Timeline
01/07/20:
- 13:01 Ticket #1912 (Ignore duplicate reuseport options) created by
- We use puppet for configuration management, automatically creating …
01/06/20:
- 20:14 Ticket #1534 (OCSP client certificate validation) updated by
- Estonia uses OCSP to verify client certificate validity for national …
01/03/20:
- 22:20 Ticket #1911 ([PATCH] Deprecate TLS 1.0 and TLS 1.1 for March 2020) closed by
- wontfix: In no particular order: - The patch proposed is clearly wrong. - …
01/02/20:
- 10:48 Ticket #1911 ([PATCH] Deprecate TLS 1.0 and TLS 1.1 for March 2020) updated by
- See URL: …
- 10:46 Ticket #1911 ([PATCH] Deprecate TLS 1.0 and TLS 1.1 for March 2020) created by
- [Sent to trac as nginx mx server is rejecting my email] Major browsers …
- 02:15 Ticket #1909 (http2_push not pushing the file) updated by
-
grepping through the debug logs, there are no mentions of word
push
…
12/31/19:
- 10:13 Ticket #1908 (Listen Directive needs Documentation Update) closed by
- wontfix: While port ranges are currently supported in http due to the same …
- 05:41 Ticket #1909 (http2_push not pushing the file) updated by
-
There are no
http2 preload
debug messages in nginx, search for … - 05:39 Ticket #1909 (http2_push not pushing the file) updated by
- Works for me: […]
- 05:37 Ticket #1910 (http2_push not pushing the file) closed by
- duplicate: Duplicate of #1909.
12/30/19:
- 22:05 Ticket #1910 (http2_push not pushing the file) updated by
- This one is duplicate of #1909 Browser request timed out while …
- 22:03 Ticket #1910 (http2_push not pushing the file) created by
- Using http2_push directive in location block doesn't push resources. …
- 22:02 Ticket #1909 (http2_push not pushing the file) created by
- Using http2_push directive in location block doesn't push resources. …
- 17:20 Ticket #1908 (Listen Directive needs Documentation Update) created by
- Hello, I would like to suggest that you update your listen directive …
12/28/19:
- 16:22 Changeset in nginx-tests [1541:b9de5364dfc9] by
- Tests: unbreak dav tests on Perl < 5.12.
12/27/19:
- 16:43 Changeset in nginx [7617:f1720934c45b] by
- SSL: reworked posted next events again. Previous change 1ce3f01a4355 …
- 14:20 Changeset in nginx [7616:fd4d2155d3e6] by
- Trailing space removed.
- 14:20 Changeset in nginx [7615:44534144dcd4] by
- Version bump.
- 13:44 Changeset in nginx_org [2474:1c96b5617fdc] by
- Added Unit 1.14.0 release news.
- 13:01 Ticket #1888 (Nginx cache has multiple formats, and many of them are invalid during ...) updated by
- > Nginx / 1.16.0 does not have this bug Caching behaviour in 1.16.0 …
- 10:15 Changeset in nginx-tests [1540:5e2b8621aa5d] by
- Tests: TODO js_promise.t on njs < 0.3.8.
- 08:59 Changeset in nginx-tests [1539:57a92c20f974] by
- Tests: discarded request body in error_page redirect.
- 08:31 Ticket #1888 (Nginx cache has multiple formats, and many of them are invalid during ...) updated by
- Nginx / 1.16.0 does not have this bug, Do you want to fix the bug in …
12/26/19:
- 15:55 Changeset in nginx-tests [1538:c49e5ca1d840] by
- Tests: dav tests with unsupported request body.
- 14:11 Ticket #1907 (Nginx does not handle URL larger than 8K) updated by
- This problem affects only http2 protocol: http2_max_header_size 1M; …
- 13:47 Ticket #1520 (HTTP/2 connection dropped when URL has large numbers of same parameter) updated by
- See also #1907.
