Timeline



05/10/13:

16:33 Ticket #346 (Writing connection leak while SPDY enabled) updated by Danny Lockard
I am also seeing a steady upward trend of open "writing" connections …
14:53 Changeset in nginx [5219:32fe021911c9] by F. da Silva <fdasilvayy@…>
Mail: missing ngx_ssl_ecdh_curve() call.

05/09/13:

20:26 Ticket #346 (Writing connection leak while SPDY enabled) updated by Christopher O'Connell
Replying to Valentin V. Bartenev: > Investigation of the …
08:54 Changeset in nginx [5214:2220de0521ca] by Filipe Da Silva <fdasilvayy@…>
Mail: removed surplus ngx_close_connection() call. It is already …

05/08/13:

19:26 Ticket #352 (cache line size wrongly detected on virtual instance) updated by Antoine Musso
Would it make sense to request the Debian package to set a default …
19:08 Ticket #352 (cache line size wrongly detected on virtual instance) updated by Maxim Dounin
The 1044 number was obtained via unifdef'ing appropriate logging in …
18:52 Ticket #352 (cache line size wrongly detected on virtual instance) updated by Antoine Musso
I guess I will report a bug to Ubuntu/Debian so they raise the …
18:42 Ticket #352 (cache line size wrongly detected on virtual instance) updated by Maxim Dounin
Ok, I see why mime.types in question doesn't load. Here what goes on: …
14:23 Changeset in nginx_org [902:f9c687ab1fd2] by Ruslan Ermilov <ru@…>
Regenerated.
14:22 Changeset in nginx_org [901:8f674c48b879] by Ruslan Ermilov <ru@…>
Security advisories: advisory link and several patches per advisory.
13:06 Ticket #353 (nginx 1.4.[0|1] empty reply from server) updated by Valentin V. Bartenev
Replying to Maximilian Weber <maximilian.weber@gmail.com>: …
12:58 Ticket #353 (nginx 1.4.[0|1] empty reply from server) updated by Maximilian Weber
When using deferred the error is gone.
12:56 Ticket #353 (nginx 1.4.[0|1] empty reply from server) updated by Valentin V. Bartenev
Replying to Maximilian Weber <maximilian.weber@gmail.com>: …
12:14 Ticket #353 (nginx 1.4.[0|1] empty reply from server) updated by Maximilian Weber
Yes, I can confirm this the correlation between the debug message and …
11:41 Ticket #353 (nginx 1.4.[0|1] empty reply from server) updated by Valentin V. Bartenev
Could you please confirm the correlation? Please note, that those …
08:21 Ticket #353 (nginx 1.4.[0|1] empty reply from server) updated by Maximilian Weber
2013/05/08 07:44:04 [info] 15847#0: *45649 client timed out in …
07:58 Ticket #353 (nginx 1.4.[0|1] empty reply from server) updated by Maximilian Weber
Here is a example test with nginx-1.4.1 running on the server while …
07:11 Changeset in nginx_org [900:da102c9c7e36] by Maxim Konovalov <maxim@…>
Donors added.

05/07/13:

23:47 Ticket #346 (Writing connection leak while SPDY enabled) updated by Valentin V. Bartenev
Priority changed
Investigation of the issue will take some time. It seems that the …
15:59 Ticket #353 (nginx 1.4.[0|1] empty reply from server) created by Maximilian Weber
Problem: curl: random curl: (52) Empty reply from server chrome: …
15:37 Ticket #352 (cache line size wrongly detected on virtual instance) updated by Antoine Musso
I have attached the mime.types we are using which comes from the …
15:37 ticket352-nginx-debian-mime-diff.txt attached to Ticket #352 by Antoine Musso
diff of 1.1.19 mime.types file and the one from debian
15:34 ticket342-mime.types attached to Ticket #352 by Antoine Musso
mime.types being used
14:32 Ticket #352 (cache line size wrongly detected on virtual instance) updated by Maxim Dounin
Missing semicolon in mime.types? In mime types hash keys are …
14:22 Milestone 1.4.1 completed
Status: released [[http://nginx.org/en/CHANGES-1.4 | 1.4.1 …
14:20 Milestone 1.5.0 completed
Status: released 1.5.0 changelog
13:41 Ticket #352 (cache line size wrongly detected on virtual instance) updated by Antoine Musso
Our bug is https://bugzilla.wikimedia.org/show_bug.cgi?id=48210
13:40 Ticket #352 (cache line size wrongly detected on virtual instance) created by Antoine Musso
I found out nginx is reporting the wrong cache line size on a virtual …
11:06 Changeset in nginx_org [899:012feca3d85f] by Maxim Dounin <mdounin@…>
nginx-1.5.0, nginx-1.4.1
04:42 Ticket #346 (Writing connection leak while SPDY enabled) updated by Christopher O'Connell
I can confirm this happening in 1.4.0 with a substantially similar …
00:06 Ticket #351 (Nginx Perl: header_in('cookie') does not work in 1.4.0) updated by Maxim Dounin
Status, Owner changed
It looks like this was broken by X-Forwarded-For changes in 1.3.14. …

05/06/13:

18:52 Ticket #351 (Nginx Perl: header_in('cookie') does not work in 1.4.0) created by Michael Flickinger
When I call $r->header_in('cookie'), it is always returned as undef. …
15:51 Ticket #321 (try_files & $fastcgi_path_info) closed by Maxim Dounin
wontfix: The try_files directive changes URI …
10:21 Changeset in nginx [5196:c72c5fbd1d07]stable-1.4 by Maxim Dounin <mdounin@…>
release-1.4.1 tag
10:20 Changeset in nginx [5195:0702de638a4c]stable-1.4release-1.4.1 by Maxim Dounin <mdounin@…>
nginx-1.4.1-RELEASE
10:18 Changeset in nginx [5193:8088f11db86e]stable-1.4 by Maxim Dounin <mdounin@…>
Version bump.
10:05 Changeset in nginx [5191:99c535c3439b] by Maxim Dounin <mdounin@…>
release-1.5.0 tag
10:03 Changeset in nginx [5194:f1e993f6c11d]stable-1.4 by Maxim Dounin <mdounin@…>
Fixed chunk size parsing.
10:03 Changeset in nginx [5189:cef7b42d50b3] by Maxim Dounin <mdounin@…>
Fixed chunk size parsing.
09:52 Changeset in nginx [5190:48a84bc3ff07]release-1.5.0 by Maxim Dounin <mdounin@…>
release-1.5.0-RELEASE
07:37 Ticket #350 (http proxy module: wrong Content-Length shared between main request ...) created by Sergey Kandaurov
lanshun zhou <zls.sogou@…> reports: Nginx uses a variable …

05/05/13:

22:12 Changeset in nginx [5192:8c083aa67310]stable-1.4 by Maxim Dounin <mdounin@…>
stable-1.4 branch
21:56 Ticket #349 (HTTP_STATUS never set to YES?) closed by Maxim Dounin
invalid: No, this is not a bug. The variable and the option is expected to be …
09:57 Ticket #321 (try_files & $fastcgi_path_info) updated by Zakaria
I've bitten by this bug. Here's work around from Francis Daly: […] …

05/04/13:

21:59 Ticket #349 (HTTP_STATUS never set to YES?) created by Daniel Griscom
Looking at auto/options, there is a default for each of the HTTP_XXXXX …
19:04 Changeset in nginx_org [898:c0359977e2b6] by Ruslan Ermilov <ru@…>
Updated with Netcraft May 2013 Web Server Survey stats.
18:17 Changeset in nginx_org [897:33c29818ba5b] by Maxim Konovalov <maxim@…>
Donor added.

05/03/13:

07:00 Ticket #347 (upstream keepalive not working for HTTPS) updated by maxim
The submitter reports that the issue is fixed in the recent version of …
06:59 Ticket #347 (upstream keepalive not working for HTTPS) closed by maxim
fixed

05/02/13:

10:26 Changeset in nginx [5204:a64c8a5da336] by Piotr Sikora <piotr@…>
PCRE: retain input pattern for all regular expressions. Previously, …
10:25 Ticket #348 (Excessive urlencode in if-set) created by Petr Messner
Hello, I had setup Apache with mod_dav_svn behind nginx acting as …

05/01/13:

13:58 Ticket #347 (upstream keepalive not working for HTTPS) updated by Roy Reznik
You can close this issue It was fixed in 1.4.0. Cheers.
07:30 Ticket #347 (upstream keepalive not working for HTTPS) created by Roy Reznik
upstream server_1 { server serverhost.domain.com:443; …

04/30/13:

23:15 Ticket #346 (Writing connection leak while SPDY enabled) updated by Marcus Maciel
any update ???

