Timeline
12/28/21:
- 17:29 Ticket #2196 (resolver only ipv6 issue) updated by
- This'd be helpful as a perhaps-more-obvious way to avoid #1330 - even …
- 16:23 Changeset in nginx_org [2817:d84856836c20] by
- njs-0.7.1
- 16:02 Ticket #2297 (Nginx does not provide option to read the certificate chain) updated by
- For the record, the reporter submitted …
- 15:38 Changeset in nginx_org [2816:ae1d713a06e2] by
- nginx-1.21.5
- 15:37 Milestone nginx-1.21.5 completed
- Status: scheduled Trunk: mainline * pcre2 support * …
- 15:36 Milestone njs-0.7.1 completed
- Planned features and enhancements: * pcre2 support * "js_include" …
- 15:28 Changeset in nginx [7990:67408b4a12c0] by
- release-1.21.5 tag
- 15:28 Changeset in nginx [7989:d986378168fd]release-1.21.5 by
- nginx-1.21.5-RELEASE
- 14:56 Changeset in nginx [7988:8af85c66da94] by
- Updated OpenSSL and PCRE used for win32 builds.
- 12:01 Changeset in nginx [8954:584e9951b044]quic by
- Fixed a mismerge in 5c86189a1c1b.
- 10:52 Ticket #2292 (nginx config test cannot pass if quic_bpf is enabled) closed by
- fixed: Fixed in http://hg.nginx.org/nginx-quic/rev/7c0f9bb27763
- 10:50 Changeset in nginx [8952:d78972cf4bac]quic by
- QUIC: fixed format specifier after 6ccf3867959a.
- 10:24 Changeset in nginx [8951:7c0f9bb27763]quic by
- QUIC: fixed config test with bpf (ticket #2292). The SO_REUSEPORT …
- 09:30 Ticket #2297 (Nginx does not provide option to read the certificate chain) created by
- There is a server which has two known local CAs. One is a root ca …
12/27/21:
- 16:49 Changeset in nginx [7987:b002ad258f1d] by
- Support for sendfile(SF_NOCACHE). The SF_NOCACHE flag, introduced in …
- 16:48 Changeset in nginx [7986:f1fcb0fe6975] by
- SSL: SSL_sendfile(SF_NODISKIO) support.
- 16:48 Changeset in nginx [7985:ec2e6893caaa] by
- Simplified sendfile(SF_NODISKIO) usage. Starting with FreeBSD 11, …
- 16:47 Changeset in nginx [7984:ae992b5a27b2] by
- Removed "aio sendfile", deprecated since 1.7.11.
- 13:15 Changeset in nginx [8953:03b40440c13d]quic by
- QUIC: renamed input handling functions. Now these functions have …
- 13:11 Ticket #2296 (METHOD always recognized as 'GET' when using postman) closed by
- invalid
- 10:52 Changeset in nginx [8945:e72db9162180]quic by
- QUIC: got rid of excessive "qsock" argument in ngx_quic_output.c. The …
- 10:49 Changeset in nginx [8955:32daba3aabb2]quic by
- QUIC: got rid of ngx_quic_create_temp_socket(). It was mostly copy of …
- 07:26 Ticket #2296 (METHOD always recognized as 'GET' when using postman) updated by
-
Description changed
- 07:24 Ticket #2296 (METHOD always recognized as 'GET' when using postman) updated by
- CONFIRMED TO BE A POSTMAN HTTP REDIRECTION PROBLEM : THANK YOU FOR …
- 07:12 Ticket #2296 (METHOD always recognized as 'GET' when using postman) created by
-
PoC-All the request method is shown as GET-even …
12/24/21:
- 22:07 Changeset in nginx [7983:d07456044b61] by
- Core: added NGX_REGEX_MULTILINE for 3rd party modules. Notably, NAXSI …
- 22:07 Changeset in nginx [7982:fbbb5ce52995] by
- PCRE2 and PCRE binary compatibility. With this change, dynamic …
- 22:07 Changeset in nginx [7981:0b5f12d5c531] by
- PCRE2 library support. The PCRE2 library is now used by default if …
- 22:07 Changeset in nginx [7980:8007ea138d6a] by
- Configure: simplified PCRE compilation. Removed ICC-specific PCRE …
- 22:07 Changeset in nginx [7979:060bf88d2473] by
- Core: ngx_regex.c style cleanup. Notably, ngx_pcre_pool and …
- 22:07 Changeset in nginx [7978:2ca57257252d] by
- Core: fixed ngx_pcre_studies cleanup. If a configuration parsing …
- 15:39 Changeset in nginx [8950:fb811b6c76ee]quic by
- QUIC: refactored buffer allocation, spliting and freeing. Previously, …
- 15:17 Changeset in nginx [8947:6ccf3867959a]quic by
- QUIC: refactored ngx_quic_order_bufs() and ngx_quic_split_bufs(). …
- 15:13 Changeset in nginx [8946:56dec0d4e5b1]quic by
- QUIC: avoid excessive buffer allocations in stream output. …
- 12:53 Changeset in nginx [8942:5c86189a1c1b]quic by
- Merged with the default branch.
12/22/21:
- 22:25 Changeset in nginx_org [2815:bbbee78495ec] by
- Updated with Netcraft December 2021 Web Server Survey stats.
12/21/21:
- 13:15 Ticket #2295 (Incorrect path in beginners_guide.html) closed by
-
invalid: As long as images are in
/data/images/
, and these are expected to be … - 12:00 Ticket #2295 (Incorrect path in beginners_guide.html) created by
- In the beginners guide, section "Serving Static Content" a directive …
- 11:51 Changeset in nginx_org [2814:aa957a1211b8] by
- Updated tested OSes and platforms.
- 10:04 Changeset in nginx_org [2813:b9c6c7ab035f] by
- Linux packages: Added CentOS/RHEL 8 and Ubuntu 20.04 s390x packages.
- 04:54 Changeset in nginx [7977:336084ff943b] by
- Moved Huffman coding out of HTTP/2. ngx_http_v2_huff_decode.c and …
12/20/21:
- 18:02 Changeset in nginx [7976:76aea0ad78e5] by
- Contrib: vim syntax, update core and 3rd party module directives.
12/16/21:
- 14:07 Changeset in nginx [8949:2e22110828dd]quic by
- QUIC: removed ngx_quic_copy_chain(). The function is unused.
- 14:06 Changeset in nginx [8948:19e063e955bf]quic by
- QUIC: renamed buffer-related functions. ngx_quic_alloc_buf() -> …
- 08:49 Changeset in nginx [8944:b7284807b4fa]quic by
- QUIC: refactored ngx_quic_validate_path(). The function now accepts …
- 08:42 Changeset in nginx [8943:118a34e32121]quic by
- QUIC: added missing check for backup path existence.
12/15/21:
- 17:52 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- > body_buffer_size we did not configure, so it is using default …
- 14:54 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- body_buffer_size we did not configure, so it is using default 16k. …
- 04:05 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- Replying to luyangliang@…: > Setting keepalive_requests to …
12/14/21:
- 23:05 Ticket #2294 (set $host url and auth_request failing on proxy_pass) updated by
-
From what you describe it looks like you set
$a_endpoint
to a … - 15:47 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- Setting keepalive_requests to 1000 actually improves a lot. Memory …
- 14:50 Ticket #2294 (set $host url and auth_request failing on proxy_pass) updated by
-
Description changed
- 14:49 Ticket #2294 (set $host url and auth_request failing on proxy_pass) updated by
-
Description changed
- 14:44 Ticket #2294 (set $host url and auth_request failing on proxy_pass) created by
- I'm trying to implement an auth_request call for an upstream host that …
- 13:24 Changeset in nginx [8941:0433e69f5425]quic by
- QUIC: added path limiting function ngx_quic_path_limit().
- 01:18 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- Replying to luyangliang@…: > Thanks for getting back! > > …
12/13/21:
- 15:33 Ticket #1593 (Error selecting client certificate for proxy service) reopened by
- As stated in my comment above. This is clearly a bug.
- 15:32 Ticket #1593 (Error selecting client certificate for proxy service) updated by
- I think this is really bad behavior and should be changed. I get that …
- 14:44 Changeset in nginx_org [2812:ca9b4ffc67ee] by
- Regenerated.
- 14:44 Changeset in nginx_org [2811:9b1b68fa1808] by
- nginx.org poll added.
- 14:27 Changeset in nginx [8939:ddd5e5c0f87d]quic by
- QUIC: improved path validation. Previously, path was considered valid …
- 13:47 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- Thanks for getting back! […] I will try "keepalive_reuqests 1000" …
- 11:49 Changeset in nginx [8938:23880e4ad3e2]quic by
- QUIC: write and full stream shutdown support. Full stream shutdown is …
- 06:48 Changeset in nginx [8940:fb41e37ddeb0]quic by
- QUIC: decoupled path state and limitation status. The path validation …
12/11/21:
- 00:47 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- > keepalive_requests 10000; You may want to check if …
12/10/21:
- 19:08 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- For nginx 1.20.1, we configure: keepalive_requests 10000; …
- 16:43 Changeset in nginx [8937:0692355a3519]quic by
- QUIC: simplified stream initialization. After creation, a client …
12/09/21:
- 19:29 Ticket #2292 (nginx config test cannot pass if quic_bpf is enabled) updated by
-
Summary changed
- 19:07 Ticket #2292 (nginx config test cannot pass if quic_bpf is enabled) updated by
-
Status changed
ok, I was able to reproduce the issue. It happens only with '-t' flag. … - 18:41 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
- First of all, please elaborate on how do you measure memory usage. …
- 17:36 Changeset in nginx-tests [1751:18ac4d9e5a2a] by
- Tests: rewriting njs tests without deprecated "js_include".
- 15:22 Ticket #2292 (nginx config test cannot pass if quic_bpf is enabled) updated by
- Replying to vl: > I see that fedora 32 was released with …
- 13:37 Ticket #2293 (Nginx 1.20.1 excessive memory usage) updated by
-
Description changed
Can't attach configuration. I will share that when it is needed.
12/08/21:
- 21:39 Ticket #2293 (Nginx 1.20.1 excessive memory usage) created by
- Running Nginx 1.20.x with HTTP/2 traffic 225req/s, see memory usage …
- 11:15 Ticket #2292 (nginx config test cannot pass if quic_bpf is enabled) updated by
- I see that fedora 32 was released with kernel 5.6 initially, but you …
- 09:37 Ticket #2292 (nginx config test cannot pass if quic_bpf is enabled) updated by
- Replying to vl: > Works fine here with 5.9.2 > > What is …
12/07/21:
- 06:53 Ticket #2292 (nginx config test cannot pass if quic_bpf is enabled) updated by
- Works fine here with 5.9.2 What is the host you are running at (arch, …
- 00:38 Ticket #2292 (nginx config test cannot pass if quic_bpf is enabled) created by
- the error message […] nginx.conf […]
12/06/21:
- 16:34 Ticket #2289 (QUIC: RETIRE_CONNECTION_ID with invalid DestinationConnectionId) updated by
- should be up to date now.
12/03/21:
- 01:26 Ticket #2289 (QUIC: RETIRE_CONNECTION_ID with invalid DestinationConnectionId) updated by
- Great! Can you update …
12/02/21:
- 19:40 Ticket #2291 (Regex plus variable in Nginx `proxy_redirect`) updated by
-
Status changed
Agreed, it probably worth explicitly documenting that variables cannot … - 19:26 Changeset in nginx_org [2810:68eccba601a5] by
- Added info about the Unit 1.26.1 release.
- 19:10 Ticket #2291 (Regex plus variable in Nginx `proxy_redirect`) updated by
- It looks like the answer is no, based on …
- 19:07 Ticket #2291 (Regex plus variable in Nginx `proxy_redirect`) created by
- It is not currently documented or apparent if it is possible to use a …
- 18:54 Ticket #2289 (QUIC: RETIRE_CONNECTION_ID with invalid DestinationConnectionId) updated by
-
Component changed
- 18:51 Ticket #2289 (QUIC: RETIRE_CONNECTION_ID with invalid DestinationConnectionId) closed by
- fixed: Thanks for reporting this. Should be fixed now by …
- 18:14 Ticket #2289 (QUIC: RETIRE_CONNECTION_ID with invalid DestinationConnectionId) updated by
- Thanks. This came up in testing, not with a full client.
- 15:28 Ticket #2290 (nginx rewrites stop working on special get parameter) closed by
- invalid: The rewrite directive does not do any …
- 14:29 Ticket #2290 (nginx rewrites stop working on special get parameter) created by
- rewrite /nuxeo/ui/?state=(.*) /nuxeo/ui/; should match: …
- 13:34 Ticket #2285 (strange "worker_connections are not enough, reusing connections" warning) updated by
- Thanks for the feedback. Keeping this open for now, to make sure the …
- 08:47 Milestone unit-1.26.1 completed
- Planned features and enhancements: * No new features, this is a bug …
- 08:03 Ticket #2289 (QUIC: RETIRE_CONNECTION_ID with invalid DestinationConnectionId) updated by
-
Status changed
Yes indeed, we don't check if retired id matches currently used. What … - 02:16 Ticket #2289 (QUIC: RETIRE_CONNECTION_ID with invalid DestinationConnectionId) created by
- While testing nginx QUIC functionality, nginx sent a …
12/01/21:
- 14:02 Ticket #2288 (log safely while configuration reloading) closed by
- invalid: This looks a problem in your custom code rather than in nginx. …
- 08:45 Ticket #2288 (log safely while configuration reloading) created by
- We implemented a custom feature that uses shared memory by ngx_log_t …
- 08:29 Ticket #2287 (fastcgi: CONTENT_LENGTH parameter missing for chunked requests) updated by
- I do not have the option to disable request buffering selectively. …
- 06:53 Ticket #2286 (When I use the proxy_cache_background_update and proxy_cache_use_stale ...) updated by
- Replying to Maxim Dounin: > > Thank you for the reply!I …
- 04:38 Ticket #2286 (When I use the proxy_cache_background_update and proxy_cache_use_stale ...) updated by
- > Thank you for the reply!I still found a phenomenon, can you help me …
- 02:19 Ticket #2286 (When I use the proxy_cache_background_update and proxy_cache_use_stale ...) updated by
- Replying to Maxim Dounin: > That's a known limitation of …
11/30/21:
- 21:22 Ticket #2286 (When I use the proxy_cache_background_update and proxy_cache_use_stale ...) closed by
-
wontfix: That's a known limitation of
proxy_cache_background_update
, see … - 15:15 Ticket #2287 (fastcgi: CONTENT_LENGTH parameter missing for chunked requests) closed by
- wontfix: > Therefore, I think nginx is supposed to buffer all chunked requests …
- 11:49 Changeset in nginx_org [2809:e642fe346261] by
- Added note about requests distribution to sticky cookie.
- 08:01 Ticket #2287 (fastcgi: CONTENT_LENGTH parameter missing for chunked requests) updated by
- References: …
- 08:00 Ticket #2287 (fastcgi: CONTENT_LENGTH parameter missing for chunked requests) updated by
- fastcgi specification: …
- 08:00 Ticket #2287 (fastcgi: CONTENT_LENGTH parameter missing for chunked requests) created by
-
When disabling
fastcgi_request_buffering
and receiving a request …
11/29/21:
- 16:12 Changeset in nginx-tests [1750:b28f88e352dd] by
- Tests: skip ssl_verify_depth.t with LibreSSL. It fails with the new …
- 12:50 Changeset in nginx_org [2808:79ebb6a3812b] by
- Added info about modifying keyval_zone state file.
11/28/21:
- 06:54 Ticket #2285 (strange "worker_connections are not enough, reusing connections" warning) updated by
- Works fine so far, no more warning. Thanks for the suggestion! Best!
Note:
See TracTimeline
for information about the timeline view.