Timeline



02/12/21:

11:51 Changeset in nginx [8698:9ed95726b99b]quic by Roman Arutyunyan <arut@…>
QUIC: send PING frames on PTO expiration. Two PING frames are sent …
11:40 Changeset in nginx [8697:faa3201ff351]quic by Roman Arutyunyan <arut@…>
QUIC: improved setting the lost timer. Setting the timer is brought …

02/11/21:

18:52 Changeset in nginx [7774:827202ca1269] by Maxim Dounin <mdounin@…>
HTTP/2: removed http2_max_field_size and http2_max_header_size. …
18:52 Changeset in nginx [7773:b64f553b1291] by Maxim Dounin <mdounin@…>
HTTP/2: keepalive_timeout now armed once between requests. …
18:52 Changeset in nginx [7772:f790816a0e87] by Maxim Dounin <mdounin@…>
HTTP/2: removed http2_idle_timeout and http2_max_requests. Instead, …
18:52 Changeset in nginx [7771:02be1baed382] by Maxim Dounin <mdounin@…>
HTTP/2: removed http2_recv_timeout. Instead, the …
18:52 Changeset in nginx [7770:de0b6f1fe4e4] by Maxim Dounin <mdounin@…>
HTTP/2: removed SPDY directives handling. The spdy_* directives are …
18:52 Changeset in nginx [7769:0a5687a458de] by Maxim Dounin <mdounin@…>
HTTP/2: fixed reusing connections with active requests. New …
18:52 Changeset in nginx [7768:fc536dcdbbf7] by Maxim Dounin <mdounin@…>
HTTP/2: reuse of connections with incomplete frames. Prodded by …
18:52 Changeset in nginx [7767:6d98f29867e8] by Maxim Dounin <mdounin@…>
Additional connections reuse. If ngx_drain_connections() fails to …
18:52 Changeset in nginx [7766:3e83336cda5b] by Maxim Dounin <mdounin@…>
Reuse of connections in lingering close. This is particularly …

02/10/21:

12:13 Changeset in nginx-tests [1653:259dfb223f9a] by Sergey Kandaurov <pluknet@…>
Tests: compatibility with http2_max_header/field_size removal. Tests …
12:13 Changeset in nginx-tests [1652:21f511a7f5c3] by Sergey Kandaurov <pluknet@…>
Tests: compatibility with http2_max_requests removal.
12:12 Changeset in nginx-tests [1651:a78eedc39484] by Sergey Kandaurov <pluknet@…>
Tests: h2.t tests speedup.
11:36 Changeset in nginx_org [2652:eb508d8c1c31] by Konstantin Pavlov <thresh@…>
Linux packages: added RHEL/CentOS 7 aarch64/arm64.
11:10 Changeset in nginx [8699:e24e5650d7b4]quic by Vladimir Homutov <vl@…>
QUIC: distinguish reserved transport parameters in logging. 18.1. …

02/09/21:

13:37 Ticket #2137 (TLS1.3) closed by Maxim Dounin
invalid: > nginx version: nginx/1.14.1 > built with OpenSSL 1.1.0f 25 May 2017 …
13:37 Ticket #1654 (nginx does not honor ssl_protocols for TLSv1.3) updated by Maxim Dounin
See also #2137.
13:15 Ticket #1623 (HTTP/2 config applied globally) updated by Maxim Dounin
See also #2136.
13:14 Ticket #2136 (When I connect http2 to one server on 80 port, then it propagates to ...) closed by Maxim Dounin
duplicate
13:14 Ticket #2136 (When I connect http2 to one server on 80 port, then it propagates to ...) updated by Maxim Dounin
That's because 'http2' parameter configures listening socket to use …
11:31 Changeset in nginx [8695:0b3d70fbba99]quic by Roman Arutyunyan <arut@…>
QUIC: fixed logging ACK frames. Previously, the wrong end pointer was …
11:24 Changeset in nginx-tests [1650:cdba06625d65] by Sergey Kandaurov <pluknet@…>
Tests: simplified testing configuration in h2.t. After removing …
10:50 Changeset in nginx-tests [1649:20e0ec3b4dec] by Sergey Kandaurov <pluknet@…>
Tests: removed a duplicate HTTP/2 graceful shutdown test. A similar …
09:26 Ticket #2137 (TLS1.3) updated by KvanSteijn@…
Description changed
09:18 Ticket #2137 (TLS1.3) created by KvanSteijn@…
I am completely confuse about TLS 1.3. I have a server running on …
07:51 Changeset in nginx-tests [1648:48d8c16d48ea] by Sergey Kandaurov <pluknet@…>
Tests: HTTP/2 connection timeout tests removed. Both …

02/08/21:

20:49 Ticket #2136 (When I connect http2 to one server on 80 port, then it propagates to ...) created by advancedtechnoking@…
When I use http2 on one server on 80 port, that propogate http2 to …
17:48 Changeset in nginx [8700:75603531064a]quic by Vladimir Homutov <vl@…>
QUIC: updated list of transport parameters to be sent. The …
17:17 Changeset in nginx-tests [1647:35beaf85de72] by Sergey Kandaurov <pluknet@…>
Tests: sorted h2.t tests. A test for partial request body is moved …
16:47 Changeset in nginx-tests [1646:5b1fa6e32549] by Sergey Kandaurov <pluknet@…>
Tests: avoid http2_max_field_size in h2_trailers.t. URI used to pass …
16:47 Changeset in nginx-tests [1645:0190dd24d328] by Sergey Kandaurov <pluknet@…>
Tests: removed unnecessary http2 directives from grpc_ssl.t. They …
14:09 Changeset in nginx-tests [1644:f89ff07b6ac0] by Sergey Kandaurov <pluknet@…>
Tests: proxy_protocol tests with unix socket.
13:49 Changeset in nginx [8694:cef042935003]quic by Vladimir Homutov <vl@…>
QUIC: the "quic_host_key" directive. The token generation in QUIC is …
13:30 Ticket #2135 (capture negotiated ssl_curve) updated by Geert Hendrickx
Thanks for your thoughts. We'll derive it from $ssl_curves like you …
12:30 Changeset in nginx_org [2651:b4991bbd64ee] by Yaroslav Zhuravlev <yar@…>
Documented the js_header_filter directive.
03:15 Ticket #2135 (capture negotiated ssl_curve) updated by Maxim Dounin
While it might be interesting, it seems that OpenSSL currently …

02/05/21:

19:05 Ticket #2135 (capture negotiated ssl_curve) updated by Geert Hendrickx
Description changed
19:05 Ticket #2135 (capture negotiated ssl_curve) created by Geert Hendrickx
$ssl_ciphers contains the list of ciphers offered/supported by the …
18:56 Ticket #2134 (ssl cipher logging for mail) created by Geert Hendrickx
For the http module, the access_log format can be customized to great …

02/04/21:

23:16 Changeset in nginx_org [2650:2ab5aa4d5b04] by Artem Konev <artem.konev@…>
Added info about the Unit 1.22.0 release.
19:28 Ticket #2101 (directive ssl_protocols ignored on Ubuntu Server) closed by Maxim Dounin
worksforme: Feedback timeout, closing this. Most likely the original problem is an …
19:19 Ticket #2071 (ssl_reject_handshake on introduced in nginx 1.19.4 works but disables ...) updated by Maxim Dounin
See also ticket #2101 comments.
19:17 Ticket #2101 (directive ssl_protocols ignored on Ubuntu Server) updated by Maxim Dounin
> After update to 1.19.6, I am only connect to my server via TLS 1.2, …
18:23 Milestone unit-1.22 completed
Planned features and enhancements: * Bugfixes mostly
18:09 Ticket #2101 (directive ssl_protocols ignored on Ubuntu Server) updated by uwe.h.schindler@…
I figured out what the problem is. You can have all TLS settings on …
17:39 Changeset in nginx [8696:88c9c868a7c9]quic by Roman Arutyunyan <arut@…>
QUIC: disabled non-immediate ACKs for Initial and Handshake. As per …
17:25 Ticket #2101 (directive ssl_protocols ignored on Ubuntu Server) updated by uwe.h.schindler@…
Hi Maxim, the same issue happened to me. I have the ssl_protocol …
12:49 Changeset in nginx_org [2653:9fc25ea7a92c] by Yaroslav Zhuravlev <yar@…>
Documented ngx.fetch and Response interface in njs.
11:35 Changeset in nginx [8693:3956bbf91002]quic by Roman Arutyunyan <arut@…>
QUIC: use server ack_delay_exponent when sending ack. Previously, …

02/03/21:

15:45 Changeset in nginx_org [2649:7517de030c0a] by Yaroslav Zhuravlev <yar@…>
Corrected njs example in ngx_stream_js_module module.
12:20 Changeset in nginx-tests [1643:cd35d4f44937] by Dmitry Volyntsev <xeioex@…>
Tests: fixed typo in stream_js.t introduced in fd7766ab0a69. In …
09:39 Changeset in nginx [8692:0697294f79a4]quic by Sergey Kandaurov <pluknet@…>
QUIC: removed redundant "app" flag from ngx_quic_close_frame_t. The …
02:20 Ticket #2133 (windows version will not access nework mapped drives) closed by Maxim Dounin
invalid: Thanks, closing this.

02/02/21:

20:03 Ticket #2133 (windows version will not access nework mapped drives) updated by Jon Peterson
ok, whoops, user error. having used windows for decades it has escaped …
18:49 Ticket #2133 (windows version will not access nework mapped drives) updated by Maxim Dounin
Works fine here. Are you sure that the file is correctly named? If …
14:17 Ticket #2133 (windows version will not access nework mapped drives) created by Jon Peterson
a root c:/ works while root z:/ where z: is a networked mapped drive …
12:37 Changeset in nginx_org [2647:0085d9f7dc3f] by Yaroslav Zhuravlev <yar@…>
Minor corrections in njs reference.
12:22 Ticket #2132 (ssl_ocsp / ssl_stapling for ngx_mail_ssl_module) created by Geert Hendrickx
ngx_mail_ssl_module is missing some features compared to …
12:09 Changeset in nginx [8691:250974f8f8e7]quic by Roman Arutyunyan <arut@…>
HTTP/3: reverted version check for keepalive flag. The flag is used …

02/01/21:

15:48 Changeset in nginx [8690:a9034b10dacc]quic by Roman Arutyunyan <arut@…>
HTTP/3: fixed format specifier.
13:42 Changeset in nginx [7765:519b55453c45] by Ruslan Ermilov <ru@…>
HTTP/2: lingering close changed to handle NGX_AGAIN. This part …
12:00 Changeset in nginx-tests [1642:43f31fe62dfd] by Dmitry Volyntsev <xeioex@…>
Tests: added tests for js_header_filter directive.
11:46 Changeset in nginx [8688:a346905c359f]quic by Roman Arutyunyan <arut@…>
QUIC: fixed stateless reset recognition and send. Previously, if an …
09:31 Changeset in nginx_org [2646:d2d4549363ec] by Yaroslav Zhuravlev <yar@…>
Updated with Netcraft January 2021 Web Server Survey stats.

01/29/21:

16:42 Changeset in nginx [8685:dbe33ef9cd9a]quic by Roman Arutyunyan <arut@…>
HTTP/3: call ngx_handle_read_event() from client header handler. This …
14:38 Ticket #2131 (NGNIX needs root cert in the chain for Client validation.) created by vasu767@…
In a CA ca hierarchy sub-ca/issuing CA issues the cert to two device …
12:53 Changeset in nginx [8686:dffb66fb783b]quic by Vladimir Homutov <vl@…>
QUIC: stateless retry. Previously, quic connection object was created …

01/28/21:

18:42 Ticket #2130 ("nginx" stops every day itself) updated by Maxim Dounin
From the logs provided it looks like nginx master process died due to …
17:52 Ticket #2130 ("nginx" stops every day itself) created by piiskop@…
Every single day, I discover that my web services are unavailable and …
09:55 Ticket #2129 (--with-openssl= extra .openssl injected in path) closed by Sergey Kandaurov
invalid: As documented, the …
09:35 Changeset in nginx [8687:1c6343bd7933]quic by Roman Arutyunyan <arut@…>
QUIC: refactored packet processing. - split ngx_quic_process_packet() …
05:54 Ticket #2129 (--with-openssl= extra .openssl injected in path) updated by EddyHahn72@…
Sorry figured it out. It needed the library source directory not the …
03:35 Ticket #2129 (--with-openssl= extra .openssl injected in path) created by EddyHahn72@…
Hi, I am overriding --with-openssl as …

01/27/21:

14:52 Ticket #2128 (Using a variable in the resolver directive) closed by Maxim Dounin
wontfix: The resolver directive indeed does not …
14:16 Ticket #2128 (Using a variable in the resolver directive) created by avsdev-cw@…
TLDR: `My request is that the resolver directive be capable of …
14:16 Changeset in nginx_org [2645:ce5e7e986710] by Sergey Kandaurov <pluknet@…>
Replaced broken links to FreeBSD ports and packages.
10:09 Changeset in nginx [8684:27bd6dc24426]quic by Sergey Kandaurov <pluknet@…>
README: reflect renaming of several transport parameter directives. …

01/26/21:

12:45 Changeset in nginx_org [2644:b1aab2fa2b8f] by Konstantin Pavlov <thresh@…>
Linux packages: actualized the list of supported distributions. …
09:39 Changeset in nginx [7764:ecc0ae881a25] by Sergey Kandaurov <pluknet@…>
Clean up trailers in ngx_http_clean_header() as well. The function …

01/25/21:

19:13 Changeset in nginx_org [2643:4849fa0fd4b4] by Yaroslav Zhuravlev <yar@…>
Removed URL Decoding/Encoding examples from njs.
16:17 Ticket #2127 (ngx_http_realip_module changes $remote_addr which leads to wrong ips ...) updated by Maxim Dounin
Status changed
Thanks for the ticket, this is known and indeed not very convenient …
15:41 Ticket #2124 (Round robin) closed by Maxim Dounin
invalid: Thanks for your feedback, closing this.
13:51 Ticket #2126 (443 порт и последний блок в адресе ipv6) closed by Sergey Kandaurov
invalid
13:18 Ticket #2126 (443 порт и последний блок в адресе ipv6) updated by tegusigalpaa@…
Description changed
13:16 Changeset in nginx [8689:6bd8ed493b85]quic by Roman Arutyunyan <arut@…>
HTTP/3: refactored request body parser. The change reduces diff to …
08:29 Ticket #2127 (ngx_http_realip_module changes $remote_addr which leads to wrong ips ...) updated by anveshagarwal@…
Description changed
08:20 Ticket #2127 (ngx_http_realip_module changes $remote_addr which leads to wrong ips ...) created by anveshagarwal@…
I have a webapp under NGinx and another frontal load balancer, …

01/23/21:

22:02 Ticket #2126 (443 порт и последний блок в адресе ipv6) created by tegusigalpaa@…
Sry, my fault... Delete please
14:47 Ticket #2125 (ssl_trusted_certificate for parallel ECDSA and RSA usage) closed by Maxim Dounin
invalid: You can put multiple CA certificates into the file set with the …
14:22 Ticket #2125 (ssl_trusted_certificate for parallel ECDSA and RSA usage) updated by rdevq@…
The nginx version is 1.14.2, not 1.19.x as stated above, eventhough …
14:19 Ticket #2125 (ssl_trusted_certificate for parallel ECDSA and RSA usage) created by rdevq@…
As ECDSA is on it's way to becoming the new standard, it is important …

