)]}'
{
  "commit": "1ebb44e3e3dcc7e321819a54915e9eff2aa1aa81",
  "tree": "dec3e862570aa0a1c58cf1dceb0a2c3d13a0cb71",
  "parents": [
    "bb40c4ed2f937ac5f2eb276954e67216cd09c473"
  ],
  "author": {
    "name": "Maxim Dounin",
    "email": "mdounin@mdounin.ru",
    "time": "Thu Jan 23 18:32:26 2014 +0400"
  },
  "committer": {
    "name": "Maxim Dounin",
    "email": "mdounin@mdounin.ru",
    "time": "Thu Jan 23 18:32:26 2014 +0400"
  },
  "message": "SSL: fixed $ssl_session_id possible segfault after 97e3769637a7.\n\nEven during execution of a request it is possible that there will be\nno session available, notably in case of renegotiation.  As a result\nlogging of $ssl_session_id in some cases caused NULL pointer dereference\nafter revision 97e3769637a7 (1.5.9).  The check added returns an empty\nstring if there is no session available.\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "9935fb098959e5966fc9c9855ad025535ff74fb7",
      "old_mode": 33188,
      "old_path": "src/event/ngx_event_openssl.c",
      "new_id": "cbe4136a10fe126dd07d2077a73bd99363183e28",
      "new_mode": 33188,
      "new_path": "src/event/ngx_event_openssl.c"
    }
  ]
}
