FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
nginx-devel Robust and small WWW server
1.13.5 www on this many watch lists=29 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 15 Jun 2007 08:23:21
Also Listed In: ipv6
License: BSD2CLAUSE
NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Homepage : PortsMon : pkg-plist

To install the port: cd /usr/ports/www/nginx-devel/ && make install clean
To add the package: pkg install nginx-devel

PKGNAME: nginx-devel

distinfo:

TIMESTAMP = 1504807697
SHA256 (nginx-1.13.5.tar.gz) = 0e75b94429b3f745377aeba3aff97da77bf2b03fcb9ff15b3bad9b038db29f2e
SIZE (nginx-1.13.5.tar.gz) = 988821
SHA256 (ngx_cache_purge-2.3.tar.gz) = 279e0d8a46d3b1521fd43b3f78bc1c08b263899142a7cc5058c1c0361a92c89c
SIZE (ngx_cache_purge-2.3.tar.gz) = 12248
SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae
SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208
SHA256 (nginx_mod_h264_streaming-2.2.7.tar.gz) = 6d974ba630cef59de1f60996c66b401264a345d25988a76037c2856cec756c19
SIZE (nginx_mod_h264_streaming-2.2.7.tar.gz) = 44012
SHA256 (ngx_http_redis-0.3.8.tar.gz) = 95d0ed7be40da2efc88883d72e52e5e272d2c34463583b7078e8fd6d55004934
SIZE (ngx_http_redis-0.3.8.tar.gz) = 12342
SHA256 (ngx_http_response-0.3.tar.gz) = 0835584029f053051c624adbe33a826ab0205c9d85a02af6019e6b57607e9045
SIZE (ngx_http_response-0.3.tar.gz) = 2244
SHA256 (08a395c66e42.tar.gz) = 53e440737ed1aff1f09fae150219a45f16add0c8d6e84546cb7d80f73ebffd90
SIZE (08a395c66e42.tar.gz) = 120603
SHA256 (modsecurity-2.9.1.tar.gz) = 958cc5a7a7430f93fac0fd6f8b9aa92fc1801efce0cda797d6029d44080a9b24
SIZE (modsecurity-2.9.1.tar.gz) = 4261212
SHA256 (passenger-5.1.8.tar.gz) = fef10e4a34c3faa48306c21c0789ee4d4d56fc0e30205cc470a91b486b7a4a7d
SIZE (passenger-5.1.8.tar.gz) = 5234529
SHA256 (ngx_slowfs_cache-1.10.tar.gz) = 1e81453942e5b0877de1f1f06c56ae82918ea9818255cb935bcb673c95a758a1
SIZE (ngx_slowfs_cache-1.10.tar.gz) = 11809
SHA256 (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 5534ca63cdfc2a7dc4e1cbf9c2d54d3ed3f0e6c86b4a95be48ec0a3f41cc1eb0
SIZE (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 3393
SHA256 (atomx-nginx-http-auth-digest-519dc2a_GH0.tar.gz) = 6ef8c81267cbb2f912fa3add846fddaaab06d604155de322dad83912410adafc
SIZE (atomx-nginx-http-auth-digest-519dc2a_GH0.tar.gz) = 17778
SHA256 (stnoonan-spnego-http-auth-nginx-module-0c6ff3f_GH0.tar.gz) = 3d3fed1e19a532cdd2a37726953f2b2d4e20891a44119ff6075a6b5891324d2d
SIZE (stnoonan-spnego-http-auth-nginx-module-0c6ff3f_GH0.tar.gz) = 18212
SHA256 (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 0ec4f099e50cc12a6319e37700e71540498d354831d1f09e113ee046ee0bb7b2
SIZE (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 17001
SHA256 (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 77676842919134af88a7b4bfca4470223e3a00d287d17c0dbdc9a114a685b6e7
SIZE (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 6863
SHA256 (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 9e3f78ea73e2d606a95ee64fd3affa4c249f9b342e66b6b11b63061791f28316
SIZE (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 109704
SHA256 (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = db7ceef4ae22cf5bfaf5abae64830dfeef203ca85f9f40f7d1f1d90f277478c0
SIZE (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = 8260
SHA256 (nginx-clojure-nginx-clojure-v0.4.5_GH0.tar.gz) = c6d500f935dde5f87a6eb47ca473094a8ee2c9b4bb4578c9f99ccdc70a12d59e
SIZE (nginx-clojure-nginx-clojure-v0.4.5_GH0.tar.gz) = 602064
SHA256 (grahamedgecombe-nginx-ct-v1.3.2_GH0.tar.gz) = b4ceae549b9dbf84b2e511633982e4efeee0388e3b7a038a8bac555008a77b88
SIZE (grahamedgecombe-nginx-ct-v1.3.2_GH0.tar.gz) = 6844
SHA256 (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 00d42a5f562a0be5570110d9b70c8f2cace93b292421a6f994cf4ec76a8979f0
SIZE (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 52766
SHA256 (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 58daa08a5ab9b9de5459817fc088230f4092fb818b87a2cb61b217952a5af54d
SIZE (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 17980
SHA256 (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = d3442be9058682ed0ad1d294ab27effcb245c0a320fcf418c452dc923f714531
SIZE (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = 27951
SHA256 (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = d428a0236c933779cb40ac8c91afb19d5c25a376dc3caab825bfd543e1ee530d
SIZE (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = 6260
SHA256 (openresty-nginx-eval-module-342c812_GH0.tar.gz) = c45f6438474593f0cf5229160327d20c2f2d72e9c0b5c8cf9e0ef8d5295de177
SIZE (openresty-nginx-eval-module-342c812_GH0.tar.gz) = 14183
SHA256 (aperezdc-ngx-fancyindex-v0.4.1_GH0.tar.gz) = 2b00d8e0ad2a67152a9cee7b7ee67990c742d501412df912baaf1eee9bb6dc71
SIZE (aperezdc-ngx-fancyindex-v0.4.1_GH0.tar.gz) = 21130
SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813
SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934
SHA256 (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = ebb4652c4f9a2e1ee31fddefc4c93ff78e651a4b2727d3453d026bccbd708d99
SIZE (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = 6766
SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997
SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736
SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885
SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343
SHA256 (slact-nchan-v0.99.16_GH0.tar.gz) = 200cc1b02931a067c3edb07243a7faac80265ce6aab37af680cf7373011efc41
SIZE (slact-nchan-v0.99.16_GH0.tar.gz) = 378626
SHA256 (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = a95f31e80120fd7324795b92a0d94c0b43e1265df7fd0f1eba11a337c1e0a626
SIZE (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = 175263
SHA256 (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = ed4ddbcf0c434f4a1e97b61251a63ace759792764bd5cb79ff20efe348db8db3
SIZE (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = 92230
SHA256 (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 34d51afcd464582e6011a5d3abe6829c5690ddb9b50c993dfdafb4c725a4803a
SIZE (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 48378
SHA256 (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = c6d4e38ad0712c898cc53721f492f8f73acf2753cc0a0769fa34d4d6ba4e8efd
SIZE (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = 28303
SHA256 (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 93e29b9b437a2e34713de54c2861ea51151624aca09f73f9f44d1caaff01a6b1
SIZE (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 16990
SHA256 (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 52e6acd8c0264a59c5c948271015a59acd3cbcf91377456b7c8dc6f9feecef4a
SIZE (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 128281
SHA256 (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = e765afcaab6cd1601e914039a8d00ab18eb6fe01180c58e0e4e098bc5b4d8233
SIZE (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = 10174
SHA256 (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 382bb41fa739f471fdab9fbabc5384d8ec7f25b5bb0c45c153f5cc01d428abe2
SIZE (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 2709351
SHA256 (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 0d780e6fef91814fbaa577c9f7cfb7b78f6898e50c34d63f3c5d101eb45afd44
SIZE (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 26125
SHA256 (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = aafb79d87273eec023025333c34d6d0108026a1ce2e09b20a53e8e2d9bf65080
SIZE (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = 59024
SHA256 (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = bf60cf196c86193376d11f8c7a3826994b24a48bb36943bab8a25af6e776af3b
SIZE (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = 10921
SHA256 (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 88e05a99a8a7419066f5ae75966fb1efc409bad4522d14986da074554ae61619
SIZE (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 66455
SHA256 (openresty-encrypted-session-nginx-module-v0.06_GH0.tar.gz) = fa6537c406cee1dc7acd6152d16dba4581d53587860a0642f1b0f7c817ee006d
SIZE (openresty-encrypted-session-nginx-module-v0.06_GH0.tar.gz) = 11128
SHA256 (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = ef843824e0aac1dd60b392802861cc06426a4bc5f87d472c7ee00b1296693f2a
SIZE (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = 18883
SHA256 (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 552c54aff81c4701ace4eb1ce20c114433ee783b4b06c0105921a830c9486172
SIZE (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 53024
SHA256 (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = cbf6fcddc00a7e30289134bdeace12565e000cc7d4efee2d2ebb8799d0b88270
SIZE (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = 20534
SHA256 (openresty-lua-nginx-module-v0.10.8_GH0.tar.gz) = d67449c71051b3cc2d6dd60df0ae0d21fca08aa19c9b30c5b95ee21ff38ef8dd
SIZE (openresty-lua-nginx-module-v0.10.8_GH0.tar.gz) = 606643
SHA256 (openresty-memc-nginx-module-v0.18_GH0.tar.gz) = 4e280d1dcb8b312bc7875604c1e35b17879279126d3d5fbf482aa9cc7c11276d
SIZE (openresty-memc-nginx-module-v0.18_GH0.tar.gz) = 37113
SHA256 (nbs-system-naxsi-0.54_GH0.tar.gz) = 9cc2c09405bc71f78ef26a8b6d70afcea3fccbe8125df70cb0cfc480133daba5
SIZE (nbs-system-naxsi-0.54_GH0.tar.gz) = 163809
SHA256 (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = c942e674a7273ab87caab4dcad626ab54852be192c29b1add50d2cb535e3cbb9
SIZE (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = 40742
SHA256 (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = b204909c6fb194fe8fed7627a3733bc9598f64251dc04a5b6a5bbd612e925324
SIZE (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = 19444
SHA256 (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 99aedf222a9664484918392988cce41b1a6238240d42f8bd44f5ff102c05c36c
SIZE (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 33496
SHA256 (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = baf5274c815a5f27854747df09ff5bcd6d82e0baa2f224a9db6450d2f3a35a4f
SIZE (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = 28981
SHA256 (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = de5866111a5b18c9dfb1c10f3a0e84b56af77f7005a41807368f7769b8a50965
SIZE (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = 519647
SHA256 (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 5f32c484b29b9047dfa65fd3eec511c0f7c65f0f3ec0a4e0453359cf4642d405
SIZE (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 29340
SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955
SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504
SHA256 (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = c25f284bc934f59a267d319385a3e11858efef786c84b49a77d09e7f5274bbf1
SIZE (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = 16688
SHA256 (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 8f513d6d3df32c3b05327d40e16efd020532a911d3eeca8015eb6271f2d4fd1c
SIZE (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 55918
SHA256 (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = e34b1ab5f5007661f73819f9c20fd6c2a46ed3e53364e9449b02ef2bd3628633
SIZE (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = 58777
SHA256 (kaltura-nginx-vod-module-1.18_GH0.tar.gz) = cba0673725f66279671d9dc0ac7bea6ea78cf963ce1b6582320d10a857a818d3
SIZE (kaltura-nginx-vod-module-1.18_GH0.tar.gz) = 388548
SHA256 (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 958bd8de773601d8d3138501cc4be0420f1c818a3987a70cc9c0023371e432cf
SIZE (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 11477
SHA256 (nginx-njs-bd40aea_GH0.tar.gz) = 0fea9022d79db2b74d2da1b44f6366a3c60fe47475b77a80c506ef02ad976151
SIZE (nginx-njs-bd40aea_GH0.tar.gz) = 203897
SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80
SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280
SHA256 (google-ngx_brotli-12529813_GH0.tar.gz) = 788b25c4a3285b34d06e48a469fd0d0cb52d43b43edccd2935e22802dcfd2d69
SIZE (google-ngx_brotli-12529813_GH0.tar.gz) = 10448
SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106
SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090
SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462
SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Library dependencies:
  1. libpcre.so : devel/pcre
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for nginx-devel-1.13.5:
     DSO=on: Enable dynamic modules support
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     FILE_AIO=on: Enable file aio
     IPV6=on: Enable IPv6 support
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=on: Enable http_addition module
     HTTP_AUTH_REQ=on: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=on: Enable http_webdav module
     HTTP_FLV=on: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GZIP_STATIC=on: Enable http_gzip_static module
     HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_MP4=on: Enable http_mp4 module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=on: Enable http_random_index module
     HTTP_REALIP=on: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=on: Enable http_secure_link module
     HTTP_SLICE=on: Enable http_slice module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=on: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     MAIL=on: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=on: Enable mail_ssl module
     HTTPV2=on: Enable HTTP/2 protocol support (SSL req.)
     NJS=off: Enable http_javascript module
     STREAM=on: Enable stream module
     STREAM_SSL=on: Enable stream_ssl module (SSL req.)
     STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.)
     THREADS=on: Enable threads support
     WWW=on: Enable html sample files
     AJP=off: 3rd party ajp module
     AWS_AUTH=off: 3rd party aws auth module
     CACHE_PURGE=off: 3rd party cache_purge module
     CLOJURE=off: 3rd party clojure module
     CT=off: 3rd party cert_transparency module (SSL req.)
     ECHO=off: 3rd party echo module
     FASTDFS=off: 3rd party fastdfs module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_GEOIP2=off: 3rd party geoip2 module
     HTTP_JSON_STATUS=off: 3rd party http_json_status module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_TARANTOOL=off: 3rd party tarantool upstream module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module
     HTTP_ZIP=off: 3rd party http_zip module
     ARRAYVAR=off: 3rd party array_var module
     BROTLI=off: 3rd party brotli module
     DRIZZLE=off: 3rd party drizzlie module
     DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     NAXSI=off: 3rd party naxsi module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgres module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SHIBBOLETH=off: 3rd party shibboleth module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SMALL_LIGHT=off: 3rd party small_light module
     SRCACHE=off: 3rd party srcache module
     VOD=off: 3rd party vod module
     X11=off: graphics/ImageMagick[-nox11] dependency
     XSS=off: 3rd party xss module
===> Use 'make config' to modify these settings

USES:
cpe ssl gnome

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2016-02-17
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_dynamic_upstream_module.so";
      load_module "modules/ngx_http_small_light_module.so";
    
    
  • 2016-02-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_http_echo_module.so";
      load_module "modules/ngx_http_headers_more_filter_module.so";
      load_module "modules/ngx_http_eval_module.so";
      load_module "modules/ngx_http_lua_module.so";
      load_module "modules/ngx_http_set_misc_module.so";
    
    
  • 2016-02-13
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled.  In case of usage following
      modules please update nginx configuration file for load these modules:
    
      load_module "modules/ngx_http_geoip_module.so";
      load_module "modules/ngx_http_image_filter_module.so";
      load_module "modules/ngx_http_xslt_filter_module.so";
      load_module "modules/ngx_mail_module.so";
      load_module "modules/ngx_stream_module.so";
    
      See https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ for details.
    
    
  • 2011-09-28
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Note: 1.1.4 release introduces several API changes which may affect
      third-party modules.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 797 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
05 Apr 2016 12:07:31
Original commit files touched by this commit  1.9.13
Revision:412555 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party nchan (formerly http_push) module from 0.99.8 to 0.99.11.
04 Apr 2016 23:01:33
Original commit files touched by this commit  1.9.13
Revision:412535 This port version is marked as vulnerable.
osa search for other commits by this committer
Change the third-party http_auth_digest module location and upgrade it.
Previous location no longer supported by developers.

PR:	203967
04 Apr 2016 22:35:07
Original commit files touched by this commit  1.9.13
Revision:412534 This port version is marked as vulnerable.
osa search for other commits by this committer
Add AWS proxy third-party module.
PR:	208499
03 Apr 2016 05:48:43
Original commit files touched by this commit  1.9.13
Revision:412450 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party brotli module from 86998c6 to 2fc6f12.

Changes:	https://github.com/google/ngx_brotli/commit/2fc6f123b4ee4ac711c66e7831cb80749eec5bbe
03 Apr 2016 05:33:13
Original commit files touched by this commit  1.9.13
Revision:412449 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.12 to 1.9.13.
Remove needless vendor's patches.

<ChangeLog>

*) Change: non-idempotent requests (POST, LOCK, PATCH) are no longer
   passed to the next server by default if a request has been sent to a
   backend; the "non_idempotent" parameter of the "proxy_next_upstream"
   directive explicitly allows retrying such requests.

*) Feature: the ngx_http_perl_module can be built dynamically.

*) Feature: UDP support in the stream module.

*) Feature: the "aio_write" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
03 Apr 2016 05:23:20
Original commit files touched by this commit  1.9.12_1
Revision:412447 This port version is marked as vulnerable.
osa search for other commits by this committer
Enable several vendor's modules to be in sync with vendor's
original packages for some linux distros, please see
http://nginx.org/en/linux_packages.html for detauls.

Bump PORTREVISION.
01 Apr 2016 14:33:58
Original commit files touched by this commit  1.9.12
Revision:412351 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories v, w, x, y, and z.

With hat:	portmgr
Sponsored by:	Absolight
25 Mar 2016 01:20:36
Original commit files touched by this commit  1.9.12
Revision:411815 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from 39f2320 to 50fbb3b.
23 Mar 2016 11:23:10
Original commit files touched by this commit  1.9.12
Revision:411699 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from 4030015 to 39f232.
18 Mar 2016 11:36:19
Original commit files touched by this commit  1.9.12
Revision:411340 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party push module from 0.99.7 to 0.99.8.
17 Mar 2016 11:24:50
Original commit files touched by this commit  1.9.12
Revision:411271 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party video_thumbextractor module, version 0.7.0.

PRs:	185847, 185850
12 Mar 2016 21:45:19
Original commit files touched by this commit  1.9.12
Revision:410934 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) http_push from 0.99.6 to 0.99.7;
o) modsecurity from 2.9.1-RC1 to 2.9.1.
05 Mar 2016 22:42:12
Original commit files touched by this commit  1.9.12
Revision:410216 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) clojure from 0.4.3 to 0.4.4;
o) http_push from 0.99.5 to 0.99.6.
05 Mar 2016 18:55:52
Original commit files touched by this commit  1.9.12
Revision:410196 This port version is marked as vulnerable.
osa search for other commits by this committer
Enable perl module as dynamic perl, add vendor's patch.
Do not bump PORTREVISION because perl module is disabled by default.
05 Mar 2016 17:42:57
Original commit files touched by this commit  1.9.12
Revision:410193 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix third-party accesskey module behaviour when "satisfy any;" defined.

Spotted by:	Oleksandr V. Typlyns'kyi <astral@wangsamp.km.ua>
Discussion:	http://mailman.nginx.org/pipermail/nginx-ru/2010-March/032654.html
(in Russian)
04 Mar 2016 23:01:06
Original commit files touched by this commit  1.9.12
Revision:410156 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party subs_filter module from 0.6.2 to 0.6.4.

Patch submitted by:	Oleksandr V. Typlyns'kyi <astral@wangsamp.km.ua> (via
private mail)
04 Mar 2016 22:44:20
Original commit files touched by this commit  1.9.12
Revision:410153 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from dbd4181 to 4030015.
04 Mar 2016 22:37:57
Original commit files touched by this commit  1.9.12
Revision:410152 This port version is marked as vulnerable.
osa search for other commits by this committer
Enable third-party passenger module as dynamic.

Patch obtained from:	https://github.com/phusion/passenger/pull/1764
02 Mar 2016 11:52:21
Original commit files touched by this commit  1.9.12
Revision:409928 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.25 to 5.0.26:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
02 Mar 2016 09:45:37
Original commit files touched by this commit  1.9.12
Revision:409921 This port version is marked as vulnerable.
osa search for other commits by this committer
Use more proper knob.
26 Feb 2016 23:19:45
Original commit files touched by this commit  1.9.12
Revision:409639 This port version is marked as vulnerable.
osa search for other commits by this committer
Add vendor's patch, remove needless patch.

Pointed by:	ru
Obtained from:	http://hg.nginx.org/nginx/raw-rev/35487ea55cb6
26 Feb 2016 01:14:17
Original commit files touched by this commit  1.9.12
Revision:409571 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from bb38609 to dbd4181, convert to
build as dynamic module by default.

Do not dump PORTREVISION, this module is disabled by default.
24 Feb 2016 21:36:53
Original commit files touched by this commit  1.9.12
Revision:409484 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.11 to 1.9.12.
Remove needless patch.

<ChangeLog>

*) Feature: Huffman encoding of response headers in HTTP/2.
   Thanks to Vlad Krasnov.

*) Feature: the "worker_cpu_affinity" directive now supports more than
   64 CPUs.

*) Bugfix: compatibility with 3rd party C++ modules; the bug had
   appeared in 1.9.11.
   Thanks to Piotr Sikora.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
22 Feb 2016 23:29:42
Original commit files touched by this commit  1.9.11_2
Revision:409375 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party http_redis module from 0.3.7 to 0.3.8,
compile it as dynamic module for www/nginx-devel.
20 Feb 2016 21:01:52
Original commit files touched by this commit  1.9.11_2
Revision:409266 This port version is marked as vulnerable.
osa search for other commits by this committer
Enable third-party brotli module as dynamic module.
20 Feb 2016 20:10:14
Original commit files touched by this commit  1.9.11_2
Revision:409265 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party ct (Certificate Transparency) module from 1790ac0 to
f3cad5e.
Enable dynamic module feature in www/nginx-devel.
20 Feb 2016 19:42:42
Original commit files touched by this commit  1.9.11_2
Revision:409264 This port version is marked as vulnerable.
osa search for other commits by this committer
Register a list of staged dynamic modules in nginx.conf-dist file automagically.
Bump PORTREVISION.
20 Feb 2016 16:19:10
Original commit files touched by this commit  1.9.11_1
Revision:409253 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.24 to 5.0.25:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
17 Feb 2016 23:28:06
Original commit files touched by this commit  1.9.11_1
Revision:409077 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party nchan (formerly http_push) module from 0.99.4 to 0.99.5.
17 Feb 2016 23:19:38
Original commit files touched by this commit  1.9.11_1
Revision:409076 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party small_light module from 0.6.9 to 0.6.15,
enable as dynamic module for www/nginx-devel only.
17 Feb 2016 23:00:59
Original commit files touched by this commit  1.9.11_1
Revision:409074 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party dynamic_upstream module from 0.1.1 to 0.1.3.

Dynamic modules support has been enabled for the dynamic_upstream
third-party module, in case of usage of this module please update nginx
configuration file for load this module:

load_module "modules/ngx_dynamic_upstream_module.so";

Do not bump PORTREVISION cause this module is disabled by default.
15 Feb 2016 22:01:32
Original commit files touched by this commit  1.9.11_1
Revision:408960 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party http_json_status module.

Submitted by:	Vyacheslav, Omnilance LLC <vyacheslav@omnilance.com>
14 Feb 2016 17:37:23
Original commit files touched by this commit  1.9.11_1
Revision:408872 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules: echo, headers_more and set_misc.

Dynamic modules support has been enabled for these third-party modules,
in case of usage of these modules please update nginx configuration
file for load these modules:

  load_module "modules/ngx_http_echo_module.so";
  load_module "modules/ngx_http_headers_more_filter_module.so";
  load_module "modules/ngx_http_set_misc_module.so";

Do not bump PORTREVISION because these modules disabled by default.
14 Feb 2016 16:54:56
Original commit files touched by this commit  1.9.11_1
Revision:408868 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade two third-party eval and lua modules to its latest revisions.

Dynamic modules support has been enabled for these third-party modules,
in case of usage of these modules please update nginx configuration
file for load these modules:

load_module "modules/ngx_http_eval_module.so";
load_module "modules/ngx_http_lua_module.so";

Do not bump PORTREVISION because these modules disabled by default.
14 Feb 2016 04:09:50
Original commit files touched by this commit  1.9.11_1
Revision:408844 This port version is marked as vulnerable.
osa search for other commits by this committer
Enable dynamic modules support.
Bump PORTREVISION.

In case of usage following modules please update nginx configuration file
for load these modules:

 load_module "modules/ngx_http_geoip_module.so";
 load_module "modules/ngx_http_image_filter_module.so";
 load_module "modules/ngx_http_xslt_filter_module.so";
 load_module "modules/ngx_mail_module.so";
 load_module "modules/ngx_stream_module.so";

See https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ for details.
13 Feb 2016 14:03:55
Original commit files touched by this commit  1.9.11
Revision:408797 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party auth_krb5 module from f76d5d9 to c85a38c revision.
13 Feb 2016 13:37:47
Original commit files touched by this commit  1.9.11
Revision:408794 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party nchan module from 0.98 to 0.99.4.
12 Feb 2016 22:45:46
Original commit files touched by this commit  1.9.11
Revision:408769 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module to the latest version.
12 Feb 2016 12:49:52
Original commit files touched by this commit  1.9.11
Revision:408724 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party brotli module.
12 Feb 2016 12:48:56
Original commit files touched by this commit  1.9.11
Revision:408723 This port version is marked as vulnerable.
osa search for other commits by this committer
Add vendor's patch.

<ChangeLog>

Changes to NGX_MODULE_V1 and ngx_module_t in 85dea406e18f (1.9.11)
broke all modules written in C++, because ISO C++11 does not allow
conversion from string literal to char *.

</ChangeLog>
10 Feb 2016 00:03:49
Original commit files touched by this commit  1.9.11
Revision:408605 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.10 to 1.9.11.

Due to internal changes (TCP support in resolver) I've just added several hacks
for
some third-party module.  These changes should be removed once modules will be
updated.

<ChangeLog>

*) Feature: TCP support in resolver.

*) Feature: dynamic modules.

*) Bugfix: the $request_length variable did not include size of request
   headers when using HTTP/2.

*) Bugfix: in the ngx_http_v2_module.

</ChangeLog>
07 Feb 2016 18:09:28
Original commit files touched by this commit  1.9.10
Revision:408436 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modsecurity module from 2.9.0 to 2.9.1-rc1.
07 Feb 2016 17:36:58
Original commit files touched by this commit  1.9.10
Revision:408431 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party fancy_index module from 0.3.5 to 0.3.6.
07 Feb 2016 17:28:25
Original commit files touched by this commit  1.9.10
Revision:408430 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party ldap_auth module from be8ff8eecb to 8517bb0.
04 Feb 2016 00:40:23
Original commit files touched by this commit  1.9.10
Revision:408008 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party module from 1d4fae9 to the latest revision 466a655.
03 Feb 2016 01:26:36
Original commit files touched by this commit  1.9.10
Revision:407932 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.22 to 5.0.24:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
03 Feb 2016 01:12:35
Original commit files touched by this commit  1.9.10
Revision:407931 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.9.19 to 0.10.0.
02 Feb 2016 23:17:14
Original commit files touched by this commit  1.9.10
Revision:407908 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party http_push (nchan) module from ver.0.731 to ver.0.98.
30 Jan 2016 05:34:41
Original commit files touched by this commit  1.9.10
Revision:407510 This port version is marked as vulnerable.
feld search for other commits by this committer
www/nginx-devel: Update to 1.9.10

PR:		206698
Security:	CVE-2016-0742
Security:	CVE-2016-0746
Security:	CVE-2016-0747
16 Jan 2016 17:50:47
Original commit files touched by this commit  1.9.9
Revision:406253 This port version is marked as vulnerable.
pawel search for other commits by this committer
Remove usage of deprecated @dirrm

Approved by:	portmgr blanket
11 Dec 2015 13:01:23
Original commit files touched by this commit  1.9.9
Revision:403524 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third party push_stream module from 0.3.5 to 0.5.1.

PR:		205233
10 Dec 2015 00:15:37
Original commit files touched by this commit  1.9.9
Revision:403437 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.8 to 1.9.9.

Submitted by:	David CARLIER <devnexen@gmail.com> (via private mail)

<ChangeLog>

*) Bugfix: proxying to unix domain sockets did not work when using
   variables; the bug had appeared in 1.9.8.

</ChangeLog>
08 Dec 2015 23:08:11
Original commit files touched by this commit  1.9.8
Revision:403349 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 5.0.21 to 5.0.22:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.

Please note: third-party passenger module is disabled by default for
www/nginx and www/nginx-devel ports.

Security:	CVE-2015-7519
PR:		205104
08 Dec 2015 22:50:03
Original commit files touched by this commit  1.9.8
Revision:403348 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.7 to 1.9.8.
Add the HTTP_SLICE knob for the ngx_http_slice module.

<ChangeLog>

*) Feature: pwritev() support.

*) Feature: the "include" directive inside the "upstream" block.

*) Feature: the ngx_http_slice_module.

*) Bugfix: a segmentation fault might occur in a worker process when
   using LibreSSL; the bug had appeared in 1.9.6.

*) Bugfix: nginx could not be built on OS X in some cases.

</ChangeLog>
04 Dec 2015 12:26:04
Original commit files touched by this commit  1.9.7_1
Revision:402931 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless code.
04 Dec 2015 12:07:28
Original commit files touched by this commit  1.9.7_1
Revision:402921 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party dynamic_upstream module from 0.1.0 to 0.1.1.
04 Dec 2015 11:59:15
Original commit files touched by this commit  1.9.7_1
Revision:402920 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party srcache module from 0.29 to 0.30.
04 Dec 2015 11:46:39
Original commit files touched by this commit  1.9.7_1
Revision:402919 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party drizzle module from 0.1.8 to 0.1.9.
Remove needless patch.
04 Dec 2015 11:34:04
Original commit files touched by this commit  1.9.7_1
Revision:402918 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless code.
Do not bump PORTREVISION.
02 Dec 2015 00:14:04
Original commit files touched by this commit  1.9.7_1
Revision:402804 This port version is marked as vulnerable.
osa search for other commits by this committer
Sort entries according to order of 'make makesum'.
No functional changes.
02 Dec 2015 00:08:54
Original commit files touched by this commit  1.9.7_1
Revision:402802 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party certificate_transparency module.

PR:	204926
01 Dec 2015 01:34:32
Original commit files touched by this commit  1.9.7_1
Revision:402711 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from e7ea1a7 to 1d4fae9.
01 Dec 2015 01:25:50
Original commit files touched by this commit  1.9.7_1
Revision:402710 This port version is marked as vulnerable.
osa search for other commits by this committer
Enable HTTPv2 by default.
Bump PORTREVISION.
22 Nov 2015 18:33:05
Original commit files touched by this commit  1.9.7
Revision:402238 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.9.18 to 0.9.19.
20 Nov 2015 02:28:21
Original commit files touched by this commit  1.9.7
Revision:401984 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from 8e72a0b to e7ea1a7.
18 Nov 2015 01:11:54
Original commit files touched by this commit  1.9.7
Revision:401838 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.6 to 1.9.7.

<ChangeLog>

*) Feature: the "nohostname" parameter of logging to syslog.

*) Feature: the "proxy_cache_convert_head" directive.

*) Feature: the $realip_remote_addr in the ngx_http_realip_module.

*) Bugfix: the "expires" directive might not work when using variables.

*) Bugfix: a segmentation fault might occur in a worker process when
   using HTTP/2; the bug had appeared in 1.9.6.

*) Bugfix: if nginx was built with the ngx_http_v2_module it was
   possible to use the HTTP/2 protocol even if the "http2" parameter of
   the "listen" directive was not specified.

*) Bugfix: in the ngx_http_v2_module.

</ChangeLog>
12 Nov 2015 03:31:07
Original commit files touched by this commit  1.9.6
Revision:401317 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party ldap module from 928856aa95 to be8ff8eecb.
10 Nov 2015 21:20:03
Original commit files touched by this commit  1.9.6
Revision:401212 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) lua from 0.9.16 to 0.9.18;
o) memc from 0.15 to 0.16;
o) postgres from 1.0rc5 to 1.0rc7;
o) rds-csv from 0.05 to 0.07.
o) rds-json from 0.13 to 0.14;
o) redis2 from 0.11 to 0.12;
o) set-misc from 0.28 to 0.29;

Remove needless patch for third-party postgres module, change
has been added to the upstream.
09 Nov 2015 21:40:35
Original commit files touched by this commit  1.9.6
Revision:401180 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party push_module from 0.692 to 0.731.
Also, the module has been moved to GitHub.
09 Nov 2015 21:31:59
Original commit files touched by this commit  1.9.6
Revision:401179 This port version is marked as vulnerable.
osa search for other commits by this committer
Add experimental HTTP JavaScript module, see https://github.com/nginx/njs for
details.
27 Oct 2015 21:53:17
Original commit files touched by this commit  1.9.6
Revision:400356 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.5 to 1.9.6.

<ChangeLog>

*) Bugfix: a segmentation fault might occur in a worker process when
   using HTTP/2.
   Thanks to Piotr Sikora and Denis Andzakovic.

*) Bugfix: the $server_protocol variable was empty when using HTTP/2.

*) Bugfix: backend SSL connections in the stream module might be timed
   out unexpectedly.

*) Bugfix: a segmentation fault might occur in a worker process if
   different ssl_session_cache settings were used in different virtual
(Only the first 15 lines of the commit message are shown above View all of this commit message)
26 Oct 2015 02:35:17
Original commit files touched by this commit  1.9.5
Revision:400172 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party clojure module from 0.4.2 to 0.4.3.
24 Oct 2015 04:28:32
Original commit files touched by this commit  1.9.5
Revision:400104 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 5.0.20 to 5.0.21:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
12 Oct 2015 03:18:17
Original commit files touched by this commit  1.9.5
Revision:399110 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party naxsi module from 0.50 to 0.54.
Switch from Google Code to GitHub.
08 Oct 2015 15:12:22
Original commit files touched by this commit  1.9.5
Revision:398833 This port version is marked as vulnerable.
olgeni search for other commits by this committer
Remove trailing whitespace from Makefiles, M-X.
25 Sep 2015 23:20:49
Original commit files touched by this commit  1.9.5
Revision:397903 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.18 to 5.0.20:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
23 Sep 2015 00:52:12
Original commit files touched by this commit  1.9.5
Revision:397601 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.9.15 to 0.9.16.
Remove needless patch.
22 Sep 2015 22:09:00
Original commit files touched by this commit  1.9.5
Revision:397595 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.4 to 1.9.5.
Welcome to HTTP/2!
SPDY support has been removed.

<ChangeLog>

*) Feature: the ngx_http_v2_module (replaces ngx_http_spdy_module).
   Thanks to Dropbox and Automattic for sponsoring this work.

*) Change: now the "output_buffers" directive uses two buffers by
   default.

*) Change: now nginx limits subrequests recursion, not simultaneous
   subrequests.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
16 Sep 2015 23:23:34
Original commit files touched by this commit  1.9.4
Revision:397090 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.16 to 5.0.18:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
16 Sep 2015 23:01:05
Original commit files touched by this commit  1.9.4
Revision:397089 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade HTTP/2 patch from v4 to v6.

<ChangeLog>

2015-09-11 Version 6 (NGINX 1.9.4)
 - Sending GOAWAY frame on connection shutdown;
 - Proper handling of huge response headers using CONTINUATION frames;
 - Various minor fixes.

2015-09-08 Version 5 (NGINX 1.9.4)
 - Validation of the request headers;
 - Improved error handling even more;
 - Added the http2_max_header_size directive that limits the maximum size of
   a request headers (16384 bytes by default);
 - Fixed the default value of the http2_max_field_size directive;
 - Limited consumption of memory during the HTTP/2 session;
 - The $request_line variable for HTTP/2 requests now uses "HTTP/2.0" as
   the version token instead of "HTTP/1.1".

</ChangeLog>
07 Sep 2015 02:05:53
Original commit files touched by this commit  1.9.4
Revision:396241 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade HTTPv2 patch from version 3 to version 4.

<ChangeLog>

2015-08-31 Version 4 (NGINX 1.9.4)
 - Improved error handling;
 - Added the http2_max_field_size directive that limits the maximum size of
   a request header field (4096 bytes by default).

</ChangeLog>
07 Sep 2015 01:58:42
Original commit files touched by this commit  1.9.4
Revision:396240 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party clojure module from 0.4.1 to 0.4.2.

While I'm here remove security/shibboleth2-sp as dependency for third-party
shibboleth module.
31 Aug 2015 22:12:31
Original commit files touched by this commit  1.9.4
Revision:395733 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party shibboleth module,
https://github.com/nginx-shib/nginx-http-shibboleth.

Submitted by:	Guy Antony Halse <G.halse@ru.ac.za> (via private mail)
27 Aug 2015 22:19:12
Original commit files touched by this commit  1.9.4
Revision:395446 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.15 to 5.0.16:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
27 Aug 2015 17:36:32
Original commit files touched by this commit  1.9.4
Revision:395441 This port version is marked as vulnerable.
vg search for other commits by this committer
Added 3rd party tarantool upstream module:

Tarantool NginX upstream module

- Benefit from nginx features and tarantool features over HTTP(S).
- Call tarantool methods via JSON RPC.
- Load Balancing with elastic configuration.
- Backup and fault tolerance.
- Low overhead.

PR:		ports/202593
Approved by:	osa
19 Aug 2015 21:13:02
Original commit files touched by this commit  1.9.4
Revision:394814 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.3 to 1.9.4.
Upgrade HTTP/2 implementation patch from v2 to v3.

<ChangeLog>

*) Change: the "proxy_downstream_buffer" and "proxy_upstream_buffer"
   directives of the stream module are replaced with the
   "proxy_buffer_size" directive.

*) Feature: the "tcp_nodelay" directive in the stream module.

*) Feature: multiple "sub_filter" directives can be used simultaneously.

*) Feature: variables support in the search string of the "sub_filter"
   directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Aug 2015 22:58:03
Original commit files touched by this commit  1.9.3
Revision:394262 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade HTTP/2 patch from v.1 to v.2.
13 Aug 2015 00:58:37
Original commit files touched by this commit  1.9.3
Revision:394047 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party clojure module from 0.4.0 to 0.4.1.
10 Aug 2015 22:30:21
Original commit files touched by this commit  1.9.3
Revision:393918 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.14 to 5.0.15:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
10 Aug 2015 22:19:52
Original commit files touched by this commit  1.9.3
Revision:393916 This port version is marked as vulnerable.
osa search for other commits by this committer
Add HTTP/2 protocol support.
Please read http://nginx.org/patches/http2/README.txt for details.
10 Aug 2015 12:03:27
Original commit files touched by this commit  1.9.3
Revision:393858 This port version is marked as vulnerable.
osa search for other commits by this committer
Use luajit instead of lua for third-party modsecurity module, sort list of
dependences for it.

PR:	200263
17 Jul 2015 00:11:51
Original commit files touched by this commit  1.9.3
Revision:392328 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.13 to 5.0.14:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
14 Jul 2015 21:59:38
Original commit files touched by this commit  1.9.3
Revision:392102 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.2 to 1.9.3.

<ChangeLog>

*) Change: duplicate "http", "mail", and "stream" blocks are now
   disallowed.

*) Feature: connection limiting in the stream module.

*) Feature: data rate limiting in the stream module.

*) Bugfix: the "zone" directive inside the "upstream" block did not work
   on Windows.

*) Bugfix: compatibility with LibreSSL in the stream module.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
10 Jul 2015 17:12:59
Original commit files touched by this commit  1.9.2_2
Revision:391712 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party KRB5/SPNEGO module to the latest upstream version.

No cookie for:	philip
05 Jul 2015 23:43:09
Original commit files touched by this commit  1.9.2_2
Revision:391378 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party clojure module from 0.3.0 to 0.4.0.
04 Jul 2015 22:24:35
Original commit files touched by this commit  1.9.2_2
Revision:391335 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.11 to 5.0.13:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
04 Jul 2015 21:54:54
Original commit files touched by this commit  1.9.2_2
Revision:391333 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party headers_more module from 0.26 to 0.261.
03 Jul 2015 16:44:59
Original commit files touched by this commit  1.9.2_2
Revision:391254 This port version is marked as vulnerable.
koobs search for other commits by this committer
www/nginx{-deve}: Fix build with HEADERS_MORE option

Upstream apparently re-tagged the v0.26 release, thereby changing the contents
of the tarball oftained from github, causing distinfo checksums to become
mismatched.

This change updates distinfo entries in nginx and nginx-devel to compensate.

PR:		201129
Submitted by:	Adam Twardowski <adam dot twardowski gmail.com>
Approved by:	portmgr (blanket)
MFH:		2015Q3
01 Jul 2015 09:29:58
Original commit files touched by this commit  1.9.2_1
Revision:391039 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.10 to 5.0.11:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
25 Jun 2015 21:06:39
Original commit files touched by this commit  1.9.2_1
Revision:390602 This port version is marked as vulnerable.
osa search for other commits by this committer
Be more accurate with tmpdir removal and remove only empty tmpdir.
Cause otherwise removal non-empty tmpdir breaks running nginx instance.

Bump PORTREVISION.

PR:		201045
Tested by:	grembo

Number of commits found: 797 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
apache22Sep 19
apache24Sep 19
asterisk11Sep 19
asterisk13Sep 19
firefox*Sep 19
firefox*Sep 19
firefox-esr*Sep 19
firefox-esr*Sep 19
libxul*Sep 19
libxul*Sep 19
linux-firefox*Sep 19
linux-firefox*Sep 19
linux-seamonkey*Sep 19
linux-seamonkey*Sep 19
linux-thunderbird*Sep 19

12 vulnerabilities affecting 85 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 31454
Broken 114
Deprecated 74
Ignore 382
Forbidden 0
Restricted 174
No CDROM 78
Vulnerable 49
Expired 18
Set to expire 70
Interactive 0
new 24 hours 2
new 48 hours3
new 7 days139
new fortnight2842
new month4416

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2017 Dan Langille. All rights reserved.