Timeline
04/05/19:
- 15:40 Changeset in nginx-tests [1461:7959e58429d0] by
- Tests: adjusted proxy.t proxy_read_timeout for slow hosts.
- 15:39 Ticket #1761 (Unknown directive "fastcgi_cache_purge") closed by
-
invalid: The
fastcgi_cache_purge
directive uses different syntax and only … - 15:36 Changeset in nginx-tests [1460:fbb90184102e] by
- Tests: proxy.t doesn't need Socket since cdbdb75cf194, drop it.
- 15:00 Ticket #1761 (Unknown directive "fastcgi_cache_purge") created by
- A config using {fastcgi_cache_purge}: […] Results in: […]
- 13:34 Ticket #1756 (Invalid or Binary in URI causes core 400 and 500 errors, plus binary ...) closed by
- invalid: Thank you for your opinion. As previously suggested, if you want to …
- 05:55 Ticket #1756 (Invalid or Binary in URI causes core 400 and 500 errors, plus binary ...) reopened by
- On the following page... …
04/04/19:
- 19:56 Changeset in nginx [7489:af8abe105348] by
- Win32: avoid using CFLAGS, just add define instead. With CFLAGS set …
- 17:02 Changeset in nginx_org [2358:ee4eccd811cd] by
- Added info about reuseport to stream listen udp.
- 16:49 Ticket #1759 (Closing curly bracket missing on JSON response) closed by
- invalid
- 16:30 Changeset in nginx [7488:955c4b186354] by
- Win32: defined pdb path. By default, MSVC uses vc<version>.pdb in the …
- 13:26 Changeset in nginx [7487:7da71a7b141a] by
- Win32: preserving binary compatibility with Windows XP - Vista. …
- 13:22 Changeset in nginx [7486:52d3600bc25e] by
- Win32: skip building OpenSSL tests to conserve time and space. When …
- 09:09 Ticket #1759 (Closing curly bracket missing on JSON response) updated by
- Made this script; <?php $rv = json_encode(array('bericht' => 'Dit is …
04/03/19:
- 19:27 Ticket #1760 (Client cert verification not working with Openssl 1.1.1b - working on ...) updated by
- Awesome reply. Thank you very much for investigating this.
- 16:10 Ticket #1759 (Closing curly bracket missing on JSON response) updated by
- As previously suggested, if you for some reason think that the problem …
- 15:48 Ticket #1760 (Client cert verification not working with Openssl 1.1.1b - working on ...) closed by
- invalid: The problem is that the root certificate uses the X509v3 Extended Key …
- 14:48 Ticket #1759 (Closing curly bracket missing on JSON response) updated by
- I am testing the working of nginx as a server for our osTicket v1.11 …
- 13:15 Ticket #1760 (Client cert verification not working with Openssl 1.1.1b - working on ...) updated by
- sry about that. They are attached now.
- 12:35 Changeset in nginx [7485:edf5cd6c56fa] by
- OCSP stapling: open ssl_stapling_file in binary-mode. OCSP response …
- 11:27 Ticket #1757 (nginx segfault libc-2.24.so) closed by
- invalid: Thanks for checking, closing this.
- 11:25 Ticket #1760 (Client cert verification not working with Openssl 1.1.1b - working on ...) updated by
- As previously suggested, please provide example certificates which …
- 10:47 Changeset in nginx-tests [1459:2710e9505937] by
- Tests: adjusted limit_req rate in HTTP/2 body preread tests more. A …
- 09:57 Ticket #1760 (Client cert verification not working with Openssl 1.1.1b - working on ...) updated by
- No matter which openssl I try with, I get […]
04/02/19:
- 22:25 Ticket #1757 (nginx segfault libc-2.24.so) updated by
- ok, no error with modsecurity off
- 20:00 Ticket #1760 (Client cert verification not working with Openssl 1.1.1b - working on ...) updated by
- There are a lot of changes between OpenSSL 1.0.2 and OpenSSL 1.1.1, …
- 19:27 Ticket #1760 (Client cert verification not working with Openssl 1.1.1b - working on ...) created by
- Hi guys. If I build Nginx with OpenSSL 1.1.1b, client cert …
- 17:38 Ticket #1759 (Closing curly bracket missing on JSON response) updated by
- I would suggest that the problem is incorrect php script output, …
- 15:20 Ticket #1759 (Closing curly bracket missing on JSON response) created by
- JSON response of a php script holds an extra whitespace at the …
- 10:40 Changeset in nginx_org [2357:344e2535f027] by
- Corrected Russian translation of listen reuseport.
- 10:21 Changeset in nginx-tests [1458:e95133e85798] by
- Tests: unbreak stream_ssl_realip.t with TLS 1.3.
04/01/19:
- 22:53 Ticket #1757 (nginx segfault libc-2.24.so) updated by
- @i.bakirov@…: yes, i have ModSecurity 3.0.3, and seems to be the …
- 17:12 Changeset in nginx_org [2356:ea6964391d52] by
- Clarified usage of r.requestBody in njs.
- 15:15 Ticket #191 (literal newlines logged in error log) updated by
- See also #1756.
- 15:15 Ticket #1756 (Invalid or Binary in URI causes core 400 and 500 errors, plus binary ...) closed by
- duplicate: > 1: Binary data shouldn't be getting written into a text logfile; it …
- 14:25 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- The particular patch changes upstream response handling to strict …
- 14:16 Ticket #1690 (Add MITM detection) closed by
- wontfix
- 12:19 Ticket #947 (nginx -t just a bit buggy) updated by
- See also #1033, #1042, #1758.
- 12:17 Ticket #1758 (CLI test configuration does not detect error within index directive) closed by
- duplicate: Duplicate of #947.
- 12:15 Ticket #1757 (nginx segfault libc-2.24.so) updated by
- Your "nginx -V" output suggests you are using various 3rd party …
03/31/19:
- 18:55 Ticket #1690 (Add MITM detection) updated by
- please close - already implemented in njs.
- 09:40 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- Something else needs to be done, what changes have hit the mainstream?
- 05:40 Ticket #1757 (nginx segfault libc-2.24.so) updated by
- You are using ModSecurity and maybe …
03/30/19:
- 19:46 Ticket #1758 (CLI test configuration does not detect error within index directive) updated by
- Sorry for putting code in description.
- 19:43 Ticket #1758 (CLI test configuration does not detect error within index directive) created by
- Test configuration does not detect a missing semicolon at the end of …
- 17:49 Ticket #1757 (nginx segfault libc-2.24.so) created by
- Hi, occasionally (6-7 times at day) on my vps i have this error: Mar …
- 01:19 Ticket #1756 (Invalid or Binary in URI causes core 400 and 500 errors, plus binary ...) created by
- This is a complicated mess, so it'll take a while to explain... …
03/29/19:
- 17:56 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- See also #1755.
- 17:56 Ticket #1755 (listen address and http2) closed by
- duplicate: Duplicate of #808.
- 17:23 Ticket #1755 (listen address and http2) created by
- Hello, I'm sure this is very much an edge case so I'm not expecting …
- 16:40 Ticket #1731 (Reverse proxy websocket If the number of concurrency is large, many ...) closed by
- invalid: Feedback timeout.
- 16:38 Ticket #1754 (Proxy request supports different Host load balancing(http+https)) closed by
- wontfix: The "upstream" block is to control how a name as written in the …
- 16:26 Ticket #1754 (Proxy request supports different Host load balancing(http+https)) created by
- […] This is the current use of load balancing. But can't support …
03/28/19:
- 12:16 Changeset in nginx_org [2355:d993005f9fea] by
- Updated with Netcraft March 2019 Web Server Survey stats.
- 11:17 Ticket #1753 (Wrong suggestion: could not build server_names_hash, you should ...) closed by
- invalid: Your reading of the error message is wrong - it doesn't suggest to …
- 10:28 Ticket #1753 (Wrong suggestion: could not build server_names_hash, you should ...) created by
- Hello, I have a long domain name, nginx -t suggest change …
03/27/19:
- 12:32 Ticket #1720 (gzip module documentation does not warn about BREACH) closed by
- fixed: Documented: http://hg.nginx.com/nginx.org/rev/a4ef92436fbc …
- 12:25 Changeset in nginx_org [2354:a4ef92436fbc] by
- Documented BREACH attack vulnerability for the gzip module.
- 12:10 Ticket #1752 (400 Bad Request when Content-Length header value starts with HT) created by
- When client send HTTP request with a header of Content-Length that …
- 12:10 Changeset in nginx-tests [1457:80911c4fe023] by
- Tests: loading "data:..." certificates with perl module.
03/26/19:
- 15:35 Ticket #1751 (nginx memory leak in ngx_event_openssl.c with patch) closed by
- fixed: In [changeset:"65074e13f1716e09c28d730586babad7930b7a98/nginx" …
- 15:25 Changeset in nginx [7483:1144c122e370] by
- Version bump.
- 14:58 Ticket #1735 (Nginx js freezing) updated by
-
Milestone changed
Ticket retargeted after milestone closed - 14:58 Milestone njs-0.3.0 completed
- Planned features: * njs modules support
- 14:57 Milestone 1.15.10 completed
- Status: scheduled Trunk: mainline * Port ranges support in …
- 14:20 Changeset in nginx_org [2352:1101e24c6d14] by
- Documented the js_path directive.
