Next headers resolve my issue
proxy_set_header Range "";
proxy_hide_header Accept-Ranges;
add_header Accept-Ranges none;
Posted at Nginx Forum:
https://forum.nginx.org/read.php?2,285861,285876#msg-285876
___
nginx mailing list
Thanks, I thought so,
and I thought nginx will delete this header via `max_ranges` directive.
Posted at Nginx Forum:
https://forum.nginx.org/read.php?2,285861,285875#msg-285875
___
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/li
Hi there,
I'm using nginx auth_basic "Restricted area" to protect website. So users
have to enter user/pass one time to access, it work fine in computer.
However, When testing with Ipad, everytime access to particular page which
page extension is .ivp, it will require a credential, once I submit
us
Dear Francis:
What I am perceiving from your answers is that if nginx can not know with
(!-d or the try_files) that the uri is a directory or a file, there is not
much it can do about not removing slashes from the uris it gets.
Is there a way to tell nginx that if it gets a "/" from the upstream
Dear Francis:
What I am perceiving from your answers is that if nginx can not know with
(!-d or the try_files) that the uri is a directory or a file.
Is there a way to tell nginx that if it gets a "/" from the upstream to
leave it the way it is? I guess I will give up the idea of having all ur
this is what i have in the module handler function
rc = ngx_http_read_client_request_body(r, ngx_http_test_read_req);
if (rc != NGX_OK && rc != NGX_AGAIN) {
return rc;
}
And this is what i have in
ngx_http_test_read_req
char *buffer = n
Hello!
On Sun, Oct 13, 2019 at 08:47:16PM -0400, Ansuel wrote:
> Hello, i'm developing a custom module that needs to read the request body to
> get some data from it.
> To read the request body i'm using
>
> ngx_http_read_client_request_body
>
> and in the callback i use
>
> for (in = r->r
> On 14 Oct 2019, at 09:56, Hett wrote:
>
> Hello,
> I want to disable resumable downloads.
> Added max_ranges directive:
>
>
>location ~ ^(/[^/]+/[^/]+/[^/]+) {
>set $zone_limit_key $binary_remote_addr$host;
>limit_req zone=req_free burst=10 nodelay;
>limit_conn