notbugIf you buy from Amazon USA, please support us by using this link.
Port details
nginx-devel Robust and small WWW server
1.15.7_2 www on this many watch lists=29 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 15 Jun 2007 08:23:21
Also Listed In: ipv6
License: BSD2CLAUSE
NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Homepage : PortsMon
    Pseudo-pkg-plist information, but much better, from make generate-plist
    Expand this list (78 items)
  1. /usr/local/share/licenses/nginx-devel-1.15.7_2/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.15.7_2/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.15.7_2/BSD2CLAUSE
  4. @comment @sample etc/fdfs/mod_fastdfs.conf.sample
  5. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  6. etc/nginx/koi-utf
  7. etc/nginx/koi-win
  8. @comment etc/nginx/naxsi_core.rules
  9. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  10. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  11. etc/nginx/win-utf
  12. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  13. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  14. @comment libexec/nginx/ngx_http_array_var_module.so
  15. @comment libexec/nginx/ngx_http_aws_auth_module.so
  16. @comment libexec/nginx/ngx_http_brotli_filter_module.so
  17. @comment libexec/nginx/ngx_http_brotli_static_module.so
  18. @comment libexec/nginx/ngx_http_clojure_module.so
  19. @comment libexec/nginx/ngx_ssl_ct_module.so
  20. @comment libexec/nginx/ngx_http_ssl_ct_module.so
  21. @comment libexec/nginx/ngx_http_echo_module.so
  22. @comment libexec/nginx/ngx_dynamic_upstream_module.so
  23. @comment libexec/nginx/ndk_http_module.so
  24. @comment libexec/nginx/ngx_http_encrypted_session_module.so
  25. @comment libexec/nginx/ngx_http_fastdfs_module.so
  26. @comment libexec/nginx/ngx_http_form_input_module.so
  27. @comment libexec/nginx/ngx_http_headers_more_filter_module.so
  28. @comment libexec/nginx/ngx_http_auth_digest_module.so
  29. @comment libexec/nginx/ngx_http_auth_spnego_module.so
  30. @comment libexec/nginx/ngx_http_auth_ldap_module.so
  31. @comment libexec/nginx/ngx_http_auth_pam_module.so
  32. @comment libexec/nginx/ngx_http_eval_module.so
  33. @comment libexec/nginx/ngx_http_fancyindex_module.so
  34. @comment libexec/nginx/ngx_http_geoip_module.so
  35. @comment libexec/nginx/ngx_http_geoip2_module.so
  36. @comment libexec/nginx/ngx_stream_geoip2_module.so
  37. @comment libexec/nginx/ngx_http_image_filter_module.so
  38. @comment libexec/nginx/ngx_http_perl_module.so
  39. @comment libexec/nginx/ngx_nchan_module.so
  40. @comment libexec/nginx/ngx_http_redis_module.so
  41. @comment libexec/nginx/ngx_http_tnt_module.so
  42. @comment libexec/nginx/ngx_http_upload_module.so
  43. @comment libexec/nginx/ngx_http_uploadprogress_module.so
  44. @comment libexec/nginx/ngx_http_upstream_fair_module.so
  45. @comment libexec/nginx/ngx_http_xslt_filter_module.so
  46. @comment libexec/nginx/ngx_http_iconv_module.so
  47. @comment libexec/nginx/ngx_http_lua_module.so
  48. libexec/nginx/ngx_mail_module.so
  49. @comment libexec/nginx/ngx_http_memc_module.so
  50. @comment libexec/nginx/ngx_http_naxsi_module.so
  51. @comment libexec/nginx/ngx_http_js_module.so
  52. @comment libexec/nginx/ngx_stream_js_module.so
  53. @comment libexec/nginx/ngx_http_passenger_module.so
  54. @comment libexec/nginx/ngx_http_redis2_module.so
  55. @comment libexec/nginx/ngx_rtmp_module.so
  56. @comment libexec/nginx/ngx_http_set_misc_module.so
  57. @comment libexec/nginx/ngx_http_shibboleth_module.so
  58. @comment libexec/nginx/ngx_http_small_light_module.so
  59. @comment libexec/nginx/ngx_http_srcache_filter_module.so
  60. libexec/nginx/ngx_stream_module.so
  61. @comment libexec/nginx/ngx_http_vod_module.so
  62. @postexec mkdir -p -m 755 %D/www/nginx-dist
  63. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  64. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  65. www/nginx-dist/index.html
  66. www/nginx-dist/50x.html
  67. @postexec chmod a-w %D/www/nginx-dist
  68. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  69. sbin/nginx
  70. share/vim/vimfiles/ftdetect/nginx.vim
  71. share/vim/vimfiles/ftplugin/nginx.vim
  72. share/vim/vimfiles/indent/nginx.vim
  73. share/vim/vimfiles/syntax/nginx.vim
  74. @dir /var/tmp/nginx
  75. @dir /var/log/nginx
  76. man/man8/nginx.8.gz
  77. @comment %%SITE_ARCH%%/auto/nginx/nginx.so
  78. @comment %%SITE_ARCH%%/nginx.pm
  79. Collapse this list.

To install the port: cd /usr/ports/www/nginx-devel/ && make install clean
To add the package: pkg install nginx-devel

PKGNAME: nginx-devel

distinfo:

TIMESTAMP = 1543773518
SHA256 (nginx-1.15.7.tar.gz) = 8f22ea2f6c0e0a221b6ddc02b6428a3ff708e2ad55f9361102b1c9f4142bdf93
SIZE (nginx-1.15.7.tar.gz) = 1026732
SHA256 (ngx_cache_purge-2.3.tar.gz) = 279e0d8a46d3b1521fd43b3f78bc1c08b263899142a7cc5058c1c0361a92c89c
SIZE (ngx_cache_purge-2.3.tar.gz) = 12248
SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae
SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208
SHA256 (nginx_mod_h264_streaming-2.2.7.tar.gz) = 6d974ba630cef59de1f60996c66b401264a345d25988a76037c2856cec756c19
SIZE (nginx_mod_h264_streaming-2.2.7.tar.gz) = 44012
SHA256 (ngx_http_redis-0.3.9.tar.gz) = 21f87540f0a44b23ffa5df16fb3d788bc90803b255ef14f9c26e3847a6f26f46
SIZE (ngx_http_redis-0.3.9.tar.gz) = 13051
SHA256 (ngx_http_response-0.3.tar.gz) = 0835584029f053051c624adbe33a826ab0205c9d85a02af6019e6b57607e9045
SIZE (ngx_http_response-0.3.tar.gz) = 2244
SHA256 (modsecurity-2.9.2.tar.gz) = 41a8f73476ec891f3a9e8736b98b64ea5c2105f1ce15ea57a1f05b4bf2ffaeb5
SIZE (modsecurity-2.9.2.tar.gz) = 4298993
SHA256 (passenger-6.0.0.tar.gz) = 3f826e55065bb69ff5cc945b7b8ab5eb69f957e108053d15401c2ea059321b83
SIZE (passenger-6.0.0.tar.gz) = 7202705
SHA256 (ngx_slowfs_cache-1.10.tar.gz) = 1e81453942e5b0877de1f1f06c56ae82918ea9818255cb935bcb673c95a758a1
SIZE (ngx_slowfs_cache-1.10.tar.gz) = 11809
SHA256 (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 9e3f78ea73e2d606a95ee64fd3affa4c249f9b342e66b6b11b63061791f28316
SIZE (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 109704
SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80
SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280
SHA256 (anomalizer-ngx_aws_auth-f1bcf3b_GH0.tar.gz) = e250ce159a10dfbfa0d665870436d706a2dd95c3bd72db06253ec12d1e9e19f3
SIZE (anomalizer-ngx_aws_auth-f1bcf3b_GH0.tar.gz) = 15369
SHA256 (eustas-ngx_brotli-e26248e_GH0.tar.gz) = 915d35ecbc58ceb20f8d1b9463719f9934ca24f5a5ab261f44cb8263f8c5aa0f
SIZE (eustas-ngx_brotli-e26248e_GH0.tar.gz) = 12673
SHA256 (nginx-clojure-nginx-clojure-9d35bff_GH0.tar.gz) = d0db12b13bc73c9909cbd789723782b3b6e898b1c440d893df5b704c78cd7715
SIZE (nginx-clojure-nginx-clojure-9d35bff_GH0.tar.gz) = 624402
SHA256 (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 72fdd125b9207cdda135f368095f85b943a78a4ff004d1cd217972e12b1571b2
SIZE (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 7224
SHA256 (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 88e05a99a8a7419066f5ae75966fb1efc409bad4522d14986da074554ae61619
SIZE (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 66455
SHA256 (openresty-drizzle-nginx-module-b4f94ec_GH0.tar.gz) = 68f3781c989da36a20513741321076e3a627dac8b635c9d34242376c6c8d76b4
SIZE (openresty-drizzle-nginx-module-b4f94ec_GH0.tar.gz) = 50864
SHA256 (cubicdaiya-ngx_dynamic_upstream-v0.1.6_GH0.tar.gz) = 056fcd63cab39c2f0144d6a8c3ce16e8ae2cfb6e02ad66e5972ffeeca6c6a4d3
SIZE (cubicdaiya-ngx_dynamic_upstream-v0.1.6_GH0.tar.gz) = 11015
SHA256 (openresty-echo-nginx-module-c65f5c6_GH0.tar.gz) = aea1d10d9175a6471b34d436df937b5c97e7ba1ac4b4b2582a2cb6716d7fba4b
SIZE (openresty-echo-nginx-module-c65f5c6_GH0.tar.gz) = 53121
SHA256 (openresty-encrypted-session-nginx-module-v0.08_GH0.tar.gz) = 6e526ea097c6805ec2cf1d0d3d79ed24326bc2d0babe158c29edd07d8c0d106a
SIZE (openresty-encrypted-session-nginx-module-v0.08_GH0.tar.gz) = 11802
SHA256 (happyfish100-fastdfs-nginx-module-85347be_GH0.tar.gz) = 00bbcc70bfd711cd67ca685ad5620764c54be13f95299b8a5d175cdeb10b6d3c
SIZE (happyfish100-fastdfs-nginx-module-85347be_GH0.tar.gz) = 19835
SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106
SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090
SHA256 (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = ef843824e0aac1dd60b392802861cc06426a4bc5f87d472c7ee00b1296693f2a
SIZE (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = 18883
SHA256 (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 552c54aff81c4701ace4eb1ce20c114433ee783b4b06c0105921a830c9486172
SIZE (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 53024
SHA256 (openresty-headers-more-nginx-module-55fbdab_GH0.tar.gz) = ed996dc994ba31ae071e05f12bfac6ff86ee03a2e7d4263346b919870d8135ac
SIZE (openresty-headers-more-nginx-module-55fbdab_GH0.tar.gz) = 28139
SHA256 (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 5534ca63cdfc2a7dc4e1cbf9c2d54d3ed3f0e6c86b4a95be48ec0a3f41cc1eb0
SIZE (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 3393
SHA256 (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 0839c33c2f8d519f92daae274f62cf87eb68415d562c6500ee3e3721ce80557c
SIZE (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 17815
SHA256 (stnoonan-spnego-http-auth-nginx-module-7e028a5_GH0.tar.gz) = 13f9f8ce2e815a14e43c4741af054f96b0714327d9e248dada241d4d3eaee40d
SIZE (stnoonan-spnego-http-auth-nginx-module-7e028a5_GH0.tar.gz) = 18227
SHA256 (kvspb-nginx-auth-ldap-42d195d_GH0.tar.gz) = 78d74697f89821a7ed31c6c672f6c06923bb53a681ebb203eabebb657bdafd80
SIZE (kvspb-nginx-auth-ldap-42d195d_GH0.tar.gz) = 18455
SHA256 (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 77676842919134af88a7b4bfca4470223e3a00d287d17c0dbdc9a114a685b6e7
SIZE (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 6863
SHA256 (arut-nginx-dav-ext-module-v0.1.0_GH0.tar.gz) = 6b004eed8ea16ad8de4d304027bf0413cc323a95914e58625a7dc066481aae3a
SIZE (arut-nginx-dav-ext-module-v0.1.0_GH0.tar.gz) = 6614
SHA256 (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 014bedb2b334ba8e8e23b4c660590357f8055dbed7b9b017e4cc2937876a8822
SIZE (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 14849
SHA256 (aperezdc-ngx-fancyindex-v0.4.3_GH0.tar.gz) = 81698fb0c1ec9f906ce308c055d5d248085caf390f4b92516c1ec93f87c886d4
SIZE (aperezdc-ngx-fancyindex-v0.4.3_GH0.tar.gz) = 25274
SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813
SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934
SHA256 (leev-ngx_http_geoip2_module-3.2_GH0.tar.gz) = 15bd1005228cf2c869a6f09e8c41a6aaa6846e4936c473106786ae8ac860fab7
SIZE (leev-ngx_http_geoip2_module-3.2_GH0.tar.gz) = 8465
SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997
SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736
SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885
SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343
SHA256 (slact-nchan-v1.2.3_GH0.tar.gz) = ea44d9f33115db4737abe611e63e3f734fa18cb11d998354b093a40eb7a8e6be
SIZE (slact-nchan-v1.2.3_GH0.tar.gz) = 669479
SHA256 (wandenberg-nginx-push-stream-module-0.5.4_GH0.tar.gz) = 5253bb8a804ea679e514137a234637298f044c3ef63c053670bf3802ff3535b1
SIZE (wandenberg-nginx-push-stream-module-0.5.4_GH0.tar.gz) = 183493
SHA256 (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = ed4ddbcf0c434f4a1e97b61251a63ace759792764bd5cb79ff20efe348db8db3
SIZE (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = 92230
SHA256 (tarantool-nginx_upstream_module-4ca8684_GH0.tar.gz) = e1ce39052f2df4972dc7ce827a3ff774660586955c5894cf38997c6f687d8fa4
SIZE (tarantool-nginx_upstream_module-4ca8684_GH0.tar.gz) = 59005
SHA256 (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = c6d4e38ad0712c898cc53721f492f8f73acf2753cc0a0769fa34d4d6ba4e8efd
SIZE (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = 28303
SHA256 (masterzen-nginx-upload-progress-module-afb2d31_GH0.tar.gz) = 6318851cc3a624aaad3b1f4cd9f51f79c86575c53dfe0c28bbdcf9470b6a33e6
SIZE (masterzen-nginx-upload-progress-module-afb2d31_GH0.tar.gz) = 17269
SHA256 (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 4404c64e845e19feeb07a37976347987892a8e8680a961f793ff0d3ef96c07f4
SIZE (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 130039
SHA256 (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 93f71b7cf0db9c6dbf97e3ee11cf8efbc149946c0949d7abd19c74c7620eea50
SIZE (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 10433
SHA256 (thomsonreuters-nginx-sticky-module-ng-0d58565_GH0.tar.gz) = 85c178046de8036ce6339d69c1c12f470c1d9aa797b45d3151118dbe9b8fe2a5
SIZE (thomsonreuters-nginx-sticky-module-ng-0d58565_GH0.tar.gz) = 120608
SHA256 (wandenberg-nginx-video-thumbextractor-module-0.9.0_GH0.tar.gz) = 6ad7d12b3f7b65ec8e7f3e0f471463929967cb76ff1a81b35a5a34b33604f3cb
SIZE (wandenberg-nginx-video-thumbextractor-module-0.9.0_GH0.tar.gz) = 2709894
SHA256 (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 0d780e6fef91814fbaa577c9f7cfb7b78f6898e50c34d63f3c5d101eb45afd44
SIZE (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 26125
SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462
SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133
SHA256 (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = cbf6fcddc00a7e30289134bdeace12565e000cc7d4efee2d2ebb8799d0b88270
SIZE (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = 20534
SHA256 (openresty-lua-nginx-module-v0.10.13_GH0.tar.gz) = ecea8c3d7f69dd48c6132498ddefb5d83ba9f387fa3d4da14e2abeacdfc8a3ee
SIZE (openresty-lua-nginx-module-v0.10.13_GH0.tar.gz) = 624102
SHA256 (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 8c2bdbe875e4f5225d0778bfb09a2668f9281d7de6218c7b462a7ba2cee06fe8
SIZE (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 34654
SHA256 (SpiderLabs-ModSecurity-nginx-4cde86b_GH0.tar.gz) = d56e12955d933a39c7573ebc327e0aed32fdcc40cc39770a612b9a584b3f1705
SIZE (SpiderLabs-ModSecurity-nginx-4cde86b_GH0.tar.gz) = 26453
SHA256 (nbs-system-naxsi-0.56_GH0.tar.gz) = 0a66dcadd32432460fab180be9f2efe24e911e3798917b2787ee710e02901eb4
SIZE (nbs-system-naxsi-0.56_GH0.tar.gz) = 192120
SHA256 (nginx-njs-ca2bcd2_GH0.tar.gz) = 7ab07dd5a95aad3f1c25a7599aae7a277979b9ec96bba95a557ef8f2caa482fc
SIZE (nginx-njs-ca2bcd2_GH0.tar.gz) = 284764
SHA256 (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = c942e674a7273ab87caab4dcad626ab54852be192c29b1add50d2cb535e3cbb9
SIZE (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = 40742
SHA256 (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 896be99c0cad50218417800a159e43ec088d6b58c099472ed3b3d7f179d6c0ea
SIZE (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 20531
SHA256 (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = eaf18f60e981ea2442a7902689a26eba6cf6f36ebee712feeb1f4429eb654bdc
SIZE (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = 34744
SHA256 (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = d255571bcfb9939b78099df39cb4d42f174d789aec8c8e5e47b93942b0299438
SIZE (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = 25471
SHA256 (arut-nginx-rtmp-module-v1.2.1_GH0.tar.gz) = 87aa597400b0b5a05274ee2d23d8cb8224e12686227a0abe31d783b3a645ea37
SIZE (arut-nginx-rtmp-module-v1.2.1_GH0.tar.gz) = 519919
SHA256 (openresty-set-misc-nginx-module-cda7e50_GH0.tar.gz) = 6fb2c99d4aecdd0335f55493b0dd4170efa46b0014a4c2e41f2ea519b633aca2
SIZE (openresty-set-misc-nginx-module-cda7e50_GH0.tar.gz) = 29291
SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955
SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504
SHA256 (nginx-shib-nginx-http-shibboleth-f07bf3c_GH0.tar.gz) = db0c244fbd553846539e4020c5131e2c99700cddc0e5664aac0b807733607b05
SIZE (nginx-shib-nginx-http-shibboleth-f07bf3c_GH0.tar.gz) = 22177
SHA256 (cubicdaiya-ngx_small_light-v0.9.2_GH0.tar.gz) = 4cf660651d11330a13aab29eb1722bf792d7c3c42e2919a36a1957c4ed0f1533
SIZE (cubicdaiya-ngx_small_light-v0.9.2_GH0.tar.gz) = 56502
SHA256 (openresty-srcache-nginx-module-v0.31_GH0.tar.gz) = 3f9729e73a8340926fa9d9fc15707c2f287cd27b6a9fe42e83f660ca48a5972d
SIZE (openresty-srcache-nginx-module-v0.31_GH0.tar.gz) = 48310
SHA256 (kaltura-nginx-vod-module-1.23_GH0.tar.gz) = 800cf3de639567e27f4cb75527392f23842b349fb680abefd12d4db9a5be951f
SIZE (kaltura-nginx-vod-module-1.23_GH0.tar.gz) = 442053
SHA256 (vozlt-nginx-module-vts-v0.1.18_GH0.tar.gz) = 17ea41d4083f6d1ab1ab83dad9160eeca66867abe16c5a0421f85a39d7c84b65
SIZE (vozlt-nginx-module-vts-v0.1.18_GH0.tar.gz) = 380327
SHA256 (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 958bd8de773601d8d3138501cc4be0420f1c818a3987a70cc9c0023371e432cf
SIZE (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 11477


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Library dependencies:
  1. libpcre.so : devel/pcre
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for nginx-devel-1.15.7_2:
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     DSO=on: Enable dynamic modules support
     FILE_AIO=on: Enable file aio
     IPV6=on: Enable IPv6 support
     THREADS=on: Enable threads support
     WWW=on: Enable html sample files
====> Modules that require MAIL module
     MAIL=on: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=on: Enable mail_ssl module
====> Modules that require HTTP module
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=on: Enable http_addition module
     HTTP_AUTH_REQ=on: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=on: Enable http_webdav module
     HTTP_FLV=on: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module
     HTTP_GZIP_STATIC=on: Enable http_gzip_static module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_MP4=on: Enable http_mp4 module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=on: Enable http_random_index module
     HTTP_REALIP=on: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=on: Enable http_secure_link module
     HTTP_SLICE=on: Enable http_slice module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=on: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     HTTPV2=on: Enable HTTP/2 protocol support (SSL req.)
     STREAM=on: Enable stream module
     STREAM_SSL=on: Enable stream_ssl module (SSL req.)
     STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.)
     AJP=off: 3rd party ajp module
     AWS_AUTH=off: 3rd party aws auth module
     BROTLI=off: 3rd party brotli module
     CACHE_PURGE=off: 3rd party cache_purge module
     CLOJURE=off: 3rd party clojure module
     CT=off: 3rd party cert_transparency module (SSL req.)
     DEVEL_KIT=off: 3rd party Nginx Development Kit module
     ARRAYVAR=off: 3rd party array_var module
     DRIZZLE=off: 3rd party drizzle module
     DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module
     ECHO=off: 3rd party echo module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FASTDFS=off: 3rd party fastdfs module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_GEOIP2=off: 3rd party geoip2 module
     HTTP_JSON_STATUS=off: 3rd party http_json_status module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_TARANTOOL=off: 3rd party tarantool upstream module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module
     HTTP_ZIP=off: 3rd party http_zip module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     MODSECURITY3=off: 3rd party modsecurity3 module
     NAXSI=off: 3rd party naxsi module
     NJS=off: Enable http_javascript module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgres module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SHIBBOLETH=off: 3rd party shibboleth module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SMALL_LIGHT=off: 3rd party small_light module
     SRCACHE=off: 3rd party srcache module
     VOD=off: 3rd party vod module
     VTS=off: 3rd party vts module
     XSS=off: 3rd party xss module
====> GSSAPI implementation (imply HTTP_AUTH_KRB5): you can only select none or one of them
     GSSAPI_BASE=off: GSSAPI support via base system (needs Kerberos)
     GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal
     GSSAPI_MIT=off: GSSAPI support via security/krb5
===> Use 'make config' to modify these settings

USES:
cpe ssl ssl

Conflicts:
  • CONFLICTS:
    • nginx-1.*
    • nginx-full-1.*
    • nginx-lite-1.*
    • nginx-naxsi-1.*
  • CONFLICTS_INSTALL:
    • nginx
Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2016-09-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx now creates logs under /var/log/nginx/ and changes default log
      names from "nginx-access.log" and "nginx-error.log" to "access.log" and
      "error.log" respectively.  This is important for the error log because
      the location is encoded and touched by nginx during startup regardless
      of the configured location for the error log.
    
      See http://trac.nginx.org/nginx/ticket/147 for additional information
      on why this happens.
    
    
  • 2016-02-29
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      The ${MODULESDIR}, default directory for dynamic modules, has been
      changed from ${ETCDIR}/modules to ${PREFIX}/libexec/${PORTNAME}.
      It's highly recommended to review existing configuration files of
      nginx, i.e. ${PREFIX}/etc/nginx/nginx.conf.
    
    
  • 2016-02-17
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_dynamic_upstream_module.so";
      load_module "modules/ngx_http_small_light_module.so";
    
    
  • 2016-02-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_http_echo_module.so";
      load_module "modules/ngx_http_headers_more_filter_module.so";
      load_module "modules/ngx_http_eval_module.so";
      load_module "modules/ngx_http_lua_module.so";
      load_module "modules/ngx_http_set_misc_module.so";
    
    
  • 2016-02-13
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled.  In case of usage following
      modules please update nginx configuration file for load these modules:
    
      load_module "modules/ngx_http_geoip_module.so";
      load_module "modules/ngx_http_image_filter_module.so";
      load_module "modules/ngx_http_xslt_filter_module.so";
      load_module "modules/ngx_mail_module.so";
      load_module "modules/ngx_stream_module.so";
    
      See https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ for details.
    
    
  • 2011-09-28
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Note: 1.1.4 release introduces several API changes which may affect
      third-party modules.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 856 (showing only 100 on this page)

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
02 Dec 2018 18:18:14
Original commit files touched by this commit  1.15.7_2
Revision:486475
osa search for other commits by this committer
Upgrade passenger and its third-party modules for www/nginx and
www/nginx-devel from 5.3.7 to 6.0.0.

<ChangeLog>

* Introduces support for *all* programming languages. Yes that's
  right... Java, Elixir, Go -- Passenger now supports them all!
  This effort is called "generic language support".
* Bumps the preferred Nginx version to 1.15.7.
* Introduces anonymous usage telemetry, which helps us improve
  Passenger.  Please read the docs on what data is collected and
  how to disable this.
* [Nginx] Introduces a new option "passenger_request_buffering on|off",
  to allow disabling request body buffering. This is only supported in
  Nginx >= 1.15.3. Closes GH-2121.
* Updated various library versions used in precompiled binaries (used
  for e.g. gem installs):
  - OpenSSL: 1.0.2q (was: 1.0.2p)
  - libcurl: 7.62.0 (was: 7.61.1)
  - Ruby: 2.3.8 (was: 2.3.7)

</ChangeLog>
28 Nov 2018 00:00:03
Original commit files touched by this commit  1.15.7_1
Revision:486073
osa search for other commits by this committer
Update passenger and it's modules for www/nginx and
www/nginx-devel ports to 5.3.7.
27 Nov 2018 22:56:17
Original commit files touched by this commit  1.15.7
Revision:486071
osa search for other commits by this committer
Update from 1.15.6 to 1.15.7.
Update clojure and njs third-party modules to their recent versions.

MFH:		2018Q4

<ChangeLog>

*) Feature: the "proxy_requests" directive in the stream module.

*) Feature: the "delay" parameter of the "limit_req" directive.
   Thanks to Vladislav Shabanov and Peter Shchuchkin.

*) Bugfix: memory leak on errors during reconfiguration.

*) Bugfix: in the $upstream_response_time, $upstream_connect_time, and
   $upstream_header_time variables.

*) Bugfix: a segmentation fault might occur in a worker process if the
   ngx_http_mp4_module was used on 32-bit platforms.

</ChangeLog>
27 Nov 2018 14:28:49
Original commit files touched by this commit  1.15.6_2
Revision:486012
des search for other commits by this committer
Rename www/mod_security3 to security/modsecurity3.  It is not an Apache
module, and the upstream name is ModSecurity in a single word.

PR:		233351
Submitted by:	Marie Helene Kvello-Aune, Marius Halden (maintainer)
Differential Revision:	https://reviews.freebsd.org/D18353
15 Nov 2018 00:24:08
Original commit files touched by this commit  1.15.6_1
Revision:484977
osa search for other commits by this committer
Change the distribution for the third-party upstream_fair module,
it contains fixes for openssl 1.1.
Remove the needless patch.

Bump PORTREVISION.
10 Nov 2018 19:57:08
Original commit files touched by this commit  1.15.6
Revision:484640
kwm search for other commits by this committer
Update ImageMagick to 6.9.10.14 [1]

* Add PKGNAMESUFFIX and rename the directory. This was done to show
  that IM6 is not the "main" version. But still fully supported by upstream.
* Convert a number of options to optionhelpers.
* Add option for ISO/IEC 23008-12:2017 HEIF suport
* Add comment to pkg-descr explaining IM6's "legacy" tag.
* Add comment to the patch-config_policy.xml file why it still needed.

Please note that IM7 is not a drop in replacement due to library API and
command arguments changes. And as a result ports need to decide for themself
which version to use.

Chase these changes in all the ports that using IM6.

PR:		225102 (based on, only the version update) [1]
Submitted by:	Pascal Christen <pascal.christen@hostpoint.ch>
06 Nov 2018 20:35:12
Original commit files touched by this commit  1.15.6
Revision:484324
osa search for other commits by this committer
Security update from 1.15.5 to 1.15.6.

Temporary disable third-party upstream_fair module, it should
be updated to build with the modern version of the nginx.

While I'm here fix some whitespaces.

MFH:		2018Q4
Security:	84ca56be-e1de-11e8-bcfd-00e04c1ea73d

<ChangeLog>

*) Security: when using HTTP/2 a client might cause excessive memory
   consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844).
(Only the first 15 lines of the commit message are shown above View all of this commit message)
06 Nov 2018 01:50:27
Original commit files touched by this commit  1.15.5_5
Revision:484273 This port version is marked as vulnerable.
jbeich search for other commits by this committer
multimedia/ffmpeg: update to 4.1

Changes:	https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n4.1:/Changelog
ABI:		https://abi-laboratory.pro/tracker/timeline/ffmpeg/
02 Nov 2018 13:32:35
Original commit files touched by this commit  1.15.5_4
Revision:483807 This port version is marked as vulnerable.
rene search for other commits by this committer
Remove compatibility code for FreeBSD < 11.2 from all ports.

Simplify some ports where DragonFlyBSD no longer needs to be special-cased.
Submitted by:	rene
Reviewed by:	bapt, jbeich
Differential Revision:	https://reviews.freebsd.org/D17724
30 Oct 2018 00:29:10
Original commit files touched by this commit  1.15.5_4
Revision:483438 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules to their recent versions.
Fix modsecurity's URL.

Bump PORTREVISION.
21 Oct 2018 17:49:22
Original commit files touched by this commit  1.15.5_3
Revision:482715 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix the build issue with STREAM_SSL_PREREAD knob.
Bump PORTREVISION.

PR:	232361
07 Oct 2018 14:48:22
Original commit files touched by this commit  1.15.5_2
Revision:481447 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party nchan (aka push) module from 1.1.14
to its recent stable version 1.2.1.

Bump PORTREVISION.
06 Oct 2018 17:55:27
Original commit files touched by this commit  1.15.5_1
Revision:481379 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party vts module from 0.1.15 to 0.1.18.
Bump PORTREVISION.
06 Oct 2018 17:44:23
Original commit files touched by this commit  1.15.5
Revision:481378 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.15.4 to 1.15.5.

<ChangeLog>

*) Bugfix: a segmentation fault might occur in a worker process when
   using OpenSSL 1.1.0h or newer; the bug had appeared in 1.15.4.

*) Bugfix: of minor potential bugs.

</ChangeLog>
25 Sep 2018 20:37:35
Original commit files touched by this commit  1.15.4
Revision:480696 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.15.3 to 1.15.4.

<ChangeLog>

*) Feature: now the "ssl_early_data" directive can be used with OpenSSL.

*) Bugfix: in the ngx_http_uwsgi_module.
   Thanks to Chris Caputo.

*) Bugfix: connections with some gRPC backends might not be cached when
   using the "keepalive" directive.

*) Bugfix: a socket leak might occur when using the "error_page"
   directive to redirect early request processing errors, notably errors
   with code 400.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
25 Sep 2018 09:56:02
Original commit files touched by this commit  1.15.3_2
Revision:480657 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade www/passenger and its third-party modules for
www/nginx and www/nginx-devel from 5.3.4 to 5.3.5.
Bump PORTREVISIONs where it's necessary.
18 Sep 2018 21:56:19
Original commit files touched by this commit  1.15.3_1
Revision:480081 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 0.2.3 to 0.2.4.

<ChangeLog>

nginx modules:

*) Change: stream module handlers are refactored.

   New methods and properties:
   s.on(), s.off(), s.allow(), s.done(), s.decline(),
   s.deny().

   Removed properties of Stream object:
   s.OK, s.ABORT, s.AGAIN, s.DECLINED, s.ERROR (replaced
   with s.allow(), s.done([code]), s.deny()).
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Sep 2018 02:13:18
Original commit files touched by this commit  1.15.3
Revision:479498 This port version is marked as vulnerable.
osa search for other commits by this committer
Merge r479404 from www/nginx.

<Commitlog>

Some modules depend on other being there before.

For example, devel_kit needs to be there before a few other, so this
fixes, and allow for future fixes of this kind of problem:

configuring additional dynamic modules
adding module in
/wrkdirs/usr/ports/www/nginx-full/work/array-var-nginx-module-0.05
error: ngx_devel_kit is required to build ngx_array_var; please put it before
ngx_array_var.

PR:		230864
Submitted by:	mat
exp-runs by:	antoine

</Commitlog>
28 Aug 2018 22:04:02
Original commit files touched by this commit  1.15.3
Revision:478331 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.15.2 to 1.15.3.

<ChangeLog>

*) Feature: now TLSv1.3 can be used with BoringSSL.

*) Feature: the "ssl_early_data" directive, currently available with
   BoringSSL.

*) Feature: the "keepalive_timeout" and "keepalive_requests" directives
   in the "upstream" block.

*) Bugfix: the ngx_http_dav_module did not truncate destination file
   when copying a file over an existing one with the COPY method.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
05 Aug 2018 16:45:51
Original commit files touched by this commit  1.15.2_3
Revision:476419 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade passenger and its third-party modules for www/nginx and
www/nginx-devel from 5.3.3 to 5.3.4.

PR:	229392

<ChangeLog>

* Fixes a crash during startup on FreeBSD 11.2 and recent OpenBSD versions
  due to C++11 compatibility issues in the code. Closes GH-2097.
* Updates Boost to version 1.67.0.
* [Apache] Fixes the handling of HTTP requests with chunked bodies in
  combination with `PassengerBufferUploads off`. Closes GH-2102.

</ChangeLog>
01 Aug 2018 07:37:23
Original commit files touched by this commit  1.15.2_2
Revision:476160 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module to post 0.2.3 aka a930e69 to
fix a couple of issues.
Bump PORTREVISION.
01 Aug 2018 06:51:44
Original commit files touched by this commit  1.15.2_1
Revision:476158 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module to 950db73 aka 0.2.3.
Bump PORTREVISION.

