Timeline
07/23/20:
- 14:31 Changeset in nginx [7687:d752a2c76d49] by
- OCSP: fixed certificate reference leak.
- 10:41 Changeset in nginx [8497:0596fe1aee16]quic by
- HTTP/3: server pushes. New directives are added: - …
- 10:12 Changeset in nginx [8492:65c1fc5fae15]quic by
- HTTP/3: renamed server configuration variables from v3cf to h3scf. …
- 09:31 Changeset in nginx [8489:5d2e285677a7]quic by
- HTTP/3: generate Location response header for absolute redirects.
- 09:17 Changeset in nginx-tests [1585:bff287fbf347] by
- Tests: added proxy_cookie_domain/path tests with "off" parameter.
- 09:16 Changeset in nginx-tests [1584:b4014b3e8495] by
- Tests: added xslt filter tests with ranges.
- 08:51 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- okay, I've switched the unix-socket to a tcp port to ease debugging …
- 08:40 Changeset in nginx [8493:e533a352d118]quic by
- Style: moved function declarations to match usual code style. Plus a …
07/22/20:
- 19:16 Changeset in nginx [7686:1f3bf1734a77] by
- Xslt: disabled ranges. Previously, the document generated by the xslt …
- 13:07 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- The FastCGI stdout record length is known to be 2.5k from the debug …
- 11:48 Changeset in nginx [8486:d0ac4449a07f]quic by
- QUIC: fixed bulding perl module by reducing header pollution. The …
- 10:45 Changeset in nginx [8487:6e84524886d4]quic by
- QUIC: updated README to mention "quic" listen parameter.
- 10:34 Changeset in nginx [8485:b0953b020be7]quic by
- SSL: fixed compilation without QUIC after 0d2b2664b41c.
- 08:03 Changeset in nginx [8484:d41a0cafacff]quic by
- HTTP/3: do not call shutdown() for QUIC streams. Previously, this …
- 07:48 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- Thanks - I've tried debugging this on the application side but I'm …
- 01:10 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- Thanks, I was able to reproduce it. The 304 status code implies no …
07/21/20:
- 21:06 Ticket #816 (Allow h2c and HTTP/1.1 support on the same listening socket) updated by
- Please implement!
- 20:09 Changeset in nginx [8481:0d2b2664b41c]quic by
- QUIC: added "quic" listen parameter. The parameter allows processing …
- 20:08 Changeset in nginx [8482:893b3313f53c]quic by
- QUIC: added "quic" listen parameter in Stream. Also, introduced …
- 20:08 Changeset in nginx [8483:2da9c4fddd44]quic by
- QUIC: eliminated connection handler argument in ngx_quic_run(). Now …
- 18:40 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- update; the error apparently occurs when a 304 response is parsed: …
- 17:34 Changeset in nginx [7685:4f30f75dbdf3] by
- Core: close PID file when writing fails. Reported by Jinhua Tan.
- 16:02 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- Thanks for the pointers. I did not realize this message was caused by …
- 09:09 Changeset in nginx_org [2572:c6c259d3601a] by
- Development guide: updated ngx_utf8_length() example.
07/20/20:
- 13:44 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- Given the changes in nginx 1.19.1, most likely reason is a bug in …
- 12:19 Changeset in nginx [8478:d2f716e668e8]quic by
- Fixed format specifiers.
- 10:51 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
-
Component changed
07/18/20:
- 11:24 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- the "component" for this ticket is obviously incorrect
- 11:23 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) created by
- I have a machine which is behind cloudflare, which limits any …
07/17/20:
- 21:08 Changeset in nginx [8479:b250b515e5b6]quic by
- QUIC: fixed stream read event log. Previously, the main connection …
- 21:08 Changeset in nginx [8480:f537f99b86ee]quic by
- QUIC: do not verify the selected ALPN protocol. The right protocol is …
- 10:29 Changeset in nginx_org [2571:3e47eecce384] by
- Added id to r.sendHeader in njs.
07/16/20:
- 13:36 Changeset in nginx [8477:031918df51c0]quic by
- QUIC: added anti-amplification limit. According to quic-transport …
- 13:05 Changeset in nginx [8475:b276833111cf]quic by
- QUIC: implemented probe timeout (PTO) calculation.
