Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@roman-f5
Copy link
Contributor

Proposed changes

The directive 'ssl_ocsp' accepts 3 options and is defined as an enum, but the type is set to NGX_CONF_FLAG.

This is not a functionality issue but a semantics problem. nginx -t -c validates the config file successfully even without the fix.

However, this issue affects external tools that validate configuration files, including the Nginx Agent.

A few months ago, Crossplane adopted an approach where Nginx source code is scanned to collect a dictionary of valid directives, and their valid contexts and parameters are inferred from the masks used. Since ssl_oscp is marked as a flag parameter in the source code, Crossplane applies that same validation (and therefore anything using Crossplane, like the Agent or NIM, will do the same).

Even though the configuration looks fine from Nginx point of vew, Nginx Agent may report error like:
error reading config from /etc/nginx/nginx.conf, error: invalid value "leaf" in "ssl_ocsp" directive, it must be "on" or "off"

Resolves: #937

@github-actions
Copy link

github-actions bot commented Oct 22, 2025

✅ All required contributors have signed the F5 CLA for this PR. Thank you!
Posted by the CLA Assistant Lite bot.

@roman-f5
Copy link
Contributor Author

I have hereby read the F5 CLA and agree to its terms

@roman-f5
Copy link
Contributor Author

recheck

Copy link
Contributor

@arut arut left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good.

@arut arut merged commit ce30a1c into nginx:master Oct 27, 2025
2 of 3 checks passed
@Maryna-f5 Maryna-f5 added this to the nginx-1.29.3 milestone Oct 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Invalid type for the directive 'ssl_ocsp'

3 participants