Timeline
05/28/20:
- 22:17 Changeset in nginx_org [2550:43e87e973560] by
- Added info about the Unit 1.18.0 release.
- 17:49 Milestone unit-1.18 completed
- Planned features and enhancements: * URI enconding support * "target" …
- 14:05 Ticket #1988 (nginx: [emerg] too long parameter, probably missing terminating "'" ...) updated by
- The message suggests there is an error in your configuration file: a …
- 04:03 Ticket #1988 (nginx: [emerg] too long parameter, probably missing terminating "'" ...) created by
- Hello Team, I am getting this error when trying to reload my nginx …
05/27/20:
- 18:08 Ticket #1523 (large_client_header_buffers directive is ignored in server context) updated by
- See also #1987 to emphasize "might instead be a source of confusion" …
- 18:04 Ticket #1987 (underscores_in_headers directive seems to be specific to each server block) updated by
- The comment is an inaccurate attempt to explain that …
- 17:28 Ticket #1987 (underscores_in_headers directive seems to be specific to each server block) created by
- The following comment: If the directive is specified on the server …
- 04:38 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) updated by
- The issue came from a production deployment of a radius service. An …
05/26/20:
- 19:03 Changeset in nginx [7660:d33e17499088] by
- Version bump.
- 17:41 Changeset in nginx [8412:4ea302a47d28]quic by
- README: update after merging 1.19.0.
- 17:26 Changeset in nginx [8411:7995cd199b52]quic by
- Merged with the default branch.
- 16:17 Changeset in nginx [7661:8cadaf7e7231] by
- Contrib: vim syntax, update core and 3rd party module directives.
- 15:06 Milestone nginx-1.19.0 completed
- Status: scheduled Trunk: mainline * OCSP validation for the …
- 15:05 Changeset in nginx_org [2549:c13a55aae487] by
- nginx-1.19.0
- 15:00 Changeset in nginx [7659:d78400b2fa93] by
- release-1.19.0 tag
- 15:00 Changeset in nginx [7658:cbe6ba650211]release-1.19.0 by
- nginx-1.19.0-RELEASE
- 14:01 Ticket #1981 (no logging of HTTP/1.x requests to a plain text HTTP/2 listening socket) closed by
- fixed: Patch committed, 7114d21bc2b1. Thanks for prodding this.
- 13:52 Ticket #1330 (OCSP stapling non-functional on IPv6-only host) updated by
- For the record. It looks like my initial analysis in comment:1 was …
- 06:44 Ticket #1330 (OCSP stapling non-functional on IPv6-only host) closed by
- fixed
05/25/20:
- 19:53 Ticket #1986 (Proxy SSL Verify) updated by
-
Description changed
- 19:52 Ticket #1986 (Proxy SSL Verify) closed by
- invalid: For questions, please use [http://nginx.org/en/support.html support …
- 19:50 Ticket #1986 (Proxy SSL Verify) created by
- What are the verification steps involved in the …
- 19:10 Changeset in nginx [7657:02f2f129abc0] by
- Updated OpenSSL used for win32 builds.
- 17:39 Ticket #1330 (OCSP stapling non-functional on IPv6-only host) updated by
- In 7652:7cffd81015e7/nginx: OCSP stapling: iterate over all responder …
- 17:37 Ticket #1534 (OCSP client certificate validation) closed by
- fixed: Fix committed.
- 17:36 Ticket #1534 (OCSP client certificate validation) updated by
- In 7653:8409f9df6219/nginx: SSL: client certificate validation with …
- 15:37 Changeset in nginx [8410:c7d1b500bd0a]quic by
- Updated README with "Contributing" section and draft details.
- 15:33 Changeset in nginx [7656:7114d21bc2b1] by
- HTTP/2: invalid connection preface logging (ticket #1981). …
05/23/20:
- 14:15 Ticket #1535 (proxy_bind and resolver IP version mismatch) updated by
- Replying to [comment:4 …
- 12:53 Changeset in nginx [7655:bd4d1b9db0ee] by
- Fixed format specifiers.
- 11:41 Changeset in nginx [8402:af22b60a905b]quic by
- README: documented Retry, 0-RTT, TLSv1.3 configuration.
05/22/20:
- 17:35 Changeset in nginx [7652:7cffd81015e7] by
- OCSP stapling: iterate over all responder addresses. Previously only …
- 17:17 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by
-
uname -a changed
See also #1985. - 17:17 Ticket #1985 (No header response in 400 Bad Request) closed by
- duplicate: As already explained in …
- 15:29 Ticket #1985 (No header response in 400 Bad Request) created by
- When sending bad requests like […] Nginx will response 400 Bad …
- 15:22 Changeset in nginx [8396:94c06fe6e159]quic by
- README: pointed out Alt-Svc "ma" parameter useful with curl.
- 15:16 Changeset in nginx [8395:578563babbd1]quic by
- Fixed a typo.
- 15:14 Changeset in nginx [8400:d96ddef458cd]quic by
- Added sending of extra CONNECTION_CLOSE frames. According to …
- 15:08 Changeset in nginx [8399:ffd362e87eb2]quic by
- Added more context to CONNECTION CLOSE frames. Now it is possible to …
- 14:30 Changeset in nginx [7653:8409f9df6219] by
- SSL: client certificate validation with OCSP (ticket #1534). OCSP …
- 14:25 Changeset in nginx [7654:b56f725dd4bb] by
- OCSP: certificate status cache. When enabled, certificate status is …
- 14:06 Ticket #1984 (Nginx module installation issue) closed by
- wontfix: nginx-0.8.54 is an old enough version, you'd need at least nginx-1.5.2.
- 13:41 Ticket #1984 (Nginx module installation issue) created by
- - When I want to install the Nginx module that time accrued issue. …
- 11:18 Ticket #1808 (Inconsistent encoding in rewrites) updated by
- See https://github.com/kubernetes/ingress-nginx/issues/5576 for a …
- 11:14 Ticket #1535 (proxy_bind and resolver IP version mismatch) updated by
- Hi! Been there done that ! proxy_bind does randomly behave weird …
- 09:47 Ticket #1808 (Inconsistent encoding in rewrites) updated by
- You can do this for redirects: […] and this for proxying […] …
05/21/20:
- 12:48 Changeset in nginx [8401:d3aa54242c37]quic by
- Style. Rephrased error message and removed trailing space. Long …
- 12:41 Changeset in nginx [8398:8bec0ac23cf9]quic by
- Fixed retransmission of frames after closing connection. Frames in …
- 12:38 Changeset in nginx [8397:1245e274b9ba]quic by
- Avoided excessive definitions for connection state. There is no need …
- 12:11 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) updated by
-
Status changed
Yes, indeed such packets aren't forwarded currently. Did you hit the … - 11:53 Ticket #1808 (Inconsistent encoding in rewrites) updated by
- Bug still exists in 1.18.0. It seems that it's only the first …
05/20/20:
- 14:06 Ticket #724 (Init script does not check config on reload for Ubuntu mainline packages) updated by
- See also #1983.
- 14:06 Ticket #1983 (nginx.service unit-file in rpm (CentOS 7,8)) closed by
- duplicate: The "nginx -s reload" does not have an exit code either, it's just a …
- 13:32 Ticket #1983 (nginx.service unit-file in rpm (CentOS 7,8)) created by
- Hi In an unit-file nginx.server (from RPM packages for CentOS 7,8) I …
- 12:36 Changeset in nginx [8394:df18ae7161b8]quic by
- Assorted fixes. Found by Clang Static Analyzer.
- 12:04 Changeset in nginx-tests [1570:0077b80ef745] by
- Tests: ssl_ocsp tests.
- 07:00 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) created by
- Using wireshark I can see that zero length packets aren't forwarded to …
05/19/20:
- 14:05 Changeset in nginx_org [2547:baf8cbfa3df1] by
- njs-0.4.1.
- 14:05 Changeset in nginx_org [2546:6093e9f3615e] by
- Documented rawHeadersIn and rawHeadersOut in njs.
- 14:05 Changeset in nginx_org [2545:dca5a7053a6c] by
- Sorted alphabetically njs http methods.
- 14:05 Changeset in nginx_org [2544:33347df1da9c] by
- Relocated sentence in r.headers.Out, added dot, corrected quotes.
- 14:05 Changeset in nginx_org [2543:f39c4724c0f8] by
- Described multi-value headers in r.headersIn.
- 13:36 Milestone njs-0.4.1 completed
- Planned features and enhancements: * headersIn and raw headers API * …
- 13:20 Changeset in nginx [8408:5b367070cc9c]quic by
- Fixed client buffer reallocation for HTTP/3. Preserving pointers …
- 12:47 Changeset in nginx [8407:d6feece1288a]quic by
- Fixed $request_length for HTTP/3. New field r->parse_start is …
- 12:41 Changeset in nginx [8403:c101438c69a4]quic by
- HTTP/3: prevent array access by negative index for unknown streams. …
- 12:34 Changeset in nginx [8406:66feab03d9b7]quic by
- HTTP/3: restricted symbols in header names. As per HTTP/3 draft 27, a …
- 12:29 Changeset in nginx [8405:d2759e4cc437]quic by
- HTTP/3: split header parser in two functions. The first one parses …
- 11:54 Changeset in nginx_org [2542:bde7cd9a1173] by
- Added examples of state path to keyval.
- 11:43 Changeset in nginx_org [2548:ffc4083f5c7e] by
- Documented ssl_ocsp, ssl_ocsp_cache, ssl_ocsp_responder directives.
05/18/20:
- 19:10 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- See also #1981.
- 19:09 Ticket #1981 (no logging of HTTP/1.x requests to a plain text HTTP/2 listening socket) updated by
-
Status, Summary changed
You were given an explanation (see ticket:1979#comment:1), and … - 17:49 Ticket #1981 (no logging of HTTP/1.x requests to a plain text HTTP/2 listening socket) created by
- Hi, two days ago you closed my ticket without offering me further …
- 14:11 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Replying to mmattel@…: > One thing pop´s up. When …
- 11:41 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Your example works. I do not know what went wrong on my side that this …
- 10:54 Changeset in nginx [8393:e169cce912c7]quic by
- Avoid retransmitting of packets with discarded keys. Sections 4.10.1 …
- 10:54 Changeset in nginx [8392:5ffb21c5c93d]quic by
- Fixed frame retransmissions. It was possible that retransmit timer …
- 01:03 Ticket #1869 (Wrong client IP in errors logged early in request processing when ...) updated by
- See also #1978, which is somewhat similar.
- 01:02 Ticket #1978 (Logging real client IP on invalid request) closed by
- wontfix: As long as there is a syntax error in the request line, nginx does not …
05/17/20:
- 16:17 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) closed by
- worksforme: Works fine here. Example configuration: […] Test request: […] …
- 16:02 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- See also #1979.
- 16:02 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) closed by
-
duplicate: Using
listen ... http2;
withoutssl
configures listening socket to … - 13:28 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Not a documentation ticket -> core
- 13:16 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) created by
- When using auth_basic (works great) and defining a custom 401 error …
- 11:24 Changeset in nginx [7651:6ca8e15caf1f] by
- OCSP stapling: keep extra chain in the staple object.
05/16/20:
- 20:42 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) updated by
- thank you for your wonderful server and hope I am not wasting your time.
- 20:40 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) created by
- Hi, I do not know if this is how nginx should behave, but it …
- 16:36 Ticket #1535 (proxy_bind and resolver IP version mismatch) updated by
- Hi! Adding support for several IPs would solve the whole issue. When …
- 06:51 Ticket #1978 (Logging real client IP on invalid request) created by
- We run nginx behind a proxy, which sets the X-Forwarded-For header …
05/15/20:
- 15:22 Changeset in nginx_org [2541:0e6bbd8138c4] by
- Added article about TypeScript in njs.
05/14/20:
- 18:04 Ticket #1971 (Invalid 200 (OK) response code to range request) updated by
- Any valid client is expected to handle 200 anyway, as servers are not …
- 17:39 Ticket #1971 (Invalid 200 (OK) response code to range request) updated by
- Frankly, this is a weird approach to use "...may ignore..." clause …
- 15:34 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) updated by
-
Priority changed
I believe it was demonstrated more than once that padding cannot … - 15:10 Changeset in nginx [8391:2d5db7faa788]quic by
- Removed outdated debug.
- 14:22 Changeset in nginx [8390:70dbd7d0e466]quic by
- Fixed a typo.
- 13:33 Changeset in nginx [8389:2b580ac17a47]quic by
- README: Retry support, protocol error messages implemented.
- 13:02 Changeset in nginx [8409:26cb2f3259b1]quic by
- HTTP/3: reallocate strings inserted into the dynamic table. They …
- 12:54 Changeset in nginx [8385:fb7422074258]quic by
- Added generation of CC frames with error on connection termination. …
- 12:47 Changeset in nginx [8384:52d0c4832570]quic by
- Address validation using NEW_TOKEN frame.
- 12:47 Changeset in nginx [8383:7ea34e13937f]quic by
- Address validation using Retry packets. The behaviour is toggled with …
- 11:49 Changeset in nginx [8404:e5d4f057a6cb]quic by
- HTTP/3: move body parser call out of ngx_http_parse_chunked(). The …
- 11:49 Changeset in nginx [8387:eebdda507ec3]quic by
- Added tests for connection id lengths in initial packet.
- 00:58 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) updated by
-
Description changed
- 00:56 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) created by
- The TLS specification (RFC 8446) section 5.4 defines optional Record …
05/13/20:
- 22:06 Changeset in nginx [8386:81f85c479d7e]quic by
- Discard packets without fixed bit or reserved bits set. Section 17.2 …
- 21:17 Ticket #698 (Add an option to proxy_cache_path that allows to set group permissions) closed by
- wontfix: Permissions are set on the cache directory and files in a such way …
- 15:34 Changeset in nginx [8382:b7704303a7e5]quic by
- Server CID change refactored.
- 14:02 Changeset in nginx [7649:3c8082c3f98a] by
- Upstream: jump out of loop after matching the status code.
- 10:01 Ticket #1888 (Nginx cache has multiple formats, and many of them are invalid during ...) updated by
- It is hoped that the cache file can be deleted through del, and key …
05/12/20:
- 21:06 Changeset in nginx_org [2540:b686736680e3] by
- Documented escaping rules in log_format.
- 15:45 Changeset in nginx [8388:a9cc1627cf1c]quic by
- Fixed time comparison.
- 15:18 Changeset in nginx [8381:6e100d8c138a]quic by
- Preserve original DCID and unbreak parsing 0-RTT packets. As per QUIC …
- 14:54 Ticket #972 (Clarify $arg_name and $args in embedded variables documentation) closed by
-
wontfix: The
$arg
, also known as$query_string
, represents query string as …
05/10/20:
- 17:32 Ticket #1970 (ssl_ecdh_curve avoid 0-RTT) closed by
- duplicate: Duplicate of #1969.
- 17:32 Ticket #1969 (ssl_ecdh_curve avoid 0-RTT) closed by
- invalid: This does not look like a bug in nginx, but rather a question about …
- 17:11 Ticket #1975 (Certificates in ssl_trusted_certificate doesn't have to be CA, docs ...) closed by
- wontfix: While strictly speaking you are right, and this can be used as a …
- 16:46 Ticket #1976 (Nginx DNS cache issue. ngx_http_core_module valid config is not working.) closed by
- invalid: Domain names used in nginx configuration are normally resolved during …
- 16:25 Ticket #1974 (Custom variable not written to access_log when nginx.status is 400) closed by
- invalid: When a 400 error occurs before request processing starts - for …
- 16:17 Ticket #1384 (request body may be corrupted when content-length is not set in ...) updated by
- See also #1973.
- 16:17 Ticket #1973 (Intermittent form body loss with concurrent HTTP2 POST requests) closed by
- duplicate: The 1.10.3 is the version obsolete more than 3 years ago. Further, in …
- 15:48 Ticket #1972 (Use of IRIs in redirect responses causes nginx to violate HTTP RFCs) closed by
-
wontfix: It certainly shouldn't auto-punycode. The
return
directive return …
05/09/20:
- 14:41 Changeset in nginx [8380:efe1f104caf7]quic by
- Removed redundant long packet type checks.
- 14:39 Changeset in nginx [8379:aecd8ec29c8e]quic by
- Removed redundant SSL_do_handshake call before any handshake data.
- 11:19 Ticket #1976 (Nginx DNS cache issue. ngx_http_core_module valid config is not working.) created by
- Setup: Ec2 instance with Nginx 1.12.2 behind an AWS Load balancer. …
- 07:38 Ticket #1975 (Certificates in ssl_trusted_certificate doesn't have to be CA, docs ...) created by
- http://nginx.org/en/docs/http/ngx_http_ssl_module.html …
05/08/20:
- 16:45 Changeset in nginx-tests [1569:cd6abbe0f989] by
- Tests: added generic tests for $arg_ variables.