04/29/13:

18:49 Ticket #346 (Writing connection leak while SPDY enabled) updated by Marcus Maciel
Hello Valentin, Let me know if you need any other information to help …
17:16 Ticket #346 (Writing connection leak while SPDY enabled) updated by Marcus Maciel
nginx.conf […]
16:54 Ticket #343 (Ubuntu/Debian packages are compiled without SPDY support due to extra ...) closed by Sergey Budnevitch
fixed: No, hyphen is necessary, since I want dpkg-checkbuilddeps to read …
15:33 Ticket #346 (Writing connection leak while SPDY enabled) updated by Valentin V. Bartenev
Status, Owner changed
Could you provide the full config? Is there anything in the error log?
14:58 Changeset in nginx [5188:886800caf360] by Ruslan Ermilov <ru@…>
Proxy: allocate $proxy_internal_body_length from request pool.
14:46 Screen Shot 2013-04-29 at 11.45.14 AM.png attached to Ticket #346 by Marcus Maciel
As you can see on attached file Writing connection still leaking until …
14:45 Ticket #346 (Writing connection leak while SPDY enabled) created by Marcus Maciel
I'm trying to use SPDY module, but when I enable this into my config …
14:07 Changeset in nginx [5187:f1daa0356a1d] by Ruslan Ermilov <ru@…>
Configure: fixed detection of newer Apple clang compilers.
14:06 Changeset in nginx [5186:d68ef94adaea] by Ruslan Ermilov <ru@…>
Version bump.
09:59 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by Kasper Hirvikoski
My mistake. Thank you for your kind and helpful responses.
09:16 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by Ruslan Ermilov
Replying to Kasper Hirvikoski <kasper@kytkemo.com>: > Ah, …

04/28/13:

08:07 Ticket #340 (autoindex does not treat multi-byte unicode correctly) closed by Maxim Dounin
invalid: You have to set charset using the http://nginx.org/r/charset directive.
02:07 Ticket #340 (autoindex does not treat multi-byte unicode correctly) updated by Alex Storn
Enca is an Extremely Naive Charset Analyser. http://gitorious.org/enca

04/27/13:

15:56 Ticket #94 (1.1.14 compilation fails on Mac OS X 10.7.2) updated by Matthew Ratzloff
I encountered this problem with 1.4.0. Solution 2 works as well.
13:41 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) updated by Kasper Hirvikoski
Ah, I see. Thank you Maxim! Maybe the wiki page should be updated to …
13:35 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) closed by Maxim Dounin
invalid: This is expected behaviour, the ip6only is now consistently set to on, …
13:18 Ticket #345 (Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when ...) created by Kasper Hirvikoski
Nginx 1.4.0 is not binding to IPv4 with [::]:80 on Ubuntu 13.04 when …

04/26/13:

14:18 Ticket #344 (SSL proxy - CRL verification error) created by Pasha Ninjah
Hello The configuration is pretty straightforward - the nginx server …
14:18 Ticket #343 (Ubuntu/Debian packages are compiled without SPDY support due to extra ...) created by Avishai Ish-Shalom
in debian/rules check for SDPY build-deps doesn't actually work due to …
13:47 Ticket #342 (ssl hash of subject and issuer dn) updated by Maxim Dounin
What's the expected use of the variables introduced?
13:19 Ticket #342 (ssl hash of subject and issuer dn) created by Alfred Reibenschuh
the following patch enable to have the (open)ssl hash of issuer and …
08:11 Ticket #341 (in overflow error in ngx_http_close_connection) closed by maxim
invalid: We are aware of this issue and working on it. We'll release an …
07:49 Ticket #341 (in overflow error in ngx_http_close_connection) created by Володимир Костирко
There's new security issue available: …
07:31 Changeset in nginx_org [893:fdbf82abf20b] by Maxim Konovalov <maxim@…>
Donor added.
01:04 Ticket #340 (autoindex does not treat multi-byte unicode correctly) created by Calvin Li
The autoindex page uses spaces to line up columns. But it counts …

04/25/13:

19:54 Changeset in nginx_org [896:6d077d40628d] by Ruslan Ermilov <ru@…>
Announce the source code repository move to Mercurial.
13:45 Changeset in nginx_org [892:88ab131ae017] by Maxim Konovalov <maxim@…>
Banner's message and URL updated.
13:41 Changeset in nginx [5272:c248b0071507]stable-1.4 by Ruslan Ermilov <ru@…>
Removed vestiges of SVN.
13:41 Changeset in nginx [5212:09dbd363050a] by Ruslan Ermilov <ru@…>
Removed vestiges of SVN.
13:39 Changeset in nginx_org [891:47fd2989d10f] by Maxim Konovalov <maxim@…>
Banner's message and URL updated.
13:10 Changeset in nginx_org [895:ac89a15d13b4] by Ruslan Ermilov <ru@…>
Removed vestiges of SVN.
13:09 Changeset in nginx_org [894:1c43b065588b] by Ruslan Ermilov <ru@…>
Removed "tarball" target.
12:11 Ticket #339 (Time zone lookup needs to be cached) closed by is
invalid: nginx does not read the time zone file by itself. nginx calls libc …
11:36 Changeset in nginx_org [890:ec68c9ae35bf] by Maxim Dounin <mdounin@…>
Fixed previous commit. Extra "</link>" slipped in last time changes.
11:31 Ticket #339 (Time zone lookup needs to be cached) created by Michael Thomson
On OSX and maybe other platforms. The time zone file i.e. …
11:25 Changeset in nginx_org [889:675f5c67b45c] by Maxim Dounin <mdounin@…>
Source code repository switch to Mercurial.

04/24/13:

15:07 Milestone 1.3 completed
Status: released Trunk: development 1.3.x planned features …
15:01 Milestone 1.4.0 completed
Status: released 1.4.0 changelog
14:09 Changeset in nginx_org [888:22f93c9f4b55] by Maxim Dounin <mdounin@…>
nginx-1.4.0
13:59 Changeset in nginx [5185:3d6cb39da268] by Maxim Dounin <mdounin@…>
release-1.4.0 tag
13:59 Changeset in nginx [5184:7809529022b8]release-1.4.0 by Maxim Dounin <mdounin@…>
nginx-1.4.0-RELEASE
13:03 Changeset in nginx [5183:099427f518e4] by Maxim Dounin <mdounin@…>
Version bump.

04/23/13:

14:01 Ticket #338 (ssl_verify_client optional_no_ca generates an error with expired ...) closed by Maxim Dounin
invalid: The first sentense in your report is invalid. The "optional_no_ca" is …
13:12 Ticket #338 (ssl_verify_client optional_no_ca generates an error with expired ...) created by Emanuelis Norbutas
Hello, I need nginx to verify clients certificate but allow …
11:09 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by Valentin V. Bartenev
Priority changed
11:08 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by Valentin V. Bartenev
Status, Owner changed
10:58 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) updated by Greg Macsok
Thought i'd confirm that Chrome, Firefox & IE work fine.
10:51 Ticket #337 (Opera sends an invalid "Content-Length" header over SPDY in some cases) created by Greg Macsok
For some reason, Nginx returns a 400 Bad Request when an Opera user …
10:15 Changeset in nginx [5182:7a015bbda96f] by Valentin Bartenev <vbart@…>
SPDY: set NGX_TCP_NODELAY_DISABLED for fake connections. This is to …
10:04 Changeset in nginx [5181:4d0ac175f6e4] by Maxim Dounin <mdounin@…>
Perl: request body handling fixed. As of 1.3.9, chunked request body …
07:33 Changeset in nginx-tests [282:04832fc79805] by Maxim Dounin <mdounin@…>
Tests: perl request body testing.

04/19/13:

12:20 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) updated by Maxim Dounin
In 5181/nginx: […]
12:19 Changeset in nginx [5180:2db6bdcaedc0] by Maxim Dounin <mdounin@…>
Configure: fixed perl Makefile generation (ticket #334). Dependancy …
10:29 Ticket #336 (nginx could not be built with the ngx_http_perl_module if the ...) closed by Maxim Dounin
duplicate: Duplicate of #334.
10:26 Ticket #336 (nginx could not be built with the ngx_http_perl_module if the ...) created by Hien Phan
Hello, I tried to build Nginx 1.3.16 with OpenSSL 1.0.1e on Debian 6, …

04/18/13:

14:26 Changeset in nginx [5179:b0a616778038] by Ruslan Ermilov <ru@…>
Configure: uniformly refer to libs when searching for md5 and sha1.
14:16 Changeset in nginx [5178:42c309b80d7c] by Ruslan Ermilov <ru@…>
Version bump.
09:46 Ticket #335 (Weird configuration summary for hash libs) created by jv42.myopenid.com
I'm building nginx from the source and I've just noticed a weirdness …

04/17/13:

22:49 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) updated by Maxim Dounin
Thanks, the following patch should fix this: […]
19:32 Ticket #334 (Changeset 5169 breaks building on Debian / Ubuntu) created by Chris Lea
This change: http://trac.nginx.org/nginx/changeset/5169/nginx breaks …

04/16/13:

14:33 Milestone 1.3.16 completed
Status: released [[http://nginx.org/en/CHANGES| 1.3.16 …
14:15 Changeset in nginx_org [887:6a4ef822a85c] by Maxim Dounin <mdounin@…>
nginx-1.3.16
14:05 Changeset in nginx [5177:71b624bc725b] by Maxim Dounin <mdounin@…>
release-1.3.16 tag
14:05 Changeset in nginx [5176:23159600bdea]release-1.3.16 by Maxim Dounin <mdounin@…>
nginx-1.3.16-RELEASE
13:38 Changeset in nginx-tests [281:53068d38a3ce] by Maxim Dounin <mdounin@…>
Tests: truncate messages to 2048 bytes instead of 4096. The latter …
13:28 Changeset in nginx-tests [280:3dd8c7acf3ad] by Maxim Dounin <mdounin@…>
Tests: fix couple of possible warnings in proxy_upgrade.t.
12:58 Changeset in nginx [5175:56b5ef2c9e37] by Maxim Dounin <mdounin@…>
Events: backout eventport changes (r5172) for now. Evenport method …
10:15 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by Maxim Dounin
In 5175/nginx: […]
10:14 Changeset in nginx [5174:f458156fd46a] by Maxim Dounin <mdounin@…>
Request body: only read body in main request (ticket #330). Before …

04/15/13:

22:43 Changeset in nginx-tests [279:c754b1c79efe] by Maxim Dounin <mdounin@…>
Tests: better timeout handling in proxy_upgrade.t. Now it uses …

04/13/13:

20:24 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by Maxim Dounin
Sensitive changed
The response is a proper HTTP/0.9 response, which is used as nginx …
18:25 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by Mohammad Alsaleh
> I tend to think that proper fix in nginx would be to disallow spaces …
17:54 Ticket #333 (Headerless GET reply with un-escaped URLs containing ' H') closed by Maxim Dounin
duplicate: Duplicate of #196.
17:33 Ticket #333 (Headerless GET reply with un-escaped URLs containing ' H') created by Mohammad Alsaleh
NGINX seems to handle un-escaped URLs. But If the URL contains ' H' in …
08:04 Ticket #330 (nginx crashing in ngx_http_read_client_request_body) updated by Proforg M
Спасибо, проблема решена!

04/12/13:

19:12 Changeset in nginx [5173:5373be93c0be] by Ruslan Ermilov <ru@…>
Upstream: warn if multiple non-stackable balancers are installed.
17:31 Changeset in nginx [5172:a4d21534cbf4] by Valentin Bartenev <vbart@…>
Events: fixed typos in two previous commits.
15:04 Changeset in nginx [5171:98cbd8f92c87] by Valentin Bartenev <vbart@…>
Events: handle only active events in eventport. We generate both read …
15:02 Changeset in nginx [5170:6362bd26e4b0] by Valentin Bartenev <vbart@…>
Events: protection from stale events in eventport and devpoll. Stale …
14:19 Changeset in nginx-tests [278:b6f0537afa01] by Maxim Dounin <mdounin@…>
Tests: fix pipelining tests in proxy_websocket.t.

04/11/13:

13:49 Changeset in nginx [5169:f6bbe77794aa] by Sergey Kandaurov <pluknet@…>
Upstream: fixed $upstream_response_length without buffering. Reported …

04/10/13:

17:07 Changeset in nginx [5168:482fda984556] by Maxim Dounin <mdounin@…>
Configure: fixed nginx.so rebuild (broken by r5145). To avoid further …
15:51 Ticket #332 (request method in subrequest not honored by uwsgi module) updated by amotl.myopenid.com
Now having […] solves it perfectly for us. Thanks a lot!
15:14 Ticket #332 (request method in subrequest not honored by uwsgi module) closed by Maxim Dounin
wontfix: The default uwsgi_params file uses $request_method variable to pass …
13:50 Ticket #332 (request method in subrequest not honored by uwsgi module) created by amotl.myopenid.com
Hey there, while switching our Python WSGI Pyramid application stack …
10:48 patch-nginx-limit-rate-after.txt attached to Ticket #293 by Maxim Dounin
Just for history, correct patch to implement $limit_rate_after.
10:45 Ticket #293 (implement $limit_rate_after, similar to $limit_rate) updated by Maxim Dounin
We've discussed this with Igor, and agreed that it's not a good idea …
Note: See TracTimeline for information about the timeline view.