view xml/en/docs/http/ngx_http_v2_module.xml @ 1926:88228d493640

A note about the module experimental status removed.
author Maxim Konovalov <maxim@nginx.com>
date Thu, 09 Mar 2017 14:00:31 +0000
parents 66a30a380fba
children ffb3570c352c
line wrap: on
line source

<?xml version="1.0"?>

<!--
  Copyright (C) Nginx, Inc.
  -->

<!DOCTYPE module SYSTEM "../../../../dtd/module.dtd">

<module name="Module ngx_http_v2_module"
        link="/en/docs/http/ngx_http_v2_module.html"
        lang="en"
        rev="9">

<section id="summary">

<para>
The <literal>ngx_http_v2_module</literal> module (1.9.5) provides
support for <link url="https://tools.ietf.org/html/rfc7540">HTTP/2</link>
and supersedes the
<link doc="ngx_http_spdy_module.xml">ngx_http_spdy_module</link> module.
</para>

<para>
This module is not built by default, it should be enabled with
the <literal>--with-http_v2_module</literal>
configuration parameter.
</para>

</section>


<section id="issues" name="Known Issues">

<para>
Before version 1.9.14,
buffering of a client request body could not be disabled
regardless of
<link doc="ngx_http_proxy_module.xml" id="proxy_request_buffering"/>,
<link doc="ngx_http_fastcgi_module.xml" id="fastcgi_request_buffering"/>,
<link doc="ngx_http_uwsgi_module.xml" id="uwsgi_request_buffering"/>, and
<link doc="ngx_http_scgi_module.xml" id="scgi_request_buffering"/>
directive values.
</para>

</section>


<section id="example" name="Example Configuration">

<para>
<example>
server {
    listen 443 ssl http2;

    ssl_certificate server.crt;
    ssl_certificate_key server.key;
}
</example>
Note that accepting HTTP/2 connections over TLS requires
the “Application-Layer Protocol Negotiation” (ALPN) TLS extension
support, which is available only since
<link url="http://www.openssl.org">OpenSSL</link> version 1.0.2.
Using the “Next Protocol Negotiation” (NPN) TLS extension for this purpose
(available since OpenSSL version 1.0.1) is not guaranteed to work.
</para>

<para>
Also note that if the
<link doc="ngx_http_ssl_module.xml" id="ssl_prefer_server_ciphers"/> directive
is set to the value “<literal>on</literal>”,
the <link doc="ngx_http_ssl_module.xml" id="ssl_ciphers">ciphers</link>
should be configured to comply with
<link url="https://tools.ietf.org/html/rfc7540#appendix-A">RFC 7540, Appendix A</link>
black list and supported by clients.
</para>

</section>


<section id="directives" name="Directives">

<directive name="http2_chunk_size">
<syntax><value>size</value></syntax>
<default>8k</default>
<context>http</context>
<context>server</context>
<context>location</context>

<para>
Sets the maximum size of chunks
into which the response body is sliced.
A too low value results in higher overhead.
A too high value impairs prioritization due to
<link url="http://en.wikipedia.org/wiki/Head-of-line_blocking">
HOL blocking</link>.
</para>

</directive>


<directive name="http2_body_preread_size">
<syntax><value>size</value></syntax>
<default>64k</default>
<context>http</context>
<context>server</context>
<appeared-in>1.11.0</appeared-in>

<para>
Sets the <value>size</value> of the buffer per each request
in which the request body may be saved
before it is started to be processed.
</para>

</directive>


<directive name="http2_idle_timeout">
<syntax><value>time</value></syntax>
<default>3m</default>
<context>http</context>
<context>server</context>

<para>
Sets the timeout of inactivity after which the connection is closed.
</para>

</directive>


<directive name="http2_max_concurrent_streams">
<syntax><value>number</value></syntax>
<default>128</default>
<context>http</context>
<context>server</context>

<para>
Sets the maximum number of concurrent HTTP/2 streams
in a connection.
</para>

</directive>


<directive name="http2_max_field_size">
<syntax><value>size</value></syntax>
<default>4k</default>
<context>http</context>
<context>server</context>

<para>
Limits the maximum size of
an <link url="https://tools.ietf.org/html/rfc7541">HPACK</link>-compressed
request header field.
The limit applies equally to both name and value.
Note that if Huffman encoding is applied,
the actual size of decompressed name and value strings may be larger.
For most requests, the default limit should be enough.
</para>

</directive>


<directive name="http2_max_header_size">
<syntax><value>size</value></syntax>
<default>16k</default>
<context>http</context>
<context>server</context>

<para>
Limits the maximum size of the entire request header list after
<link url="https://tools.ietf.org/html/rfc7541">HPACK</link> decompression.
For most requests, the default limit should be enough.
</para>

</directive>


<directive name="http2_max_requests">
<syntax><value>number</value></syntax>
<default>1000</default>
<context>http</context>
<context>server</context>
<context>location</context>
<appeared-in>1.11.6</appeared-in>

<para>
Sets the maximum number of requests that can be
served through one HTTP/2 connection,
after which the connection is closed
and the client should use a new connection.
</para>

</directive>


<directive name="http2_recv_buffer_size">
<syntax><value>size</value></syntax>
<default>256k</default>
<context>http</context>

<para>
Sets the size of the per
<link doc="../ngx_core_module.xml" id="worker_processes">worker</link>
input buffer.
</para>

</directive>


<directive name="http2_recv_timeout">
<syntax><value>time</value></syntax>
<default>30s</default>
<context>http</context>
<context>server</context>

<para>
Sets the timeout for expecting more data from the client,
after which the connection is closed.
</para>

</directive>

</section>


<section id="variables" name="Embedded Variables">

<para>
The <literal>ngx_http_v2_module</literal> module
supports the following embedded variables:
<list type="tag" compact="no">

<tag-name id="var_http2"><var>$http2</var></tag-name>
<tag-desc>
negotiated protocol identifier:
“<literal>h2</literal>” for HTTP/2 over TLS,
“<literal>h2c</literal>” for HTTP/2 over cleartext TCP,
or an empty string otherwise.
</tag-desc>

</list>
</para>

</section>

</module>