Timeline
06/07/22:
- 18:58 Changeset in nginx [8043:1afd19dc7161] by
- Mp4: fixed potential overflow in ngx_http_mp4_crop_stts_data(). Both …
- 18:54 Ticket #964 (Expires header incorrectly prioritised over Cache-Control: max-age) closed by
- fixed: Fixed, thanks to all involved.
- 16:08 Changeset in nginx [8042:c7e25324be11] by
- Upstream: handling of certificates specified as an empty string. Now, …
- 09:06 Ticket #964 (Expires header incorrectly prioritised over Cache-Control: max-age) updated by
- In [changeset:"0784ab86ad08da8ac11ca1bcd3cc34a2e2e1730d/nginx" …
06/06/22:
- 21:07 Changeset in nginx [8041:0784ab86ad08] by
- Upstream: fixed X-Accel-Expires/Cache-Control/Expires handling. …
06/03/22:
- 16:16 Changeset in nginx_org [2859:5eb32d26a584] by
- k8s ebook promo added.
06/02/22:
- 18:04 Ticket #2322 (client_max_body_size doesn't work in named location) updated by
- I confirm that client_max_body_size does not work in named location …
- 15:02 Changeset in nginx_org [2858:c2ac5ac83195] by
- Added info about the Unit 1.27.0 release.
- 13:59 Milestone unit-1.27 completed
- Planned features and enhancements: * Configurable “index” file * …
- 03:17 Changeset in nginx [8045:aa28c802409f] by
- Resolver: make TCP write timer event cancelable. Similar to …
05/31/22:
- 14:04 Ticket #2357 (Header V4 RSA/SHA1 Signature, key ID 7bd9bf62: BAD) closed by
- invalid: Thanks for confirming! Just to reiterate for future encounters: …
- 07:05 Changeset in nginx [9026:3550b00d9dc8]quic by
- QUIC: avoided pool usage in token calculation.
05/30/22:
- 23:00 Ticket #1724 (Nginx doesn't sanitize and is inconsistent with multiple, repeated ...) closed by
- fixed: Fixed, thanks for prodding.
- 22:58 Ticket #485 (Multiple WWW-Authenticate headers) closed by
- fixed: Fixed, thanks to all involved. Note that 3rd party authentication …
- 22:54 Ticket #1423 (response vary headers not used in the cache key) closed by
- fixed: Fixed, thanks.
- 22:53 Ticket #1843 ($upstream_http_set_cookie includes only first cookie) closed by
- fixed: Fixed, thanks to all involved.
- 22:53 Ticket #1316 ($http_ variables only contain the first field-value) closed by
- fixed: Fixed, thanks to all involved.
- 22:33 Ticket #485 (Multiple WWW-Authenticate headers) updated by
- In [changeset:"711737177b7786a82e8ce1e4a6667c86c42ec5c4/nginx" …
- 22:33 Ticket #485 (Multiple WWW-Authenticate headers) updated by
- In [changeset:"8272c823a7d04c927d5cb2cf30dfa7a62efb1fa3/nginx" …
- 22:33 Ticket #485 (Multiple WWW-Authenticate headers) updated by
- In [changeset:"f739c8142fb22bf03c2d426507253768e36025b3/nginx" …
- 22:33 Ticket #1423 (response vary headers not used in the cache key) updated by
- In [changeset:"cd73509f21e2daa817bf5e9074d266277915c941/nginx" …
- 22:33 Tickets #1843,1316 batch updated by
- In [changeset:"08b3ea81ff5f71e6aced8202b557eb9347400ce7/nginx" …
- 22:33 Ticket #1724 (Nginx doesn't sanitize and is inconsistent with multiple, repeated ...) updated by
- In [changeset:"8b7a96fdd54c9e17af2abeaae8a3105664ea2bc1/nginx" …
- 22:33 Ticket #1724 (Nginx doesn't sanitize and is inconsistent with multiple, repeated ...) updated by
- In [changeset:"75af96daee978f10f89d8a641ab20f08b94dac12/nginx" …
- 22:33 Ticket #1724 (Nginx doesn't sanitize and is inconsistent with multiple, repeated ...) updated by
- In [changeset:"f8f6b9fee66a868ecadee6dcfe47152f82a4b3be/nginx" …
- 21:14 Changeset in nginx [8040:e0cfab501dd1] by
- Upstream: fixed build without http cache (broken by cd73509f21e2).
- 20:23 Changeset in nginx_org [2857:19ded9ac7a96] by
- Updated with Netcraft May 2022 Web Server Survey stats.
- 18:25 Changeset in nginx [8039:e64a1f32065b] by
- Headers filter: improved memory allocation error handling.
- 18:25 Changeset in nginx [8038:711737177b77] by
- Multiple WWW-Authenticate headers with "satisfy any;". If a module …
- 18:25 Changeset in nginx [8037:8272c823a7d0] by
- Auth request: multiple WWW-Authenticate headers (ticket #485). When …
- 18:25 Changeset in nginx [8036:f739c8142fb2] by
- Upstream: multiple WWW-Authenticate headers (ticket #485). When using …
- 18:25 Changeset in nginx [8035:cd73509f21e2] by
- Upstream: handling of multiple Vary headers (ticket #1423). …
- 18:25 Changeset in nginx [8034:413dbda22f7d] by
- Upstream: duplicate headers ignored or properly linked. Most of the …
- 18:25 Changeset in nginx [8033:2bf7792c262e] by
- Upstream: header handlers can now return parsing errors. With this …
- 18:25 Changeset in nginx [8032:2025aae94739] by
- Upstream: all known headers in u->headers_in are linked lists now.
- 18:25 Changeset in nginx [8031:d26db4f82d7d] by
- All known output headers can be linked lists now. The h->next pointer …
- 18:25 Changeset in nginx [8030:cdc2724858ca] by
- Upstream: simplified Accept-Ranges handling. The …
- 18:25 Changeset in nginx [8029:e0027c8438b0] by
- Upstream: simplified Content-Encoding handling. Since introduction of …
- 18:25 Changeset in nginx [8028:27d12017f300] by
- Upstream: style.
- 18:25 Changeset in nginx [8027:ca78312db071] by
- Perl: combining unknown headers during $r->header_in() lookup.
- 18:25 Changeset in nginx [8026:8b3860b52bb3] by
- Perl: all known input headers are handled identically. As all known …
- 18:25 Changeset in nginx [8025:c263f9ffa1fd] by
- All non-unique input headers are now linked lists. The …
- 18:25 Changeset in nginx [8024:ef6a3a99a81a] by
- Reworked multi headers to use linked lists. Multi headers are now …
- 18:25 Changeset in nginx [8023:08b3ea81ff5f] by
- Combining unknown headers during variables lookup (ticket #1316). …
- 18:25 Changeset in nginx [8022:8b7a96fdd54c] by
- Uwsgi: combining headers with identical names (ticket #1724). The …
- 18:25 Changeset in nginx [8021:75af96daee97] by
- SCGI: combining headers with identical names (ticket #1724). SCGI …
- 18:25 Changeset in nginx [8020:f8f6b9fee66a] by
- FastCGI: combining headers with identical names (ticket #1724). …
- 18:25 Changeset in nginx [8019:0e562a332529] by
- Perl: fixed $r->header_in("Connection"). Previously, the …
05/29/22:
- 23:38 Changeset in nginx [8018:5119c8150478] by
- Fixed runtime handling of systems without EPOLLRDHUP support. In …
- 23:37 Changeset in nginx [8017:6206bca52d73] by
- Version bump.
05/28/22:
- 11:30 Ticket #2357 (Header V4 RSA/SHA1 Signature, key ID 7bd9bf62: BAD) updated by
- Hi, I have checked on a new machine, and indeed there is no error. …
05/26/22:
- 15:13 Ticket #2357 (Header V4 RSA/SHA1 Signature, key ID 7bd9bf62: BAD) updated by
-
Owner, Status changed
Hello! I wonder if that error comes from the older rpm package you … - 12:17 Changeset in nginx [9018:5b1011b5702b]quic by
- HTTP/3: require that field section base index is not negative. RFC …
- 11:22 Ticket #2357 (Header V4 RSA/SHA1 Signature, key ID 7bd9bf62: BAD) created by
- nginx-1.22.0-1.el9.ngx.x86_64.rpm cannot be installed on CentOS 9 …
05/25/22:
- 10:45 Changeset in nginx_org [2856:d9f5ff496aad] by
- Linux packages: actualized supported Alpine Linux versions.
05/24/22:
- 18:46 Changeset in nginx_org [2855:d9ef72e0217f] by
- njs-0.7.4.
- 16:54 Milestone njs-0.7.4 completed
- Planned features and enhancements: * Bunch of bug fixes
- 15:09 Changeset in nginx_org [2854:eb9f88293304] by
- Corrected a date in the latest news entry.
- 14:29 Tickets #2316,2199 batch updated by
-
Milestone changed
Ticket retargeted after milestone closed - 14:29 Milestone nginx-1.21 completed
- Status: ongoing development Trunk: mainline * [in progress] …
- 14:28 Milestone nginx-1.22.0 completed
- Status: scheduled Trunk: stable The first cut from 1.22 …
- 13:24 Changeset in nginx_org [2852:a9ebed59b64f] by
- nginx-1.22.0
- 06:59 Changeset in nginx_org [2851:04b2f591b5af] by
- Removed banner from error page. * It makes almost no sense. * It is …
05/23/22:
- 23:59 Changeset in nginx [8016:2d3ed138ce65]stable-1.22 by
- release-1.22.0 tag
- 23:59 Changeset in nginx [8015:f669c9c2a617]stable-1.22release-1.22.0 by
- nginx-1.22.0-RELEASE
- 23:51 Changeset in nginx [8014:adbfc4fb948c]stable-1.22 by
- Updated OpenSSL and zlib used for win32 builds.
- 23:51 Changeset in nginx [8011:8a54733c9d12] by
- Updated OpenSSL and zlib used for win32 builds.
- 18:29 Changeset in nginx [8044:457afc332c67] by
- Stream: don't flush empty buffers created for read errors. When we …
- 16:43 Changeset in nginx_org [2853:74cb8ff74831] by
- Linux packages: fixed GPG Mini Howto link.
- 13:25 Ticket #2236 (Unable to reach APT repository for nginx.org) closed by
- worksforme
- 10:17 Changeset in nginx_org [2850:6cd5251fa760] by
- Added my PGP key.
- 10:16 Changeset in nginx_org [2849:8eda939a57e5] by
- Linux packages: added RHEL 9.
05/18/22:
- 17:44 Ticket #1216 (Confusing use of 'URI' when referring to a path in the proxy_pass ...) updated by
- See also #2354.
- 17:43 Ticket #2354 (Usage of "URI" in Documentation is confusing) closed by
- duplicate: Duplicate of #1216.
- 17:41 Ticket #2106 (How can I read Subject Alternative name from client certificate?) updated by
- See also #2355.
- 17:41 Ticket #2355 (Not able to retrieve SAN from client cert) closed by
- duplicate: Duplicate of #2106.
- 17:37 Ticket #1831 (ngx_http_perl_module + Perl 5.30.0) updated by
- See also #2356.
- 17:37 Ticket #2356 (NGINX crashes when renewing certificates with certbot) closed by
- duplicate: It looks like you are using Ubuntu 20.04, and it ships buggy Perl …
- 15:53 Ticket #2356 (NGINX crashes when renewing certificates with certbot) created by
- NGINX crashes when certbot attempts to renew certificates. Attempting …
- 08:31 Ticket #2355 (Not able to retrieve SAN from client cert) created by
- How can I read Subject Alternative Name(SAN) from client certificate? …
- 06:57 Ticket #2354 (Usage of "URI" in Documentation is confusing) created by
- The documentation of the proxy module …
05/17/22:
- 15:37 Ticket #2343 (net::ERR_CONTENT_LENGTH_MISMATCH) updated by
-
Milestone changed
Ticket retargeted after milestone deleted - 11:53 Changeset in nginx_org [2848:c8d57f14c51b] by
- Documented escaped URIs for r.internalRedirect in njs.
- 11:49 Changeset in nginx_org [2847:f5e49925e9db] by
- Documented the njs.version_number property in njs.
05/13/22:
- 11:09 Ticket #2352 (Multiple server sections doesn't respect ssl_protocols) updated by
- Even if this can't be fixed, this should be documented. Current …
05/12/22:
- 15:08 Ticket #2350 (Option to have set_real_ip_from use the proxied client ip when using ...) updated by
- On the backend server you have to use …
- 14:09 Ticket #2353 (timeout parameters do not work at location level) updated by
- Please provide some evidence of the problem: minimal configuration and …
- 10:38 Ticket #2350 (Option to have set_real_ip_from use the proxied client ip when using ...) updated by
- On further inspection, the workaround doesn't appear to be working. I …
- 09:04 Ticket #2353 (timeout parameters do not work at location level) updated by
-
Description changed
- 08:53 Ticket #2353 (timeout parameters do not work at location level) created by
- When set at location level, those parameters are ignored: …
05/11/22:
- 18:05 Ticket #676 (Different ssl_protocols per server won`t work) updated by
- See also #2352.
- 18:05 Ticket #2352 (Multiple server sections doesn't respect ssl_protocols) closed by
- duplicate: Duplicate of #676.
- 11:20 Ticket #2352 (Multiple server sections doesn't respect ssl_protocols) created by
- If we have multiple server sections like bellow […] If a client …
05/10/22:
- 14:07 Changeset in nginx_org [2846:fdf1464e1977] by
- Moved banner to the external file to make partial rollout possible. …
- 14:00 Ticket #2350 (Option to have set_real_ip_from use the proxied client ip when using ...) updated by
- That does appear to work! I spent a silly amount of time trying to …
- 02:56 Ticket #2350 (Option to have set_real_ip_from use the proxied client ip when using ...) updated by
- As far as I understand your use case, you need to set real IP from two …
- 01:33 Ticket #2351 (Support reading file ETag from additional sources) created by
- While the current ETag generation is perfect for most cases, there are …
05/09/22:
- 23:14 Ticket #2350 (Option to have set_real_ip_from use the proxied client ip when using ...) created by
- I'm running nginx on kubernetes in the following configuration: …
- 21:44 Ticket #2216 (Add .mjs to known JS MIME types) updated by
- This is now defined by RFC 9239: …
- 18:25 Ticket #2216 (Add .mjs to known JS MIME types) updated by
- See also: …
- 05:14 Ticket #2349 (Support range requests in requests served via gzip_static) updated by
-
Description changed
- 02:18 Ticket #2349 (Support range requests in requests served via gzip_static) created by
- As discussed in …
Note:
See TracTimeline
for information about the timeline view.