Timeline
05/03/13:
- 07:00 Ticket #347 (upstream keepalive not working for HTTPS) updated by
- The submitter reports that the issue is fixed in the recent version of …
- 06:59 Ticket #347 (upstream keepalive not working for HTTPS) closed by
- fixed
05/02/13:
- 10:26 Changeset in nginx [5204:a64c8a5da336] by
- PCRE: retain input pattern for all regular expressions. Previously, …
- 10:25 Ticket #348 (Excessive urlencode in if-set) created by
- Hello, I had setup Apache with mod_dav_svn behind nginx acting as …
05/01/13:
- 13:58 Ticket #347 (upstream keepalive not working for HTTPS) updated by
- You can close this issue It was fixed in 1.4.0. Cheers.
- 07:30 Ticket #347 (upstream keepalive not working for HTTPS) created by
- upstream server_1 { server serverhost.domain.com:443; …
04/30/13:
04/29/13:
- 18:49 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- Hello Valentin, Let me know if you need any other information to help …
- 17:16 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- nginx.conf […]
- 16:54 Ticket #343 (Ubuntu/Debian packages are compiled without SPDY support due to extra ...) closed by
- fixed: No, hyphen is necessary, since I want dpkg-checkbuilddeps to read …
- 15:33 Ticket #346 (Writing connection leak while SPDY enabled) updated by
-
Status, Owner changed
Could you provide the full config? Is there anything in the error log? - 14:58 Changeset in nginx [5188:886800caf360] by
- Proxy: allocate $proxy_internal_body_length from request pool.
- 14:45 Ticket #346 (Writing connection leak while SPDY enabled) created by
- I'm trying to use SPDY module, but when I enable this into my config …
- 14:07 Changeset in nginx [5187:f1daa0356a1d] by
- Configure: fixed detection of newer Apple clang compilers.
- 14:06 Changeset in nginx [5186:d68ef94adaea] by
- Version bump.
- 09:59 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by
- My mistake. Thank you for your kind and helpful responses.
- 09:16 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by
- Replying to Kasper Hirvikoski <kasper@kytkemo.com>: > Ah, …
04/28/13:
- 08:07 Ticket #340 (autoindex does not treat multi-byte unicode correctly) closed by
- invalid: You have to set charset using the http://nginx.org/r/charset directive.
- 02:07 Ticket #340 (autoindex does not treat multi-byte unicode correctly) updated by
- Enca is an Extremely Naive Charset Analyser. http://gitorious.org/enca
04/27/13:
- 15:56 Ticket #94 (1.1.14 compilation fails on Mac OS X 10.7.2) updated by
- I encountered this problem with 1.4.0. Solution 2 works as well.
- 13:41 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by
- Ah, I see. Thank you Maxim! Maybe the wiki page should be updated to …
- 13:35 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) closed by
- invalid: This is expected behaviour, the ip6only is now consistently set to on, …
- 13:18 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) created by
- Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when …
04/26/13:
- 14:18 Ticket #344 (SSL proxy - CRL verification error) created by
- Hello The configuration is pretty straightforward - the nginx server …
- 14:18 Ticket #343 (Ubuntu/Debian packages are compiled without SPDY support due to extra ...) created by
- in debian/rules check for SDPY build-deps doesn't actually work due to …
- 13:47 Ticket #342 (ssl hash of subject and issuer dn) updated by
- What's the expected use of the variables introduced?
- 13:19 Ticket #342 (ssl hash of subject and issuer dn) created by
- the following patch enable to have the (open)ssl hash of issuer and …
- 08:11 Ticket #341 (in overflow error in ngx_http_close_connection) closed by
- invalid: We are aware of this issue and working on it. We'll release an …
- 07:49 Ticket #341 (in overflow error in ngx_http_close_connection) created by
- There's new security issue available: …
- 07:31 Changeset in nginx_org [893:fdbf82abf20b] by
- Donor added.
- 01:04 Ticket #340 (autoindex does not treat multi-byte unicode correctly) created by
- The autoindex page uses spaces to line up columns. But it counts …
04/25/13:
- 19:54 Changeset in nginx_org [896:6d077d40628d] by
- Announce the source code repository move to Mercurial.
- 13:45 Changeset in nginx_org [892:88ab131ae017] by
- Banner's message and URL updated.
- 13:41 Changeset in nginx [5272:c248b0071507]stable-1.4 by
- Removed vestiges of SVN.
- 13:41 Changeset in nginx [5212:09dbd363050a] by
- Removed vestiges of SVN.
- 13:39 Changeset in nginx_org [891:47fd2989d10f] by
- Banner's message and URL updated.
- 13:10 Changeset in nginx_org [895:ac89a15d13b4] by
- Removed vestiges of SVN.
- 13:09 Changeset in nginx_org [894:1c43b065588b] by
- Removed "tarball" target.
- 12:11 Ticket #339 (Time zone lookup needs to be cached) closed by
- invalid: nginx does not read the time zone file by itself. nginx calls libc …
- 11:36 Changeset in nginx_org [890:ec68c9ae35bf] by
- Fixed previous commit. Extra "</link>" slipped in last time changes.
- 11:31 Ticket #339 (Time zone lookup needs to be cached) created by
- On OSX and maybe other platforms. The time zone file i.e. …
- 11:25 Changeset in nginx_org [889:675f5c67b45c] by
- Source code repository switch to Mercurial.
04/24/13:
- 15:07 Milestone 1.3 completed
- Status: released Trunk: development 1.3.x planned features …
- 15:01 Milestone 1.4.0 completed
- Status: released 1.4.0 changelog …
- 14:09 Changeset in nginx_org [888:22f93c9f4b55] by
- nginx-1.4.0
- 13:59 Changeset in nginx [5185:3d6cb39da268] by
- release-1.4.0 tag
- 13:59 Changeset in nginx [5184:7809529022b8]release-1.4.0 by
- nginx-1.4.0-RELEASE
- 13:03 Changeset in nginx [5183:099427f518e4] by
- Version bump.
04/23/13:
- 14:01 Ticket #338 (ssl_verify_client optional_no_ca generates an error with expired ...) closed by
- invalid: The first sentense in your report is invalid. The "optional_no_ca" is …
- 13:12 Ticket #338 (ssl_verify_client optional_no_ca generates an error with expired ...) created by
- Hello, I need nginx to verify clients certificate but allow …
- 11:09 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by
-
Priority changed
- 11:08 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by
-
Status, Owner changed
- 10:58 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by
- Thought i'd confirm that Chrome, Firefox & IE work fine.
- 10:51 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) created by
- For some reason, Nginx returns a 400 Bad Request when an Opera user …
- 10:15 Changeset in nginx [5182:7a015bbda96f] by
- SPDY: set NGX_TCP_NODELAY_DISABLED for fake connections. This is to …
- 10:04 Changeset in nginx [5181:4d0ac175f6e4] by
- Perl: request body handling fixed. As of 1.3.9, chunked request body …
- 07:33 Changeset in nginx-tests [282:04832fc79805] by
- Tests: perl request body testing.
04/19/13:
- 12:20 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) updated by
- In 5181/nginx: […]
- 12:19 Changeset in nginx [5180:2db6bdcaedc0] by
- Configure: fixed perl Makefile generation (ticket #334). Dependancy …
- 10:29 Ticket #336 (nginx could not be built with the ngx_http_perl_module if the ...) closed by
- duplicate: Duplicate of #334.
- 10:26 Ticket #336 (nginx could not be built with the ngx_http_perl_module if the ...) created by
- Hello, I tried to build Nginx 1.3.16 with OpenSSL 1.0.1e on Debian 6, …
04/18/13:
- 14:26 Changeset in nginx [5179:b0a616778038] by
- Configure: uniformly refer to libs when searching for md5 and sha1.
- 14:16 Changeset in nginx [5178:42c309b80d7c] by
- Version bump.
- 09:46 Ticket #335 (Weird configuration summary for hash libs) created by
- I'm building nginx from the source and I've just noticed a weirdness …
04/17/13:
- 22:49 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) updated by
- Thanks, the following patch should fix this: […]
- 19:32 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) created by
- This change: http://trac.nginx.org/nginx/changeset/5169/nginx breaks …
04/16/13:
- 14:33 Milestone 1.3.16 completed
- Status: released [[http://nginx.org/en/CHANGES| 1.3.16 …
- 14:15 Changeset in nginx_org [887:6a4ef822a85c] by
- nginx-1.3.16
- 14:05 Changeset in nginx [5177:71b624bc725b] by
- release-1.3.16 tag
- 14:05 Changeset in nginx [5176:23159600bdea]release-1.3.16 by
- nginx-1.3.16-RELEASE
- 13:38 Changeset in nginx-tests [281:53068d38a3ce] by
- Tests: truncate messages to 2048 bytes instead of 4096. The latter …
- 13:28 Changeset in nginx-tests [280:3dd8c7acf3ad] by
- Tests: fix couple of possible warnings in proxy_upgrade.t.
- 12:58 Changeset in nginx [5175:56b5ef2c9e37] by
- Events: backout eventport changes (r5172) for now. Evenport method …
- 10:15 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by
- In 5175/nginx: […]
- 10:14 Changeset in nginx [5174:f458156fd46a] by
- Request body: only read body in main request (ticket #330). Before …
04/15/13:
- 22:43 Changeset in nginx-tests [279:c754b1c79efe] by
- Tests: better timeout handling in proxy_upgrade.t. Now it uses …
04/13/13:
- 20:24 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by
-
Sensitive changed
The response is a proper HTTP/0.9 response, which is used as nginx … - 18:25 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by
- > I tend to think that proper fix in nginx would be to disallow spaces …
- 17:54 Ticket #333 (Headerless GET reply with un-escaped URLs containing ' H') closed by
- duplicate: Duplicate of #196.
- 17:33 Ticket #333 (Headerless GET reply with un-escaped URLs containing ' H') created by
- NGINX seems to handle un-escaped URLs. But If the URL contains ' H' in …
- 08:04 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by
- Спасибо, проблема решена!
04/12/13:
- 19:12 Changeset in nginx [5173:5373be93c0be] by
- Upstream: warn if multiple non-stackable balancers are installed.
- 17:31 Changeset in nginx [5172:a4d21534cbf4] by
- Events: fixed typos in two previous commits.
- 15:04 Changeset in nginx [5171:98cbd8f92c87] by
- Events: handle only active events in eventport. We generate both read …
- 15:02 Changeset in nginx [5170:6362bd26e4b0] by
- Events: protection from stale events in eventport and devpoll. Stale …
- 14:19 Changeset in nginx-tests [278:b6f0537afa01] by
- Tests: fix pipelining tests in proxy_websocket.t.
04/11/13:
- 13:49 Changeset in nginx [5169:f6bbe77794aa] by
- Upstream: fixed $upstream_response_length without buffering. Reported …
04/10/13:
- 17:07 Changeset in nginx [5168:482fda984556] by
- Configure: fixed nginx.so rebuild (broken by r5145). To avoid further …
- 15:51 Ticket #332 (request method in subrequest not honored by uwsgi module) updated by
- Now having […] solves it perfectly for us. Thanks a lot!
- 15:14 Ticket #332 (request method in subrequest not honored by uwsgi module) closed by
- wontfix: The default uwsgi_params file uses $request_method variable to pass …
- 13:50 Ticket #332 (request method in subrequest not honored by uwsgi module) created by
- Hey there, while switching our Python WSGI Pyramid application stack …
- 10:45 Ticket #293 (implement $limit_rate_after, similar to $limit_rate) updated by
- We've discussed this with Igor, and agreed that it's not a good idea …
04/09/13:
- 19:51 Changeset in nginx_org [886:ca9a259cb5c8] by
- The SPDY module does not support "limit_rate", not "limit_req".
04/08/13:
- 08:08 Ticket #329 (resolver: incorrect TTL used with A+CNAME response) updated by
- The original reporter created ticket #331, already closed as a duplicate.
- 08:07 Ticket #331 (incorrect resolver behavior cname ttl) closed by
- duplicate: Thanks for the report -- we have already filled ticked #329 for this …
04/05/13:
- 22:36 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by
- Патч. […]
- 06:25 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by
- […]
- 05:08 Ticket #331 (incorrect resolver behavior cname ttl) created by
- nginx resolver doesn't care of TTL for CNAME records. E.g., DNS …
04/04/13:
- 21:17 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by
- Что показывает […] в gdb?
- 19:28 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) created by
- Новые версии nginx, начиная с 1.3.11 (или 10) постоянно сегфолтятся …
- 14:19 Changeset in nginx [5167:85ee9d858dcb] by
- Upstream: removed surplus ngx_resolve_name_done() call. It will be …
- 10:45 Ticket #329 (resolver: incorrect TTL used with A+CNAME response) created by
- By default, nginx caches responses using the TTL value of a response. …
- 10:33 Changeset in nginx_org [885:ff64337502f4] by
- Updated with Netcraft April 2013 Web Server Survey stats.
- 09:14 Changeset in nginx_org [884:8e3a43826cd2] by
- Donor added.
04/03/13:
- 15:41 Changeset in nginx-tests [277:8a41f7d38cc3] by
- Tests: fix proxy_upgrade.t. Not it doesn't produce spurious TODO test …
- 14:13 Changeset in nginx [5166:fc595eeb6c54] by
- Limit req: rate should be non-zero. Specifying zero rate caused …
Note:
See TracTimeline
for information about the timeline view.