- 13:46 Ticket #1907 (Nginx does not handle URL larger than 8K) closed by
- duplicate: You are using HTTP/2, and the request exceeds default …
- 13:41 Ticket #1907 (Nginx does not handle URL larger than 8K) updated by
- verbose log enabled: […]
- 13:38 Ticket #1907 (Nginx does not handle URL larger than 8K) updated by
- Discussion: https://t.me/nginx_ru/82745 (russian)
- 13:22 Ticket #1907 (Nginx does not handle URL larger than 8K) created by
- Steps to reproduce: […] Logs are clean, these parameters does not …
- 12:35 Changeset in nginx-tests [1537:beb549bce15f] by
- Tests: added njs Promise tests.
- 09:16 Milestone unit-1.14 completed
- New features and enhancements: * requests routing based on clients ip …
12/24/19:
- 16:41 Milestone nginx-1.17.7 completed
- Status: scheduled Trunk: mainline * Bug fixes
- 15:06 Changeset in nginx_org [2473:c5f7a7843ecc] by
- nginx-1.17.7
- 15:00 Changeset in nginx [7614:e99e9b0a8c51] by
- release-1.17.7 tag
- 15:00 Changeset in nginx [7613:e56295fe0ea7]release-1.17.7 by
- nginx-1.17.7-RELEASE
- 14:24 Changeset in nginx [7612:1ce3f01a4355] by
- SSL: reworked posted next events. Introduced in 9d2ad2fb4423 …
12/23/19:
- 18:40 Ticket #1689 (Writing connections leak with http/2) updated by
- In [changeset:"82c1339e2637065fe5849739cb6f5c1f53f2e2ed/nginx" …
- 18:39 Ticket #1689 (Writing connections leak with http/2) closed by
- fixed: Committed, 82c1339e2637. Thanks to everyone involved.
- 18:25 Changeset in nginx [7611:8e64e11aaca0] by
- HTTP/2: introduced separate handler to retry stream close. When …
- 18:25 Changeset in nginx [7610:82c1339e2637] by
- HTTP/2: fixed socket leak with queued frames (ticket #1689). If a …
- 17:39 Changeset in nginx [7609:f609c0ac2972] by
- Dav: added checks for chunked to body presence conditions. These …
- 16:38 Changeset in nginx-tests [1536:0ce1c9516764] by
- Tests: dav.t MKCOL test for trailing slash in Location (if any).
- 15:56 Changeset in nginx [7608:4718a646187a] by
- Update manpage, sort command line options.
- 12:45 Changeset in nginx [7607:d0d6cf5031a3] by
- Discard request body when redirecting to a URL via error_page. …
12/20/19:
- 12:38 Ticket #1905 (SSL ON; Problem) updated by
- Please provide an example configuration which demonstrates the problem.
- 09:13 Ticket #1906 (core dumped with debug timer) updated by
- Does it happen without 3rd party modules? This is expected, as …
- 08:59 Ticket #1906 (core dumped with debug timer) created by
- in /src/event/ngx_event.h […] in …
- 06:52 Ticket #1905 (SSL ON; Problem) created by
- Hello There, We found bug on nginx 1.16.1 version this bug create …
12/19/19:
- 13:29 Changeset in nginx_org [2493:407147d8020f] by
- Documented 413 error for PATCH and POST methods in the API.
- 10:00 Changeset in nginx_org [2472:4823370295e6] by
- Removed invalid statement about keyval caseless match.
12/18/19:
- 20:20 Ticket #1904 (sendfile with io-threads - nginx mistakenly considers premature client ...) updated by
- Thank you for the fast response. I was trying to work around it …
- 15:15 Ticket #1904 (sendfile with io-threads - nginx mistakenly considers premature client ...) updated by
-
Priority, Status, Milestone changed
Yes, thanks. There is a known race condition when usingaio threads;
…
12/17/19:
- 18:59 Ticket #1904 (sendfile with io-threads - nginx mistakenly considers premature client ...) created by
- Hi, The scenario is as follows: 1. Nginx is configured to work with …
- 10:05 Ticket #1903 (Debian package dependencies are broken) closed by
- invalid: Thank you for you report. You're trying to install two conflicting …
- 01:04 Ticket #1903 (Debian package dependencies are broken) created by
- nginx-extras is uninstallable from the Debian repo. Full output from …
12/16/19:
- 15:03 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by
- […] Still present in nginx 1.10.3
- 12:19 Changeset in nginx [7606:db8df9cd84c8] by
- Rewrite: disallow empty replacements. While empty replacements were …
- 12:19 Changeset in nginx [7605:02a539522be4] by
- Tolerate '\0' in URI when mapping URI to path. If a rewritten URI has …
- 12:19 Changeset in nginx [7604:7aa20af4ac00] by
- Rewrite: fixed segfault with rewritten URI and "alias". The "alias" …
- 12:19 Changeset in nginx [7603:e55e28e6998f] by
- Fixed request finalization in ngx_http_index_handler(). Returning 500 …
- 12:19 Changeset in nginx [7602:b399246ea45d] by
- Saved some memory allocations. In configurations when "root" has …
- 12:19 Changeset in nginx [7601:c1a7d3672653] by
- Dav: fixed Location in successful MKCOL response. Instead of reducing …
12/13/19:
- 16:13 Ticket #1902 (Can not use ssl_trusted_certificate to verify Clients) created by
- In my config, I set the following to validate client certificates …
- 04:08 Ticket #1901 (Can not specify cipher list of just 'TLSv1.3') updated by
- Thanks for the reply and pointing to #1529. After reading #1529 I see …
- 00:12 Ticket #1901 (Can not specify cipher list of just 'TLSv1.3') closed by
- invalid: OpenSSL does not support "TLSv1.3" as a valid cipher string: […] …
12/12/19:
- 22:15 Ticket #1901 (Can not specify cipher list of just 'TLSv1.3') created by
- I was testing different scenarios with using TLSv1.2 and TLSv1.3 and I …
- 09:28 Ticket #1891 ($body_bytes_sent and $bytes_sent wrong during sliced subrequest) updated by
- Abc123
12/11/19:
- 19:10 Ticket #1689 (Writing connections leak with http/2) updated by
- Thanks for testing. The patch is currently under an internal review …
- 18:56 Ticket #1610 (Writing connections counter leak in stub_status.) closed by
- duplicate: Thanks for testing. Closing this as a duplicate of #1689, as clearly …
- 16:10 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) updated by
- ok, I'll try that, thanks!
- 16:01 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) updated by
- I would update both nginx and, more important, libmodsecurity and …
- 15:55 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) updated by
- hi Maxim, thanks for getting back! When modsecurity is disabled, it …
- 15:33 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) updated by
- Hi, can you check whether nginx demonstrates the same behaviour with …
- 15:22 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) created by
- Hi there, we run Nginx in a Docker container as a sidecar in a pod in …
- 12:15 Ticket #1610 (Writing connections counter leak in stub_status.) updated by
- I can confirm that patch from #1689 fixed this issue.
- 12:13 Ticket #1689 (Writing connections leak with http/2) updated by
- It's been almost a week we are running nginx with this patch and I …
12/10/19:
- 10:07 Ticket #1899 (Enhance mail module with access control like ngx_http_access_module module) created by
- We are running nginx as the mail proxy, but there are lots of invalid …
12/09/19:
- 11:27 Ticket #1506 (bind() in configuration test is too cautious) updated by
- See also #1898.
- 11:27 Ticket #1791 (Nginx -t changing ownersip of cache path) updated by
- See also #1898.
- 11:26 Ticket #1898 (Owner of directories *_temp changed when tested config) closed by
- duplicate: Duplicate of #1791.
Note:
See TracTimeline
for information about the timeline view.