)]}'
{
  "commit": "d496b3e87c0a34533c816463e799e5955d991251",
  "tree": "1c867137daf53bc2e73d16d260bbe3752f15a87e",
  "parents": [
    "5e3dfd279f69d8d80c69f2001ac7e31c56cc0ad7"
  ],
  "author": {
    "name": "Maxim Dounin",
    "email": "mdounin@mdounin.ru",
    "time": "Mon May 29 16:34:29 2017 +0300"
  },
  "committer": {
    "name": "Maxim Dounin",
    "email": "mdounin@mdounin.ru",
    "time": "Mon May 29 16:34:29 2017 +0300"
  },
  "message": "SSL: set TCP_NODELAY on SSL connections before handshake.\n\nWith OpenSSL 1.1.0+, the workaround for handshake buffer size as introduced\nin a720f0b0e083 (ticket #413) no longer works, as OpenSSL no longer exposes\nhandshake buffers, see https://github.com/openssl/openssl/commit/2e7dc7cd688.\nMoreover, it is no longer possible to adjust handshake buffers at all now.\n\nTo avoid additional RTT if handshake uses more than 4k we now set TCP_NODELAY\non SSL connections before handshake.  While this still results in sub-optimal\nnetwork utilization due to incomplete packets being sent, it seems to be\nbetter than nothing.\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "c41f5f507755445f5d238ddc639279d60cc838b7",
      "old_mode": 33188,
      "old_path": "src/http/ngx_http_request.c",
      "new_id": "fd6b513dc4c54ccac3ea425963165fd0a6d4342f",
      "new_mode": 33188,
      "new_path": "src/http/ngx_http_request.c"
    },
    {
      "type": "modify",
      "old_id": "593776b1fd9b535c6f2e65c25416ab6cda85ad03",
      "old_mode": 33188,
      "old_path": "src/stream/ngx_stream_ssl_module.c",
      "new_id": "937efea57afab0c07c87a565d145339d7971afc1",
      "new_mode": 33188,
      "new_path": "src/stream/ngx_stream_ssl_module.c"
    }
  ]
}
