Timeline
07/30/20:
- 23:02 Ticket #2021 (try_files not always sending full $uri to proxy_pass and upstream) updated by
- Maxim, Thanks for your comments. I will definitely watch the …
07/28/20:
- 15:54 Changeset in nginx [8500:12576ac9556d]quic by
- QUIC: fixed format specifiers and removed casts.
- 14:11 Changeset in nginx [8499:b0e74a54c98b]quic by
- QUIC: consistent Stream ID logging format.
- 12:57 Ticket #2020 (Problem with statically linking Nginx) closed by
- invalid: Correct options depend on your operating system, compiler used, and …
- 12:53 Changeset in nginx [8498:affb0245e291]quic by
- QUIC: added HTTP/3 directives list to README. Also removed server …
- 11:49 Ticket #2021 (try_files not always sending full $uri to proxy_pass and upstream) closed by
- invalid: An obvious problem with your second configuration is that …
07/27/20:
- 23:35 Changeset in nginx_org [2575:2839ad72d8ef] by
- Updated with Netcraft July 2020 Web Server Survey stats.
- 23:32 Ticket #2021 (try_files not always sending full $uri to proxy_pass and upstream) created by
- So I'm dealing with an app that states it needs a configuration block …
- 20:37 Ticket #2020 (Problem with statically linking Nginx) created by
- Hello, When building nginx into one static file, I get an error: …
- 18:26 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) closed by
- fixed: Fix committed, thanks for reporting this.
- 18:19 Changeset in nginx-tests [1586:e145509cc6eb] by
- Tests: tests for "zero size buf" alerts in fastcgi (ticket #2018).
- 18:19 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- In [changeset:"da8d758aabebbba833405463aa5a785b4c324495/nginx" …
- 16:15 Changeset in nginx [8496:c5324bb3a704]quic by
- QUIC: limited the number of client-initiated streams. The limits on …
- 15:51 Changeset in nginx [8495:455a8536eaa7]quic by
- QUIC: limited the number of server-initiated streams. Also, …
- 13:02 Changeset in nginx [7689:da8d758aabeb] by
- FastCGI: fixed zero size buf alerts on extra data (ticket #2018). …
- 10:21 Changeset in nginx [7688:2f9214713666] by
- Core: enclosed parameters of the ngx_buf.h macros in parentheses.
- 00:48 Ticket #2019 (location = / is very tricky) closed by
- invalid: > My understanding from the documentation is, that calling …
07/26/20:
- 18:14 Changeset in nginx_org [2574:a88ecedbeaaf] by
- Regenerated.
- 18:14 Changeset in nginx_org [2573:8d28877aca16] by
- Web Application Security ebook promo.
- 12:23 Ticket #2019 (location = / is very tricky) created by
- After reading …
07/24/20:
- 12:43 Changeset in nginx_org [2598:361a28cca097] by
- Rephrased "off" parameter of proxy_cookie_domain/path/redirect.
07/23/20:
- 14:31 Changeset in nginx [7687:d752a2c76d49] by
- OCSP: fixed certificate reference leak.
- 10:41 Changeset in nginx [8497:0596fe1aee16]quic by
- HTTP/3: server pushes. New directives are added: - …
- 10:12 Changeset in nginx [8492:65c1fc5fae15]quic by
- HTTP/3: renamed server configuration variables from v3cf to h3scf. …
- 09:31 Changeset in nginx [8489:5d2e285677a7]quic by
- HTTP/3: generate Location response header for absolute redirects.
- 09:17 Changeset in nginx-tests [1585:bff287fbf347] by
- Tests: added proxy_cookie_domain/path tests with "off" parameter.
- 09:16 Changeset in nginx-tests [1584:b4014b3e8495] by
- Tests: added xslt filter tests with ranges.
- 08:51 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- okay, I've switched the unix-socket to a tcp port to ease debugging …
- 08:40 Changeset in nginx [8493:e533a352d118]quic by
- Style: moved function declarations to match usual code style. Plus a …
07/22/20:
- 19:16 Changeset in nginx [7686:1f3bf1734a77] by
- Xslt: disabled ranges. Previously, the document generated by the xslt …
- 13:07 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- The FastCGI stdout record length is known to be 2.5k from the debug …
- 11:48 Changeset in nginx [8486:d0ac4449a07f]quic by
- QUIC: fixed bulding perl module by reducing header pollution. The …
- 10:45 Changeset in nginx [8487:6e84524886d4]quic by
- QUIC: updated README to mention "quic" listen parameter.
- 10:34 Changeset in nginx [8485:b0953b020be7]quic by
- SSL: fixed compilation without QUIC after 0d2b2664b41c.
- 08:03 Changeset in nginx [8484:d41a0cafacff]quic by
- HTTP/3: do not call shutdown() for QUIC streams. Previously, this …
- 07:48 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- Thanks - I've tried debugging this on the application side but I'm …
- 01:10 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- Thanks, I was able to reproduce it. The 304 status code implies no …
07/21/20:
- 21:06 Ticket #816 (Allow h2c and HTTP/1.1 support on the same listening socket) updated by
- Please implement!
- 20:09 Changeset in nginx [8481:0d2b2664b41c]quic by
- QUIC: added "quic" listen parameter. The parameter allows processing …
- 20:08 Changeset in nginx [8482:893b3313f53c]quic by
- QUIC: added "quic" listen parameter in Stream. Also, introduced …
- 20:08 Changeset in nginx [8483:2da9c4fddd44]quic by
- QUIC: eliminated connection handler argument in ngx_quic_run(). Now …
- 18:40 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- update; the error apparently occurs when a 304 response is parsed: …
- 17:34 Changeset in nginx [7685:4f30f75dbdf3] by
- Core: close PID file when writing fails. Reported by Jinhua Tan.
- 16:02 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- Thanks for the pointers. I did not realize this message was caused by …
- 09:09 Changeset in nginx_org [2572:c6c259d3601a] by
- Development guide: updated ngx_utf8_length() example.
07/20/20:
- 13:44 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- Given the changes in nginx 1.19.1, most likely reason is a bug in …
- 12:19 Changeset in nginx [8478:d2f716e668e8]quic by
- Fixed format specifiers.
- 10:51 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
-
Component changed
07/18/20:
- 11:24 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) updated by
- the "component" for this ticket is obviously incorrect
- 11:23 Ticket #2018 (Significant amount of "zero size buf in writer t:1 r:0 f:0... ...) created by
- I have a machine which is behind cloudflare, which limits any …
07/17/20:
- 21:08 Changeset in nginx [8479:b250b515e5b6]quic by
- QUIC: fixed stream read event log. Previously, the main connection …
- 21:08 Changeset in nginx [8480:f537f99b86ee]quic by
- QUIC: do not verify the selected ALPN protocol. The right protocol is …
- 10:29 Changeset in nginx_org [2571:3e47eecce384] by
- Added id to r.sendHeader in njs.
07/16/20:
- 13:36 Changeset in nginx [8477:031918df51c0]quic by
- QUIC: added anti-amplification limit. According to quic-transport …
- 13:05 Changeset in nginx [8475:b276833111cf]quic by
- QUIC: implemented probe timeout (PTO) calculation.
- 12:52 Ticket #1909 (http2_push not pushing the file) closed by
- worksforme: Feedback timeout. If the problem persists, please provide the …
- 12:44 Changeset in nginx [8469:3b107aadc9f6]quic by
- QUIC: added rtt estimation. According to the quic-recovery 29, …
- 12:02 Changeset in nginx [8476:f9fbeb4ee0de]quic by
- QUIC: added limit of queued data. The ngx_quic_queue_frame() …
- 07:22 Changeset in nginx_org [2570:44792f1ee284] by
- Added IDs to methods in njs Reference.
07/15/20:
- 12:10 Changeset in nginx [8473:1b9db5c8c29b]quic by
- QUIC: reworked ngx_quic_send_frames() function. Instead of returning …
07/14/20:
- 15:44 Changeset in nginx_org [2569:2edc64c05b0e] by
- Removed ECMAScript methods from njs Reference.
- 13:52 Changeset in nginx [8494:e334ca1b23ba]quic by
- HTTP/3: support $server_protocol variable. Now it holds "HTTP/3.0". …
- 12:04 Changeset in nginx_org [2568:aa015272ea32] by
- Linux packages: actualized the list of supported distributions. - …
- 09:46 Ticket #2017 (worker_connections are not enough) updated by
- Has the number of these alerts increased significantly after upgrading …
07/13/20:
- 14:31 Changeset in nginx [8474:909b989ec088]quic by
- QUIC: reworked retransmission mechanism. Instead of timer-based …
- 14:00 Ticket #2016 (nginx does not percent-encode Location header properly) updated by
-
Status changed
Yes, known issue, thanks for the report. - 13:11 Ticket #376 (log file reopen should pass opened fd from master process) updated by
- This is going to be implemented at some point. This is relatively low …
- 13:00 Changeset in nginx [8488:79125ef2e39f]quic by
- HTTP/3: header encoding functions.
- 12:34 Changeset in nginx [8468:001ec7fce567]quic by
- Merged with the default branch.
- 09:38 Changeset in nginx [8491:6e1798a4a0d2]quic by
- HTTP/3: renamed ngx_http_v3.c to ngx_http_v3_encode.c. The file …
- 09:33 Changeset in nginx [8490:e24f7b50ba1d]quic by
- HTTP/3: encode frame ids with ngx_http_v3_encode_varlen_int(). Even …
- 08:38 Changeset in nginx_org [2567:4f3494d80949] by
- Documented support for HTTP/2 in lingering_close.
- 07:07 Changeset in nginx [8471:9ed4c12ec948]quic by
- QUIC: caching c->quic in the ngx_quic_handle_ack_frame() function. To …
- 07:07 Changeset in nginx [8472:3b15732ac03f]quic by
- QUIC: renaming. The c->quic->retransmit timer is now called "pto". …
07/12/20:
- 15:08 Ticket #2017 (worker_connections are not enough) updated by
-
Component changed
07/11/20:
- 14:56 Ticket #2017 (worker_connections are not enough) updated by
- Downgraing to v1.19.0 solve the issue Btw, this issue commponent is …
- 14:12 Ticket #2017 (worker_connections are not enough) updated by
- I'm pretty sure that is not because of ulimit problem
- 14:08 Ticket #2017 (worker_connections are not enough) created by
- after update to v1.19.1 (nginx from official docker image), I got many …
- 09:36 Ticket #376 (log file reopen should pass opened fd from master process) updated by
- Hi, I'm part of the Debian LTS Team. What is the nginx maintainers' …
07/10/20:
- 22:04 Changeset in nginx-tests [1583:8aede7babd9a] by
- Tests: added grpc tests with wrong response size.
- 19:36 Ticket #2016 (nginx does not percent-encode Location header properly) created by
- When nginx is serving static files and the client requests a path that …
- 15:08 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) closed by
- duplicate: Duplicate of #676.
- 15:07 Ticket #676 (Different ssl_protocols per server won`t work) updated by
- See also #2015.
- 15:01 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) updated by
- sorry wrong version, this is 1.18.0
- 14:53 Ticket #2015 (Directive 'ssl_protocols' doesn't work on server blocks) created by
- I have multiple server blocks on nginx configuration. First, server …
- 12:33 Changeset in nginx [8470:0d1ad81dd65c]quic by
- QUIC: delay field of an ACK frame is now calculated.
- 09:19 Changeset in nginx-tests [1582:ab13e2744d05] by
- Tests: added slice filter test for original Accept-Ranges.
07/09/20:
- 14:33 Changeset in nginx [7683:fac6e1a46206] by
- Version bump.
- 14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
-
Status changed
- 14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
- Thanks, it's a known issue that keepalive settings are applied …
- 13:40 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- > So it would be nice if try_files passes through the auth_basic off; …
- 13:25 Ticket #2014 (nginx dynamic configuration reload is jittery) closed by
- invalid: Updating configuration implies that nginx will start new worker …
- 13:21 Changeset in nginx [7684:32a343635b50] by
- Slice filter: clear original Accept-Ranges. The slice filter allows …
07/08/20:
- 08:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- That makes sense, ended up with: […] What I wanted and meant was …
07/07/20:
- 22:32 Ticket #2014 (nginx dynamic configuration reload is jittery) created by
- I am trying to use nginx as a reverse proxy, listening on a port and …
- 17:21 Changeset in nginx_org [2564:5aa57c656cbf] by
- Documented TypedArray.prototype.sort() in njs.
- 16:33 Changeset in nginx_org [2566:ca1ccafab5ef] by
- njs-0.4.2.
- 16:12 Milestone njs-0.4.2 completed
- Planned features and enhancements: * Line level backtrace * The …
- 16:12 Milestone nginx-1.19.1 completed
- Status: scheduled Trunk: mainline * proxy_cache_path's …
- 16:01 Changeset in nginx_org [2562:55da8df41bfd] by
- nginx-1.19.1
- 15:56 Changeset in nginx [7682:2ab0ecfe5a5f] by
- release-1.19.1 tag
- 15:56 Changeset in nginx [7681:062920e2f3bf]release-1.19.1 by
- nginx-1.19.1-RELEASE
- 15:47 Ticket #2013 (auth_basic cannot be overwritten from other context) closed by
-
invalid: You've claimed you've tested the
curl -IL https://website.com/api
, … - 15:25 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Found it! I think it's not a bug but maybe this can be explained …
- 15:02 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Ok, so please test the configuration you've provided in the ticket …
- 14:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- I'm testing the same way as you did: […] […] It doesn't even …
- 14:26 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Replying to royduineveld@…: > But I'm still having the …
- 14:05 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Just updated to 1.18.0: […] But I'm still having the same problem. …
- 13:26 Changeset in nginx_org [2565:45cb60b3b7b2] by
- Updated Compatibility for njs-0.4.2.
- 13:26 Changeset in nginx_org [2563:428a8cf1911b] by
- Documented mkdirSync, readdirSync, rmdirSync, fs.Dirent in njs.
- 12:51 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
- Works fine here: […] While the version you are using is old and …
- 12:48 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by
-
Description changed
- 12:33 Ticket #2013 (auth_basic cannot be overwritten from other context) created by
- The documentation says: "The special value off allows cancelling the …
07/06/20:
- 23:30 Ticket #1689 (Writing connections leak with http/2) updated by
- Replying to PenelopeFudd@…: > I had this problem, and …
- 18:05 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) closed by
- fixed: Should be fixed for all protocols now.
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"39501ce97e296b4cd36fc81388a2dc66f2601edd/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"05e42236e95b8171ab8fe116f5b498f17a1e1547/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"bffcc5af1d7281c8e5fc93a28bb6f9d77a99f7fe/nginx" …
- 18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by
- In [changeset:"9afa45068b8f76ff5e102dc14f594caa69899b17/nginx" …
- 15:37 Changeset in nginx-tests [1581:463d6863d360] by
- Tests: tests for extra data and short responses.
- 15:36 Changeset in nginx [7680:39501ce97e29] by
- gRPC: generate error when response size is wrong. As long as the …
- 15:36 Changeset in nginx [7679:05e42236e95b] by
- FastCGI: protection from responses with wrong length. Previous …
- 15:36 Changeset in nginx [7678:bffcc5af1d72] by
- Upstream: drop extra data sent by upstream. Previous behaviour was to …
- 15:36 Changeset in nginx [7677:a786e491d08d] by
- Proxy: style.
- 15:36 Changeset in nginx [7676:d225b70d38b6] by
- Proxy: detection of data after final chunk. Previously, additional …
- 15:36 Changeset in nginx [7675:9afa45068b8f] by
- Proxy: drop extra data sent by upstream. Previous behaviour was to …
- 15:36 Changeset in nginx [7674:7731c710796f] by
- Memcached: protect from too long responses. If a memcached response …
- 15:01 Changeset in nginx-tests [1580:9e142c0e34b2] by
- Tests: allowed syslog messages arrival out-of-order. Reported by …
- 12:38 Changeset in nginx-tests [1579:14eeaa39599d] by
- Tests: HTTP/2 tests for lingering close.
07/05/20:
- 16:01 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by
- When I rearrange this configuration […] into this […] nginx …
07/04/20:
- 22:10 Ticket #2012 (Wrong header Connection, when keepalive is disabled) created by
- I disabled keepalive with directives keepalive_timeout 0 and …
07/03/20:
- 17:25 Ticket #1689 (Writing connections leak with http/2) reopened by
- I had this problem, and upgraded nginx to v1.18 (and now to v1.19). …
- 13:41 Changeset in nginx [8463:2576485b93d4]quic by
- HTTP/3: fixed overflow in prefixed integer parser. Previously, the …
- 13:29 Ticket #1544 (http/2 downloads broken during reload) closed by
- fixed: HTTP/2 connections now support lingering close mechanism.
- 13:29 Ticket #1250 (Connection reset with low http2_max_requests) closed by
- fixed: HTTP/2 connections now support lingering close mechanism.
- 13:25 Tickets #1250,1544 batch updated by
- In [changeset:"c5840ca2063d26e432264ad0b0fe00c0bd94252c/nginx" …
- 13:23 Changeset in nginx_org [2561:397289aeada7] by
- Improved Russian wording in "min_free" parameter.
- 13:16 Changeset in nginx [7673:c5840ca2063d] by
- HTTP/2: lingering close after GOAWAY. After sending the GOAWAY frame, …
- 11:04 Changeset in nginx_org [2560:a5bbfdf88bbd] by
- Documented the "min_free" parameter of proxy_cache_path and friends.
- 09:07 Changeset in nginx [8466:4fd709540daf]quic by
- HTTP/3: put ngx_http_v3_parse_varlen_int() return code in variable. …
- 09:05 Changeset in nginx [8465:5611bbb852ce]quic by
- HTTP/3: simplifed handling ngx_http_v3_parse_literal() return code.
- 06:26 Changeset in nginx [8464:fdb8edc8e496]quic by
- HTTP/3: limited prefixed integer size by 62 bits.
07/02/20:
- 17:07 Changeset in nginx [8467:e02250b55b17]quic by
- HTTP/3: simplified handling return codes from parse functions.
- 15:45 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) closed by
- duplicate: Yes, this is clearly a duplicate of #147.
- 15:44 Ticket #147 (nginx touched /var/log/nginx-error.log even when error_log are switched off) updated by
- See also #2011.
- 14:35 Changeset in nginx [8462:153bffee3d7e]quic by
- HTTP/3: fixed prefix in decoding Section Acknowledgement.
- 13:47 Changeset in nginx [8460:72f9ff4e0a88]quic by
- HTTP/3: close QUIC connection with HTTP/QPACK errors when needed. …
- 13:33 Changeset in nginx [8458:e0f92f68e018]quic by
- QUIC: Introduced ngx_quic_finalize_connection(). The function …
- 13:33 Changeset in nginx [8457:a7f64438aa3c]quic by
- HTTP/3: downgraded literal size error level to NGX_LOG_INFO. Now it's …
- 12:34 Changeset in nginx [8456:c9538aef3211]quic by
- HTTP/3: refactored dynamic table implementation. Previously dynamic …
- 12:15 Changeset in nginx [8455:b0e81f49d7c0]quic by
- HTTP/3: fixed prefixed integer encoding and decoding. Previously …
07/01/20:
- 17:14 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) updated by
- Ah this is probably the same as https://trac.nginx.org/nginx/ticket/147
- 17:10 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) created by
- In src/core/nginx.c, in ngx_cdecl(), the commandline parameters are …
- 06:59 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
- Thank you! That's exactly this. I do indeed use realip, and switching …
06/30/20:
- 19:07 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by
- I assume you also have the realip module enabled in your second server …
- 14:45 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) created by
- Using a NGINX configuration where: - a stream server listens on …
- 14:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: > Who needs an unescaped variable which they cannot use in URLs? This …
- 12:32 Changeset in nginx [8461:b3c07aa021f6]quic by
- HTTP/3: set r->headers_in.chunked flag after parsing headers. …
- 09:30 Changeset in nginx [8459:1ed698947172]quic by
- HTTP/3: error code definitions for HTTP/3 and QPACK.
- 09:11 Changeset in nginx-tests [1578:f55d25e08b3e] by
- Tests: added "ssl_verify_client off" tests (ticket #2008).
- 05:16 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by
-
I have asked where anyone needs an unescaped
$1
and you have …
Note:
See TracTimeline
for information about the timeline view.