Timeline



12/28/19:

16:22 Changeset in nginx-tests [1541:b9de5364dfc9] by Sergey Kandaurov <pluknet@…>
Tests: unbreak dav tests on Perl < 5.12.

12/27/19:

16:43 Changeset in nginx [7617:f1720934c45b] by Maxim Dounin <mdounin@…>
SSL: reworked posted next events again. Previous change 1ce3f01a4355
14:20 Changeset in nginx [7616:fd4d2155d3e6] by Maxim Dounin <mdounin@…>
Trailing space removed.
14:20 Changeset in nginx [7615:44534144dcd4] by Maxim Dounin <mdounin@…>
Version bump.
13:44 Changeset in nginx_org [2474:1c96b5617fdc] by Valentin Bartenev <vbart@…>
Added Unit 1.14.0 release news.
13:01 Ticket #1888 (Nginx cache has multiple formats, and many of them are invalid during ...) updated by Maxim Dounin
> Nginx / 1.16.0 does not have this bug Caching behaviour in 1.16.0 …
10:15 Changeset in nginx-tests [1540:5e2b8621aa5d] by Sergey Kandaurov <pluknet@…>
Tests: TODO js_promise.t on njs < 0.3.8.
08:59 Changeset in nginx-tests [1539:57a92c20f974] by Sergey Kandaurov <pluknet@…>
Tests: discarded request body in error_page redirect.
08:31 Ticket #1888 (Nginx cache has multiple formats, and many of them are invalid during ...) updated by yunoasgit@…
Nginx / 1.16.0 does not have this bug, Do you want to fix the bug in …

12/26/19:

15:55 Changeset in nginx-tests [1538:c49e5ca1d840] by Sergey Kandaurov <pluknet@…>
Tests: dav tests with unsupported request body.
14:11 Ticket #1907 (Nginx does not handle URL larger than 8K) updated by kvaps@…
This problem affects only http2 protocol: http2_max_header_size 1M; …
13:47 Ticket #1520 (HTTP/2 connection dropped when URL has large numbers of same parameter) updated by Maxim Dounin
See also #1907.
13:46 Ticket #1907 (Nginx does not handle URL larger than 8K) closed by Maxim Dounin
duplicate: You are using HTTP/2, and the request exceeds default …
13:41 Ticket #1907 (Nginx does not handle URL larger than 8K) updated by kvaps@…
verbose log enabled: […]
13:38 Ticket #1907 (Nginx does not handle URL larger than 8K) updated by kvaps@…
Discussion: https://t.me/nginx_ru/82745 (russian)
13:22 Ticket #1907 (Nginx does not handle URL larger than 8K) created by kvaps@…
Steps to reproduce: […] Logs are clean, these parameters does not …
12:35 Changeset in nginx-tests [1537:beb549bce15f] by Alexander Borisov <alexander.borisov@…>
Tests: added njs Promise tests.
09:16 Milestone unit-1.14 completed
New features and enhancements: * requests routing based on clients ip …

12/24/19:

16:41 Milestone nginx-1.17.7 completed
Status: scheduled Trunk: mainline * Bug fixes
15:06 Changeset in nginx_org [2473:c5f7a7843ecc] by Maxim Dounin <mdounin@…>
nginx-1.17.7
15:00 Changeset in nginx [7614:e99e9b0a8c51] by Maxim Dounin <mdounin@…>
release-1.17.7 tag
15:00 Changeset in nginx [7613:e56295fe0ea7]release-1.17.7 by Maxim Dounin <mdounin@…>
nginx-1.17.7-RELEASE
14:24 Changeset in nginx [7612:1ce3f01a4355] by Maxim Dounin <mdounin@…>
SSL: reworked posted next events. Introduced in 9d2ad2fb4423

12/23/19:

18:40 Ticket #1689 (Writing connections leak with http/2) updated by Maxim Dounin <mdounin@…>
In [changeset:"82c1339e2637065fe5849739cb6f5c1f53f2e2ed/nginx"
18:39 Ticket #1689 (Writing connections leak with http/2) closed by Maxim Dounin
fixed: Committed, 82c1339e2637. Thanks to everyone involved.
18:25 Changeset in nginx [7611:8e64e11aaca0] by Maxim Dounin <mdounin@…>
HTTP/2: introduced separate handler to retry stream close. When …
18:25 Changeset in nginx [7610:82c1339e2637] by Maxim Dounin <mdounin@…>
HTTP/2: fixed socket leak with queued frames (ticket #1689). If a …
17:39 Changeset in nginx [7609:f609c0ac2972] by Maxim Dounin <mdounin@…>
Dav: added checks for chunked to body presence conditions. These …
16:38 Changeset in nginx-tests [1536:0ce1c9516764] by Sergey Kandaurov <pluknet@…>
Tests: dav.t MKCOL test for trailing slash in Location (if any).
15:56 Changeset in nginx [7608:4718a646187a] by Sergey A. Osokin <osa@…>
Update manpage, sort command line options.
12:45 Changeset in nginx [7607:d0d6cf5031a3] by Ruslan Ermilov <ru@…>
Discard request body when redirecting to a URL via error_page. …

12/20/19:

12:38 Ticket #1905 (SSL ON; Problem) updated by Maxim Dounin
Please provide an example configuration which demonstrates the problem.
09:13 Ticket #1906 (core dumped with debug timer) updated by vl
Does it happen without 3rd party modules? This is expected, as …
08:59 Ticket #1906 (core dumped with debug timer) created by RekGRpth@…
in /src/event/ngx_event.h […] in …
06:52 Ticket #1905 (SSL ON; Problem) created by leventcengiz@…
Hello There, We found bug on nginx 1.16.1 version this bug create …

12/19/19:

13:29 Changeset in nginx_org [2493:407147d8020f] by Yaroslav Zhuravlev <yar@…>
Documented 413 error for PATCH and POST methods in the API.
10:00 Changeset in nginx_org [2472:4823370295e6] by Sergey Kandaurov <pluknet@…>
Removed invalid statement about keyval caseless match.

12/18/19:

20:20 Ticket #1904 (sendfile with io-threads - nginx mistakenly considers premature client ...) updated by Shmulik Biran
Thank you for the fast response. I was trying to work around it …
15:15 Ticket #1904 (sendfile with io-threads - nginx mistakenly considers premature client ...) updated by Maxim Dounin
Priority, Status, Milestone changed
Yes, thanks. There is a known race condition when using aio threads;

12/17/19:

18:59 Ticket #1904 (sendfile with io-threads - nginx mistakenly considers premature client ...) created by Shmulik Biran
Hi, The scenario is as follows: 1. Nginx is configured to work with …
10:05 Ticket #1903 (Debian package dependencies are broken) closed by thresh
invalid: Thank you for you report. You're trying to install two conflicting …
01:04 Ticket #1903 (Debian package dependencies are broken) created by robbieh@…
nginx-extras is uninstallable from the Debian repo. Full output from …

12/16/19:

15:03 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by bruno9779@…
[…] Still present in nginx 1.10.3
12:19 Changeset in nginx [7606:db8df9cd84c8] by Ruslan Ermilov <ru@…>
Rewrite: disallow empty replacements. While empty replacements were …
12:19 Changeset in nginx [7605:02a539522be4] by Ruslan Ermilov <ru@…>
Tolerate '\0' in URI when mapping URI to path. If a rewritten URI has …
12:19 Changeset in nginx [7604:7aa20af4ac00] by Ruslan Ermilov <ru@…>
Rewrite: fixed segfault with rewritten URI and "alias". The "alias" …
12:19 Changeset in nginx [7603:e55e28e6998f] by Ruslan Ermilov <ru@…>
Fixed request finalization in ngx_http_index_handler(). Returning 500 …
12:19 Changeset in nginx [7602:b399246ea45d] by Ruslan Ermilov <ru@…>
Saved some memory allocations. In configurations when "root" has …
12:19 Changeset in nginx [7601:c1a7d3672653] by Ruslan Ermilov <ru@…>
Dav: fixed Location in successful MKCOL response. Instead of reducing …

12/13/19:

16:13 Ticket #1902 (Can not use ssl_trusted_certificate to verify Clients) created by jkman340@…
In my config, I set the following to validate client certificates …
04:08 Ticket #1901 (Can not specify cipher list of just 'TLSv1.3') updated by jkman340@…
Thanks for the reply and pointing to #1529. After reading #1529 I see …
00:12 Ticket #1901 (Can not specify cipher list of just 'TLSv1.3') closed by Maxim Dounin
invalid: OpenSSL does not support "TLSv1.3" as a valid cipher string: […] …

12/12/19:

22:15 Ticket #1901 (Can not specify cipher list of just 'TLSv1.3') created by jkman340@…
I was testing different scenarios with using TLSv1.2 and TLSv1.3 and I …
09:28 Ticket #1891 ($body_bytes_sent and $bytes_sent wrong during sliced subrequest) updated by cknight0042@…
Abc123

12/11/19:

19:10 Ticket #1689 (Writing connections leak with http/2) updated by Maxim Dounin
Thanks for testing. The patch is currently under an internal review …
18:56 Ticket #1610 (Writing connections counter leak in stub_status.) closed by Maxim Dounin
duplicate: Thanks for testing. Closing this as a duplicate of #1689, as clearly …
16:10 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) updated by marferiky@…
ok, I'll try that, thanks!
16:01 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) updated by maxim
I would update both nginx and, more important, libmodsecurity and …
15:55 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) updated by marferiky@…
hi Maxim, thanks for getting back! When modsecurity is disabled, it …
15:52 nginx_worker_processes.txt attached to Ticket #1900 by marferiky@…
nginx worker processes
15:33 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) updated by maxim
Hi, can you check whether nginx demonstrates the same behaviour with …
15:22 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) created by marferiky@…
Hi there, we run Nginx in a Docker container as a sidecar in a pod in …
12:15 Ticket #1610 (Writing connections counter leak in stub_status.) updated by dyeldandi@…
I can confirm that patch from #1689 fixed this issue.
12:13 Ticket #1689 (Writing connections leak with http/2) updated by dyeldandi@…
It's been almost a week we are running nginx with this patch and I …

12/10/19:

10:07 Ticket #1899 (Enhance mail module with access control like ngx_http_access_module module) created by weishen@…
We are running nginx as the mail proxy, but there are lots of invalid …

12/09/19:

11:27 Ticket #1506 (bind() in configuration test is too cautious) updated by Maxim Dounin
See also #1898.
11:27 Ticket #1791 (Nginx -t changing ownersip of cache path) updated by Maxim Dounin
See also #1898.
11:26 Ticket #1898 (Owner of directories *_temp changed when tested config) closed by Maxim Dounin
duplicate: Duplicate of #1791.

12/07/19:

15:32 test_config_change_permissions_temp_dir.patch attached to Ticket #1898 by Maxim Kozin
patch prototype
15:31 Ticket #1898 (Owner of directories *_temp changed when tested config) created by Maxim Kozin
Nginx started in docker as: […] All _temp dirs created on start …

12/06/19:

17:44 Ticket #1606 (WebAssembly doesn't work on Firefox/Chrome due to missing MIME type) updated by ccouzens@…
The WebAssembly? specification isn't yet complete, though there is a …
07:39 Ticket #1897 (Systemd is unable to read pidfile after nginx start-up due to a ...) created by turchanov@…
Systemd unit nginx.service (packaged in your rpms but that same setup …

12/05/19:

20:09 Ticket #1896 (SSL certificate password - startup) updated by Maxim Dounin
Replying to terranova42@…: > Hello, thank you for your …
18:36 Ticket #1896 (SSL certificate password - startup) updated by terranova42@…
Hello, thank you for your answer. It is ok that ssl_password file is …
16:38 Changeset in nginx [7600:3939483cd1b5] by Maxim Dounin <mdounin@…>
Upstream keepalive: clearing of c->data in cached connections. …
16:22 Changeset in nginx [7599:3da195363cb0] by Maxim Dounin <mdounin@…>
Version bump.
12:30 Ticket #1896 (SSL certificate password - startup) closed by Maxim Dounin
wontfix: On Windows there is no fork(), and hence nginx have to start worker …
10:47 Ticket #1723 (proxy_cache_background_update does not really do updates in the background) updated by rulatir@…
> and this is beneficial in all cases No, it is not beneficial in …
10:26 Ticket #1896 (SSL certificate password - startup) created by terranova42@…
Hello, I encounter what seems to be a bug on windows 10 with NGINX …
06:45 Ticket #1689 (Writing connections leak with http/2) updated by dadmin-admin@…
Yep, I keep watching connection counters. Usually it takes a few days …

12/04/19:

17:43 Ticket #1689 (Writing connections leak with http/2) updated by Maxim Dounin
Replying to dadmin-admin@…: > File is too large to fit …
13:38 nginx.debug.opensocket.5361.0.32556.log.gz attached to Ticket #1689 by dadmin-admin@…
13:38 Ticket #1689 (Writing connections leak with http/2) updated by dadmin-admin@…
Also I realized that in my comment above I might have found 'open …
13:31 Ticket #1689 (Writing connections leak with http/2) updated by dadmin-admin@…
File is too large to fit here. I uploaded it to https://gofile.io/?c=uMKeuQ
13:03 Ticket #1610 (Writing connections counter leak in stub_status.) updated by Maxim Dounin
Please try the patch from ticket #1689.
12:36 Changeset in nginx_org [2470:504536999408] by Yaroslav Zhuravlev <yar@…>
Added upstream resolver info to upstream server resolve parameter.
11:54 Ticket #1689 (Writing connections leak with http/2) updated by Maxim Dounin
The new debug log […] suggests that the "open socket ... left" …
09:50 nginx.debug.opensocket.4802.0.16280.log.gz attached to Ticket #1689 by dadmin-admin@…
patched nginx
09:48 Ticket #1689 (Writing connections leak with http/2) updated by dadmin-admin@…
I rebuilt nginx with the patch, but I still see those errors. I'll …

12/03/19:

21:55 Ticket #1606 (WebAssembly doesn't work on Firefox/Chrome due to missing MIME type) updated by ccouzens@…
If you are reading this and also want (or don't want) application/wasm …
15:00 Ticket #1610 (Writing connections counter leak in stub_status.) updated by lipovka.ok.by@…
I have same problem with nginx/1.16.1(http/2). Writing connection …
14:00 Ticket #1689 (Writing connections leak with http/2) updated by Maxim Dounin
Please try the following patch: […]

12/02/19:

11:56 Changeset in nginx-tests [1535:144c6ce732e4] by Sergey Kandaurov <pluknet@…>
Tests: removed TODO and try_run() checks for legacy versions.
10:39 Changeset in nginx_org [2471:c8f0f30e1513] by Ruslan Ermilov <ru@…>
Added a note about DNS spoofing to all "resolver" directives.
10:23 Changeset in nginx_org [2469:98fd810c13e0] by Ruslan Ermilov <ru@…>
Updated docs for the upcoming NGINX Plus release.

11/29/19:

04:19 Ticket #1689 (Writing connections leak with http/2) updated by dadmin-admin@…
Yay! Any chance to get it fixed soon?
Note: See TracTimeline for information about the timeline view.