Timeline
05/21/20:
- 12:48 Changeset in nginx [8401:d3aa54242c37]quic by
- Style. Rephrased error message and removed trailing space. Long …
- 12:41 Changeset in nginx [8398:8bec0ac23cf9]quic by
- Fixed retransmission of frames after closing connection. Frames in …
- 12:38 Changeset in nginx [8397:1245e274b9ba]quic by
- Avoided excessive definitions for connection state. There is no need …
- 12:11 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) updated by
-
Status changed
Yes, indeed such packets aren't forwarded currently. Did you hit the … - 11:53 Ticket #1808 (Inconsistent encoding in rewrites) updated by
- Bug still exists in 1.18.0. It seems that it's only the first …
05/20/20:
- 14:06 Ticket #724 (Init script does not check config on reload for Ubuntu mainline packages) updated by
- See also #1983.
- 14:06 Ticket #1983 (nginx.service unit-file in rpm (CentOS 7,8)) closed by
- duplicate: The "nginx -s reload" does not have an exit code either, it's just a …
- 13:32 Ticket #1983 (nginx.service unit-file in rpm (CentOS 7,8)) created by
- Hi In an unit-file nginx.server (from RPM packages for CentOS 7,8) I …
- 12:36 Changeset in nginx [8394:df18ae7161b8]quic by
- Assorted fixes. Found by Clang Static Analyzer.
- 12:04 Changeset in nginx-tests [1570:0077b80ef745] by
- Tests: ssl_ocsp tests.
- 07:00 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) created by
- Using wireshark I can see that zero length packets aren't forwarded to …
05/19/20:
- 14:05 Changeset in nginx_org [2547:baf8cbfa3df1] by
- njs-0.4.1.
- 14:05 Changeset in nginx_org [2546:6093e9f3615e] by
- Documented rawHeadersIn and rawHeadersOut in njs.
- 14:05 Changeset in nginx_org [2545:dca5a7053a6c] by
- Sorted alphabetically njs http methods.
- 14:05 Changeset in nginx_org [2544:33347df1da9c] by
- Relocated sentence in r.headers.Out, added dot, corrected quotes.
- 14:05 Changeset in nginx_org [2543:f39c4724c0f8] by
- Described multi-value headers in r.headersIn.
- 13:36 Milestone njs-0.4.1 completed
- Planned features and enhancements: * headersIn and raw headers API * …
- 13:20 Changeset in nginx [8408:5b367070cc9c]quic by
- Fixed client buffer reallocation for HTTP/3. Preserving pointers …
- 12:47 Changeset in nginx [8407:d6feece1288a]quic by
- Fixed $request_length for HTTP/3. New field r->parse_start is …
- 12:41 Changeset in nginx [8403:c101438c69a4]quic by
- HTTP/3: prevent array access by negative index for unknown streams. …
- 12:34 Changeset in nginx [8406:66feab03d9b7]quic by
- HTTP/3: restricted symbols in header names. As per HTTP/3 draft 27, a …
- 12:29 Changeset in nginx [8405:d2759e4cc437]quic by
- HTTP/3: split header parser in two functions. The first one parses …
- 11:54 Changeset in nginx_org [2542:bde7cd9a1173] by
- Added examples of state path to keyval.
- 11:43 Changeset in nginx_org [2548:ffc4083f5c7e] by
- Documented ssl_ocsp, ssl_ocsp_cache, ssl_ocsp_responder directives.
05/18/20:
- 19:10 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- See also #1981.
- 19:09 Ticket #1981 (no logging of HTTP/1.x requests to a plain text HTTP/2 listening socket) updated by
-
Status, Summary changed
You were given an explanation (see ticket:1979#comment:1), and … - 17:49 Ticket #1981 (no logging of HTTP/1.x requests to a plain text HTTP/2 listening socket) created by
- Hi, two days ago you closed my ticket without offering me further …
- 14:11 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Replying to mmattel@…: > One thing pop´s up. When …
- 11:41 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Your example works. I do not know what went wrong on my side that this …
- 10:54 Changeset in nginx [8393:e169cce912c7]quic by
- Avoid retransmitting of packets with discarded keys. Sections 4.10.1 …
- 10:54 Changeset in nginx [8392:5ffb21c5c93d]quic by
- Fixed frame retransmissions. It was possible that retransmit timer …
- 01:03 Ticket #1869 (Wrong client IP in errors logged early in request processing when ...) updated by
- See also #1978, which is somewhat similar.
- 01:02 Ticket #1978 (Logging real client IP on invalid request) closed by
- wontfix: As long as there is a syntax error in the request line, nginx does not …
05/17/20:
- 16:17 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) closed by
- worksforme: Works fine here. Example configuration: […] Test request: […] …
- 16:02 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- See also #1979.
- 16:02 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) closed by
-
duplicate: Using
listen ... http2;
withoutssl
configures listening socket to … - 13:28 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Not a documentation ticket -> core
- 13:16 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) created by
- When using auth_basic (works great) and defining a custom 401 error …
- 11:24 Changeset in nginx [7651:6ca8e15caf1f] by
- OCSP stapling: keep extra chain in the staple object.
05/16/20:
- 20:42 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) updated by
- thank you for your wonderful server and hope I am not wasting your time.
- 20:40 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) created by
- Hi, I do not know if this is how nginx should behave, but it …
- 16:36 Ticket #1535 (proxy_bind and resolver IP version mismatch) updated by
- Hi! Adding support for several IPs would solve the whole issue. When …
- 06:51 Ticket #1978 (Logging real client IP on invalid request) created by
- We run nginx behind a proxy, which sets the X-Forwarded-For header …
05/15/20:
- 15:22 Changeset in nginx_org [2541:0e6bbd8138c4] by
- Added article about TypeScript in njs.
05/14/20:
- 18:04 Ticket #1971 (Invalid 200 (OK) response code to range request) updated by
- Any valid client is expected to handle 200 anyway, as servers are not …
- 17:39 Ticket #1971 (Invalid 200 (OK) response code to range request) updated by
- Frankly, this is a weird approach to use "...may ignore..." clause …
- 15:34 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) updated by
-
Priority changed
I believe it was demonstrated more than once that padding cannot … - 15:10 Changeset in nginx [8391:2d5db7faa788]quic by
- Removed outdated debug.
- 14:22 Changeset in nginx [8390:70dbd7d0e466]quic by
- Fixed a typo.
- 13:33 Changeset in nginx [8389:2b580ac17a47]quic by
- README: Retry support, protocol error messages implemented.
- 13:02 Changeset in nginx [8409:26cb2f3259b1]quic by
- HTTP/3: reallocate strings inserted into the dynamic table. They …
- 12:54 Changeset in nginx [8385:fb7422074258]quic by
- Added generation of CC frames with error on connection termination. …
- 12:47 Changeset in nginx [8384:52d0c4832570]quic by
- Address validation using NEW_TOKEN frame.
- 12:47 Changeset in nginx [8383:7ea34e13937f]quic by
- Address validation using Retry packets. The behaviour is toggled with …
- 11:49 Changeset in nginx [8404:e5d4f057a6cb]quic by
- HTTP/3: move body parser call out of ngx_http_parse_chunked(). The …
- 11:49 Changeset in nginx [8387:eebdda507ec3]quic by
- Added tests for connection id lengths in initial packet.
- 00:58 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) updated by
-
Description changed
- 00:56 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) created by
- The TLS specification (RFC 8446) section 5.4 defines optional Record …
05/13/20:
- 22:06 Changeset in nginx [8386:81f85c479d7e]quic by
- Discard packets without fixed bit or reserved bits set. Section 17.2 …
- 21:17 Ticket #698 (Add an option to proxy_cache_path that allows to set group permissions) closed by
- wontfix: Permissions are set on the cache directory and files in a such way …
- 15:34 Changeset in nginx [8382:b7704303a7e5]quic by
- Server CID change refactored.
- 14:02 Changeset in nginx [7649:3c8082c3f98a] by
- Upstream: jump out of loop after matching the status code.
- 10:01 Ticket #1888 (Nginx cache has multiple formats, and many of them are invalid during ...) updated by
- It is hoped that the cache file can be deleted through del, and key …
05/12/20:
- 21:06 Changeset in nginx_org [2540:b686736680e3] by
- Documented escaping rules in log_format.
- 15:45 Changeset in nginx [8388:a9cc1627cf1c]quic by
- Fixed time comparison.
- 15:18 Changeset in nginx [8381:6e100d8c138a]quic by
- Preserve original DCID and unbreak parsing 0-RTT packets. As per QUIC …
- 14:54 Ticket #972 (Clarify $arg_name and $args in embedded variables documentation) closed by
-
wontfix: The
$arg
, also known as$query_string
, represents query string as …
05/10/20:
- 17:32 Ticket #1970 (ssl_ecdh_curve avoid 0-RTT) closed by
- duplicate: Duplicate of #1969.
- 17:32 Ticket #1969 (ssl_ecdh_curve avoid 0-RTT) closed by
- invalid: This does not look like a bug in nginx, but rather a question about …
- 17:11 Ticket #1975 (Certificates in ssl_trusted_certificate doesn't have to be CA, docs ...) closed by
- wontfix: While strictly speaking you are right, and this can be used as a …
- 16:46 Ticket #1976 (Nginx DNS cache issue. ngx_http_core_module valid config is not working.) closed by
- invalid: Domain names used in nginx configuration are normally resolved during …
- 16:25 Ticket #1974 (Custom variable not written to access_log when nginx.status is 400) closed by
- invalid: When a 400 error occurs before request processing starts - for …
- 16:17 Ticket #1384 (request body may be corrupted when content-length is not set in ...) updated by
- See also #1973.
- 16:17 Ticket #1973 (Intermittent form body loss with concurrent HTTP2 POST requests) closed by
- duplicate: The 1.10.3 is the version obsolete more than 3 years ago. Further, in …
- 15:48 Ticket #1972 (Use of IRIs in redirect responses causes nginx to violate HTTP RFCs) closed by
-
wontfix: It certainly shouldn't auto-punycode. The
return
directive return …
05/09/20:
- 14:41 Changeset in nginx [8380:efe1f104caf7]quic by
- Removed redundant long packet type checks.
- 14:39 Changeset in nginx [8379:aecd8ec29c8e]quic by
- Removed redundant SSL_do_handshake call before any handshake data.
- 11:19 Ticket #1976 (Nginx DNS cache issue. ngx_http_core_module valid config is not working.) created by
- Setup: Ec2 instance with Nginx 1.12.2 behind an AWS Load balancer. …
- 07:38 Ticket #1975 (Certificates in ssl_trusted_certificate doesn't have to be CA, docs ...) created by
- http://nginx.org/en/docs/http/ngx_http_ssl_module.html …
05/08/20:
- 16:45 Changeset in nginx-tests [1569:cd6abbe0f989] by
- Tests: added generic tests for $arg_ variables.
- 16:19 Changeset in nginx [7648:028b16e2798f] by
- Variables: fixed buffer over-read when evaluating "$arg_".
- 13:46 Ticket #1974 (Custom variable not written to access_log when nginx.status is 400) created by
- TL;DR: A custom variable is not written to my access log file when the …
- 10:08 Changeset in nginx [8378:81a4f98a2556]quic by
- Cleaned up reordering code. The ordered frame handler is always …
- 02:24 Ticket #1971 (Invalid 200 (OK) response code to range request) closed by
- invalid: As per [https://tools.ietf.org/html/rfc7233#section-3.1 RFC 7233, …
05/07/20:
- 17:51 Ticket #1973 (Intermittent form body loss with concurrent HTTP2 POST requests) created by
- This was originally reported here: …
- 17:14 Ticket #1972 (Use of IRIs in redirect responses causes nginx to violate HTTP RFCs) created by
-
For example when you do this in a server block:
` return 301 …
- 09:34 Changeset in nginx [8377:2a94aaa70b33]quic by
- Cleaned up firefox workaround. The idea is to skip any zeroes that …
- 08:22 Ticket #1971 (Invalid 200 (OK) response code to range request) created by
- Observed behaviour: nginx responds with 200 (OK) to 0-10 ranged …
- 00:08 Ticket #972 (Clarify $arg_name and $args in embedded variables documentation) reopened by
- I respectfully disagree. It's not only the question of how HTTP …
05/06/20:
- 18:44 Changeset in nginx [7650:abb6cc8f1dd8] by
- OCSP stapling: moved response verification to a separate function.
- 12:52 Changeset in nginx-tests [1568:4cc012205ac5] by
- Tests: added js tests for raw headers API.
- 12:08 Changeset in nginx-tests [1567:726877fc4b08] by
- Tests: fixed js_subrequest.t compatibility to 0.3.7. This fixes …
- 11:34 Changeset in nginx [8376:2d0f4aa78ed6]quic by
- Restored ngx_quic_encrypt return type. It was inadvertently changed …
- 11:22 Ticket #1970 (ssl_ecdh_curve avoid 0-RTT) created by
- if i set ssl_ecdh_curve secp521r1:secp384r1; ssllabs show 0-RTT No if …
- 11:20 Ticket #1969 (ssl_ecdh_curve avoid 0-RTT) created by
- if i set ssl_ecdh_curve secp521r1:secp384r1; ssllabs show 0-RTT No if …
05/05/20:
- 21:04 Ticket #676 (Different ssl_protocols per server won`t work) updated by
- See also #1967, #1968.
- 21:04 Ticket #1968 (Cannot use different SSL protocols in different server blocks) closed by
- duplicate
- 21:04 Ticket #1967 (Cannot use different SSL protocols in different server blocks) closed by
- duplicate
- 21:03 Ticket #1968 (Cannot use different SSL protocols in different server blocks) updated by
- Duplicate of #676.
- 21:03 Ticket #1967 (Cannot use different SSL protocols in different server blocks) updated by
- Duplicate of #676.
- 21:01 Ticket #1123 (Include timezone in error logs) closed by
- wontfix: The access log format uses time with timezone by default for …
- 20:44 Ticket #1966 (MKCOL refuses creation without trailing slash) closed by
- duplicate: Ok, thanks for your feedback. The clarifying text is available in the …
- 17:50 Ticket #1123 (Include timezone in error logs) updated by
- Just found this to be the case, similar to apache. Kind of dumbfounded …
- 10:43 Ticket #1968 (Cannot use different SSL protocols in different server blocks) created by
- Nginx cannot use different ssl_protocols in different server blocks …
- 10:40 Ticket #1967 (Cannot use different SSL protocols in different server blocks) created by
- Nginx cannot use different ssl_protocols in different server blocks …
- 07:47 Ticket #1966 (MKCOL refuses creation without trailing slash) updated by
- If nginx wants to be strict here I'm perfectly fine with it and …
05/04/20:
- 22:34 Ticket #604 (WebDAV: мелкие косяки) updated by
- See also #1966.
- 22:29 Ticket #1966 (MKCOL refuses creation without trailing slash) updated by
- This was previously discussed in #604 (mostly in Russian, …
- 12:20 Ticket #698 (Add an option to proxy_cache_path that allows to set group permissions) updated by
- Hi, I revived patch. You can review it here …
- 10:37 Ticket #1966 (MKCOL refuses creation without trailing slash) created by
- Some WebDAV clients that create collections do that without including …
05/01/20:
- 10:02 Changeset in nginx [8374:8712f4583783]quic by
- Configure: fixed static compilation with OpenSSL 1.1.1 / BoringSSL. …
04/30/20:
- 19:03 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- Replying to Andrei Belov: > We do not maintain those ppas. …
- 18:32 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- We do not maintain those ppas. We do maintain our own repositories, …
- 12:59 Changeset in nginx [8373:796b5b6c43cd]quic by
- Mention quic branch in README.
- 12:47 Changeset in nginx [8372:0e6528551f26]quic by
- Configure: unbreak with old OpenSSL, --with-http_v3_module added.
- 09:38 Changeset in nginx [8370:262396242352]quic by
- Reworked macros for parsing/assembling packet types. Previously, …
- 09:22 Changeset in nginx [8375:0aa6b02a1546]quic by
- Store clearflags in pkt->flags after decryption. It doesn't make …
- 07:55 Ticket #753 (Nginx leaves UNIX domain sockets after SIGQUIT) updated by
- Just a further comment to try and raise the profile of this issue. …
- 07:24 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- http://ppa.launchpad.net/nginx/stable/ubuntu/dists/ …
04/29/20:
- 18:41 Ticket #1678 (limit_rate and proxy_limit_rate broken from 1.14) updated by
- See also #1965.
- 18:41 Ticket #1965 ($request_time less than $upstream_response_time) updated by
-
Status changed
That's because$upstream_response_time
uses monotonic time as … - 12:33 Changeset in nginx-tests [1566:5cf2f4da8bd5] by
- Tests: added js tests for multi-values headers in r.headersIn.
- 12:33 Changeset in nginx-tests [1565:84a1e16819e5] by
- Tests: js TODO adjusted.
- 11:59 Changeset in nginx [8369:bddf704d62c1]quic by
- Renamed retransmit event object in preparation for retry support.
- 11:45 Changeset in nginx [8371:9d9531431c8c]quic by
- Removed outdated/incorrect comments and fixed style. - we need …
- 08:47 Ticket #1955 (Ubuntu 20.04 (Focal) support) closed by
- fixed: Latest mainline (1.17.10) and stable (1.18.0) versions built for …
- 08:29 Changeset in nginx_org [2539:5a5a791b3166] by
- Linux packages: added Ubuntu 20.04, removed 19.04.
- 05:35 Ticket #1965 ($request_time less than $upstream_response_time) updated by
-
Description changed
- 05:33 Ticket #1965 ($request_time less than $upstream_response_time) created by
- nginx logformat: log_format main escape=json '{ …
04/28/20:
- 15:44 Changeset in nginx-tests [1564:fe938b5daf80] by
- Tests: more grpc tests with discarded request body.
- 15:24 Changeset in nginx [8368:89ccb04736b9]quic by
- Server CID change.
- 15:23 Changeset in nginx [8367:c10e7d48aa85]quic by
- Factored out sending ACK from payload handler. Now there's no need to …
- 15:16 Changeset in nginx [8366:3e894ace66ee]quic by
- Added README.
- 13:42 Changeset in nginx [8364:eee307399229]quic by
- QUIC basic congestion control.
- 13:37 Changeset in nginx [8365:fab75acb1f72]quic by
- Respect MAX_DATA and MAX_STREAM_DATA from QUIC client.
- 10:15 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- Yes, we're already working on this. Thanks for your attention.
- 10:13 Changeset in nginx_org [2538:8e1c53284176] by
- Updated OpenSSL version used for win32 builds.
- 10:12 Changeset in nginx_org [2537:d6bbfd20c82f] by
- Rephrased a sentence in r.headersOut in njs.
04/27/20:
- 20:19 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- Ubuntu 20.04 has been released. Can you revisit this request?
- 14:23 Ticket #1964 (Bugs in compiling nginx with OpenSSL 3.0 Alpha1) closed by
- wontfix: There are two issues in the build log referenced: 1. The bug in …
- 06:17 Ticket #1950 (nginx/1.17.9 randomly truncating some large proxy responses) updated by
- To clarify our config, proxy_temp_path isn't even set so it's whatever …
- 05:43 Ticket #1964 (Bugs in compiling nginx with OpenSSL 3.0 Alpha1) created by
- I meet some bugs when compiling nginx with OpenSSL 3.0 Alpha1. I …
04/26/20:
- 17:58 Ticket #431 (directory redirect ex: try_files $uri $uri/ @backend;) closed by
- fixed: The port_in_redirect directive …
- 16:55 Ticket #1900 (Nginx starting more worker processes when modsec rules are enabled) closed by
- invalid: Feedback timeout. Likely a bug in modsecurity.
- 16:19 Ticket #1926 (resolver should not cache failures) closed by
- worksforme: Feedback timeout.
- 16:18 Ticket #1950 (nginx/1.17.9 randomly truncating some large proxy responses) closed by
- worksforme: Feedback timeout.
04/25/20:
- 23:19 Ticket #798 (Implement http_brotli_static module) updated by
- See also #1961.
- 23:18 Ticket #1961 (Extend gzip_static module to handle more accept-encodings) closed by
- duplicate: > This Trac does not know yet of version 1.18.x. Fixed, thanks. …
- 23:11 Ticket #1506 (bind() in configuration test is too cautious) updated by
- See also #1960.
- 23:11 Ticket #1960 (nginx -t tries to bind to ports) closed by
-
duplicate: The
nginx -t
is expected to test the configuration, and this what it … - 22:34 Ticket #1963 (Documentation does not mention important info about named locations at ...) closed by
- invalid: The documentation clearly says: …
- 17:15 Ticket #1963 (Documentation does not mention important info about named locations at ...) created by
- The full post is [here](In short there is no info about how to use …
- 15:08 Ticket #936 (For security purposes it is necessary to remove or change the "server" ...) updated by
- See also #1644.
- 14:09 Ticket #1962 (proxy_hide_header don't work, why?) closed by
-
invalid: The
proxy_hide_headers
is to hide headers from the response of a … - 14:07 Ticket #936 (For security purposes it is necessary to remove or change the "server" ...) updated by
- See also #1717, #1962.
- 14:06 Ticket #1717 (server info) closed by
- duplicate: Duplicate of #936.
- 14:06 Ticket #1717 (server info) reopened by
- 07:56 Ticket #1962 (proxy_hide_header don't work, why?) created by
- i want to hide some headers,like Server as below,but find it don't …
04/24/20:
- 20:32 Changeset in nginx_org [2536:87f34fafa4e8] by
- Removed load_module from "Hello World" example in njs.
- 14:20 Changeset in nginx [8363:d3395396ce51]quic by
- Fixed packet retransmission. Previously frames in ctx->sent queue …
- 11:38 Changeset in nginx [8361:336d527ca031]quic by
- Error messages cleanup. + added "quic" prefix to all error messages …
- 08:33 Changeset in nginx [8360:f175006124d0]quic by
- Cleaned up hexdumps in debug output. - the ngx_quic_hexdump0() macro …
- 07:11 Changeset in nginx [8359:2f900ae486bc]quic by
- Debug cleanup. + all dumps are moved under one of the following …
04/23/20:
- 17:26 Milestone njs-0.4.0 completed
- Planned features and enchancments: * js_import directive * request …
- 15:05 Changeset in nginx [8362:44cac24aaa44]quic by
- Assign connection number to every QUIC stream log.
- 12:31 Ticket #1797 (grpc module handles WINDOW_UPDATE improperly on closed streams) closed by
- fixed: Fixed in 716eddd74bc2, thanks!
- 12:30 Ticket #1792 (grpc module handles RST_STREAM(NO_ERROR) improperly on closed streams) closed by
- fixed: Fixed in 2096b21fcd10, thanks!
- 12:10 Changeset in nginx [7647:716eddd74bc2] by
- gRPC: WINDOW_UPDATE after END_STREAM handling (ticket #1797). As per …
- 12:10 Changeset in nginx [7646:2096b21fcd10] by
- gRPC: RST_STREAM(NO_ERROR) handling (ticket #1792). As per …
- 12:10 Changeset in nginx [7645:ed3a10cf88e8] by
- Version bump.
- 11:57 Changeset in nginx_org [2532:423d813dc8bb] by
- Documented support for multi-value headers in r.headersOut.
- 11:54 Changeset in nginx_org [2535:140a8a9f1dac] by
- njs-0.4.0.
