FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
nginx-devel Robust and small WWW server
1.7.7_1 www on this many watch lists=18 search for ports that depend on this port An older version of this port was marked as vulnerable.
Maintained by: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 15 Jun 2007 08:23:21
Also Listed In: ipv6
License: BSD


NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Main Web Site : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Required To Build:
  1. security/openssl
Required To Run:
  1. security/openssl
Required Libraries:
  1. devel/pcre
There are no ports dependent upon this port

To install the port: cd /usr/ports/www/nginx-devel/ && make install clean
To add the package: pkg install www/nginx-devel


Configuration Options
===> The following configuration options are available for nginx-devel-1.7.7_1:
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     FILE_AIO=off: Enable file aio
     IPV6=on: IPv6 protocol support
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=off: Enable http_addition module
     HTTP_AUTH_REQ=off: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=off: Enable http_webdav module
     HTTP_FLV=off: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GZIP_STATIC=off: Enable http_gzip_static module
     HTTP_GUNZIP_FILTER=off: Enable http_gunzip_filter module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=off: Enable http_random_index module
     HTTP_REALIP=off: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=off: Enable http_secure_link module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=off: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     MAIL=off: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=off: Enable mail_ssl module
     SPDY=off: Enable SPDY protocol support (SSL req.)
     WWW=on: Enable html sample files
     CACHE_PURGE=off: 3rd party cache_purge module
     CTPP2=off: 3rd party CT++ module
     ECHO=off: 3rd party echo module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_ACCESSKEY=off: 3rd party http_accesskey module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_ZIP=off: 3rd party http_zip module
     ARRAYVAR=off: 3rd party array_var module
     DRIZZLE=off: 3rd party drizzlie module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     NAXSI=off: 3rd party naxsi module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgresql module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SRCACHE=off: 3rd party srcache module
     SUPERVISORD=off: 3rd party supervisord module
     SYSLOG_SUPPORT=off: 3rd party syslog support
     TCP_PROXY=off: 3rd party tcp_proxy module
     UDPLOG=off: 3rd party udplog (syslog) module
     XRID_HEADER=off: 3rd party x-rid header module
     XSS=off: 3rd party xss module
     VIDEO=off: Video module support
====> Video module support: you can only select none or one of them
     HTTP_MP4=off: Enable http_mp4 module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
===> Use 'make config' to modify these settings

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.FreeBSD.org/ports-distfiles/
  3. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  5. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  6. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2011-09-28
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.ORG
    Reason: 
      Note: 1.1.4 release introduces several API changes which may affect
      third-party modules.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 537 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
16 Nov 2010 19:32:10
Original commit files touched by this commit  0.8.53
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly (www/nginx and www/nginx-devel):
*) update third-party http_auth_pam module from 1.1 to 1.2.
*) remove MD5.

Do not bump PORTREVISIONs.
28 Oct 2010 09:45:31
Original commit files touched by this commit  0.8.53
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly (www/nginx and www/nginx-devel):

*) update third party memc module from 0.08 to 0.11;
*) remove third party passenger module, since it possible to run as
   standalone server.
18 Oct 2010 12:58:15
Original commit files touched by this commit  0.8.53
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.52 to 0.8.53.
Update third-party fancyindex module from 0.2.5 to 0.3.

<ChangeLog>

*) Feature: now the "error_page" directive allows to change a status
   code in a redirect.

*) Feature: the "gzip_disable" directive supports special "degradation"
   mask.

*) Bugfix: a socket leak might occurred if file AIO was used.
   Thanks to Maxim Dounin.

*) Bugfix: if the first server had no "listen" directive and there was
   no explicit default server, then a next server with a "listen"
   directive became the default server; the bug had appeared in 0.8.21.

</ChangeLog>
30 Sep 2010 09:45:23
Original commit files touched by this commit  0.8.52_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix CONFLICTS.

Bump PORTREVISION.

PR:     ports/151072
30 Sep 2010 09:41:59
Original commit files touched by this commit  0.8.52
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.51 to 0.8.52.
Remove the IGNORE after understanding the coexistence of two ports.

<ChangeLog>

*) Bugfix: nginx used SSL mode for a listen socket if any listen option
   was set; the bug had appeared in 0.8.51.

</ChangeLog>
28 Sep 2010 06:32:17
Original commit files touched by this commit  0.8.51
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.67 to latest stable version 0.8.51 by merge changes from
www/nginx-devel.

Update CONFLIGS and temporary mark IGNORE www/nginx-devel, because latest
version available from www/nginx.

<Announcement>

Now the 0.8.x branch becomes a stable branch.  The new features have been
appeared during 0.8 development:

o named regular expression captures;
o file AIO in FreeBSD and Linux;
o SSL CRL;
o SCGI and uwsgi modules.

</Announcement>
28 Sep 2010 04:00:32
Original commit files touched by this commit  0.8.51
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upload module from 2.0.12 to 2.2.0.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Added feature: resumable uploads.
*) Added feature: allow to use of $variables in "upload_pass"
   directive (Piotr Sikora).
*) Added feature: allow module's directives inside if
   statements (David Backeus).
*) Added feature: directive upload_tame_arrays and ability to
   do some magic with php arrays.

</ChangeLog>
27 Sep 2010 14:24:51
Original commit files touched by this commit  0.8.51
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.50 to 0.8.51.

<ChangeLog>

*) Change: the "secure_link_expires" directive has been canceled.

*) Change: a logging level of resolver errors has been lowered from
   "alert" to "error".

*) Feature: now a listen socket "ssl" parameter may be set several
   times.

</ChangeLog>
14 Sep 2010 18:57:55
Original commit files touched by this commit  0.8.50_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upstream_keepalive from 0.2 to 0.3.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Bugfix: cached connections might be closed needlessly.
   Thanks to Martin Fjordvald.

*) Bugfix: in memory allocation error handling on config creation.

</ChangeLog>

This commit is dedicate to my sister's birthday.
13 Sep 2010 17:10:35
Original commit files touched by this commit  0.8.50_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party mod_zip from 1.1.5 to 1.1.6.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: Support for UTF-8 filenames. Thanks to Robbie Scott/Bandcamp.

*) Feature: Issue subrequests serially. Thanks to Brian Moran/OneHub.

*) Feature: Use Zip64 when archive is larger than 4 GB. Thanks to Vasily
   Fedoseyev.

*) Bugfix: Support spaces in URLs.

</ChangeLog>
03 Sep 2010 13:21:31
Original commit files touched by this commit  0.8.50_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Install three plain configuration files with -dist prefix.
Do not remove *cgi_params configuration files, which may carefully
edited by the user.

Bump PORTREVISION.
03 Sep 2010 03:59:27
Original commit files touched by this commit  0.8.50
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party mogilefs module from 1.0.3 to 1.0.4.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Added feature: multiple $mogilefs_path variables.

*) Fixed bug: segfault on reconfiguration due to uninitialized class
   template (thanks to Pyry Hakulinen).

</ChangeLog>
02 Sep 2010 18:09:13
Original commit files touched by this commit  0.8.50
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.49 to 0.8.50.

<ChangeLog>

*) Feature: the "secure_link", "secure_link_md5", and
   "secure_link_expires" directives of the ngx_http_secure_link_module.

*) Feature: the -q switch.
   Thanks to Gena Makhomed.

*) Bugfix: worker processes may got caught in an endless loop during
   reconfiguration, if a caching was used; the bug had appeared in
   0.8.48.

*) Bugfix: in the "gzip_disable" directive.
   Thanks to Derrick Petzold.

*) Bugfix: nginx/Windows could not send stop, quit, reopen, and reload
   signals to a process run in other session.

</ChangeLog>
18 Aug 2010 09:37:34
Original commit files touched by this commit  0.8.49
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_http_redis module from 0.3.1 to 0.3.2.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Bugfix: ngx_http_redis_module might issue the error message
   "redis sent invalid trailer".  For more information see:

*) Change: now the $redis_db set is not obligatory; default
   value is "0".

</ChangeLog>
12 Aug 2010 03:30:56
Original commit files touched by this commit  0.8.49
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_cache_purge module from 1.1 to 1.2.
Do not bump PORTREVISIONs.

<ChangeLog>

* Fix various build scenarios with disabled upstream modules.
  Reported by Johan Bergstroem.

* Add ability to purge content from SCGI's cache.
  Requested by Johan Bergstroem.

</ChangeLog>
09 Aug 2010 09:15:38
Original commit files touched by this commit  0.8.49
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.48 to 0.8.49.

<ChangeLog>

*) Feature: the "image_filter_jpeg_quality" directive supports
   variables.

*) Bugfix: a segmentation fault might occur in a worker process, if the
   $geoip_region_name variables was used; the bug had appeared in
   0.8.48.

*) Bugfix: errors intercepted by error_page were cached only for next
   request; the bug had appeared in 0.8.48.

</ChangeLog>
03 Aug 2010 15:48:44
Original commit files touched by this commit  0.8.48
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.47 to 0.8.48.

<ChangeLog>

*) Change: now the "server_name" directive default value is an empty
   name "".
   Thanks to Gena Makhomed.

*) Change: now the "server_name_in_redirect" directive default value is
   "off".

*) Feature: the $geoip_dma_code, $geoip_area_code, and
   $geoip_region_name variables.
   Thanks to Christine McGonagle.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
28 Jul 2010 17:05:26
Original commit files touched by this commit  0.8.47
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.46 to 0.8.47.

<ChangeLog>

*) Bugfix: $request_time variable had invalid values for subrequests.

*) Bugfix: errors intercepted by error_page could be cached.

*) Bugfix: a cache manager process my got caught in an endless loop, if
   max_size parameter was used; the bug had appeared in 0.8.46.

</ChangeLog>
19 Jul 2010 20:52:03
Original commit files touched by this commit  0.8.46
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.45 to 0.8.46.

Feature safe:   yes

<ChangeLog>

*) Change: now the "proxy_no_cache", "fastcgi_no_cache",
   "uwsgi_no_cache", and "sÓgi_no_cache" directives affect on a cached
   response saving only.

*) Feature: the "proxy_cache_bypass", "fastcgi_cache_bypass",
   "uwsgi_cache_bypass", and "sÓgi_cache_bypass" directives.

*) Bugfix: nginx did not free memory in cache keys zones if there was
   an error during working with backend: the memory was freed only
   after inactivity time or on memory low condition.

</ChangeLog>
14 Jul 2010 12:19:44
Original commit files touched by this commit  0.8.45
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.44 to 0.8.45.
Add missing file scgi_params.

Feature safe:   yes

<ChangeLog>

*) Feature: ngx_http_xslt_filter improvements.
   Thanks to Laurence Rowe.

*) Bugfix: SSI response might be truncated after include with
   wait="yes"; the bug had appeared in 0.7.25.
   Thanks to Maxim Dounin.

*) Bugfix: the "listen" directive did not support the "setfib=0"
   parameter.

</ChangeLog>
05 Jul 2010 20:07:13
Original commit files touched by this commit  0.8.44
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.43 to 0.8.44.

Feature safe:   yes

<ChangeLog>

*) Change: now nginx does not cache by default backend responses, if
   they have a "Set-Cookie" header line.

*) Feature: the "listen" directive supports the "setfib" parameter.
   Thanks to Andrew Filonov.

*) Bugfix: the "sub_filter" directive might change character case on
   partial match.

*) Bugfix: compatibility with HP/UX.

*) Bugfix: compatibility with AIX xcl_r compiler.

*) Bugfix: nginx treated a large SSLv2 packets as plain requests.
   Thanks to Miroslaw Jaworski.

</ChangeLog>
01 Jul 2010 15:22:20
Original commit files touched by this commit  0.8.43
 This port version is marked as vulnerable.
osa search for other commits by this committer
Convert post-patch target to EXTRA_PATCHES entries for patches for third-party
modules.
No functionally changes.
Do not bump PORTREVISIONs.

Spotted by:     Maxim Dounin aka mdounin at mdounin dot ru

Feature safe:   yes
30 Jun 2010 17:35:58
Original commit files touched by this commit  0.8.43
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update passenger from 2.2.14 to 2.2.15 for:

o) www/nginx and www/nginx-devel        [1]
o) www/rubygem-passenger                [2]

Remove needless patch.

[1] Do not bump PORTREVISION.
[2] Approved by:        Jacob Atzen aka jatzen at gmail dot com (maintainer)

Feature safe:           yes
30 Jun 2010 15:41:56
Original commit files touched by this commit  0.8.43
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.42 to 0.8.43.

Feature safe:   yes

<ChangeLog>

*) Feature: large geo ranges base loading speed-up.

*) Bugfix: an error_page redirection to "location /zero { return 204;
   }" without changing status code kept the error body; the bug had
   appeared in 0.8.42.

*) Bugfix: nginx might close IPv6 listen socket during
   reconfiguration.
   Thanks to Maxim Dounin.

*) Bugfix: the $uid_set variable may be used at any request processing
   stage.

</ChangeLog>
21 Jun 2010 11:34:12
Original commit files touched by this commit  0.8.42
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.41 to 0.8.42.
Keep http*temp-path options sorted.

Feature safe: yes

<ChangeLog>

*) Change: now nginx tests locations given by regular expressions, if
   request was matched exactly by a location given by a prefix string.
   The previous behavior has been introduced in 0.7.1.

*) Feature: the ngx_http_scgi_module.
   Thanks to Manlio Perillo.

*) Feature: a text answer may be added to a "return" directive.

</ChangeLog>
18 Jun 2010 06:55:17
Original commit files touched by this commit  0.8.41_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Change broken MASTER_SITES for third-party fancyindex module to
MASTER_SITE_LOCAL. (*)
Uniform fancyindex tarball for stable and devel version.
No functionaly changes.
Do not bump PORTREVISION.

(*) Notice from:        Rafal Szkodzinski aka uid at atnus dot com
17 Jun 2010 14:08:53
Original commit files touched by this commit  0.8.41_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing file uwsgi_params.
Bump PORTREVISION.

Submitted by:   Hizbulin Ildar aka hizel at vyborg dot ru
PR:             ports/147937
15 Jun 2010 12:10:51
Original commit files touched by this commit  0.8.41
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.40 to 0.8.41.

<ChangeLog>

*) Security: nginx/Windows worker might be terminated abnormally if a
   requested file name has invalid UTF-8 encoding.

*) Change: now nginx allows to use spaces in a request line.

*) Bugfix: the "proxy_redirect" directive changed incorrectly a backend
   "Refresh" response header line.
   Thanks to Andrey Andreew and Max Sogin.

*) Bugfix: nginx did not support path without host name in
   "Destination" request header line.

</ChangeLog>
10 Jun 2010 17:12:31
Original commit files touched by this commit  0.8.40_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.2 to 0.2.5.
Remove needless patches.

Do not bump PORTREVISIONs.
10 Jun 2010 07:19:18
Original commit files touched by this commit  0.8.40_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Configure temporary path for ngx_http_uwsgi_module.
Bump PORTREVISION.

Submitted by:   Piotr Sikora aka piotr dot sikora at frickle dot com
08 Jun 2010 11:28:41
Original commit files touched by this commit  0.8.40
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.4 to 1.5.
Remove needless patch.

Do not bump PORTREVISIONs.
08 Jun 2010 04:47:29
Original commit files touched by this commit  0.8.40
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party cache_purge module from 1.0 to 1.1.

Do not bump PORTREVISIONs.
07 Jun 2010 13:34:24
Original commit files touched by this commit  0.8.40
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.39 to 0.8.40.
License.

<ChangeLog>

*) Security: now nginx/Windows ignores default file stream name.
   Thanks to Jose Antonio Vazquez Gonzalez.

*) Feature: the ngx_http_uwsgi_module.
   Thanks to Roberto De Ioris.

*) Feature: a "fastcgi_param" directive with value starting with
   "HTTP_" overrides a client request header line.

*) Bugfix: the "If-Modified-Since", "If-Range", etc. client request
   header lines were passed to FastCGI-server while caching.

*) Bugfix: listen unix domain socket could not be changed during
   reconfiguration.
   Thanks to Maxim Dounin.

</ChangeLog>
07 Jun 2010 02:45:14
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.09 to 0.10.

Do not bump PORTREVISIONs.
06 Jun 2010 07:09:19
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 2.2.12 to 2.2.14:

1) third-party passenger module for www/nginx and www/nginx-devel
2) www/rubygem-passenger

Do not bump PORTREVISIONs. [1]

Approved by:    Jacob Atzen aka jatzen at gmail dot com [2]
02 Jun 2010 17:14:56
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.08 to 0.09.

Do not bump PORTREVISIONs.
01 Jun 2010 09:43:03
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update:

1) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx
2) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx-devel
3) www/rubygem-passenger from 2.2.11 to 2.2.12

Remove needless patch. [2]

Do not bump PORTREVISIONs.

Approved by:    Jacob Atzen aka jatzen at gmail dot com [3]
31 May 2010 16:34:49
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.38 to 0.8.39.

<ChangeLog>

*) Bugfix: an inherited "alias" directive worked incorrectly in
   inclusive location.

*) Bugfix: in "alias" with variables and "try_files" directives
   combination.

*) Bugfix: listen unix domain and IPv6 sockets did not inherit while
   online upgrade.
   Thanks to Maxim Dounin.

</ChangeLog>
25 May 2010 16:10:57
Original commit files touched by this commit  0.8.38
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.3 to 1.4.
Remove needless patch.

Do not bump PORTREVISIONs.
24 May 2010 17:17:17
Original commit files touched by this commit  0.8.38
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.37 to 0.8.38.
Add four hacks for third-party modules.

<ChangeLog>

*) Feature: the "proxy_no_cache" and "fastcgi_no_cache" directives.

*) Feature: now the "rewrite" directive does a redirect automatically
   if the $scheme variable is used.
   Thanks to Piotr Sikora.

*) Bugfix: now "limit_req" delay directive conforms to the described
   algorithm.
   Thanks to Maxim Dounin.

*) Bugfix: the $uid_got variable might not be used in the SSI and perl
   modules.

</ChangeLog>
17 May 2010 06:39:22
Original commit files touched by this commit  0.8.37
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.36 to 0.8.37.

<ChangeLog>

*) Feature: the ngx_http_split_clients_module.

*) Feature: the "map" directive supports keys more than 255 characters.

*) Bugfix: nginx ignored the "private" and "no-store" values in the
   "Cache-Control" backend response header line.

*) Bugfix: a "stub" parameter of an "include" SSI directive was not
   used, if empty response has 200 status code.

*) Bugfix: if a proxied or FastCGI request was internally redirected to
   another proxied or FastCGI location, then a segmentation fault might
   occur in a worker process; the bug had appeared in 0.8.33.
   Thanks to Yichun Zhang.

*) Bugfix: IMAP connections may hang until they timed out while talking
   to Zimbra server.
   Thanks to Alan Batie.

</ChangeLog>
07 May 2010 03:56:19
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.28 to 0.30.

Do not bump PORTREVISIONs.
03 May 2010 13:58:42
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.27 to 0.28.

Do not bump PORTREVISIONs.
29 Apr 2010 04:18:25
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party supervisord module from 1.3 to 1.4.

Do not bump PORTREVISIONs.
28 Apr 2010 19:18:28
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party headers_more module from 0.07 to 0.08.
23 Apr 2010 03:43:21
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.35 to fresh bugfix release 0.8.36.
Update third party http_memc module from 0.06 to 0.08.

<ChangeLog>

*) Bugfix: the ngx_http_dav_module handled incorrectly the DELETE,
   COPY, and MOVE methods for symlinks.

*) Bugfix: values of the $query_string, $arg_..., etc. variables cached
   in main request were used by the SSI module in subrequests.

*) Bugfix: a variable value was repeatedly encoded after each an "echo"
   SSI-command output; the bug had appeared in 0.6.14.

*) Bugfix: a worker process hung if a FIFO file was requested.
   Thanks to Vicente Aguilar and Maxim Dounin.

*) Bugfix: OpenSSL-1.0.0 compatibility on 64-bit Linux.
   Thanks to Maxim Dounin.

*) Bugfix: nginx could not be built --without-http-cache; the bug had
   appeared in 0.8.35.

<ChangeLog>
08 Apr 2010 11:08:05
Original commit files touched by this commit  0.8.35
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.26 to 0.27.
Remove needless extra patch.

Do not bump PORTREVISIONs.
01 Apr 2010 17:03:35
Original commit files touched by this commit  0.8.35
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.34 to 0.8.35.

Add quick fix for ngx_echo_module, also sent the patch to upstream.

<ChangeLog>

*) Change: now the charset filter runs before the SSI filter.

*) Feature: the "chunked_transfer_encoding" directive.

*) Bugfix: an "&" character was not escaped when it was copied in
   arguments part in a rewrite rule.

*) Bugfix: nginx might be terminated abnormally while a signal
   processing or if the directive "timer_resolution" was used on
(Only the first 15 lines of the commit message are shown above View all of this commit message)
28 Mar 2010 04:44:55
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Cleanse uneeded RC_SUBR variables

Approved by:    pgolluci
27 Mar 2010 00:15:24
Original commit files touched by this commit  0.8.35
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
25 Mar 2010 10:02:43
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third-party echo module version 0.26.

Do not bump PORTREVISIONs.
25 Mar 2010 02:37:06
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party auth request module from 0.1 to 0.2.

Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: auth_request_set directive.

*) Bugfix: segmentation fault happened on auth request handled by
   proxy_pass or fastcgi_pass if initial request has non-empty body.

</ChangeLog>
23 Mar 2010 05:01:02
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party gunzip filter module from 0.2 to 0.3.

Do not bump PORTREVISIONs.
10 Mar 2010 04:30:34
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.1 to 0.2.2.

Do not bump PORTREVISIONs.

PR:     144557
09 Mar 2010 09:49:09
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update CATEGORIES if defined passenger module support.

Do not bump PORTREVISIONs.
05 Mar 2010 11:46:00
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party passenger module from 2.0.10 to 2.0.11.

Do not bump PORTREVISIONs.

Feature safe:   yes
03 Mar 2010 18:48:59
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.33 to 0.8.34.

Feature safe: yes

<ChangeLog>

*) Bugfix: nginx did not support all ciphers and digests used in client
   certificates.
   Thanks to Innocenty Enikeew.

*) Bugfix: nginx cached incorrectly FastCGI responses if there was
   large stderr output before response.

*) Bugfix: nginx did not support HTTPS referrers.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
02 Mar 2010 10:31:38
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upload module from 2.0.11 to 2.0.12.
Remove needless patch for www/nginx-devel.

Do not bump PORTREVISIONs.

Feature safe:   yes
27 Feb 2010 19:56:07
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party auth_request module, version 0.1.

Do not bump PORTREVISIONs.

Feature safe:   yes
27 Feb 2010 19:20:20
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party headers_more module, version 0.07.

Do not bump PORTREVISIONs.

Feature safe:   yes
22 Feb 2010 17:29:33
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party modules:

o) http_push from 0.69 to 0.692;
o) passenger from 2.2.9 to 2.2.10.

Do not bump PORTREVISIONs.

Feature safe:   yes
22 Feb 2010 13:53:25
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party modules for www/nginx and www/nginx-devel:

o) h264_streaming from 2.2.5 to 2.2.7;
o) passenger from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.

Feature safe:   yes
18 Feb 2010 19:16:13
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party module accept language.

Do not bump PORTREVISIONs.

Feature safe:   yes

Submitted by:   Mike Stupalov aka landy2005 at gmail dot com
PR:             ports/143787
08 Feb 2010 03:56:37
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update memc (aka advanced memcached) module
from 0.05 to 0.06.

Do not bump PORTREVISIONs.
07 Feb 2010 10:21:47
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update upstream_hash module from 0.3 to 0.3.1.

Do not bump PORTREVISION.
06 Feb 2010 18:52:56
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update fancyindex module from 0.1_beta5 to 0.2.1.
Remove needless patches.

Do not bump PORTREVISIONs.
04 Feb 2010 10:08:56
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update gunzip_filter module from 0.1 to 0.2 for
www/nginx and www/nginx-devel.

Do not bump PORTREVISIONs.

Spotted by:     Maxim Dounin aka mdounin at mdounin dot ru
02 Feb 2010 00:56:26
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.32 to 0.8.33.

Feature safe:   yes

<ChangeLog>

*) Security: now nginx/Windows ignores trailing spaces in URI.
   Thanks to Dan Crowley, Core Security Technologies.

*) Security: now nginx/Windows ignores short files names.
   Thanks to Dan Crowley, Core Security Technologies.

*) Change: now keepalive connections after POST requests are not
   disabled for MSIE 7.0+. Thanks to Adam Lounds.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
18 Jan 2010 19:53:37
Original commit files touched by this commit  0.8.32
 This port version is marked as vulnerable.
osa search for other commits by this committer
This is accordingly update for www/nginx and www/nginx-devel.

Add one more third-party module: upstream_hash, version 0.3.1.
Update slowfs_cache module from 1.2 to 1.3.
Update mogilefs module from 1.0.2 to 1.0.3.

Do not bump PORTREVISIONs.
14 Jan 2010 18:55:41
Original commit files touched by this commit  0.8.32
 This port version is marked as vulnerable.
osa search for other commits by this committer
Use USE_OPENSSL instead of bsd.openssl.mk.

Do not remove default DISTFILES due to port building
failure when third-party module (i.e. additional DISTFILES)
selected.

Do not bump PORTREVISIONs.

PRs:    142831, 142833
11 Jan 2010 17:23:35
Original commit files touched by this commit  0.8.32
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.31 to 0.8.32.

<ChangeLog>

*) Bugfix: UTF-8 encoding usage in the ngx_http_autoindex_module.
   Thanks to Maxim Dounin.

*) Bugfix: regular expression named captures worked for two names only.
   Thanks to Maxim Dounin.

*) Bugfix: now the "localhost" name is used in the "Host" request
   header line, if an unix domain socket is defined in the "auth_http"
   directive.
   Thanks to Maxim Dounin.

*) Bugfix: nginx did nor support chunked transfer encoding for 201
   responses.
   Thanks to Julian Reich.

*) Bugfix: if the "expires modified" set date in the past, the a
   negative number was set in the "Cache-Control" response header
   line.
   Thanks to Alex Kapranoff.

</ChangeLog>
11 Jan 2010 07:43:39
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add ngx_cache_purge-1.0, the module adding ability
to purge content from nginx's FastCGI and proxy caches.

Do not bump PORTREVISIONs.
09 Jan 2010 19:19:03
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Revert back update Passenger from 2.2.9 to 2.2.8
due to incompatible infrastructure.

Do not bump PORTREVISIONs.
08 Jan 2010 19:34:15
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update Passenger module from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.
06 Jan 2010 20:29:50
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add memc module - an extended version of the
standard memcached module that supports set, add, delete,
and many more memcached commands.

Do not bump PORTREVISIONs.
05 Jan 2010 22:06:43
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly commit changes for third-party modules in www/nginx
and www/nginx-devel:

 o) update uploadprogress from 0.7 to 0.8;
 o) update upstream_fair from 20081012 to 20090923;
 o) update supervisord from 1.2 to 1.3;
 o) add udplog (syslog) module version 1.0.0;
 o) s/modle/module/ for both Makefiles.

Remove needless patches.

Do not bump PORTREVISIONs.
03 Jan 2010 17:53:22
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update upstream_keepalive module, from 0.1 to 0.2.
Do not bump PORTREVISIONs.
29 Dec 2009 07:14:11
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update slowfs_cache module, from 1.1 to 1.2.
Do not bump PORTREVISIONs.
29 Dec 2009 07:04:33
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add http_gunzip_filter module, version 0.1.
Do not bump PORTREVISIONs.
26 Dec 2009 13:04:41
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update http_redis module from 0.3.0 to 0.3.1.
Cosmetic whitespace fix for Makefile.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Change: return 502 instead of 404 for error.

*) Change: better error messages diagnostics.

*) Bugfix: interoperability with redis; the bug had
   appeared in 0.3.0.

</ChangeLog>
25 Dec 2009 15:20:15
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more know WITH_DEBUGLOG by split debug features
for distro (--with-debug) and system (-g) specific.
25 Dec 2009 09:53:04
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Improve redis protocol support.
Do not bump PORTREVISION.
23 Dec 2009 21:22:26
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.30 to 0.8.31.
Update http_redis module from 0.2.0 to 0.3.0.
Remove needless extra patch.

<ChangeLog>

*) Feature: now the "error_page" directive may redirect the 301 and 302
   responses.

*) Feature: the $geoip_city_continent_code, $geoip_latitude, and
   $geoip_longitude variables.
   Thanks to Arvind Sundararajan.

*) Feature: now the ngx_http_image_filter_module deletes always EXIF
   and other application specific data if the data consume more than 5%
(Only the first 15 lines of the commit message are shown above View all of this commit message)
22 Dec 2009 11:42:22
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update slowfs_cache module, from 1.0 to 1.1.
Do not bump PORTREVISION.
22 Dec 2009 04:55:50
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third party slowfs_cache module, version 1.0.
Do not bump PORTREVISION.
21 Dec 2009 20:31:46
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party supervisord module, version 1.2.
Do not bump PORTREVISIONs.
21 Dec 2009 18:46:06
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party http_push module, version 0.69.
Do not bump PORTREVISIONs.
19 Dec 2009 23:05:28
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party http_auth_pam module, version 1.1.
Do not bump PORTREVISIONs.

Spotted by:     Paul Cockings aka dspam at cytringan dot co dot uk
19 Dec 2009 10:56:33
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update uploadprogress module with patch from github.
Do not bump PORTREVISIONs.

Spotted by:     Vladimir Getmanshchuk aka vladget at openfilm dot com
Requested by:   Brice Figureau aka brice at daysofwonder dot com
                (uploadprogress module author)
17 Dec 2009 11:23:06
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update Passenger(tm) module from 2.2.7 to 2.2.8.
15 Dec 2009 16:11:19
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.29 to 0.8.30.

<ChangeLog>

*) Change: now the default buffer size of the
   "large_client_header_buffers" directive is 8K.
   Thanks to Andrew Cholakian.

*) Feature: the conf/fastcgi.conf for simple FastCGI configurations.

*) Bugfix: nginx/Windows tried to rename a temporary file twice if the
   file should replace an already existent file.

*) Bugfix: of "double free or corruption" error issued if host could
   not be resolved; the bug had appeared in 0.8.22.
   Thanks to Konstantin Svist.

*) Bugfix: in libatomic usage on some platforms.
   Thanks to W-Mark Kubacki.

</ChangeLog>
01 Dec 2009 04:22:10
Original commit files touched by this commit  0.8.29
 This port version is marked as vulnerable.
osa search for other commits by this committer
Make uploadprogress module fetchtable (accordingly).

Notice from:    Vladimir Getmanshchuk aka vladget at openfilm dot com
30 Nov 2009 14:12:05
Original commit files touched by this commit  0.8.29
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.28 to 0.8.29.

<ChangeLog>

*) Change: now the "009" status code is written to an access log for
   proxied HTTP/0.9 responses.

*) Feature: the "addition_types", "charset_types", "gzip_types",
   "ssi_types", "sub_filter_types", and "xslt_types" directives support
   an "*" parameter.

*) Feature: GCC 4.1+ built-in atomic operations usage.
   Thanks to W-Mark Kubacki.

*) Feature: the --with-libatomic[=DIR] option in the configure.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
26 Nov 2009 06:52:33
Original commit files touched by this commit  0.8.28
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix upload module bug:
keepalive connection was hanging after upload has been completed.

Do not bump PORTREVISION.
24 Nov 2009 12:08:22
Original commit files touched by this commit  0.8.28
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.27 to 0.8.28.

<ChangeLog>

*) Bugfix: nginx could not be built with the --without-pcre parameter;
   the bug had appeared in 0.8.25.

</ChangeLog>
24 Nov 2009 11:56:27
Original commit files touched by this commit  0.8.28
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update (www/nginx and www/nginx-devel):

 passenger module support from 2.2.5 to 2.2.7;
 upload module to 2.0.11;
 uploadprogress module from 0.6 to 0.7.

Remove needless patch.

Also, h264 module distfile re-rolled due moon phase.

Do not bump PORTREVISIONs.
19 Nov 2009 10:09:29
Original commit files touched by this commit  0.8.27
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.24 to 0.8.27.

<ChangeLog>

Changes with nginx 0.8.27

*) Bugfix: regular expressions did work in nginx/Windows; the bug had
   appeared in 0.8.25.

Changes with nginx 0.8.26

*) Bugfix: in captures usage in "rewrite" directive; the bug had
   appeared in 0.8.25.

*) Bugfix: nginx could not be built without the --with-debug option;
(Only the first 15 lines of the commit message are shown above View all of this commit message)
12 Nov 2009 08:20:12
Original commit files touched by this commit  0.8.24
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.22 to 0.8.24.

<ChangeLog>

Changes with nginx 0.8.24

*) Bugfix: nginx always added "Content-Encoding: gzip" response header
   line in 304 responses sent by ngx_http_gzip_static_module.

*) Bugfix: nginx could not be built without the --with-debug option;
   the bug had appeared in 0.8.23.

*) Bugfix: the "unix:" parameter of the "set_real_ip_from" directive
   inherited incorrectly from previous level.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
09 Nov 2009 19:51:42
Original commit files touched by this commit  0.8.22
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update h264 (aka http_mp4_h264) module from the dated material to
version 2.2.5 for www/nginx and www/nginx-devel accordingly.

Do not bump PORTREVISIONs.

Requested by:   many
04 Nov 2009 21:24:35
Original commit files touched by this commit  0.8.22
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing library dependence for http_image_filter module for
www/nginx and www/nginx-devel accordingly.

Do not bump PORTREVISIONs.

Number of commits found: 537 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
flacNov 25
asterisk11Nov 21
asterisk11Nov 21
phpmyadminNov 21
kde4-runtimeNov 20
kwebkitpartNov 20
yiiNov 19
chromiumNov 18
kde4-workspaceNov 17
dbusNov 11
wgetNov 08
konversation-kde4Nov 05
jenkinsOct 31
jenkins-ltsOct 31
twikiOct 31

9 vulnerabilities affecting 11 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24383
Broken 140
Deprecated 74
Ignore 397
Forbidden 1
Restricted 206
No CDROM 93
Vulnerable 18
Expired 12
Set to expire 70
Interactive 0
new 24 hours 2
new 48 hours30
new 7 days55
new fortnight174
new month233

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.