Timeline
05/27/14:
- 13:58 Changeset in nginx [5712:adb742cf27f7] by
- release-1.7.1 tag
- 13:58 Changeset in nginx [5711:0351a6d89c3d]release-1.7.1 by
- nginx-1.7.1-RELEASE
- 13:50 Milestone 1.7.1 completed
- Status: released [[http://nginx.org/en/CHANGES | 1.7.1 …
- 12:37 Changeset in nginx [5710:9e9c1310d17c] by
- Sub filter: fixed subrequests handling. In particular, properly …
- 11:42 Changeset in nginx [5709:44532046d9d7] by
- Syslog: fixed message sending on win32.
05/26/14:
- 19:34 Changeset in nginx [5708:aacd994167d3] by
- Syslog: fixed possible resource leak and more verbose logging. Found …
- 13:25 Ticket #563 (improvement proposed for ngx_http_perl_module: add header_in_set) updated by
- Provide values for all potentially required headers. Set the value to …
- 13:21 Ticket #563 (improvement proposed for ngx_http_perl_module: add header_in_set) updated by
- Ok, but this method does not permit dynamic adjustment of exported …
- 13:17 Ticket #563 (improvement proposed for ngx_http_perl_module: add header_in_set) updated by
-
Provide needed data in variables (e.g., via
perl_set
) and use as … - 13:10 Ticket #563 (improvement proposed for ngx_http_perl_module: add header_in_set) updated by
- Thanks for the links. So what is the best practice to insert, in the …
- 09:26 Changeset in nginx-tests [408:82b15c81978e] by
- Tests: skipped tests on win32 that use shared memory.
05/23/14:
- 13:50 Ticket #563 (improvement proposed for ngx_http_perl_module: add header_in_set) closed by
- wontfix: There are no plans to add an ability to modify incoming request …
- 13:30 Ticket #559 (improvement proposed for ngx_http_auth_request_module) updated by
- Replying to David Coutadeur <david.coutadeur@gmail.com>: > …
- 13:02 Ticket #563 (improvement proposed for ngx_http_perl_module: add header_in_set) created by
- Hi, I would like to set input headers in perl module, but I realized …
- 12:46 Ticket #559 (improvement proposed for ngx_http_auth_request_module) updated by
- Hi, What I would like to have is these 3 behaviours: - auth_request …
- 12:37 Changeset in nginx [5707:31dd63dcb9ea] by
- Events: use eventfd() instead of syscall(SYS_eventfd) if possible. …
- 09:47 Changeset in nginx [5706:a2bf26774cd3] by
- Upstream: fix tries check in ip_hash. Make two checks for maximum …
05/22/14:
- 19:14 Changeset in nginx-tests [407:2711722a85c3] by
- Tests: added safety measure for old libgd versions.
- 17:07 Changeset in nginx-tests [406:811fbc213fd8] by
- Tests: sub filter tests with subrequests.
- 11:25 Ticket #562 (error_log does should support variables) updated by
- Yes, my intention was for error_log in server context. It would be …
- 11:03 Ticket #561 (error in init.d script in Centos RPM) updated by
- Thanks. We will build fixed package next week.
- 11:01 Ticket #562 (error_log does should support variables) updated by
- Even more important that the error log is a critical thing. It must be …
- 10:08 Ticket #562 (error_log does should support variables) closed by
- invalid: It's so by design. Variables are only available with HTTP requests, …
- 09:47 Ticket #562 (error_log does should support variables) created by
- Hello, access_log supports variables in the path given, but not …
- 07:51 Ticket #9 (autoindex_max_name_len directive) updated by
- Original patch was for nginx 1.1.1, this is the same patch just for a …
- 06:43 Ticket #531 (source port logging) closed by
- fixed: With d5b8ee9f2201, the client port is output in the "connected to" log …
05/21/14:
- 20:25 Ticket #531 (source port logging) updated by
- In d5b8ee9f2201e1d9fa7ac41da9a4a8d939cd42b1/nginx: […]
- 20:16 Changeset in nginx [5705:d5b8ee9f2201] by
- Mail: output client port number on client connects (ticket #531).
- 20:16 Changeset in nginx [5704:524741fd50ed] by
- Core: output client port number when logging accept event.
- 17:56 Changeset in nginx [5791:d68cd5070f3d]stable-1.6 by
- Mail: added a check for the number of arguments in MAIL/RCPT. Missed …
- 17:56 Changeset in nginx [5703:7deb01451486] by
- Mail: added a check for the number of arguments in MAIL/RCPT. Missed …
- 14:20 Ticket #409 (Move syslog support for the ngx_http_log_module into NGINX open source) closed by
- fixed: Syslog support is merged into the open-source nginx branch. Commit: …
- 14:20 Changeset in nginx-tests [405:a8bfad2a3f84] by
- Tests: whitespace fix.
- 14:18 Ticket #95 (Integrate syslog patch into modules) closed by
- wontfix: These patches are no longer needed. See …
- 13:43 Changeset in nginx-tests [404:997f5fe16545] by
- Tests: added syslog tests.
05/20/14:
- 21:24 Ticket #561 (error in init.d script in Centos RPM) updated by
-
Status changed
- 20:00 Ticket #561 (error in init.d script in Centos RPM) created by
- The new RPM for centos 5 (and probably all rhel and centos packages) …
- 16:13 Ticket #522 (websocket connect failed with non default_server) closed by
- invalid: As already suggested, most likely reason is that nginx is working with …
- 15:49 Ticket #554 (https://wiki.nginx.org/ serves *.nginx.com ssl certificate) closed by
- fixed: There is not https on wiki.nginx.org and now it closes connection …
- 15:39 Ticket #375 (Unable to do if checking on $sent_http_content_type) closed by
- invalid
- 12:10 Changeset in nginx [5701:1209b8a7b077] by
- Configure: the --build= option. If set, its value is output in "nginx …
- 10:53 Changeset in nginx-tests [403:22f6aa0d1139] by
- Tests: added version checks to charset_gzip_static.t TODOs.
- 10:03 Changeset in nginx [5700:5e892d40e5cc] by
- SSL: $ssl_client_fingerprint variable.
05/19/14:
- 18:45 Changeset in nginx [5699:e9dbffc18a77] by
- Setting $args now invalidates unparsed uri. Prodded by Yichun Zhang.
- 18:45 Changeset in nginx [5698:fcb0420f90de] by
- Charset filter: fixed charset setting on encoded replies. If response …
- 11:15 Ticket #560 (ECDSA server certificate) closed by
- invalid: Looks like problem in OpenSSL with the certificate you are trying to …
05/18/14:
- 17:19 Ticket #560 (ECDSA server certificate) created by
- I tested ECDSA certificates with nginx and found it crashes […] …
- 10:42 Ticket #559 (improvement proposed for ngx_http_auth_request_module) updated by
- There is nothing to stop from conditional processing in error page …
05/16/14:
- 18:39 Ticket #559 (improvement proposed for ngx_http_auth_request_module) updated by
- Sorry but my use case really needs two defined different behaviours …
- 17:19 Changeset in nginx-tests [402:25c9cd16ae04] by
- Tests: fixed charset_gzip_static.t tests again.
- 16:53 Ticket #559 (improvement proposed for ngx_http_auth_request_module) closed by
- wontfix: If needed (and possible in a particular configuration), this can be …
- 16:49 Ticket #559 (improvement proposed for ngx_http_auth_request_module) created by
- Hi all, I propose a nice functionnality which is to provide …
- 16:30 Changeset in nginx-tests [401:2961a6a83809] by
- Tests: fixed charset_gzip_static.t tests.
- 16:06 Changeset in nginx-tests [400:98d9b06b087b] by
- Tests: adjust least_conn test timeouts.
- 15:25 Changeset in nginx-tests [399:c6ab68c41c8c] by
- Tests: charset filter tests.
- 14:27 Ticket #86 (the "if" directive have problems in location context) updated by
-
Sensitive changed
A particular case with regex location + alias + if is resolved by … - 13:42 Changeset in nginx [5697:c985d90a8d1f] by
- Fixed alias in regex locations with limit_except/if. The …
05/15/14:
- 15:22 Changeset in nginx [5692:ed5fb7d22d46] by
- SPDY: set log action for PROXY protocol only while parsing it. …
- 15:18 Changeset in nginx [5688:86232c95623d] by
- SPDY: prevented creation of RST_STREAM in protocol error state. …
- 01:43 Ticket #97 (try_files and alias problems) updated by
- I still confirm Maxim's reported bug 1st example of bug as of today …
05/14/14:
- 18:26 Changeset in nginx [5685:0cbefdcf82a6] by
- Style: use %N instead of '\n' where appropriate.
- 18:26 Changeset in nginx [5684:bc98b0f11bdd] by
- Core: use '\r' for CR and '\n' for LF definitions.
- 13:25 Ticket #215 (SSL: decryption failed or bad record mac with upstream servers) updated by
- Just for record: This seems to be already fixed by many/most major OS …
- 11:31 Ticket #307 (Filename support in error_page) closed by
- wontfix: No, thanks.
- 08:18 Changeset in nginx-tests [398:077ffeac825c] by
- Tests: image filter tests.
05/13/14:
- 10:51 Ticket #491 (performance issue on same url) updated by
- I havent been able to reproduce performance degradation on "long" …
05/12/14:
- 20:50 Ticket #251 (Option to disable upload buffers) updated by
- We've run into similar issues with this when using nginx as a server …
- 17:16 Ticket #558 (Conditional (If-None-Match) requests against cached content require ...) created by
- Summary - conditional requests using If-None-Match "eTag" don't match …
- 12:34 Changeset in nginx [5702:777202558122] by
- Added syslog support for error_log and access_log directives.
05/08/14:
- 14:03 Ticket #557 (autoindex_show_hidden_files (autoindex feature option to show hidden files) updated by
- the new syntax for this option is now: syntax: …
- 14:02 Ticket #557 (autoindex_show_hidden_files (autoindex feature option to show hidden files) updated by
- Because of the following disucssion/feedback in the forum, I have …
- 00:36 Ticket #557 (autoindex_show_hidden_files (autoindex feature option to show hidden files) created by
- Attached a small patch to the autoindex module adding the option to …
05/05/14:
- 18:18 Ticket #555 (missing fastcgi_param SCRIPT_FILENAME variable in default package conf ...) updated by
-
There is also
fastcgi.conf
shipped with `fastcgi_param … - 16:27 Ticket #555 (missing fastcgi_param SCRIPT_FILENAME variable in default package conf ...) closed by
- wontfix: $request_filename for SCRIPT_FILENAME maybe simply wrong. It is …
- 08:18 Ticket #556 (OCSP stapling not working with comodo PositiveSSL) updated by
- Ivestigated futher and made this patch: […] Checks issuer …
- 07:46 Changeset in nginx-tests [397:847ea345becb] by
- Tests: removed TODO and try_run() checks for legacy versions.
05/04/14:
- 21:24 Ticket #556 (OCSP stapling not working with comodo PositiveSSL) updated by
- Patch provided here solves problem for openssl: …
- 17:42 Ticket #556 (OCSP stapling not working with comodo PositiveSSL) updated by
- Upload button does not let me upload the cert file. So I put it here: …
- 17:36 Ticket #556 (OCSP stapling not working with comodo PositiveSSL) created by
- When using OCSP stapling resolver 8.8.8.8 8.8.4.4 valid=300s; …
05/03/14:
- 10:06 Ticket #555 (missing fastcgi_param SCRIPT_FILENAME variable in default package conf ...) created by
- I updated nginx to 1.6.0 via http://wiki.nginx.org/Install on my …
05/01/14:
- 17:19 Ticket #553 (OCSP stapling does not work when the OCSP server has a CNAME) updated by
- Did you define a resolver in your nginx config? For the OCSP stapling …
- 13:04 Ticket #554 (https://wiki.nginx.org/ serves *.nginx.com ssl certificate) created by
- Don't know if this is the place for this but i wanted to let you guys …
- 01:27 Ticket #553 (OCSP stapling does not work when the OCSP server has a CNAME) created by
- I am trying to enable OCSP Stapling on a server with a RapidSSL …
04/30/14:
- 16:34 Changeset in nginx [5696:19a14a484707] by
- SPDY: added protection from overrun of the receive buffer.
- 16:34 Changeset in nginx [5695:231588611230] by
- SPDY: added a debug point to the state buffer overflow protection.
- 16:34 Changeset in nginx [5694:9a95eb9f448b] by
- SPDY: refactored ngx_http_spdy_state_headers(). This change is …
- 16:34 Changeset in nginx [5693:701d6e17e42c] by
- SPDY: improved logging.