- 11:29 Ticket #1961 (Extend gzip_static module to handle more accept-encodings) created by
- As new Accept-Encodings are added, notably br and zstd, please extend …
- 10:41 Changeset in nginx [8355:ad3a6f069498]quic by
- Added proper handling of connection close phases. There are following …
- 10:40 Ticket #1960 (nginx -t tries to bind to ports) created by
- nginx -t tries to bind to ports, which is a questionable thing to do …
- 09:25 Changeset in nginx [8358:2a6e91a1691d]quic by
- TODOs cleanup in transport. We always generate stream frames that …
- 09:10 Changeset in nginx [8357:05b8dd5d9f7e]quic by
- Retired the ngx_quic_parse_int_multi() function. It used …
- 08:50 Changeset in nginx [8356:42198f77ac85]quic by
- Removed support of drafts older than currently latest 27.
- 08:15 Changeset in nginx [8354:d11bc25fc4c3]quic by
- Refactored ngx_quic_close_connection(). The function is split into …
04/22/20:
- 21:55 Changeset in nginx_org [2531:9c8a89d3876f] by
- Updated njs examples with js_import and corresponding changes.
- 15:54 Changeset in nginx_org [2534:33468af2eaf7] by
- Moved load_module from examples of js modules to Installation.
- 15:54 Changeset in nginx_org [2533:617bc29bd759] by
- Removed phrase "This module is not built by default" from js modules.
- 15:54 Changeset in nginx_org [2530:407c5bd5bffc] by
- Documented the js_import directive and corresponding changes. Also …
- 12:59 Changeset in nginx [8353:036164360fa9]quic by
- HTTP/3: directives with limited values converted to post handler. The …
- 12:48 Changeset in nginx [8352:d73516830236]quic by
- HTTP/3: bytes holding directives changed to ngx_conf_set_size_slot. …
- 11:52 Changeset in nginx [8351:dd84c9cef75b]quic by
- Improved ngx_quic_build_int() code and readability. The function now …
- 11:24 Ticket #1959 (Unexpected invalidation of embedded variables in ngx_http_ssl_module) closed by
- invalid: So, it appeared that's the case. Thanks for feedback. The existing …
- 10:33 Ticket #1959 (Unexpected invalidation of embedded variables in ngx_http_ssl_module) updated by
-
Hi Sergey,
Does that mean to say that all
proxy_set_header
from … - 10:25 Ticket #1959 (Unexpected invalidation of embedded variables in ngx_http_ssl_module) updated by
- Please make sure you didn't inherit directives as …
- 10:16 Ticket #1959 (Unexpected invalidation of embedded variables in ngx_http_ssl_module) created by
-
If certain ssl options are set in an
http
block, and related …
04/21/20:
- 14:52 Changeset in nginx [8350:47dac6e0521a]quic by
- Fixed QUIC buffer consumption in send_chain().
- 14:50 Tickets #1811,1857,1870 batch updated by
-
Milestone changed
Ticket retargeted after milestone closed - 14:50 Milestone nginx-1.17 completed
- Status: on-going development Trunk: mainline 1.17 planned features …
- 14:49 Milestone nginx-1.18.0 completed
- Status: scheduled Trunk: stable * The first cut from 1.18 branch
- 14:38 Changeset in nginx_org [2529:8cc141e0460f] by
- nginx-1.18.0
- 14:11 Changeset in nginx [8349:b13176e717ba]quic by
- HTTP/3: fixed encoding variable-length integers.
- 14:09 Changeset in nginx [7644:2a0a77b5fa3a]stable-1.18 by
- release-1.18.0 tag
- 14:09 Changeset in nginx [7643:f8052414dbe9]stable-1.18release-1.18.0 by
- nginx-1.18.0-RELEASE
- 12:38 Changeset in nginx [7642:7927f8fb36dd]stable-1.18 by
- Stable branch.
- 12:12 Changeset in nginx-tests [1563:c1d167a13c24] by
- Tests: added js tests for multi-values headers.
Note:
See TracTimeline
for information about the timeline view.