FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
serf 1.3.7 www on this many watch lists=12 search for ports that depend on this port An older version of this port was marked as vulnerable.
Serf HTTP client library
Maintained by: lev@FreeBSD.org search for ports maintained by this maintainer
Port Added: 28 May 2008 21:01:38
License: APACHE20


The serf library is a C-based HTTP client library built upon the
Apache Portable Runtime (APR) library. It multiplexes connections,
running the read/write communication asynchronously. Memory copies
and transformations are kept to a minimum to provide high
performance operation.

WWW: http://code.google.com/p/serf/
SVNWeb : Main Web Site : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Required To Build:
  1. security/openssl
  2. devel/scons
Required To Run:
  1. security/openssl
Required Libraries:
  1. devel/apr1

This port is required by:

for Build for Libraries * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

To install the port: cd /usr/ports/www/serf/ && make install clean
To add the package: pkg install www/serf


Configuration Options
===> The following configuration options are available for serf-1.3.7:
     DOCS=on: Build and/or install documentation
     GSSAPI=off: GSSAPI Security API support
===> Use 'make config' to modify these settings

Master Sites:
  1. http://distcache.FreeBSD.org/ports-distfiles/
  2. http://serf.googlecode.com/svn/src_releases/

Number of commits found: 37

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
11 Aug 2014 18:58:30
Original commit files touched by this commit  1.3.7
Revision:364639
ohauer search for other commits by this committer
- update to 1.3.7

with hat apache@

Approved by:	lev@ (implicit)
MFH:		2014Q3
Security:	CVE-2014-3504
		69048656-2187-11e4-802c-20cf30e32f6d
21 Jun 2014 09:57:35
Original commit files touched by this commit  1.3.6_1
Revision:358687 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- change Maintainer from apache@ to lev@ (subversion maintainer)
  subversion(18) is the main consumer of serf, so it is better
  this ports are maintained together.

Approved by:	lev
12 Jun 2014 09:17:33
Original commit files touched by this commit  1.3.6_1
Revision:357574 This port version is marked as vulnerable.
tijl search for other commits by this committer
Bump PORTREVISION on everything that depends on devel/apr1 due to the
library version change.

Approved by:	portmgr (implicit)
10 Jun 2014 18:31:36
Original commit files touched by this commit  1.3.6
Revision:357360 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update to 1.3.6

Changelog:
 Serf 1.3.6 [2014-06-09, from /tags/1.3.6, rxxxx]
 Revert r2319 from serf 1.3.5: this change was making serf call handle_response
 multiple times in case of an error response, leading to unexpected behavior.
08 Jun 2014 16:26:52
Original commit files touched by this commit  1.3.5_1
Revision:357053 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- possible fix for all the subversion18 failures
  reported on the subversion-user list and on forums.freebsd.org
- bump PORTREVISION

PR:		ports/190757
Submitted by:	lev
Obtained from:	https://forums.freebsd.org/viewtopic.php?p=260727#p260727
27 May 2014 14:55:03
Original commit files touched by this commit  1.3.5
Revision:355529 This port version is marked as vulnerable.
bapt search for other commits by this committer
Convert to USES=scons
In this port scons refuses every argument it doesn't know about hence we cannot
completly rely on USES=scons and have to redefine do-build and do-install
28 Apr 2014 08:34:23
Original commit files touched by this commit  1.3.5
Revision:352472 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update to 1.3.5

Serf 1.3.5 [2014-04-27, from /tags/1.3.5, rxxxx]
  Fix issue #125: no reverse lookup during Negotiate authentication for proxies.
  Fix a crash caused by incorrect reuse of the ssltunnel CONNECT request (r2316)
  Cancel request if response parsing failed + authn callback set (r2319)
  Update the expired certificates in the test suite.
16 Mar 2014 16:07:59
Original commit files touched by this commit  1.3.4
Revision:348417 This port version is marked as vulnerable.
ohauer search for other commits by this committer
ports in cat www where MAINTAINER=ports

- USE_BZIP2 -> USES= tar:bzip2
- LICENSE=BSD -> BSD[n]CLAUSE
26 Feb 2014 20:59:24
Original commit files touched by this commit  1.3.4
Revision:346226 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update to version 1.3.4
- do not use USES=scons [1]
- adjust MASTER_SITES
- adopt new LIB_DEPENDS notation

[1] The upstream Scons script is terrible broken, the ports framework
    sets args unknown to the SConstruct script and every unknown arg
    breaks the script :( Unluckily I haven't found a way to strip the
    breaking args with our shiny USES=scons framework)

Changes:
Serf 1.3.4 [2014-02-08, from /tags/1.3.4, rxxxx]
  Fix issue #119: Endless loop during ssl tunnel setup with Negotiate authn
  Fix issue #123: Can't setup ssl tunnel which sends Connection close header
  Fix a race condition when initializing OpenSSL from multiple threads (r2263)
  Fix issue #138: Incorrect pkg-config file when GSSAPI isn't configured
04 Feb 2014 05:50:02
Original commit files touched by this commit  1.3.3
Revision:342486 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- Add GSSAPI support (default=off)

PR:		ports/186433
Submitted by:	Ryan Steinmetz <zi@FreeBSD.org>
02 Feb 2014 14:59:45
Original commit files touched by this commit  1.3.3
Revision:342311 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update www/serf to version 1.3.3

Changelog:
Serf 1.3.3 [2013-12-09, from /tags/1.3.3, r2242]
  Fix issue 129: Try more addresses of multihomed servers
  Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE correctly (r2225)
  Return APR_TIMEUP from poll() to enable detecting connection timeouts (r2183)

PR:		ports/186037
Submitted by:	Pedro Giffuni <giffunip@tutopia.com>
30 Dec 2013 20:55:19
Original commit files touched by this commit  1.3.2_1
Revision:338168 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- rename AL2 to APACHE20 in Mk/bsd.licenses.db.mk
- svn move Templates/Licenses/AL2 Templates/Licenses/APACHE20
- add APACHE10 and APACHE11 to Mk/bsd.licenses.db.mk
- add entry in UPDATING
- bulk change all ports AL2 => APACHE20

- math/openfst/pkg-plist: remove share/licenses/openfst-1.3.4

PR:		ports/184785
Submitted by:	ohauer
Reviewed by:	tabthorpe
Approved by:	portmgr (tabthorpe@)
09 Nov 2013 20:21:36
Original commit files touched by this commit  1.3.2_1
Revision:333335 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- add Apache2 license
- unbreak devel/subversion-static and
  devel/subversion (with STATIC=on)
  by installing a absolute minimum libserf-1.la file
- bump PORTREVISION
05 Nov 2013 21:57:17
Original commit files touched by this commit  1.3.2
Revision:332913 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update to version 1.3.2
20 Sep 2013 23:36:54
Original commit files touched by this commit  1.2.1_1
Revision:327776 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
www)
14 Aug 2013 22:35:54
Refresh Original commit files touched by this commit
Revision:324744  Sanity Test Failure
ak search for other commits by this committer
- Remove MAKE_JOBS_SAFE variable

Approved by:	portmgr (bdrewery)
06 Jul 2013 08:50:22
Original commit files touched by this commit  1.2.1_1
Revision:322369 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- remove gmake dependency
- bump PORTREVISION

PR:		ports/179933
Submitted by:	Tijl Coosemans tijl@
11 Jun 2013 22:26:36
Original commit files touched by this commit  1.2.1
Revision:320653 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update to version 1.2.1

Changelog:
Serf 1.2.1 [2013-06-03, from /tags/1.2.1]
  Fix issue 95: add gssapi switches to configure (r1864, r1900)
  Fix issue 97: skip mmap bucket if APR_HAS_MMAP is undefined (r1877)
  Fix issue 100: building against an old Windows Platform SDK (r1881)
  Fix issue 102: digest authentication failures (r1885)
  Improve error return values in SSPI authentication (r1804)
  Ensure serf-1.pc is constructed by serfmake (r1865)
  Optimize SPNego authentication processing (r1868)
  Reject certs that application does not like (r1794)
  Fix possible endless loop in serf_linebuf_fetch() (r1816)
  Windows build: dereference INTDIR in serf.mak (r1882)

PR:		ports/179274
Submitted by:	Pedro Giffuni <giffunip@tutopia.com>
19 Mar 2013 13:16:01
Original commit files touched by this commit  1.2.0
Revision:314641 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- fix pkg-plist

PR:		176759
Submitted by:	Daniel Hagerty <hag@linnaean.org>
19 Mar 2013 13:04:31
Original commit files touched by this commit  1.2.0
Revision:314640 This port version is marked as vulnerable.
eadler search for other commits by this committer
This changes almost all the "gnomehack" only USE_GNOME cases to USES= pathfix.

If a port used other USE_GNOME items it was untouched.
The ports that used other USES were fixed by hand.

PR:		ports/177081
Reviewed by:	bapt
Approved by:	portmgr (miwi)
28 Feb 2013 20:32:20
Original commit files touched by this commit  1.2.0
Revision:313125 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update to version 1.2.0

Changelog:
Serf 1.2.0 [2013-02-22, from /tags/1.2.0]
  Fixed issue 94: Serf can enter an infinite loop when server aborts conn.
  Fixed issue 91: Serf doesn't handle an incoming 408 Timeout Request
  Fixed issue 80: Serf is not handling Negotiate authentication correctly
  Fixed issue 77: Endless loop if server doesn't accept Negotiate authn
  Fixed issue 93: cleanup-after-fork interferes with parent (r1714)
  Fixed most of issue 89: Support REAL SPNEGO authentication
  Enable Negotiate/Kerberos support for proxy servers.
  Return error when C-L, chunked, gzip encoded response bodies where
    truncated (due to aborted connection) (r1688)
  Add a logging mechanism that can be enabled at compile-time.
  Don't lookup server address if a proxy was configured. (r1706)
  Fix an off-by-one in buffer sizing (r1695)
  Disable SSL compression by default + API to enable it (r1692)
  New serf_connection_get_latency() for estimated network latency (r1689)
  New error code and RFC compliance for the HTTPS tunnel (r1701, r1644)
  Handle EINTR when a user suspends and then backgrounds the app (r1708)
  Minor fixes and test suite improvements.

PR:		176404
Submitted by:	Pedro Giffuni <giffunip@tutopia.com>
04 Nov 2012 00:14:06
Original commit files touched by this commit  1.1.1
Revision:306946 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- fix serf.pc by removing wrong Requires.private statement

No version bump needed, the issue was detected in a special openoffice-3-devel
build

Noted by: Maho NAKATA <maho@apache.org> on the apache@ list

Feature safe: yes
06 Oct 2012 08:28:25
Original commit files touched by this commit  1.1.1
Revision:305344 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update serf to 1.1.1

From changelog:
Serf 1.1.1 [2012-10-04, from /tags/1.1.1]
  Fixed issue 86: ensure requeued requests are correctly handled. This fixes:
    - infinite loop with multiple connection resets or SIGPIPE errors
    - "connection" hang where we would not re-queue requests that are held after
      we re-connect
  Fixed issue 74: test_all goes in an endless loop
  Fix memory leak when conn. is closed explicitly/due to pool cleanups (r1623)
  Fix for https on Windows: handle connection aborts (r1628..-30,-33,-34,-37)
  Add new error codes for the SSL bucket

Serf 1.1.0 [2012-06-07, from /tags/1.1.0]
  New: serf_bucket_request_set_CL() for C-L based, non-chunked requests
(Only the first 15 lines of the commit message are shown above View all of this commit message)
20 Dec 2011 00:46:02
Original commit files touched by this commit  1.0.0
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
PR:             ports/163220
20 Dec 2011 00:43:56
Original commit files touched by this commit  1.0.0
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Update to 1.0.0
  http://apr.apache.org/versioning.html now applies

  note that s/serf-0/serf-1/g AND the shlib version bump.

  HOWEVER

  nothing depends on www/serf with default options
  you need WITH_SERF=yes

  HENCE

  no PORTREVISION bumps

Discussed with: portmgr (linimon) via #bsdports
With Hat:       apache
Sponsored by:   RideCharge Inc. / TaxiMagic
14 May 2011 17:24:08
Original commit files touched by this commit  0.7.2
 This port version is marked as vulnerable.
ohauer search for other commits by this committer
- update to version 0.7.2
- additional bump subversion PORTREVISION

Changes: http://code.google.com/p/serf/source/browse/trunk/CHANGES

Serf 0.7.2 [2011-03-12, branch 0.7.x r1451]
  Actually disable Nagle when creating a connection (r1441).
  Return error when app asks for HTTPS over proxy connection (r1433).

Serf 0.7.1 [2011-01-25, branch 0.7.x r1431]
  Fix memory leak when using SSL (r1408, r1416).
  Fix build for blank apr-util directory (r1421).

Serf 0.7.0 [2010-08-25, r1407]
  Fix double free abort when destroying request buckets.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
19 Mar 2011 12:38:54
Original commit files touched by this commit  0.3.1_2
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Get Rid MD5 support
18 May 2010 04:08:06
Original commit files touched by this commit  0.3.1_2
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Chase devel/apr -> devel/apr1 shuffling

PR:             ports/146553
Submitted by:   myself (pgollucci@)
With Hat:       apache@
18 May 2010 04:05:05
Original commit files touched by this commit  0.3.1_1
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Convert ports/ to devel/apr1

PR:             ports/146553
Submitted by:   myself (pgollucci@)
With Hat:       apache@
05 May 2010 21:52:39
Original commit files touched by this commit  0.3.1_1
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
4/5: Chase devel/apr shlib bump

PR:             ports/146130
Approved by:    portmgr (pav)
Tested by:      -exp run (pav)
With Hat:       apache@
05 May 2010 03:03:58
Original commit files touched by this commit  0.3.1
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Update to 0.3.1 [no shlib bump]

With Hat:   apache@
29 Apr 2010 17:30:25
Original commit files touched by this commit  0.3.0
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Assign some ports to apache@

Note: net/luasocket is a direct requirement for mod_wombat which will be
      very core to httpd 2.4.x+ (www/apache24)
16 May 2009 06:27:56
Original commit files touched by this commit  0.3.0
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Mark most of my ports MAKE_JOBS_SAFE=yes

Tested by: several builds in P6 TB
31 Jan 2009 20:56:00
Original commit files touched by this commit  0.3.0
 This port version is marked as vulnerable.
pgollucci search for other commits by this committer
- Update to 0.3.0
- Ensure apr 1.x is used
- Fix typo in comments
- Pass maintainer to submitter (me)

PR:             ports/131100
Approved by:    rodrigc via irc (previous maintainer)
04 Jul 2008 18:45:57
Original commit files touched by this commit  0.2.0
 This port version is marked as vulnerable.
rodrigc search for other commits by this committer
Update to 0.2.0

PR:             125160
Submitted by:   Philip M. Gollucci <pgollucci p6m7g8 com>
28 May 2008 21:59:02
Original commit files touched by this commit  0.1.2
 This port version is marked as vulnerable.
db search for other commits by this committer
- Fixed misplaced MKDIR
28 May 2008 21:01:11
Original commit files touched by this commit  0.1.2
 This port version is marked as vulnerable.
db search for other commits by this committer
The serf library is a C-based HTTP client library built upon the
Apache Portable Runtime (APR) library. It multiplexes connections,
running the read/write communication asynchronously. Memory copies
and transformations are kept to a minimum to provide high
performance operation.

WWW: http://serf.googlecode.com

PR:             ports/124059
Submitted by:   Craig Rodrigues <rodrigc at FreeBSD.org>

Number of commits found: 37

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
fileAug 21
py-djangoAug 21
py-django-develAug 21
py-django14Aug 21
py-django15Aug 21
php53Aug 18
phpmyadminAug 17
chromiumAug 13
serfAug 11
subversionAug 11
subversion17Aug 11
nginxAug 09
nginx-develAug 09
mingw32-opensslAug 06
opensslAug 06

8 vulnerabilities affecting 14 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24464
Broken 222
Deprecated 794
Ignore 567
Forbidden 36
Restricted 261
No CDROM 101
Vulnerable 23
Expired 0
Set to expire 789
Interactive 0
new 24 hours 4
new 48 hours8
new 7 days37
new fortnight144
new month220

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.