- 16:34 Changeset in nginx [5691:31349361558e] by
- SPDY: ngx_http_spdy_state_headers() error handling cleanup. - …
- 16:34 Changeset in nginx [5690:fb56f5d612a0] by
- SPDY: improved error handling of header block decompression. Now …
- 16:34 Changeset in nginx [5689:5d55f03b1e12] by
- SPDY: removed ngx_http_spdy_state_headers_error(). The function just …
- 16:33 Changeset in nginx [5687:6642690698f1] by
- SPDY: improved ngx_http_spdy_state_protocol_error(). Now …
- 15:16 Changeset in nginx [5682:110b50657d77] by
- Upstream: restored workaround for "if". The 7022564a9e0e changeset …
- 15:16 Changeset in nginx [5681:56ad171c3dd1] by
- Core: improved ngx_conf_parse() error handling. Previous code failed …
- 15:16 Changeset in nginx [5680:dfb3c15bc851] by
- Core: fixed error handling in ngx_reopen_files(). Found by Coverity …
- 15:16 Changeset in nginx [5679:5748ce74c1cc] by
- Cache: added ngx_quit check to ngx_http_file_cache_expire(). While …
- 15:16 Changeset in nginx [5678:0e1491139947] by
- Configure: typo fixed.
- 14:28 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) closed by
- invalid: Closing this.
- 14:04 Changeset in nginx-tests [396:5eb0df61f371] by
- Tests: added tests for the "$upstream_cookie_<name>" variables.
- 12:01 Ticket #531 (source port logging) updated by
- Linking the mailing list thread here: …
- 11:28 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) updated by
- "resolver ... ipv6=off"
- 11:13 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) updated by
- You can disable IPv6 support in nginx completely by configuring it …
- 11:01 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) updated by
- Thank you for the explanation. Could you add a configuration option …
- 10:54 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) updated by
- By using variables in "proxy_pass" you requested resolution of …
- 10:37 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) updated by
- I performed some testing. The easiest way to reproduce this issue is …
- 07:57 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) updated by
- We use the following configuration, which doesn't contain any IPv6 …
- 07:47 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) updated by
- The changeset you mention only affects whether getaddrinfo() will …
- 07:12 Ticket #552 (Nginx doesn't honor net.ipv6.conf.all.disable_ipv6) created by
- Changeset http://hg.nginx.org/nginx/rev/ec8594b9bf11 should disable …
04/29/14:
- 22:16 Changeset in nginx [5686:5cf537731218] by
- SPDY: fixed one case of improper memory allocation error handling. …
- 20:22 Changeset in nginx [5683:48c97d83ab7f] by
- OCSP stapling: missing OCSP request free call.
- 08:28 Changeset in nginx [5677:3a48775f1535] by
- Upstream: added the "$upstream_cookie_<name>" variables.
04/28/14:
- 22:37 Ticket #551 (Start Failure; Invalid Option with Map Expression in nginx.conf) updated by
- Thanks! Yup, the 14.04 version of /etc/init.d/nginx does this: […]
- 21:44 Ticket #551 (Start Failure; Invalid Option with Map Expression in nginx.conf) closed by
- invalid: This doesn't looks like a problem in nginx. Rather, it's an incorrect …
- 21:28 Ticket #550 (Add method to remove or change deafult headers.) closed by
- wontfix: There are no plans to add an ability to modify any header.
- 20:37 Ticket #551 (Start Failure; Invalid Option with Map Expression in nginx.conf) created by
- I recently upgraded a server from Ubuntu 12.04 LTS to 14.04 LTS and …
- 19:48 Ticket #550 (Add method to remove or change deafult headers.) created by
- By default nginx responds with a number of headers, for example I have …
- 16:06 Ticket #549 (unexpected multiple 206 errors on transferring file) updated by
- From the data provided it looks like connections are closed for some …
- 14:13 Ticket #549 (unexpected multiple 206 errors on transferring file) created by
- Hello, I have a following setup: nginx + haproxy on LB server (nginx …
- 13:20 Ticket #548 (A wrong server config in upstream get an error ip addr) closed by
- wontfix: 1181 is 4*256+157, that is 0.0.4.157 IPv4 address as per inet_addr(3). …
- 12:06 Ticket #548 (A wrong server config in upstream get an error ip addr) created by
- in an upstream config like : upstream test{ server 1181; …
Note:
See TracTimeline
for information about the timeline view.