- 16:19 Changeset in nginx [7648:028b16e2798f] by
- Variables: fixed buffer over-read when evaluating "$arg_".
- 13:46 Ticket #1974 (Custom variable not written to access_log when nginx.status is 400) created by
- TL;DR: A custom variable is not written to my access log file when the …
- 10:08 Changeset in nginx [8378:81a4f98a2556]quic by
- Cleaned up reordering code. The ordered frame handler is always …
- 02:24 Ticket #1971 (Invalid 200 (OK) response code to range request) closed by
- invalid: As per [https://tools.ietf.org/html/rfc7233#section-3.1 RFC 7233, …
05/07/20:
- 17:51 Ticket #1973 (Intermittent form body loss with concurrent HTTP2 POST requests) created by
- This was originally reported here: …
- 17:14 Ticket #1972 (Use of IRIs in redirect responses causes nginx to violate HTTP RFCs) created by
-
For example when you do this in a server block:
` return 301 …
- 09:34 Changeset in nginx [8377:2a94aaa70b33]quic by
- Cleaned up firefox workaround. The idea is to skip any zeroes that …
- 08:22 Ticket #1971 (Invalid 200 (OK) response code to range request) created by
- Observed behaviour: nginx responds with 200 (OK) to 0-10 ranged …
- 00:08 Ticket #972 (Clarify $arg_name and $args in embedded variables documentation) reopened by
- I respectfully disagree. It's not only the question of how HTTP …
05/06/20:
- 18:44 Changeset in nginx [7650:abb6cc8f1dd8] by
- OCSP stapling: moved response verification to a separate function.
- 12:52 Changeset in nginx-tests [1568:4cc012205ac5] by
- Tests: added js tests for raw headers API.
- 12:08 Changeset in nginx-tests [1567:726877fc4b08] by
- Tests: fixed js_subrequest.t compatibility to 0.3.7. This fixes …
- 11:34 Changeset in nginx [8376:2d0f4aa78ed6]quic by
- Restored ngx_quic_encrypt return type. It was inadvertently changed …
- 11:22 Ticket #1970 (ssl_ecdh_curve avoid 0-RTT) created by
- if i set ssl_ecdh_curve secp521r1:secp384r1; ssllabs show 0-RTT No if …
- 11:20 Ticket #1969 (ssl_ecdh_curve avoid 0-RTT) created by
- if i set ssl_ecdh_curve secp521r1:secp384r1; ssllabs show 0-RTT No if …
05/05/20:
- 21:04 Ticket #676 (Different ssl_protocols per server won`t work) updated by
- See also #1967, #1968.
- 21:04 Ticket #1968 (Cannot use different SSL protocols in different server blocks) closed by
- duplicate
- 21:04 Ticket #1967 (Cannot use different SSL protocols in different server blocks) closed by
- duplicate
- 21:03 Ticket #1968 (Cannot use different SSL protocols in different server blocks) updated by
- Duplicate of #676.
- 21:03 Ticket #1967 (Cannot use different SSL protocols in different server blocks) updated by
- Duplicate of #676.
- 21:01 Ticket #1123 (Include timezone in error logs) closed by
- wontfix: The access log format uses time with timezone by default for …
- 20:44 Ticket #1966 (MKCOL refuses creation without trailing slash) closed by
- duplicate: Ok, thanks for your feedback. The clarifying text is available in the …
- 17:50 Ticket #1123 (Include timezone in error logs) updated by
- Just found this to be the case, similar to apache. Kind of dumbfounded …
- 10:43 Ticket #1968 (Cannot use different SSL protocols in different server blocks) created by
- Nginx cannot use different ssl_protocols in different server blocks …
- 10:40 Ticket #1967 (Cannot use different SSL protocols in different server blocks) created by
- Nginx cannot use different ssl_protocols in different server blocks …
- 07:47 Ticket #1966 (MKCOL refuses creation without trailing slash) updated by
- If nginx wants to be strict here I'm perfectly fine with it and …
05/04/20:
- 22:34 Ticket #604 (WebDAV: мелкие косяки) updated by
- See also #1966.
