Timeline
09/24/13:
- 16:42 Ticket #416 (proxy_cache_use_stale run updating in new thread and serve stale data ...) updated by
- A good reference to the issue. …
- 14:57 Ticket #317 (Allow ssl_verify_client and ssl_verify_depth within locations) closed by
- wontfix: There are no plans to add this. Simple solution is to keep servers …
- 14:53 Ticket #317 (Allow ssl_verify_client and ssl_verify_depth within locations) updated by
- Without this feature, WebSockets are significantly less secure because …
- 14:13 Changeset in nginx-tests [340:9920a522a2de] by
- Tests: added tests for addition module.
- 12:07 Ticket #90 (location search tree incorrect on case-insensitive systems) closed by
- fixed: Fix committed.
09/23/13:
- 23:17 Ticket #355 (Proxy protocol support) updated by
- +1 similar use case: using aws elb -> nginx on instances which proxy …
- 22:58 Changeset in nginx [5390:919d230ecdbe] by
- Proxy: added the "proxy_ssl_ciphers" directive. Signed-off-by: Piotr …
- 18:54 Changeset in nginx-tests [339:9d0a2fa47ac6] by
- Tests: change http timeout to 5s, imap/pop3/smtp to 3s. Excessive …
- 17:05 Ticket #90 (location search tree incorrect on case-insensitive systems) updated by
- In fbaae7d1c0330daf3c9259b6308bc1a58ea99ed8/nginx: […]
- 15:37 Changeset in nginx [5389:72e31d88defa] by
- Added ngx_filename_cmp() with "/" sorted to the left. This patch …
- 15:37 Changeset in nginx [5388:fbaae7d1c033] by
- Caseless location tree construction (ticket #90). Location tree was …
- 14:22 Changeset in nginx_org [986:5e84ce26c7a7] by
- Donor added.
- 12:26 Ticket #420 (keepalive_disable: bingbot (to prevent DoS)) updated by
- I would like to limit the total number of connections in the firewall …
- 10:59 Ticket #420 (keepalive_disable: bingbot (to prevent DoS)) updated by
- The limit_conn does _not_ cause requests to be denied based on number …
- 08:07 Ticket #420 (keepalive_disable: bingbot (to prevent DoS)) updated by
- Alternative idea: a new header "X-Accel-Keepalive: [yes|no]".
- 07:31 Ticket #420 (keepalive_disable: bingbot (to prevent DoS)) updated by
- Thank you for the reply. The number of requests sent by bingbot is no …
- 05:36 Changeset in nginx [5387:0fbcfab0bfd7] by
- SSL: stop loading configs with invalid "ssl_ciphers" values. While …
09/22/13:
- 18:35 Ticket #420 (keepalive_disable: bingbot (to prevent DoS)) closed by
- wontfix: To prevent DoS, use …
- 09:38 Ticket #420 (keepalive_disable: bingbot (to prevent DoS)) created by
- Like its predecessor msnbot, bingbot continues to DoS websites. I've …
09/21/13:
- 18:01 Ticket #419 (one-time "Deny from all"-scan in .htaccess files) created by
- .htaccess is evil and Nginx shouldn't support it or anything remotely …
- 17:48 Ticket #418 (memcached module returns a code 000 instead of the code 200) closed by
- worksforme: Works fine here. If you have problems, please provide more details.
- 16:27 Ticket #418 (memcached module returns a code 000 instead of the code 200) created by
- memcached module returns a code 000 instead of the code 200
- 13:44 Ticket #417 (ngx_cache_purge) updated by
- ngx_cache_purge
- 13:44 Ticket #417 (ngx_cache_purge) created by
- would be nice to include in core
- 13:42 Ticket #416 (proxy_cache_use_stale run updating in new thread and serve stale data ...) created by
- it would be extremely cool if proxy_cache_use_stale had a way to serve …
- 03:22 Ticket #412 (misallocation with ngx_crypt with apr1) closed by
- fixed: Fix committed, thanks.
- 03:20 Ticket #412 (misallocation with ngx_crypt with apr1) updated by
- In 2d947c2e3ea1b3144239f028c8e2af895d95fff4/nginx: […]
- 02:57 Ticket #413 (Extra roundtrip during SSL handshake with long certificate chains) updated by
- Thanks, looks good.
09/20/13:
- 17:49 Ticket #413 (Extra roundtrip during SSL handshake with long certificate chains) updated by
- Hi, for performance comparison - see the attached images. This is a …
- 16:10 Ticket #411 (misallocation with ngx_mail_smtp_module at STARTTLS) updated by
- I wondered about extra CRLF. But after some delibration I choose not …
- 16:06 Ticket #412 (misallocation with ngx_crypt with apr1) updated by
- I've submitted patch with requested chantges as per documentation …
- 14:57 Changeset in nginx [5386:2d947c2e3ea1] by
- Core: fix misallocation at ngx_crypt_apr1 (ticket #412). Found by …
- 13:18 Ticket #413 (Extra roundtrip during SSL handshake with long certificate chains) updated by
-
Status, Summary changed
Thanks for testing, ticket's title adjusted. If you have any numbers … - 12:41 Ticket #415 (auto/unix syntax errors with /bin/sh lines) closed by
- invalid: The auto/unix script is not intended to be run directly, outside of …
- 11:58 Ticket #415 (auto/unix syntax errors with /bin/sh lines) created by
- runnning auto/unix shows syntax errors with /bin/sh lines. This …
- 07:33 Ticket #413 (Extra roundtrip during SSL handshake with long certificate chains) updated by
- Hi, thank you for the prompt response! You are right, the bug does …
09/19/13:
- 20:04 Ticket #413 (Extra roundtrip during SSL handshake with long certificate chains) updated by
- Thank you for report. I don't see how you were able to trigger this …
- 15:41 Ticket #414 (Ошибка 500 при использовании seek для файлов с mp4s stream) closed by
- invalid: Судя по debug log'у, файл содержит дорожки, которые короче, чем …
- 14:35 Ticket #414 (Ошибка 500 при использовании seek для файлов с mp4s stream) created by
- Для файлов содержащих mp4s strems при попытке выполнить seek, nginx …
- 14:31 Changeset in nginx_org [985:e4704604ed29] by
- Proxy: documented the "proxy_ssl_protocols" directive.
- 14:30 Changeset in nginx [5385:7c1f4977d8a0] by
- Proxy: added the "proxy_ssl_protocols" directive.
- 14:11 Changeset in nginx_org [984:4e13823acdc0] by
- Donor added.
- 13:56 Ticket #413 (Extra roundtrip during SSL handshake with long certificate chains) created by
- Hi, during some performance testing I noticed that there is an extra …
- 11:57 Ticket #412 (misallocation with ngx_crypt with apr1) updated by
-
Status changed
Good catch, but I don't like the patch provided. Something like … - 11:57 Ticket #411 (misallocation with ngx_mail_smtp_module at STARTTLS) updated by
-
Status changed
It looks like the proper fix would be to just remove extra CRLF. Care … - 11:30 Ticket #410 (Valgrind falsepositive with ngx_string length 0) closed by
- wontfix: I don't think we should workaround bugs of old Valgrind versions.
- 10:53 Changeset in nginx-tests [338:8f0010dc4b09] by
- Tests: fixed startup order. FCGI daemon start postponed until after …
- 08:22 Changeset in nginx-tests [337:43d40a678a64] by
- Tests: added rewrite test for response without reason phrase.
09/18/13:
- 23:51 Changeset in nginx [5384:cfbf1d1cc233] by
- SSL: fixed possible memory and file descriptor leak on HUP signal. …
- 20:09 Ticket #410 (Valgrind falsepositive with ngx_string length 0) updated by
- I looked this more and this is valgrind 3.6.1 bug. The valgrind …
- 19:59 Changeset in nginx [5383:1adfe7a260eb] by
- MIME: added application/json MIME type. Signed-off-by: Piotr Sikora …
- 19:00 Ticket #412 (misallocation with ngx_crypt with apr1) created by
- I modified http://mdounin.ru/hg/nginx-tests to use valgrind. Found …
- 18:56 Ticket #411 (misallocation with ngx_mail_smtp_module at STARTTLS) created by
- I modified http://mdounin.ru/hg/nginx-tests to use valgrind. Test …
- 18:51 Ticket #410 (Valgrind falsepositive with ngx_string length 0) created by
- I modified http://mdounin.ru/hg/nginx-tests to use valgrind. …
- 17:38 Changeset in nginx-tests [336:b6c7db85bad0] by
- Tests: fastcgi_buffering tests.
- 14:53 Changeset in nginx [5382:e8d24b6d7f73] by
- Fixed response line formatting with empty reason phrase. As per RFC …
- 14:53 Changeset in nginx [5381:3adbd23bf79e] by
- Version bump.
09/17/13:
- 13:57 Milestone 1.5.5 completed
- Status: released 1.5.5 changelog …
- 13:40 Changeset in nginx_org [983:866fe164f957] by
- nginx-1.5.5
- 13:31 Changeset in nginx [5380:15d823bf6d3e] by
- release-1.5.5 tag
- 13:31 Changeset in nginx [5379:60e0409b9ec7]release-1.5.5 by
- nginx-1.5.5-RELEASE
- 01:52 Changeset in nginx-tests [335:433be52171d5] by
- Tests: more location matching tests.
09/16/13:
- 21:24 Changeset in nginx [5378:a73678f5f96f] by
- SSL: guard use of SSL_OP_MSIE_SSLV2_RSA_PADDING. This option had no …
- 19:55 Changeset in nginx-tests [334:c0bd624db067] by
- Tests: disable error_log.t on win32 as it uses shared memory.
- 19:53 Changeset in nginx-tests [333:e7647a966212] by
- Tests: use {PLAIN} passwords on win32 to unbreak auth_request.t.
- 19:44 Changeset in nginx-tests [332:31e2acce8fa4] by
- Tests: use 127.0.0.1 instead of localhost.
- 19:41 Changeset in nginx-tests [331:241acee85fd1] by
- Tests: skip FCGI use on win32.
- 14:49 Changeset in nginx [5377:cec155f07c84] by
- Improved check for duplicate path names in ngx_add_path(). The same …
- 14:49 Changeset in nginx [5376:dd9cb4edf499] by
- Removed surplus initializations from ngx_conf_set_path_slot(). An …
- 14:49 Changeset in nginx [5375:7d8770196436] by
- Use ngx_pcalloc() in ngx_conf_merge_path_value(). It initializes the …
- 14:40 Ticket #320 (nginx should reliably check client connection close with pending data) updated by
- In ef3d094bb6d351d790488e3ce222ea193903fbf2/nginx: […]
- 14:40 Ticket #320 (nginx should reliably check client connection close with pending data) updated by
- In 46bdbca10dfc92b0123e9f0aa657ab367e56e33c/nginx: […]
- 14:40 Ticket #320 (nginx should reliably check client connection close with pending data) updated by
- In 36b58ddb566d87d0a8b7dd81d633d5e4b0f54bca/nginx: […]
- 14:33 Changeset in nginx [5374:ef3d094bb6d3] by
- Use EPOLLRDHUP in ngx_http_test_reading() (ticket #320). This allows …
- 14:33 Changeset in nginx [5373:46bdbca10dfc] by
- Upstream: use EPOLLRDHUP to check broken connections (ticket #320). …
- 07:17 Changeset in nginx_org [982:95a355aa7dfe] by
- Donor added.
09/14/13:
- 21:08 Ticket #409 (Move syslog support for the ngx_http_log_module into NGINX open source) created by
- Please? This is a very basic feature, and it's very frustrating that …
- 14:52 Ticket #354 (lsapi upstream module) closed by
- wontfix: The LSAPI doesn't seems to be a specified protocol, but rather a code …
- 14:15 Ticket #372 (gzip_static: support for .svgz files) closed by
- wontfix: Support for complicated mappings looks like an overkill for me. Just …
09/13/13:
- 23:48 Changeset in nginx-tests [330:617f72beba8d] by
- Tests: location auto_redirect edge case test.
- 23:44 Changeset in nginx-tests [329:98c6af2a5138] by
- Tests: location on caseless systems (ticket #90).
- 20:14 Ticket #408 (capture in if - escaping depends on location bug) updated by
- […]
- 20:12 Ticket #408 (capture in if - escaping depends on location bug) created by
- I am capturing some data in if, and then redirecting on what was …
09/12/13:
- 17:21 Ticket #316 (X-Accel-Redirect should accept escaped URI) updated by
- This is very important for me. Since currently x-accel breaks when …
- 13:01 Ticket #403 (SPDY: image requests to same host but different domain very slow) closed by
- invalid: Ok, closing.
- 12:15 Ticket #403 (SPDY: image requests to same host but different domain very slow) updated by
- The Mozilla bug has been fixed: …
09/11/13:
- 10:43 Changeset in nginx_org [981:fc35441b4856] by
- Fixed grammar.
09/10/13:
- 15:30 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- http://mailman.nginx.org/pipermail/nginx-devel/2013-September/004204.ht …
- 14:09 Ticket #355 (Proxy protocol support) updated by
- +1 We're losing the client's ip if we put haproxy in front of nginx …
09/09/13:
- 09:18 Changeset in nginx_org [980:532c10d1cb9f] by
- Donors added.
09/06/13:
- 12:06 Changeset in nginx_org [979:188e5d7b724f] by
- Donors added.
09/05/13:
- 23:20 Ticket #407 (Cache X-Accel-Redirect responses (from fastcgi)) created by
- I've got a FastCGI (PHP-FPM) backend-server which will do some …
- 17:38 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- Replying to Edward Ackroyd <edward.ackroyd@gmail.com>: > …
- 15:32 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- For "Writing", in what time frame does nginx count the requests? What …
- 13:53 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- Replying to Edward Ackroyd <edward.ackroyd@gmail.com>: > …
- 11:27 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- The patch does not fix the issue. Here is a dump of nginx_status and …
09/04/13:
- 19:36 Ticket #65 (CFLAGS and SunPRO linkage) closed by
- fixed: Fixed.
- 17:40 Ticket #65 (CFLAGS and SunPRO linkage) updated by
- In 945aa9c7f2829e71de03611dead6411d2b574bf6/nginx: […]
- 11:54 Ticket #406 (Auth request module fails certain requests (http status 415)) closed by
- invalid: It's not auth request which fails with 415, it's your auth script …
- 11:35 Ticket #406 (Auth request module fails certain requests (http status 415)) created by
- I'm trying to use the newly included sub request module for using …
09/03/13:
- 22:37 Ticket #405 (Support for resumeable uploads) created by
- It seems Nginx has a big feature missing, the ability to support …
- 12:23 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- Thanks Valentin. I have a server running the patched version, initial …
- 07:22 Changeset in nginx_org [978:5ebc52bb2633] by
- Donor added.
09/01/13:
- 23:57 Changeset in nginx_org [977:114b2933b2be] by
- Non-breaking space.
- 22:44 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- Oops, sorry, it's wrong patch indeed. Accidentally I've built nginx …
- 20:46 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- The patch does not compile: […] changed code block after patch: …
- 18:14 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- It seems I found one case that can lead to such leaks. Could you test …
- 16:33 Ticket #346 (Writing connection leak while SPDY enabled) updated by
- I can also reproduce this in 1.4.2: "Active connections" and "Writing" …
08/29/13:
- 18:47 Changeset in nginx-tests [328:290d539efcb4] by
- Tests: referer TODO adjusted.
- 15:02 Changeset in nginx-tests [327:dacd55fa2cde] by
- Tests: added edge case tests for long hostname in referer.
- 08:39 Ticket #403 (SPDY: image requests to same host but different domain very slow) updated by
- Have you been able to reproduce the problem?
08/28/13:
- 16:14 Ticket #13 (Proxy SSL Verify) updated by
- See also the following threads in the nginx-devel@ mailing list: …
08/27/13:
- 17:12 Changeset in nginx-tests [326:a2c15637c9d5] by
- Tests: empty gif tests.
- 14:10 Milestone 1.5.4 completed
- Status: released 1.5.4 changelog …
- 14:00 Changeset in nginx_org [976:56d316529451] by
- nginx-1.5.4
- 10:39 Ticket #404 (while loging errors, nginx does not interpolate ${host}) closed by
- invalid: The error_log directive doesn't support variables, and it's highly …
08/26/13:
- 22:01 Ticket #404 (while loging errors, nginx does not interpolate ${host}) updated by
- https://bugzilla.redhat.com/show_bug.cgi?id=990837
- 22:01 Ticket #404 (while loging errors, nginx does not interpolate ${host}) created by
- == Description == If you use: # /etc/nginx/include.d/log_debug.conf …
- 15:08 Ticket #403 (SPDY: image requests to same host but different domain very slow) updated by
- Yes, of course. 1) nginx instance that serves a1.betabase.de and …
- 15:03 Ticket #403 (SPDY: image requests to same host but different domain very slow) updated by
- Looks like a problem with your nginx configuration. Could you provide it?
- 13:27 Ticket #403 (SPDY: image requests to same host but different domain very slow) created by
- A few weeks ago I filed the following bug report at Mozilla: …
- 11:51 Changeset in nginx-tests [325:ba212f244288] by
- Tests: more referer tests.
- 11:49 Ticket #225 (Please support nested if statements with SSI) updated by
-
Sensitive changed
While workarounds are certainly available, I think it would be nice to … - 11:07 Changeset in nginx-tests [324:61071d7d28c9] by
- Tests: referer TODO adjusted.
- 02:39 Ticket #225 (Please support nested if statements with SSI) updated by
- This likely does not need to be fixed. The work-around for nested if …
Note:
See TracTimeline
for information about the timeline view.