Timeline
07/03/20:
- 17:25 Ticket #1689 (Writing connections leak with http/2) reopened by
- I had this problem, and upgraded nginx to v1.18 (and now to v1.19). …
- 13:41 Changeset in nginx [8463:2576485b93d4]quic by
- HTTP/3: fixed overflow in prefixed integer parser. Previously, the …
- 13:29 Ticket #1544 (http/2 downloads broken during reload) closed by
- fixed: HTTP/2 connections now support lingering close mechanism.
- 13:29 Ticket #1250 (Connection reset with low http2_max_requests) closed by
- fixed: HTTP/2 connections now support lingering close mechanism.
- 13:25 Tickets #1250,1544 batch updated by
- In [changeset:"c5840ca2063d26e432264ad0b0fe00c0bd94252c/nginx" …
- 13:23 Changeset in nginx_org [2561:397289aeada7] by
- Improved Russian wording in "min_free" parameter.
- 13:16 Changeset in nginx [7673:c5840ca2063d] by
- HTTP/2: lingering close after GOAWAY. After sending the GOAWAY frame, …
- 11:04 Changeset in nginx_org [2560:a5bbfdf88bbd] by
- Documented the "min_free" parameter of proxy_cache_path and friends.
- 09:07 Changeset in nginx [8466:4fd709540daf]quic by
- HTTP/3: put ngx_http_v3_parse_varlen_int() return code in variable. …
- 09:05 Changeset in nginx [8465:5611bbb852ce]quic by
- HTTP/3: simplifed handling ngx_http_v3_parse_literal() return code.
- 06:26 Changeset in nginx [8464:fdb8edc8e496]quic by
- HTTP/3: limited prefixed integer size by 62 bits.
07/02/20:
- 17:07 Changeset in nginx [8467:e02250b55b17]quic by
- HTTP/3: simplified handling return codes from parse functions.
- 15:45 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) closed by
- duplicate: Yes, this is clearly a duplicate of #147.
- 15:44 Ticket #147 (nginx touched /var/log/nginx-error.log even when error_log are switched off) updated by
- See also #2011.
- 14:35 Changeset in nginx [8462:153bffee3d7e]quic by
- HTTP/3: fixed prefix in decoding Section Acknowledgement.
- 13:47 Changeset in nginx [8460:72f9ff4e0a88]quic by
- HTTP/3: close QUIC connection with HTTP/QPACK errors when needed. …
- 13:33 Changeset in nginx [8458:e0f92f68e018]quic by
- QUIC: Introduced ngx_quic_finalize_connection(). The function …
- 13:33 Changeset in nginx [8457:a7f64438aa3c]quic by
- HTTP/3: downgraded literal size error level to NGX_LOG_INFO. Now it's …
- 12:34 Changeset in nginx [8456:c9538aef3211]quic by
- HTTP/3: refactored dynamic table implementation. Previously dynamic …
- 12:15 Changeset in nginx [8455:b0e81f49d7c0]quic by
- HTTP/3: fixed prefixed integer encoding and decoding. Previously …
07/01/20:
- 17:14 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) updated by
- Ah this is probably the same as https://trac.nginx.org/nginx/ticket/147
- 17:10 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) created by
- In src/core/nginx.c, in ngx_cdecl(), the commandline parameters are …
- 06:59 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
- Thank you! That's exactly this. I do indeed use realip, and switching …
06/30/20:
- 19:07 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
- I assume you also have the realip module enabled in your second server …
- 14:45 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) created by
- Using a NGINX configuration where: - a stream server listens on …
- 14:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Who needs an unescaped variable which they cannot use in URLs? This …
- 12:32 Changeset in nginx [8461:b3c07aa021f6]quic by
- HTTP/3: set r->headers_in.chunked flag after parsing headers. …
- 09:30 Changeset in nginx [8459:1ed698947172]quic by
- HTTP/3: error code definitions for HTTP/3 and QPACK.
- 09:11 Changeset in nginx-tests [1578:f55d25e08b3e] by
- Tests: added "ssl_verify_client off" tests (ticket #2008).
- 05:16 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
-
I have asked where anyone needs an unescaped
$1
and you have …
06/29/20:
- 21:19 Ticket #2008 (699f6e55bbb4 causes request for client certificate) closed by
- fixed: Should be fixed now, thanks.
- 21:16 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
- In [changeset:"3dcb1aba894afd0125bdda4b05a4dda6dd1987f5/nginx" …
- 21:09 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Again I ask why is $1 decoded to foo bar and how can we get it …
- 14:15 Changeset in nginx [7672:3dcb1aba894a] by
- SSL: fixed unexpected certificate requests (ticket #2008). Using …
- 12:56 Changeset in nginx [8454:032cb35ce758]quic by
- HTTP/3: http3_max_field_size directive to limit string size. Client …
- 12:46 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
- I think I see the complication which I forgot to explain: I am trying …
06/27/20:
06/26/20:
- 23:06 Ticket #2009 (dfgdfg) updated by
-
Description changed
- 23:06 Ticket #2009 (dfgdfg) updated by
- mistake, delete pls
- 23:04 Ticket #2009 (dfgdfg) created by
- mistake, please delete
- 22:18 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
-
Owner, Status changed
Thanks for reporting this, indeed looks like a bug introduced in … - 08:58 Changeset in nginx [8453:c8cabb5d45f5]quic by
- HTTP/3: introduced ngx_http_v3_get_module_srv_conf() macro. The macro …
- 07:05 Changeset in nginx [8452:a6675a976560]quic by
- HTTP/3: fixed dropping first non-pseudo header.
06/25/20:
- 19:12 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
-
Description changed
- 18:15 Ticket #2008 (699f6e55bbb4 causes request for client certificate) created by
- A few users (using Chrome and Safari) where getting request for client …
- 17:31 Changeset in nginx [8451:908cae4f3078]quic by
- HTTP/3: do not emit a DATA frame header for header_only responses. …
- 12:12 Changeset in nginx_org [2559:82e6029db0c0] by
- Updated with Netcraft June 2020 Web Server Survey stats.
- 11:45 Ticket #1909 (http2_push not pushing the file) updated by
-
Owner, Status changed
- 11:41 Ticket #1909 (http2_push not pushing the file) updated by
- If the client has not disabled "pushes" via the SETTINGS frame, and it …
- 08:43 Ticket #2007 (HTTP2 directive from one "server" passed to another) closed by
- duplicate: Duplicate of #1623.
06/24/20:
- 07:43 Ticket #1057 (Google QUIC - statement) updated by
- Hello, We announced an experimental nginx-quic repo some time ago, …
- 07:06 Ticket #2007 (HTTP2 directive from one "server" passed to another) updated by
- Please change component
- 07:00 Ticket #2007 (HTTP2 directive from one "server" passed to another) created by
- Linux 3.10.0-1062.4.1.el7.x86_64 #1 SMP x86_64 GNU/Linux nginx.conf …
06/23/20:
- 09:28 Changeset in nginx_org [2558:f2ffb29e5a3a] by
- Regenerated.
- 09:28 Changeset in nginx_org [2557:7c020a4ef753] by
- The App Protect promo updated.
- 08:57 Changeset in nginx [8449:3c32717d7bb2]quic by
- README: documented draft-28, draft-29 support.
- 08:57 Changeset in nginx [8448:011668fc9efd]quic by
- Update Initial salt and Retry secret from quic-tls-29. See sections …
- 08:57 Changeset in nginx [8447:97adb87f149b]quic by
- Get rid of hardcoded numbers used for quic handshake errors.
- 08:57 Changeset in nginx [8446:df29219988bc]quic by
- Discard short packets which could not be decrypted. So that …
- 08:57 Changeset in nginx [8445:3de1b7399650]quic by
- Close connection with PROTOCOL_VIOLATION on decryption failure. A …
- 08:57 Changeset in nginx [8444:769d8bdeffb0]quic by
- Define KEY_UPDATE_ERROR from quic-tls-24.
- 08:57 Changeset in nginx [8443:3b5fbf1bcdee]quic by
- Reject new QUIC connection with CONNECTION_REFUSED on shutdown.
- 08:57 Changeset in nginx [8442:b9bce2c4fe33]quic by
- Close QUIC connection with NO_ERROR on c->close. That way it makes …
- 08:57 Changeset in nginx [8441:db8fe75c9c7a]quic by
- Do not close QUIC sockets in ngx_close_listening_sockets(). This …
- 08:57 Changeset in nginx [8440:f9592e804834]quic by
- QUIC error SERVER_BUSY renamed to CONNECTION_REFUSED in draft-29.
06/22/20:
- 16:36 Ticket #157 (cache max_size limit applied incorrectly with xfs) closed by
- fixed: Should be fixed now.
- 16:32 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) closed by
- fixed: Should be fixed now. Note though that it is generally a bad idea to …
- 16:20 Ticket #157 (cache max_size limit applied incorrectly with xfs) updated by
- In [changeset:"52b34c3f89b460d29228abc79aa96e39b12101c1/nginx" …
- 16:20 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) updated by
- In [changeset:"0a04e5e4c40b018f3010ee7e947da249bc978baa/nginx" …
- 15:03 Changeset in nginx [7670:ccb5ff87ab3e] by
- Cache: introduced min_free cache clearing. Clearing cache based on …
- 15:02 Changeset in nginx [7669:52b34c3f89b4] by
- Too large st_blocks values are now ignored (ticket #157). With XFS, …
- 15:02 Changeset in nginx [7668:0a04e5e4c40b] by
- Large block sizes on Linux are now ignored (ticket #1168). NFS on …
06/21/20:
- 21:00 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) closed by
- invalid: It looks like redirects returned by your backend are changed to …
- 14:06 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) updated by
-
Description changed
- 14:05 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) created by
- Config 1 with Host header replacement: location /phpinfo { …
06/19/20:
- 15:21 Changeset in nginx-tests [1577:804a7409bc63] by
- Tests: added ssl_ocsp test with failing request.
- 13:15 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) closed by
- duplicate: Duplicate of #1520.
- 13:15 Ticket #1520 (HTTP/2 connection dropped when URL has large numbers of same parameter) updated by
- See also #2005.
- 11:48 Changeset in nginx_org [2556:c81b1fadbcf3] by
- Updated hello_world example in njs.
- 11:28 Changeset in nginx_org [2555:5b2764724e0d] by
- Added list of supported OSes to njs.
- 08:41 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) updated by
- raising http2_max_field_size 64k; helps. There is some …
- 08:29 Changeset in nginx [8450:a62849b6463c]quic by
- Style.
- 07:17 Ticket #1785 (Support access to environment variables in config file) updated by
- +1 for this, here is our use-case: In a kubernetes environment where …
- 06:52 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) updated by
- large_client_header_buffers 8 512k; in http section doesn't help. …
- 06:46 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) created by
- When http2 is enabled and too long GET is issued nginx closes …
06/18/20:
- 16:31 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) closed by
- worksforme: Feedback timeout.
- 16:22 Ticket #1990 (proxy_cache_min_uses not counted per variant on initial requests) closed by
- wontfix: The problem is that it is not possible to determine the variant …
- 15:21 Ticket #1989 (Nginx not displaying progressive image when in http2) closed by
- worksforme: Feedback timeout.
- 13:09 Ticket #2004 (nginx temp files deleting problem) updated by
- Please elaborate what makes you think that the observed deleted files …
- 12:40 Changeset in nginx_org [2554:62523c26ddf3] by
- Updated OpenSSL version used for win32 builds.
- 11:29 Changeset in nginx [8439:cef417a24755]quic by
- QUIC: cleaned up quic encryption state tracking. The patch removes …
- 10:58 Changeset in nginx [8438:a2c34e77cfc1]quic by
- QUIC: added ALPN checks. quic-transport draft 29: section 7: …
- 09:42 Changeset in nginx-tests [1576:8177323823d6] by
- Tests: proxy_cache_path with min_free parameter.
- 09:25 Ticket #2004 (nginx temp files deleting problem) created by
- ~# df -h /dev/sda1 15G 11G 4,3G 71% / ~# lsof | grep …
- 08:16 Changeset in nginx [8437:4e75267865de]quic by
- QUIC: fixed off-by-one in frame range handler. The ctx->pnum is …
06/17/20:
- 12:55 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Do you mean by "unescaped" that the URL is decoded from /foo%20bar …
- 12:23 Ticket #1738 (NGINX Not Honoring proxy_cache_background_update with Cache-Control: ...) updated by
- As long as Request 4 is in the same connection as Request 3, it is …
- 06:23 Ticket #1738 (NGINX Not Honoring proxy_cache_background_update with Cache-Control: ...) updated by
- Hi, Team: Same issue here. We are using …
- 05:02 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
- See above.
06/16/20:
- 18:25 Changeset in nginx-tests [1575:577e72267fec] by
- Tests: uwsgi tests with SSL.
- 08:54 Changeset in nginx [8436:9fe7875ce4bb]quic by
- QUIC: further limiting maximum QUIC packet size. quic-transport draft …
- 06:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) updated by
-
Note: in our scenario we are rewriting
/foo%20bar
to … - 05:56 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) updated by
- > you are using $1$is_args$args, where $1 comes from unescaped URI as …
06/15/20:
- 21:35 Changeset in nginx [7666:8cf31489b479] by
- Correctly flush request body to uwsgi with SSL. The flush flag was …
- 17:17 Changeset in nginx [7667:1ece2ac2555a] by
- OCSP: fixed use-after-free on error. When validating second and …
- 14:06 Changeset in nginx [8435:5bc9229ec4cf]quic by
- QUIC: raise error on missing transport parameters. quic-tls, 8.2: …
- 13:59 Changeset in nginx [8434:ea4899591798]quic by
- QUIC: Fixed connection cleanup. A posted event need to be deleted …
- 07:58 Changeset in nginx [7671:7e0719fb528b] by
- Fixed potential leak of temp pool. In case ngx_hash_add_key() fails, …
06/13/20:
- 22:37 Ticket #2003 (regex generated variable loses character encoding when used in ...) closed by
- invalid: The stackoveflow post uses a part of the unencoded URI as used in …
- 22:18 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- The first byte of the message body encoded with chunked encoding must …
- 15:00 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- I was using the IntelliJ HTTP tool and noticed that the request is …
06/12/20:
- 09:22 Ticket #2003 (regex generated variable loses character encoding when used in ...) created by
- I had exactly the same problem as is described in this stackoverflow …
06/11/20:
- 16:48 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) closed by
- fixed: Thank you, fixed: …
06/10/20:
- 22:46 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) updated by
-
Owner, Status changed
Thanks for catching this. Correct instruction can be found at the … - 18:37 Changeset in nginx [8433:7672ec1e6227]quic by
- Style.
- 18:37 Changeset in nginx [8432:391d06a51bc0]quic by
- Limited max udp payload size for outgoing packets. This allows to …
- 18:33 Changeset in nginx [8431:70335ec6e5d4]quic by
- Increased default initial retransmit timeout. This is a temporary …
- 18:23 Changeset in nginx [8430:6fec79e43694]quic by
- Fixed usage of own/client transport parameters.
- 15:26 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by
- Quoting the keepalive_requests …
- 12:35 Changeset in nginx-tests [1574:42e37e0434d5] by
- Tests: stream udp tests with zero-length payload (ticket #1982).
- 12:27 Changeset in nginx_org [2553:bde70d0a34eb] by
- Updated with Netcraft May 2020 Web Server Survey stats.
- 00:58 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) created by
- I was not sure where to report this. I spoke to members of the IRC …
06/09/20:
- 21:02 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by
-
Description changed
- 21:00 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by
-
Description changed
- 20:53 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by
-
Description changed
- 20:44 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) created by
- *summary*: Persisting upstream connections for a large number of …
- 19:44 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) closed by
- fixed
- 19:05 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) updated by
- In [changeset:"d127837c714f398e04cc8cf26f922c845fb7a6e8/nginx" …
- 00:44 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- > Just one question tho, why Chrome and other clients correctly …
06/08/20:
- 22:49 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- Thank you very much :) I've updated the issue on the Ktor board. Just …
- 21:26 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) closed by
- invalid: Relevant part from the log: […] So the upstream server returns a …
- 20:38 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- Hi, Thank you for your time. Indeed I am very new into web protocols …
- 14:15 Changeset in nginx_org [2552:b5aa27db57b4] by
- Regenerated.
- 14:14 Changeset in nginx_org [2551:6fff2b3fd3ce] by
- App-protect promo added.
- 13:31 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- I don't see any nginx-related details in the issue linked except the …
- 08:40 Changeset in nginx [7665:d127837c714f] by
- Stream: fixed processing of zero length UDP packets (ticket #1982).
- 01:29 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) created by
- A detailed log is available at …
06/07/20:
- 16:30 Ticket #1999 (Fix webdav unable to rename folders and create folders) closed by
- duplicate: Duplicate of #604 (an english explanation can be found in #1966). For …
- 16:25 Ticket #604 (WebDAV: мелкие косяки) updated by
- See also #1999.
- 10:17 Ticket #1999 (Fix webdav unable to rename folders and create folders) created by
- Fix webdav unable to rename folders and create folders in Nginx server …
- 04:27 Ticket #1719 (Enhance proxy_cache_min_uses directive) updated by
- Consider the following scenario: 1. A single resource suddenly …
06/06/20:
- 17:23 Ticket #812 (Fetch OCSP responses on startup, and store across restarts) updated by
- See also #1998.
- 17:23 Ticket #1998 (SSL Stapling not preloading OCSP answer) closed by
- duplicate: The OCSP stapling doesn't imply nor require that stapled OCSP response …
- 13:24 Ticket #1998 (SSL Stapling not preloading OCSP answer) created by
- I use certificates by Let's Encrypt with OCSP MUST STAPLE enabled. …
06/05/20:
- 17:59 Changeset in nginx [8429:8fc9fcf18608]quic by
- Stream ID handling in MAX_STREAM_DATA and STREAM_DATA_BLOCKED.
- 17:59 Changeset in nginx [8428:953cf44708b0]quic by
- Stream ID handling in RESET_STREAM and STOP_SENDING frames.
- 17:59 Changeset in nginx [8427:d437ee1ce81e]quic by
- Reject invalid STREAM ID with STREAM_STATE_ERROR connection error.
- 15:59 Ticket #1997 (Error nginx: [emerg] unknown "upstream_first_byte_time" variable) updated by
- Thanks, Maxim, it's clear now. But this should probably be covered …
- 15:43 Ticket #1997 (Error nginx: [emerg] unknown "upstream_first_byte_time" variable) closed by
- invalid: The [http://nginx.org/r/$upstream_first_byte_time …
- 14:31 Ticket #1997 (Error nginx: [emerg] unknown "upstream_first_byte_time" variable) created by
- Hello! I've added the $upstream_first_byte_time to my log format in …
- 10:20 Changeset in nginx [8426:6ea2f1daedb5]quic by
- Introduced connection error APPLICATION_ERROR from draft-28.
- 10:20 Changeset in nginx [8425:3e38dad3a163]quic by
- Receipt of CONNECTION_CLOSE in 0-RTT is permitted in draft-28.
- 10:20 Changeset in nginx [8424:c70446e3d771]quic by
- Treat receipt of NEW_TOKEN as connection error PROTOCOL_VIOLATION.
06/04/20:
- 17:54 Ticket #1882 (Nginx does not handle asterisk in OPTIONS request) closed by
- wontfix: From RFC point of view, 400 Bad Request is a valid response. Since …
- 17:12 Ticket #1996 (Why is there no Restart=on-failure in systemd unit) created by
- So, nginx failed to start as an upstream DNS provider was not …
- 16:23 Ticket #1250 (Connection reset with low http2_max_requests) updated by
- See also #1544, which is related. Both problems should be solved once …
- 16:23 Ticket #1544 (http/2 downloads broken during reload) updated by
- See also #1250, which is related. Both problems should be solved once …
- 15:20 Ticket #1811 (proxy server,slice+limit_rate,keepalived connection will be delayed to ...) closed by
-
invalid: Feedback timeout.
The description seems to suggest that
limit_rate
… - 14:27 Ticket #1988 (nginx: [emerg] too long parameter, probably missing terminating "'" ...) closed by
- invalid: Feedback timeout.
06/03/20:
- 16:37 Ticket #1991 (Empty response of nginx with ngx_http_perl_module) closed by
- invalid: The problem is that the perl handler sends a response, and then …
- 16:11 Changeset in nginx [7664:699f6e55bbb4] by
- SSL: added verify callback to ngx_ssl_trusted_certificate(). This …
- 13:37 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) updated by
- For the record, tested the details. On Linux, NFS client mounts …
- 09:37 Ticket #586 (variable support for client_max_body_size) updated by
- Is there a simple workaround how to set a globaly and set it to a …
- 01:00 Ticket #1995 (Regular expression with Unicode property test doesn't match as expected) closed by
- invalid: What you see it the result of the fact that URI characters aren't …
Note:
See TracTimeline
for information about the timeline view.