- 22:29 Ticket #1966 (MKCOL refuses creation without trailing slash) updated by
- This was previously discussed in #604 (mostly in Russian, …
- 12:20 Ticket #698 (Add an option to proxy_cache_path that allows to set group permissions) updated by
- Hi, I revived patch. You can review it here …
- 10:37 Ticket #1966 (MKCOL refuses creation without trailing slash) created by
- Some WebDAV clients that create collections do that without including …
05/01/20:
- 10:02 Changeset in nginx [8374:8712f4583783]quic by
- Configure: fixed static compilation with OpenSSL 1.1.1 / BoringSSL. …
04/30/20:
- 19:03 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- Replying to Andrei Belov: > We do not maintain those ppas. …
- 18:32 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- We do not maintain those ppas. We do maintain our own repositories, …
- 12:59 Changeset in nginx [8373:796b5b6c43cd]quic by
- Mention quic branch in README.
- 12:47 Changeset in nginx [8372:0e6528551f26]quic by
- Configure: unbreak with old OpenSSL, --with-http_v3_module added.
- 09:38 Changeset in nginx [8370:262396242352]quic by
- Reworked macros for parsing/assembling packet types. Previously, …
- 09:22 Changeset in nginx [8375:0aa6b02a1546]quic by
- Store clearflags in pkt->flags after decryption. It doesn't make …
- 07:55 Ticket #753 (Nginx leaves UNIX domain sockets after SIGQUIT) updated by
- Just a further comment to try and raise the profile of this issue. …
- 07:24 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- http://ppa.launchpad.net/nginx/stable/ubuntu/dists/ …
04/29/20:
- 18:41 Ticket #1678 (limit_rate and proxy_limit_rate broken from 1.14) updated by
- See also #1965.
- 18:41 Ticket #1965 ($request_time less than $upstream_response_time) updated by
-
Status changed
That's because$upstream_response_time
uses monotonic time as … - 12:33 Changeset in nginx-tests [1566:5cf2f4da8bd5] by
- Tests: added js tests for multi-values headers in r.headersIn.
- 12:33 Changeset in nginx-tests [1565:84a1e16819e5] by
- Tests: js TODO adjusted.
- 11:59 Changeset in nginx [8369:bddf704d62c1]quic by
- Renamed retransmit event object in preparation for retry support.
- 11:45 Changeset in nginx [8371:9d9531431c8c]quic by
- Removed outdated/incorrect comments and fixed style. - we need …
- 08:47 Ticket #1955 (Ubuntu 20.04 (Focal) support) closed by
- fixed: Latest mainline (1.17.10) and stable (1.18.0) versions built for …
- 08:29 Changeset in nginx_org [2539:5a5a791b3166] by
- Linux packages: added Ubuntu 20.04, removed 19.04.
- 05:35 Ticket #1965 ($request_time less than $upstream_response_time) updated by
-
Description changed
- 05:33 Ticket #1965 ($request_time less than $upstream_response_time) created by
- nginx logformat: log_format main escape=json '{ …
04/28/20:
- 15:44 Changeset in nginx-tests [1564:fe938b5daf80] by
- Tests: more grpc tests with discarded request body.
- 15:24 Changeset in nginx [8368:89ccb04736b9]quic by
- Server CID change.
- 15:23 Changeset in nginx [8367:c10e7d48aa85]quic by
- Factored out sending ACK from payload handler. Now there's no need to …
- 15:16 Changeset in nginx [8366:3e894ace66ee]quic by
- Added README.
- 13:42 Changeset in nginx [8364:eee307399229]quic by
- QUIC basic congestion control.
- 13:37 Changeset in nginx [8365:fab75acb1f72]quic by
- Respect MAX_DATA and MAX_STREAM_DATA from QUIC client.
- 10:15 Ticket #1955 (Ubuntu 20.04 (Focal) support) updated by
- Yes, we're already working on this. Thanks for your attention.
- 10:13 Changeset in nginx_org [2538:8e1c53284176] by
- Updated OpenSSL version used for win32 builds.
- 10:12 Changeset in nginx_org [2537:d6bbfd20c82f] by
- Rephrased a sentence in r.headersOut in njs.
Note:
See TracTimeline
for information about the timeline view.