- 12:52 Ticket #1909 (http2_push not pushing the file) closed by
- worksforme: Feedback timeout. If the problem persists, please provide the …
- 12:44 Changeset in nginx [8469:3b107aadc9f6]quic by
- QUIC: added rtt estimation. According to the quic-recovery 29, …
- 12:02 Changeset in nginx [8476:f9fbeb4ee0de]quic by
- QUIC: added limit of queued data. The ngx_quic_queue_frame() …
- 07:22 Changeset in nginx_org [2570:44792f1ee284] by
- Added IDs to methods in njs Reference.
07/15/20:
- 12:10 Changeset in nginx [8473:1b9db5c8c29b]quic by
- QUIC: reworked ngx_quic_send_frames() function. Instead of returning …
07/14/20:
- 15:44 Changeset in nginx_org [2569:2edc64c05b0e] by
- Removed ECMAScript methods from njs Reference.
- 13:52 Changeset in nginx [8494:e334ca1b23ba]quic by
- HTTP/3: support $server_protocol variable. Now it holds "HTTP/3.0". …
- 12:04 Changeset in nginx_org [2568:aa015272ea32] by
- Linux packages: actualized the list of supported distributions. - …
- 09:46 Ticket #2017 (worker_connections are not enough) updated by
- Has the number of these alerts increased significantly after upgrading …
07/13/20:
- 14:31 Changeset in nginx [8474:909b989ec088]quic by
- QUIC: reworked retransmission mechanism. Instead of timer-based …
- 14:00 Ticket #2016 (nginx does not percent-encode Location header properly) updated by
-
Status changed
Yes, known issue, thanks for the report. - 13:11 Ticket #376 (log file reopen should pass opened fd from master process) updated by
- This is going to be implemented at some point. This is relatively low …
- 13:00 Changeset in nginx [8488:79125ef2e39f]quic by
- HTTP/3: header encoding functions.
- 12:34 Changeset in nginx [8468:001ec7fce567]quic by
- Merged with the default branch.
- 09:38 Changeset in nginx [8491:6e1798a4a0d2]quic by
- HTTP/3: renamed ngx_http_v3.c to ngx_http_v3_encode.c. The file …
- 09:33 Changeset in nginx [8490:e24f7b50ba1d]quic by
- HTTP/3: encode frame ids with ngx_http_v3_encode_varlen_int(). Even …
- 08:38 Changeset in nginx_org [2567:4f3494d80949] by
- Documented support for HTTP/2 in lingering_close.
- 07:07 Changeset in nginx [8471:9ed4c12ec948]quic by
- QUIC: caching c->quic in the ngx_quic_handle_ack_frame() function. To …
- 07:07 Changeset in nginx [8472:3b15732ac03f]quic by
- QUIC: renaming. The c->quic->retransmit timer is now called "pto". …
07/12/20:
- 15:08 Ticket #2017 (worker_connections are not enough) updated by
-
Component changed
07/11/20:
- 14:56 Ticket #2017 (worker_connections are not enough) updated by
- Downgraing to v1.19.0 solve the issue Btw, this issue commponent is …
- 14:12 Ticket #2017 (worker_connections are not enough) updated by
- I'm pretty sure that is not because of ulimit problem
- 14:08 Ticket #2017 (worker_connections are not enough) created by
- after update to v1.19.1 (nginx from official docker image), I got many …
- 09:36 Ticket #376 (log file reopen should pass opened fd from master process) updated by
- Hi, I'm part of the Debian LTS Team. What is the nginx maintainers' …
07/10/20:
- 22:04 Changeset in nginx-tests [1583:8aede7babd9a] by
- Tests: added grpc tests with wrong response size.
- 19:36 Ticket #2016 (nginx does not percent-encode Location header properly) created by
- When nginx is serving static files and the client requests a path that …
- 15:08 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) closed by
- duplicate: Duplicate of #676.
- 15:07 Ticket #676 (Different ssl_protocols per server won`t work) updated by
- See also #2015.
- 15:01 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) updated by
- sorry wrong version, this is 1.18.0
- 14:53 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) created by
- I have multiple server blocks on nginx configuration. First, server …
- 12:33 Changeset in nginx [8470:0d1ad81dd65c]quic by
- QUIC: delay field of an ACK frame is now calculated.
- 09:19 Changeset in nginx-tests [1582:ab13e2744d05] by
- Tests: added slice filter test for original Accept-Ranges.
07/09/20:
- 14:33 Changeset in nginx [7683:fac6e1a46206] by
- Version bump.
- 14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
-
Status changed
- 14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
- Thanks, it's a known issue that keepalive settings are applied …
- 13:40 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- > So it would be nice if try_files passes through the auth_basic off; …
- 13:25 Ticket #2014 (nginx dynamic configuration reload is jittery) closed by
- invalid: Updating configuration implies that nginx will start new worker …
- 13:21 Changeset in nginx [7684:32a343635b50] by
- Slice filter: clear original Accept-Ranges. The slice filter allows …
07/08/20:
- 08:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- That makes sense, ended up with: […] What I wanted and meant was …
07/07/20:
- 22:32 Ticket #2014 (nginx dynamic configuration reload is jittery) created by
- I am trying to use nginx as a reverse proxy, listening on a port and …
- 17:21 Changeset in nginx_org [2564:5aa57c656cbf] by
- Documented TypedArray.prototype.sort() in njs.
- 16:33 Changeset in nginx_org [2566:ca1ccafab5ef] by
- njs-0.4.2.
- 16:12 Milestone njs-0.4.2 completed
- Planned features and enhancements: * Line level backtrace * The …
- 16:12 Milestone nginx-1.19.1 completed
- Status: scheduled Trunk: mainline * proxy_cache_path's …
- 16:01 Changeset in nginx_org [2562:55da8df41bfd] by
- nginx-1.19.1
- 15:56 Changeset in nginx [7682:2ab0ecfe5a5f] by
- release-1.19.1 tag
- 15:56 Changeset in nginx [7681:062920e2f3bf]release-1.19.1 by
- nginx-1.19.1-RELEASE
- 15:47 Ticket #2013 (auth_basic cannot be overwritten from other context) closed by
-
invalid: You've claimed you've tested the
curl -IL https://website.com/api
, … - 15:25 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Found it! I think it's not a bug but maybe this can be explained …
- 15:02 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Ok, so please test the configuration you've provided in the ticket …
- 14:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- I'm testing the same way as you did: […] […] It doesn't even …
- 14:26 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Replying to royduineveld@…: > But I'm still having the …
- 14:05 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Just updated to 1.18.0: […] But I'm still having the same problem. …
- 13:26 Changeset in nginx_org [2565:45cb60b3b7b2] by
- Updated Compatibility for njs-0.4.2.
- 13:26 Changeset in nginx_org [2563:428a8cf1911b] by
- Documented mkdirSync, readdirSync, rmdirSync, fs.Dirent in njs.
- 12:51 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Works fine here: […] While the version you are using is old and …
- 12:48 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
-
Description changed
- 12:33 Ticket #2013 (auth_basic cannot be overwritten from other context) created by
- The documentation says: "The special value off allows cancelling the …
07/06/20:
- 23:30 Ticket #1689 (Writing connections leak with http/2) updated by
- Replying to PenelopeFudd@…: > I had this problem, and …
- 18:05 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) closed by
- fixed: Should be fixed for all protocols now.
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"39501ce97e296b4cd36fc81388a2dc66f2601edd/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"05e42236e95b8171ab8fe116f5b498f17a1e1547/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"bffcc5af1d7281c8e5fc93a28bb6f9d77a99f7fe/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"9afa45068b8f76ff5e102dc14f594caa69899b17/nginx" …
- 15:37 Changeset in nginx-tests [1581:463d6863d360] by
- Tests: tests for extra data and short responses.
- 15:36 Changeset in nginx [7680:39501ce97e29] by
- gRPC: generate error when response size is wrong. As long as the …
- 15:36 Changeset in nginx [7679:05e42236e95b] by
- FastCGI: protection from responses with wrong length. Previous …
- 15:36 Changeset in nginx [7678:bffcc5af1d72] by
- Upstream: drop extra data sent by upstream. Previous behaviour was to …
- 15:36 Changeset in nginx [7677:a786e491d08d] by
- Proxy: style.
