Releases: icing/mod_h2
Releases · icing/mod_h2
mod_h2 v0.8.2
- In case "H2SerializeHeaders On" is configured, errorneous requests led to
500 responses. Fixed by installing post_read hooks really early now.
mod_h2 v0.8.1
- added some defensive code for configurations at user that produced duplicate
response headers - added httpd/trunk fix to allocate task memory pools under mplx locking
- updated sandbox httpd to 2.4.16 and nghttp2 to 1.1.2
mod_h2 v0.8.0
- when serving static files, these are kept open longer (and buffer copied
less). Use config "H2SessionExtraFiles" to change the value. The more you
can give per connection, the better. But you may run out of open file
handles, if not careful. Default value is 5, which seems to work on my
config with mpms worker, event and prefork. Basically, eaach httpd process
needs at least #connections + #workers + (#conn * #extrafiles) available. - main connection buffering, buffer sizes and write sizes are configurable,
see README.md for the list of options. buffer sizes and write sizes influence
the TLS performance. Defaults seem reasonably, but ymmv. - general performance improved due to better handling of stream close and
resource cleanup - prefork mpm confirmed working. Unless configured otherwise, each session
will only have 1 worker thread. Raise this with "H2MaxWorkers" - changed sandbox cipher config to mozilla recommendation (thanks Lucas)
- sandbox update to nghttp2 1.0.5
mod_h2 v0.7.3
- sandbox update to nghttp2 1.0.4
- rework of stream scheduling and thread sync
- test suite runs with mpm_prefork on OS X and Ubuntu (feedback welcome)
mod_h2 v0.7.2
- fixes crash with certain modules that (correctly) expected their
pre_connection hooks to work. Solves #28 - fixes log statements and Makefile to compile sandbox on 32bit linux
mod_h2 v0.7.1
- h2_mplx now uses reference counting to enable a controlled destruction on
session termination. If this fixes all the crashes reported, remains to
be seen.
mod_h2 v0.7.0
- switching to nghttp2 v1.0., compilation + linkage with nghttp2 v0.7. will
not work any more as there have been changes in nghttp2's API. The sandbox
builds against v1.0.2 and also pulls curl 7.43.0 which did the same version
switch. - keeping support for h2-16/h2-14 ALPN identifiers until a 1.0 release
- varying h2 support (on|off) among virtual hosts on the same port is now
possible and should work correctly. - improved mod_ssl alpn patch to correctly select the proper virtual host
even if the SSL library invokes SNI after ALPN callbacks. - Disabled NPN support in sandbox built. The patch for httpd 2.4.x is still
there, but no longer applied. - KNOWN ISSUE: when using mpm_event, the error
"error scoreboard is full, not at MaxRequestWorkers"
sometimes happens. Under investigation. mpm_worker ist stable and recommended
for now.
mod_h2 v0.6.6
- adding sni_misdirect.patch for httpd/mod_ssl that changes status code when
TLS connections are reused for other vhosts.
If you have a sandbox already and want to build this, throw away everything in sandbox/install. Otherwise old httpd header files are found and you get compilation errors on mod_ssl.
mod_h2 v0.6.5
- httpd scoreboard fixups: scoreboard handles are still updated on the main
connection from all stream request incoming from it, since it is not trivial
to get new handles for h2 workers. Updating of scoreboard status has been
improved. mpm_worker recommended as the most stable configuration at the moment. - some refacoring to isolate tls/alpn/upgrade code
- adding php-wrapper script to distribution, was missing
mod_h2 v0.6.4
- accepting "h2" on Upgrade: headers and allowing also Upgrade to work on TLS
connections that talk HTTP/1.1. - logging WARNING once when mod_h2 is used in a "prefork" mpm configuration.
There seem to be issues with mod_proxy/rewrite and dankging I/O. - added test suites for combinations with mod_proxy and mod_rewrite
- added test for request with Host: header where h2 is not enabled
- sandbox now builds local openssl 1.0.2 if 1.0.1 or older are installed
on the system. Prior 1.0.1 was accepted, but NPN support will be disabled
soon. - added "Known Problems" section in README
- direct mode should also work with TLS connections, untested currently.