Timeline



07/09/20:

14:33 Changeset in nginx [7683:fac6e1a46206] by Roman Arutyunyan <arut@…>
Version bump.
14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by Maxim Dounin
Status changed
14:13 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by Maxim Dounin
Thanks, it's a known issue that keepalive settings are applied …
13:40 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by Maxim Dounin
> So it would be nice if try_files passes through the auth_basic off; …
13:25 Ticket #2014 (nginx dynamic configuration reload is jittery) closed by Maxim Dounin
invalid: Updating configuration implies that nginx will start new worker …
13:21 Changeset in nginx [7684:32a343635b50] by Roman Arutyunyan <arut@…>
Slice filter: clear original Accept-Ranges. The slice filter allows …

07/08/20:

08:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by royduineveld@…
That makes sense, ended up with: […] What I wanted and meant was …

07/07/20:

22:32 Ticket #2014 (nginx dynamic configuration reload is jittery) created by udaysha01@…
I am trying to use nginx as a reverse proxy, listening on a port and …
17:21 Changeset in nginx_org [2564:5aa57c656cbf] by Yaroslav Zhuravlev <yar@…>
Documented TypedArray.prototype.sort() in njs.
16:33 Changeset in nginx_org [2566:ca1ccafab5ef] by Yaroslav Zhuravlev <yar@…>
njs-0.4.2.
16:12 Milestone njs-0.4.2 completed
Planned features and enhancements: * Line level backtrace * The …
16:12 Milestone nginx-1.19.1 completed
Status: scheduled Trunk: mainline * proxy_cache_path's …
16:01 Changeset in nginx_org [2562:55da8df41bfd] by Maxim Dounin <mdounin@…>
nginx-1.19.1
15:56 Changeset in nginx [7682:2ab0ecfe5a5f] by Maxim Dounin <mdounin@…>
release-1.19.1 tag
15:56 Changeset in nginx [7681:062920e2f3bf]release-1.19.1 by Maxim Dounin <mdounin@…>
nginx-1.19.1-RELEASE
15:47 Ticket #2013 (auth_basic cannot be overwritten from other context) closed by Maxim Dounin
invalid: You've claimed you've tested the curl -IL https://website.com/api, …
15:25 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by royduineveld@…
Found it! I think it's not a bug but maybe this can be explained …
15:02 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by Maxim Dounin
Ok, so please test the configuration you've provided in the ticket …
14:45 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by royduineveld@…
I'm testing the same way as you did: […] […] It doesn't even …
14:26 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by Maxim Dounin
Replying to royduineveld@…: > But I'm still having the …
14:05 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by royduineveld@…
Just updated to 1.18.0: […] But I'm still having the same problem. …
13:26 Changeset in nginx_org [2565:45cb60b3b7b2] by Yaroslav Zhuravlev <yar@…>
Updated Compatibility for njs-0.4.2.
13:26 Changeset in nginx_org [2563:428a8cf1911b] by Yaroslav Zhuravlev <yar@…>
Documented mkdirSync, readdirSync, rmdirSync, fs.Dirent in njs.
12:51 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by Maxim Dounin
Works fine here: […] While the version you are using is old and …
12:48 Ticket #2013 (auth_basic cannot be overwritten from other context) updated by royduineveld@…
Description changed
12:33 Ticket #2013 (auth_basic cannot be overwritten from other context) created by royduineveld@…
The documentation says: "The special value off allows cancelling the …

07/06/20:

23:30 Ticket #1689 (Writing connections leak with http/2) updated by Maxim Dounin
Replying to PenelopeFudd@…: > I had this problem, and …
18:05 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) closed by Maxim Dounin
fixed: Should be fixed for all protocols now.
18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by Maxim Dounin <mdounin@…>
In [changeset:"39501ce97e296b4cd36fc81388a2dc66f2601edd/nginx"
18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by Maxim Dounin <mdounin@…>
In [changeset:"05e42236e95b8171ab8fe116f5b498f17a1e1547/nginx"
18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by Maxim Dounin <mdounin@…>
In [changeset:"bffcc5af1d7281c8e5fc93a28bb6f9d77a99f7fe/nginx"
18:01 Ticket #1695 (Data is corrupted in static large objects (SLO swift API) when using ...) updated by Maxim Dounin <mdounin@…>
In [changeset:"9afa45068b8f76ff5e102dc14f594caa69899b17/nginx"
15:37 Changeset in nginx-tests [1581:463d6863d360] by Maxim Dounin <mdounin@…>
Tests: tests for extra data and short responses.
15:36 Changeset in nginx [7680:39501ce97e29] by Maxim Dounin <mdounin@…>
gRPC: generate error when response size is wrong. As long as the …
15:36 Changeset in nginx [7679:05e42236e95b] by Maxim Dounin <mdounin@…>
FastCGI: protection from responses with wrong length. Previous …
15:36 Changeset in nginx [7678:bffcc5af1d72] by Maxim Dounin <mdounin@…>
Upstream: drop extra data sent by upstream. Previous behaviour was to …
15:36 Changeset in nginx [7677:a786e491d08d] by Maxim Dounin <mdounin@…>
Proxy: style.
15:36 Changeset in nginx [7676:d225b70d38b6] by Maxim Dounin <mdounin@…>
Proxy: detection of data after final chunk. Previously, additional …
15:36 Changeset in nginx [7675:9afa45068b8f] by Maxim Dounin <mdounin@…>
Proxy: drop extra data sent by upstream. Previous behaviour was to …
15:36 Changeset in nginx [7674:7731c710796f] by Maxim Dounin <mdounin@…>
Memcached: protect from too long responses. If a memcached response …
15:01 Changeset in nginx-tests [1580:9e142c0e34b2] by Sergey Kandaurov <pluknet@…>
Tests: allowed syslog messages arrival out-of-order. Reported by …
12:38 Changeset in nginx-tests [1579:14eeaa39599d] by Sergey Kandaurov <pluknet@…>
Tests: HTTP/2 tests for lingering close.

07/05/20:

16:01 Ticket #2012 (Wrong header Connection, when keepalive is disabled) updated by seregaizsbera@…
When I rearrange this configuration […] into this […] nginx …

07/04/20:

22:11 nginx-T.txt attached to Ticket #2012 by seregaizsbera@…
nginx -T
22:10 Ticket #2012 (Wrong header Connection, when keepalive is disabled) created by seregaizsbera@…
I disabled keepalive with directives keepalive_timeout 0 and …

07/03/20:

17:25 Ticket #1689 (Writing connections leak with http/2) reopened by PenelopeFudd@…
I had this problem, and upgraded nginx to v1.18 (and now to v1.19). …
13:41 Changeset in nginx [8463:2576485b93d4]quic by Roman Arutyunyan <arut@…>
HTTP/3: fixed overflow in prefixed integer parser. Previously, the …
13:29 Ticket #1544 (http/2 downloads broken during reload) closed by Ruslan Ermilov
fixed: HTTP/2 connections now support lingering close mechanism.
13:29 Ticket #1250 (Connection reset with low http2_max_requests) closed by Ruslan Ermilov
fixed: HTTP/2 connections now support lingering close mechanism.
13:25 Tickets #1250,​1544 batch updated by Ruslan Ermilov <ru@…>
In [changeset:"c5840ca2063d26e432264ad0b0fe00c0bd94252c/nginx"
13:23 Changeset in nginx_org [2561:397289aeada7] by Yaroslav Zhuravlev <yar@…>
Improved Russian wording in "min_free" parameter.
13:16 Changeset in nginx [7673:c5840ca2063d] by Ruslan Ermilov <ru@…>
HTTP/2: lingering close after GOAWAY. After sending the GOAWAY frame, …
11:04 Changeset in nginx_org [2560:a5bbfdf88bbd] by Yaroslav Zhuravlev <yar@…>
Documented the "min_free" parameter of proxy_cache_path and friends.
09:07 Changeset in nginx [8466:4fd709540daf]quic by Roman Arutyunyan <arut@…>
HTTP/3: put ngx_http_v3_parse_varlen_int() return code in variable. …
09:05 Changeset in nginx [8465:5611bbb852ce]quic by Roman Arutyunyan <arut@…>
HTTP/3: simplifed handling ngx_http_v3_parse_literal() return code.
06:26 Changeset in nginx [8464:fdb8edc8e496]quic by Roman Arutyunyan <arut@…>
HTTP/3: limited prefixed integer size by 62 bits.

07/02/20:

17:07 Changeset in nginx [8467:e02250b55b17]quic by Roman Arutyunyan <arut@…>
HTTP/3: simplified handling return codes from parse functions.
15:45 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) closed by Maxim Dounin
duplicate: Yes, this is clearly a duplicate of #147.
15:44 Ticket #147 (nginx touched /var/log/nginx-error.log even when error_log are switched off) updated by Maxim Dounin
See also #2011.
14:35 Changeset in nginx [8462:153bffee3d7e]quic by Sergey Kandaurov <pluknet@…>
HTTP/3: fixed prefix in decoding Section Acknowledgement.
13:47 Changeset in nginx [8460:72f9ff4e0a88]quic by Roman Arutyunyan <arut@…>
HTTP/3: close QUIC connection with HTTP/QPACK errors when needed. …
13:33 Changeset in nginx [8458:e0f92f68e018]quic by Roman Arutyunyan <arut@…>
QUIC: Introduced ngx_quic_finalize_connection(). The function …
13:33 Changeset in nginx [8457:a7f64438aa3c]quic by Roman Arutyunyan <arut@…>
HTTP/3: downgraded literal size error level to NGX_LOG_INFO. Now it's …
12:34 Changeset in nginx [8456:c9538aef3211]quic by Roman Arutyunyan <arut@…>
HTTP/3: refactored dynamic table implementation. Previously dynamic …
12:15 Changeset in nginx [8455:b0e81f49d7c0]quic by Roman Arutyunyan <arut@…>
HTTP/3: fixed prefixed integer encoding and decoding. Previously …

07/01/20:

17:14 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) updated by dan.streetman.canonical.com@…
Ah this is probably the same as https://trac.nginx.org/nginx/ticket/147
17:10 Ticket #2011 (confusing stderr message 'could not open error log file: open() ...) created by dan.streetman.canonical.com@…
In src/core/nginx.c, in ngx_cdecl(), the commandline parameters are …
06:59 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by aaribaud@…
Thank you! That's exactly this. I do indeed use realip, and switching …

06/30/20:

19:07 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) updated by Roman Arutyunyan
I assume you also have the realip module enabled in your second server …
14:45 Ticket #2010 (Proxy protocol headers from stream module reported as broken by http module) created by aaribaud@…
Using a NGINX configuration where: - a stream server listens on …
14:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by Maxim Dounin
invalid: > Who needs an unescaped variable which they cannot use in URLs? This …
12:32 Changeset in nginx [8461:b3c07aa021f6]quic by Roman Arutyunyan <arut@…>
HTTP/3: set r->headers_in.chunked flag after parsing headers. …
09:30 Changeset in nginx [8459:1ed698947172]quic by Roman Arutyunyan <arut@…>
HTTP/3: error code definitions for HTTP/3 and QPACK.
09:11 Changeset in nginx-tests [1578:f55d25e08b3e] by Sergey Kandaurov <pluknet@…>
Tests: added "ssl_verify_client off" tests (ticket #2008).
05:16 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by cawoodm@…
I have asked where anyone needs an unescaped $1 and you have …

06/29/20:

21:19 Ticket #2008 (699f6e55bbb4 causes request for client certificate) closed by Maxim Dounin
fixed: Should be fixed now, thanks.
21:16 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by Maxim Dounin <mdounin@…>
In [changeset:"3dcb1aba894afd0125bdda4b05a4dda6dd1987f5/nginx"
21:09 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by Maxim Dounin
invalid: > Again I ask why is $1 decoded to foo bar and how can we get it …
14:15 Changeset in nginx [7672:3dcb1aba894a] by Maxim Dounin <mdounin@…>
SSL: fixed unexpected certificate requests (ticket #2008). Using …
12:56 Changeset in nginx [8454:032cb35ce758]quic by Roman Arutyunyan <arut@…>
HTTP/3: http3_max_field_size directive to limit string size. Client …
12:46 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by cawoodm@…
I think I see the complication which I forgot to explain: I am trying …

06/27/20:

17:54 Ticket #2009 (dfgdfg) closed by Maxim Dounin
invalid

06/26/20:

23:06 Ticket #2009 (dfgdfg) updated by rtfmoz2@…
Description changed
23:06 Ticket #2009 (dfgdfg) updated by rtfmoz2@…
mistake, delete pls
23:04 Ticket #2009 (dfgdfg) created by rtfmoz2@…
mistake, please delete
22:18 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by Maxim Dounin
Owner, Status changed
Thanks for reporting this, indeed looks like a bug introduced in …
08:58 Changeset in nginx [8453:c8cabb5d45f5]quic by Roman Arutyunyan <arut@…>
HTTP/3: introduced ngx_http_v3_get_module_srv_conf() macro. The macro …
07:05 Changeset in nginx [8452:a6675a976560]quic by Roman Arutyunyan <arut@…>
HTTP/3: fixed dropping first non-pseudo header.

06/25/20:

19:12 Ticket #2008 (699f6e55bbb4 causes request for client certificate) updated by hreinnbeck@…
Description changed
18:15 Ticket #2008 (699f6e55bbb4 causes request for client certificate) created by hreinnbeck@…
A few users (using Chrome and Safari) where getting request for client …
17:31 Changeset in nginx [8451:908cae4f3078]quic by Sergey Kandaurov <pluknet@…>
HTTP/3: do not emit a DATA frame header for header_only responses. …
12:12 Changeset in nginx_org [2559:82e6029db0c0] by Yaroslav Zhuravlev <yar@…>
Updated with Netcraft June 2020 Web Server Survey stats.
11:45 Ticket #1909 (http2_push not pushing the file) updated by Ruslan Ermilov
Owner, Status changed
11:41 Ticket #1909 (http2_push not pushing the file) updated by Ruslan Ermilov
If the client has not disabled "pushes" via the SETTINGS frame, and it …
08:43 Ticket #2007 (HTTP2 directive from one "server" passed to another) closed by Maxim Dounin
duplicate: Duplicate of #1623.

06/24/20:

07:43 Ticket #1057 (Google QUIC - statement) updated by maxim
Hello, We announced an experimental nginx-quic repo some time ago, …
07:06 Ticket #2007 (HTTP2 directive from one "server" passed to another) updated by pupkur@…
Please change component
07:00 Ticket #2007 (HTTP2 directive from one "server" passed to another) created by pupkur@…
Linux 3.10.0-1062.4.1.el7.x86_64 #1 SMP x86_64 GNU/Linux nginx.conf …

06/23/20:

09:28 Changeset in nginx_org [2558:f2ffb29e5a3a] by Maxim Konovalov <maxim@…>
Regenerated.
09:28 Changeset in nginx_org [2557:7c020a4ef753] by Maxim Konovalov <maxim@…>
The App Protect promo updated.
08:57 Changeset in nginx [8449:3c32717d7bb2]quic by Sergey Kandaurov <pluknet@…>
README: documented draft-28, draft-29 support.
08:57 Changeset in nginx [8448:011668fc9efd]quic by Sergey Kandaurov <pluknet@…>
Update Initial salt and Retry secret from quic-tls-29. See sections …
08:57 Changeset in nginx [8447:97adb87f149b]quic by Sergey Kandaurov <pluknet@…>
Get rid of hardcoded numbers used for quic handshake errors.
08:57 Changeset in nginx [8446:df29219988bc]quic by Sergey Kandaurov <pluknet@…>
Discard short packets which could not be decrypted. So that …
08:57 Changeset in nginx [8445:3de1b7399650]quic by Sergey Kandaurov <pluknet@…>
Close connection with PROTOCOL_VIOLATION on decryption failure. A …
08:57 Changeset in nginx [8444:769d8bdeffb0]quic by Sergey Kandaurov <pluknet@…>
Define KEY_UPDATE_ERROR from quic-tls-24.
08:57 Changeset in nginx [8443:3b5fbf1bcdee]quic by Sergey Kandaurov <pluknet@…>
Reject new QUIC connection with CONNECTION_REFUSED on shutdown.
08:57 Changeset in nginx [8442:b9bce2c4fe33]quic by Sergey Kandaurov <pluknet@…>
Close QUIC connection with NO_ERROR on c->close. That way it makes …
08:57 Changeset in nginx [8441:db8fe75c9c7a]quic by Sergey Kandaurov <pluknet@…>
Do not close QUIC sockets in ngx_close_listening_sockets(). This …
08:57 Changeset in nginx [8440:f9592e804834]quic by Sergey Kandaurov <pluknet@…>
QUIC error SERVER_BUSY renamed to CONNECTION_REFUSED in draft-29.

06/22/20:

16:36 Ticket #157 (cache max_size limit applied incorrectly with xfs) closed by Maxim Dounin
fixed: Should be fixed now.
16:32 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) closed by Maxim Dounin
fixed: Should be fixed now. Note though that it is generally a bad idea to …
16:20 Ticket #157 (cache max_size limit applied incorrectly with xfs) updated by Maxim Dounin <mdounin@…>
In [changeset:"52b34c3f89b460d29228abc79aa96e39b12101c1/nginx"
16:20 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) updated by Maxim Dounin <mdounin@…>
In [changeset:"0a04e5e4c40b018f3010ee7e947da249bc978baa/nginx"
15:03 Changeset in nginx [7670:ccb5ff87ab3e] by Maxim Dounin <mdounin@…>
Cache: introduced min_free cache clearing. Clearing cache based on …
15:02 Changeset in nginx [7669:52b34c3f89b4] by Maxim Dounin <mdounin@…>
Too large st_blocks values are now ignored (ticket #157). With XFS, …
15:02 Changeset in nginx [7668:0a04e5e4c40b] by Maxim Dounin <mdounin@…>
Large block sizes on Linux are now ignored (ticket #1168). NFS on …

06/21/20:

21:00 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) closed by Maxim Dounin
invalid: It looks like redirects returned by your backend are changed to …
14:06 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) updated by legale@…
Description changed
14:05 Ticket #2006 (unusual behavior when proxy_set_header Host $host defined) created by legale@…
Config 1 with Host header replacement: location /phpinfo { …

06/19/20:

15:21 Changeset in nginx-tests [1577:804a7409bc63] by Sergey Kandaurov <pluknet@…>
Tests: added ssl_ocsp test with failing request.
13:15 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) closed by Maxim Dounin
duplicate: Duplicate of #1520.
13:15 Ticket #1520 (HTTP/2 connection dropped when URL has large numbers of same parameter) updated by Maxim Dounin
See also #2005.
11:48 Changeset in nginx_org [2556:c81b1fadbcf3] by Yaroslav Zhuravlev <yar@…>
Updated hello_world example in njs.
11:28 Changeset in nginx_org [2555:5b2764724e0d] by Yaroslav Zhuravlev <yar@…>
Added list of supported OSes to njs.
08:41 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) updated by arekm.maven.pl@…
raising http2_max_field_size 64k; helps. There is some …
08:29 Changeset in nginx [8450:a62849b6463c]quic by Vladimir Homutov <vl@…>
Style.
07:17 Ticket #1785 (Support access to environment variables in config file) updated by edrandall@…
+1 for this, here is our use-case: In a kubernetes environment where …
06:52 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) updated by arekm.maven.pl@…
large_client_header_buffers 8 512k; in http section doesn't help. …
06:46 Ticket #2005 (nginx closes connection instead of returning proper error code (like ...) created by arekm.maven.pl@…
When http2 is enabled and too long GET is issued nginx closes …

06/18/20:

16:31 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) closed by Maxim Dounin
worksforme: Feedback timeout.
16:22 Ticket #1990 (proxy_cache_min_uses not counted per variant on initial requests) closed by Maxim Dounin
wontfix: The problem is that it is not possible to determine the variant …
15:21 Ticket #1989 (Nginx not displaying progressive image when in http2) closed by Maxim Dounin
worksforme: Feedback timeout.
13:09 Ticket #2004 (nginx temp files deleting problem) updated by Maxim Dounin
Please elaborate what makes you think that the observed deleted files …
12:40 Changeset in nginx_org [2554:62523c26ddf3] by Yaroslav Zhuravlev <yar@…>
Updated OpenSSL version used for win32 builds.
11:29 Changeset in nginx [8439:cef417a24755]quic by Vladimir Homutov <vl@…>
QUIC: cleaned up quic encryption state tracking. The patch removes …
10:58 Changeset in nginx [8438:a2c34e77cfc1]quic by Vladimir Homutov <vl@…>
QUIC: added ALPN checks. quic-transport draft 29: section 7: …
09:42 Changeset in nginx-tests [1576:8177323823d6] by Sergey Kandaurov <pluknet@…>
Tests: proxy_cache_path with min_free parameter.
09:25 Ticket #2004 (nginx temp files deleting problem) created by oleg9301@…
~# df -h /dev/sda1 15G 11G 4,3G 71% / ~# lsof | grep …
08:16 Changeset in nginx [8437:4e75267865de]quic by Vladimir Homutov <vl@…>
QUIC: fixed off-by-one in frame range handler. The ctx->pnum is …

06/17/20:

12:55 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) closed by Maxim Dounin
invalid: > Do you mean by "unescaped" that the URL is decoded from /foo%20bar …
12:23 Ticket #1738 (NGINX Not Honoring proxy_cache_background_update with Cache-Control: ...) updated by Maxim Dounin
As long as Request 4 is in the same connection as Request 3, it is …
06:23 Ticket #1738 (NGINX Not Honoring proxy_cache_background_update with Cache-Control: ...) updated by capraynor@…
Hi, Team: Same issue here. We are using …
05:02 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) reopened by marc.cawood.buhlergroup.com@…
See above.

06/16/20:

18:25 Changeset in nginx-tests [1575:577e72267fec] by Maxim Dounin <mdounin@…>
Tests: uwsgi tests with SSL.
08:54 Changeset in nginx [8436:9fe7875ce4bb]quic by Vladimir Homutov <vl@…>
QUIC: further limiting maximum QUIC packet size. quic-transport draft …
06:00 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) updated by marc.cawood.buhlergroup.com@…
Note: in our scenario we are rewriting /foo%20bar to …
05:56 Ticket #1930 (Space in URL %20 is decoded space causing an invalid URL) updated by marc.cawood.buhlergroup.com@…
> you are using $1$is_args$args, where $1 comes from unescaped URI as …

06/15/20:

21:35 Changeset in nginx [7666:8cf31489b479] by Quantum <quantum2048@…>
Correctly flush request body to uwsgi with SSL. The flush flag was …
17:17 Changeset in nginx [7667:1ece2ac2555a] by Roman Arutyunyan <arut@…>
OCSP: fixed use-after-free on error. When validating second and …
14:06 Changeset in nginx [8435:5bc9229ec4cf]quic by Vladimir Homutov <vl@…>
QUIC: raise error on missing transport parameters. quic-tls, 8.2: …
13:59 Changeset in nginx [8434:ea4899591798]quic by Vladimir Homutov <vl@…>
QUIC: Fixed connection cleanup. A posted event need to be deleted …
07:58 Changeset in nginx [7671:7e0719fb528b] by Eran Kornblau <erankor@…>
Fixed potential leak of temp pool. In case ngx_hash_add_key() fails, …

06/13/20:

22:37 Ticket #2003 (regex generated variable loses character encoding when used in ...) closed by Maxim Dounin
invalid: The stackoveflow post uses a part of the unencoded URI as used in …
22:18 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by Maxim Dounin
The first byte of the message body encoded with chunked encoding must …
15:00 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by lamba92@…
I was using the IntelliJ HTTP tool and noticed that the request is …

06/12/20:

09:22 Ticket #2003 (regex generated variable loses character encoding when used in ...) created by excudo@…
I had exactly the same problem as is described in this stackoverflow …

06/11/20:

16:48 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) closed by Yaroslav Zhuravlev
fixed: Thank you, fixed: …

06/10/20:

22:46 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) updated by Maxim Dounin
Owner, Status changed
Thanks for catching this. Correct instruction can be found at the …
18:37 Changeset in nginx [8433:7672ec1e6227]quic by Vladimir Homutov <vl@…>
Style.
18:37 Changeset in nginx [8432:391d06a51bc0]quic by Vladimir Homutov <vl@…>
Limited max udp payload size for outgoing packets. This allows to …
18:33 Changeset in nginx [8431:70335ec6e5d4]quic by Vladimir Homutov <vl@…>
Increased default initial retransmit timeout. This is a temporary …
18:23 Changeset in nginx [8430:6fec79e43694]quic by Vladimir Homutov <vl@…>
Fixed usage of own/client transport parameters.
15:26 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by Maxim Dounin
Quoting the keepalive_requests
12:35 Changeset in nginx-tests [1574:42e37e0434d5] by Sergey Kandaurov <pluknet@…>
Tests: stream udp tests with zero-length payload (ticket #1982).
12:27 Changeset in nginx_org [2553:bde70d0a34eb] by Yaroslav Zhuravlev <yar@…>
Updated with Netcraft May 2020 Web Server Survey stats.
00:58 Ticket #2002 (Documentation: NGINX Open Source Alpine installation documentation ...) created by Moro-Code@…
I was not sure where to report this. I spoke to members of the IRC …

06/09/20:

21:02 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by 2clarkd@…
Description changed
21:00 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by 2clarkd@…
Description changed
20:53 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by 2clarkd@…
Description changed
20:44 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) created by 2clarkd@…
*summary*: Persisting upstream connections for a large number of …
19:44 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) closed by vl
fixed
19:05 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) updated by Vladimir Homutov <vl@…>
In [changeset:"d127837c714f398e04cc8cf26f922c845fb7a6e8/nginx"
00:44 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by Maxim Dounin
> Just one question tho, why Chrome and other clients correctly …
Note: See TracTimeline for information about the timeline view.