Timeline
10/27/15:
- 22:58 Ticket #821 (Header "Expires" and "Cache-Control" is not sent for random requests ...) updated by
- I have captured responses without Expires header. Let me know if you …
- 21:05 Ticket #821 (Header "Expires" and "Cache-Control" is not sent for random requests ...) updated by
- I have a new hint - I am unable to find missing Expires header when …
- 20:16 Changeset in nginx [6285:1f26bf65b1bc] by
- HTTP/2: changed behavior of the "http2_max_field_size" directive. Now …
- 20:16 Changeset in nginx [6284:66ee1c5cb6aa] by
- HTTP/2: fixed spelling.
- 20:16 Changeset in nginx [6283:86b5f146b121] by
- Version bump.
- 17:14 Ticket #821 (Header "Expires" and "Cache-Control" is not sent for random requests ...) updated by
-
Description changed
Please provide [[http://nginx.org/en/docs/debugging_log.html|debug … - 16:26 Ticket #821 (Header "Expires" and "Cache-Control" is not sent for random requests ...) created by
- There is a problem with missing "Expires" and "Cache-Control" headers …
- 14:14 Milestone 1.9.6 completed
- Status: scheduled Trunk: mainline * Bug fixes release
- 13:47 Changeset in nginx [6282:f1424eef1966] by
- release-1.9.6 tag
- 13:47 Changeset in nginx [6281:b78018cfaa2f]release-1.9.6 by
- nginx-1.9.6-RELEASE
10/26/15:
- 17:05 Ticket #818 (error_log host information is confusing) updated by
- Please read …
- 16:54 Ticket #818 (error_log host information is confusing) updated by
- I understand this is not a bug :) But I don't understand the logic …
- 16:16 Ticket #818 (error_log host information is confusing) updated by
- In your configuration as provided, the listen socket on port 443 is …
- 16:06 Changeset in nginx [6286:a6a2016b8e31] by
- Syslog: added "nohostname" option. The option disables sending …
- 15:55 Ticket #818 (error_log host information is confusing) updated by
- Full unaltered configuration is problematic for me as it is our main …
- 14:46 Changeset in nginx [6280:16905ecbb49e] by
- HTTP/2: simplified checking the END_STREAM flag. No functional changes.
- 14:46 Changeset in nginx [6279:c72eaf694d99] by
- HTTP/2: improved the ngx_http_v2_integer_octets(v) macro. Previously, …
- 14:46 Changeset in nginx [6278:b78df0822168] by
- HTTP/2: fixed the NGX_HTTP_V2_MAX_FIELD macro.
- 14:43 Changeset in nginx [6276:0efc16d55adb] by
- HTTP/2: introduced NGX_HTTP_V2_ENCODE_* macros. No functional changes.
- 14:43 Changeset in nginx [6275:39fa0b7e3a67] by
- HTTP/2: simplified producing of the Last-Modified header.
- 14:43 Changeset in nginx [6274:b2de4a56b860] by
- HTTP/2: fixed header block size calculation.
- 12:54 Ticket #820 (Add neverbleed support) closed by
- wontfix: As of nginx 1.7.9+, loading of secret keys via arbitrary OpenSSL …
10/25/15:
- 02:04 Ticket #820 (Add neverbleed support) created by
- Hi, [Neverbleed](https://github.com/h2o/neverbleed) is a privilege …
10/24/15:
- 01:21 Changeset in nginx [6270:e769cc88f996] by
- Core: read/write locks are also required by the Stream module. …
- 01:21 Changeset in nginx [6269:7ec809b579d7] by
- Configure: style fixes for autoconf.err. Signed-off-by: Piotr Sikora …
- 01:21 Changeset in nginx [6619:67938e63758d] by
- Configure: remove auto/lib/test, unused since nginx-0.1.2. …
10/23/15:
10/22/15:
- 22:43 Ticket #819 (http auth digest new fork) updated by
- I found that my OS is responsible for downloading the 3rd party …
- 22:26 Ticket #819 (http auth digest new fork) created by
- nginx 1.8 and 1.9 download http-auth-digest from …
- 15:24 Ticket #800 (Variable $server_protocol is empty on HTTP2) updated by
- Replying to vbart: > and since the variable is mostly used …
10/21/15:
- 15:28 Ticket #818 (error_log host information is confusing) updated by
- This may happen if a connection is accepted on a listening socket …
- 15:05 Ticket #818 (error_log host information is confusing) updated by
- Replying to mdounin: > The host is a host from a request …
- 13:45 Ticket #818 (error_log host information is confusing) closed by
- invalid: The host is a host from a request (see http://nginx.org/r/$host), and …
- 13:17 Ticket #818 (error_log host information is confusing) created by
- Hi, I think it's a bug because log_format is not possible with …
10/20/15:
- 18:28 Changeset in nginx [6268:ee16fb0db905] by
- HTTP/2: improved error handling while parsing integers. The case when …
- 18:26 Changeset in nginx [6267:adaac65899c8] by
- HTTP/2: improved HPACK integer parsing code readability. No …
- 16:39 Ticket #608 (Please specify prototyping behavior for nginx.xs) closed by
- fixed: Fixed by c6cc0b79a43d.
- 16:38 Ticket #235 (segfault with SNI and ssl_session_cache assymetrical configuration) closed by
- fixed: Fix committed and will be available in upcoming nginx 1.9.6.
- 16:32 Ticket #235 (segfault with SNI and ssl_session_cache assymetrical configuration) updated by
- In [changeset:"97f102a13f3373ed27d1d0d8f78ac9af8d88a0ff/nginx" …
- 15:16 Changeset in nginx [6266:dceb078b1156] by
- Win32: timer_resolution now ignored with select. As setitimer() isn't …
- 02:14 Ticket #817 (Wrong or undocumented srever resolving) closed by
- invalid: When you have a listening socket configured for a particular IP …
- 00:52 Ticket #817 (Wrong or undocumented srever resolving) updated by
- The same problem exists for very old nginx version: nginx/0.7.67 TLS …
- 00:47 Ticket #817 (Wrong or undocumented srever resolving) created by
- I you mix listen <ip_name>:80 and listen 80 Than servers with listen …
10/19/15:
- 20:04 Changeset in nginx [6264:7ac57369036c] by
- Style: unneeded casts of cf->args->elts removed.
- 18:28 Changeset in nginx [6263:48c13a0824c5] by
- Fixed variables prefix comparison. Variable names are not …
- 18:28 Changeset in nginx [6262:1063097b22b6] by
- Fixed handling of empty root. Previously, a configuration with "root" …
- 18:22 Changeset in nginx [6343:60ae75969588]stable-1.8 by
- SSL: preserve default server context in connection (ticket #235). …
- 18:22 Changeset in nginx [6261:97f102a13f33] by
- SSL: preserve default server context in connection (ticket #235). …
- 14:59 Ticket #813 (Double encoding of utf-8 strings inside x509 certificates) updated by
- The phpinfo() provided shows representation that OpenSSL produces, …
- 13:32 Ticket #813 (Double encoding of utf-8 strings inside x509 certificates) updated by
- This isn't only in access logs, it's also in parameters passed into …
- 13:16 Changeset in nginx [6260:0e37389c0bd5] by
- HTTP/2: fixed parsing of literal header fields without indexing.
10/17/15:
- 12:41 Changeset in nginx [6265:954b67727af3] by
- Win32: fixed build with MinGW and MinGW-w64 gcc. This change fixes …
10/15/15:
- 01:10 Ticket #810 (OCSP Stapling fails if first relevant server block lacks ssl_stapling ...) closed by
- wontfix: I think I finally tracked this (there were some complains previously …
10/14/15:
- 17:00 Ticket #813 (Double encoding of utf-8 strings inside x509 certificates) closed by
-
invalid: All control characters, non-ASCII characters,
"
and\
in access … - 14:34 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- A feature request has been created under #816
- 14:33 Ticket #816 (Allow h2c and HTTP/1.1 support on the same listening socket) created by
- nginx 1.9.5 introduces support for HTTP/2. If a user configures a h2c …
- 14:31 Ticket #815 (Wrong timing with regards to upstream communications) closed by
- invalid: The description suggests you are having problems with a 3rd party …
- 13:57 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- > I see no really good reasons for h2c in this area, and it seems …
- 13:01 Ticket #815 (Wrong timing with regards to upstream communications) created by
- I've been trying to figure out an issue regarding communications …
- 01:03 Ticket #814 (Support for parallel ECDSA / RSA certificates) created by
- I'd like to be able to deploy an ECDSA certificate alongside an RSA …
10/13/15:
- 14:40 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- Yes, creating a feature request is the way to go. At the moment nginx …
- 09:51 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- > It is useful for configurations where TLS termination is done …
10/12/15:
- 17:01 Ticket #811 (http2 auth not working) closed by
- worksforme: I've just tested in Chromium 45.0.2454.101 and Firefox 41.0.1. It …
- 16:39 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- If you have use cases where separation between HTTP/1.1 and HTTP/2.0 …
- 16:31 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) closed by
- NGINX supports HTTP/2 over plain TCP using prior knowledge. See RFC …
- 15:46 Ticket #813 (Double encoding of utf-8 strings inside x509 certificates) created by
- When an x509 certificate contains utf-8 data in their fields, the data …
- 15:15 Ticket #800 (Variable $server_protocol is empty on HTTP2) closed by
- fixed: According to RFC7230 …
- 14:38 Ticket #807 (ngx_http_rewrite_module duplicate Server header) updated by
- Hi! Thank you all, for the response. I do care about nginx, nginx …
10/10/15:
- 19:30 Ticket #812 (Fetch OCSP responses on startup, and store across restarts) created by
- Once TLS Feature …
- 13:16 Ticket #798 (Implement http_brotli_static module) updated by
- It appears that Google has made this issue rather moot by releasing a …
- 09:52 Ticket #811 (http2 auth not working) created by
- A simple auth-basic setup only works via cURL (related to #809) but …
- 04:43 Ticket #810 (OCSP Stapling fails if first relevant server block lacks ssl_stapling ...) created by
- Steps to reproduce: Set up an nginx configuration with two server …
10/09/15:
- 22:20 Ticket #809 (http2 cookies not readable under php) created by
- Very simple PHP script: […] Returns empty array under Google …
- 16:01 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) created by
- This issue probably relates to support of HTTP/2 over cleartext (h2c). …
10/08/15:
- 14:44 Ticket #807 (ngx_http_rewrite_module duplicate Server header) closed by
-
wontfix: The
add_header
directive can be used to add headers, but it doesn't … - 14:27 Ticket #806 (ngx_http_ssl_module: Turn off 'ssl_session_tickets' by default) closed by
- wontfix: Session ticket keys are changed on each nginx configuration reload. …
- 14:21 Ticket #807 (ngx_http_rewrite_module duplicate Server header) updated by
- You can't overwrite nginx 'Server' header without editing source. See: …
- 14:18 Ticket #714 (Writing connection leak while SPDY enabled) updated by
- Use HTTP2.
- 14:16 Ticket #705 (Native JavaScript support) updated by
- nginScript: https://www.nginx.com/resources/wiki/nginScript/
- 14:14 Ticket #807 (ngx_http_rewrite_module duplicate Server header) created by
- Config snippet: server { listen 192.168.0.2:80; add_header Server …
- 14:06 Ticket #806 (ngx_http_ssl_module: Turn off 'ssl_session_tickets' by default) created by
- As neither nginx nor openssl rotate the session ticket key, having …
- 13:07 Ticket #799 (return 501 if post data "_ action=_") closed by
- invalid: Thanks for confirming, closing this ticket.
- 08:47 Ticket #799 (return 501 if post data "_ action=_") updated by
- Replying to mdounin: > The only case when nginx returns …
10/07/15:
- 19:19 Changeset in nginx [6259:2f34ea503ac4] by
- SSL: handled long string truncation in ngx_ssl_error(). If no space …
10/06/15:
- 22:59 Ticket #760 (Support for HTTP/2) updated by
- Just a note, there is $115 just waiting to be collected over on …
- 08:46 Ticket #800 (Variable $server_protocol is empty on HTTP2) updated by
-
As far as I know protocol name is
HTTP/2
but protocol number is … - 05:57 Changeset in nginx [6258:4b4aee40c508] by
- Stream: delete proxy connection timer after SSL handshake. The timer …
10/05/15:
- 16:25 Ticket #805 (small new optional feature for unixes) closed by
- wontfix: Chrooting to the prefix looks like a wrong idea, in particular, …
- 15:59 Ticket #805 (small new optional feature for unixes) created by
- Hi all, I created a small new optional feature to chroot nginx after …
- 13:52 Ticket #794 (HTTP/2 with ssl_ciphers and/or ssl_prefer_server_ciphers result into ...) updated by
- In my tests Chrome announces the following ciphers in the ClientHello …
- 12:51 Ticket #804 (Error while using Several sub_filter directives) closed by
-
invalid: Multiple
sub_filter
directives are supported in nginx 1.9.4+. The … - 07:46 Ticket #804 (Error while using Several sub_filter directives) created by
- If i try to replace more than one string, i get this error: […] …
10/04/15:
- 15:47 Ticket #794 (HTTP/2 with ssl_ciphers and/or ssl_prefer_server_ciphers result into ...) updated by
- Well, I don't think this is a missconfiguration: I use the following …
10/02/15:
- 15:41 Ticket #800 (Variable $server_protocol is empty on HTTP2) reopened by
- Although it's not actually clear from …
- 13:32 Ticket #803 (proxy_pass differs in behavior if used with variable substitution) updated by
-
Keywords, Component, Type, Description changed
Docs say (see http://nginx.org/r/proxy_pass): > A server name, its … - 13:14 Ticket #803 (proxy_pass differs in behavior if used with variable substitution) created by
- This may be desired, but it is not well documented, and caused me many …
- 03:25 Changeset in nginx [6273:60f916da7294] by
- HTTP/2: fix handling of connection errors. Previously, nginx worker …
- 03:25 Changeset in nginx [6272:b6a665bf858a] by
- HTTP/2: fix indirect reprioritization. Previously, streams that were …
- 03:25 Changeset in nginx [6271:22ee99422329] by
- HTTP/2: reject self-dependent streams. Per RFC7540, a stream cannot …
09/29/15:
- 19:00 Ticket #802 ($server_protocol is empty with the HTTP/2.0 module) closed by
- duplicate: Duplicate, see ticket #800.
- 17:52 Ticket #802 ($server_protocol is empty with the HTTP/2.0 module) created by
- It seems when using the new HTTP/2.0 module nginx no longer sets the …
- 14:38 Ticket #801 (auth_request and PUT/POST problems) updated by
- You are totally right, I can see it now. Thank you for your effort.
- 12:29 Ticket #801 (auth_request and PUT/POST problems) closed by
- invalid: From the debug log it looks like a 3rd party module have read a …
- 10:52 Ticket #801 (auth_request and PUT/POST problems) updated by
- I added the debug log. What I think that is strange in it is that, at …
09/28/15:
- 19:40 Ticket #801 (auth_request and PUT/POST problems) updated by
- The configuration snippet you've provided works fine here, and we also …
- 17:08 Ticket #800 (Variable $server_protocol is empty on HTTP2) closed by
- fixed: Fixed by 9dfc4ba140f9 (will be released in 1.9.6).
- 14:55 Ticket #794 (HTTP/2 with ssl_ciphers and/or ssl_prefer_server_ciphers result into ...) closed by
- invalid: The HTTP/2 clients may have some restrictions regarding negotiated …
- 13:30 Ticket #793 (HTTP/2 defaults differ from spdy/http, change of behavior with default ...) updated by
- Regarding the error message, there is no way to return HTTP response …
- 13:29 Ticket #793 (HTTP/2 defaults differ from spdy/http, change of behavior with default ...) closed by
- invalid: The values of these directives cannot be matched to …
- 13:18 Ticket #792 (Chrome can't establish HTTP2 connection to nginx when URL contains ...) closed by
- fixed: It should be fixed in 081a073e5164. Please, try the 1.9.5 release.
- 12:40 Ticket #801 (auth_request and PUT/POST problems) created by
- I have the following configuration: […] For some reasons, the …
09/27/15:
- 23:32 Changeset in nginx [6277:b930e598a199] by
- HTTP/2: fixed splitting of response headers on CONTINUATION frames. …
Note:
See TracTimeline
for information about the timeline view.