Timeline
01/28/21:
- 18:42 Ticket #2130 ("nginx" stops every day itself) updated by
- From the logs provided it looks like nginx master process died due to …
- 17:52 Ticket #2130 ("nginx" stops every day itself) created by
- Every single day, I discover that my web services are unavailable and …
- 09:55 Ticket #2129 (--with-openssl= extra .openssl injected in path) closed by
- invalid: As documented, the …
- 09:35 Changeset in nginx [8687:1c6343bd7933]quic by
- QUIC: refactored packet processing. - split ngx_quic_process_packet() …
- 05:54 Ticket #2129 (--with-openssl= extra .openssl injected in path) updated by
- Sorry figured it out. It needed the library source directory not the …
- 03:35 Ticket #2129 (--with-openssl= extra .openssl injected in path) created by
- Hi, I am overriding --with-openssl as …
01/27/21:
- 14:52 Ticket #2128 (Using a variable in the resolver directive) closed by
- wontfix: The resolver directive indeed does not …
- 14:16 Ticket #2128 (Using a variable in the resolver directive) created by
- TLDR: `My request is that the resolver directive be capable of …
- 14:16 Changeset in nginx_org [2645:ce5e7e986710] by
- Replaced broken links to FreeBSD ports and packages.
- 10:09 Changeset in nginx [8684:27bd6dc24426]quic by
- README: reflect renaming of several transport parameter directives. …
01/26/21:
- 12:45 Changeset in nginx_org [2644:b1aab2fa2b8f] by
- Linux packages: actualized the list of supported distributions. …
- 09:39 Changeset in nginx [7764:ecc0ae881a25] by
- Clean up trailers in ngx_http_clean_header() as well. The function …
01/25/21:
- 19:13 Changeset in nginx_org [2643:4849fa0fd4b4] by
- Removed URL Decoding/Encoding examples from njs.
- 16:17 Ticket #2127 (ngx_http_realip_module changes $remote_addr which leads to wrong ips ...) updated by
-
Status changed
Thanks for the ticket, this is known and indeed not very convenient … - 15:41 Ticket #2124 (Round robin) closed by
- invalid: Thanks for your feedback, closing this.
- 13:51 Ticket #2126 (443 порт и последний блок в адресе ipv6) closed by
- invalid
- 13:18 Ticket #2126 (443 порт и последний блок в адресе ipv6) updated by
-
Description changed
- 13:16 Changeset in nginx [8689:6bd8ed493b85]quic by
- HTTP/3: refactored request body parser. The change reduces diff to …
- 08:29 Ticket #2127 (ngx_http_realip_module changes $remote_addr which leads to wrong ips ...) updated by
-
Description changed
- 08:20 Ticket #2127 (ngx_http_realip_module changes $remote_addr which leads to wrong ips ...) created by
- I have a webapp under NGinx and another frontal load balancer, …
01/23/21:
- 22:02 Ticket #2126 (443 порт и последний блок в адресе ipv6) created by
- Sry, my fault... Delete please
- 14:47 Ticket #2125 (ssl_trusted_certificate for parallel ECDSA and RSA usage) closed by
- invalid: You can put multiple CA certificates into the file set with the …
- 14:22 Ticket #2125 (ssl_trusted_certificate for parallel ECDSA and RSA usage) updated by
- The nginx version is 1.14.2, not 1.19.x as stated above, eventhough …
- 14:19 Ticket #2125 (ssl_trusted_certificate for parallel ECDSA and RSA usage) created by
- As ECDSA is on it's way to becoming the new standard, it is important …
01/22/21:
- 17:02 Changeset in nginx-tests [1641:6b6a496ac984] by
- Tests: fixed stream_js_fetch.t with parallel tests. The port in njs …
- 11:06 Ticket #2124 (Round robin) updated by
- It works!! Yes, by "proxy_requests" set to 1 and "proxy_responses" …
- 10:47 Ticket #2124 (Round robin) updated by
- Hi Maxim, thank you very much for the answer, ah, yes, it seems that …
01/21/21:
- 19:37 Ticket #2124 (Round robin) updated by
- How do you test that "all traffic is directed only to first upstream …
- 18:19 Changeset in nginx-tests [1640:67adc5fd0548] by
- Tests: added js tests for ngx.fetch() method.
- 15:22 Ticket #2124 (Round robin) created by
- When we configure two groups of upstream servers which both are on the …
- 12:12 Changeset in nginx_org [2641:ea9f4dc0c801] by
- Fixed example in stream js module.
01/20/21:
- 09:38 Changeset in nginx_org [2648:78161967514f] by
- Mentioned ECDSA in ssl_ecdh_curve.
- 09:34 Changeset in nginx_org [2642:c60bcc0de435] by
- Updated TOC in njs examples.
01/19/21:
- 17:35 Changeset in nginx [7763:61d0df8fcc7c] by
- Year 2021.
- 17:32 Changeset in nginx [7762:4e141d0816d4] by
- Core: removed post_accept_timeout. Keeping post_accept_timeout in …
- 17:21 Changeset in nginx [7761:43a0a9e988be] by
- Removed incorrect optimization of HEAD requests. The stub status …
- 12:40 Changeset in nginx_org [2640:885bcb41fbcf] by
- Added an example to njs examples.
- 12:09 Changeset in nginx_org [2639:7ad967af16b8] by
- Updated HS JWT example in njs.
01/16/21:
- 14:08 Changeset in nginx_org [2638:1d775e54f594] by
- Updated OpenSSL version used for win32 builds.
- 13:52 Changeset in nginx_org [2637:75aa9e635e16] by
- Updated with Netcraft December 2020 Web Server Survey stats.
01/14/21:
- 14:14 Ticket #761 (The auth_request does not supports query string/arguments) updated by
- > Is this by design and if so, how do I pass query parameters to an …
01/13/21:
- 21:04 Ticket #761 (The auth_request does not supports query string/arguments) updated by
- This problem is (still) occurring in 1.19.6. Is this by design and if …
- 18:03 Ticket #2120 (Add Support for IP2Location and IP2Proxy BIN Database) updated by
-
Priority, Component changed
First of all, nginx does support vendor-agnostic geolocation … - 13:55 Ticket #2117 (upstream sent more data than specified in "Content-Length" header ...) closed by
- fixed: Fix committed, thanks for reporting this.
- 01:51 Ticket #2120 (Add Support for IP2Location and IP2Proxy BIN Database) created by
- Nginx is supporting single vendor for IP geolocation right now. It is …
01/12/21:
- 18:07 Changeset in nginx-tests [1639:6c323c672a86] by
- Tests: adjusted TODOs for alerts in unbuffered proxying.
- 18:01 Ticket #2117 (upstream sent more data than specified in "Content-Length" header ...) updated by
- In [changeset:"83c4622053b02821a12d522d08eaff3ac27e65e3/nginx" …
- 13:59 Changeset in nginx [7760:83c4622053b0] by
- Upstream: fixed zero size buf alerts on extra data (ticket #2117). …
01/11/21:
- 19:06 Changeset in nginx [7758:b055bb6ef87e] by
- Version bump.
- 18:32 Changeset in nginx-tests [1638:6128590b0d46] by
- Tests: tests for "zero size buf" alerts in unbuffered proxying. …
- 16:18 Ticket #2119 (Add support for Maxmind's GeoIP2) created by
- Since Maxmind has announced plans to retire its "legacy" GeoIP in May …
01/08/21:
- 20:28 Ticket #2118 (no "ssl_certificate" is defined for the "listen ... ssl" when listen ...) closed by
- worksforme: > Is this a problem with the config tester or am I missing something? …
01/07/21:
- 13:39 Ticket #2118 (no "ssl_certificate" is defined for the "listen ... ssl" when listen ...) created by
- Hello, when I try to run "nginx -t" to test my config files, I get …
- 02:58 Ticket #2117 (upstream sent more data than specified in "Content-Length" header ...) updated by
-
Status changed
Thank you for the report. Indeed, this is a bug in handling of …
01/04/21:
- 22:06 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
-
Checkmate!
----
> Try using
-CAfile
and-CApath
arguments … - 21:23 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
- Replying to Yan Foto: > 1. Choose a provider that uses …
- 13:21 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
- This is summary of of the discussion so far and my final comment. …
01/03/21:
- 23:24 Ticket #2115 (Consider using "proxy_set_header Connection $http_connection;" in all ...) updated by
-
The example in the article does not imply using
Connection: upgrade
… - 23:07 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
- > So I guess the question remains: why doesn't it manage to do the …
01/02/21:
- 01:27 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
- > This implies that an OCSP response can be verified by using only …
12/31/20:
- 19:34 Ticket #1926 (resolver should not cache failures) closed by
- invalid: The configuration in the archive provided is as follows: […] Note …
- 19:07 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
- > there would be no need to explicitly include an anchor which is …
- 14:04 Ticket #2114 (nginx-module-njs dependency error) updated by
-
Owner, Status changed
No problem at all. That means we need to document this can happen and … - 13:55 Ticket #2114 (nginx-module-njs dependency error) updated by
- Hello, sorry for the delay. Yes, you are right. I guess I could have …
- 13:21 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
- For future reference: I spent some more time trying to figure out …
- 12:16 Ticket #1926 (resolver should not cache failures) reopened by
12/30/20:
- 21:31 Ticket #1926 (resolver should not cache failures) updated by
- Sorry for the late response. It hits us again recently. I have a …
- 07:49 Ticket #2117 (upstream sent more data than specified in "Content-Length" header ...) updated by
-
Description changed
- 05:52 Ticket #2117 (upstream sent more data than specified in "Content-Length" header ...) created by
- I have an invalid upstream that repsonse 204 with extra data. It works …
- 01:05 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
- Another note: > […] despite the fact that all valid responses are …
12/29/20:
- 21:37 Ticket #2115 (Consider using "proxy_set_header Connection $http_connection;" in all ...) updated by
- >Correct approach is to fix such configurations I agree of course. …
- 21:33 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
- I appreciate the quick response, but I'm not sure if that's an OpenSSL …
- 21:10 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) closed by
- invalid: Unfortunately, OpenSSL provides no easy way to verify OCSP responses …
- 17:56 Ticket #2115 (Consider using "proxy_set_header Connection $http_connection;" in all ...) closed by
-
wontfix: Thank you for your suggestion.
First of all, using
$http_connection
… - 17:21 Changeset in nginx-tests [1637:da52525f49d1] by
- Tests: avoid ssl_certificate.t hang on SIGPIPE. It could stuck in SSL …
- 11:13 Changeset in nginx [7759:a20eef9a1df2] by
- Contrib: vim syntax, update core and 3rd party module directives.
- 00:29 Ticket #2116 (OCSP verification fails if response is signed by a designated authority) updated by
-
I also get the same results with
nginx/1.18.0
: […]
Note:
See TracTimeline
for information about the timeline view.