Timeline
03/02/20:
- 18:38 Changeset in nginx [8183:6091506af0f7]quic by
- Aded the "ngx_quic_hexdump" macro. ngx_quic_hexdump0(log, format, …
- 18:10 Changeset in nginx-tests [1554:cae83c98654a] by
- Tests: added detached subrequest js tests.
- 17:07 Changeset in nginx [7631:b4dbf8b98f9a] by
- Fixed premature background subrequest finalization. When "aio" or …
- 16:46 Changeset in nginx-tests [1553:01867708af95] by
- Tests: adjusted todo_alerts() in js_subrequest.t.
- 13:24 Ticket #1936 ('set_real_ip_from' in location section is not processed before ...) closed by
- invalid: As already explained above, the behaviour you observe is in line with …
03/01/20:
- 04:27 Ticket #1936 ('set_real_ip_from' in location section is not processed before ...) reopened by
- It would be right to change the Summary of the ticket to Wrong …
02/28/20:
- 18:34 Ticket #1529 (Could not configure TLS1.3 ciphers in OpenSSL 1.1.1 pre4) updated by
- Replying to Maxim Dounin: > Here is how TLSv1.3 ciphers …
- 18:11 Ticket #1937 (Nginx didn't update cache anymore after ...) updated by
-
The
NGX_HTTP_CACHE_UPDATING
return code is only expected to be … - 17:01 Ticket #1937 (Nginx didn't update cache anymore after ...) created by
- When I use […] I found after the background subrequest is failed …
- 16:54 Changeset in nginx [7632:1d207b77b44a] by
- Simplified subrequest finalization. Now it looks similar to what it …
- 15:20 Changeset in nginx-tests [1552:3b6b2667ece9] by
- Tests: added https test with pipelined requests.
- 14:21 Changeset in nginx [7630:f001d9384293] by
- Added default overwrite in error_page 494. We used to have default …
- 13:23 Changeset in nginx [8182:b28ea685a56e]quic by
- Moved all QUIC code into ngx_event_quic.c Introduced ngx_quic_input() …
- 10:09 Changeset in nginx [8181:3cb4f16426a5]quic by
- Introduced quic_version macro, uint16/uint32 routines ported.
- 10:09 Changeset in nginx [8180:01dc595de244]quic by
- Cleanup.
- 10:09 Changeset in nginx [8178:a9ff4392ecde]quic by
- QUIC header protection routines, introduced ngx_quic_tls_hp().
- 10:09 Changeset in nginx [8177:76e29ff31cd3]quic by
- AEAD routines, introduced ngx_quic_tls_open()/ngx_quic_tls_seal().
- 10:09 Changeset in nginx [8176:8964cc6ecc4a]quic by
- Transport parameters stub, to complete handshake.
- 10:09 Changeset in nginx [8175:72f632f90a17]quic by
- Introduced ngx_quic_secret_t.
- 10:09 Changeset in nginx [8174:b7bbfea7a6c3]quic by
- QUIC handshake handler, draft 24 bump.
- 10:09 Changeset in nginx [8173:02f331613232]quic by
- Fixed indentation.
- 10:09 Changeset in nginx [8172:640a13fc0f83]quic by
- PN-aware AEAD nonce, feeding proper CRYPTO length.
- 10:09 Changeset in nginx [8171:4daf03d2bd0a]quic by
- OpenSSL compatibility.
- 10:09 Changeset in nginx [8170:53a5cdbe500c]quic by
- QUIC add_handshake_data callback, varint routines.
- 10:09 Changeset in nginx [8169:bd006bd520a9]quic by
- QUIC set_encryption_secrets callback.
- 10:09 Changeset in nginx [8168:b507592c15a7]quic by
- Server Initial Keys.
- 10:09 Changeset in nginx [8167:5d91389e0fd3]quic by
- Initial QUIC support in http.
- 10:09 Changeset in nginx [8166:7999d3fbb765]quic by
- HTTP UDP layer, QUIC support autotest.
02/27/20:
- 16:49 Changeset in nginx-tests [1551:27237569776f] by
- Tests: additional Transfer-Encoding and Host headers tests.
- 16:03 Changeset in nginx [7628:2e3bfd696ecb] by
- Disabled connection reuse while in SSL handshake. During SSL …
- 15:27 Ticket #753 (Nginx leaves UNIX domain sockets after SIGQUIT) updated by
- Review can be seen here: …
- 01:03 Ticket #753 (Nginx leaves UNIX domain sockets after SIGQUIT) updated by
- Ran into this issue myself. Here is a patch I just proposed to the …
02/26/20:
- 21:09 Ticket #195 (Close connection if SSL not enabled for vhost) updated by
- The hack with aNULL or eNULL no longer work as soon as TLS1.3 is …
- 13:58 Ticket #754 (add_header not being inherited by named location) updated by
- You may find this Igor's talk interesting: …
- 13:56 Changeset in nginx [8179:7ee1ada04c8a]quic by
- Generic function for HKDF expansion.
- 12:10 Changeset in nginx [7629:f47f7d3d1bfa] by
- Mp4: fixed possible chunk offset overflow. In "co64" atom chunk start …
- 09:52 Ticket #754 (add_header not being inherited by named location) updated by
- So there is no way to define some headers on the server level and …
02/25/20:
- 15:42 Changeset in nginx_org [2505:ae52ac67048c] by
- Linux packages: Added Alpine 3.11.
- 12:45 Ticket #1936 ('set_real_ip_from' in location section is not processed before ...) updated by
- If something satisfies the way is was supposed to be written, it …
- 12:25 Changeset in nginx_org [2504:d25a5081e35c] by
- Matched English and Russian versions of njs index.xml.
02/22/20:
- 13:02 Ticket #1188 (Send "immutable" keyword in Cache-Control when "expires max") updated by
- I've created [https://github.com/GetPageSpeed/ngx_immutable …
02/21/20:
- 10:57 Changeset in nginx_org [2503:2d0b563c205c] by
- Updated with Netcraft February 2020 Web Server Survey stats.
02/20/20:
- 20:05 Ticket #1936 ('set_real_ip_from' in location section is not processed before ...) closed by
- invalid: The realip module, if specified in a particular location, starts …
- 18:51 Ticket #1936 ('set_real_ip_from' in location section is not processed before ...) updated by
-
Description changed
- 18:46 Ticket #1936 ('set_real_ip_from' in location section is not processed before ...) created by
- For the confuguration […] response on request […] is […] It …
- 16:06 Ticket #1935 (Send cookie headers with HTTP2 Server Push) created by
- I was experimenting with the use of HTTP2 Server Push to accelerate …
- 13:51 Changeset in nginx [7627:4f18393a1d51] by
- Disabled duplicate "Host" headers (ticket #1724). Duplicate "Host" …
- 13:19 Changeset in nginx [7626:fe5976aae0e3] by
- Removed "Transfer-Encoding: identity" support. The "identity" …
- 13:19 Changeset in nginx [7625:aca005d232ff] by
- Disabled multiple Transfer-Encoding headers. We anyway do not support …
02/19/20:
- 17:19 Ticket #564 (map regex matching affects rewrite directive) updated by
- This bug is classified as 'minor', but in our opinion it should be …
02/18/20:
- 16:06 Ticket #1752 (400 Bad Request when Content-Length header value starts with HT) closed by
- wontfix: See the following mailing list messages: …
- 14:50 Ticket #564 (map regex matching affects rewrite directive) updated by
- See also #1934.
- 14:50 Ticket #1934 (Unpredictable behaviour using proxy_cookie_path to add SameSite cookie ...) closed by
-
duplicate: This looks like a variant of #564, but with
proxy_cookie_path
…
02/16/20:
02/14/20:
- 08:24 Ticket #1934 (Unpredictable behaviour using proxy_cookie_path to add SameSite cookie ...) updated by
- Tested also using nginx-1.17.8 built using the same options + …
02/13/20:
- 14:33 Ticket #1934 (Unpredictable behaviour using proxy_cookie_path to add SameSite cookie ...) updated by
- Component should be 'nginx-core' not 'documentation'
- 14:31 Ticket #1934 (Unpredictable behaviour using proxy_cookie_path to add SameSite cookie ...) created by
- == Use-Case: We are attempting to use alter cookie attibutes for the …
- 13:06 Ticket #147 (nginx touched /var/log/nginx-error.log even when error_log are switched off) updated by
- See also #1933.
- 13:06 Ticket #1933 (nginx -t does not write to set error log) closed by
- duplicate: Configuration being parsed, including the log file and log level set …
02/12/20:
- 15:37 Changeset in nginx_org [2502:5280a40d933e] by
- Added the "https" scheme to nginx_api.yaml.
- 15:10 Changeset in nginx_org [2501:2b494b8ff72d] by
- Documented the "Entry exists" error in the API.
- 15:10 Changeset in nginx_org [2500:8a9b2efa92aa] by
- Documented the "Method disabled" error in the API.
- 13:25 Ticket #1932 (No module http-auth-spnego on nginx version 1.14) closed by
- invalid: It looks like your question is about packages in Debian. These are not …
- 05:54 Ticket #1933 (nginx -t does not write to set error log) created by
- When error log is set to another file and using a higher loglevel …
02/11/20:
- 23:48 Ticket #1932 (No module http-auth-spnego on nginx version 1.14) created by
- Hello, After upgrade nginx 1.10 to 1.14, my module http-auth-spnego …
- 10:22 Changeset in nginx [7624:1055e43e4fab] by
- Made ngx_http_get_forwarded_addr_internal() non-recursive.
02/10/20:
02/07/20:
- 21:14 Ticket #1931 (Islamcariers7@gmail.com) created by
- My YouTube Downloads program video filed under all safety and security …
- 17:10 Ticket #348 (Excessive urlencode in if-set) updated by
- See also #1930.
- 17:10 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by
- invalid: In your configuration snippet: […] you are using …
- 16:45 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) created by
- We are seeing nginx 1.15 and the latest 1.17.8 wrongly decoding %20 to …
- 14:21 Changeset in nginx-tests [1550:5c96745988c4] by
- Tests: added HTTP/2 test for invalid index in literal header field.
02/06/20:
- 17:16 Changeset in nginx_org [2498:9ceda894f3d7] by
- Added info about the Unit 1.15.0 release.
- 17:15 Milestone unit-1.15 completed
- Planned features and enhancements: * Bug fixes
02/05/20:
- 15:42 Ticket #1929 (Random errors with PHP-FPM) closed by
- invalid: PHP-FPM is a completely separate daemon, and nginx talks to it only …
- 15:04 Changeset in nginx-tests [1549:6c9e3e20af97] by
- Tests: HTTP/2 tests for error handling in parsing HPACK integers.
- 15:02 Changeset in nginx-tests [1548:b02d0fd71638] by
- Tests: added HTTP/2 test for HEADERS split on field boundary.
- 13:29 Changeset in nginx [7623:72b792bb3885] by
- HTTP/2: fixed socket leak with an incomplete HEADERS frame. A …
- 13:29 Changeset in nginx [7622:2955192fb210] by
- Version bump.
- 13:17 Ticket #1929 (Random errors with PHP-FPM) created by
- We are having a bizarre problem with our server setup, and I traced to …
02/04/20:
- 14:09 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- OpenWrt is a platform for embedded devices using minimal amounts of …
- 12:55 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) closed by
- invalid: Certainly it is possible to compile nginx for OpenWrt without any …
- 11:48 Ticket #698 (Add an option to proxy_cache_path that allows to set group permissions) updated by
- I would very much welcome this change if the patch is revivable. My …
02/03/20:
- 21:32 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- Hi Maxim, It seems that I found the root cause of the current …
- 19:26 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- Hi Maxim, It is not possible to compile Nginx for OpenWrt without …
- 19:12 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- To make things clear: nginx does not support cross-compilation. If you …
- 18:42 Changeset in nginx_org [2497:805c4b84cc61] by
- Added missing feature and links to njs-0.3.8 Changes.
- 18:41 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- Hi Maxim, Patch 102-sizeof_test_fix.patch (see the link above) is …
- 18:22 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- There are only six patches that are applied to Nginx while …
- 18:02 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- Are you able to reproduce the problem without 3rd party patches? …
- 17:49 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- As a faster alternative, I can email both files to someone who can …
- 17:47 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) updated by
- Hello admins, I cannot attach any file to this ticket. I get this …
- 17:44 Ticket #1927 (test ticket) closed by
- invalid
- 17:44 Ticket #1928 (browser cannot correctly decode http response headers when http2 is used) created by
- When http2 is enabled, Google Chrome and Firefox cannot correctly …
- 17:44 Ticket #1927 (test ticket) created by
- Test ticket. Test.
- 17:23 Ticket #1884 (Trac throws an error when logging in with StackExchange) closed by
- fixed: Fixed, thanks.
- 17:04 Changeset in nginx_org [2499:20dbb29cbe05] by
- Documented the "Unknown version" error in the API.
Note:
See TracTimeline
for information about the timeline view.