Skip to content

Merge in shdict CAS PR #1

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 49 commits into from
Closed

Conversation

splitice
Copy link

No description provided.

splitice and others added 30 commits April 5, 2014 21:13
Conflicts:
	src/ngx_http_lua_shdict.c
doc: add balancer_by_lua*, ssl_certificate_by_lua* to the context of some api
doc: fix log_by_lua, runs before nginx access log and after
…nges. now ignoring request bodies indeed trigger disgarding the body upon request finalization.
…aborted prematurely (via ngx.exit, for example) while a light thread is still waiting on ngx.flush(true).
…he ngx_connection_t object which MIGHT lead to socket leaks.
agentzh and others added 19 commits February 9, 2016 16:20
Small documentation fix to sample code
…. Portwood II and Tomas Kvasnicka for the report in openresty#669 and openresty#668, respectively.
…X 1.9.11+ via the --add-dynamic-module=PATH option of ./configure.
…ficiate_by_lua* and some ngx.ssl API functions that are not supported by LibreSSL. thanks George Liu for the report in openresty#654 and Bret for the report in openresty/openresty#148.
@splitice splitice closed this May 11, 2016
@splitice
Copy link
Author

Sorry, my bad.

doujiang24 pushed a commit that referenced this pull request Jun 29, 2021
…found by coverity

   deref_ptr: Directly dereferencing pointer c.
419    if (c->addr_text.len) {
420        p = ngx_snprintf(buf, len, ", client: %V", &c->addr_text);
421        len -= p - buf;
422        buf = p;
423    }
424
   CID 149837 (#1 of 1): Dereference before null check (REVERSE_INULL)check_after_deref: Null-checking c suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
425    if (c && c->listening && c->listening->addr_text.len) {
426        p = ngx_snprintf(buf, len, ", server: %V", &c->listening->addr_text);
427        /* len -= p - buf; */
428        buf = p;
429    }
doujiang24 pushed a commit that referenced this pull request Jun 29, 2021
…esty#1846)

734    buf = p;
735
   deref_ptr: Directly dereferencing pointer c.
736    if (c->addr_text.len) {
737        p = ngx_snprintf(buf, len, ", client: %V", &c->addr_text);
738        len -= p - buf;
739        buf = p;
740    }
741
   CID 149839 (#1 of 1): Dereference before null check (REVERSE_INULL)check_after_deref: Null-checking c suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
742    if (c && c->listening && c->listening->addr_text.len) {
743        p = ngx_snprintf(buf, len, ", server: %V", &c->listening->addr_text);
744        /* len -= p - buf; */
745        buf = p;
746    }
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants