I haven't the nginx know how to evaluate this, but have anyone had the
time to look at these patches?
Regards
Martin
On 07/18/14 14:05, Per Olav Høydahl Ohme wrote:
To allow crossbuilding:
- Added configure options informing about target platform.
- Avoiding executions of test programs for
Hello!
On Tue, Jul 29, 2014 at 08:24:21AM +0200, Martin Ertsaas wrote:
I haven't the nginx know how to evaluate this, but have anyone had the
time to look at these patches?
I've looked into these patches, and I don't think they worth
considering. Looks like a set of dirty hacks.
--
Maxim
On 07/29/14 14:57, Maxim Dounin wrote:
Hello!
On Tue, Jul 29, 2014 at 08:24:21AM +0200, Martin Ertsaas wrote:
I haven't the nginx know how to evaluate this, but have anyone had the
time to look at these patches?
I've looked into these patches, and I don't think they worth
considering.
Hello!
On Tue, Jul 29, 2014 at 03:02:21PM +0200, Martin Ertsaas wrote:
On 07/29/14 14:57, Maxim Dounin wrote:
Hello!
On Tue, Jul 29, 2014 at 08:24:21AM +0200, Martin Ertsaas wrote:
I haven't the nginx know how to evaluate this, but have anyone had the
time to look at these patches?
On 07/29/14 15:34, Maxim Dounin wrote:
Hello!
On Tue, Jul 29, 2014 at 03:02:21PM +0200, Martin Ertsaas wrote:
On 07/29/14 14:57, Maxim Dounin wrote:
Hello!
On Tue, Jul 29, 2014 at 08:24:21AM +0200, Martin Ertsaas wrote:
I haven't the nginx know how to evaluate this, but have anyone had
1) How can UI_METHOD provided by nginx look like?
2) Trying passwords from ssl_password_file one by one is not a good idea for
private keys (too many pin attempts)
___
nginx-devel mailing list
nginx-devel@nginx.org
# HG changeset patch
# User Dmitrii Pichulin
# Date 1406644835 -14400
# Tue Jul 29 18:40:35 2014 +0400
# Node ID b5f409eef2ed6832eead4c53855f91fb90ee099b
# Parent d1bde5c3c5d21368de04a59506a06c1174353a19
allow to use engine keyform for server private key
diff -r d1bde5c3c5d2 -r b5f409eef2ed
Hello!
On Tue, Jul 29, 2014 at 07:11:26PM +0400, Dmitrii Pichulin wrote:
1) How can UI_METHOD provided by nginx look like?
The code is in the same file you are modifying.
2) Trying passwords from ssl_password_file one by one is not a good idea for
private keys (too many pin attempts)
The
Hello!
On Mon, Jul 28, 2014 at 04:03:35PM -0700, Piotr Sikora wrote:
# HG changeset patch
# User Piotr Sikora pi...@cloudflare.com
# Date 1406575677 25200
# Mon Jul 28 12:27:57 2014 -0700
# Node ID bb74dfefeec04aae5a3a86ace2df45d03f691ded
# Parent
Hey Maxim,
I think that it's better idea to preserve the common code rather
than to add unneded #ifndef's.
Well, my argument for #ifndefs is that both BoringSSL and LibreSSL
(for which I have patch in my queue) removed support for export cipher
suites, so I don't see a point in calling a
# HG changeset patch
# User Piotr Sikora pi...@cloudflare.com
# Date 1406575677 25200
# Mon Jul 28 12:27:57 2014 -0700
# Node ID c1abbfee85b3185c28a279c7935d0bb871933ed8
# Parent e3086fd5e59335f4f3f165ee74c094a7aca2aeb3
SSL: let it build against LibreSSL.
LibreSSL developers decided that
Hey,
this change is based on BoringSSL change [1], but I can rebase it if
we decide that the #ifndefs are not wanted after all.
[1] http://mailman.nginx.org/pipermail/nginx-devel/2014-July/005656.html
Best regards,
Piotr Sikora
___
nginx-devel
Hey Maxim,
I'm rather committed to switching to BoringSSL myself in the near
future, so this is more than just it compiles change.
btw: BoringSSL is using CMake so --with-openssl obviously doesn't
work, but if you're interested in adding --with-boringssl then I'd
be more than happy to provide
Hey Maxim,
As previously suggested, this doesn't looks like a right way to
go. If LibreSSL folks continue to insist this is OpenSSL-2.0.0,
then we'll probably have redefine OPENSSL_VERSION_NUMBER
ourselves.
Unfortunately, it looks like they've made their mind :( The discussion
on it
Hey Maxim,
The problem is lots of added lines required to avoid calling it.
And why exactly is that a problem?
If expected further API changes in BoringSSL/LibreSSL is a
concern, we may want to wait longer before the API settles a bit.
I believe I've already suggested this during previous
Чудес не бывает. В логах должна быть какая-либо ошибка
28.07.2014 14:08, Boris Epstein пишет:
Это таки обидно, потому что в логах я пока ничего не разглядел:)
Но будем рыть дальше, да.
___
nginx-ru mailing list
nginx-ru@nginx.org
Добрый день!
Есть необходимость организовать описанную ниже схему.
Интересует мнение коллег имеющих подобный опыт. Где можно ознакомиться с
реализацией подобной схемы? Что почитать? Есть ли вариант лучше? Что можете
посоветовать (опираясь на свой опыт)? Не хочется ошибиться еще до начала
http://stackoverflow.com/questions/10574909/is-there-an-open-source-equivalent-to-amazon-s3
и еще CEPH (в статье не упоминается, но ничо такой, прикольный)
29 июля 2014 г., 21:32 пользователь ded nginx-fo...@nginx.us написал:
Добрый день!
Есть необходимость организовать описанную ниже схему.
Everything is ok , but when add ssl module , such as:
./configure --with-openssl=../boringssl --prefix=/srv1/nginx
--with-http_ssl_module
the make process is error , what can I do next ?
Thanks .
Posted at Nginx Forum:
http://forum.nginx.org/read.php?2,251740,252100#msg-252100
Hum, a documentation of this use case is recommended. Personally, for me it
is completely unknown and uncommon.
Also, isn't caching entirely related to the URL the user used, and has
nothing to do with the backend host?
On Mon, Jun 30, 2014 at 8:48 PM, Maxim Dounin mdou...@mdounin.ru wrote:
Hello,
I recently came across a modified version of zlib with code contributed by
Intel [1] that makes use of modern CPU instructions to increase
performance. In testing, the performance gains seemed substantial, however
when I tried to use this version with nginx, the following alert types
Hello!
On Tue, Jul 29, 2014 at 1:46 PM, Richard Stanway wrote:
I recently came across a modified version of zlib with code contributed by
Intel [1] that makes use of modern CPU instructions to increase performance.
In testing, the performance gains seemed substantial, however when I tried
to
Well, I used to write a patch to enable IPP zlib (8.0) support in
NGINX (enabled by ./configure --with-ipp-zlib), just for your
reference:
Thank you for the patch. This solves the issue with streamed responses,
however when the if (r-headers_out.content_length_n 0) branch is
taken, eg with
Hello!
On Tue, Jul 29, 2014 at 04:49:23PM -0300, Bráulio Bhavamitra wrote:
Hum, a documentation of this use case is recommended. Personally, for me it
is completely unknown and uncommon.
Also, isn't caching entirely related to the URL the user used, and has
nothing to do with the backend
Hello!
On Tue, Jul 29, 2014 at 3:47 PM, Richard Stanway wrote:
Thank you for the patch. This solves the issue with streamed responses,
however when the if (r-headers_out.content_length_n 0) branch is taken,
eg with static content, I still receive the 2nd alert type below.
Oh, we should
Hey Yichun,
Oh, we should probably skip that condition altogether for IPP zlib.
The formula is accurate and was copied directly from the IPP zlib
source code. Try this additional patch:
Just to make this clear, the zlib library that Richard is referring to
is a fork of standard zlib (like
Hello!
On Tue, Jul 29, 2014 at 4:09 PM, Piotr Sikora wrote:
Just to make this clear, the zlib library that Richard is referring to
is a fork of standard zlib (like ours), not IPP zlib.
Okay, I see. Thank you for pointing that out :)
Regards,
-agentzh
Hello!
On Tue, Jul 29, 2014 at 04:06:11PM -0700, Yichun Zhang (agentzh) wrote:
Hello!
On Tue, Jul 29, 2014 at 3:47 PM, Richard Stanway wrote:
Thank you for the patch. This solves the issue with streamed responses,
however when the if (r-headers_out.content_length_n 0) branch is taken,
Hi all,
Had a chat with a helpful person on IRC but both are stumped as to why my
configuration passes a check (nginx -t) but fails to properly handle SSL.
– I’ve split a couple of repetitive blocks out into
/etc/nginx/includes/ssl.conf (-rw-r--r-- root:root - same as nginx.conf -
should not
Hello!
On Tue, Jul 29, 2014 at 10:46:03PM +0200, Richard Stanway wrote:
Hello,
I recently came across a modified version of zlib with code contributed by
Intel [1] that makes use of modern CPU instructions to increase
performance. In testing, the performance gains seemed substantial, however
30 matches
Mail list logo