Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: nginx/nginx
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: release-1.29.2
Choose a base ref
...
head repository: nginx/nginx
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: release-1.29.3
Choose a head ref
  • 14 commits
  • 21 files changed
  • 4 contributors

Commits on Oct 8, 2025

  1. Version bump.

    pluknet committed Oct 8, 2025
    Configuration menu
    Copy the full SHA
    3494f25 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    f5a989c View commit details
    Browse the repository at this point in the history
  3. SSL: disabled using certificate compression with OCSP stapling.

    OCSP response in TLSv1.3 is sent in the Certificate message.  This
    is incompatible with pre-compression of the configured certificates.
    pluknet committed Oct 8, 2025
    Configuration menu
    Copy the full SHA
    25b03d6 View commit details
    Browse the repository at this point in the history
  4. SSL: support for compressed server certificates with BoringSSL.

    BoringSSL/AWS-LC provide two callbacks for each compression algorithm,
    which may be used to compress and decompress certificates in runtime.
    This change implements compression support with zlib, as enabled with
    the ssl_certificate_compression directive.  Compressed certificates
    are stored in certificate exdata and reused in subsequent connections.
    
    Notably, AWS-LC saves an X509 pointer in SSL connection, which allows
    to use it from SSL_get_certificate() for caching purpose.  In contrast,
    BoringSSL reconstructs X509 on-the-fly, though given that it doesn't
    support multiple certificates, always replacing previously configured
    certificates, we use the last configured one from ssl->certs, instead.
    pluknet committed Oct 8, 2025
    Configuration menu
    Copy the full SHA
    78d1ab5 View commit details
    Browse the repository at this point in the history

Commits on Oct 23, 2025

  1. Added $request_port and $is_request_port variables.

    The $request_port variable contains the port passed by the client in the
    request line (for HTTP/1.x) or ":authority" pseudo-header (for HTTP/2 and
    HTTP/3).  If the request line contains no host, or ":authority" is missing,
    then $request_port is taken from the "Host" header, similar to the $host
    variable.
    
    The $is_request_port variable contains ":" if $request_port is non-empty,
    and is empty otherwise.
    arut committed Oct 23, 2025
    Configuration menu
    Copy the full SHA
    c8c7beb View commit details
    Browse the repository at this point in the history
  2. CONNECT method support for HTTP/1.1.

    The change allows modules to use the CONNECT method with HTTP/1.1 requests.
    To do so, they need to set the "allow_connect" flag in the core server
    configuration.
    arut committed Oct 23, 2025
    Configuration menu
    Copy the full SHA
    42ca3a4 View commit details
    Browse the repository at this point in the history

Commits on Oct 24, 2025

  1. Upstream: reset local address in case of error.

    After f10bc5a the address was set to NULL only when local address was
    not specified at all.  In case complex value evaluated to an empty or
    invalid string, local address remained unchanged.  Currenrly this is not
    a problem since the value is only set once.  This change is a preparation
    for being able to change the local address after initial setting.
    arut committed Oct 24, 2025
    Configuration menu
    Copy the full SHA
    364a94e View commit details
    Browse the repository at this point in the history
  2. SSL: $ssl_sigalg, $ssl_client_sigalg.

    Variables contain the IANA name of the signature scheme[1] used to sign
    the TLS handshake.
    
    Variables are only meaningful when using OpenSSL 3.5 and above, with older
    versions they are empty.  Moreover, since this data isn't stored in a
    serialized session, variables are only available for new sessions.
    
    [1] https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml
    
    Requested by willmafh.
    pluknet committed Oct 24, 2025
    Configuration menu
    Copy the full SHA
    71f8eb5 View commit details
    Browse the repository at this point in the history
  3. Geo: the "volatile" parameter.

    Similar to map's volatile parameter, creates a non-cacheable geo variable.
    dplotnikov-f5 committed Oct 24, 2025
    Configuration menu
    Copy the full SHA
    ac72ca6 View commit details
    Browse the repository at this point in the history

Commits on Oct 25, 2025

  1. Headers filter: inheritance control for add_header and add_trailer.

    The new directives add_header_inherit and add_trailer_inherit allow
    to alter inheritance rules for the values specified in the add_header
    and add_trailer directives in a convenient way.
    
    The "merge" parameter enables appending the values from the previous level
    to the current level values.
    
    The "off" parameter cancels inheritance of the values from the previous
    configuration level, similar to add_header "" (2194e75).
    
    The "on" parameter (default) enables the standard inheritance behaviour,
    which is to inherit values from the previous level only if there are no
    directives on the current level.
    
    The inheritance rules themselves are inherited in a standard way.  Thus,
    for example, "add_header_inherit merge;" specified at the top level will
    be inherited in all nested levels recursively unless redefined below.
    arut committed Oct 25, 2025
    Configuration menu
    Copy the full SHA
    c93a0c4 View commit details
    Browse the repository at this point in the history

Commits on Oct 27, 2025

  1. Configuration menu
    Copy the full SHA
    ce30a1c View commit details
    Browse the repository at this point in the history

Commits on Oct 28, 2025

  1. Configuration menu
    Copy the full SHA
    f04e2b7 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    65c0b2e View commit details
    Browse the repository at this point in the history
  3. nginx-1.29.3-RELEASE

    arut committed Oct 28, 2025
    Configuration menu
    Copy the full SHA
    fd0848b View commit details
    Browse the repository at this point in the history
Loading