Timeline



05/03/13:

07:00 Ticket #347 (upstream keepalive not working for HTTPS) updated by maxim
The submitter reports that the issue is fixed in the recent version of …
06:59 Ticket #347 (upstream keepalive not working for HTTPS) closed by maxim
fixed

05/02/13:

10:26 Changeset in nginx [5204:a64c8a5da336] by Piotr Sikora <piotr@…>
PCRE: retain input pattern for all regular expressions. Previously, …
10:25 Ticket #348 (Excessive urlencode in if-set) created by Petr Messner
Hello, I had setup Apache with mod_dav_svn behind nginx acting as …

05/01/13:

13:58 Ticket #347 (upstream keepalive not working for HTTPS) updated by Roy Reznik
You can close this issue It was fixed in 1.4.0. Cheers.
07:30 Ticket #347 (upstream keepalive not working for HTTPS) created by Roy Reznik
upstream server_1 { server serverhost.domain.com:443; …

04/30/13:

23:15 Ticket #346 (Writing connection leak while SPDY enabled) updated by Marcus Maciel
any update ???

04/29/13:

18:49 Ticket #346 (Writing connection leak while SPDY enabled) updated by Marcus Maciel
Hello Valentin, Let me know if you need any other information to help …
17:16 Ticket #346 (Writing connection leak while SPDY enabled) updated by Marcus Maciel
nginx.conf […]
16:54 Ticket #343 (Ubuntu/Debian packages are compiled without SPDY support due to extra ...) closed by Sergey Budnevitch
fixed: No, hyphen is necessary, since I want dpkg-checkbuilddeps to read …
15:33 Ticket #346 (Writing connection leak while SPDY enabled) updated by Valentin V. Bartenev
Status, Owner changed
Could you provide the full config? Is there anything in the error log?
14:58 Changeset in nginx [5188:886800caf360] by Ruslan Ermilov <ru@…>
Proxy: allocate $proxy_internal_body_length from request pool.
14:46 Screen Shot 2013-04-29 at 11.45.14 AM.png attached to Ticket #346 by Marcus Maciel
As you can see on attached file Writing connection still leaking until …
14:45 Ticket #346 (Writing connection leak while SPDY enabled) created by Marcus Maciel
I'm trying to use SPDY module, but when I enable this into my config …
14:07 Changeset in nginx [5187:f1daa0356a1d] by Ruslan Ermilov <ru@…>
Configure: fixed detection of newer Apple clang compilers.
14:06 Changeset in nginx [5186:d68ef94adaea] by Ruslan Ermilov <ru@…>
Version bump.
09:59 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by Kasper Hirvikoski
My mistake. Thank you for your kind and helpful responses.
09:16 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by Ruslan Ermilov
Replying to Kasper Hirvikoski <kasper@kytkemo.com>: > Ah, …

04/28/13:

08:07 Ticket #340 (autoindex does not treat multi-byte unicode correctly) closed by Maxim Dounin
invalid: You have to set charset using the http://nginx.org/r/charset directive.
02:07 Ticket #340 (autoindex does not treat multi-byte unicode correctly) updated by Alex Storn
Enca is an Extremely Naive Charset Analyser. http://gitorious.org/enca

04/27/13:

15:56 Ticket #94 (1.1.14 compilation fails on Mac OS X 10.7.2) updated by Matthew Ratzloff
I encountered this problem with 1.4.0. Solution 2 works as well.
13:41 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by Kasper Hirvikoski
Ah, I see. Thank you Maxim! Maybe the wiki page should be updated to …
13:35 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) closed by Maxim Dounin
invalid: This is expected behaviour, the ip6only is now consistently set to on, …
13:18 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) created by Kasper Hirvikoski
Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when …

04/26/13:

14:18 Ticket #344 (SSL proxy - CRL verification error) created by Pasha Ninjah
Hello The configuration is pretty straightforward - the nginx server …
14:18 Ticket #343 (Ubuntu/Debian packages are compiled without SPDY support due to extra ...) created by Avishai Ish-Shalom
in debian/rules check for SDPY build-deps doesn't actually work due to …
13:47 Ticket #342 (ssl hash of subject and issuer dn) updated by Maxim Dounin
What's the expected use of the variables introduced?
13:19 Ticket #342 (ssl hash of subject and issuer dn) created by Alfred Reibenschuh
the following patch enable to have the (open)ssl hash of issuer and …
08:11 Ticket #341 (in overflow error in ngx_http_close_connection) closed by maxim
invalid: We are aware of this issue and working on it. We'll release an …
07:49 Ticket #341 (in overflow error in ngx_http_close_connection) created by Володимир Костирко
There's new security issue available: …
07:31 Changeset in nginx_org [893:fdbf82abf20b] by Maxim Konovalov <maxim@…>
Donor added.
01:04 Ticket #340 (autoindex does not treat multi-byte unicode correctly) created by Calvin Li
The autoindex page uses spaces to line up columns. But it counts …

04/25/13:

19:54 Changeset in nginx_org [896:6d077d40628d] by Ruslan Ermilov <ru@…>
Announce the source code repository move to Mercurial.
13:45 Changeset in nginx_org [892:88ab131ae017] by Maxim Konovalov <maxim@…>
Banner's message and URL updated.
13:41 Changeset in nginx [5272:c248b0071507]stable-1.4 by Ruslan Ermilov <ru@…>
Removed vestiges of SVN.
13:41 Changeset in nginx [5212:09dbd363050a] by Ruslan Ermilov <ru@…>
Removed vestiges of SVN.
13:39 Changeset in nginx_org [891:47fd2989d10f] by Maxim Konovalov <maxim@…>
Banner's message and URL updated.
13:10 Changeset in nginx_org [895:ac89a15d13b4] by Ruslan Ermilov <ru@…>
Removed vestiges of SVN.
13:09 Changeset in nginx_org [894:1c43b065588b] by Ruslan Ermilov <ru@…>
Removed "tarball" target.
12:11 Ticket #339 (Time zone lookup needs to be cached) closed by is
invalid: nginx does not read the time zone file by itself. nginx calls libc …
11:36 Changeset in nginx_org [890:ec68c9ae35bf] by Maxim Dounin <mdounin@…>
Fixed previous commit. Extra "</link>" slipped in last time changes.
11:31 Ticket #339 (Time zone lookup needs to be cached) created by Michael Thomson
On OSX and maybe other platforms. The time zone file i.e. …
11:25 Changeset in nginx_org [889:675f5c67b45c] by Maxim Dounin <mdounin@…>
Source code repository switch to Mercurial.

04/24/13:

15:07 Milestone 1.3 completed
Status: released Trunk: development 1.3.x planned features …
15:01 Milestone 1.4.0 completed
Status: released 1.4.0 changelog
14:09 Changeset in nginx_org [888:22f93c9f4b55] by Maxim Dounin <mdounin@…>
nginx-1.4.0
13:59 Changeset in nginx [5185:3d6cb39da268] by Maxim Dounin <mdounin@…>
release-1.4.0 tag
13:59 Changeset in nginx [5184:7809529022b8]release-1.4.0 by Maxim Dounin <mdounin@…>
nginx-1.4.0-RELEASE
13:03 Changeset in nginx [5183:099427f518e4] by Maxim Dounin <mdounin@…>
Version bump.

04/23/13:

14:01 Ticket #338 (ssl_verify_client optional_no_ca generates an error with expired ...) closed by Maxim Dounin
invalid: The first sentense in your report is invalid. The "optional_no_ca" is …
13:12 Ticket #338 (ssl_verify_client optional_no_ca generates an error with expired ...) created by Emanuelis Norbutas
Hello, I need nginx to verify clients certificate but allow …
11:09 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by Valentin V. Bartenev
Priority changed
11:08 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by Valentin V. Bartenev
Status, Owner changed
10:58 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by Greg Macsok
Thought i'd confirm that Chrome, Firefox & IE work fine.
10:51 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) created by Greg Macsok
For some reason, Nginx returns a 400 Bad Request when an Opera user …
10:15 Changeset in nginx [5182:7a015bbda96f] by Valentin Bartenev <vbart@…>
SPDY: set NGX_TCP_NODELAY_DISABLED for fake connections. This is to …
10:04 Changeset in nginx [5181:4d0ac175f6e4] by Maxim Dounin <mdounin@…>
Perl: request body handling fixed. As of 1.3.9, chunked request body …
07:33 Changeset in nginx-tests [282:04832fc79805] by Maxim Dounin <mdounin@…>
Tests: perl request body testing.

04/19/13:

12:20 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) updated by Maxim Dounin
In 5181/nginx: […]
12:19 Changeset in nginx [5180:2db6bdcaedc0] by Maxim Dounin <mdounin@…>
Configure: fixed perl Makefile generation (ticket #334). Dependancy …
10:29 Ticket #336 (nginx could not be built with the ngx_http_perl_module if the ...) closed by Maxim Dounin
duplicate: Duplicate of #334.
10:26 Ticket #336 (nginx could not be built with the ngx_http_perl_module if the ...) created by Hien Phan
Hello, I tried to build Nginx 1.3.16 with OpenSSL 1.0.1e on Debian 6, …

04/18/13:

14:26 Changeset in nginx [5179:b0a616778038] by Ruslan Ermilov <ru@…>
Configure: uniformly refer to libs when searching for md5 and sha1.
14:16 Changeset in nginx [5178:42c309b80d7c] by Ruslan Ermilov <ru@…>
Version bump.
09:46 Ticket #335 (Weird configuration summary for hash libs) created by jv42.myopenid.com
I'm building nginx from the source and I've just noticed a weirdness …

04/17/13:

22:49 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) updated by Maxim Dounin
Thanks, the following patch should fix this: […]
19:32 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) created by Chris Lea
This change: http://trac.nginx.org/nginx/changeset/5169/nginx breaks …

04/16/13:

14:33 Milestone 1.3.16 completed
Status: released [[http://nginx.org/en/CHANGES| 1.3.16 …
14:15 Changeset in nginx_org [887:6a4ef822a85c] by Maxim Dounin <mdounin@…>
nginx-1.3.16
14:05 Changeset in nginx [5177:71b624bc725b] by Maxim Dounin <mdounin@…>
release-1.3.16 tag
14:05 Changeset in nginx [5176:23159600bdea]release-1.3.16 by Maxim Dounin <mdounin@…>
nginx-1.3.16-RELEASE
13:38 Changeset in nginx-tests [281:53068d38a3ce] by Maxim Dounin <mdounin@…>
Tests: truncate messages to 2048 bytes instead of 4096. The latter …
13:28 Changeset in nginx-tests [280:3dd8c7acf3ad] by Maxim Dounin <mdounin@…>
Tests: fix couple of possible warnings in proxy_upgrade.t.
12:58 Changeset in nginx [5175:56b5ef2c9e37] by Maxim Dounin <mdounin@…>
Events: backout eventport changes (r5172) for now. Evenport method …
10:15 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by Maxim Dounin
In 5175/nginx: […]
10:14 Changeset in nginx [5174:f458156fd46a] by Maxim Dounin <mdounin@…>
Request body: only read body in main request (ticket #330). Before …

04/15/13:

22:43 Changeset in nginx-tests [279:c754b1c79efe] by Maxim Dounin <mdounin@…>
Tests: better timeout handling in proxy_upgrade.t. Now it uses …

04/13/13:

20:24 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by Maxim Dounin
Sensitive changed
The response is a proper HTTP/0.9 response, which is used as nginx …
18:25 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by Mohammad Alsaleh
> I tend to think that proper fix in nginx would be to disallow spaces …
17:54 Ticket #333 (Headerless GET reply with un-escaped URLs containing ' H') closed by Maxim Dounin
duplicate: Duplicate of #196.
17:33 Ticket #333 (Headerless GET reply with un-escaped URLs containing ' H') created by Mohammad Alsaleh
NGINX seems to handle un-escaped URLs. But If the URL contains ' H' in …
08:04 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by Proforg M
Спасибо, проблема решена!

04/12/13:

19:12 Changeset in nginx [5173:5373be93c0be] by Ruslan Ermilov <ru@…>
Upstream: warn if multiple non-stackable balancers are installed.
17:31 Changeset in nginx [5172:a4d21534cbf4] by Valentin Bartenev <vbart@…>
Events: fixed typos in two previous commits.
15:04 Changeset in nginx [5171:98cbd8f92c87] by Valentin Bartenev <vbart@…>
Events: handle only active events in eventport. We generate both read …
15:02 Changeset in nginx [5170:6362bd26e4b0] by Valentin Bartenev <vbart@…>
Events: protection from stale events in eventport and devpoll. Stale …
14:19 Changeset in nginx-tests [278:b6f0537afa01] by Maxim Dounin <mdounin@…>
Tests: fix pipelining tests in proxy_websocket.t.

04/11/13:

13:49 Changeset in nginx [5169:f6bbe77794aa] by Sergey Kandaurov <pluknet@…>
Upstream: fixed $upstream_response_length without buffering. Reported …

04/10/13:

17:07 Changeset in nginx [5168:482fda984556] by Maxim Dounin <mdounin@…>
Configure: fixed nginx.so rebuild (broken by r5145). To avoid further …
15:51 Ticket #332 (request method in subrequest not honored by uwsgi module) updated by amotl.myopenid.com
Now having […] solves it perfectly for us. Thanks a lot!
15:14 Ticket #332 (request method in subrequest not honored by uwsgi module) closed by Maxim Dounin
wontfix: The default uwsgi_params file uses $request_method variable to pass …
13:50 Ticket #332 (request method in subrequest not honored by uwsgi module) created by amotl.myopenid.com
Hey there, while switching our Python WSGI Pyramid application stack …
10:48 patch-nginx-limit-rate-after.txt attached to Ticket #293 by Maxim Dounin
Just for history, correct patch to implement $limit_rate_after.
10:45 Ticket #293 (implement $limit_rate_after, similar to $limit_rate) updated by Maxim Dounin
We've discussed this with Igor, and agreed that it's not a good idea …

04/09/13:

19:51 Changeset in nginx_org [886:ca9a259cb5c8] by Valentin Bartenev <vbart@…>
The SPDY module does not support "limit_rate", not "limit_req".

04/08/13:

08:08 Ticket #329 (resolver: incorrect TTL used with A+CNAME response) updated by maxim
The original reporter created ticket #331, already closed as a duplicate.
08:07 Ticket #331 (incorrect resolver behavior cname ttl) closed by maxim
duplicate: Thanks for the report -- we have already filled ticked #329 for this …

04/05/13:

22:36 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by Maxim Dounin
Патч. […]
06:25 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by Proforg M
[…]
05:08 Ticket #331 (incorrect resolver behavior cname ttl) created by openid.yandex.ru/pl-xek
nginx resolver doesn't care of TTL for CNAME records. E.g., DNS …

04/04/13:

21:17 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by Maxim Dounin
Что показывает […] в gdb?
19:28 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) created by Proforg M
Новые версии nginx, начиная с 1.3.11 (или 10) постоянно сегфолтятся …
14:19 Changeset in nginx [5167:85ee9d858dcb] by Valentin Bartenev <vbart@…>
Upstream: removed surplus ngx_resolve_name_done() call. It will be …
10:45 Ticket #329 (resolver: incorrect TTL used with A+CNAME response) created by Sergey Kandaurov
By default, nginx caches responses using the TTL value of a response. …
10:33 Changeset in nginx_org [885:ff64337502f4] by Ruslan Ermilov <ru@…>
Updated with Netcraft April 2013 Web Server Survey stats.
09:14 Changeset in nginx_org [884:8e3a43826cd2] by Maxim Konovalov <maxim@…>
Donor added.

04/03/13:

15:41 Changeset in nginx-tests [277:8a41f7d38cc3] by Maxim Dounin <mdounin@…>
Tests: fix proxy_upgrade.t. Not it doesn't produce spurious TODO test …
14:13 Changeset in nginx [5166:fc595eeb6c54] by Valentin Bartenev <vbart@…>
Limit req: rate should be non-zero. Specifying zero rate caused …
Note: See TracTimeline for information about the timeline view.