FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
nginx-devel Robust and small WWW server
1.13.1 www on this many watch lists=27 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 15 Jun 2007 08:23:21
Also Listed In: ipv6
License: BSD2CLAUSE
NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Homepage : PortsMon

To install the port: cd /usr/ports/www/nginx-devel/ && make install clean
To add the package: pkg install nginx-devel

PKGNAME: nginx-devel

distinfo:

TIMESTAMP = 1497052311
SHA256 (nginx-1.13.1.tar.gz) = a5856c72a6609a4dc68c88a7f3c33b79e6693343b62952e021e043fe347b6776
SIZE (nginx-1.13.1.tar.gz) = 984142
SHA256 (ngx_cache_purge-2.3.tar.gz) = 279e0d8a46d3b1521fd43b3f78bc1c08b263899142a7cc5058c1c0361a92c89c
SIZE (ngx_cache_purge-2.3.tar.gz) = 12248
SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae
SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208
SHA256 (nginx_mod_h264_streaming-2.2.7.tar.gz) = 6d974ba630cef59de1f60996c66b401264a345d25988a76037c2856cec756c19
SIZE (nginx_mod_h264_streaming-2.2.7.tar.gz) = 44012
SHA256 (ngx_http_redis-0.3.8.tar.gz) = 95d0ed7be40da2efc88883d72e52e5e272d2c34463583b7078e8fd6d55004934
SIZE (ngx_http_redis-0.3.8.tar.gz) = 12342
SHA256 (ngx_http_response-0.3.tar.gz) = 0835584029f053051c624adbe33a826ab0205c9d85a02af6019e6b57607e9045
SIZE (ngx_http_response-0.3.tar.gz) = 2244
SHA256 (08a395c66e42.tar.gz) = 53e440737ed1aff1f09fae150219a45f16add0c8d6e84546cb7d80f73ebffd90
SIZE (08a395c66e42.tar.gz) = 120603
SHA256 (modsecurity-2.9.1.tar.gz) = 958cc5a7a7430f93fac0fd6f8b9aa92fc1801efce0cda797d6029d44080a9b24
SIZE (modsecurity-2.9.1.tar.gz) = 4261212
SHA256 (passenger-5.1.4.tar.gz) = 6e8460143fff88c7ae833b43ff5389c0b0d2654ee38ab1ac62e24a3814416de0
SIZE (passenger-5.1.4.tar.gz) = 5403636
SHA256 (ngx_slowfs_cache-1.10.tar.gz) = 1e81453942e5b0877de1f1f06c56ae82918ea9818255cb935bcb673c95a758a1
SIZE (ngx_slowfs_cache-1.10.tar.gz) = 11809
SHA256 (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 5534ca63cdfc2a7dc4e1cbf9c2d54d3ed3f0e6c86b4a95be48ec0a3f41cc1eb0
SIZE (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 3393
SHA256 (atomx-nginx-http-auth-digest-519dc2a_GH0.tar.gz) = 6ef8c81267cbb2f912fa3add846fddaaab06d604155de322dad83912410adafc
SIZE (atomx-nginx-http-auth-digest-519dc2a_GH0.tar.gz) = 17778
SHA256 (stnoonan-spnego-http-auth-nginx-module-0c6ff3f_GH0.tar.gz) = 3d3fed1e19a532cdd2a37726953f2b2d4e20891a44119ff6075a6b5891324d2d
SIZE (stnoonan-spnego-http-auth-nginx-module-0c6ff3f_GH0.tar.gz) = 18212
SHA256 (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 0ec4f099e50cc12a6319e37700e71540498d354831d1f09e113ee046ee0bb7b2
SIZE (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 17001
SHA256 (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 77676842919134af88a7b4bfca4470223e3a00d287d17c0dbdc9a114a685b6e7
SIZE (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 6863
SHA256 (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 9e3f78ea73e2d606a95ee64fd3affa4c249f9b342e66b6b11b63061791f28316
SIZE (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 109704
SHA256 (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = db7ceef4ae22cf5bfaf5abae64830dfeef203ca85f9f40f7d1f1d90f277478c0
SIZE (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = 8260
SHA256 (nginx-clojure-nginx-clojure-v0.4.4_GH0.tar.gz) = 642ebf4724fa7c3efd5349e60b442ac8671497406834804c903ec548bfdcb691
SIZE (nginx-clojure-nginx-clojure-v0.4.4_GH0.tar.gz) = 603856
SHA256 (grahamedgecombe-nginx-ct-v1.3.2_GH0.tar.gz) = b4ceae549b9dbf84b2e511633982e4efeee0388e3b7a038a8bac555008a77b88
SIZE (grahamedgecombe-nginx-ct-v1.3.2_GH0.tar.gz) = 6844
SHA256 (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 00d42a5f562a0be5570110d9b70c8f2cace93b292421a6f994cf4ec76a8979f0
SIZE (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 52766
SHA256 (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 58daa08a5ab9b9de5459817fc088230f4092fb818b87a2cb61b217952a5af54d
SIZE (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 17980
SHA256 (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = d3442be9058682ed0ad1d294ab27effcb245c0a320fcf418c452dc923f714531
SIZE (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = 27951
SHA256 (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = d428a0236c933779cb40ac8c91afb19d5c25a376dc3caab825bfd543e1ee530d
SIZE (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = 6260
SHA256 (openresty-nginx-eval-module-342c812_GH0.tar.gz) = c45f6438474593f0cf5229160327d20c2f2d72e9c0b5c8cf9e0ef8d5295de177
SIZE (openresty-nginx-eval-module-342c812_GH0.tar.gz) = 14183
SHA256 (aperezdc-ngx-fancyindex-v0.4.1_GH0.tar.gz) = 2b00d8e0ad2a67152a9cee7b7ee67990c742d501412df912baaf1eee9bb6dc71
SIZE (aperezdc-ngx-fancyindex-v0.4.1_GH0.tar.gz) = 21130
SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813
SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934
SHA256 (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = ebb4652c4f9a2e1ee31fddefc4c93ff78e651a4b2727d3453d026bccbd708d99
SIZE (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = 6766
SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997
SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736
SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885
SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343
SHA256 (slact-nchan-v0.99.16_GH0.tar.gz) = 200cc1b02931a067c3edb07243a7faac80265ce6aab37af680cf7373011efc41
SIZE (slact-nchan-v0.99.16_GH0.tar.gz) = 378626
SHA256 (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = a95f31e80120fd7324795b92a0d94c0b43e1265df7fd0f1eba11a337c1e0a626
SIZE (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = 175263
SHA256 (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = ed4ddbcf0c434f4a1e97b61251a63ace759792764bd5cb79ff20efe348db8db3
SIZE (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = 92230
SHA256 (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 34d51afcd464582e6011a5d3abe6829c5690ddb9b50c993dfdafb4c725a4803a
SIZE (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 48378
SHA256 (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = c6d4e38ad0712c898cc53721f492f8f73acf2753cc0a0769fa34d4d6ba4e8efd
SIZE (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = 28303
SHA256 (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 93e29b9b437a2e34713de54c2861ea51151624aca09f73f9f44d1caaff01a6b1
SIZE (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 16990
SHA256 (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 52e6acd8c0264a59c5c948271015a59acd3cbcf91377456b7c8dc6f9feecef4a
SIZE (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 128281
SHA256 (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = e765afcaab6cd1601e914039a8d00ab18eb6fe01180c58e0e4e098bc5b4d8233
SIZE (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = 10174
SHA256 (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 382bb41fa739f471fdab9fbabc5384d8ec7f25b5bb0c45c153f5cc01d428abe2
SIZE (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 2709351
SHA256 (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 0d780e6fef91814fbaa577c9f7cfb7b78f6898e50c34d63f3c5d101eb45afd44
SIZE (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 26125
SHA256 (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = aafb79d87273eec023025333c34d6d0108026a1ce2e09b20a53e8e2d9bf65080
SIZE (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = 59024
SHA256 (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = bf60cf196c86193376d11f8c7a3826994b24a48bb36943bab8a25af6e776af3b
SIZE (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = 10921
SHA256 (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 88e05a99a8a7419066f5ae75966fb1efc409bad4522d14986da074554ae61619
SIZE (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 66455
SHA256 (openresty-encrypted-session-nginx-module-v0.06_GH0.tar.gz) = fa6537c406cee1dc7acd6152d16dba4581d53587860a0642f1b0f7c817ee006d
SIZE (openresty-encrypted-session-nginx-module-v0.06_GH0.tar.gz) = 11128
SHA256 (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = ef843824e0aac1dd60b392802861cc06426a4bc5f87d472c7ee00b1296693f2a
SIZE (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = 18883
SHA256 (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 552c54aff81c4701ace4eb1ce20c114433ee783b4b06c0105921a830c9486172
SIZE (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 53024
SHA256 (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = cbf6fcddc00a7e30289134bdeace12565e000cc7d4efee2d2ebb8799d0b88270
SIZE (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = 20534
SHA256 (openresty-lua-nginx-module-v0.10.8_GH0.tar.gz) = d67449c71051b3cc2d6dd60df0ae0d21fca08aa19c9b30c5b95ee21ff38ef8dd
SIZE (openresty-lua-nginx-module-v0.10.8_GH0.tar.gz) = 606643
SHA256 (openresty-memc-nginx-module-v0.18_GH0.tar.gz) = 4e280d1dcb8b312bc7875604c1e35b17879279126d3d5fbf482aa9cc7c11276d
SIZE (openresty-memc-nginx-module-v0.18_GH0.tar.gz) = 37113
SHA256 (nbs-system-naxsi-0.54_GH0.tar.gz) = 9cc2c09405bc71f78ef26a8b6d70afcea3fccbe8125df70cb0cfc480133daba5
SIZE (nbs-system-naxsi-0.54_GH0.tar.gz) = 163809
SHA256 (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = c942e674a7273ab87caab4dcad626ab54852be192c29b1add50d2cb535e3cbb9
SIZE (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = 40742
SHA256 (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = b204909c6fb194fe8fed7627a3733bc9598f64251dc04a5b6a5bbd612e925324
SIZE (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = 19444
SHA256 (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 99aedf222a9664484918392988cce41b1a6238240d42f8bd44f5ff102c05c36c
SIZE (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 33496
SHA256 (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = baf5274c815a5f27854747df09ff5bcd6d82e0baa2f224a9db6450d2f3a35a4f
SIZE (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = 28981
SHA256 (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = de5866111a5b18c9dfb1c10f3a0e84b56af77f7005a41807368f7769b8a50965
SIZE (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = 519647
SHA256 (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 5f32c484b29b9047dfa65fd3eec511c0f7c65f0f3ec0a4e0453359cf4642d405
SIZE (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 29340
SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955
SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504
SHA256 (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = c25f284bc934f59a267d319385a3e11858efef786c84b49a77d09e7f5274bbf1
SIZE (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = 16688
SHA256 (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 8f513d6d3df32c3b05327d40e16efd020532a911d3eeca8015eb6271f2d4fd1c
SIZE (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 55918
SHA256 (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = e34b1ab5f5007661f73819f9c20fd6c2a46ed3e53364e9449b02ef2bd3628633
SIZE (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = 58777
SHA256 (kaltura-nginx-vod-module-1.18_GH0.tar.gz) = cba0673725f66279671d9dc0ac7bea6ea78cf963ce1b6582320d10a857a818d3
SIZE (kaltura-nginx-vod-module-1.18_GH0.tar.gz) = 388548
SHA256 (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 958bd8de773601d8d3138501cc4be0420f1c818a3987a70cc9c0023371e432cf
SIZE (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 11477
SHA256 (nginx-njs-753ebe6_GH0.tar.gz) = 43fc7a307ee98b9c55283374b36f1f4576cbf529a4101176cb94ab73f3110f67
SIZE (nginx-njs-753ebe6_GH0.tar.gz) = 191124
SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80
SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280
SHA256 (google-ngx_brotli-ada972b_GH0.tar.gz) = d3d0e22a2629cd017280e05bd3bf05aa7b5c820ebe8c79932ce161243911e776
SIZE (google-ngx_brotli-ada972b_GH0.tar.gz) = 11128
SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106
SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090
SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462
SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Library dependencies:
  1. libpcre.so : devel/pcre
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for nginx-devel-1.13.1:
     DSO=on: Enable dynamic modules support
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     FILE_AIO=on: Enable file aio
     IPV6=on: Enable IPv6 support
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=on: Enable http_addition module
     HTTP_AUTH_REQ=on: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=on: Enable http_webdav module
     HTTP_FLV=on: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GZIP_STATIC=on: Enable http_gzip_static module
     HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_MP4=on: Enable http_mp4 module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=on: Enable http_random_index module
     HTTP_REALIP=on: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=on: Enable http_secure_link module
     HTTP_SLICE=on: Enable http_slice module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=on: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     MAIL=on: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=on: Enable mail_ssl module
     HTTPV2=on: Enable HTTP/2 protocol support (SSL req.)
     NJS=off: Enable http_javascript module
     STREAM=on: Enable stream module
     STREAM_SSL=on: Enable stream_ssl module (SSL req.)
     STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.)
     THREADS=on: Enable threads support
     WWW=on: Enable html sample files
     AJP=off: 3rd party ajp module
     AWS_AUTH=off: 3rd party aws auth module
     CACHE_PURGE=off: 3rd party cache_purge module
     CLOJURE=off: 3rd party clojure module
     CT=off: 3rd party cert_transparency module (SSL req.)
     ECHO=off: 3rd party echo module
     FASTDFS=off: 3rd party fastdfs module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_GEOIP2=off: 3rd party geoip2 module
     HTTP_JSON_STATUS=off: 3rd party http_json_status module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_TARANTOOL=off: 3rd party tarantool upstream module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module
     HTTP_ZIP=off: 3rd party http_zip module
     ARRAYVAR=off: 3rd party array_var module
     BROTLI=off: 3rd party brotli module
     DRIZZLE=off: 3rd party drizzlie module
     DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     NAXSI=off: 3rd party naxsi module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgres module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SHIBBOLETH=off: 3rd party shibboleth module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SMALL_LIGHT=off: 3rd party small_light module
     SRCACHE=off: 3rd party srcache module
     VOD=off: 3rd party vod module
     X11=off: graphics/ImageMagick[-nox11] dependency
     XSS=off: 3rd party xss module
===> Use 'make config' to modify these settings

USES:
cpe ssl gnome

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2016-02-17
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_dynamic_upstream_module.so";
      load_module "modules/ngx_http_small_light_module.so";
    
    
  • 2016-02-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_http_echo_module.so";
      load_module "modules/ngx_http_headers_more_filter_module.so";
      load_module "modules/ngx_http_eval_module.so";
      load_module "modules/ngx_http_lua_module.so";
      load_module "modules/ngx_http_set_misc_module.so";
    
    
  • 2016-02-13
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled.  In case of usage following
      modules please update nginx configuration file for load these modules:
    
      load_module "modules/ngx_http_geoip_module.so";
      load_module "modules/ngx_http_image_filter_module.so";
      load_module "modules/ngx_http_xslt_filter_module.so";
      load_module "modules/ngx_mail_module.so";
      load_module "modules/ngx_stream_module.so";
    
      See https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ for details.
    
    
  • 2011-09-28
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Note: 1.1.4 release introduces several API changes which may affect
      third-party modules.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 788 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
14 Dec 2013 15:59:55
Original commit files touched by this commit  1.5.7
Revision:336456 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.27 to 4.0.29:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.29
--------------

* Fixed a compilation problem on OS X Mavericks.

Release 4.0.28
--------------
(Only the first 15 lines of the commit message are shown above View all of this commit message)
06 Dec 2013 02:28:13
Original commit files touched by this commit  1.5.7
Revision:335722 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.26 to 4.0.27:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* [Apache] Fixed a bug in the Apache module which could lock up the Apache
  process or thread. This is a regression introduced in version 4.0.24.
* Node.js application processes now have friendly process titles.

</ChangeLog>
04 Dec 2013 05:06:16
Original commit files touched by this commit  1.5.7
Revision:335603 This port version is marked as vulnerable.
osa search for other commits by this committer
Make third-party accept_language module fetchable by update to latest version.

PR:	ports/184153
03 Dec 2013 02:37:52
Original commit files touched by this commit  1.5.7
Revision:335545 This port version is marked as vulnerable.
vanilla search for other commits by this committer
Upgrade lua module to 0.9.2, echo module to 0.49.

Approved by:	maintainer (osa@)
01 Dec 2013 16:11:27
Original commit files touched by this commit  1.5.7
Revision:335402 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party ngx_http_redis module from 0.3.6 to 0.3.7.

<ChangeLog>

*) Bugfix: ngx_http_redis_module might issue the error message
   "redis sent invalid trailer" for nginx >= 1.5.3.
   Thanks to Maxim Dounin.

</ChangeLog>
30 Nov 2013 10:29:01
Original commit files touched by this commit  1.5.7
Revision:335279 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.25 to 4.0.26:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Introduced the `PassengerBufferUpload` option for Apache. This option allows
one
  to disable upload buffering, e.g. in order to be able to track upload
progress.
* [Nginx] The `HTTPS` variable is now set correctly for HTTPS connections, even
  without setting `ssl on`. Fixes issue #401.
* [Standalone] It is now possible to listen on both a normal HTTP and an HTTPS
port.
* [Enterprise] The `passenger-status` tool now displays rolling restart status.

</ChangeLog>
24 Nov 2013 14:21:08
Original commit files touched by this commit  1.5.7
Revision:334729 This port version is marked as vulnerable.
vanilla search for other commits by this committer
Update rtmp module to 1.0.6.

Approved by:	osa@ (maintainer)
20 Nov 2013 18:13:08
Original commit files touched by this commit  1.5.7
Revision:334435 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.24 to 4.0.25:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
19 Nov 2013 18:30:54
Original commit files touched by this commit  1.5.7
Revision:334340 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.23 to 4.0.24:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

Try to fix build www/rubygem-passenger with upcoming FreeBSD 10.
19 Nov 2013 18:00:23
Original commit files touched by this commit  1.5.7
Revision:334337 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.5.6 to 1.5.7.

<ChangeLog>

*) Security: a character following an unescaped space in a request line
   was handled incorrectly (CVE-2013-4547); the bug had appeared in
   0.8.41.
   Thanks to Ivan Fratric of the Google Security Team.

*) Change: a logging level of auth_basic errors about no user/password
   provided has been lowered from "error" to "info".

*) Feature: the "proxy_cache_revalidate", "fastcgi_cache_revalidate",
   "scgi_cache_revalidate", and "uwsgi_cache_revalidate" directives.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 Nov 2013 13:20:45
Original commit files touched by this commit  1.5.6
Revision:332711 This port version is marked as vulnerable.
osa search for other commits by this committer
Stagefy.

Thanks to:	danfe
03 Nov 2013 06:32:53
Original commit files touched by this commit  1.5.6
Revision:332591 This port version is marked as vulnerable.
osa search for other commits by this committer
Convert LIB_DEPENDS to new syntax.
02 Nov 2013 11:56:16
Original commit files touched by this commit  1.5.6
Revision:332469 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.21 to 4.0.23:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
26 Oct 2013 13:39:37
Original commit files touched by this commit  1.5.6
Revision:331688 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.20 to 4.0.21:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
12 Oct 2013 07:20:40
Original commit files touched by this commit  1.5.6
Revision:330122 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.19 to 4.0.20:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
01 Oct 2013 17:39:23
Original commit files touched by this commit  1.5.6
Revision:328974 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.5 to 1.5.6.

<ChangeLog>

*) Feature: the "fastcgi_buffering" directive.

*) Feature: the "proxy_ssl_protocols" and "proxy_ssl_ciphers"
   directives.
   Thanks to Piotr Sikora.

*) Feature: optimization of SSL handshakes when using long certificate
   chains.

*) Feature: the mail proxy supports SMTP pipelining.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
29 Sep 2013 15:34:31
Original commit files touched by this commit  1.5.5
Revision:328708 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.17 to 4.0.19:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
28 Sep 2013 20:36:14
Original commit files touched by this commit  1.5.5
Revision:328630 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.4 to 1.5.5.
Remove needless entries for ngx_http_auth_request_module from distinfo, the
module is the part of main distro.

<ChangeLog>

*) Change: now nginx assumes HTTP/1.0 by default if it is not able to
   detect protocol reliably.

*) Feature: the "disable_symlinks" directive now uses O_PATH on Linux.

*) Feature: now nginx uses EPOLLRDHUP events to detect premature
   connection close by clients if the "epoll" method is used.

*) Bugfix: in the "valid_referers" directive if the "server_names"
   parameter was used.

*) Bugfix: the $request_time variable did not work in nginx/Windows.

*) Bugfix: in the "image_filter" directive.
   Thanks to Lanshun Zhou.

*) Bugfix: OpenSSL 1.0.1f compatibility.
   Thanks to Piotr Sikora.

</ChangeLog>
20 Sep 2013 23:36:54
Original commit files touched by this commit  1.5.4
Revision:327776 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
www)
11 Sep 2013 15:17:13
Original commit files touched by this commit  1.5.4
Revision:326987 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.16 to 4.0.17:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
11 Sep 2013 15:00:04
Original commit files touched by this commit  1.5.4
Revision:326983 This port version is marked as vulnerable.
osa search for other commits by this committer
Update patch for third-party http_upload module.

PR:	182010
07 Sep 2013 10:31:24
Original commit files touched by this commit  1.5.4
Revision:326622 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.14 to 4.0.16:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

Also, convert to perl framework nginx ports.
02 Sep 2013 12:06:49
Original commit files touched by this commit  1.5.4
Revision:325980 This port version is marked as vulnerable.
bsam search for other commits by this committer
Adopt USES+=iconv.

Submitted by:	bsam (me, by e-mail)
Approved by:	osa (maintainer)
27 Aug 2013 16:25:56
Original commit files touched by this commit  1.5.4
Revision:325467 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.3 to 1.5.4.

<ChangeLog>

*) Change: the "js" extension MIME type has been changed to
   "application/javascript"; default value of the "charset_types"
   directive was changed accordingly.

*) Change: now the "image_filter" directive with the "size" parameter
   returns responses with the "application/json" MIME type.

*) Feature: the ngx_http_auth_request_module.

*) Bugfix: a segmentation fault might occur on start or during
   reconfiguration if the "try_files" directive was used with an empty
(Only the first 15 lines of the commit message are shown above View all of this commit message)
20 Aug 2013 18:07:11
Original commit files touched by this commit  1.5.3
Revision:325067 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) echo from 0.45 to 0.46;
o) headers-more from 0.20 to 0.22;
o) lua from 0.8.2 to 0.8.6;
o) rtmp from 1.0.2 to 1.0.3;
o) srcache from 0.21 to 0.22.
20 Aug 2013 04:45:54
Original commit files touched by this commit  1.5.3
Revision:325028 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.13 to 4.0.14:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
17 Aug 2013 10:57:29
Original commit files touched by this commit  1.5.3
Revision:324839 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modsecurity module from 2.7.4 to 2.7.5.

<ChangeLog>

23 Jul 2013 - 2.7.5
-------------------
Improvements:

* SecUnicodeCodePage is deprecated. SecUnicodeMapFile now accepts the code page
as
  a second parameter.
* Updated Libinjection to version 3.4.1. Many improvements were made.
* Severity action now supports strings (emergency, alert, critical, error,
warning,
  notice, info, debug).

Bug Fixes:

* Fixed utf8toUnicode tfn null byte conversion.
* Fixed NGINX crash when issue reload command.
* Fixed flush output buffer before inject modified hashed response body.
* Fixed url normalization for Hash Engine.
* Fixed NGINX ap_unixd_set_global_perms_mutex compilation error with apache 2.4
  devel files.

</ChangeLog>
16 Aug 2013 19:35:29
Original commit files touched by this commit  1.5.3
Revision:324816 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 1.0.1 to 1.0.2.
Enable it for www/nginx-devel.
16 Aug 2013 19:14:56
Original commit files touched by this commit  1.5.3
Revision:324815 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.10 to 4.0.13:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
16 Aug 2013 18:52:54
Original commit files touched by this commit  1.5.3
Revision:324814 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.2 to 1.5.3.
Temporary ignore following third-party modules support:
o) HTTP_UPSTREAM_STICKY
o) DRIZZLE
o) POSTGRES
o) RTMP
o) SYSLOG
o) TCP_PROXY

<ChangeLog>

    *) Change in internal API: now u->length defaults to -1 if working with
       backends in unbuffered mode.

    *) Change: now after receiving an incomplete response from a backend
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Aug 2013 22:35:54
Original commit files touched by this commit  1.5.2
Revision:324744  Sanity Test Failure This port version is marked as vulnerable.
ak search for other commits by this committer
- Remove MAKE_JOBS_SAFE variable

Approved by:	portmgr (bdrewery)
22 Jul 2013 14:38:30
Original commit files touched by this commit  1.5.2
Revision:323456 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.8 to 4.0.10:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
10 Jul 2013 17:48:49
Original commit files touched by this commit  1.5.2
Revision:322723 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.1 to 1.5.2.
Temporary ignore third-party syslog support.

<ChangeLog>

*) Feature: now several "error_log" directives can be used.

*) Bugfix: the $r->header_in() embedded perl method did not return value
   of the "Cookie" and "X-Forwarded-For" request header lines; the bug
   had appeared in 1.3.14.

*) Bugfix: in the ngx_http_spdy_module.
   Thanks to Jim Radford.

*) Bugfix: nginx could not be built on Linux with x32 ABI.
   Thanks to Serguei Ivantsov.

</ChangeLog>
10 Jul 2013 17:19:47
Original commit files touched by this commit  1.5.1
Revision:322718 This port version is marked as vulnerable.
osa search for other commits by this committer
Update:
o) third-party passenger module from 4.0.5 to 4.0.8;
o) rubygem-passenger from 4.0.5 to 4.0.8;
o) third-party rtmp module from 1.0.0 to 1.0.1.
04 Jun 2013 14:05:20
Original commit files touched by this commit  1.5.1
Revision:319860 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.0 to 1.5.1.

<ChangeLog>

*) Feature: the "ssi_last_modified", "sub_filter_last_modified", and
   "xslt_last_modified" directives.
   Thanks to Alexey Kolpakov.

*) Feature: the "http_403" parameter of the "proxy_next_upstream",
   "fastcgi_next_upstream", "scgi_next_upstream", and
   "uwsgi_next_upstream" directives.

*) Feature: the "allow" and "deny" directives now support unix domain
   sockets.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 Jun 2013 06:58:09
Original commit files touched by this commit  1.5.0
Revision:319826 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party modsecurity module support, version 2.7.4.
04 Jun 2013 06:46:43
Original commit files touched by this commit  1.5.0
Revision:319825 This port version is marked as vulnerable.
osa search for other commits by this committer
Third-party rtmp module's tarball has been re-rolled without changes in source
code.
So, update checksum and size.

Reported by:	vanilla
29 May 2013 16:52:40
Original commit files touched by this commit  1.5.0
Revision:319383 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.4 to 4.0.5:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
28 May 2013 17:18:02
Original commit files touched by this commit  1.5.0
Revision:319320 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 0.9.18 to 1.0.0.
28 May 2013 16:15:28
Original commit files touched by this commit  1.5.0
Revision:319319 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) lua from 0.8.1 to 0.8.2;
o) srcache from 0.20 to 0.21.
28 May 2013 16:03:07
Original commit files touched by this commit  1.5.0
Revision:319318 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.19 to 4.0.4:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
07 May 2013 11:33:00
Original commit files touched by this commit  1.5.0
Revision:317598 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update to latest versions:

o) www/nginx from 1.4.0 to 1.4.1;
o) www/nginx-devel from 1.4.0 to 1.5.0.

<ChangeLog>

*) Security: a stack-based buffer overflow might occur in a worker
   process while handling a specially crafted request, potentially
   resulting in arbitrary code execution (CVE-2013-2028); the bug had
   appeared in 1.3.9.

   Thanks to Greg MacManus, iSIGHT Partners Labs.

</ChangeLog>
05 May 2013 05:57:13
Original commit files touched by this commit  1.4.0_1
Revision:317395 This port version is marked as vulnerable.
delphij search for other commits by this committer
Update third-party lua module from 0.7.21 to 0.8.1.

Approved by:	maintainer (osa)
03 May 2013 21:53:54
Original commit files touched by this commit  1.4.0_1
Revision:317271 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) echo from 0.42 to 0.45;
o) headers_more from 0.19 to 0.20;
o) push_stream from 0.3.4 to 03.5;
o) upsteam_sticky from 1.0 to 1.1;
o) encrypted_session from 0.02 to 0.03;
o) lua from 0.7.15 to 0.7.21;
o) redis2 from 0.09 to 0.10;
o) rtmp from 0.9.13 to 0.9.18;
o) srcache from 0.19 to 0.20;
o) iconv from 0.10rc7 to 0.10;

Submitted by:	delphij via private mail
03 May 2013 19:50:55
Original commit files touched by this commit  1.4.0_1
Revision:317235 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party drizzle module to version 0.1.5.
Fix pkg-plist for pkgng. (*)

Bump PORTREVISION.

PR:	178123 (*)
02 May 2013 14:31:01
Original commit files touched by this commit  1.4.0
Revision:317122 This port version is marked as vulnerable.
osa search for other commits by this committer
Update to latest stable version 1.4.0.
Merge changes from www/nginx-devel to www/nginx.

<ChangeLog>

*) Bugfix: nginx could not be built with the ngx_http_perl_module if the
   --with-openssl option was used; the bug had appeared in 1.3.16.

*) Bugfix: in a request body handling in the ngx_http_perl_module; the
   bug had appeared in 1.3.9.

</ChangeLog>
16 Apr 2013 18:55:04
Original commit files touched by this commit  1.3.16
Revision:315886 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.15 to 1.3.16.
Fix depends for third-party drizzle module.

Feature safe: yes

<ChangeLog>

*) Bugfix: a segmentation fault might occur in a worker process if
   subrequests were used; the bug had appeared in 1.3.9.

*) Bugfix: the "tcp_nodelay" directive caused an error if a WebSocket
   connection was proxied into a unix domain socket.

*) Bugfix: the $upstream_response_length variable has an incorrect value
   "0" if buffering was not used.
   Thanks to Piotr Sikora.

*) Bugfix: in the eventport and /dev/poll methods.

</ChangeLog>
26 Mar 2013 14:29:11
Original commit files touched by this commit  1.3.15
Revision:315301 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.14 to 1.3.15.
Remove SPDY patch, it has been incorporated into upstream.

<ChangeLog>

*) Change: opening and closing a connection without sending any data in
   it is no longer logged to access_log with error code 400.

*) Feature: the ngx_http_spdy_module.
   Thanks to Automattic for sponsoring this work.

*) Feature: the "limit_req_status" and "limit_conn_status" directives.
   Thanks to Nick Marden.

*) Feature: the "image_filter_interlace" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
22 Mar 2013 16:41:10
Original commit files touched by this commit  1.3.14
Revision:314947 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 0.9.12 to 0.9.13.

Submitted by:	Fedor Dikarev <fedor.dikarev@gmail.com>
21 Mar 2013 02:54:52
Original commit files touched by this commit  1.3.14
Revision:314798 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) naxsi-core from 0.49 to 0.50;
o) rtmp from 0.9.11 to 0.9.12.

Do not bump PORTREVISION.
19 Mar 2013 18:57:46
Original commit files touched by this commit  1.3.14
Revision:314679 This port version is marked as vulnerable.
osa search for other commits by this committer
Update syslog_support patch with module-specific changes.

Original
patch:	https://raw.github.com/yaoweibin/nginx_syslog_patch/master/syslog_1.3.14.patch
19 Mar 2013 18:41:58
Original commit files touched by this commit  1.3.14
Revision:314675 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party module rtmp from 0.9.8 to 0.9.11.
19 Mar 2013 18:36:00
Original commit files touched by this commit  1.3.14
Revision:314672 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party cache_purge module from 2.0 to 2.1.
14 Mar 2013 16:47:23
Original commit files touched by this commit  1.3.14
Revision:314170 This port version is marked as vulnerable.
sbz search for other commits by this committer
- Update third-party NAXSI module to 0.49
- Remove non needed patches

Approved by:	osa (via private mail)
13 Mar 2013 03:23:04
Original commit files touched by this commit  1.3.14
Revision:314018 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 68 to 69.
12 Mar 2013 17:21:02
Original commit files touched by this commit  1.3.14
Revision:313990 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 67 to 68.
10 Mar 2013 18:12:04
Original commit files touched by this commit  1.3.14
Revision:313835 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 66 to 67.
07 Mar 2013 14:30:48
Original commit files touched by this commit  1.3.14
Revision:313591 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party slowfs_cache module from 1.9 to 1.10.
Do not bump PORTREVISION.

<ChangeLog>

* Fix compatibility with nginx-1.1.12+.
  Due to the changes in cache index usage accounting (1 per request
  instead of 1 per access) initial cache insert of "small" file was
  decreasing usage count, rendering index entry invalid.
  Because cache manager ignores invalid entries, expired cache files
  were not being removed from the cache, which forced it to outgrow
  specified "max_size" value.

</ChangeLog>
05 Mar 2013 15:49:44
Original commit files touched by this commit  1.3.14
Revision:313456 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.13 to 1.3.14.
Update SPDY patch from version 65 to 66.

<ChangeLog>

*) Feature: $connections_active, $connections_reading, and
   $connections_writing variables in the ngx_http_stub_status_module.

*) Feature: support of WebSocket connections in the
   ngx_http_uwsgi_module and ngx_http_scgi_module.

*) Bugfix: in virtual servers handling with SNI.

*) Bugfix: new sessions were not always stored if the "ssl_session_cache
   shared" directive was used and there was no free space in shared
   memory.
   Thanks to Piotr Sikora.

*) Bugfix: multiple X-Forwarded-For headers were handled incorrectly.
   Thanks to Neal Poole for sponsoring this work.

*) Bugfix: in the ngx_http_mp4_module.
   Thanks to Gernot Vormayr.

</ChangeLog>
24 Feb 2013 07:03:47
Original commit files touched by this commit  1.3.13
Revision:312862 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 0.8.7 to 0.9.8.
23 Feb 2013 10:44:18
Original commit files touched by this commit  1.3.13
Revision:312805 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules (according to latest stable ngx_openresty-1.2.6.6):

o) echo from 0.41 to 0.42;
o) headers_more from 0.18 to 0.19;
o) lua from 0.6.10 to 0.7.15;
o) srcache from 0.16 to 0.19;
o) forminput from 0.07rc5 to 0.07.
22 Feb 2013 03:26:05
Original commit files touched by this commit  1.3.13
Revision:312749 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix build third-party upload module by adding the patch.

Issue:		https://github.com/vkholodkov/nginx-upload-module/issues/41
Patch from:	http://paste.davromaniak.eu/index.php?show=110

Submitted by:	grzegorz@piklus.pl via private mail
20 Feb 2013 17:47:36
Original commit files touched by this commit  1.3.13
Revision:312634 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_auth_ldap module.

PR:	176297
19 Feb 2013 17:36:56
Original commit files touched by this commit  1.3.13
Revision:312593 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party http_push_stream module.

PR:	174423
19 Feb 2013 17:31:35
Original commit files touched by this commit  1.3.13
Revision:312592 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.12 to 1.3.13.
Update SPDY patch from version 61 to 65.

<ChangeLog>

*) Change: a compiler with name "cc" is now used by default.

*) Feature: support for proxying of WebSocket connections.
   Thanks to Apcera and CloudBees for sponsoring this work.

*) Feature: the "auth_basic_user_file" directive supports "{SHA}"
   password encryption method.
   Thanks to Louis Opter.

</ChangeLog>
13 Feb 2013 09:23:58
Original commit files touched by this commit  1.3.12_1
Revision:312147 This port version is marked as vulnerable.
osa search for other commits by this committer
Add nginx_pid_prefix rcvar for ability to prevent collision with other PIDs
names
when using with profiles.

Bump PORTREVISION.

PR:	175823
07 Feb 2013 12:37:48
Original commit files touched by this commit  1.3.12
Revision:311829 This port version is marked as vulnerable.
gahr search for other commits by this committer
- Get rid of PTHREAD_CFLAGS and PTHREAD_LIBS (category: www)

Approved by:	portmgr
07 Feb 2013 03:16:17
Original commit files touched by this commit  1.3.12
Revision:311809 This port version is marked as vulnerable.
osa search for other commits by this committer
Update devel-kit third-party module from 0.2.17 to 0.2.18.

USE_NGINX_DEVEL_KIT internal knob has been deprecated.

Fix third-party modules build by change configure order.
Fix build with iconv third-party module.			 (*)

Do not bump PORTREVISION.

PR:	175862 (*)
05 Feb 2013 17:16:34
Original commit files touched by this commit  1.3.12
Revision:311724 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.11 to 1.3.12.
Update SPDY patch from version 60 to 61.

<ChangeLog>

*) Feature: variables support in the "proxy_bind", "fastcgi_bind",
   "memcached_bind", "scgi_bind", and "uwsgi_bind" directives.

*) Feature: the $pipe, $request_length, $time_iso8601, and $time_local
   variables can now be used not only in the "log_format" directive.
   Thanks to Kiril Kalchev.

*) Feature: IPv6 support in the ngx_http_geoip_module.
   Thanks to Gregor Kaliie|nik.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 Feb 2013 03:40:57
Original commit files touched by this commit  1.3.11
Revision:311572 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 59 to 60.
27 Jan 2013 16:35:12
Original commit files touched by this commit  1.3.11
Revision:311073 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 58 to 59.
17 Jan 2013 03:36:31
Original commit files touched by this commit  1.3.11
Revision:310538 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 0.8.4 to 0.8.7.

Requested by:	Roman Arutyunyan <arutyunyan.roman@gmail.com> (author)
16 Jan 2013 03:38:23
Original commit files touched by this commit  1.3.11
Revision:310471 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 54 to 58.
12 Jan 2013 07:26:28
Original commit files touched by this commit  1.3.11
Revision:310263 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.8 to 1.3.11.
Update SPDY patch from version 53 to 54.

Chunked support has been implemented and enabled by default in nginx' base, so
remove support for third-party chunkin module.

There are two third-party features are temporary disabled:
o) ngx_http_upload_module;
o) syslog support.

<ChangeLog>

Changes with nginx 1.3.11                                        10 Jan 2013

*) Bugfix: a segmentation fault might occur if logging was used; the bug
(Only the first 15 lines of the commit message are shown above View all of this commit message)
09 Jan 2013 15:52:35
Original commit files touched by this commit  1.3.8_1
Revision:310153 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.17 to 3.0.19:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.

<Changes>

Release 3.0.19
--------------

* Nginx security fix: do not display Nginx version when
  server_tokens are off.
* Fixed compilation problems on some systems.
* Fixed some Union Station-related bugs.

Release 3.0.18
--------------

* Fixed compilation problems on Fedora 17.
* Fixed Union Station compatibility with Rails 3.2.
* Phusion Passenger Enterprise Standalone now supports rolling
  restarts and deployment error resistance.

</Changes>
21 Dec 2012 05:22:17
Original commit files touched by this commit  1.3.8_1
Revision:309339 This port version is marked as vulnerable.
osa search for other commits by this committer
Add PORTREVISION back, introduced in r309338.
21 Dec 2012 05:20:28
Original commit files touched by this commit  1.3.8
Revision:309338 This port version is marked as vulnerable.
osa search for other commits by this committer
Update rtmp third-party module from 0.6.1 to 0.8.4.

Spotted by:	Roman Arutyunyan <arutyunyan.roman@gmail.com> (author)
11 Dec 2012 19:05:28
Original commit files touched by this commit  1.3.8_1
Revision:308706 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_cache_purge module from 1.6 to 2.0.
10 Dec 2012 19:11:12
Original commit files touched by this commit  1.3.8_1
Revision:308630  Sanity Test Failure This port version is marked as vulnerable.
mm search for other commits by this committer
Update PCRE to 8.32
Introduces the UTF-32 library pcre32
Bump PORTREVISION in dependent ports
22 Nov 2012 03:47:21
Original commit files touched by this commit  1.3.8
Revision:307636 This port version is marked as vulnerable.
osa search for other commits by this committer
Use more canonical names for patches.
No functionaly changes.
Don't bump PORTREVISION.

Feature safe: yes
12 Nov 2012 18:37:49
Original commit files touched by this commit  1.3.8
Revision:307342 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 52 to 53.

Feature safe: yes
30 Oct 2012 23:39:59
Original commit files touched by this commit  1.3.8
Revision:306730 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.7 to 1.3.8.

Feature safe:	yes

<ChangeLog>

*) Feature: the "optional_no_ca" parameter of the "ssl_verify_client"
   directive.
   Thanks to Mike Kazantsev and Eric O'Connor.

*) Feature: the $bytes_sent, $connection, and $connection_requests
   variables can now be used not only in the "log_format" directive.
   Thanks to Benjamin Grts+ssing.

*) Feature: the "auto" parameter of the "worker_processes" directive.

*) Bugfix: "cache file ... has md5 collision" alert.

*) Bugfix: in the ngx_http_gunzip_filter_module.

*) Bugfix: in the "ssl_stapling" directive.

</ChangeLog>
17 Oct 2012 02:17:42
Original commit files touched by this commit  1.3.7
Revision:305998 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) drizzle - from 0.1.2 to 0.1.4;
o) lua     - from 0.5.14 to 0.6.10;
o) redis2  - from 0.08rc4 to 0.09;
o) rtmp    - from 0.2.3 to 0.6.1;
o) srcache - from 0.14 to 0.16.

Convert header to modern manner.

Feature safe:	yes
02 Oct 2012 15:04:02
Original commit files touched by this commit  1.3.7
Revision:305163 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.6 to 1.3.7.

<ChangeLog>

*) Feature: OCSP stapling support.
   Thanks to Comodo, DigiCert and GlobalSign for sponsoring this work.

*) Feature: the "ssl_trusted_certificate" directive.

*) Feature: resolver now randomly rotates addresses returned from cache.
   Thanks to Anton Jouline.

*) Bugfix: OpenSSL 0.9.7 compatibility.

</ChangeLog>

Fix SIZE line for ldap third-party module.
20 Sep 2012 03:56:12
Original commit files touched by this commit  1.3.6_1
Revision:304561 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party CT++ module.

Subnmitted:	Veniamin Gvozdikov <g.veniamin@googlemail.com>
PR:		171702
20 Sep 2012 03:44:21
Original commit files touched by this commit  1.3.6_1
Revision:304560 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party http_auth_ldap module.

Submitted by:	rm
PR:		171745
19 Sep 2012 18:29:13
Original commit files touched by this commit  1.3.6_1
Revision:304538 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix rc script for nginx with profiles.		(*)
Configure build with original http_dav if third-party http_dav_ext defined.

Bump PORTREVISIONs.

Found by:	Slava Kokorin <slava.kokorin@gmail.com> (*)
12 Sep 2012 17:00:55
Original commit files touched by this commit  1.3.6
Revision:304154 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.5 to 1.3.6.

<ChangeLog>

*) Feature: the ngx_http_gunzip_filter_module.

*) Feature: the "memcached_gzip_flag" directive.

*) Feature: the "always" parameter of the "gzip_static" directive.

*) Bugfix: in the "limit_req" directive; the bug had appeared in 1.1.14.
   Thanks to Charles Chen.

*) Bugfix: nginx could not be built by gcc 4.7 with -O2 optimization if
   the --with-ipv6 option was used.

</ChangeLog>
28 Aug 2012 18:01:09
Original commit files touched by this commit  1.3.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.15 to 3.0.17:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
26 Aug 2012 16:56:32
Original commit files touched by this commit  1.3.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_substitutions_filter module to "numeric"
release - 0.6.2.
26 Aug 2012 10:58:51
Original commit files touched by this commit  1.3.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_substitutions_filter module to latest snapshot.
21 Aug 2012 17:39:37
Original commit files touched by this commit  1.3.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.4 to 1.3.5.

<ChangeLog>

*) Change: the ngx_http_mp4_module module no longer skips tracks in
   formats other than H.264 and AAC.

*) Bugfix: a segmentation fault might occur in a worker process if the
   "map" directive was used with variables as values.

*) Bugfix: a segmentation fault might occur in a worker process if the
   "geo" directive was used with the "ranges" parameter but without the
   "default" parameter; the bug had appeared in 0.8.43.
   Thanks to Zhen Chen and Weibin Yao.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
21 Aug 2012 03:38:25
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_substitutions_filter module from 0.5.2.r59 to 0.6.0,
relocated to github.

Fix typo for upstream_fair module.				[*]

Submitted by:		Artis Caune <Artis.Caune@gmail.com>	[*]
PR:			170795					[*]
15 Aug 2012 16:02:13
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (sync with openresty-1.2.1.14):

o) lua from 0.5.13 to 0.5.14;
o) srcache from 0.13rc8 to 0.14.
13 Aug 2012 16:38:07
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (sync with openresty-1.2.1.13):

o) lua from 0.5.12 to 0.5.13;
o) echo from 0.38rc2 to 0.41.
13 Aug 2012 16:30:19
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 51 to 52.
09 Aug 2012 12:31:57
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 48 to 51.
07 Aug 2012 17:30:44
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (sync with openresty-1.2.1.9):

o) lua from 0.5.7 to 0.5.12;
o) headers_more from 0.17 to 0.18;
o) drizzle from 0.1.2rc7 to 0.1.2.
04 Aug 2012 06:01:12
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.14 to 3.0.15:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
31 Jul 2012 17:54:29
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.3 to 1.3.4.

<ChangeLog>

*) Change: the "ipv6only" parameter is now turned on by default for
   listening IPv6 sockets.

*) Feature: the Clang compiler support.

*) Bugfix: extra listening sockets might be created.
   Thanks to Roman Odaisky.

*) Bugfix: nginx/Windows might hog CPU if a worker process failed to
   start.
   Thanks to Ricardo Villalobos Guevara.

*) Bugfix: the "proxy_pass_header", "fastcgi_pass_header",
   "scgi_pass_header", "uwsgi_pass_header", "proxy_hide_header",
   "fastcgi_hide_header", "scgi_hide_header", and "uwsgi_hide_header"
   directives might be inherited incorrectly.

</ChangeLog>

Number of commits found: 788 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
eximJun 21
openvpnJun 21
openvpn-mbedtlsJun 21
pear-Horde_ImageJun 21
pear-Horde_ImageJun 21
apache22Jun 20
apache24Jun 20
chromiumJun 16
curlJun 15
linux-flashplayerJun 15
p5-RT-Authen-ExternalAuthJun 15
rt42Jun 15
rt44Jun 15
firefoxJun 13
firefox-esrJun 13

13 vulnerabilities affecting 73 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 30405
Broken 167
Deprecated 83
Ignore 460
Forbidden 0
Restricted 207
No CDROM 84
Vulnerable 153
Expired 37
Set to expire 79
Interactive 0
new 24 hours 6
new 48 hours16
new 7 days42
new fortnight339
new month528

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2017 Dan Langille. All rights reserved.