When Nginx processes each user request, it processes it in sequence according to several different phases, rather than according to the order in the configuration file.
The process of Nginx request processing is divided into 11 stages. The order of execution is
post-read, server-rewrite, find-config, rewrite, post-rewrite, preaccess, access, post-access, try-files , content, log.
- post-read:
Read request content phase
Nginx starts running immediately after reading and parsing the request header
For example, the module ngx_realip registers a handler in the post-read stage. Its function is to force Nginx to think that the source address of the current request is the value of a specified request header. - server-rewrite
Server request address rewriting phase
When the set configuration instructions of the ngx_rewrite module are written directly in the server configuration block, they basically run in the server-rewrite stage - find-config
Configuration lookup phase
This stage does not support Nginx module registration handlers. Instead, the Nginx core completes the matching between the current request and the location configuration block. - rewrite
Location request address rewriting phase
When the directives of the ngx_rewrite module are used in the location block, they run in this rewrite phase.
In addition, the instructions of the ngx_set_misc (set md5, encode_base64, etc.) module, as well as the set_by_lua instructions and rewrite_by_lua instructions of the ngx_lua module are also at this stage. - post-rewrite
Request address rewrite submission phase
The Nginx core completes the "internal jump" operation required by the rewrite phase, if there is such a requirement in the rewrite phase. - preaccess
Access permission check preparation phase
The standard modules ngx_limit_req and ngx_limit_zone run at this stage. The former can control the access frequency of requests, while the latter can limit the concurrency of access. - access
Access permission check phase
The standard module ngx_access, the third-party module ngx_auth_request, and the access_by_lua directive of the third-party module ngx_lua run at this stage.
Configuration instructions are mostly used to perform access control tasks, such as checking the user's access rights and checking whether the user's source IP address is legal - post-access
Access permission check submission phase
It is mainly used to cooperate with the access stage to implement the satisfy function of the configuration instruction provided by the standard ngx_http_core module.
satisfy all (relationship)
satisfy any(or relationship) - try-files
Configuration item try_files processing stage
Specifically used to implement the functions of the standard configuration directive try_files
If the file system objects corresponding to the first N-1 parameters do not exist, the try-files phase will immediately initiate an "internal jump" to the URI specified by the last parameter (i.e., the Nth parameter). - content
Content generation stage
The content phase of Nginx is the most important of all request processing phases, because the configuration instructions running in this phase are generally responsible for generating "content"
And output the HTTP response mission. - log
Log module processing stage
Record log
The above introduces the execution sequence of Nginx and Lua, including the relevant content. I hope it will be helpful to friends who are interested in PHP tutorials.

PHPidentifiesauser'ssessionusingsessioncookiesandsessionIDs.1)Whensession_start()iscalled,PHPgeneratesauniquesessionIDstoredinacookienamedPHPSESSIDontheuser'sbrowser.2)ThisIDallowsPHPtoretrievesessiondatafromtheserver.

The security of PHP sessions can be achieved through the following measures: 1. Use session_regenerate_id() to regenerate the session ID when the user logs in or is an important operation. 2. Encrypt the transmission session ID through the HTTPS protocol. 3. Use session_save_path() to specify the secure directory to store session data and set permissions correctly.

PHPsessionfilesarestoredinthedirectoryspecifiedbysession.save_path,typically/tmponUnix-likesystemsorC:\Windows\TemponWindows.Tocustomizethis:1)Usesession_save_path()tosetacustomdirectory,ensuringit'swritable;2)Verifythecustomdirectoryexistsandiswrita

ToretrievedatafromaPHPsession,startthesessionwithsession_start()andaccessvariablesinthe$_SESSIONarray.Forexample:1)Startthesession:session_start().2)Retrievedata:$username=$_SESSION['username'];echo"Welcome,".$username;.Sessionsareserver-si

The steps to build an efficient shopping cart system using sessions include: 1) Understand the definition and function of the session. The session is a server-side storage mechanism used to maintain user status across requests; 2) Implement basic session management, such as adding products to the shopping cart; 3) Expand to advanced usage, supporting product quantity management and deletion; 4) Optimize performance and security, by persisting session data and using secure session identifiers.

The article explains how to create, implement, and use interfaces in PHP, focusing on their benefits for code organization and maintainability.

The article discusses the differences between crypt() and password_hash() in PHP for password hashing, focusing on their implementation, security, and suitability for modern web applications.

Article discusses preventing Cross-Site Scripting (XSS) in PHP through input validation, output encoding, and using tools like OWASP ESAPI and HTML Purifier.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SublimeText3 Linux new version
SublimeText3 Linux latest version

Dreamweaver CS6
Visual web development tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool
