Timeline
02/09/15:
- 22:51 Changeset in nginx [5972:860a1c37f3b2] by
- Core: fixed build on Tru64 UNIX. There was a typo in NGX_EACCES. …
- 17:14 Ticket #714 (Writing connection leak while SPDY enabled) updated by
- Hello, I upgraded to version 1.7.9 and problem does not occur for …
- 15:23 Ticket #417 (ngx_cache_purge) updated by
- I do not know if the name of the module file to be included is …
- 13:09 Ticket #716 (400 Bad Request Client sent invalid request while reading client ...) closed by
- invalid: The request in question is invalid, as it contains invalid escape …
- 11:25 Ticket #716 (400 Bad Request Client sent invalid request while reading client ...) created by
- This is error.log from nginx. I setup nginx with rtmp server. And …
02/06/15:
- 13:00 Ticket #714 (Writing connection leak while SPDY enabled) updated by
- I will try next week and will write the results.
- 12:50 Ticket #714 (Writing connection leak while SPDY enabled) updated by
- It might be a good idea to try nginx 1.7.9 instead of 1.6.2.
- 11:24 Ticket #714 (Writing connection leak while SPDY enabled) updated by
- [root@nginx1 ~]# ps x | grep nginx 8836 ? Ss 0:00 nginx: …
- 08:46 Ticket #714 (Writing connection leak while SPDY enabled) updated by
- Yes, the situation is same. I compile nginx without 3rd-party …
02/05/15:
- 20:00 Ticket #97 (try_files and alias problems) updated by
- This still doesn't seem to address directories that are in the alias …
- 19:28 Ticket #97 (try_files and alias problems) updated by
- I also ran into this bug, but for me it only occurs when $is_args$args …
- 18:49 Ticket #715 (Elliptic curve detected wrongly) updated by
- Ah, I'm sorry about that, indeed the error is from the time when I …
- 18:40 Ticket #715 (Elliptic curve detected wrongly) updated by
- As previously said, the message is generated when you write an unknown …
- 18:32 Ticket #715 (Elliptic curve detected wrongly) updated by
-
I am using
secp384r1
as thessl_ecdh_curve
, nginx starts … - 18:29 Ticket #715 (Elliptic curve detected wrongly) closed by
- invalid: The error message provided is generated if you use an unknown curve …
- 17:50 Ticket #715 (Elliptic curve detected wrongly) created by
- Trying to enable client certificate authentication. All the …
- 15:12 Ticket #714 (Writing connection leak while SPDY enabled) updated by
- Could you reproduce it without 3rd-party modules?
- 14:45 Ticket #714 (Writing connection leak while SPDY enabled) created by
- I'm trying to use SPDY module, but when I enable this into my config …
02/04/15:
- 13:51 Ticket #712 (limit_conn and internal redirects) updated by
-
In the configuration provided the
limit_conn addr 10;
rule will be … - 13:22 Changeset in nginx [6080:4296627f385a]stable-1.6 by
- Core: fixed a race resulting in extra sem_post()'s. The mtx->wait …
- 13:22 Changeset in nginx [5970:74edc0ccf27a] by
- Core: fixed a race resulting in extra sem_post()'s. The mtx->wait …
- 10:23 Ticket #713 (access_log path with variable computes path incorrectly) closed by
- invalid: This is because access_log with variables respects the root path, …
- 09:22 Ticket #713 (access_log path with variable computes path incorrectly) created by
-
In
/etc/nginx/conf.d/example.com.conf
: […] […] File is …
02/03/15:
- 23:38 Ticket #712 (limit_conn and internal redirects) created by
- It seems that limit_conn is only checked at the beginning of the …
- 13:39 Ticket #711 (Support X-Forwarded-Proto or similar when operating as a backend ...) created by
- Currently there is no way to override $scheme and $https variables …
- 12:35 Ticket #710 (stable segfault on default Unbuntu 12.04 LTS binaries.) updated by
- Please try to reproduce without third-party modules, e.g. using …
- 12:30 Ticket #710 (stable segfault on default Unbuntu 12.04 LTS binaries.) created by
- C:\Users\Serj>curl --head -L https://www.gpz.be curl: (56) SSL read: …
- 12:30 Ticket #709 (Couldn't displays the google picture completely with the latest ...) closed by
- invalid: You're welcome. ;)
- 02:17 Ticket #709 (Couldn't displays the google picture completely with the latest ...) updated by
- Replying to Valentin V. Bartenev: > Well, it doesn't look …
02/02/15:
- 22:11 Ticket #709 (Couldn't displays the google picture completely with the latest ...) updated by
- Well, it doesn't look like an nginx problem. You should try to …
- 19:27 Ticket #709 (Couldn't displays the google picture completely with the latest ...) updated by
- Replying to Valentin V. Bartenev: > Could you provide the …
- 18:28 Changeset in nginx [5969:3281de8142f5] by
- Core: reverted prefix-based temp files (a9138c35120d). The …
- 17:33 Ticket #709 (Couldn't displays the google picture completely with the latest ...) updated by
- Could you provide the full configuration (including complete server …
- 17:27 Ticket #709 (Couldn't displays the google picture completely with the latest ...) updated by
- Replying to Valentin V. Bartenev: > Do you use SPDY? Yes, …
- 16:50 Changeset in nginx-tests [522:5b5ef52d6fd2] by
- Tests: removed use_temp_path TODOs. The tests are skipped on the …
- 16:38 Changeset in nginx [5968:99639bfdfa2a] by
- Cache: added temp_path to file cache. If use_temp_path is set to off, …
- 16:38 Changeset in nginx [5967:863d9de1e62b] by
- Core: supported directory skipping in ngx_walk_tree(). If …
- 13:58 Ticket #709 (Couldn't displays the google picture completely with the latest ...) updated by
- Do you use SPDY?
- 13:07 Changeset in nginx-tests [521:6b9bfe18fdc8] by
- Tests: proxy_cache_path with use_temp_path parameter.
- 05:51 Ticket #709 (Couldn't displays the google picture completely with the latest ...) created by
- Hello, engineer: There is a problem confused me a long time about …
01/30/15:
- 12:38 Ticket #708 (Documentation improvement: SSL chain verification with SNI support) created by
- The …
01/29/15:
- 20:19 Ticket #705 (Native JavaScript support) updated by
- Very bad idea IMO. Nginx already has a mature scripting language with …
01/28/15:
- 18:33 Changeset in nginx [5966:bcdfc39bf44d] by
- Fixed AIO handling in the output chain. The ctx->aio flag must be …
- 17:45 Ticket #707 (Failure to process cookies containing a dot) closed by
- wontfix: Variable names recognized by nginx are limited to alphanumeric …
- 16:55 Ticket #706 (WebDav: issue about filename encoding) closed by
- worksforme: As far as I can tell, there is no problem in nginx itself - it escapes …
- 16:33 Ticket #707 (Failure to process cookies containing a dot) created by
- I have an application which sets a cookie of the form …
- 16:32 Ticket #706 (WebDav: issue about filename encoding) created by
- If I use any special characters in file/folder name (or just a space) …
01/27/15:
- 15:36 Ticket #97 (try_files and alias problems) updated by
- I have a work around for the issue until the bug is fixed. It is …
- 12:38 Changeset in nginx [5965:78271500b8de] by
- A bounds check of %N format on Windows. Thanks to Joe Bialek, Adam …
- 08:32 Ticket #705 (Native JavaScript support) created by
- I just read an …
01/26/15:
- 19:38 Ticket #704 (Nginx configure script can't detect groups reliably) created by
- As part of auto/unix, the configure scripts attempt to detect a …
01/23/15:
- 12:23 Changeset in nginx [5979:b2920b517490] by
- Mail: fixed the duplicate listen address detection.
- 12:23 Changeset in nginx [5978:eb4ba3800c31] by
- Mail: fixed a comment.
01/22/15:
- 22:12 Ticket #703 (Official nginx Docker images use OpenSSL 1.0.1e) closed by
- invalid: It is not a correct way to check if openssl vulnerabilities are fixed …
- 21:27 Ticket #702 (too many open files (/dev/urandom)) updated by
- Thanks for the tip. I'll try nginx-auth-ldap instead. Just in case …
- 21:18 Ticket #702 (too many open files (/dev/urandom)) closed by
- invalid: Please also note that the module uses the PAM library which doesn't …
- 20:00 Ticket #702 (too many open files (/dev/urandom)) updated by
- I don't have the problem when I don't have any 3rd-party modules. I …
- 19:30 Ticket #703 (Official nginx Docker images use OpenSSL 1.0.1e) created by
- Steps to reproduce: $ docker pull nginx:latest $ docker run -d …
- 15:28 Ticket #702 (too many open files (/dev/urandom)) updated by
- Could you reproduce the problem without 3rd-party modules?
- 15:22 Ticket #702 (too many open files (/dev/urandom)) created by
- I have this problem where nginx stops accepting requests and I see …
- 13:23 Changeset in nginx [5977:26c127bab5ef] by
- Upstream: detect port absence in fastcgi_pass with IP literal. If …
01/20/15:
- 23:57 Changeset in nginx-tests [523:64eabe6aa1f2] by
- Tests: try_files tests for files and directory matching.
- 23:26 Changeset in nginx [5971:ebdb2023e84a] by
- Fixed try_files directory test to match only a directory. …
- 16:41 Ticket #701 (nginx -s stop and -s quit hang on Yosemite) created by
- After upgrading to Yosemite and upgrading nginx to v1.6.2, the "nginx …
- 12:56 Ticket #700 (word "pid" could not write at all) closed by
- invalid: I suppose your problem is described here: …
- 08:44 Ticket #700 (word "pid" could not write at all) created by
- Hi, first sorry for my elementary english. I'd like to report a …
01/19/15:
- 21:50 Ticket #289 (Add support for HTTP Strict Transport Security (HSTS / RFC 6797)) updated by
- While reading up on Nginx and the "add_header …
- 15:55 Ticket #699 (nginx logs to /var/log/nginx/error.log if syslog server is not available) closed by
- invalid: first, there is no 'off' parameter in error_log. It just writes to …
- 15:42 Ticket #699 (nginx logs to /var/log/nginx/error.log if syslog server is not available) created by
- I just switched to nginx's syslog and it works as desired. However …
01/18/15:
- 11:06 Ticket #698 (Add an option to proxy_cache_path that allows to set group permissions) updated by
- I have already patch for that for nginx 1.7.9. It introduces new …
01/16/15:
- 12:02 Ticket #698 (Add an option to proxy_cache_path that allows to set group permissions) created by
- We use rsync over ssh here to sync the cache contents of several …
- 11:52 Ticket #697 (Couldn't produce multiple error log items from FastCGI) created by
- When issuing multiple error_log() PHP commands nginx logs ONE log item …
01/15/15:
- 15:23 Changeset in nginx-tests [520:4bcf8bc2bafe] by
- Tests: $upstream_header_time and $upstream_response_time variables.
01/14/15:
- 20:16 Ticket #696 (host not found prevents nginx from starting) closed by
- wontfix: If you want nginx to start regardless of DNS availability, consider …
- 20:06 Ticket #696 (host not found prevents nginx from starting) created by
- Suppose I have “listen somehost.mydomain:80”, and the name server for …
- 06:03 Changeset in nginx [5964:0a198a517eaf] by
- Upstream: $upstream_header_time variable. Keeps time spent on …
01/13/15:
- 21:13 Changeset in nginx-tests [519:089c4174e269] by
- Tests: reduced race in debug_connection tests.
- 17:13 Changeset in nginx [5963:e0920ea61632] by
- Year 2015.
- 16:51 Changeset in nginx [5962:727177743c3c] by
- Core: added disk_full_time checks to error log.
- 15:58 Changeset in nginx [5961:7554c83287dc] by
- Fixed sendfile() trailers on OS X (8e903522c17a, 1.7.8). The …
01/12/15:
- 19:07 Ticket #694 (Cannot disable proxy_next_upstream when using hash upstream directive) closed by
- invalid: There is no direct equivalent for Cache::Memcached no_rehash flag in …
- 17:16 Ticket #694 (Cannot disable proxy_next_upstream when using hash upstream directive) reopened by
- So is there anyway to set the no_rehash flag on the hash directive?
- 16:36 Ticket #694 (Cannot disable proxy_next_upstream when using hash upstream directive) updated by
- So is there anyway to set the no_rehash flag on the hash directive?
- 16:34 Ticket #695 (Client connection hangs when responding to error_page 497 with 444) closed by
- duplicate: Thanks, this looks like another manifestation of the problem described …
- 16:32 Ticket #274 (error_page 400 =444 /; утекают сокеты) updated by
- See also #695.
- 16:17 Ticket #694 (Cannot disable proxy_next_upstream when using hash upstream directive) closed by
- invalid: The "proxy_next_upstream" directive defines what to do if an error …
- 15:42 Ticket #694 (Cannot disable proxy_next_upstream when using hash upstream directive) updated by
- So maybe this is intended behavior for proxy_next_upstream, that is, …
- 13:17 Ticket #693 (Randomly [error] 48003#0: *1110895 connect() failed (111: Connection ...) updated by
- Please provide more information. It's hard to make any conclusion …
- 12:50 Ticket #694 (Cannot disable proxy_next_upstream when using hash upstream directive) updated by
- http://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_next_ups …
- 11:44 Changeset in nginx-tests [518:9edb609a2642] by
- Tests: autoindex module tests with autoindex_format.
Note:
See TracTimeline
for information about the timeline view.