- 15:36 Changeset in nginx [7676:d225b70d38b6] by
- Proxy: detection of data after final chunk. Previously, additional …
- 15:36 Changeset in nginx [7675:9afa45068b8f] by
- Proxy: drop extra data sent by upstream. Previous behaviour was to …
- 15:36 Changeset in nginx [7674:7731c710796f] by
- Memcached: protect from too long responses. If a memcached response …
- 15:01 Changeset in nginx-tests [1580:9e142c0e34b2] by
- Tests: allowed syslog messages arrival out-of-order. Reported by …
- 12:38 Changeset in nginx-tests [1579:14eeaa39599d] by
- Tests: HTTP/2 tests for lingering close.
07/05/20:
- 16:01 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
- When I rearrange this configuration […] into this […] nginx …
07/04/20:
- 22:10 Ticket #2012 (Wrong header Connection, when keepalive is disabled) created by
- I disabled keepalive with directives keepalive_timeout 0 and …
07/03/20:
- 17:25 Ticket #1689 (Writing connections leak with http/2) reopened by
- I had this problem, and upgraded nginx to v1.18 (and now to v1.19). …
- 13:41 Changeset in nginx [8463:2576485b93d4]quic by
- HTTP/3: fixed overflow in prefixed integer parser. Previously, the …
- 13:29 Ticket #1544 (http/2 downloads broken during reload) closed by
- fixed: HTTP/2 connections now support lingering close mechanism.
- 13:29 Ticket #1250 (Connection reset with low http2_max_requests) closed by
- fixed: HTTP/2 connections now support lingering close mechanism.
- 13:25 Tickets #1250,1544 batch updated by
- In [changeset:"c5840ca2063d26e432264ad0b0fe00c0bd94252c/nginx" …
- 13:23 Changeset in nginx_org [2561:397289aeada7] by
- Improved Russian wording in "min_free" parameter.
- 13:16 Changeset in nginx [7673:c5840ca2063d] by
- HTTP/2: lingering close after GOAWAY. After sending the GOAWAY frame, …
- 11:04 Changeset in nginx_org [2560:a5bbfdf88bbd] by
- Documented the "min_free" parameter of proxy_cache_path and friends.
- 09:07 Changeset in nginx [8466:4fd709540daf]quic by
- HTTP/3: put ngx_http_v3_parse_varlen_int() return code in variable. …
- 09:05 Changeset in nginx [8465:5611bbb852ce]quic by
- HTTP/3: simplifed handling ngx_http_v3_parse_literal() return code.
- 06:26 Changeset in nginx [8464:fdb8edc8e496]quic by
- HTTP/3: limited prefixed integer size by 62 bits.
07/02/20:
- 17:07 Changeset in nginx [8467:e02250b55b17]quic by
- HTTP/3: simplified handling return codes from parse functions.
- 15:45 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) closed by
- duplicate: Yes, this is clearly a duplicate of #147.
- 15:44 Ticket #147 (nginx touched /var/log/nginx-error.log even when error_log are switched off) updated by
- See also #2011.
- 14:35 Changeset in nginx [8462:153bffee3d7e]quic by
- HTTP/3: fixed prefix in decoding Section Acknowledgement.
- 13:47 Changeset in nginx [8460:72f9ff4e0a88]quic by
- HTTP/3: close QUIC connection with HTTP/QPACK errors when needed. …
- 13:33 Changeset in nginx [8458:e0f92f68e018]quic by
- QUIC: Introduced ngx_quic_finalize_connection(). The function …
- 13:33 Changeset in nginx [8457:a7f64438aa3c]quic by
- HTTP/3: downgraded literal size error level to NGX_LOG_INFO. Now it's …
- 12:34 Changeset in nginx [8456:c9538aef3211]quic by
- HTTP/3: refactored dynamic table implementation. Previously dynamic …
- 12:15 Changeset in nginx [8455:b0e81f49d7c0]quic by
- HTTP/3: fixed prefixed integer encoding and decoding. Previously …
07/01/20:
- 17:14 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) updated by
- Ah this is probably the same as https://trac.nginx.org/nginx/ticket/147
- 17:10 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) created by
- In src/core/nginx.c, in ngx_cdecl(), the commandline parameters are …
- 06:59 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
- Thank you! That's exactly this. I do indeed use realip, and switching …
06/30/20:
- 19:07 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
- I assume you also have the realip module enabled in your second server …
- 14:45 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) created by
- Using a NGINX configuration where: - a stream server listens on …
- 14:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Who needs an unescaped variable which they cannot use in URLs? This …
- 12:32 Changeset in nginx [8461:b3c07aa021f6]quic by
- HTTP/3: set r->headers_in.chunked flag after parsing headers. …
- 09:30 Changeset in nginx [8459:1ed698947172]quic by
- HTTP/3: error code definitions for HTTP/3 and QPACK.