- 14:19 Changeset in nginx_org [2353:21f3a93fbe97] by
- njs-0.3.0
- 14:16 Changeset in nginx_org [2351:3ef39edf4836] by
- nginx-1.15.10
- 14:09 Changeset in nginx_org [2350:8e35f3af574b] by
- Documented the "data:" syntax for ssl_certificate and key.
- 14:06 Changeset in nginx [7482:44df73d0fa71] by
- release-1.15.10 tag
- 14:06 Changeset in nginx [7481:75f5c7f62841]release-1.15.10 by
- nginx-1.15.10-RELEASE
- 12:51 Ticket #1751 (nginx memory leak in ngx_event_openssl.c with patch) updated by
- ok, I have alreday submited the chanes to ngix-devel maillist with hg email
- 12:43 Changeset in nginx-tests [1456:f4ae08adc23f] by
- Tests: added njs modules tests.
- 12:43 Changeset in nginx-tests [1455:558d3d9a000c] by
- Tests: adapted js.t to njs changes.
- 10:41 Ticket #1751 (nginx memory leak in ngx_event_openssl.c with patch) updated by
- > Both X509_get_issuer_name() and X509_get_subject_name() will always …
- 07:55 Changeset in nginx_org [2349:0eabe2f4d365] by
- Documented listen port ranges for stream.
- 06:33 Changeset in nginx [7484:65074e13f171] by
- SSL: missing free calls in $ssl_client_s_dn and $ssl_client_i_dn. If …
- 06:27 Ticket #1751 (nginx memory leak in ngx_event_openssl.c with patch) updated by
- Both X509_get_issuer_name() and X509_get_subject_name() will always …
- 06:22 Ticket #1751 (nginx memory leak in ngx_event_openssl.c with patch) updated by
- In searching the memory leaks in production. There is a patched nginx …
03/25/19:
- 16:34 Changeset in nginx-tests [1454:3008cc57b5c9] by
- Tests: shutdown in stream_upstream_zone.t with closed connections.
- 16:11 Changeset in nginx-tests [1453:6f53ec0cf591] by
- Tests: simplified stream_proxy_ssl_verify.t using return directive. …
- 15:12 Ticket #1751 (nginx memory leak in ngx_event_openssl.c with patch) updated by
- Could you please clarify - are you seeing these leaks in practice, or …
- 09:58 Ticket #1751 (nginx memory leak in ngx_event_openssl.c with patch) updated by
- The patch looks good. Please take a look at …
- 06:24 Ticket #1751 (nginx memory leak in ngx_event_openssl.c with patch) created by
- on some error cases X509 certificate is leaking. I have attached the …
03/23/19:
- 22:20 Ticket #1750 (Nginx + sendfile serves wrong content from NFS share, may leak ...) closed by
- invalid: So clearly this is an OS-level problem: […] Likely a bug either …
03/22/19:
- 13:52 Ticket #1750 (Nginx + sendfile serves wrong content from NFS share, may leak ...) updated by
- Strace with wrong content for file 200703.pdf added, must be 200703 …
- 13:30 Changeset in nginx-tests [1452:eda1878cf015] by
- Tests: listen port ranges.
- 12:31 Changeset in nginx-tests [1451:9d579fc770a6] by
- Tests: style.
- 11:28 Ticket #1750 (Nginx + sendfile serves wrong content from NFS share, may leak ...) updated by
- From the debug log it looks like an OS-level problem. nginx properly …
- 10:16 Ticket #1750 (Nginx + sendfile serves wrong content from NFS share, may leak ...) created by
- Nginx + sendfile serves wrong content from NFS share, may leak …
03/21/19:
- 14:33 Ticket #1520 (HTTP/2 connection dropped when URL has large numbers of same parameter) updated by
- See also #1749. Other related tickets: #1420, #1387, #1027, #793.
- 14:30 Ticket #1749 (HTTP/2 broken connection on requests with URI > 5k) closed by
- duplicate: Duplicate of #1520.
- 14:28 Ticket #1415 (HTTP/2 log status as 000, when client send invalid data, like ...) closed by
- invalid: Please see http://nginx.org/en/docs/contributing_changes.html for …
- 14:19 Ticket #1749 (HTTP/2 broken connection on requests with URI > 5k) created by
- HTTP/2 Requests with URIs longer than 5k characters (actually …
03/20/19:
- 17:31 Changeset in nginx [7479:8be88b22fe81] by
- Removed sorting of getaddrinfo() results. Previously the …
- 14:09 Ticket #1748 (FTBFS: objs/Makefile:127: *** multiple target patterns) closed by
-
wontfix: You have
:
in the zlib library path, … - 11:22 Ticket #1748 (FTBFS: objs/Makefile:127: *** multiple target patterns) updated by
-
Could you share
objs/Makefile
with us? - 10:18 Ticket #1748 (FTBFS: objs/Makefile:127: *** multiple target patterns) created by
- 4.19.0-4-amd64 #1 SMP Debian 4.19.28-2 (2019-03-15) x86_64 GNU/Linux …
03/16/19:
- 20:48 Ticket #1747 (apt-key add is deprecated) created by
- https://unit.nginx.org/installation/#debian-packages man APT-KEY(8): …
03/15/19:
- 12:45 Changeset in nginx [7478:4f9b72a229c1] by
- Multiple addresses in "listen". Previously only one address was used …
03/14/19:
- 15:55 Changeset in nginx_org [2348:5e17930672f5] by
- Clarified description of r.uri in njs.
