freebsd-ports/www/nginx/files/extra-patch-ngx_http_redis_module.c
Sergey A. Osokin 161f49b9b5 Update from 0.7.63 to 0.7.64.
<ChangeLog>

*) Security: now SSL/TLS renegotiation is disabled.
   Thanks to Maxim Dounin.

*) Bugfix: nginx sent gzipped responses to clients those do not support
   gzip, if "gzip_static on" and "gzip_vary off"; the bug had appeared
   in 0.7.63.

*) Bugfix: if names .domain.tld, .sub.domain.tld, and .domain-some.tld
   were defined, then the name .sub.domain.tld was matched by
   .domain.tld.

*) Bugfix: segmentation fault and infinite looping in resolver.

*) Bugfix: in resolver.
   Thanks to Artem Bokhan.

*) Bugfix: resolver cache poisoning.
   Thanks to Matthew Dempsky.

*) Bugfix: memory leak in resolver.
   Thanks to Matthew Dempsky.

</ChangeLog>
2009-11-19 08:36:18 +00:00

20 lines
910 B
C

--- ../ngx_http_redis-0.2.0/ngx_http_redis_module.c.orig 2009-11-19 11:21:17.000000000 +0300
+++ ../ngx_http_redis-0.2.0/ngx_http_redis_module.c 2009-11-19 11:21:57.000000000 +0300
@@ -244,7 +244,7 @@
vv[0] = ngx_http_get_indexed_variable(r, rlcf->db);
if (vv[0] == NULL || vv[0]->not_found || vv[0]->len == 0) {
- ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
+ ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
"select 0 redis database" );
len = sizeof("select 0") - 1;
} else {
@@ -287,7 +287,7 @@
ctx->key.data = b->last;
if (vv[0] == NULL || vv[0]->not_found || vv[0]->len == 0) {
- ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
+ ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
"select 0 redis database" );
*b->last++ = '0';
} else {