- 09:11 Changeset in nginx-tests [1578:f55d25e08b3e] by
- Tests: added "ssl_verify_client off" tests (ticket #2008).
- 05:16 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
-
I have asked where anyone needs an unescaped
$1
and you have …
06/29/20:
- 21:19 Ticket #2008 (699f6e55bbb4 causes request for client certificate) closed by
- fixed: Should be fixed now, thanks.
- 21:16 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
- In [changeset:"3dcb1aba894afd0125bdda4b05a4dda6dd1987f5/nginx" …
- 21:09 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Again I ask why is $1 decoded to foo bar and how can we get it …
- 14:15 Changeset in nginx [7672:3dcb1aba894a] by
- SSL: fixed unexpected certificate requests (ticket #2008). Using …
- 12:56 Changeset in nginx [8454:032cb35ce758]quic by
- HTTP/3: http3_max_field_size directive to limit string size. Client …
- 12:46 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
- I think I see the complication which I forgot to explain: I am trying …
06/27/20:
06/26/20:
- 23:06 Ticket #2009 (dfgdfg) updated by
-
Description changed
- 23:06 Ticket #2009 (dfgdfg) updated by
- mistake, delete pls
- 23:04 Ticket #2009 (dfgdfg) created by
- mistake, please delete
- 22:18 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
-
Owner, Status changed
Thanks for reporting this, indeed looks like a bug introduced in … - 08:58 Changeset in nginx [8453:c8cabb5d45f5]quic by
- HTTP/3: introduced ngx_http_v3_get_module_srv_conf() macro. The macro …
- 07:05 Changeset in nginx [8452:a6675a976560]quic by
- HTTP/3: fixed dropping first non-pseudo header.
06/25/20:
- 19:12 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by
-
Description changed
- 18:15 Ticket #2008 (699f6e55bbb4 causes request for client certificate) created by
- A few users (using Chrome and Safari) where getting request for client …
- 17:31 Changeset in nginx [8451:908cae4f3078]quic by
- HTTP/3: do not emit a DATA frame header for header_only responses. …
- 12:12 Changeset in nginx_org [2559:82e6029db0c0] by
- Updated with Netcraft June 2020 Web Server Survey stats.
- 11:45 Ticket #1909 (http2_push not pushing the file) updated by
-
Owner, Status changed
- 11:41 Ticket #1909 (http2_push not pushing the file) updated by
- If the client has not disabled "pushes" via the SETTINGS frame, and it …
- 08:43 Ticket #2007 (HTTP2 directive from one "server" passed to another) closed by
- duplicate: Duplicate of #1623.
06/24/20:
- 07:43 Ticket #1057 (Google QUIC - statement) updated by
- Hello, We announced an experimental nginx-quic repo some time ago, …
- 07:06 Ticket #2007 (HTTP2 directive from one "server" passed to another) updated by
- Please change component
- 07:00 Ticket #2007 (HTTP2 directive from one "server" passed to another) created by
- Linux 3.10.0-1062.4.1.el7.x86_64 #1 SMP x86_64 GNU/Linux nginx.conf …
06/23/20:
- 09:28 Changeset in nginx_org [2558:f2ffb29e5a3a] by
- Regenerated.
- 09:28 Changeset in nginx_org [2557:7c020a4ef753] by
- The App Protect promo updated.
Note:
See TracTimeline
for information about the timeline view.