FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
nginx Robust and small WWW server
1.10.2_2,2 www on this many watch lists=90 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 21 Oct 2004 18:03:06
Also Listed In: ipv6
License: BSD2CLAUSE
NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Homepage : PortsMon

To install the port: cd /usr/ports/www/nginx/ && make install clean
To add the package: pkg install nginx

PKGNAME: nginx

distinfo:

TIMESTAMP = 1478788377
SHA256 (nginx-1.10.2.tar.gz) = 1045ac4987a396e2fa5d0011daf8987b612dd2f05181b67507da68cbe7d765c2
SIZE (nginx-1.10.2.tar.gz) = 910812
SHA256 (nginx-accesskey-2.0.3.tar.gz) = d9e94321e78a02de16c57f3e048fd31059fd8116ed03d6de7180f435c52502b1
SIZE (nginx-accesskey-2.0.3.tar.gz) = 2632
SHA256 (ngx_http_auth_pam_module-1.2.tar.gz) = 5a85970ba61a99f55a26d2536a11d512b39bbd622f5737d25a9a8c10db81efa9
SIZE (ngx_http_auth_pam_module-1.2.tar.gz) = 5424
SHA256 (ngx_cache_purge-2.3.tar.gz) = 279e0d8a46d3b1521fd43b3f78bc1c08b263899142a7cc5058c1c0361a92c89c
SIZE (ngx_cache_purge-2.3.tar.gz) = 12248
SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae
SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208
SHA256 (nginx_mod_h264_streaming-2.2.7.tar.gz) = 6d974ba630cef59de1f60996c66b401264a345d25988a76037c2856cec756c19
SIZE (nginx_mod_h264_streaming-2.2.7.tar.gz) = 44012
SHA256 (ngx_http_redis-0.3.8.tar.gz) = 95d0ed7be40da2efc88883d72e52e5e272d2c34463583b7078e8fd6d55004934
SIZE (ngx_http_redis-0.3.8.tar.gz) = 12342
SHA256 (ngx_http_response-0.3.tar.gz) = 0835584029f053051c624adbe33a826ab0205c9d85a02af6019e6b57607e9045
SIZE (ngx_http_response-0.3.tar.gz) = 2244
SHA256 (nginx_upstream_fair-20090923.tar.gz) = ec9ed7f856263e17faadee3dc7209932364ded4e546b829841c2454aa432450b
SIZE (nginx_upstream_fair-20090923.tar.gz) = 10024
SHA256 (08a395c66e42.tar.gz) = 53e440737ed1aff1f09fae150219a45f16add0c8d6e84546cb7d80f73ebffd90
SIZE (08a395c66e42.tar.gz) = 120603
SHA256 (modsecurity-2.9.1.tar.gz) = 958cc5a7a7430f93fac0fd6f8b9aa92fc1801efce0cda797d6029d44080a9b24
SIZE (modsecurity-2.9.1.tar.gz) = 4261212
SHA256 (passenger-5.0.30.tar.gz) = f367e0c1d808d7356c3749222194a72ea03efe61a3bf1b682bd05d47f087b4e3
SIZE (passenger-5.0.30.tar.gz) = 5588130
SHA256 (ngx_slowfs_cache-1.10.tar.gz) = 1e81453942e5b0877de1f1f06c56ae82918ea9818255cb935bcb673c95a758a1
SIZE (ngx_slowfs_cache-1.10.tar.gz) = 11809
SHA256 (nginx_udplog_module-1.0.0.tar.gz) = e0c0bfa524c3a675ad6c08b916d08e57ef45f9818cb8a0d848c2c83785c6e659
SIZE (nginx_udplog_module-1.0.0.tar.gz) = 6284
SHA256 (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 5534ca63cdfc2a7dc4e1cbf9c2d54d3ed3f0e6c86b4a95be48ec0a3f41cc1eb0
SIZE (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 3393
SHA256 (atomx-nginx-http-auth-digest-cc61b4a_GH0.tar.gz) = e68b34e03516a4ab43006eb4c481d6bc5e813e0d40876359c606a26c5c68ccf6
SIZE (atomx-nginx-http-auth-digest-cc61b4a_GH0.tar.gz) = 16060
SHA256 (stnoonan-spnego-http-auth-nginx-module-c85a38c_GH0.tar.gz) = b47b23a362aa338c377d6163d15abee6f33ff16bac5f86ee4d9543293fe8c4d1
SIZE (stnoonan-spnego-http-auth-nginx-module-c85a38c_GH0.tar.gz) = 18120
SHA256 (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 0ec4f099e50cc12a6319e37700e71540498d354831d1f09e113ee046ee0bb7b2
SIZE (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 17001
SHA256 (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 9e3f78ea73e2d606a95ee64fd3affa4c249f9b342e66b6b11b63061791f28316
SIZE (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 109704
SHA256 (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = db7ceef4ae22cf5bfaf5abae64830dfeef203ca85f9f40f7d1f1d90f277478c0
SIZE (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = 8260
SHA256 (nginx-clojure-nginx-clojure-v0.4.4_GH0.tar.gz) = 642ebf4724fa7c3efd5349e60b442ac8671497406834804c903ec548bfdcb691
SIZE (nginx-clojure-nginx-clojure-v0.4.4_GH0.tar.gz) = 603856
SHA256 (grahamedgecombe-nginx-ct-f3cad5e_GH0.tar.gz) = 846e148f09ffea2ffc1b09b20c84408e23c170313f967513a85009717227c13a
SIZE (grahamedgecombe-nginx-ct-f3cad5e_GH0.tar.gz) = 5521
SHA256 (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 00d42a5f562a0be5570110d9b70c8f2cace93b292421a6f994cf4ec76a8979f0
SIZE (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 52766
SHA256 (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 58daa08a5ab9b9de5459817fc088230f4092fb818b87a2cb61b217952a5af54d
SIZE (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 17980
SHA256 (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = d3442be9058682ed0ad1d294ab27effcb245c0a320fcf418c452dc923f714531
SIZE (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = 27951
SHA256 (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = d428a0236c933779cb40ac8c91afb19d5c25a376dc3caab825bfd543e1ee530d
SIZE (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = 6260
SHA256 (openresty-nginx-eval-module-342c812_GH0.tar.gz) = c45f6438474593f0cf5229160327d20c2f2d72e9c0b5c8cf9e0ef8d5295de177
SIZE (openresty-nginx-eval-module-342c812_GH0.tar.gz) = 14183
SHA256 (aperezdc-ngx-fancyindex-v0.3.6_GH0.tar.gz) = e73f1f0444f8c53601b51da8684b174c5ffd3b4ed6eb7956dd57f8b95485b68f
SIZE (aperezdc-ngx-fancyindex-v0.3.6_GH0.tar.gz) = 17252
SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813
SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934
SHA256 (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = ebb4652c4f9a2e1ee31fddefc4c93ff78e651a4b2727d3453d026bccbd708d99
SIZE (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = 6766
SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997
SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736
SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885
SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343
SHA256 (slact-nchan-v0.99.16_GH0.tar.gz) = 200cc1b02931a067c3edb07243a7faac80265ce6aab37af680cf7373011efc41
SIZE (slact-nchan-v0.99.16_GH0.tar.gz) = 378626
SHA256 (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = a95f31e80120fd7324795b92a0d94c0b43e1265df7fd0f1eba11a337c1e0a626
SIZE (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = 175263
SHA256 (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = ed4ddbcf0c434f4a1e97b61251a63ace759792764bd5cb79ff20efe348db8db3
SIZE (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = 92230
SHA256 (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 34d51afcd464582e6011a5d3abe6829c5690ddb9b50c993dfdafb4c725a4803a
SIZE (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 48378
SHA256 (vkholodkov-nginx-upload-module-aba1e3f34c_GH0.tar.gz) = 62a2c4388585aec463a1cee30bc84953593a93f341dc1df61b42b452594d2a05
SIZE (vkholodkov-nginx-upload-module-aba1e3f34c_GH0.tar.gz) = 28296
SHA256 (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 93e29b9b437a2e34713de54c2861ea51151624aca09f73f9f44d1caaff01a6b1
SIZE (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 16990
SHA256 (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 52e6acd8c0264a59c5c948271015a59acd3cbcf91377456b7c8dc6f9feecef4a
SIZE (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 128281
SHA256 (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 382bb41fa739f471fdab9fbabc5384d8ec7f25b5bb0c45c153f5cc01d428abe2
SIZE (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 2709351
SHA256 (evanmiller-mod_zip-ca0b345_GH0.tar.gz) = babab586ebde83d3cf128eabdc3a66f922db740a43c943ffd9cd8b055acf3a5b
SIZE (evanmiller-mod_zip-ca0b345_GH0.tar.gz) = 26035
SHA256 (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = aafb79d87273eec023025333c34d6d0108026a1ce2e09b20a53e8e2d9bf65080
SIZE (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = 59024
SHA256 (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = bf60cf196c86193376d11f8c7a3826994b24a48bb36943bab8a25af6e776af3b
SIZE (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = 10921
SHA256 (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 88e05a99a8a7419066f5ae75966fb1efc409bad4522d14986da074554ae61619
SIZE (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 66455
SHA256 (openresty-encrypted-session-nginx-module-v0.05_GH0.tar.gz) = 5aea148410d647ca1d5b4e6164a19fde989a4da332fa118e003071d87bf6eae4
SIZE (openresty-encrypted-session-nginx-module-v0.05_GH0.tar.gz) = 10462
SHA256 (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = ef843824e0aac1dd60b392802861cc06426a4bc5f87d472c7ee00b1296693f2a
SIZE (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = 18883
SHA256 (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 552c54aff81c4701ace4eb1ce20c114433ee783b4b06c0105921a830c9486172
SIZE (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 53024
SHA256 (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = cbf6fcddc00a7e30289134bdeace12565e000cc7d4efee2d2ebb8799d0b88270
SIZE (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = 20534
SHA256 (openresty-lua-nginx-module-v0.10.6_GH0.tar.gz) = b98c4f648589bbf3e2c3d5fd18664e7a7ef89ac083e96c8e984fa919e7a7c073
SIZE (openresty-lua-nginx-module-v0.10.6_GH0.tar.gz) = 597217
SHA256 (openresty-memc-nginx-module-v0.17_GH0.tar.gz) = 25cbe3ff4931283a681260607bc91ae4a922075345d5770b293c6cd7f1e3bdcc
SIZE (openresty-memc-nginx-module-v0.17_GH0.tar.gz) = 36369
SHA256 (nbs-system-naxsi-0.54_GH0.tar.gz) = 9cc2c09405bc71f78ef26a8b6d70afcea3fccbe8125df70cb0cfc480133daba5
SIZE (nbs-system-naxsi-0.54_GH0.tar.gz) = 163809
SHA256 (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = c942e674a7273ab87caab4dcad626ab54852be192c29b1add50d2cb535e3cbb9
SIZE (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = 40742
SHA256 (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = b204909c6fb194fe8fed7627a3733bc9598f64251dc04a5b6a5bbd612e925324
SIZE (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = 19444
SHA256 (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 99aedf222a9664484918392988cce41b1a6238240d42f8bd44f5ff102c05c36c
SIZE (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 33496
SHA256 (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = baf5274c815a5f27854747df09ff5bcd6d82e0baa2f224a9db6450d2f3a35a4f
SIZE (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = 28981
SHA256 (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = de5866111a5b18c9dfb1c10f3a0e84b56af77f7005a41807368f7769b8a50965
SIZE (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = 519647
SHA256 (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 5f32c484b29b9047dfa65fd3eec511c0f7c65f0f3ec0a4e0453359cf4642d405
SIZE (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 29340
SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955
SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504
SHA256 (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = c25f284bc934f59a267d319385a3e11858efef786c84b49a77d09e7f5274bbf1
SIZE (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = 16688
SHA256 (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 8f513d6d3df32c3b05327d40e16efd020532a911d3eeca8015eb6271f2d4fd1c
SIZE (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 55918
SHA256 (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = e34b1ab5f5007661f73819f9c20fd6c2a46ed3e53364e9449b02ef2bd3628633
SIZE (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = 58777
SHA256 (zebrafishlabs-nginx-statsd-b756a12_GH0.tar.gz) = 4c5886edb1fbeb0b9a83c879b4be4b15a620627a18978aef636da3feafb284fe
SIZE (zebrafishlabs-nginx-statsd-b756a12_GH0.tar.gz) = 6636
SHA256 (gabor-nginx-x-rid-header-0daa3cc_GH0.tar.gz) = de784142d867a35ecc5443fa347c2903af0935669cdf2eaa9274f5253aac2267
SIZE (gabor-nginx-x-rid-header-0daa3cc_GH0.tar.gz) = 2711
SHA256 (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 958bd8de773601d8d3138501cc4be0420f1c818a3987a70cc9c0023371e432cf
SIZE (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 11477
SHA256 (nginx-njs-f7d2d6f_GH0.tar.gz) = 67291a3ae4b98f17335f12951984bc9b1bf4f6367e4beff40638cd832d2fb281
SIZE (nginx-njs-f7d2d6f_GH0.tar.gz) = 167815
SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80
SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280
SHA256 (google-ngx_brotli-ada972b_GH0.tar.gz) = d3d0e22a2629cd017280e05bd3bf05aa7b5c820ebe8c79932ce161243911e776
SIZE (google-ngx_brotli-ada972b_GH0.tar.gz) = 11128
SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106
SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090
SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462
SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133


Slave ports
  1. www/nginx-full
  2. www/nginx-lite
  3. www/nginx-naxsi

NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. libcrypto.so.9 : security/openssl
Runtime dependencies:
  1. libcrypto.so.9 : security/openssl
Library dependencies:
  1. libpcre.so : devel/pcre

This port is required by:

for Build for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...
Configuration Options
===> The following configuration options are available for nginx-1.10.2_2,2:
     DSO=on: Enable dynamic modules support
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     FILE_AIO=on: Enable file aio
     IPV6=on: IPv6 protocol support
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=on: Enable http_addition module
     HTTP_AUTH_REQ=on: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=on: Enable http_webdav module
     HTTP_FLV=on: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GZIP_STATIC=on: Enable http_gzip_static module
     HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_MP4=on: Enable http_mp4 module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=on: Enable http_random_index module
     HTTP_REALIP=on: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=on: Enable http_secure_link module
     HTTP_SLICE=on: Enable http_slice module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=on: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     MAIL=on: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=on: Enable mail_ssl module
     HTTPV2=on: Enable HTTP/2 protocol support (SSL req.)
     NJS=off: Enable http_javascript module
     STREAM=on: Enable stream module
     STREAM_SSL=on: Enable stream_ssl module (SSL req.)
     THREADS=on: Enable threads support
     WWW=on: Enable html sample files
     AJP=off: 3rd party ajp module
     AWS_AUTH=off: 3rd party aws auth module
     CACHE_PURGE=off: 3rd party cache_purge module
     CLOJURE=off: 3rd party clojure module
     CT=off: 3rd party cert_transparency module (SSL req.)
     ECHO=off: 3rd party echo module
     FASTDFS=off: 3rd party fastdfs module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_ACCESSKEY=off: 3rd party http_accesskey module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_GEOIP2=off: 3rd party geoip2 module
     HTTP_JSON_STATUS=off: 3rd party http_json_status module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_TARANTOOL=off: 3rd party tarantool upstream module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module
     HTTP_ZIP=off: 3rd party http_zip module
     ARRAYVAR=off: 3rd party array_var module
     BROTLI=off: 3rd party brotli module
     DRIZZLE=off: 3rd party drizzlie module
     DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     NAXSI=off: 3rd party naxsi module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgres module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SHIBBOLETH=off: 3rd party shibboleth module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SMALL_LIGHT=off: 3rd party small_light module
     SRCACHE=off: 3rd party srcache module
     STATSD=off: 3rd party statsd module
     UDPLOG=off: 3rd party udplog (syslog) module
     X11=off: graphics/ImageMagick[-nox11] dependency
     XRID_HEADER=off: 3rd party x-rid header module
     XSS=off: 3rd party xss module
===> Use 'make config' to modify these settings

USES:
cpe ssl gnome

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 661 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
27 Aug 2015 17:36:32
Original commit files touched by this commit  1.8.0_3,2
Revision:395441 This port version is marked as vulnerable.
vg search for other commits by this committer
Added 3rd party tarantool upstream module:

Tarantool NginX upstream module

- Benefit from nginx features and tarantool features over HTTP(S).
- Call tarantool methods via JSON RPC.
- Load Balancing with elastic configuration.
- Backup and fault tolerance.
- Low overhead.

PR:		ports/202593
Approved by:	osa
13 Aug 2015 00:58:37
Original commit files touched by this commit  1.8.0_3,2
Revision:394047 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party clojure module from 0.4.0 to 0.4.1.
10 Aug 2015 22:30:21
Original commit files touched by this commit  1.8.0_3
Revision:393918 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.14 to 5.0.15:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
10 Aug 2015 12:03:27
Original commit files touched by this commit  1.8.0_3,2
Revision:393858 This port version is marked as vulnerable.
osa search for other commits by this committer
Use luajit instead of lua for third-party modsecurity module, sort list of
dependences for it.

PR:	200263
17 Jul 2015 00:11:51
Original commit files touched by this commit  1.8.0_3,2
Revision:392328 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.13 to 5.0.14:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
10 Jul 2015 08:28:32
Original commit files touched by this commit  1.8.0_3,2
Revision:391693 This port version is marked as vulnerable.
philip search for other commits by this committer
Update third-party KRB5/SPNEGO module to the latest upstream version.

Approved by:	osa (maintainer)
05 Jul 2015 23:43:09
Original commit files touched by this commit  1.8.0_3,2
Revision:391378 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party clojure module from 0.3.0 to 0.4.0.
04 Jul 2015 22:24:35
Original commit files touched by this commit  1.8.0_3,2
Revision:391335 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.11 to 5.0.13:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
04 Jul 2015 21:54:54
Original commit files touched by this commit  1.8.0_3,2
Revision:391333 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party headers_more module from 0.26 to 0.261.
03 Jul 2015 16:44:59
Original commit files touched by this commit  1.8.0_3,2
Revision:391254 This port version is marked as vulnerable.
koobs search for other commits by this committer
www/nginx{-deve}: Fix build with HEADERS_MORE option

Upstream apparently re-tagged the v0.26 release, thereby changing the contents
of the tarball oftained from github, causing distinfo checksums to become
mismatched.

This change updates distinfo entries in nginx and nginx-devel to compensate.

PR:		201129
Submitted by:	Adam Twardowski <adam dot twardowski gmail.com>
Approved by:	portmgr (blanket)
MFH:		2015Q3
01 Jul 2015 09:29:58
Original commit files touched by this commit  1.8.0_2,2
Revision:391039 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.10 to 5.0.11:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
25 Jun 2015 21:06:39
Original commit files touched by this commit  1.8.0_2,2
Revision:390602 This port version is marked as vulnerable.
osa search for other commits by this committer
Be more accurate with tmpdir removal and remove only empty tmpdir.
Cause otherwise removal non-empty tmpdir breaks running nginx instance.

Bump PORTREVISION.

PR:		201045
Tested by:	grembo
21 Jun 2015 23:25:26
Original commit files touched by this commit  1.8.0_1,2
Revision:390268 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party fancyindex module from 0.3.4 to 0.3.5.
14 Jun 2015 11:36:55
Original commit files touched by this commit  1.8.0_1,2
Revision:389626 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party clojure module, version 0.3.0.
13 Jun 2015 19:51:30
Original commit files touched by this commit  1.8.0_1,2
Revision:389483 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party ajp module.
13 Jun 2015 19:28:13
Original commit files touched by this commit  1.8.0_1,2
Revision:389481 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party statsd module.

PR:	178799
13 Jun 2015 18:11:29
Original commit files touched by this commit  1.8.0_1,2
Revision:389476 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party SPNEGO authentication module.

PR:	192904
13 Jun 2015 17:34:34
Original commit files touched by this commit  1.8.0_1,2
Revision:389474 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix digest authentication fail on URLs with a querystring for third-party
http_auth_digest module.

PR:	199758
13 Jun 2015 16:50:55
Original commit files touched by this commit  1.8.0_1,2
Revision:389470 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party small_light module, version 0.6.9.

PR:	185816
13 Jun 2015 00:00:37
Original commit files touched by this commit  1.8.0_1,2
Revision:389307 This port version is marked as vulnerable.
osa search for other commits by this committer
Welcome back third-party upload module.

PR:	200809
12 Jun 2015 01:31:18
Original commit files touched by this commit  1.8.0_1,2
Revision:389257 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.9 to 5.0.10:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
05 Jun 2015 03:10:09
Original commit files touched by this commit  1.8.0_1,2
Revision:388563 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.8 to 5.0.9:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
02 Jun 2015 07:51:00
Original commit files touched by this commit  1.8.0_1,2
Revision:388308 This port version is marked as vulnerable.
peter search for other commits by this committer
Update the optional (defaults to off) ldap authentication module to a more
recent version.  Of particular importance is that the old one
connected/disconnected to the ldap server for every single URL being served
while this one has a configurable cache.

PR:		200550
Reviewed by:	osa
29 May 2015 14:01:15
Original commit files touched by this commit  1.8.0_1,2
Revision:387856 This port version is marked as vulnerable.
mat search for other commits by this committer
Convert nginx, nginx-devel and tengine to USE_GITHUB.

Sponsored by:	Absolight
28 May 2015 02:38:04
Original commit files touched by this commit  1.8.0_1,2
Revision:387698 This port version is marked as vulnerable.
osa search for other commits by this committer
Make 'make makesum' happy.
26 May 2015 23:12:04
Original commit files touched by this commit  1.8.0_1,2
Revision:387518 This port version is marked as vulnerable.
osa search for other commits by this committer
Add patches for third-party postgres module.
26 May 2015 23:10:53
Original commit files touched by this commit  1.8.0_1,2
Revision:387517 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party postgres module back.

Based on patch from:	Alexander Ushakov <alexander@tauruna.ru>
24 May 2015 16:27:38
Original commit files touched by this commit  1.8.0_1,2
Revision:387280 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.7 to 5.0.8:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
22 May 2015 20:34:29
Original commit files touched by this commit  1.8.0_1,2
Revision:387082 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove $FreeBSD$ from patches files everywhere.

With hat:	portmgr
Sponsored by:	Absolight
14 May 2015 10:15:09
Original commit files touched by this commit  1.8.0_1,2
Revision:386312 This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
05 May 2015 16:16:32
Original commit files touched by this commit  1.8.0_1,2
Revision:385478 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
Fix selection of HTTP_XSLT and MODSECURITY so that the proper LIB_DEPENDS on
libxslt is added.
30 Apr 2015 00:33:01
Original commit files touched by this commit  1.8.0,2
Revision:385018 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove useless code.
29 Apr 2015 01:03:03
Original commit files touched by this commit  1.8.0,2
Revision:384952 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 5.0.6 to 5.0.7:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
29 Apr 2015 00:32:36
Original commit files touched by this commit  1.8.0,2
Revision:384949 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless code.
27 Apr 2015 02:26:18
Original commit files touched by this commit  1.8.0,2
Revision:384808 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless patch, I've just forgotten to remove it in previous commit.
27 Apr 2015 02:16:04
Original commit files touched by this commit  1.8.0,2
Revision:384807 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove support for next unsupported third-party modules:

o) http_upload;
o) postgres;
o) supervisord;
o) tcp_proxy;

Add back third-party http_upstream_sticky module's checksums.
22 Apr 2015 11:47:23
Original commit files touched by this commit  1.8.0,2
Revision:384487 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove third-party syslog support, it's available out of box now,
see http://nginx.org/en/docs/syslog.html for details.
21 Apr 2015 23:26:57
Original commit files touched by this commit  1.8.0,2
Revision:384469 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade to latest stable version 1.8.0.

According to vendor's recommendations safely remove NGX_THREADS macro
with some long unused code from some third-party modules.

Merge changes from www/nginx-devel to www/nginx.
Merge third-pary upstream_sticky module from www/nginx to www/nginx-devel.

Remove outdated syslog support.
21 Apr 2015 18:03:22
Original commit files touched by this commit  1.6.3,2
Revision:384435 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party set_misc module from 0.24 to 0.28.
21 Apr 2015 00:26:54
Original commit files touched by this commit  1.6.3,2
Revision:384394 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) echo from 0.51 to 0.57;
o) memc from 0.14 to 0.15;
o) srcache from 0.25 to 0.29.
21 Apr 2015 00:08:55
Original commit files touched by this commit  1.6.3,2
Revision:384393 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party redis2 module from 0.10 to 0.11.
20 Apr 2015 23:58:03
Original commit files touched by this commit  1.6.3,2
Revision:384392 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-pary redis2 module from 0.9.4 to 0.9.15.
17 Apr 2015 21:55:56
Original commit files touched by this commit  1.6.3,2
Revision:384190 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party headers-more module from 0.25 to 0.26.

Patch from:	Denis Denisov <denji0k@gmail.com> (via mail)
07 Apr 2015 23:37:49
Original commit files touched by this commit  1.6.3,2
Revision:383550 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.6.2 to 1.6.3.

<ChangeLog>

*) Feature: now the "tcp_nodelay" directive works with SPDY connections.

*) Bugfix: in error handling.
   Thanks to Yichun Zhang and Daniil Bondarev.

*) Bugfix: alerts "header already sent" appeared in logs if the
   "post_action" directive was used; the bug had appeared in 1.5.4.

*) Bugfix: alerts "sem_post() failed" might appear in logs.

*) Bugfix: in hash table handling.
   Thanks to Chris West.

*) Bugfix: in integer overflow handling.
   Thanks to Regis Leroy.

</ChangeLog>
07 Apr 2015 23:32:17
Original commit files touched by this commit  1.6.2_1,2
Revision:383547 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix a couple portlint warnings.

PR:		199163
05 Apr 2015 16:02:05
Original commit files touched by this commit  1.6.2_1,2
Revision:383302 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 1.1.6 to 1.1.7.
04 Apr 2015 23:38:24
Original commit files touched by this commit  1.6.2_1,2
Revision:383248 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.4 to 5.0.6:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

The passenger now uses its own libev fork, so remove devel/libev dependency.

<ChangeLog>

Release 5.0.6
-------------

* The turbocache no longer caches responses for which the Cache-Control header
  contains "no-cache". Please note that "no-cache" does not mean "do not cache
  this response". Instead, it means "any caching servers may only serve the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
24 Mar 2015 18:19:24
Original commit files touched by this commit  1.6.2_1,2
Revision:382150 This port version is marked as vulnerable.
marino search for other commits by this committer
4 ports categories: Remove $PTHREAD_LIBS

Categories: www, ftp, net-im, net-mgmt

approved by:	PTHREAD blanket
23 Mar 2015 04:07:09
Original commit files touched by this commit  1.6.2_1,2
Revision:381979 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
Properly set MAKE_ENV and MAKE_CMD.

With hat:	portmgr
13 Mar 2015 00:41:06
Original commit files touched by this commit  1.6.2_1,2
Revision:381156 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.2 to 5.0.4:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 5.0.3
-------------

 * [Standalone] When using the builtin engine, `passenger start` may crash
during
   startup due to an initialization race condition. This has been fixed.
 * [Enterprise] Fixes a bug in passenger-irb. Running passenger-irb without a
PID
   parameter worked, but running it with a PID parameter didn't.
 * Fixes an integer overflow that resulted in a file descriptor leak and stalled
(Only the first 15 lines of the commit message are shown above View all of this commit message)
13 Mar 2015 00:06:30
Original commit files touched by this commit  1.6.2_1,2
Revision:381154 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.59 to 5.0.2:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 5.0.2
-------------

 * Fixes a connection freeze that could occur when processing large responses.
This would
   manifest itself under the error message "This website is under heavy load" or
"Request
   queue is full, returning an error". Closes GH-1404.
 * Debian and Ubuntu packages have been reintroduces.
 * When `passenger-config restart-app` is run interactively, if Passenger is not
serving
(Only the first 15 lines of the commit message are shown above View all of this commit message)
13 Feb 2015 12:49:33
Original commit files touched by this commit  1.6.2_1,2
Revision:378927 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modsecurity module from 2.8.0 to 2.9.0.

<ChangeLog>

12 Feb 2015 - 2.9.0
-------------------

 * Fix apr_crypto.h include, now checking if apr_crypto.h is available by
   checking the definition WITH_APU_CRYPTO.
   [martinjina and ModSecurity team]

15 Dez 2014 - 2.9.0-RC2
-----------------------

 * OpenSSL dependency was removed on MS Windows builds. ModSecurity is now using
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Feb 2015 03:23:11
Original commit files touched by this commit  1.6.2_1,2
Revision:378812 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.58 to 4.0.59:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.59
--------------

* [Enterprise] Fixed support for free-style Node.js apps.

</ChangeLog>
23 Jan 2015 23:28:01
Original commit files touched by this commit  1.6.2_1,2
Revision:377773 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.57 to 4.0.58:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.58
--------------

* [Enterprise] Fixed a bug in the Debian packages which caused Flying Passenger
to break when used with non-system Rubies.
* The Debian packages no longer require Ruby 1.9. Closes GH-1353.

</ChangeLog>
04 Jan 2015 16:54:50
Original commit files touched by this commit  1.6.2_1,2
Revision:376243 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party dav_ext module from 0.0.2 to 0.0.3.
04 Jan 2015 16:38:28
Original commit files touched by this commit  1.6.2_1,2
Revision:376242 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party drizzle module from 0.1.7 to 0.1.8.
Rename extra patch for the module.
04 Jan 2015 16:03:30
Original commit files touched by this commit  1.6.2_1,2
Revision:376241 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 1.1.5 to 1.1.6.
Remove necessary patch for the module.
04 Jan 2015 03:27:15
Original commit files touched by this commit  1.6.2_1,2
Revision:376178 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_fancyindex module from 0.3.1 to 0.3.4.

Submitted by:	Miguel Clara <miguelmclara@gmail.com>

<ChangeLog>

v0.3.4
======
- Viewport is now defined in the generated HTML, which works better
  for mobile devices.
- Even-odd row styling moved to the CSS using :nth-child(). This
  makes the HTML served to clients smaller.

v0.3.3
======
- New feature: table headers in the default template are now clickable
  to set the sorting criteria and direction of the index entries.
  (https://github.com/aperezdc/ngx-fancyindex/issues/7)

v0.3.2
======
- Solved a bug that would leave certain clients stalled forever.
- Improved handling of subrequests for non-builtin headers/footers.

</ChangeLog>
03 Jan 2015 17:08:25
Original commit files touched by this commit  1.6.2_1,2
Revision:376130 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_cache_purge module from 2.1 to 2.3 (as preparation to
upgrade the www/nginx-devel to 1.7.9).

<ChangeLog>

2014-12-23    VERSION 2.3
    * Fix compatibility with nginx-1.7.9+.

2014-12-02    VERSION 2.2
    * Fix compatibility with nginx-1.7.8+.

2014-05-19
    * Fix build on Solaris with SunCC (Solaris Studio).
      Reported by Jussi Sallinen.

</ChangeLog>
03 Jan 2015 16:58:40
Original commit files touched by this commit  1.6.2_1,2
Revision:376127 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.53 to 4.0.57 (as preparation to upgrade the www/nginx-devel to
1.7.9):

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.57
--------------

 * Fixed a native extension compatibility problem with Ruby 2.2.
   Closes [ruby-core:67152](https://bugs.ruby-lang.org/issues/10656).
 * Fixed compatibility with Nginx 1.7.9. Closes GH-1335.

Release 4.0.56
(Only the first 15 lines of the commit message are shown above View all of this commit message)
12 Dec 2014 22:51:48
Original commit files touched by this commit  1.6.2_1,2
Revision:374609 This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing dependency.
Don't bump PORTREVISION cause the third-party modsecurity module disabled by
default.

Patch from:	Ilya Komandyshko <ikomander@gmail.com>
04 Dec 2014 21:26:03
Original commit files touched by this commit  1.6.2_1,2
Revision:373984 This port version is marked as vulnerable.
feld search for other commits by this committer
Update LICENSE to make the warnings go away
26 Nov 2014 13:08:38
Original commit files touched by this commit  1.6.2_1,2
Revision:373448 This port version is marked as vulnerable.
mat search for other commits by this committer
Change the way Perl modules are installed, update the default Perl to 5.18.

Before, we had:

  site_perl :           lib/perl5/site_perl/5.18
  site_perl/perl_arch : lib/perl5/site_perl/5.18/mach
  perl_man3 :           lib/perl5/5.18/man/man3

Now we have:

  site_perl : lib/perl5/site_perl
  site_arch : lib/perl5/site_perl/mach/5.18
  perl_man3 : lib/perl5/site_perl/man/man3

Modules without any .so will be installed at the same place regardless of the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 Oct 2014 14:16:17
Original commit files touched by this commit  1.6.2,2
Revision:369965 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.52 to 4.0.53:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Upgraded the preferred Nginx version to 1.6.2.
* Improved RVM gemset autodetection.
* Fixed some Ruby 2.2 compatibility issues.

</ChangeLog>
01 Oct 2014 01:18:56
Original commit files touched by this commit  1.6.2,2
Revision:369682 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.50 to 4.0.52:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Fixed a null termination bug when autodetecting application types.
* Node.js apps can now also trigger the inverse port binding mechanism by
passing `'/passenger'`
  as argument.  This was introduced in order to be able to support the Hapi.js
framework.
  Please read
 
http://stackoverflow.com/questions/20645231/phusion-passenger-error-http-server-listen-was-called-more-than-once/20645549
  for more information regarding Hapi.js support.
* It is now possible to abort Node.js WebSocket connections upon application
restart.
  Please refer to
(Only the first 15 lines of the commit message are shown above View all of this commit message)
01 Oct 2014 00:00:22
Original commit files touched by this commit  1.6.2,2
Revision:369681 This port version is marked as vulnerable.
osa search for other commits by this committer
Update patch for third party upload module.

PR:     193891
26 Sep 2014 00:02:08
Original commit files touched by this commit  1.6.2,2
Revision:369298 This port version is marked as vulnerable.
osa search for other commits by this committer
Update CPE_VENDOR.
19 Sep 2014 01:27:24
Original commit files touched by this commit  1.6.2,2
Revision:368537 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 1.1.4 to 1.1.5.
Fix compilation issue (1).
Do not bump PORTREVISION.

Obtained
from:	https://github.com/arut/nginx-rtmp-module/commit/dd5f2aa117c617e1f0fde26f8fd58903be2d85e8.patch	(1)
17 Sep 2014 14:55:34
Original commit files touched by this commit  1.6.2,2
Revision:368382 This port version is marked as vulnerable.
mat search for other commits by this committer
OPTIONS_SINGLE must have one value selected at all time, let's guess that MP4
is optional and switch to OPTIONS_RADIO.

Sponsored by:	Absolight
16 Sep 2014 17:47:48
Original commit files touched by this commit  1.6.2,2
Revision:368340 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.6.1 to 1.6.2.

<ChangeLog>

*) Security: it was possible to reuse SSL sessions in unrelated contexts
   if a shared SSL session cache or the same TLS session ticket key was
   used for multiple "server" blocks (CVE-2014-3616).
   Thanks to Antoine Delignat-Lavaud.

*) Bugfix: requests might hang if resolver was used and a DNS server
   returned a malformed response; the bug had appeared in 1.5.8.

*) Bugfix: requests might hang if resolver was used and a timeout
   occurred during a DNS request.

</ChangeLog>
29 Aug 2014 11:09:43
Original commit files touched by this commit  1.6.1_1,2
Revision:366502 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.49 to 4.0.50:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Fixed a potential heap corruption bug.
* Added Union Station support for Rails 4.1.

</ChangeLog>
25 Aug 2014 12:19:44
Original commit files touched by this commit  1.6.1_1,2
Revision:366069 This port version is marked as vulnerable.
bapt search for other commits by this committer
Convert to USES=pgsql
22 Aug 2014 22:06:37
Original commit files touched by this commit  1.6.1_1,2
Revision:365702 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.48 to 4.0.49:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

 * Upgraded the preferred Nginx version to 1.6.1.
 * Fixed a crash that may be triggered by the `passenger_max_requests` feature.
 * Introduced the `spawn_failed` hook, which is called when an application
   process fails to spawn. You could use this hook to setup an error
   notification system. Closes GH-1252.
 * Fonts, RSS and XML are now gzip-compressed by default in Phusion Passenger
   Standalone. Thanks to Jacob Elder. Closes GH-1254.
 * Fixed some user and group information lookup issues. Closes GH-1253.
 * Fixed some request handling crashes. Closes GH-1250.
 * Fixed some compilation problems on Gentoo. Closes GH-1261.
 * Fixed some compilation problems on Solaris. Closes GH-1260.

</ChangeLog>
11 Aug 2014 17:05:50
Original commit files touched by this commit  1.6.1_1,2
Revision:364628 This port version is marked as vulnerable.
adamw search for other commits by this committer
Bump PORTREVISION on all ports that depend on net/GeoIP for
r364627.

Approved by:	portmgr (not really, but touches unstaged ports)
10 Aug 2014 17:47:05
Original commit files touched by this commit  1.6.1,2
Revision:364551 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modsecurity module from 2.7.5 to latest version 2.8.0.
10 Aug 2014 15:21:35
Original commit files touched by this commit  1.6.1,2
Revision:364549 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.45 to 4.0.48:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

Add CPE information.

<ChangeLog>

Release 4.0.48
--------------

 * Fixed a race condition while determining what user an application should
   be executed as. This bug could lead to applications being run as the wrong
   user. Closes GH-1241.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
10 Aug 2014 03:27:49
Original commit files touched by this commit  1.6.1,2
Revision:364497 This port version is marked as vulnerable.
osa search for other commits by this committer
Add CPE information.
09 Aug 2014 18:36:57
Original commit files touched by this commit  1.6.1,2
Revision:364460 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.6.0 to 1.6.1.

<ChangeLog>

*) Security: pipelined commands were not discarded after STARTTLS
   command in SMTP proxy (CVE-2014-3556); the bug had appeared in 1.5.6.
   Thanks to Chris Boulton.

*) Bugfix: the $uri variable might contain garbage when returning errors
   with code 400.
   Thanks to Sergey Bobrov.

*) Bugfix: in the "none" parameter in the "smtp_auth" directive; the bug
   had appeared in 1.5.6.
   Thanks to Svyatoslav Nikolsky.

</ChangeLog>
24 Jul 2014 18:34:16
Original commit files touched by this commit  1.6.0_3,2
Revision:362835 This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
23 Jun 2014 13:44:39
Original commit files touched by this commit  1.6.0_2,2
Revision:358946 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Switch devel/google-perftools to USES=libtool, drop .la files
- Bump dependent ports as .so version has changed

Approved by:	portmgr blanket
20 Jun 2014 09:53:46
Original commit files touched by this commit  1.6.0_1,2
Revision:358544 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless empty string, introduced in r357965.
20 Jun 2014 09:50:30
Original commit files touched by this commit  1.6.0_1,2
Revision:358542 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.44 to 4.0.45:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
16 Jun 2014 09:55:54
Original commit files touched by this commit  1.6.0_1,2
Revision:357965 This port version is marked as vulnerable.
erwin search for other commits by this committer
Updated syslog support and upstream_sticky options to re-enable them.

PR:             189391
Submitted by:   dgeo@centrale-marseille.fr
Approved by:    maintainer timeout
12 Jun 2014 09:17:33
Original commit files touched by this commit  1.6.0_1,2
Revision:357574 This port version is marked as vulnerable.
tijl search for other commits by this committer
Bump PORTREVISION on everything that depends on devel/apr1 due to the
library version change.

Approved by:	portmgr (implicit)
10 Jun 2014 12:14:14
Original commit files touched by this commit  1.6.0,2
Revision:357300 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove all the bootstrap files (.bs) from the plists.

Starting with perl 5.20, they're not installed any more if empty,
and on FreeBSD, they're (always ?) empty.

PR:		190681
Submitted by:	mat
Exp-Run by:	antoine
Sponsored by:	Absolight
02 Jun 2014 10:57:38
Original commit files touched by this commit  1.6.0,2
Revision:356210 This port version is marked as vulnerable.
osa search for other commits by this committer
Multiple third-party modules as well as repos have been moved from agentzh and
chaoslawful
to openresty and renamed accordingly.

Do not dump PORTREVISION.

PR:	190074
02 Jun 2014 09:49:58
Original commit files touched by this commit  1.6.0,2
Revision:356208 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 1.1.2 to 1.1.4.
Remove whitespaces.
02 Jun 2014 02:14:54
Original commit files touched by this commit  1.6.0,2
Revision:356191 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.41 to 4.0.44:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.44
--------------

 * The issue tracker has now been moved from Google Code to Github.
   Before version 4.0.44 (May 29 2014, commit 3dd0964c9f4), all
   issue numbers referred to Google Code. From now on, all issue
   numbers will refer to Github Issues.
 * Fixed compilation problems on OS X Lion and OS X Mountain Lion.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 May 2014 16:41:17
Original commit files touched by this commit  1.6.0,2
Revision:352966 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.4.7 to 1.6.0.

Temporary disable third-party modules and patches:
o http_upstream_sticky
o postgres
o syslog_support
o tcp_proxy

ChangeLog:	http://nginx.org/en/CHANGES-1.6
16 Apr 2014 18:28:50
Original commit files touched by this commit  1.4.7_1,2
Revision:351411 This port version is marked as vulnerable.
zeising search for other commits by this committer
The FreeBSD x11@ and graphics team proudly presents
a zeising, kwm production, with help from dumbbell, bdrewery:

NEW XORG ON FREEBSD 9-STABLE AND 10-STABLE

This update switches over to use the new xorg stack by default on FreeBSD 9
and 10 stable, on osversions where vt(9) is available.
It is still possible to use the old stack by specifying WITHOUT_NEW_XORG in
/etc/make.conf .
FreeBSD 8-STABLE and released versions of FreeBSD still use
the old version.
A package repository with binary packages for new xorg will
be available soon.

This patch also contains updates of libxcb and related ports, pixman, as well
(Only the first 15 lines of the commit message are shown above View all of this commit message)
09 Apr 2014 02:36:09
Original commit files touched by this commit  1.4.7,2
Revision:350664 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.35 to 4.0.41:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

STAGEfy www/rubygem-passenger.
01 Apr 2014 00:40:05
Original commit files touched by this commit  1.4.7,2
Revision:349818 This port version is marked as vulnerable.
feld search for other commits by this committer
Update OpenSSL logic to match www/nginx-devel

PR:		ports/182985
Approved by:	maintainer timeout
23 Mar 2014 02:29:37
Original commit files touched by this commit  1.4.7,1
Revision:348826 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.4.6 to 1.4.7.

<ChangeLog>

*) Security: a heap memory buffer overflow might occur in a worker
   process while handling a specially crafted request by
   ngx_http_spdy_module, potentially resulting in arbitrary code
   execution (CVE-2014-0133).
   Thanks to Lucas Molas, researcher at Programa STIC, Fundacion Dr.
   Manuel Sadosky, Buenos Aires, Argentina.

*) Bugfix: in the "fastcgi_next_upstream" directive.
   Thanks to Lucas Molas.

</ChangeLog>
06 Mar 2014 00:01:07
Original commit files touched by this commit  1.4.6,1
Revision:347156 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.4.5 to 1.4.6.

<ChangeLog>

*) Bugfix: the "client_max_body_size" directive might not work when
   reading a request body using chunked transfer encoding; the bug had
   appeared in 1.3.9.
   Thanks to Lucas Molas.

*) Bugfix: a segmentation fault might occur in a worker process when
   proxying WebSocket connections.

</ChangeLog>
16 Feb 2014 16:54:02
Original commit files touched by this commit  1.4.5,1
Revision:344610 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.4.4 to bugfix release 1.4.5.

<ChangeLog>

*) Bugfix: the $ssl_session_id variable contained full session
   serialized instead of just a session id.
   Thanks to Ivan Ristic.

*) Bugfix: client connections might be immediately closed if deferred
   accept was used; the bug had appeared in 1.3.15.

*) Bugfix: alerts "zero size buf in output" might appear in logs while
   proxying; the bug had appeared in 1.3.9.

*) Bugfix: a segmentation fault might occur in a worker process if the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
30 Jan 2014 10:01:52
Original commit files touched by this commit  1.4.4_3,1
Revision:341828 This port version is marked as vulnerable.
decke search for other commits by this committer
- By popular request enable HTTP_SSL option per default

With hat:	portmgr
Discussed with:	osa@ (maintainer)
21 Jan 2014 23:40:23
Original commit files touched by this commit  1.4.4_2,1
Revision:340674 This port version is marked as vulnerable.
bapt search for other commits by this committer
Fix properties on pkg-plist
17 Jan 2014 01:27:34
Original commit files touched by this commit  1.4.4_2,1
Revision:340006 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.33 to 4.0.35:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
16 Jan 2014 01:49:34
Original commit files touched by this commit  1.4.4_2,1
Revision:339882 This port version is marked as vulnerable.
vanilla search for other commits by this committer
Upgrade 3rd party modules to latest version.

echo          0.50 => 0.51
headers_more  0.24 => 0.25
drizzle       0.1.6 => 0.1.7
rtmp          1.0.8 => 1.1.2
set_misc      0.23 => 0.24
srcache       0.24 => 0.25

Approved by:	osa@
14 Jan 2014 10:45:24
Original commit files touched by this commit  1.4.4_2,1
Revision:339676 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.9.3 to 0.9.4.

Number of commits found: 661 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
apache24Dec 06
cryptoppDec 06
mod_http2-develDec 06
py-cryptography*Dec 06
qemu*Dec 06
qemu-devel*Dec 06
qemu-sbruno*Dec 06
chromiumDec 05
ImageMagickDec 04
ImageMagick-nox11Dec 04
ImageMagick7Dec 04
ImageMagick7Dec 04
ImageMagick7-nox11Dec 04
ImageMagick7-nox11Dec 04
py-pillowDec 04

35 vulnerabilities affecting 74 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 26962
Broken 313
Deprecated 177
Ignore 577
Forbidden 1
Restricted 214
No CDROM 82
Vulnerable 59
Expired 9
Set to expire 156
Interactive 0
new 24 hours 23
new 48 hours31
new 7 days79
new fortnight124
new month293

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.