- 12:57 Ticket #1746 (websocket response 302 error) closed by
- invalid: For questions, please use [http://nginx.org/en/support.html mailing …
- 01:43 Ticket #1746 (websocket response 302 error) updated by
- == following is nginx.conf == #user www; worker_processes 5; …
- 01:39 Ticket #1746 (websocket response 302 error) created by
- I have deployed websocket protocol in nginx proxy,but websocket …
03/13/19:
- 14:50 Ticket #1480 (Automatic Let's Encrypt certificate provisioning and renewal) updated by
- See also #1745.
- 14:49 Ticket #1745 (REQ: Built-in ACME/LetsEncrypt) closed by
- duplicate: Duplicate of #1480.
- 14:14 Ticket #1745 (REQ: Built-in ACME/LetsEncrypt) updated by
- https://github.com/torhve/lua-resty-letsencrypt > On the fly SSL …
- 13:48 Ticket #1745 (REQ: Built-in ACME/LetsEncrypt) created by
- Built-in support for ACME/LetsEncrypt would be very useful. There are …
- 12:06 Ticket #1744 (Cannot use custom variable in ssl_certificate directive.) closed by
-
invalid: Variables set with the
set
directive of the rewrite module are only … - 07:02 Ticket #1744 (Cannot use custom variable in ssl_certificate directive.) updated by
- Cannot edit ticket - don't know why. The path to the cert in logs is …
- 06:59 Ticket #1744 (Cannot use custom variable in ssl_certificate directive.) created by
- Nginx: nginx:1.15.9-alpine Part of the config: server { ... set …
03/12/19:
- 00:40 Ticket #1743 (Can't flush HTTP response header under TLS+HTTP2) updated by
- Update What I want is that DATA frame is delayed one minute. […]
03/11/19:
- 18:59 Changeset in nginx_org [2347:bb38eaf636de] by
- Regenerated.
- 18:59 Changeset in nginx_org [2346:8a8176ac9a72] by
- The deal banner.
- 14:11 Ticket #1743 (Can't flush HTTP response header under TLS+HTTP2) created by
- I want to send HTTP response header first before data is sent …
03/09/19:
- 00:03 Changeset in nginx [7477:c74904a17021] by
- SSL: support for parsing PEM certificates from memory. This makes it …
03/08/19:
- 23:55 Changeset in nginx [7476:b6dc8a12c07a] by
- SSL: removed redundant "pkey" variable. It was accidentally …
- 23:43 Ticket #1742 (nginx.exe filesize) closed by
- invalid: Yes. The OpenSSL library used for Windows builds was updated from …
- 18:26 Ticket #1742 (nginx.exe filesize) created by
- Is it normal that the file size nginx.exe 3,136,000 in version 1.15.8 …
- 11:00 Ticket #1741 (Use IP_FREEBIND?) closed by
- worksforme: > Maxim made suggestions via the lists to bind to [::] AND the IPv6 …
03/07/19:
- 21:51 Ticket #1741 (Use IP_FREEBIND?) created by
- Hello. Over the past several years, there have been multiple requests …
- 17:05 Ticket #1740 (ngins -s reopen / SIGUSR1 and permissions problem) closed by
- invalid: For nginx worker processes to be able to open log files in …
- 09:01 Ticket #1740 (ngins -s reopen / SIGUSR1 and permissions problem) created by
- Since this is my first bug report, hello everyone. I have a minor …
03/06/19:
- 17:46 Changeset in nginx [7480:d9c3917c7f90] by
- Listen port ranges. A range is specified with a dash. For each port …
- 13:27 Ticket #1739 (invaild r->port_end) closed by
-
invalid: Correct,
r->port_start
is never set. Bothr->port_start
and … - 07:36 Ticket #1735 (Nginx js freezing) updated by
- I am using the following nginx/njs configuration. Cannot reproduce …
- 03:44 Ticket #1739 (invaild r->port_end) created by
- Then function ngx_http_parse_request_line never set r->port_start. …
- 03:24 Ticket #1735 (Nginx js freezing) updated by
- Replying to mdounin: > Just to make sure it is not …
- 03:22 Ticket #1735 (Nginx js freezing) updated by
- Replying to xeioex: > > When I use stream with js_filter …
Note:
See TracTimeline
for information about the timeline view.