From mdounin at mdounin.ru Tue Feb 20 14:25:05 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 20 Feb 2018 17:25:05 +0300 Subject: [nginx-announce] nginx-1.13.9 Message-ID: <20180220142505.GL24410@mdounin.ru> Changes with nginx 1.13.9 20 Feb 2018 *) Feature: HTTP/2 server push support; the "http2_push" and "http2_push_preload" directives. *) Bugfix: "header already sent" alerts might appear in logs when using cache; the bug had appeared in 1.9.13. *) Bugfix: a segmentation fault might occur in a worker process if the "ssl_verify_client" directive was used and no SSL certificate was specified in a virtual server. *) Bugfix: in the ngx_http_v2_module. *) Bugfix: in the ngx_http_dav_module. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Mar 20 16:12:19 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 20 Mar 2018 19:12:19 +0300 Subject: [nginx-announce] nginx-1.13.10 Message-ID: <20180320161219.GF77253@mdounin.ru> Changes with nginx 1.13.10 20 Mar 2018 *) Feature: the "set" parameter of the "include" SSI directive now allows writing arbitrary responses to a variable; the "subrequest_output_buffer_size" directive defines maximum response size. *) Feature: now nginx uses clock_gettime(CLOCK_MONOTONIC) if available, to avoid timeouts being incorrectly triggered on system time changes. *) Feature: the "escape=none" parameter of the "log_format" directive. Thanks to Johannes Baiter and Calin Don. *) Feature: the $ssl_preread_alpn_protocols variable in the ngx_stream_ssl_preread_module. *) Feature: the ngx_http_grpc_module. *) Bugfix: in memory allocation error handling in the "geo" directive. *) Bugfix: when using variables in the "auth_basic_user_file" directive a null character might appear in logs. Thanks to Vadim Filimonov. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Apr 3 14:56:14 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 3 Apr 2018 17:56:14 +0300 Subject: [nginx-announce] nginx-1.13.11 Message-ID: <20180403145614.GE77253@mdounin.ru> Changes with nginx 1.13.11 03 Apr 2018 *) Feature: the "proxy_protocol" parameter of the "listen" directive now supports the PROXY protocol version 2. *) Bugfix: nginx could not be built with OpenSSL 1.1.1 statically on Linux. *) Bugfix: in the "http_404", "http_500", etc. parameters of the "proxy_next_upstream" directive. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Apr 10 14:23:54 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 10 Apr 2018 17:23:54 +0300 Subject: [nginx-announce] nginx-1.13.12 Message-ID: <20180410142353.GI77253@mdounin.ru> Changes with nginx 1.13.12 10 Apr 2018 *) Bugfix: connections with gRPC backends might be closed unexpectedly when returning a large response. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Apr 17 15:41:11 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 17 Apr 2018 18:41:11 +0300 Subject: [nginx-announce] nginx-1.14.0 Message-ID: <20180417154111.GF77253@mdounin.ru> Changes with nginx 1.14.0 17 Apr 2018 *) 1.14.x stable branch. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Jun 5 14:01:45 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 5 Jun 2018 17:01:45 +0300 Subject: [nginx-announce] nginx-1.15.0 Message-ID: <20180605140145.GH32137@mdounin.ru> Changes with nginx 1.15.0 05 Jun 2018 *) Change: the "ssl" directive is deprecated; the "ssl" parameter of the "listen" directive should be used instead. *) Change: now nginx detects missing SSL certificates during configuration testing when using the "ssl" parameter of the "listen" directive. *) Feature: now the stream module can handle multiple incoming UDP datagrams from a client within a single session. *) Bugfix: it was possible to specify an incorrect response code in the "proxy_cache_valid" directive. *) Bugfix: nginx could not be built by gcc 8.1. *) Bugfix: logging to syslog stopped on local IP address changes. *) Bugfix: nginx could not be built by clang with CUDA SDK installed; the bug had appeared in 1.13.8. *) Bugfix: "getsockopt(TCP_FASTOPEN) ... failed" messages might appear in logs during binary upgrade when using unix domain listen sockets on FreeBSD. *) Bugfix: nginx could not be built on Fedora 28 Linux. *) Bugfix: request processing rate might exceed configured rate when using the "limit_req" directive. *) Bugfix: in handling of client addresses when using unix domain listen sockets to work with datagrams on Linux. *) Bugfix: in memory allocation error handling. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Jul 3 15:37:29 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 3 Jul 2018 18:37:29 +0300 Subject: [nginx-announce] nginx-1.15.1 Message-ID: <20180703153729.GH56558@mdounin.ru> Changes with nginx 1.15.1 03 Jul 2018 *) Feature: the "random" directive inside the "upstream" block. *) Feature: improved performance when using the "hash" and "ip_hash" directives with the "zone" directive. *) Feature: the "reuseport" parameter of the "listen" directive now uses SO_REUSEPORT_LB on FreeBSD 12. *) Bugfix: HTTP/2 server push did not work if SSL was terminated by a proxy server in front of nginx. *) Bugfix: the "tcp_nopush" directive was always used on backend connections. *) Bugfix: sending a disk-buffered request body to a gRPC backend might fail. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Jul 24 13:28:35 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 24 Jul 2018 16:28:35 +0300 Subject: [nginx-announce] nginx-1.15.2 Message-ID: <20180724132835.GF56558@mdounin.ru> Changes with nginx 1.15.2 24 Jul 2018 *) Feature: the $ssl_preread_protocol variable in the ngx_stream_ssl_preread_module. *) Feature: now when using the "reset_timedout_connection" directive nginx will reset connections being closed with the 444 code. *) Change: a logging level of the "http request", "https proxy request", "unsupported protocol", and "version too low" SSL errors has been lowered from "crit" to "info". *) Bugfix: DNS requests were not resent if initial sending of a request failed. *) Bugfix: the "reuseport" parameter of the "listen" directive was ignored if the number of worker processes was specified after the "listen" directive. *) Bugfix: when using OpenSSL 1.1.0 or newer it was not possible to switch off "ssl_prefer_server_ciphers" in a virtual server if it was switched on in the default server. *) Bugfix: SSL session reuse with upstream servers did not work with the TLS 1.3 protocol. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Aug 28 15:47:51 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 28 Aug 2018 18:47:51 +0300 Subject: [nginx-announce] nginx-1.15.3 Message-ID: <20180828154751.GS56558@mdounin.ru> Changes with nginx 1.15.3 28 Aug 2018 *) Feature: now TLSv1.3 can be used with BoringSSL. *) Feature: the "ssl_early_data" directive, currently available with BoringSSL. *) Feature: the "keepalive_timeout" and "keepalive_requests" directives in the "upstream" block. *) Bugfix: the ngx_http_dav_module did not truncate destination file when copying a file over an existing one with the COPY method. *) Bugfix: the ngx_http_dav_module used zero access rights on the destination file and did not preserve file modification time when moving a file between different file systems with the MOVE method. *) Bugfix: the ngx_http_dav_module used default access rights when copying a file with the COPY method. *) Workaround: some clients might not work when using HTTP/2; the bug had appeared in 1.13.5. *) Bugfix: nginx could not be built with LibreSSL 2.8.0. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Sep 25 15:25:22 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 25 Sep 2018 18:25:22 +0300 Subject: [nginx-announce] nginx-1.15.4 Message-ID: <20180925152522.GG56558@mdounin.ru> Changes with nginx 1.15.4 25 Sep 2018 *) Feature: now the "ssl_early_data" directive can be used with OpenSSL. *) Bugfix: in the ngx_http_uwsgi_module. Thanks to Chris Caputo. *) Bugfix: connections with some gRPC backends might not be cached when using the "keepalive" directive. *) Bugfix: a socket leak might occur when using the "error_page" directive to redirect early request processing errors, notably errors with code 400. *) Bugfix: the "return" directive did not change the response code when returning errors if the request was redirected by the "error_page" directive. *) Bugfix: standard error pages and responses of the ngx_http_autoindex_module module used the "bgcolor" attribute, and might be displayed incorrectly when using custom color settings in browsers. Thanks to Nova DasSarma. *) Change: the logging level of the "no suitable key share" and "no suitable signature algorithm" SSL errors has been lowered from "crit" to "info". -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Oct 2 15:29:01 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 2 Oct 2018 18:29:01 +0300 Subject: [nginx-announce] nginx-1.15.5 Message-ID: <20181002152901.GJ56558@mdounin.ru> Changes with nginx 1.15.5 02 Oct 2018 *) Bugfix: a segmentation fault might occur in a worker process when using OpenSSL 1.1.0h or newer; the bug had appeared in 1.15.4. *) Bugfix: of minor potential bugs. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Nov 6 15:27:27 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 6 Nov 2018 18:27:27 +0300 Subject: [nginx-announce] nginx-1.15.6 Message-ID: <20181106152727.GF56558@mdounin.ru> Changes with nginx 1.15.6 06 Nov 2018 *) Security: when using HTTP/2 a client might cause excessive memory consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844). *) Security: processing of a specially crafted mp4 file with the ngx_http_mp4_module might result in worker process memory disclosure (CVE-2018-16845). *) Feature: the "proxy_socket_keepalive", "fastcgi_socket_keepalive", "grpc_socket_keepalive", "memcached_socket_keepalive", "scgi_socket_keepalive", and "uwsgi_socket_keepalive" directives. *) Bugfix: if nginx was built with OpenSSL 1.1.0 and used with OpenSSL 1.1.1, the TLS 1.3 protocol was always enabled. *) Bugfix: working with gRPC backends might result in excessive memory consumption. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Nov 6 15:27:48 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 6 Nov 2018 18:27:48 +0300 Subject: [nginx-announce] nginx-1.14.1 Message-ID: <20181106152748.GJ56558@mdounin.ru> Changes with nginx 1.14.1 06 Nov 2018 *) Security: when using HTTP/2 a client might cause excessive memory consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844). *) Security: processing of a specially crafted mp4 file with the ngx_http_mp4_module might result in worker process memory disclosure (CVE-2018-16845). *) Bugfix: working with gRPC backends might result in excessive memory consumption. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Nov 6 15:28:14 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 6 Nov 2018 18:28:14 +0300 Subject: [nginx-announce] nginx security advisory (CVE-2018-16843, CVE-2018-16844) Message-ID: <20181106152814.GN56558@mdounin.ru> Hello! Two security issues were identified in nginx HTTP/2 implementation, which might cause excessive memory consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844). The issues affect nginx compiled with the ngx_http_v2_module (not compiled by default) if the "http2" option of the "listen" directive is used in a configuration file. The issues affect nginx 1.9.5 - 1.15.5. The issues are fixed in nginx 1.15.6, 1.14.1. Thanks to Gal Goldshtein from F5 Networks for initial report of the CPU usage issue. -- Maxim Dounin http://nginx.org/ From mdounin at mdounin.ru Tue Nov 6 15:28:35 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 6 Nov 2018 18:28:35 +0300 Subject: [nginx-announce] nginx security advisory (CVE-2018-16845) Message-ID: <20181106152835.GR56558@mdounin.ru> Hello! A security issue was identified in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file (CVE-2018-16845). The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the "mp4" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module. The issue affects nginx 1.1.3+, 1.0.7+. The issue is fixed in 1.15.6, 1.14.1. Patch for the issue can be found here: http://nginx.org/download/patch.2018.mp4.txt -- Maxim Dounin http://nginx.org/ From vbart at nginx.com Thu Nov 15 14:34:26 2018 From: vbart at nginx.com (Valentin V. Bartenev) Date: Thu, 15 Nov 2018 17:34:26 +0300 Subject: [nginx-announce] unit-1.6 Message-ID: <1980772.kzMxzVAI3I@vbart-workstation> Hello, I'm glad to announce a new release of NGINX Unit. This release primarily focuses on improvements in Node.js module compatibility; thanks to our vibrant community, we made great progress here. Please don't hesitate to report any problems to: - Github: https://github.com/nginx/unit/issues - Mailing list: https://mailman.nginx.org/mailman/listinfo/unit If you have installed the "unit-http" module from npm, then don't forget to update it besides Unit itself. Detailed instructions for Node.js installation can be found here: - http://unit.nginx.org/installation/#node-js-package Changes with Unit 1.6 15 Nov 2018 *) Change: "make install" now installs Node.js module as well if it was configured. *) Feature: "--local" ./configure option to install Node.js module locally. *) Bugfix: Node.js module might have crashed due to broken reference counting. *) Bugfix: asynchronous operations in Node.js might not have worked. *) Bugfix: various compatibility issues with Node.js applications. *) Bugfix: "freed pointer is out of pool" alerts might have appeared in log. *) Bugfix: module discovery didn't work on 64-bit big-endian systems like IBM/S390x. wbr, Valentin V. Bartenev From mdounin at mdounin.ru Tue Nov 27 15:02:26 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 27 Nov 2018 18:02:26 +0300 Subject: [nginx-announce] nginx-1.15.7 Message-ID: <20181127150226.GS99070@mdounin.ru> Changes with nginx 1.15.7 27 Nov 2018 *) Feature: the "proxy_requests" directive in the stream module. *) Feature: the "delay" parameter of the "limit_req" directive. Thanks to Vladislav Shabanov and Peter Shchuchkin. *) Bugfix: memory leak on errors during reconfiguration. *) Bugfix: in the $upstream_response_time, $upstream_connect_time, and $upstream_header_time variables. *) Bugfix: a segmentation fault might occur in a worker process if the ngx_http_mp4_module was used on 32-bit platforms. -- Maxim Dounin http://nginx.org/ From xeioex at nginx.com Tue Nov 27 15:26:43 2018 From: xeioex at nginx.com (Dmitry Volyntsev) Date: Tue, 27 Nov 2018 18:26:43 +0300 Subject: [nginx-announce] njs-0.2.6 Message-ID: Hello, I'm glad to announce a new release of NGINX JavaScript module (njs). This release proceeds to extend the coverage of ECMAScript 5.1 specification. - Added initial support for extending the existing prototypes. So, generic functions can be added to extend functionality of built-in types. : > String.prototype.myUpper = function() {return this.toUpperCase()} : [Function] : > 'abc'.myUpper() : 'ABC' You can learn more about njs: - Overview and introduction: http://nginx.org/en/docs/njs/ - Presentation: https://youtu.be/Jc_L6UffFOs Feel free to try it and give us feedback on: - Github: https://github.com/nginx/njs/issues - Mailing list: http://mailman.nginx.org/mailman/listinfo/nginx-devel Changes with njs 0.2.6 27 Nov 2018 Core: *) Feature: making built-in prototypes mutable. *) Feature: making global object mutable. *) Feature: console.time() and console.timeEnd() methods. *) Feature: allowing variables and functions to be redeclared. *) Feature: extending Object.defineProperty() spec conformance. *) Feature: introduced quiet mode for CLI to handle simple expressions from stdin (echo "2**3" | njs -q -> 8). *) Feature: introduced compact form of backtraces to handle stack overflows. *) Improvement: improved wording for various exceptions. *) Bugfix: fixed closure values handling. *) Bugfix: fixed equality operator for various value types. *) Bugfix: fixed handling of "this" keyword in various scopes. *) Bugfix: fixed handling non-object values in Object.keys(). *) Bugfix: fixed parsing of throw statement inside if statement. *) Bugfix: fixed parsing of newline after throw statement. *) Bugfix: fixed parsing of statements in if statement without newline. *) Bugfix: fixed size uint32_t overflow in njs_array_expand(). *) Bugfix: fixed typeof operator for object_value type. *) Bugfix: miscellaneous additional bugs have been fixed. From mdounin at mdounin.ru Tue Dec 4 15:07:33 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 4 Dec 2018 18:07:33 +0300 Subject: [nginx-announce] nginx-1.14.2 Message-ID: <20181204150733.GE99070@mdounin.ru> Changes with nginx 1.14.2 04 Dec 2018 *) Bugfix: nginx could not be built by gcc 8.1. *) Bugfix: nginx could not be built on Fedora 28 Linux. *) Bugfix: in handling of client addresses when using unix domain listen sockets to work with datagrams on Linux. *) Change: the logging level of the "http request", "https proxy request", "unsupported protocol", "version too low", "no suitable key share", and "no suitable signature algorithm" SSL errors has been lowered from "crit" to "info". *) Bugfix: when using OpenSSL 1.1.0 or newer it was not possible to switch off "ssl_prefer_server_ciphers" in a virtual server if it was switched on in the default server. *) Bugfix: nginx could not be built with LibreSSL 2.8.0. *) Bugfix: if nginx was built with OpenSSL 1.1.0 and used with OpenSSL 1.1.1, the TLS 1.3 protocol was always enabled. *) Bugfix: sending a disk-buffered request body to a gRPC backend might fail. *) Bugfix: connections with some gRPC backends might not be cached when using the "keepalive" directive. *) Bugfix: a segmentation fault might occur in a worker process if the ngx_http_mp4_module was used on 32-bit platforms. -- Maxim Dounin http://nginx.org/ From vbart at nginx.com Thu Dec 20 19:02:56 2018 From: vbart at nginx.com (Valentin V. Bartenev) Date: Thu, 20 Dec 2018 22:02:56 +0300 Subject: [nginx-announce] unit-1.7 Message-ID: <5857021.KSlU4igEae@vbart-workstation> Hi, I'm glad to announce a new release of NGINX Unit. This is a bugfix release with a primary focus on the stabilization of the Node.js module. We have made great progress with it, and now Node.js support is in much better shape than before. Changes with Unit 1.7 20 Dec 2018 *) Change: now rpath is set in Ruby module only if the library was not found in default search paths; this allows to meet packaging restrictions on some systems. *) Bugfix: "disable_functions" and "disable_classes" PHP options set via Control API did not work. *) Bugfix: Promises on request data in Node.js were not triggered. *) Bugfix: various compatibility issues with Node.js applications. *) Bugfix: a segmentation fault occurred in Node.js module if application tried to read request body after request.end() was called. *) Bugfix: a segmentation fault occurred in Node.js module if application attempted to send header twice. *) Bugfix: names of response header fields in Node.js module were erroneously treated as case-sensitive. *) Bugfix: uncatched exceptions in Node.js were not logged. *) Bugfix: global install of Node.js module from sources was broken on some systems; the bug had appeared in 1.6. *) Bugfix: traceback for exceptions during initialization of Python applications might not be logged. *) Bugfix: PHP module build failed if PHP interpreter was built with thread safety enabled. Highly likely, this is the last release of Unit in 2018, so I would like to wish you a Happy New Year on the behalf of the entire Unit team. 2018 was an exciting year in Unit development. Many important features have been introduced, including: - Advanced Process Management, which allows scaling application processes dynamically depending on the amount of load. Thanks go to Maxim Romanov who primarily worked on this feature. Documentation: https://unit.nginx.org/configuration/#process-management - Perl, Ruby, and Node.js application support. Thanks to Alexander Borisov who implemented these language modules. - TLS support and Certificates Storage API that allows to dynamically configure TLS certificates. Thanks to Igor Sysoev who collaborated with me on this feature. Documentation: https://unit.nginx.org/configuration/#ssl-tls-and-certificates - C API language modules were moved into a separate library; this helped a lot with Node.js integration and aids the upcoming Java support. Thanks again to Maxim Romanov for this work. - Essential access logging support. Documentation: https://unit.nginx.org/configuration/#access-log - Advanced settings for applications including environment variables, runtime arguments, PHP options, and php.ini path customization. I can?t imagine releasing any of these features without the effort of our QA engineer, Andrey Zelenkov, who relentlessly improves test coverage of Unit codebase, runs various fuzzing tests, and reports any suspicious behaviour to the developers. In addition, one of the most important achievements of the year was a tangible improvement of documentation quality. The unit.nginx.org website is up-to-date now and covers all the features introduced in the new and previous Unit releases. This duty was successfully carried out by our technical writer, Artem Konev. Besides, he continues refactoring the documentation and plans to introduce HowTos for various use cases and applications. If you have any particular suggestions concerning applications you?d like to configure with Unit, please create a feature request in our documentation issue tracker on GitHub: - https://github.com/nginx/unit-docs/issues Thanks to our system engineers, Andrei Belov and Konstantin Pavlov, who are toiling over packages in our own repositories and images in Docker hub. Thanks to our product manager Nick Shadrin who helps us to envision our strategy and gives excellent talks on conferences around the world. You can see him in the latest Unit demo session at NGINX Conf 2018: - https://www.youtube.com/watch?v=JQZKbIG3uro Of course, everything I?ve just mentioned wouldn?t be possible without our vibrant community; our users who are eager to move their projects to Unit; everyone who reports bugs and suggests features, guiding us to the right path. We urge everybody to participate via our mailing list at - unit at nginx.org or on GitHub: - https://github.com/nginx/unit I gladly mention ??? (Hong Zhi Dao) as one of the most active community members who not only reports bugs but also reads our code, asks pointed questions, and regularly sends patches with improvements. Thank you very much for your contribution. Special thanks go to the maintainers of Unit packages in various community repositories: Sergey A. Osokin (FreeBSD), Ralph Seichter (Gentoo), Andr? Klitzing (Alpine Linux), and Julian Brost (Arch Linux). Sorry if I didn't mention anyone else who maintains Unit packages for other distributions; you can open an issue for your repository to be included in the Installation section at unit.nginx.org: - https://github.com/nginx/unit-docs/issues Unfortunately, we weren?t able to achieve each and every of our audacious goals this year. The development of some features is postponed until the upcoming year. Currently, there is ongoing work on WebSocket support, the Java module, request routing, and static files serving. We have already made good progress on the Java module. This work is underway in a separate GitHub public repository: - https://github.com/mar0x/unit , so everybody willing to run their Java applications on Unit can participate. Many other good things and announcements about Unit will surely happen in 2019. Thank you for staying with us, and all the best. wbr, Valentin V. Bartenev From mdounin at mdounin.ru Tue Dec 25 15:08:33 2018 From: mdounin at mdounin.ru (Maxim Dounin) Date: Tue, 25 Dec 2018 18:08:33 +0300 Subject: [nginx-announce] nginx-1.15.8 Message-ID: <20181225150833.GZ99070@mdounin.ru> Changes with nginx 1.15.8 25 Dec 2018 *) Feature: the $upstream_bytes_sent variable. Thanks to Piotr Sikora. *) Feature: new directives in vim syntax highlighting scripts. Thanks to Gena Makhomed. *) Bugfix: in the "proxy_cache_background_update" directive. *) Bugfix: in the "geo" directive when using unix domain listen sockets. *) Workaround: the "ignoring stale global SSL error ... bad length" alerts might appear in logs when using the "ssl_early_data" directive with OpenSSL. *) Bugfix: in nginx/Windows. *) Bugfix: in the ngx_http_autoindex_module on 32-bit platforms. -- Maxim Dounin http://nginx.org/ From xeioex at nginx.com Tue Dec 25 15:18:32 2018 From: xeioex at nginx.com (Dmitry Volyntsev) Date: Tue, 25 Dec 2018 18:18:32 +0300 Subject: [nginx-announce] njs-0.2.7 Message-ID: <2C07A038-7891-420C-89D9-E1815E2F4954@nginx.com> Hello, I'm glad to announce a new release of NGINX JavaScript module (njs). This release proceeds to extend the coverage of ECMAScript specifications. - Added support for ES6 rest parameters syntax. Thanks to Alexander Pyshchev. : > var add = function(prev, curr) { return prev + curr } : undefined : > function sum(...args) { return args.reduce(add) } : undefined : > sum(1,2,3) : 6 : > sum(1,2,3,4) : 10 - Added ES8 Object.values() and Object.entries() methods. You can learn more about njs: - Overview and introduction: http://nginx.org/en/docs/njs/ - Presentation: https://youtu.be/Jc_L6UffFOs Feel free to try it and give us feedback on: - Github: https://github.com/nginx/njs/issues - Mailing list: http://mailman.nginx.org/mailman/listinfo/nginx-devel Changes with njs 0.2.7 25 Dec 2018 Core: *) Feature: rest parameters syntax (destructuring is not supported). Thanks to Alexander Pyshchev. *) Feature: added Object.entries() method. *) Feature: added Object.values() method. *) Improvement: code generator refactored and simplified. *) Bugfix: fixed automatic semicolon insertion. *) Bugfix: fixed assignment expression from compound assignment. *) Bugfix: fixed comparison of Byte and UTF8 strings. *) Bugfix: fixed type of iteration variable in for-in with array values. *) Bugfix: fixed building on paltforms without librt. *) Bugfix: miscellaneous bugs have been fixed. -------------- next part -------------- An HTML attachment was scrubbed... URL: