FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
nginx-devel Robust and small WWW server
1.11.3 www on this many watch lists=24 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 15 Jun 2007 08:23:21
Also Listed In: ipv6
License: BSD2CLAUSE
NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Homepage : PortsMon

To install the port: cd /usr/ports/www/nginx-devel/ && make install clean
To add the package: pkg install nginx-devel

PKGNAME: nginx-devel

distinfo:

TIMESTAMP = 1471018172
SHA256 (nginx-1.11.3.tar.gz) = 4a667f40f9f3917069db1dea1f2d5baa612f1fa19378aadf71502e846a424610
SIZE (nginx-1.11.3.tar.gz) = 938045
SHA256 (nginx-accesskey-2.0.3.tar.gz) = d9e94321e78a02de16c57f3e048fd31059fd8116ed03d6de7180f435c52502b1
SIZE (nginx-accesskey-2.0.3.tar.gz) = 2632
SHA256 (ngx_http_auth_pam_module-1.2.tar.gz) = 5a85970ba61a99f55a26d2536a11d512b39bbd622f5737d25a9a8c10db81efa9
SIZE (ngx_http_auth_pam_module-1.2.tar.gz) = 5424
SHA256 (ngx_cache_purge-2.3.tar.gz) = 279e0d8a46d3b1521fd43b3f78bc1c08b263899142a7cc5058c1c0361a92c89c
SIZE (ngx_cache_purge-2.3.tar.gz) = 12248
SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae
SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208
SHA256 (nginx_mod_h264_streaming-2.2.7.tar.gz) = 6d974ba630cef59de1f60996c66b401264a345d25988a76037c2856cec756c19
SIZE (nginx_mod_h264_streaming-2.2.7.tar.gz) = 44012
SHA256 (ngx_http_redis-0.3.8.tar.gz) = 95d0ed7be40da2efc88883d72e52e5e272d2c34463583b7078e8fd6d55004934
SIZE (ngx_http_redis-0.3.8.tar.gz) = 12342
SHA256 (ngx_http_response-0.3.tar.gz) = 0835584029f053051c624adbe33a826ab0205c9d85a02af6019e6b57607e9045
SIZE (ngx_http_response-0.3.tar.gz) = 2244
SHA256 (nginx_upstream_fair-20090923.tar.gz) = ec9ed7f856263e17faadee3dc7209932364ded4e546b829841c2454aa432450b
SIZE (nginx_upstream_fair-20090923.tar.gz) = 10024
SHA256 (1.2.4.tar.gz) = f79521a25322cb4f504547a0b0f76fd9d024c14440e5d790e26dda70ea4f701a
SIZE (1.2.4.tar.gz) = 120448
SHA256 (mod_zip-1.1.6.tar.gz) = d30546b4be8308c721df0240ebc38c474c6b577381a110321eded6dbed5104b1
SIZE (mod_zip-1.1.6.tar.gz) = 21991
SHA256 (modsecurity-2.9.1.tar.gz) = 958cc5a7a7430f93fac0fd6f8b9aa92fc1801efce0cda797d6029d44080a9b24
SIZE (modsecurity-2.9.1.tar.gz) = 4261212
SHA256 (passenger-5.0.30.tar.gz) = f367e0c1d808d7356c3749222194a72ea03efe61a3bf1b682bd05d47f087b4e3
SIZE (passenger-5.0.30.tar.gz) = 5588130
SHA256 (ngx_slowfs_cache-1.10.tar.gz) = 1e81453942e5b0877de1f1f06c56ae82918ea9818255cb935bcb673c95a758a1
SIZE (ngx_slowfs_cache-1.10.tar.gz) = 11809
SHA256 (nginx_udplog_module-1.0.0.tar.gz) = e0c0bfa524c3a675ad6c08b916d08e57ef45f9818cb8a0d848c2c83785c6e659
SIZE (nginx_udplog_module-1.0.0.tar.gz) = 6284
SHA256 (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 5534ca63cdfc2a7dc4e1cbf9c2d54d3ed3f0e6c86b4a95be48ec0a3f41cc1eb0
SIZE (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 3393
SHA256 (atomx-nginx-http-auth-digest-cc61b4a_GH0.tar.gz) = e68b34e03516a4ab43006eb4c481d6bc5e813e0d40876359c606a26c5c68ccf6
SIZE (atomx-nginx-http-auth-digest-cc61b4a_GH0.tar.gz) = 16060
SHA256 (stnoonan-spnego-http-auth-nginx-module-c85a38c_GH0.tar.gz) = b47b23a362aa338c377d6163d15abee6f33ff16bac5f86ee4d9543293fe8c4d1
SIZE (stnoonan-spnego-http-auth-nginx-module-c85a38c_GH0.tar.gz) = 18120
SHA256 (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 0ec4f099e50cc12a6319e37700e71540498d354831d1f09e113ee046ee0bb7b2
SIZE (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 17001
SHA256 (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 9e3f78ea73e2d606a95ee64fd3affa4c249f9b342e66b6b11b63061791f28316
SIZE (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 109704
SHA256 (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = db7ceef4ae22cf5bfaf5abae64830dfeef203ca85f9f40f7d1f1d90f277478c0
SIZE (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = 8260
SHA256 (nginx-clojure-nginx-clojure-v0.4.4_GH0.tar.gz) = 642ebf4724fa7c3efd5349e60b442ac8671497406834804c903ec548bfdcb691
SIZE (nginx-clojure-nginx-clojure-v0.4.4_GH0.tar.gz) = 603856
SHA256 (grahamedgecombe-nginx-ct-f3cad5e_GH0.tar.gz) = 846e148f09ffea2ffc1b09b20c84408e23c170313f967513a85009717227c13a
SIZE (grahamedgecombe-nginx-ct-f3cad5e_GH0.tar.gz) = 5521
SHA256 (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 00d42a5f562a0be5570110d9b70c8f2cace93b292421a6f994cf4ec76a8979f0
SIZE (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 52766
SHA256 (openresty-headers-more-nginx-module-f5559ec_GH0.tar.gz) = 422b12414a6f850cbb3ee96c225e5259eef4e949f70e63e27e6583ce3eb836ff
SIZE (openresty-headers-more-nginx-module-f5559ec_GH0.tar.gz) = 27400
SHA256 (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = d428a0236c933779cb40ac8c91afb19d5c25a376dc3caab825bfd543e1ee530d
SIZE (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = 6260
SHA256 (openresty-nginx-eval-module-342c812_GH0.tar.gz) = c45f6438474593f0cf5229160327d20c2f2d72e9c0b5c8cf9e0ef8d5295de177
SIZE (openresty-nginx-eval-module-342c812_GH0.tar.gz) = 14183
SHA256 (aperezdc-ngx-fancyindex-v0.3.6_GH0.tar.gz) = e73f1f0444f8c53601b51da8684b174c5ffd3b4ed6eb7956dd57f8b95485b68f
SIZE (aperezdc-ngx-fancyindex-v0.3.6_GH0.tar.gz) = 17252
SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813
SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934
SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997
SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736
SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885
SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343
SHA256 (slact-nchan-v0.99.16_GH0.tar.gz) = 200cc1b02931a067c3edb07243a7faac80265ce6aab37af680cf7373011efc41
SIZE (slact-nchan-v0.99.16_GH0.tar.gz) = 378626
SHA256 (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = a95f31e80120fd7324795b92a0d94c0b43e1265df7fd0f1eba11a337c1e0a626
SIZE (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = 175263
SHA256 (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = ed4ddbcf0c434f4a1e97b61251a63ace759792764bd5cb79ff20efe348db8db3
SIZE (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = 92230
SHA256 (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 34d51afcd464582e6011a5d3abe6829c5690ddb9b50c993dfdafb4c725a4803a
SIZE (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 48378
SHA256 (vkholodkov-nginx-upload-module-aba1e3f34c_GH0.tar.gz) = 62a2c4388585aec463a1cee30bc84953593a93f341dc1df61b42b452594d2a05
SIZE (vkholodkov-nginx-upload-module-aba1e3f34c_GH0.tar.gz) = 28296
SHA256 (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 93e29b9b437a2e34713de54c2861ea51151624aca09f73f9f44d1caaff01a6b1
SIZE (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 16990
SHA256 (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 52e6acd8c0264a59c5c948271015a59acd3cbcf91377456b7c8dc6f9feecef4a
SIZE (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 128281
SHA256 (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 382bb41fa739f471fdab9fbabc5384d8ec7f25b5bb0c45c153f5cc01d428abe2
SIZE (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 2709351
SHA256 (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = aafb79d87273eec023025333c34d6d0108026a1ce2e09b20a53e8e2d9bf65080
SIZE (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = 59024
SHA256 (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = bf60cf196c86193376d11f8c7a3826994b24a48bb36943bab8a25af6e776af3b
SIZE (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = 10921
SHA256 (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 88e05a99a8a7419066f5ae75966fb1efc409bad4522d14986da074554ae61619
SIZE (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 66455
SHA256 (openresty-encrypted-session-nginx-module-v0.05_GH0.tar.gz) = 5aea148410d647ca1d5b4e6164a19fde989a4da332fa118e003071d87bf6eae4
SIZE (openresty-encrypted-session-nginx-module-v0.05_GH0.tar.gz) = 10462
SHA256 (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = ef843824e0aac1dd60b392802861cc06426a4bc5f87d472c7ee00b1296693f2a
SIZE (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = 18883
SHA256 (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 552c54aff81c4701ace4eb1ce20c114433ee783b4b06c0105921a830c9486172
SIZE (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 53024
SHA256 (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = cbf6fcddc00a7e30289134bdeace12565e000cc7d4efee2d2ebb8799d0b88270
SIZE (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = 20534
SHA256 (openresty-lua-nginx-module-v0.10.6rc1_GH0.tar.gz) = 86806a1893c775d813a58912b6f3b99b55efa7ab126ac5f28a57bc9a10b6044e
SIZE (openresty-lua-nginx-module-v0.10.6rc1_GH0.tar.gz) = 581366
SHA256 (openresty-memc-nginx-module-v0.16_GH0.tar.gz) = 24f3c3270831aed2d157c01ef74cb26eab26b832971fe7b9f42a03dbfac10ce4
SIZE (openresty-memc-nginx-module-v0.16_GH0.tar.gz) = 38560
SHA256 (nbs-system-naxsi-0.54_GH0.tar.gz) = 9cc2c09405bc71f78ef26a8b6d70afcea3fccbe8125df70cb0cfc480133daba5
SIZE (nbs-system-naxsi-0.54_GH0.tar.gz) = 163809
SHA256 (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = c942e674a7273ab87caab4dcad626ab54852be192c29b1add50d2cb535e3cbb9
SIZE (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = 40742
SHA256 (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = b204909c6fb194fe8fed7627a3733bc9598f64251dc04a5b6a5bbd612e925324
SIZE (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = 19444
SHA256 (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 99aedf222a9664484918392988cce41b1a6238240d42f8bd44f5ff102c05c36c
SIZE (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 33496
SHA256 (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = baf5274c815a5f27854747df09ff5bcd6d82e0baa2f224a9db6450d2f3a35a4f
SIZE (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = 28981
SHA256 (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = de5866111a5b18c9dfb1c10f3a0e84b56af77f7005a41807368f7769b8a50965
SIZE (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = 519647
SHA256 (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 5f32c484b29b9047dfa65fd3eec511c0f7c65f0f3ec0a4e0453359cf4642d405
SIZE (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 29340
SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955
SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504
SHA256 (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = c25f284bc934f59a267d319385a3e11858efef786c84b49a77d09e7f5274bbf1
SIZE (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = 16688
SHA256 (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 8f513d6d3df32c3b05327d40e16efd020532a911d3eeca8015eb6271f2d4fd1c
SIZE (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 55918
SHA256 (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = e34b1ab5f5007661f73819f9c20fd6c2a46ed3e53364e9449b02ef2bd3628633
SIZE (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = 58777
SHA256 (zebrafishlabs-nginx-statsd-b756a12_GH0.tar.gz) = 4c5886edb1fbeb0b9a83c879b4be4b15a620627a18978aef636da3feafb284fe
SIZE (zebrafishlabs-nginx-statsd-b756a12_GH0.tar.gz) = 6636
SHA256 (gabor-nginx-x-rid-header-0daa3cc_GH0.tar.gz) = de784142d867a35ecc5443fa347c2903af0935669cdf2eaa9274f5253aac2267
SIZE (gabor-nginx-x-rid-header-0daa3cc_GH0.tar.gz) = 2711
SHA256 (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 958bd8de773601d8d3138501cc4be0420f1c818a3987a70cc9c0023371e432cf
SIZE (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 11477
SHA256 (nginx-njs-0f11ace_GH0.tar.gz) = 364bd2728c3ee3f5115a0a0115e81639b1c8eca501ac9a9a12156d0cd216cc26
SIZE (nginx-njs-0f11ace_GH0.tar.gz) = 173651
SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80
SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280
SHA256 (google-ngx_brotli-ada972b_GH0.tar.gz) = d3d0e22a2629cd017280e05bd3bf05aa7b5c820ebe8c79932ce161243911e776
SIZE (google-ngx_brotli-ada972b_GH0.tar.gz) = 11128
SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106
SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090
SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462
SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. libcrypto.so.8 : security/openssl
Runtime dependencies:
  1. libcrypto.so.8 : security/openssl
Library dependencies:
  1. libpcre.so : devel/pcre
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for nginx-devel-1.11.3:
     DSO=on: Enable dynamic modules support
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     FILE_AIO=on: Enable file aio
     IPV6=on: IPv6 protocol support
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=on: Enable http_addition module
     HTTP_AUTH_REQ=on: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=on: Enable http_webdav module
     HTTP_FLV=on: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GZIP_STATIC=on: Enable http_gzip_static module
     HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_MP4=on: Enable http_mp4 module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=on: Enable http_random_index module
     HTTP_REALIP=on: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=on: Enable http_secure_link module
     HTTP_SLICE=on: Enable http_slice module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=on: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     MAIL=on: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=on: Enable mail_ssl module
     HTTPV2=on: Enable HTTP/2 protocol support (SSL req.)
     NJS=off: Enable http_javascript module
     STREAM=on: Enable stream module
     STREAM_SSL=on: Enable stream_ssl module (SSL req.)
     THREADS=on: Enable threads support
     WWW=on: Enable html sample files
     AJP=off: 3rd party ajp module
     AWS_AUTH=off: 3rd party aws auth module
     CACHE_PURGE=off: 3rd party cache_purge module
     CLOJURE=off: 3rd party clojure module
     CT=off: 3rd party cert_transparency module (SSL req.)
     ECHO=off: 3rd party echo module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_ACCESSKEY=off: 3rd party http_accesskey module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_JSON_STATUS=off: 3rd party http_json_status module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_TARANTOOL=off: 3rd party tarantool upstream module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module
     HTTP_ZIP=off: 3rd party http_zip module
     ARRAYVAR=off: 3rd party array_var module
     BROTLI=off: 3rd party brotli module
     DRIZZLE=off: 3rd party drizzlie module
     DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     NAXSI=off: 3rd party naxsi module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgres module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SHIBBOLETH=off: 3rd party shibboleth module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SMALL_LIGHT=off: 3rd party small_light module
     SRCACHE=off: 3rd party srcache module
     STATSD=off: 3rd party statsd module
     UDPLOG=off: 3rd party udplog (syslog) module
     XRID_HEADER=off: 3rd party x-rid header module
     XSS=off: 3rd party xss module
===> Use 'make config' to modify these settings

USES:
cpe ssl gnome

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2016-02-17
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_dynamic_upstream_module.so";
      load_module "modules/ngx_http_small_light_module.so";
    
    
  • 2016-02-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_http_echo_module.so";
      load_module "modules/ngx_http_headers_more_filter_module.so";
      load_module "modules/ngx_http_eval_module.so";
      load_module "modules/ngx_http_lua_module.so";
      load_module "modules/ngx_http_set_misc_module.so";
    
    
  • 2016-02-13
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled.  In case of usage following
      modules please update nginx configuration file for load these modules:
    
      load_module "modules/ngx_http_geoip_module.so";
      load_module "modules/ngx_http_image_filter_module.so";
      load_module "modules/ngx_http_xslt_filter_module.so";
      load_module "modules/ngx_mail_module.so";
      load_module "modules/ngx_stream_module.so";
    
      See https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ for details.
    
    
  • 2011-09-28
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Note: 1.1.4 release introduces several API changes which may affect
      third-party modules.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 736 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
13 Apr 2012 12:17:05
Original commit files touched by this commit  1.1.19
 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.1.18 to 1.1.19.

<ChangeLog>

*) Security: specially crafted mp4 file might allow to overwrite memory
   locations in a worker process if the ngx_http_mp4_module was used,
   potentially resulting in arbitrary code execution (CVE-2012-2089).
   Thanks to Matthew Daley.

*) Bugfix: nginx/Windows might be terminated abnormally.
   Thanks to Vincent Lee.

*) Bugfix: nginx hogged CPU if all servers in an upstream were marked as
   "backup".
(Only the first 15 lines of the commit message are shown above View all of this commit message)
03 Apr 2012 16:16:10
Original commit files touched by this commit  1.1.18
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_http_redis from 0.3.5 to 0.3.6.
Add USERS/GROUPS for www/nginx.

Do not bump PORTREVISIONs because this module disabled by default.

Feature safe:   yes

<ChangeLog>

*) Feature: redis_gzip_flag.  Usefull if you are prefer to
   store data compressed in redis.  Works with ngx_http_gunzip_filter
   module.
   Thanks to Maxim Dounin.

*) Bugfix: ngx_http_redis_module might issue the error message
   "redis sent invalid trailer".
   Thanks to agentzh.

</ChangeLog>
29 Mar 2012 07:27:45
Original commit files touched by this commit  1.1.18
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.17 to 1.1.18.
Add USERS/GROUPS.

Feature safe:   yes

<ChangeLog>

*) Change: keepalive connections are no longer disabled for Safari by
   default.

*) Feature: the $connection_requests variable.

*) Feature: $tcpinfo_rtt, $tcpinfo_rttvar, $tcpinfo_snd_cwnd and
   $tcpinfo_rcv_space variables.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
15 Mar 2012 13:51:22
Original commit files touched by this commit  1.1.17
 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.1.16 to 1.1.17.

Security:      
http://www.vuxml.org/freebsd/29194cb8-6e9f-11e1-8376-f0def16c5c1b.html
Feature safe:   yes

<ChangeLog>

*) Security: content of previously freed memory might be sent to a
   client if backend returned specially crafted response.
   Thanks to Matthew Daley.

*) Bugfix: in the embedded perl module if used from SSI.
   Thanks to Matthew Daley.

*) Bugfix: in the ngx_http_uwsgi_module.

</ChangeLog>
29 Feb 2012 19:53:17
Original commit files touched by this commit  1.1.16
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix fetch notice third-party module.
29 Feb 2012 19:35:03
Original commit files touched by this commit  1.1.16
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix fetch zip and naxsi third-party modules.
29 Feb 2012 15:51:26
Original commit files touched by this commit  1.1.16
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.15 to 1.1.16.

<ChangeLog>

*) Change: the simultaneous subrequest limit has been raised to 200.

*) Feature: the "from" parameter of the "disable_symlinks" directive.

*) Feature: the "return" and "error_page" directives can be used to
   return 307 redirections.

*) Bugfix: a segmentation fault might occur in a worker process if the
   "resolver" directive was used and there was no "error_log" directive
   specified at global level.
   Thanks to Roman Arutyunyan.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
29 Feb 2012 05:32:27
Original commit files touched by this commit  1.1.15
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party naxsi module from 0.42 to 0.43.
Fix libraries dependences if WITH_LUA_MODULE knob defined. [1]

Do not bump PORTREVISIONs because this module disabled by default.

Submitted by:   Alexandre Biancalana <ale@biancalanas.net> [1]
28 Feb 2012 17:43:56
Original commit files touched by this commit  1.1.15
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update slowfs_cache third-party module from 1.7 to 1.8.

Do not bump PORTREVISIONs because this module disabled by default.

<ChangeLog>

2012-02-28    VERSION 1.8
  * Fix setting of slowfs process title.
    In case when local path was over 277 characters long, slowfs
    process would crash, which would result in file not being
    copied to the cache.
    Bug had appeared in version 1.7.
</ChangeLog>
28 Feb 2012 13:59:45
Original commit files touched by this commit  1.1.15
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update slowfs_cache third-party module from 1.6 to 1.7.

Do not bump PORTREVISION because this module disabled by default.

<ChangeLog>

2012-02-28    VERSION 1.7
  * Fix on-disk cache size calculation.
    Since the initial release, recorded on-disk cache size was
    decreased twice for purged content (once during cache purge
    and once during subsequent cache update).
    This resulted in recorded on-disk cache size being much
    smaller than in reality, which could lead to on-disk cache
    outgrowing defined "max_size" parameter.
    Patch from Pyry Hakulinen (via ngx_cache_purge, months ago).

  * Append path of the file being cached to the slowfs process
    title.

</ChangeLog>
28 Feb 2012 10:26:19
Original commit files touched by this commit  1.1.15
 This port version is marked as vulnerable.
osa search for other commits by this committer
Move upward extra_commands string for compatible with rc.conf.d
feature.

Do not bump PORTREVISIONs.
PR:     165454
23 Feb 2012 09:30:11
Original commit files touched by this commit  1.1.15
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add two third-party modules:

o) web_dav_extension, for support missing PROPFIND and OPTIONS commands;
o) http_auth_digest, providing support for RFC 2617 Digest Authentication.

PR:     165276, 165333
15 Feb 2012 16:07:45
Original commit files touched by this commit  1.1.15
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.14 to 1.1.15.

<ChangeLog>

*) Feature: the "disable_symlinks" directive.

*) Feature: the "proxy_cookie_domain" and "proxy_cookie_path"
   directives.

*) Bugfix: nginx might log incorrect error "upstream prematurely closed
   connection" instead of correct "upstream sent too big header" one.
   Thanks to Feibo Li.

*) Bugfix: nginx could not be built with the ngx_http_perl_module if the
   --with-openssl option was used.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Feb 2012 12:45:35
Original commit files touched by this commit  1.1.14_1
 This port version is marked as vulnerable.
mm search for other commits by this committer
Bump pcre library dependency due to 8.30 update
06 Feb 2012 17:48:29
Original commit files touched by this commit  1.1.14
 This port version is marked as vulnerable.
osa search for other commits by this committer
Use ${LOCALBASE} instead of ${PREFIX} for search headers and libraries
for third-party modules.

Do not bump PORTREVISIONs.
01 Feb 2012 13:51:21
Original commit files touched by this commit  1.1.14
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) echo from 0.37 to 0.38rc1;
o) headers_more from 0.16 to 0.17rc1;
o) drizzle from 0.1.2rc4 to 0.1.2rc6;
o) set_misc from 0.22rc4 to 0.22rc5.
01 Feb 2012 04:43:11
Original commit files touched by this commit  1.1.14
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party lua module from 0.4.0 to bugfix release 0.4.1.
30 Jan 2012 15:54:49
Original commit files touched by this commit  1.1.14
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.13 to 1.1.14.

<ChangeLog>

*) Feature: multiple "limit_req" limits may be used simultaneously.

*) Bugfix: in error handling while connecting to a backend.
   Thanks to Piotr Sikora.

*) Bugfix: in AIO error handling on FreeBSD.

*) Bugfix: in the OpenSSL library initialization.

*) Bugfix: the "proxy_redirect" directives might not be correctly
   inherited.

*) Bugfix: memory leak during reconfiguration if the "pcre_jit"
   directive was used.

</ChangeLog>
19 Jan 2012 18:09:09
Original commit files touched by this commit  1.1.13
 This port version is marked as vulnerable.
osa search for other commits by this committer
Move luajit from devel to lang directory.

Notice from:    linimon
17 Jan 2012 12:58:38
Original commit files touched by this commit  1.1.13
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) memc from 0.12 to 0.13rc3;
o) redis2 from 0.07 to 0.08rc2;
o) set_misc from 0.22rc3 to 0.22rc4;
o) srcache from 0.12 to 0.13rc3;
o) xss from 0.03rc3 to 0.03rc8.
17 Jan 2012 12:16:09
Original commit files touched by this commit  1.1.13
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party encrypted_session module from 0.01 to 0.02.
16 Jan 2012 17:05:40
Original commit files touched by this commit  1.1.13
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.12 to 1.1.13.

<ChangeLog>

*) Feature: the "TLSv1.1" and "TLSv1.2" parameters of the
   "ssl_protocols" directive.

*) Bugfix: the "limit_req" directive parameters were not inherited
   correctly; the bug had appeared in 1.1.12.

*) Bugfix: the "proxy_redirect" directive incorrectly processed
   "Refresh" header if regular expression were used.

*) Bugfix: the "proxy_cache_use_stale" directive with "error" parameter
   did not return answer from cache if there were no live upstreams.

*) Bugfix: the "worker_cpu_affinity" directive might not work.

*) Bugfix: nginx could not be built on Solaris; the bug had appeared in
   1.1.12.

*) Bugfix: in the ngx_http_mp4_module.

</ChangeLog>
16 Jan 2012 07:49:11
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party headers_more module from 0.15 to 0.16.

<ChangeLog>

* bugfix: the on-demand handler/filter registration mechanism did
  not work fully for config reload via the HUP signal.

* bugfix: when setting a multi-value response header to a single
  value, the single value might be repeated on each old value.

* feature: added some debugging outputs that can be enabled by
  the --with-debug option when building nginx or ngx_openresty.

* bugfix: we should set header hash using ngx_hash_key_lc, not
  simply to 1.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Jan 2012 08:57:23
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
dougb search for other commits by this committer
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
13 Jan 2012 09:57:20
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party echo module from 0.36 to 0.37.
12 Jan 2012 08:24:10
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add 4 third-party modules:

o) arrayvar, add support for array variables to nginx config files;
o) encrypted-session, for encrypt and decrypt nginx variable values;
o) form-input, reads HTTP POST and PUT request body encoded in
   "application/x-www-form-urlencoded", and parse the arguments in
   request body into nginx variables;
o) iconv, to convert characters of different encoding (by libiconv).
11 Jan 2012 15:33:31
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party lua module from 0.3 to latest stable version 0.4.
Also, switched from default lua interpreter to luajit - a Lua Just-In-Time
compiler
for speed-up lua module based applications (nginx's configurations).
Fix issue with %%PREFIX%% substitution for lua module.
30 Dec 2011 09:51:49
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add three new third-party modules:

o) drizzle -  an upstream module that talks to mysql and drizzle by libdrizzle;
o) rds_csv -  an output filter module to convert Resty-DBD-Streams (RDS) to
   Comma-Separated Values (CSV);
o) rds_json - an output filter that formats Resty DBD Streams generated by
   ngx_drizzle and others to JSON.

Do not bump PORTREVISION because these modules disabled by default.
29 Dec 2011 11:30:39
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_subs_filter module from 0.5.2.r45 to 0.5.2.r53.
Remove needless extra patch.

Update third-party upload_progress module from 0.8.2 to 0.8.3.
Change the download page to github.com.

Do not bump PORTREVISION because these modules disabled by default.
29 Dec 2011 07:30:05
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_postgres module from 0.8 to 0.9.
Also remove needless patch.

Do not bump PORTREVISION because these modules disabled by default.

<ChangeLog>

* Improve debug logging.
  From Yichun Zhang (agentzh).

* Fix compatibility with poll, select and /dev/poll event models.
  Reported by Yichun Zhang (agentzh).

* Fix compatibility with PostgreSQL 9.x.
  Reported by Yichun Zhang (agentzh).
(Only the first 15 lines of the commit message are shown above View all of this commit message)
29 Dec 2011 07:15:30
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add naxsi third-party module, version 0.42.
Move down checksums for devel_kit third-party module.
Do not bump PORTREVISION because these modules disabled by default.

PR:     162783
27 Dec 2011 07:40:52
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.11 to 1.1.12.

<ChangeLog>

*) Change: a "proxy_pass" directive without URI part now uses changed
   URI after redirection with the "error_page" directive;
   Thanks to Lanshun Zhou.

*) Feature: the "proxy/fastcgi/scgi/uwsgi_cache_lock",
   "proxy/fastcgi/scgi/uwsgi_cache_lock_timeout" directives.

*) Feature: the "pcre_jit" directive.

*) Feature: the "if" SSI command supports captures in regular
   expressions.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
20 Dec 2011 13:58:02
Original commit files touched by this commit  1.1.11
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party cache_purge module from 1.4 to 1.5.

<ChangeLog>

  * Fix on-disk cache size calculation.
    Since the initial release, recorded on-disk cache size was
    decreased twice for purged content (once during cache purge
    and once during subsequent cache update).
    This resulted in recorded on-disk cache size being much
    smaller than in reality, which could lead to on-disk cache
    outgrowing defined "max_size" parameter.
    Patch from Pyry Hakulinen.

</ChangeLog>
12 Dec 2011 19:46:36
Original commit files touched by this commit  1.1.11
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.9 to 1.1.11.

The only one third-party subs filter module using
ngx_regex_capture_count(), add as extra patch.

<ChangeLog>

Changes with nginx 1.1.11                                        12 Dec 2011

*) Feature: the "so_keepalive" parameter of the "listen" directive.
   Thanks to Vsevolod Stakhov.

*) Feature: the "if_not_empty" parameter of the
   "fastcgi/scgi/uwsgi_param" directives.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
09 Dec 2011 13:57:24
Original commit files touched by this commit  1.1.9
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add set-misc-nginx third-party module.

Remove DEVEL_KIT_MODULE from OPTIONS, because the devel_kit module
is used as a toolkit for other modules.

Add internal USE_NGINX_DEVEL_KIT variable.

Cleanup whitespaces.

Do not bump PORTREVISION because these modules disabled by default.

Feature safe:   yes

PR:             163148 (mostly)
08 Dec 2011 13:03:33
Original commit files touched by this commit  1.1.9
 This port version is marked as vulnerable.
osa search for other commits by this committer
Merge latest changes for third-party udplog module from upstream
at https://raw.github.com/vkholodkov/nginx-udplog-module/.

Do not bump PORTREVISION because this module disabled by default.

Feature safe:   yes

PR:             163023
28 Nov 2011 17:20:52
Original commit files touched by this commit  1.1.9
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.8 to 1.1.9.
Feature safe:   yes.

<ChangeLog>

*) Change: now double quotes are encoded in an "echo" SSI-command
   output.
   Thanks to Zaur Abasmirzoev.

*) Feature: the "valid" parameter of the "resolver" directive. By
   default TTL returned by a DNS server is used.
   Thanks to Kirill A. Korinskiy.

*) Bugfix: nginx might hang after a worker process abnormal termination.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
28 Nov 2011 13:59:59
Original commit files touched by this commit  1.1.8_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.9 to 3.0.11:
o) www/rubygem-passenger;       [*]
o) third-party passenger module for www/nginx and www/nginx-devel.

Feature safe:   yes

Approved by:    maintainer      [*]
21 Nov 2011 13:50:43
Original commit files touched by this commit  1.1.8_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix build on fresh -CURRENT.
Do not bump PORTREVISIONs.

Feature safe:   yes
Patch from:     Igor Sysoev (author)
PR:             162446
21 Nov 2011 10:16:47
Original commit files touched by this commit  1.1.8_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix installation path for perl module.
Bump PORTREVISION.

Feature safe:   yes

Problem found by:       Maxim Dounin <mdounin@mdounin.ru>
14 Nov 2011 17:14:37
Original commit files touched by this commit  1.1.8
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.7 to 1.1.8.
Feature safe:   yes.

<ChangeLog>

*) Change: the ngx_http_limit_zone_module was renamed to the
   ngx_http_limit_conn_module.

*) Change: the "limit_zone" directive was superseded by the
   "limit_conn_zone" directive with a new syntax.

*) Feature: support for multiple "limit_conn" limits on the same level.

*) Feature: the "image_filter_sharpen" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
02 Nov 2011 17:37:59
Original commit files touched by this commit  1.1.7
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add nginx-x-rid-header third-party module.

PR:             ports/162252
Submitted by:   mm
01 Nov 2011 05:46:56
Original commit files touched by this commit  1.1.7
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.6 to 1.1.7.
Update syslog patch.

<ChangeLog>

*) Feature: support of several resolvers in the "resolver" directive.
   Thanks to Kirill A. Korinskiy.

*) Bugfix: a segmentation fault occurred on start or while
   reconfiguration if the "ssl" directive was used at http level and
   there was no "ssl_certificate" defined.

*) Bugfix: reduced memory consumption while proxying of big files if
   they were buffered to disk.

*) Bugfix: a segmentation fault might occur in a worker process if
   "proxy_http_version 1.1" directive was used.

*) Bugfix: in the "expires @time" directive.

</ChangeLog>
18 Oct 2011 06:54:34
Original commit files touched by this commit  1.1.6
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.5 to 1.1.6.
Update WWW.

<ChangeLog>

*) Change in internal API: now module context data are cleared while
   internal redirect to named location.
   Requested by Yichun Zhang.

*) Change: if a server in an upstream failed, only one request will be
   sent to it after fail_timeout; the server will be considered alive if
   it will successfully respond to the request.

*) Change: now the 0x7F-0x1F characters are escaped as \xXX in an
   access_log.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
10 Oct 2011 13:19:04
Original commit files touched by this commit  1.1.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party cache_purge module from 1.3 to 1.4.

Do not bump PORTREVISION.

<ChangeLog>

* Add AIO support.
  Requested by Emin Hasanov.

</ChangeLog>
10 Oct 2011 10:30:06
Original commit files touched by this commit  1.1.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.4 to 1.1.5.

<ChangeLog>

*) Feature: the "uwsgi_buffering" and "scgi_buffering" directives.
   Thanks to Peter Smit.

*) Bugfix: non-cacheable responses might be cached if
   "proxy_cache_bypass" directive was used.
   Thanks to John Ferlito.

*) Bugfix: in HTTP/1.1 support in the ngx_http_proxy_module.

*) Bugfix: cached responses with an empty body were returned
   incorrectly; the bug had appeared in 0.8.31.

*) Bugfix: 201 responses of the ngx_http_dav_module were incorrect; the
   bug had appeared in 0.8.32.

*) Bugfix: in the "return" directive.

*) Bugfix: the "ssl_session_cache builtin" directive caused segmentation
   fault; the bug had appeared in 1.1.1.

</ChangeLog>
28 Sep 2011 17:03:44
Original commit files touched by this commit  1.1.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.3 to 1.1.4.
Remove third-party upstream_keepalive module, in the base now.
Update third-party http_redis module from 0.3.4 to 0.3.5.
Update third-party http_gunzip_filter module from 0.3 to 0.4.
Add patch for ngx_postgres module.

Note: nginx-1.1.4 release introduces several API changes which may
affect 3rd party modules.

<ChangeLog>

Changes with nginx 1.1.4

*) Feature: the ngx_http_upstream_keepalive module.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
15 Sep 2011 10:33:52
Original commit files touched by this commit  1.1.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix typo for http_mp4 module.

Do not bump PORTREVISION because http_mp4 module disabled by default.

Found by:       Jim Ohlstein aka jim dot ohlstein at gmail dot com [1]
14 Sep 2011 17:01:32
Original commit files touched by this commit  1.1.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.2 to 1.1.3.

Original http_mp4 and third-party http_mp4_h268 modules are
incompatible, add note about.

Change state from BROKEN to IGNORE for building third-party lua
module with devel_kit module.

<ChangeLog>

*) Feature: the module ngx_http_mp4_module.

*) Bugfix: in Linux AIO combined with open_file_cache.

*) Bugfix: open_file_cache did not update file info on retest if file
   was not atomically changed.

*) Bugfix: nginx could not be built on MacOSX 10.7.

</ChangeLog>
06 Sep 2011 23:40:32
Original commit files touched by this commit  1.1.2_1
 This port version is marked as vulnerable.
pawel search for other commits by this committer
- Chase devel/google-perftools shlib bump
- security/tor*: add -L${LOCALBASE}/lib to LDFLAGS (fixes linking)

Approved by:    miwi, wen (mentors implicit)
05 Sep 2011 13:53:23
Original commit files touched by this commit  1.1.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.1 to 1.1.2.

<ChangeLog>

*) Change: now if total size of all ranges is greater than source
   response size, then nginx disables ranges and returns just the source
   response.

*) Feature: the "max_ranges" directive.

*) Bugfix: the "ssl_verify_client", "ssl_verify_depth", and
   "ssl_prefer_server_ciphers" directives might work incorrectly if SNI
   was used.

*) Bugfix: in the "proxy/fastcgi/scgi/uwsgi_ignore_client_abort"
   directives.

</ChangeLog>
05 Sep 2011 08:40:26
Original commit files touched by this commit  1.1.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.8 to 3.0.9:

o) www/rubygem-passenger; [1]
o) passenger support for www/nginx and www/nginx-devel;

Remove needless patch.

Do not bump PORTREVISION because passenger third-party module
disabled by default.

Approved by:    maintainer [1]
02 Sep 2011 09:32:03
Original commit files touched by this commit  1.1.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party lua module from 0.2 to 0.3.

Bump PORTREVISION is unnecessary, because the module is
disabled by default.
24 Aug 2011 16:56:00
Original commit files touched by this commit  1.1.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party module ngx_http_redis from 0.3.3 to 0.3.4.

<ChangeLog>

*) Change: better error messages diagnostics in select phase.

*) Add more comments in source code.

*) Bugfix: fix interaction with redis if redis_db was unused.
   Found by Sergey Makarov.
   Thanks to Igor Sysoev.

*) Feature: add test suite for redis backend.
   Thanks to Maxim Dounin.

</ChangeLog>

Do not bump PORTREVISION.
22 Aug 2011 16:04:03
Original commit files touched by this commit  1.1.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.0 to 1.1.1.

<ChangeLog>

*) Change: now cache loader processes either as many files as specified
   by "loader_files" parameter or works no more than time specified by
   "loader_threshold" parameter during each iteration.

*) Change: now SIGWINCH signal works only in daemon mode.

*) Feature: now shared zones and caches use POSIX semaphores on
   Solaris.
   Thanks to Den Ivanov.

*) Feature: accept filters are now supported on NetBSD.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
10 Aug 2011 16:22:58
Original commit files touched by this commit  1.1.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.7 to 3.0.8:

1) www/rubygem-passenger;

2) passenger support for www/nginx and www/nginx-devel;

Also add patch for fix NULL pointer crash that occurs when
HTTP 1.0 Host header isn't given, obtained from passenger's
upstream.

Approved by:    maintainer [1]
04 Aug 2011 07:51:26
Original commit files touched by this commit  1.1.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.5 to 1.1.0.

<ChangeLog>

*) Feature: cache loader run time decrease.

*) Feature: "loader_files", "loader_sleep", and "loader_threshold"
   options of the "proxy/fastcgi/scgi/uwsgi_cache_path" directives.

*) Feature: loading time decrease of configuration with large number of
   HTTPS sites.

*) Feature: now nginx supports ECDHE key exchange ciphers.
   Thanks to Adrian Kotelba.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
22 Jul 2011 07:14:13
Original commit files touched by this commit  1.0.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more third-party module nginx-gridfs 0.8 - module to serve content
directly from MongoDB's GridFS.

Update nginx_redis2 module from 0.7rc5 to 0.7.

Fix compile mod_zip module.

Move down CHUNKIN_MODULE in OPTIONS.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
20 Jul 2011 10:50:51
Original commit files touched by this commit  1.0.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.4 to 1.0.5.

Fix third-party accept_language fetch by moving to github.

<ChangeLog>

*) Change: now default SSL ciphers are "HIGH:!aNULL:!MD5".
   Thanks to Rob Stradling.

*) Feature: the "referer_hash_max_size" and "referer_hash_bucket_size"
   directives.
   Thanks to Witold Filipczyk.

*) Feature: $uid_reset variable.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
13 Jul 2011 09:21:18
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add two more third-party modules:

o) chunkin-nginx-module - HTTP 1.1 chunked-encoding request body support;
o) xss-nginx-module - native cross-site scripting support in nginx.

Update nginx_eval_module to the latest version 1.0.3, move MASTER_SITES
to github.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
12 Jul 2011 15:46:56
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more third-party module:

o) ngx_postgres-0.8 - upstream module that allows nginx to
   communicate directly with PostgreSQL database.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
12 Jul 2011 12:18:22
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add 3 third-party modules:

o) ngx_devel_kit - module that is designed to extend the core
   functionality of nginx;
o) ngx_lua - embed the power of lua into nginx;
o) ngx_redis2 - upstream module for the Redis database 2.0 protocol.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
12 Jul 2011 09:41:28
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party module srcache-0.12.

Use more or less canonical name for github.com MASTER_SITES.
Fix fetch for third-party module memc.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
11 Jul 2011 11:22:01
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) echo from 0.34 to 0.36;
o) headers_more from 0.14 to 0.15;
o) memc from 0.11 to 0.12.

Change default MASTER_SITES for these modules from MASTER_SITE_LOCAL
to http://download.github.com/.

Fix whitespaces.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
08 Jun 2011 07:07:43
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party nginx_substitutions_filter from 0.5.2 revision 44 to
0.5.2 revision 45.

Do not bump PORTREVISION.
08 Jun 2011 06:56:25
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party ngx_http_redis module from 0.3.2 to 0.3.3.

Do not bump PORTREVISION.

<ChangeLog>

*) Bugfix: fix interaction with redis if redis_db was used.
   Also, compile with -Werror now is possible.

</ChangeLog>
01 Jun 2011 12:06:12
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.3 to 1.0.4.

<ChangeLog>

*) Change: now regular expressions case sensitivity in the "map"
   directive is given by prefixes "~" or "~*".

*) Feature: now shared zones and caches use POSIX semaphores on Linux.
   Thanks to Denis F. Latypoff.

*) Bugfix: "stalled" cache updating" alert.

*) Bugfix: nginx could not be built --without-http_auth_basic_module;
   the bug had appeared in 1.0.3.

</ChangeLog>
26 May 2011 12:49:30
Original commit files touched by this commit  1.0.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add vendor patch for fix build with

% configure ...  --without-http_auth_basic_module ...

Bump PORTREVISION is unnecessary, because http_auth_basic module is
enabled by default.
25 May 2011 16:20:25
Original commit files touched by this commit  1.0.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.2 to 1.0.3.

<ChangeLog>

*) Feature: the "auth_basic_user_file" directive supports "$apr1",
   "{PLAIN}", and "{SSHA}" password encryption methods.
   Thanks to Maxim Dounin.

*) Feature: the "geoip_org" directive and $geoip_org variable.
   Thanks to Alexander Uskov, Arnaud Granal, and Denis F. Latypoff.

*) Feature: ngx_http_geo_module and ngx_http_geoip_module support IPv4
   addresses mapped to IPv6 addresses.

*) Bugfix: a segmentation fault occurred in a worker process during
   testing IPv4 address mapped to IPv6 address, if access or deny rules
   were defined only for IPv6; the bug had appeared in 0.8.22.

*) Bugfix: a cached reponse may be broken if proxy/fastcgi/scgi/
   uwsgi_cache_bypass and proxy/fastcgi/scgi/uwsgi_no_cache directive
   values were different; the bug had appeared in 0.8.46.

</ChangeLog>
10 May 2011 13:48:04
Original commit files touched by this commit  1.0.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.1 to 1.0.2.

<ChangeLog>

*) Feature: now shared zones and caches use POSIX semaphores.

*) Bugfix: in the "rotate" parameter of the "image_filter" directive.
   Thanks to Adam Bocim.

*) Bugfix: nginx could not be built on Solaris; the bug had appeared in
   1.0.1.

</ChangeLog>
03 May 2011 19:54:32
Original commit files touched by this commit  1.0.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.0 to 1.0.1.
Update CONFLICTS.

Also update third party modules:
o) ngx_cache_purge from 1.2 to 1.3;
o) ngx_slowfs_cache from 1.5 to 1.6.

<ChangeLog>

*) Change: now the "split_clients" directive uses MurmurHash2 algorithm
   because of better distribution.
   Thanks to Oleg Mamontov.

*) Change: now long strings starting with zero are not considered as
   false values.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
19 Apr 2011 12:47:23
Original commit files touched by this commit  1.0.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party upstream keepalive module from 0.3 to 0.4.

Do not bump PORTREVISION.

<ChangeLog>

*) Bugfix: the "[alert] ... open socket ... left in connection ..."
   messages were logged on nginx worker process gracefull exit for
   each cached connection; the bug had appeared in 0.3.

</ChangeLog>
14 Apr 2011 11:31:29
Original commit files touched by this commit  1.0.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.6 to 3.0.7:

1) www/rubygem-passenger;

2) passenger support for www/nginx and www/nginx-devel;
   update passenger's version for patches.

3) for speed-up rails applications build passenger without
   debugging information by default.  Otherwise WITH_DEBUG
   required.

Approved by:    maintainer [1,3]
12 Apr 2011 10:20:31
Original commit files touched by this commit  1.0.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update to latest stable version 1.0.0.

For speed-up rails applications don't build debugging information for
passenger module by default.  Otherwise WITH_DEBUG required.

Remove needless nginx.8 for www/nginx, now its in the distro.

<ChangeLog>

*) Bugfix: a cache manager might hog CPU after reload.
   Thanks to Maxim Dounin.

*) Bugfix: an "image_filter crop" directive worked incorrectly coupled
   with an "image_filter rotate 180" directive.

*) Bugfix: a "satisfy any" directive disabled custom 401 error page.

</ChangeLog>
04 Apr 2011 18:33:35
Original commit files touched by this commit  0.9.7
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party http_subs_filter module.
Do not bump PORTREVISION.

PR:     156163
04 Apr 2011 14:10:59
Original commit files touched by this commit  0.9.7
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.6 to 0.9.7.

<ChangeLog>

*) Feature: now keepalive connections may be closed premature, if there
   are no free worker connections.
   Thanks to Maxim Dounin.

*) Feature: the "rotate" parameter of the "image_filter" directive.
   Thanks to Adam Bocim.

*) Bugfix: a case when a backend in "fastcgi_pass", "scgi_pass", or
   "uwsgi_pass" directives is given by expression and refers to a
   defined upstream.

</ChangeLog>
04 Apr 2011 10:41:52
Original commit files touched by this commit  0.9.6
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party fancyindex module from 0.3 to 0.3.1.

Do not bump PORTREVISIONs.
04 Apr 2011 07:59:12
Original commit files touched by this commit  0.9.6
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.5 to 3.0.6:

o) www/rubygem-passenger; [*]
o) passenger support for www/nginx and www/nginx-devel.

More accurate for detect dependence of nginx ports. [*]

Approved by:    maintainer [*]
21 Mar 2011 19:41:11
Original commit files touched by this commit  0.9.6
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.5 to 0.9.6.

<ChangeLog>

*) Feature: the "map" directive supports regular expressions as value
   of the first parameter.

*) Feature: $time_iso8601 access_log variable.
   Thanks to Michael Lustfield.

</ChangeLog>
15 Mar 2011 17:03:11
Original commit files touched by this commit  0.9.5_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Switch IPv6 support on by default.

Bump PORTREVISIONs.

Spotted by:     tom
11 Mar 2011 14:37:59
Original commit files touched by this commit  0.9.5_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.4 to 3.0.5:

o) www/rubygem-passenger; (1)
o) passenger support for www/nginx and www/nginx-devel. (2)

Adopt passenger's version update for extra patches.

Update preferred nginx version (1).
Do not bump PORTREVISIONs. (2)

Approved by:    Jacob Atzen <jatzen@gmail.com> (maintainer) (1)
02 Mar 2011 19:13:55
Original commit files touched by this commit  0.9.5_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.3 to 3.0.4:

o) www/rubygem-passenger; (1)
o) passenger support for www/nginx and www/nginx-devel. (2)

Adopt passenger's version update for extra patches.

Do not bump PORTREVISIONs. (2)

Approved by:    Jacob Atzen <jatzen@gmail.com> (maintainer) (1)
27 Feb 2011 13:01:19
Original commit files touched by this commit  0.9.5_1
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Chase devel/google-perftools shlib bump
25 Feb 2011 11:07:45
Original commit files touched by this commit  0.9.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.2 to 3.0.3:

o) www/rubygem-passenger; (1)
o) passenger support for www/nginx and www/nginx-devel. (2)

Adopt passenger's version update for extra patches.

Do not bump PORTREVISIONs. (2)

Approved by:    Jacob Atzen <jatzen@gmail.com> (maintainer) (1)
21 Feb 2011 09:59:32
Original commit files touched by this commit  0.9.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.4 to 0.9.5.

<ChangeLog>

*) Change: now nginx uses a default listen backlog value -1 on
   Linux.
   Thanks to Andrei Nigmatulin.

*) Feature: the "utf8" parameter of "geoip_country" and "geoip_city"
   directives.
   Thanks to Denis F. Latypoff.

*) Bugfix: in a default "proxy_redirect" directive if "proxy_pass"
   directive has no URI part.
   Thanks to Maxim Dounin.

*) Bugfix: an "error_page" directive did not work with nonstandard
   error codes; the bug had appeared in 0.8.53.
   Thanks to Maxim Dounin.

</ChangeLog>
01 Feb 2011 10:47:21
Original commit files touched by this commit  0.9.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party headers_more module from 0.13 to 0.14.

Do not bump PORTREVISIONs.

Feature safe:   yes
21 Jan 2011 11:50:29
Original commit files touched by this commit  0.9.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.3 to 0.9.4.

Feature safe: yes

<ChangeLog>

*) Feature: the "server_name" directive supports the $hostname variable.

*) Feature: 494 code for "Request Header Too Large" error.

</ChangeLog>
20 Dec 2010 04:15:22
Original commit files touched by this commit  0.9.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party headers_more module from 0.10 to 0.13.

Do not bump PORTREVISIONs.
17 Dec 2010 21:57:02
Original commit files touched by this commit  0.9.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) uploadprogress from 0.8 to 0.8.2;
o) echo from 0.30 to 0.34;

Do not bump PORTREVISIONs.
17 Dec 2010 14:49:01
Original commit files touched by this commit  0.9.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.1 to 3.0.2:

o) www/rubygem-passenger; [*]
o) passenger support for www/nginx and www/nginx-devel.

Remove needless extra patches.

Approved by:    maintainer [*]
13 Dec 2010 11:33:41
Original commit files touched by this commit  0.9.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.2 to 0.9.3.
Also sync extra patch for passenger with www/nginx.

<ChangeLog>

*) Bugfix: if there was a single server for given IPv6 address:port
   pair, then captures in regular expressions in a "server_name"
   directive did not work.

*) Bugfix: nginx could not be built on Solaris; the bug had appeared in
   0.9.0.

</ChangeLog>
12 Dec 2010 13:20:06
Original commit files touched by this commit  0.9.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party syslog support, original patch obtained from
http://dl.dropbox.com/u/5836407/Patches/Nginx_0.8.49-syslog-support.txt.

Do not bump PORTREVISIONs.

Submitted by:   Anes Muhametov aka anes at anes dot su
PR:             ports/152920
12 Dec 2010 12:22:47
Original commit files touched by this commit  0.9.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger as well as support for passenger-specific ports
from 3.0.0 to 3.0.1.

Also:

 o) respect CC/CXX/CFLAGS/PTHREAD_LIBS flags;
 o) build depends against devel/libev instead of internal libev;
 o) change depends from curl binary to libcurl;
 o) revert back GEM_LIB_DIR for pkg-message.    (!)

Do not bump PORTREVISIONs for www/nginx and www/nginx-devel ports.

<Note>

Patch extra-patch-passenger::ext::common::Utils.cpp obtained from
passenger's git:
https://github.com/FooBarWidget/passenger/commit/9a811060db56cfad2e2056d90cac1a354870dbad
and should be remove in next [3.0.2] port update.

</Note>

Approved by:    maintainer [*]
Pointy hat to:  wen (!)
06 Dec 2010 12:11:28
Original commit files touched by this commit  0.9.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.1 to 0.9.2.

<ChangeLog>

*) Feature: the "If-Unmodified-Since" client request header line
   support.

*) Workaround: fallback to accept() syscall if accept4() was not
   implemented; the issue had appeared in 0.9.0.

*) Bugfix: nginx could not be built on Cygwin; the issue had appeared
   in 0.9.0.

*) Bugfix: for OpenSSL vulnerability CVE-2010-4180.
   Thanks to Maxim Dounin.

</ChangeLog>
06 Dec 2010 06:28:05
Original commit files touched by this commit  0.9.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Speed up build passenger(tm) support by accurate corresponding patch.

Do not bump PORTREVISIONs.
01 Dec 2010 20:18:57
Original commit files touched by this commit  0.9.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for passenger 3.0.0.

<Note>

www/nginx and www/nginx-devel build support for nginx only.
For full support www/rubygem-passenger port compiled with
option WITH_NGINXPORT should be installed.

</Note>

Do not bump PORTREVISIONs.
30 Nov 2010 15:25:52
Original commit files touched by this commit  0.9.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.0 to 0.9.1.

<ChangeLog>

*) Bugfix: "return CODE message" directrives did not work; the bug had
   appeared in 0.9.0.

</ChangeLog>
29 Nov 2010 18:29:50
Original commit files touched by this commit  0.9.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.53 to latest development version 0.9.0.
Remove nginx.8.in from port, nginx(8) is in the distro.

<ChangeLog>

*) Feature: the "keepalive_disable" directive.

*) Feature: the "map" directive supports variables as value of a
   defined variable.

*) Feature: the "map" directive supports empty strings as value of the
   first parameter.

*) Feature: the "map" directive supports expressions as the first
   parameter.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
23 Nov 2010 12:39:09
Original commit files touched by this commit  0.8.53_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add nginx(8).
Bump PORTREVISION.

Thanks to:
o) Maxim Dounin aka mdounin at mdounin dot ru
o) Ruslan Ermilov aka ru@

Spotted by:     Sergey Svishchev aka svs at ropnet dot ru
PR:             ports/152212
16 Nov 2010 19:32:10
Original commit files touched by this commit  0.8.53
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly (www/nginx and www/nginx-devel):
*) update third-party http_auth_pam module from 1.1 to 1.2.
*) remove MD5.

Do not bump PORTREVISIONs.

Number of commits found: 736 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
kdelibs4Aug 27
eogAug 22
p5-PathTools*Aug 22
p5-XSLoader*Aug 22
perl5-devel*Aug 22
perl5-devel*Aug 22
perl5-devel*Aug 22
perl5.18*Aug 22
perl5.18*Aug 22
perl5.18*Aug 22
perl5.20*Aug 22
perl5.20*Aug 22
perl5.20*Aug 22
perl5.20*Aug 22
perl5.22*Aug 22

11 vulnerabilities affecting 47 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 26179
Broken 93
Deprecated 144
Ignore 362
Forbidden 0
Restricted 199
No CDROM 83
Vulnerable 65
Expired 16
Set to expire 130
Interactive 0
new 24 hours 2
new 48 hours3
new 7 days27
new fortnight45
new month113

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.