Timeline
07/13/20:
- 14:31 Changeset in nginx [8474:909b989ec088]quic by
- QUIC: reworked retransmission mechanism. Instead of timer-based …
- 14:00 Ticket #2016 (nginx does not percent-encode Location header properly) updated by
-
Status changed
Yes, known issue, thanks for the report. - 13:11 Ticket #376 (log file reopen should pass opened fd from master process) updated by
- This is going to be implemented at some point. This is relatively low …
- 13:00 Changeset in nginx [8488:79125ef2e39f]quic by
- HTTP/3: header encoding functions.
- 12:34 Changeset in nginx [8468:001ec7fce567]quic by
- Merged with the default branch.
- 09:38 Changeset in nginx [8491:6e1798a4a0d2]quic by
- HTTP/3: renamed ngx_http_v3.c to ngx_http_v3_encode.c. The file …
- 09:33 Changeset in nginx [8490:e24f7b50ba1d]quic by
- HTTP/3: encode frame ids with ngx_http_v3_encode_varlen_int(). Even …
- 08:38 Changeset in nginx_org [2567:4f3494d80949] by
- Documented support for HTTP/2 in lingering_close.
- 07:07 Changeset in nginx [8471:9ed4c12ec948]quic by
- QUIC: caching c->quic in the ngx_quic_handle_ack_frame() function. To …
- 07:07 Changeset in nginx [8472:3b15732ac03f]quic by
- QUIC: renaming. The c->quic->retransmit timer is now called "pto". …
07/12/20:
- 15:08 Ticket #2017 (worker_connections are not enough) updated by
-
Component changed
07/11/20:
- 14:56 Ticket #2017 (worker_connections are not enough) updated by
- Downgraing to v1.19.0 solve the issue Btw, this issue commponent is …
- 14:12 Ticket #2017 (worker_connections are not enough) updated by
- I'm pretty sure that is not because of ulimit problem
- 14:08 Ticket #2017 (worker_connections are not enough) created by
- after update to v1.19.1 (nginx from official docker image), I got many …
- 09:36 Ticket #376 (log file reopen should pass opened fd from master process) updated by
- Hi, I'm part of the Debian LTS Team. What is the nginx maintainers' …
07/10/20:
- 22:04 Changeset in nginx-tests [1583:8aede7babd9a] by
- Tests: added grpc tests with wrong response size.
- 19:36 Ticket #2016 (nginx does not percent-encode Location header properly) created by
- When nginx is serving static files and the client requests a path that …
- 15:08 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) closed by
- duplicate: Duplicate of #676.
- 15:07 Ticket #676 (Different ssl_protocols per server won`t work) updated by
- See also #2015.
- 15:01 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) updated by
- sorry wrong version, this is 1.18.0
- 14:53 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) created by
- I have multiple server blocks on nginx configuration. First, server …
- 12:33 Changeset in nginx [8470:0d1ad81dd65c]quic by
- QUIC: delay field of an ACK frame is now calculated.
- 09:19 Changeset in nginx-tests [1582:ab13e2744d05] by
- Tests: added slice filter test for original Accept-Ranges.
07/09/20:
- 14:33 Changeset in nginx [7683:fac6e1a46206] by
- Version bump.
- 14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
-
Status changed
- 14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
- Thanks, it's a known issue that keepalive settings are applied …
- 13:40 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- > So it would be nice if try_files passes through the auth_basic off; …
- 13:25 Ticket #2014 (nginx dynamic configuration reload is jittery) closed by
- invalid: Updating configuration implies that nginx will start new worker …
- 13:21 Changeset in nginx [7684:32a343635b50] by
- Slice filter: clear original Accept-Ranges. The slice filter allows …
07/08/20:
- 08:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- That makes sense, ended up with: […] What I wanted and meant was …
07/07/20:
- 22:32 Ticket #2014 (nginx dynamic configuration reload is jittery) created by
- I am trying to use nginx as a reverse proxy, listening on a port and …
- 17:21 Changeset in nginx_org [2564:5aa57c656cbf] by
- Documented TypedArray.prototype.sort() in njs.
- 16:33 Changeset in nginx_org [2566:ca1ccafab5ef] by
- njs-0.4.2.
- 16:12 Milestone njs-0.4.2 completed
- Planned features and enhancements: * Line level backtrace * The …
- 16:12 Milestone nginx-1.19.1 completed
- Status: scheduled Trunk: mainline * proxy_cache_path's …
- 16:01 Changeset in nginx_org [2562:55da8df41bfd] by
- nginx-1.19.1
- 15:56 Changeset in nginx [7682:2ab0ecfe5a5f] by
- release-1.19.1 tag
- 15:56 Changeset in nginx [7681:062920e2f3bf]release-1.19.1 by
- nginx-1.19.1-RELEASE
- 15:47 Ticket #2013 (auth_basic cannot be overwritten from other context) closed by
-
invalid: You've claimed you've tested the
curl -IL https://website.com/api
, … - 15:25 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Found it! I think it's not a bug but maybe this can be explained …
- 15:02 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Ok, so please test the configuration you've provided in the ticket …
- 14:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- I'm testing the same way as you did: […] […] It doesn't even …
- 14:26 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Replying to royduineveld@…: > But I'm still having the …
- 14:05 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Just updated to 1.18.0: […] But I'm still having the same problem. …
- 13:26 Changeset in nginx_org [2565:45cb60b3b7b2] by
- Updated Compatibility for njs-0.4.2.
- 13:26 Changeset in nginx_org [2563:428a8cf1911b] by
- Documented mkdirSync, readdirSync, rmdirSync, fs.Dirent in njs.
- 12:51 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Works fine here: […] While the version you are using is old and …
- 12:48 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
-
Description changed
- 12:33 Ticket #2013 (auth_basic cannot be overwritten from other context) created by
- The documentation says: "The special value off allows cancelling the …
07/06/20:
- 23:30 Ticket #1689 (Writing connections leak with http/2) updated by
- Replying to PenelopeFudd@…: > I had this problem, and …
- 18:05 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) closed by
- fixed: Should be fixed for all protocols now.
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"39501ce97e296b4cd36fc81388a2dc66f2601edd/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"05e42236e95b8171ab8fe116f5b498f17a1e1547/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"bffcc5af1d7281c8e5fc93a28bb6f9d77a99f7fe/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"9afa45068b8f76ff5e102dc14f594caa69899b17/nginx" …
- 15:37 Changeset in nginx-tests [1581:463d6863d360] by
- Tests: tests for extra data and short responses.
- 15:36 Changeset in nginx [7680:39501ce97e29] by
- gRPC: generate error when response size is wrong. As long as the …
- 15:36 Changeset in nginx [7679:05e42236e95b] by
- FastCGI: protection from responses with wrong length. Previous …
- 15:36 Changeset in nginx [7678:bffcc5af1d72] by
- Upstream: drop extra data sent by upstream. Previous behaviour was to …
- 15:36 Changeset in nginx [7677:a786e491d08d] by
- Proxy: style.
- 15:36 Changeset in nginx [7676:d225b70d38b6] by
- Proxy: detection of data after final chunk. Previously, additional …
- 15:36 Changeset in nginx [7675:9afa45068b8f] by
- Proxy: drop extra data sent by upstream. Previous behaviour was to …
- 15:36 Changeset in nginx [7674:7731c710796f] by
- Memcached: protect from too long responses. If a memcached response …
- 15:01 Changeset in nginx-tests [1580:9e142c0e34b2] by
- Tests: allowed syslog messages arrival out-of-order. Reported by …
- 12:38 Changeset in nginx-tests [1579:14eeaa39599d] by
- Tests: HTTP/2 tests for lingering close.
07/05/20:
- 16:01 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
- When I rearrange this configuration […] into this […] nginx …
07/04/20:
- 22:10 Ticket #2012 (Wrong header Connection, when keepalive is disabled) created by
- I disabled keepalive with directives keepalive_timeout 0 and …
07/03/20:
- 17:25 Ticket #1689 (Writing connections leak with http/2) reopened by
- I had this problem, and upgraded nginx to v1.18 (and now to v1.19). …
- 13:41 Changeset in nginx [8463:2576485b93d4]quic by
- HTTP/3: fixed overflow in prefixed integer parser. Previously, the …
- 13:29 Ticket #1544 (http/2 downloads broken during reload) closed by
- fixed: HTTP/2 connections now support lingering close mechanism.
- 13:29 Ticket #1250 (Connection reset with low http2_max_requests) closed by
- fixed: HTTP/2 connections now support lingering close mechanism.
- 13:25 Tickets #1250,1544 batch updated by
- In [changeset:"c5840ca2063d26e432264ad0b0fe00c0bd94252c/nginx" …
- 13:23 Changeset in nginx_org [2561:397289aeada7] by
- Improved Russian wording in "min_free" parameter.
- 13:16 Changeset in nginx [7673:c5840ca2063d] by
- HTTP/2: lingering close after GOAWAY. After sending the GOAWAY frame, …
- 11:04 Changeset in nginx_org [2560:a5bbfdf88bbd] by
- Documented the "min_free" parameter of proxy_cache_path and friends.
- 09:07 Changeset in nginx [8466:4fd709540daf]quic by
- HTTP/3: put ngx_http_v3_parse_varlen_int() return code in variable. …
- 09:05 Changeset in nginx [8465:5611bbb852ce]quic by
- HTTP/3: simplifed handling ngx_http_v3_parse_literal() return code.
- 06:26 Changeset in nginx [8464:fdb8edc8e496]quic by
- HTTP/3: limited prefixed integer size by 62 bits.
07/02/20:
- 17:07 Changeset in nginx [8467:e02250b55b17]quic by
- HTTP/3: simplified handling return codes from parse functions.
- 15:45 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) closed by
- duplicate: Yes, this is clearly a duplicate of #147.
- 15:44 Ticket #147 (nginx touched /var/log/nginx-error.log even when error_log are switched off) updated by
- See also #2011.
- 14:35 Changeset in nginx [8462:153bffee3d7e]quic by
- HTTP/3: fixed prefix in decoding Section Acknowledgement.
- 13:47 Changeset in nginx [8460:72f9ff4e0a88]quic by
- HTTP/3: close QUIC connection with HTTP/QPACK errors when needed. …
- 13:33 Changeset in nginx [8458:e0f92f68e018]quic by
- QUIC: Introduced ngx_quic_finalize_connection(). The function …
- 13:33 Changeset in nginx [8457:a7f64438aa3c]quic by
- HTTP/3: downgraded literal size error level to NGX_LOG_INFO. Now it's …
- 12:34 Changeset in nginx [8456:c9538aef3211]quic by
- HTTP/3: refactored dynamic table implementation. Previously dynamic …
- 12:15 Changeset in nginx [8455:b0e81f49d7c0]quic by
- HTTP/3: fixed prefixed integer encoding and decoding. Previously …
07/01/20:
- 17:14 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) updated by
- Ah this is probably the same as https://trac.nginx.org/nginx/ticket/147
- 17:10 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) created by
- In src/core/nginx.c, in ngx_cdecl(), the commandline parameters are …
- 06:59 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
- Thank you! That's exactly this. I do indeed use realip, and switching …
06/30/20:
- 19:07 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
- I assume you also have the realip module enabled in your second server …
- 14:45 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) created by
- Using a NGINX configuration where: - a stream server listens on …
- 14:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Who needs an unescaped variable which they cannot use in URLs? This …
- 12:32 Changeset in nginx [8461:b3c07aa021f6]quic by
- HTTP/3: set r->headers_in.chunked flag after parsing headers. …
- 09:30 Changeset in nginx [8459:1ed698947172]quic by
- HTTP/3: error code definitions for HTTP/3 and QPACK.
- 09:11 Changeset in nginx-tests [1578:f55d25e08b3e] by
- Tests: added "ssl_verify_client off" tests (ticket #2008).
- 05:16 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
-
I have asked where anyone needs an unescaped
$1
and you have …
06/29/20:
- 21:19 Ticket #2008 (699f6e55bbb4 causes request for client certificate) closed by
- fixed: Should be fixed now, thanks.
- 21:16 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
- In [changeset:"3dcb1aba894afd0125bdda4b05a4dda6dd1987f5/nginx" …
- 21:09 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Again I ask why is $1 decoded to foo bar and how can we get it …
- 14:15 Changeset in nginx [7672:3dcb1aba894a] by
- SSL: fixed unexpected certificate requests (ticket #2008). Using …
- 12:56 Changeset in nginx [8454:032cb35ce758]quic by
- HTTP/3: http3_max_field_size directive to limit string size. Client …
- 12:46 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
- I think I see the complication which I forgot to explain: I am trying …
06/27/20:
06/26/20:
- 23:06 Ticket #2009 (dfgdfg) updated by
-
Description changed
- 23:06 Ticket #2009 (dfgdfg) updated by
- mistake, delete pls
- 23:04 Ticket #2009 (dfgdfg) created by
- mistake, please delete
- 22:18 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
-
Owner, Status changed
Thanks for reporting this, indeed looks like a bug introduced in … - 08:58 Changeset in nginx [8453:c8cabb5d45f5]quic by
- HTTP/3: introduced ngx_http_v3_get_module_srv_conf() macro. The macro …
- 07:05 Changeset in nginx [8452:a6675a976560]quic by
- HTTP/3: fixed dropping first non-pseudo header.
06/25/20:
- 19:12 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
-
Description changed
- 18:15 Ticket #2008 (699f6e55bbb4 causes request for client certificate) created by
- A few users (using Chrome and Safari) where getting request for client …
- 17:31 Changeset in nginx [8451:908cae4f3078]quic by
- HTTP/3: do not emit a DATA frame header for header_only responses. …
- 12:12 Changeset in nginx_org [2559:82e6029db0c0] by
- Updated with Netcraft June 2020 Web Server Survey stats.
- 11:45 Ticket #1909 (http2_push not pushing the file) updated by
-
Owner, Status changed
- 11:41 Ticket #1909 (http2_push not pushing the file) updated by
- If the client has not disabled "pushes" via the SETTINGS frame, and it …
- 08:43 Ticket #2007 (HTTP2 directive from one "server" passed to another) closed by
- duplicate: Duplicate of #1623.
06/24/20:
- 07:43 Ticket #1057 (Google QUIC - statement) updated by
- Hello, We announced an experimental nginx-quic repo some time ago, …
- 07:06 Ticket #2007 (HTTP2 directive from one "server" passed to another) updated by
- Please change component
- 07:00 Ticket #2007 (HTTP2 directive from one "server" passed to another) created by
- Linux 3.10.0-1062.4.1.el7.x86_64 #1 SMP x86_64 GNU/Linux nginx.conf …
06/23/20:
- 09:28 Changeset in nginx_org [2558:f2ffb29e5a3a] by
- Regenerated.
- 09:28 Changeset in nginx_org [2557:7c020a4ef753] by
- The App Protect promo updated.
- 08:57 Changeset in nginx [8449:3c32717d7bb2]quic by
- README: documented draft-28, draft-29 support.
- 08:57 Changeset in nginx [8448:011668fc9efd]quic by
- Update Initial salt and Retry secret from quic-tls-29. See sections …
- 08:57 Changeset in nginx [8447:97adb87f149b]quic by
- Get rid of hardcoded numbers used for quic handshake errors.
- 08:57 Changeset in nginx [8446:df29219988bc]quic by
- Discard short packets which could not be decrypted. So that …
- 08:57 Changeset in nginx [8445:3de1b7399650]quic by
- Close connection with PROTOCOL_VIOLATION on decryption failure. A …
- 08:57 Changeset in nginx [8444:769d8bdeffb0]quic by
- Define KEY_UPDATE_ERROR from quic-tls-24.
- 08:57 Changeset in nginx [8443:3b5fbf1bcdee]quic by
- Reject new QUIC connection with CONNECTION_REFUSED on shutdown.
- 08:57 Changeset in nginx [8442:b9bce2c4fe33]quic by
- Close QUIC connection with NO_ERROR on c->close. That way it makes …
- 08:57 Changeset in nginx [8441:db8fe75c9c7a]quic by
- Do not close QUIC sockets in ngx_close_listening_sockets(). This …
- 08:57 Changeset in nginx [8440:f9592e804834]quic by
- QUIC error SERVER_BUSY renamed to CONNECTION_REFUSED in draft-29.
06/22/20:
- 16:36 Ticket #157 (cache max_size limit applied incorrectly with xfs) closed by
- fixed: Should be fixed now.
- 16:32 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) closed by
- fixed: Should be fixed now. Note though that it is generally a bad idea to …
- 16:20 Ticket #157 (cache max_size limit applied incorrectly with xfs) updated by
- In [changeset:"52b34c3f89b460d29228abc79aa96e39b12101c1/nginx" …
- 16:20 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) updated by
- In [changeset:"0a04e5e4c40b018f3010ee7e947da249bc978baa/nginx" …
- 15:03 Changeset in nginx [7670:ccb5ff87ab3e] by
- Cache: introduced min_free cache clearing. Clearing cache based on …
- 15:02 Changeset in nginx [7669:52b34c3f89b4] by
- Too large st_blocks values are now ignored (ticket #157). With XFS, …
- 15:02 Changeset in nginx [7668:0a04e5e4c40b] by
- Large block sizes on Linux are now ignored (ticket #1168). NFS on …
06/21/20:
- 21:00 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) closed by
- invalid: It looks like redirects returned by your backend are changed to …
- 14:06 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) updated by
-
Description changed
- 14:05 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) created by
- Config 1 with Host header replacement: location /phpinfo { …
06/19/20:
- 15:21 Changeset in nginx-tests [1577:804a7409bc63] by
- Tests: added ssl_ocsp test with failing request.
- 13:15 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) closed by
- duplicate: Duplicate of #1520.
- 13:15 Ticket #1520 (HTTP/2 connection dropped when URL has large numbers of same parameter) updated by
- See also #2005.
- 11:48 Changeset in nginx_org [2556:c81b1fadbcf3] by
- Updated hello_world example in njs.
- 11:28 Changeset in nginx_org [2555:5b2764724e0d] by
- Added list of supported OSes to njs.
- 08:41 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) updated by
- raising http2_max_field_size 64k; helps. There is some …
- 08:29 Changeset in nginx [8450:a62849b6463c]quic by
- Style.
- 07:17 Ticket #1785 (Support access to environment variables in config file) updated by
- +1 for this, here is our use-case: In a kubernetes environment where …
- 06:52 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) updated by
- large_client_header_buffers 8 512k; in http section doesn't help. …
- 06:46 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) created by
- When http2 is enabled and too long GET is issued nginx closes …
06/18/20:
- 16:31 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) closed by
- worksforme: Feedback timeout.
- 16:22 Ticket #1990 (proxy_cache_min_uses not counted per variant on initial requests) closed by
- wontfix: The problem is that it is not possible to determine the variant …
- 15:21 Ticket #1989 (Nginx not displaying progressive image when in http2) closed by
- worksforme: Feedback timeout.
- 13:09 Ticket #2004 (nginx temp files deleting problem) updated by
- Please elaborate what makes you think that the observed deleted files …
- 12:40 Changeset in nginx_org [2554:62523c26ddf3] by
- Updated OpenSSL version used for win32 builds.
- 11:29 Changeset in nginx [8439:cef417a24755]quic by
- QUIC: cleaned up quic encryption state tracking. The patch removes …
- 10:58 Changeset in nginx [8438:a2c34e77cfc1]quic by
- QUIC: added ALPN checks. quic-transport draft 29: section 7: …
- 09:42 Changeset in nginx-tests [1576:8177323823d6] by
- Tests: proxy_cache_path with min_free parameter.
- 09:25 Ticket #2004 (nginx temp files deleting problem) created by
- ~# df -h /dev/sda1 15G 11G 4,3G 71% / ~# lsof | grep …
- 08:16 Changeset in nginx [8437:4e75267865de]quic by
- QUIC: fixed off-by-one in frame range handler. The ctx->pnum is …
06/17/20:
- 12:55 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Do you mean by "unescaped" that the URL is decoded from /foo%20bar …
- 12:23 Ticket #1738 (NGINX Not Honoring proxy_cache_background_update with Cache-Control: ...) updated by
- As long as Request 4 is in the same connection as Request 3, it is …
- 06:23 Ticket #1738 (NGINX Not Honoring proxy_cache_background_update with Cache-Control: ...) updated by
- Hi, Team: Same issue here. We are using …
- 05:02 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
- See above.
06/16/20:
- 18:25 Changeset in nginx-tests [1575:577e72267fec] by
- Tests: uwsgi tests with SSL.
- 08:54 Changeset in nginx [8436:9fe7875ce4bb]quic by
- QUIC: further limiting maximum QUIC packet size. quic-transport draft …
- 06:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) updated by
-
Note: in our scenario we are rewriting
/foo%20bar
to … - 05:56 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) updated by
- > you are using $1$is_args$args, where $1 comes from unescaped URI as …
06/15/20:
- 21:35 Changeset in nginx [7666:8cf31489b479] by
- Correctly flush request body to uwsgi with SSL. The flush flag was …
- 17:17 Changeset in nginx [7667:1ece2ac2555a] by
- OCSP: fixed use-after-free on error. When validating second and …
- 14:06 Changeset in nginx [8435:5bc9229ec4cf]quic by
- QUIC: raise error on missing transport parameters. quic-tls, 8.2: …
- 13:59 Changeset in nginx [8434:ea4899591798]quic by
- QUIC: Fixed connection cleanup. A posted event need to be deleted …
- 07:58 Changeset in nginx [7671:7e0719fb528b] by
- Fixed potential leak of temp pool. In case ngx_hash_add_key() fails, …
06/13/20:
- 22:37 Ticket #2003 (regex generated variable loses character encoding when used in ...) closed by
- invalid: The stackoveflow post uses a part of the unencoded URI as used in …
- 22:18 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- The first byte of the message body encoded with chunked encoding must …
- 15:00 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- I was using the IntelliJ HTTP tool and noticed that the request is …
Note:
See TracTimeline
for information about the timeline view.