resolver. Thanks to Matthew Dempsky. </ChangeLog>
20 lines
910 B
C
20 lines
910 B
C
--- ../ngx_http_redis-0.2.0/ngx_http_redis_module.c.orig 2009-11-19 11:21:17.000000000 +0300
|
|
+++ ../ngx_http_redis-0.2.0/ngx_http_redis_module.c 2009-11-19 11:21:57.000000000 +0300
|
|
@@ -244,7 +244,7 @@
|
|
vv[0] = ngx_http_get_indexed_variable(r, rlcf->db);
|
|
|
|
if (vv[0] == NULL || vv[0]->not_found || vv[0]->len == 0) {
|
|
- ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
+ ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"select 0 redis database" );
|
|
len = sizeof("select 0") - 1;
|
|
} else {
|
|
@@ -287,7 +287,7 @@
|
|
ctx->key.data = b->last;
|
|
|
|
if (vv[0] == NULL || vv[0]->not_found || vv[0]->len == 0) {
|
|
- ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
+ ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"select 0 redis database" );
|
|
*b->last++ = '0';
|
|
} else {
|