01/22/21:

17:02 Changeset in nginx-tests [1641:6b6a496ac984] by Sergey Kandaurov <pluknet@…>
Tests: fixed stream_js_fetch.t with parallel tests. The port in njs …
11:06 Ticket #2124 (Round robin) updated by z-knezevic@…
It works!! Yes, by "proxy_requests" set to 1 and "proxy_responses" …
10:47 Ticket #2124 (Round robin) updated by z-knezevic@…
Hi Maxim, thank you very much for the answer, ah, yes, it seems that …

01/21/21:

19:37 Ticket #2124 (Round robin) updated by Maxim Dounin
How do you test that "all traffic is directed only to first upstream …
18:19 Changeset in nginx-tests [1640:67adc5fd0548] by Dmitry Volyntsev <xeioex@…>
Tests: added js tests for ngx.fetch() method.
15:22 udproundrobinticket attached to Ticket #2124 by z-knezevic@…
15:22 Ticket #2124 (Round robin) created by z-knezevic@…
When we configure two groups of upstream servers which both are on the …
12:12 Changeset in nginx_org [2641:ea9f4dc0c801] by Yaroslav Zhuravlev <yar@…>
Fixed example in stream js module.

01/20/21:

09:38 Changeset in nginx_org [2648:78161967514f] by Yaroslav Zhuravlev <yar@…>
Mentioned ECDSA in ssl_ecdh_curve.
09:34 Changeset in nginx_org [2642:c60bcc0de435] by Yaroslav Zhuravlev <yar@…>
Updated TOC in njs examples.

01/19/21:

17:35 Changeset in nginx [7763:61d0df8fcc7c] by Maxim Dounin <mdounin@…>
Year 2021.
17:32 Changeset in nginx [7762:4e141d0816d4] by Maxim Dounin <mdounin@…>
Core: removed post_accept_timeout. Keeping post_accept_timeout in …
17:21 Changeset in nginx [7761:43a0a9e988be] by Maxim Dounin <mdounin@…>
Removed incorrect optimization of HEAD requests. The stub status …
12:40 Changeset in nginx_org [2640:885bcb41fbcf] by Yaroslav Zhuravlev <yar@…>
Added an example to njs examples.
12:09 Changeset in nginx_org [2639:7ad967af16b8] by Yaroslav Zhuravlev <yar@…>
Updated HS JWT example in njs.

01/16/21:

14:08 Changeset in nginx_org [2638:1d775e54f594] by Yaroslav Zhuravlev <yar@…>
Updated OpenSSL version used for win32 builds.
13:52 Changeset in nginx_org [2637:75aa9e635e16] by Yaroslav Zhuravlev <yar@…>
Updated with Netcraft December 2020 Web Server Survey stats.

01/14/21:

14:14 Ticket #761 (The auth_request does not supports query string/arguments) updated by Maxim Dounin
> Is this by design and if so, how do I pass query parameters to an …

01/13/21:

21:04 Ticket #761 (The auth_request does not supports query string/arguments) updated by rickardp@…
This problem is (still) occurring in 1.19.6. Is this by design and if …
18:03 Ticket #2120 (Add Support for IP2Location and IP2Proxy BIN Database) updated by Maxim Dounin
Priority, Component changed
First of all, nginx does support vendor-agnostic geolocation …
13:55 Ticket #2117 (upstream sent more data than specified in "Content-Length" header ...) closed by Maxim Dounin
fixed: Fix committed, thanks for reporting this.
01:51 Ticket #2120 (Add Support for IP2Location and IP2Proxy BIN Database) created by topakeris@…
Nginx is supporting single vendor for IP geolocation right now. It is …
Note: See TracTimeline for information about the timeline view.