search
HomeBackend DevelopmentPHP TutorialNginx and Lua execution order

When Nginx processes each user request, it processes it in sequence according to several different phases, rather than according to the order in the configuration file.

The process of Nginx request processing is divided into 11 stages. The order of execution is

post-read, server-rewrite, find-config, rewrite, post-rewrite, preaccess, access, post-access, try-files , content, log.

  • post-read:
    Read request content phase
    Nginx starts running immediately after reading and parsing the request header
    For example, the module ngx_realip registers a handler in the post-read stage. Its function is to force Nginx to think that the source address of the current request is the value of a specified request header.
  • server-rewrite
    Server request address rewriting phase
    When the set configuration instructions of the ngx_rewrite module are written directly in the server configuration block, they basically run in the server-rewrite stage
  • find-config
    Configuration lookup phase
    This stage does not support Nginx module registration handlers. Instead, the Nginx core completes the matching between the current request and the location configuration block.
  • rewrite
    Location request address rewriting phase
    When the directives of the ngx_rewrite module are used in the location block, they run in this rewrite phase.
    In addition, the instructions of the ngx_set_misc (set md5, encode_base64, etc.) module, as well as the set_by_lua instructions and rewrite_by_lua instructions of the ngx_lua module are also at this stage.
  • post-rewrite
    Request address rewrite submission phase
    The Nginx core completes the "internal jump" operation required by the rewrite phase, if there is such a requirement in the rewrite phase.
  • preaccess
    Access permission check preparation phase
    The standard modules ngx_limit_req and ngx_limit_zone run at this stage. The former can control the access frequency of requests, while the latter can limit the concurrency of access.
  • access
    Access permission check phase
    The standard module ngx_access, the third-party module ngx_auth_request, and the access_by_lua directive of the third-party module ngx_lua run at this stage.
    Configuration instructions are mostly used to perform access control tasks, such as checking the user's access rights and checking whether the user's source IP address is legal
  • post-access
    Access permission check submission phase
    It is mainly used to cooperate with the access stage to implement the satisfy function of the configuration instruction provided by the standard ngx_http_core module.
    satisfy all (relationship)
    satisfy any(or relationship)
  • try-files
    Configuration item try_files processing stage
    Specifically used to implement the functions of the standard configuration directive try_files
    If the file system objects corresponding to the first N-1 parameters do not exist, the try-files phase will immediately initiate an "internal jump" to the URI specified by the last parameter (i.e., the Nth parameter).
  • content
    Content generation stage
    The content phase of Nginx is the most important of all request processing phases, because the configuration instructions running in this phase are generally responsible for generating "content"
    And output the HTTP response mission.
  • log
    Log module processing stage
    Record log
').addClass('pre-numbering').hide(); $(this).addClass('has-numbering').parent().append($numbering); for (i = 1; i ').text(i)); }; $numbering.fadeIn(1700); }); });

The above introduces the execution sequence of Nginx and Lua, including the relevant content. I hope it will be helpful to friends who are interested in PHP tutorials.

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How does PHP identify a user's session?How does PHP identify a user's session?May 01, 2025 am 12:23 AM

PHPidentifiesauser'ssessionusingsessioncookiesandsessionIDs.1)Whensession_start()iscalled,PHPgeneratesauniquesessionIDstoredinacookienamedPHPSESSIDontheuser'sbrowser.2)ThisIDallowsPHPtoretrievesessiondatafromtheserver.

What are some best practices for securing PHP sessions?What are some best practices for securing PHP sessions?May 01, 2025 am 12:22 AM

The security of PHP sessions can be achieved through the following measures: 1. Use session_regenerate_id() to regenerate the session ID when the user logs in or is an important operation. 2. Encrypt the transmission session ID through the HTTPS protocol. 3. Use session_save_path() to specify the secure directory to store session data and set permissions correctly.

Where are PHP session files stored by default?Where are PHP session files stored by default?May 01, 2025 am 12:15 AM

PHPsessionfilesarestoredinthedirectoryspecifiedbysession.save_path,typically/tmponUnix-likesystemsorC:\Windows\TemponWindows.Tocustomizethis:1)Usesession_save_path()tosetacustomdirectory,ensuringit'swritable;2)Verifythecustomdirectoryexistsandiswrita

How do you retrieve data from a PHP session?How do you retrieve data from a PHP session?May 01, 2025 am 12:11 AM

ToretrievedatafromaPHPsession,startthesessionwithsession_start()andaccessvariablesinthe$_SESSIONarray.Forexample:1)Startthesession:session_start().2)Retrievedata:$username=$_SESSION['username'];echo"Welcome,".$username;.Sessionsareserver-si

How can you use sessions to implement a shopping cart?How can you use sessions to implement a shopping cart?May 01, 2025 am 12:10 AM

The steps to build an efficient shopping cart system using sessions include: 1) Understand the definition and function of the session. The session is a server-side storage mechanism used to maintain user status across requests; 2) Implement basic session management, such as adding products to the shopping cart; 3) Expand to advanced usage, supporting product quantity management and deletion; 4) Optimize performance and security, by persisting session data and using secure session identifiers.

How do you create and use an interface in PHP?How do you create and use an interface in PHP?Apr 30, 2025 pm 03:40 PM

The article explains how to create, implement, and use interfaces in PHP, focusing on their benefits for code organization and maintainability.

What is the difference between crypt() and password_hash()?What is the difference between crypt() and password_hash()?Apr 30, 2025 pm 03:39 PM

The article discusses the differences between crypt() and password_hash() in PHP for password hashing, focusing on their implementation, security, and suitability for modern web applications.

How can you prevent Cross-Site Scripting (XSS) in PHP?How can you prevent Cross-Site Scripting (XSS) in PHP?Apr 30, 2025 pm 03:38 PM

Article discusses preventing Cross-Site Scripting (XSS) in PHP through input validation, output encoding, and using tools like OWASP ESAPI and HTML Purifier.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool