Timeline
07/10/20:
- 22:04 Changeset in nginx-tests [1583:8aede7babd9a] by
 - Tests: added grpc tests with wrong response size.
 - 19:36 Ticket #2016 (nginx does not percent-encode Location header properly) created by
 - When nginx is serving static files and the client requests a path that …
 - 15:08 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) closed by
 - duplicate: Duplicate of #676.
 - 15:07 Ticket #676 (Different ssl_protocols per server won`t work) updated by
 - See also #2015.
 - 15:01 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) updated by
 - sorry wrong version, this is 1.18.0
 - 14:53 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) created by
 - I have multiple server blocks on nginx configuration. First, server …
 - 12:33 Changeset in nginx [8470:0d1ad81dd65c]quic by
 - QUIC: delay field of an ACK frame is now calculated.
 - 09:19 Changeset in nginx-tests [1582:ab13e2744d05] by
 - Tests: added slice filter test for original Accept-Ranges.
 
07/09/20:
- 14:33 Changeset in nginx [7683:fac6e1a46206] by
 - Version bump.
 - 14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
 - 
          Status changed
 - 14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
 - Thanks, it's a known issue that keepalive settings are applied …
 - 13:40 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - > So it would be nice if try_files passes through the auth_basic off; …
 - 13:25 Ticket #2014 (nginx dynamic configuration reload is jittery) closed by
 - invalid: Updating configuration implies that nginx will start new worker …
 - 13:21 Changeset in nginx [7684:32a343635b50] by
 - Slice filter: clear original Accept-Ranges. The slice filter allows …
 
07/08/20:
- 08:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - That makes sense, ended up with: […] What I wanted and meant was …
 
07/07/20:
- 22:32 Ticket #2014 (nginx dynamic configuration reload is jittery) created by
 - I am trying to use nginx as a reverse proxy, listening on a port and …
 - 17:21 Changeset in nginx_org [2564:5aa57c656cbf] by
 - Documented TypedArray.prototype.sort() in njs.
 - 16:33 Changeset in nginx_org [2566:ca1ccafab5ef] by
 - njs-0.4.2.
 - 16:12 Milestone njs-0.4.2 completed
 - Planned features and enhancements: * Line level backtrace * The …
 - 16:12 Milestone nginx-1.19.1 completed
 - Status: scheduled Trunk: mainline * proxy_cache_path's …
 - 16:01 Changeset in nginx_org [2562:55da8df41bfd] by
 - nginx-1.19.1
 - 15:56 Changeset in nginx [7682:2ab0ecfe5a5f] by
 - release-1.19.1 tag
 - 15:56 Changeset in nginx [7681:062920e2f3bf]release-1.19.1 by
 - nginx-1.19.1-RELEASE
 - 15:47 Ticket #2013 (auth_basic cannot be overwritten from other context) closed by
 - 
          invalid: You've claimed you've tested the 
curl -IL https://website.com/api, … - 15:25 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - Found it! I think it's not a bug but maybe this can be explained …
 - 15:02 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - Ok, so please test the configuration you've provided in the ticket …
 - 14:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - I'm testing the same way as you did: […] […] It doesn't even …
 - 14:26 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - Replying to royduineveld@…: > But I'm still having the …
 - 14:05 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - Just updated to 1.18.0: […] But I'm still having the same problem. …
 - 13:26 Changeset in nginx_org [2565:45cb60b3b7b2] by
 - Updated Compatibility for njs-0.4.2.
 - 13:26 Changeset in nginx_org [2563:428a8cf1911b] by
 - Documented mkdirSync, readdirSync, rmdirSync, fs.Dirent in njs.
 - 12:51 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - Works fine here: […] While the version you are using is old and …
 - 12:48 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
 - 
          Description changed
 - 12:33 Ticket #2013 (auth_basic cannot be overwritten from other context) created by
 - The documentation says: "The special value off allows cancelling the …
 
07/06/20:
- 23:30 Ticket #1689 (Writing connections leak with http/2) updated by
 - Replying to PenelopeFudd@…: > I had this problem, and …
 - 18:05 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) closed by
 - fixed: Should be fixed for all protocols now.
 - 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
 - In [changeset:"39501ce97e296b4cd36fc81388a2dc66f2601edd/nginx" …
 - 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
 - In [changeset:"05e42236e95b8171ab8fe116f5b498f17a1e1547/nginx" …
 - 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
 - In [changeset:"bffcc5af1d7281c8e5fc93a28bb6f9d77a99f7fe/nginx" …
 - 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
 - In [changeset:"9afa45068b8f76ff5e102dc14f594caa69899b17/nginx" …
 - 15:37 Changeset in nginx-tests [1581:463d6863d360] by
 - Tests: tests for extra data and short responses.
 - 15:36 Changeset in nginx [7680:39501ce97e29] by
 - gRPC: generate error when response size is wrong. As long as the …
 - 15:36 Changeset in nginx [7679:05e42236e95b] by
 - FastCGI: protection from responses with wrong length. Previous …
 - 15:36 Changeset in nginx [7678:bffcc5af1d72] by
 - Upstream: drop extra data sent by upstream. Previous behaviour was to …
 - 15:36 Changeset in nginx [7677:a786e491d08d] by
 - Proxy: style.
 - 15:36 Changeset in nginx [7676:d225b70d38b6] by
 - Proxy: detection of data after final chunk. Previously, additional …
 - 15:36 Changeset in nginx [7675:9afa45068b8f] by
 - Proxy: drop extra data sent by upstream. Previous behaviour was to …
 - 15:36 Changeset in nginx [7674:7731c710796f] by
 - Memcached: protect from too long responses. If a memcached response …
 - 15:01 Changeset in nginx-tests [1580:9e142c0e34b2] by
 - Tests: allowed syslog messages arrival out-of-order. Reported by …
 - 12:38 Changeset in nginx-tests [1579:14eeaa39599d] by
 - Tests: HTTP/2 tests for lingering close.
 
07/05/20:
- 16:01 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
 - When I rearrange this configuration […] into this […] nginx …
 
07/04/20:
- 22:10 Ticket #2012 (Wrong header Connection, when keepalive is disabled) created by
 - I disabled keepalive with directives keepalive_timeout 0 and …
 
07/03/20:
- 17:25 Ticket #1689 (Writing connections leak with http/2) reopened by
 - I had this problem, and upgraded nginx to v1.18 (and now to v1.19). …
 - 13:41 Changeset in nginx [8463:2576485b93d4]quic by
 - HTTP/3: fixed overflow in prefixed integer parser. Previously, the …
 - 13:29 Ticket #1544 (http/2 downloads broken during reload) closed by
 - fixed: HTTP/2 connections now support lingering close mechanism.
 - 13:29 Ticket #1250 (Connection reset with low http2_max_requests) closed by
 - fixed: HTTP/2 connections now support lingering close mechanism.
 - 13:25 Tickets #1250,1544 batch updated by
 - In [changeset:"c5840ca2063d26e432264ad0b0fe00c0bd94252c/nginx" …
 - 13:23 Changeset in nginx_org [2561:397289aeada7] by
 - Improved Russian wording in "min_free" parameter.
 - 13:16 Changeset in nginx [7673:c5840ca2063d] by
 - HTTP/2: lingering close after GOAWAY. After sending the GOAWAY frame, …
 - 11:04 Changeset in nginx_org [2560:a5bbfdf88bbd] by
 - Documented the "min_free" parameter of proxy_cache_path and friends.
 - 09:07 Changeset in nginx [8466:4fd709540daf]quic by
 - HTTP/3: put ngx_http_v3_parse_varlen_int() return code in variable. …
 - 09:05 Changeset in nginx [8465:5611bbb852ce]quic by
 - HTTP/3: simplifed handling ngx_http_v3_parse_literal() return code.
 - 06:26 Changeset in nginx [8464:fdb8edc8e496]quic by
 - HTTP/3: limited prefixed integer size by 62 bits.
 
07/02/20:
- 17:07 Changeset in nginx [8467:e02250b55b17]quic by
 - HTTP/3: simplified handling return codes from parse functions.
 - 15:45 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) closed by
 - duplicate: Yes, this is clearly a duplicate of #147.
 - 15:44 Ticket #147 (nginx touched /var/log/nginx-error.log even when error_log are switched off) updated by
 - See also #2011.
 - 14:35 Changeset in nginx [8462:153bffee3d7e]quic by
 - HTTP/3: fixed prefix in decoding Section Acknowledgement.
 - 13:47 Changeset in nginx [8460:72f9ff4e0a88]quic by
 - HTTP/3: close QUIC connection with HTTP/QPACK errors when needed. …
 - 13:33 Changeset in nginx [8458:e0f92f68e018]quic by
 - QUIC: Introduced ngx_quic_finalize_connection(). The function …
 - 13:33 Changeset in nginx [8457:a7f64438aa3c]quic by
 - HTTP/3: downgraded literal size error level to NGX_LOG_INFO. Now it's …
 - 12:34 Changeset in nginx [8456:c9538aef3211]quic by
 - HTTP/3: refactored dynamic table implementation. Previously dynamic …
 - 12:15 Changeset in nginx [8455:b0e81f49d7c0]quic by
 - HTTP/3: fixed prefixed integer encoding and decoding. Previously …
 
07/01/20:
- 17:14 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) updated by
 - Ah this is probably the same as https://trac.nginx.org/nginx/ticket/147
 - 17:10 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) created by
 - In src/core/nginx.c, in ngx_cdecl(), the commandline parameters are …
 - 06:59 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
 - Thank you! That's exactly this. I do indeed use realip, and switching …
 
06/30/20:
- 19:07 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
 - I assume you also have the realip module enabled in your second server …
 - 14:45 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) created by
 - Using a NGINX configuration where: - a stream server listens on …
 - 14:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
 - invalid: > Who needs an unescaped variable which they cannot use in URLs? This …
 - 12:32 Changeset in nginx [8461:b3c07aa021f6]quic by
 - HTTP/3: set r->headers_in.chunked flag after parsing headers. …
 - 09:30 Changeset in nginx [8459:1ed698947172]quic by
 - HTTP/3: error code definitions for HTTP/3 and QPACK.
 - 09:11 Changeset in nginx-tests [1578:f55d25e08b3e] by
 - Tests: added "ssl_verify_client off" tests (ticket #2008).
 - 05:16 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
 - 
          I have asked where anyone needs an unescaped 
$1and you have … 
06/29/20:
- 21:19 Ticket #2008 (699f6e55bbb4 causes request for client certificate) closed by
 - fixed: Should be fixed now, thanks.
 - 21:16 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
 - In [changeset:"3dcb1aba894afd0125bdda4b05a4dda6dd1987f5/nginx" …
 - 21:09 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
 - invalid: > Again I ask why is $1 decoded to foo bar and how can we get it …
 - 14:15 Changeset in nginx [7672:3dcb1aba894a] by
 - SSL: fixed unexpected certificate requests (ticket #2008). Using …
 - 12:56 Changeset in nginx [8454:032cb35ce758]quic by
 - HTTP/3: http3_max_field_size directive to limit string size. Client …
 - 12:46 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
 - I think I see the complication which I forgot to explain: I am trying …
 
06/27/20:
06/26/20:
- 23:06 Ticket #2009 (dfgdfg) updated by
 - 
          Description changed
 - 23:06 Ticket #2009 (dfgdfg) updated by
 - mistake, delete pls
 - 23:04 Ticket #2009 (dfgdfg) created by
 - mistake, please delete
 - 22:18 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
 - 
          Owner, Status changed
Thanks for reporting this, indeed looks like a bug introduced in … - 08:58 Changeset in nginx [8453:c8cabb5d45f5]quic by
 - HTTP/3: introduced ngx_http_v3_get_module_srv_conf() macro. The macro …
 - 07:05 Changeset in nginx [8452:a6675a976560]quic by
 - HTTP/3: fixed dropping first non-pseudo header.
 
06/25/20:
- 19:12 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
 - 
          Description changed
 - 18:15 Ticket #2008 (699f6e55bbb4 causes request for client certificate) created by
 - A few users (using Chrome and Safari) where getting request for client …
 - 17:31 Changeset in nginx [8451:908cae4f3078]quic by
 - HTTP/3: do not emit a DATA frame header for header_only responses. …
 - 12:12 Changeset in nginx_org [2559:82e6029db0c0] by
 - Updated with Netcraft June 2020 Web Server Survey stats.
 - 11:45 Ticket #1909 (http2_push not pushing the file) updated by
 - 
          Owner, Status changed
 - 11:41 Ticket #1909 (http2_push not pushing the file) updated by
 - If the client has not disabled "pushes" via the SETTINGS frame, and it …
 - 08:43 Ticket #2007 (HTTP2 directive from one "server" passed to another) closed by
 - duplicate: Duplicate of #1623.
 
06/24/20:
- 07:43 Ticket #1057 (Google QUIC - statement) updated by
 - Hello, We announced an experimental nginx-quic repo some time ago, …
 - 07:06 Ticket #2007 (HTTP2 directive from one "server" passed to another) updated by
 - Please change component
 - 07:00 Ticket #2007 (HTTP2 directive from one "server" passed to another) created by
 - Linux 3.10.0-1062.4.1.el7.x86_64 #1 SMP x86_64 GNU/Linux nginx.conf …
 
06/23/20:
- 09:28 Changeset in nginx_org [2558:f2ffb29e5a3a] by
 - Regenerated.
 - 09:28 Changeset in nginx_org [2557:7c020a4ef753] by
 - The App Protect promo updated.
 - 08:57 Changeset in nginx [8449:3c32717d7bb2]quic by
 - README: documented draft-28, draft-29 support.
 - 08:57 Changeset in nginx [8448:011668fc9efd]quic by
 - Update Initial salt and Retry secret from quic-tls-29. See sections …
 - 08:57 Changeset in nginx [8447:97adb87f149b]quic by
 - Get rid of hardcoded numbers used for quic handshake errors.
 - 08:57 Changeset in nginx [8446:df29219988bc]quic by
 - Discard short packets which could not be decrypted. So that …
 - 08:57 Changeset in nginx [8445:3de1b7399650]quic by
 - Close connection with PROTOCOL_VIOLATION on decryption failure. A …
 - 08:57 Changeset in nginx [8444:769d8bdeffb0]quic by
 - Define KEY_UPDATE_ERROR from quic-tls-24.
 - 08:57 Changeset in nginx [8443:3b5fbf1bcdee]quic by
 - Reject new QUIC connection with CONNECTION_REFUSED on shutdown.
 - 08:57 Changeset in nginx [8442:b9bce2c4fe33]quic by
 - Close QUIC connection with NO_ERROR on c->close. That way it makes …
 - 08:57 Changeset in nginx [8441:db8fe75c9c7a]quic by
 - Do not close QUIC sockets in ngx_close_listening_sockets(). This …
 - 08:57 Changeset in nginx [8440:f9592e804834]quic by
 - QUIC error SERVER_BUSY renamed to CONNECTION_REFUSED in draft-29.
 
06/22/20:
- 16:36 Ticket #157 (cache max_size limit applied incorrectly with xfs) closed by
 - fixed: Should be fixed now.
 - 16:32 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) closed by
 - fixed: Should be fixed now. Note though that it is generally a bad idea to …
 - 16:20 Ticket #157 (cache max_size limit applied incorrectly with xfs) updated by
 - In [changeset:"52b34c3f89b460d29228abc79aa96e39b12101c1/nginx" …
 - 16:20 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) updated by
 - In [changeset:"0a04e5e4c40b018f3010ee7e947da249bc978baa/nginx" …
 - 15:03 Changeset in nginx [7670:ccb5ff87ab3e] by
 - Cache: introduced min_free cache clearing. Clearing cache based on …
 - 15:02 Changeset in nginx [7669:52b34c3f89b4] by
 - Too large st_blocks values are now ignored (ticket #157). With XFS, …
 - 15:02 Changeset in nginx [7668:0a04e5e4c40b] by
 - Large block sizes on Linux are now ignored (ticket #1168). NFS on …
 
06/21/20:
- 21:00 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) closed by
 - invalid: It looks like redirects returned by your backend are changed to …
 - 14:06 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) updated by
 - 
          Description changed
 - 14:05 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) created by
 - Config 1 with Host header replacement: location /phpinfo { …
 
06/19/20:
- 15:21 Changeset in nginx-tests [1577:804a7409bc63] by
 - Tests: added ssl_ocsp test with failing request.
 - 13:15 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) closed by
 - duplicate: Duplicate of #1520.
 - 13:15 Ticket #1520 (HTTP/2 connection dropped when URL has large numbers of same parameter) updated by
 - See also #2005.
 - 11:48 Changeset in nginx_org [2556:c81b1fadbcf3] by
 - Updated hello_world example in njs.
 - 11:28 Changeset in nginx_org [2555:5b2764724e0d] by
 - Added list of supported OSes to njs.
 - 08:41 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) updated by
 - raising http2_max_field_size 64k; helps. There is some …
 - 08:29 Changeset in nginx [8450:a62849b6463c]quic by
 - Style.
 - 07:17 Ticket #1785 (Support access to environment variables in config file) updated by
 - +1 for this, here is our use-case: In a kubernetes environment where …
 - 06:52 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) updated by
 - large_client_header_buffers 8 512k; in http section doesn't help. …
 - 06:46 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) created by
 - When http2 is enabled and too long GET is issued nginx closes …
 
06/18/20:
- 16:31 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) closed by
 - worksforme: Feedback timeout.
 - 16:22 Ticket #1990 (proxy_cache_min_uses not counted per variant on initial requests) closed by
 - wontfix: The problem is that it is not possible to determine the variant …
 - 15:21 Ticket #1989 (Nginx not displaying progressive image when in http2) closed by
 - worksforme: Feedback timeout.
 - 13:09 Ticket #2004 (nginx temp files deleting problem) updated by
 - Please elaborate what makes you think that the observed deleted files …
 - 12:40 Changeset in nginx_org [2554:62523c26ddf3] by
 - Updated OpenSSL version used for win32 builds.
 - 11:29 Changeset in nginx [8439:cef417a24755]quic by
 - QUIC: cleaned up quic encryption state tracking. The patch removes …
 - 10:58 Changeset in nginx [8438:a2c34e77cfc1]quic by
 - QUIC: added ALPN checks. quic-transport draft 29: section 7: …
 - 09:42 Changeset in nginx-tests [1576:8177323823d6] by
 - Tests: proxy_cache_path with min_free parameter.
 - 09:25 Ticket #2004 (nginx temp files deleting problem) created by
 - ~# df -h /dev/sda1 15G 11G 4,3G 71% / ~# lsof | grep …
 - 08:16 Changeset in nginx [8437:4e75267865de]quic by
 - QUIC: fixed off-by-one in frame range handler. The ctx->pnum is …
 
06/17/20:
- 12:55 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
 - invalid: > Do you mean by "unescaped" that the URL is decoded from /foo%20bar …
 - 12:23 Ticket #1738 (NGINX Not Honoring proxy_cache_background_update with Cache-Control: ...) updated by
 - As long as Request 4 is in the same connection as Request 3, it is …
 - 06:23 Ticket #1738 (NGINX Not Honoring proxy_cache_background_update with Cache-Control: ...) updated by
 - Hi, Team: Same issue here. We are using …
 - 05:02 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
 - See above.
 
06/16/20:
- 18:25 Changeset in nginx-tests [1575:577e72267fec] by
 - Tests: uwsgi tests with SSL.
 - 08:54 Changeset in nginx [8436:9fe7875ce4bb]quic by
 - QUIC: further limiting maximum QUIC packet size. quic-transport draft …
 - 06:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) updated by
 - 
          Note: in our scenario we are rewriting 
/foo%20barto … - 05:56 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) updated by
 - > you are using $1$is_args$args, where $1 comes from unescaped URI as …
 
06/15/20:
- 21:35 Changeset in nginx [7666:8cf31489b479] by
 - Correctly flush request body to uwsgi with SSL. The flush flag was …
 - 17:17 Changeset in nginx [7667:1ece2ac2555a] by
 - OCSP: fixed use-after-free on error. When validating second and …
 - 14:06 Changeset in nginx [8435:5bc9229ec4cf]quic by
 - QUIC: raise error on missing transport parameters. quic-tls, 8.2: …
 - 13:59 Changeset in nginx [8434:ea4899591798]quic by
 - QUIC: Fixed connection cleanup. A posted event need to be deleted …
 - 07:58 Changeset in nginx [7671:7e0719fb528b] by
 - Fixed potential leak of temp pool. In case ngx_hash_add_key() fails, …
 
06/13/20:
- 22:37 Ticket #2003 (regex generated variable loses character encoding when used in ...) closed by
 - invalid: The stackoveflow post uses a part of the unencoded URI as used in …
 - 22:18 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
 - The first byte of the message body encoded with chunked encoding must …
 - 15:00 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
 - I was using the IntelliJ HTTP tool and noticed that the request is …
 
06/12/20:
- 09:22 Ticket #2003 (regex generated variable loses character encoding when used in ...) created by
 - I had exactly the same problem as is described in this stackoverflow …
 
06/11/20:
- 16:48 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) closed by
 - fixed: Thank you, fixed: …
 
06/10/20:
- 22:46 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) updated by
 - 
          Owner, Status changed
Thanks for catching this. Correct instruction can be found at the … - 18:37 Changeset in nginx [8433:7672ec1e6227]quic by
 - Style.
 - 18:37 Changeset in nginx [8432:391d06a51bc0]quic by
 - Limited max udp payload size for outgoing packets. This allows to …
 - 18:33 Changeset in nginx [8431:70335ec6e5d4]quic by
 - Increased default initial retransmit timeout. This is a temporary …
 - 18:23 Changeset in nginx [8430:6fec79e43694]quic by
 - Fixed usage of own/client transport parameters.
 - 15:26 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by
 - Quoting the keepalive_requests …
 - 12:35 Changeset in nginx-tests [1574:42e37e0434d5] by
 - Tests: stream udp tests with zero-length payload (ticket #1982).
 - 12:27 Changeset in nginx_org [2553:bde70d0a34eb] by
 - Updated with Netcraft May 2020 Web Server Survey stats.
 - 00:58 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) created by
 - I was not sure where to report this. I spoke to members of the IRC …
 
  Note:
 See   TracTimeline
 for information about the timeline view.
    