<ChangeLog>

nginx modules:

*) Bugfix: making a subrequest from a Reply object caused
    a segmentation fault.

*) Bugfix: getting the parent property of the main Request
    object caused a segmentation fault.

Core:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
25 Jul 2018 03:39:04
Original commit files touched by this commit  1.15.2
Revision:475294 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.15.1 to 1.15.2.

<ChangeLog>

*) Feature: the $ssl_preread_protocol variable in the
   ngx_stream_ssl_preread_module.

*) Feature: now when using the "reset_timedout_connection" directive
   nginx will reset connections being closed with the 444 code.

*) Change: a logging level of the "http request", "https proxy request",
   "unsupported protocol", and "version too low" SSL errors has been
   lowered from "crit" to "info".

*) Bugfix: DNS requests were not resent if initial sending of a request
(Only the first 15 lines of the commit message are shown above View all of this commit message)
17 Jul 2018 04:34:50
Original commit files touched by this commit  1.15.1_2
Revision:474774 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party naxsi module from 0.55.3 to 0.56.

Bump PORTREVISION.
17 Jul 2018 04:15:27
Original commit files touched by this commit  1.15.1_1
Revision:474773 This port version is marked as vulnerable.
osa search for other commits by this committer
Change location for third-party sticky module from bitbucket.org
to a fork on GH cause last one contains additional fixes.
Remove needless patch.

Bump PORTREVISION.
03 Jul 2018 23:22:35
Original commit files touched by this commit  1.15.1
Revision:473857 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.15.0 to 1.15.1.

<ChangeLog>

*) Feature: the "random" directive inside the "upstream" block.

*) Feature: improved performance when using the "hash" and "ip_hash"
   directives with the "zone" directive.

*) Feature: the "reuseport" parameter of the "listen" directive now uses
   SO_REUSEPORT_LB on FreeBSD 12.

*) Bugfix: HTTP/2 server push did not work if SSL was terminated by a
   proxy server in front of nginx.

*) Bugfix: the "tcp_nopush" directive was always used on backend
   connections.

*) Bugfix: sending a disk-buffered request body to a gRPC backend might
   fail.

</ChangeLog>
03 Jul 2018 23:15:03
Original commit files touched by this commit  1.15.0_4
Revision:473856 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade passenger and its third-party modules for www/nginx
and www/nginx-devel from 5.3.2 to 5.3.3.
25 Jun 2018 20:40:08
Original commit files touched by this commit  1.15.0_3
Revision:473338 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party brotli module to its recent revision to
fix the socket leaks issue, please see next link for details:
https://github.com/eustas/ngx_brotli/issues/11

Bump PORTREVISION.
24 Jun 2018 16:03:41
Original commit files touched by this commit  1.15.0_2
Revision:473206 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade passenger and its third-party modules for
www/nginx and www/nginx-devel from 5.3.1 to 5.3.2.
24 Jun 2018 15:55:47
Original commit files touched by this commit  1.15.0_1
Revision:473204 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module to b4a58c4 (aka 0.2.2).
07 Jun 2018 00:36:12
Original commit files touched by this commit  1.15.0
Revision:471893 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from stable 1.14.0 release to recent release
from mainline - 1.15.0.

<ChangeLog>

*) Change: the "ssl" directive is deprecated; the "ssl" parameter of the
   "listen" directive should be used instead.

*) Change: now nginx detects missing SSL certificates during
   configuration testing when using the "ssl" parameter of the "listen"
   directive.

*) Feature: now the stream module can handle multiple incoming UDP
   datagrams from a client within a single session.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
15 May 2018 11:18:08
Original commit files touched by this commit  1.14.0_8
Revision:470011 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade to recent bugfix release 5.3.1.
15 May 2018 01:56:12
Original commit files touched by this commit  1.14.0_7
Revision:469987 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party redis module to recent 0.3.9 version.

Bump PORTREVISION.

<ChangeLog>

*) Feature: redis "AUTH" command support.
   Original idea from https://github.com/Yongke/ngx_http_redis-0.3.7
   Thanks to Wang Yongke.

</ChangeLog>
13 May 2018 15:04:51
Original commit files touched by this commit  1.14.0_6
Revision:469801 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party passenger module from 5.2.3 to 5.3.0.

While I'm here fix the issue with GSSAPIINCDIR variable, it's
been introduced as GSSAPINCDIR without a correct substitution
during the third-party auth_krb5 module's patch time.

Bump PORTREVISION.
13 May 2018 14:24:20
Original commit files touched by this commit  1.14.0_5
Revision:469797 This port version is marked as vulnerable.
osa search for other commits by this committer
Speed-up the port's build by enable multiple jobs build.

While I'm here update third-party vod module to recent 1.23 version.

Bump PORTREVISION.

PR:	228127
02 May 2018 15:07:27
Original commit files touched by this commit  1.14.0_4
Revision:468844 This port version is marked as vulnerable.
jbeich search for other commits by this committer
multimedia/ffmpeg: update to 4.0

- FFSERVER support was removed upstream
- libressl now uses libtls backend instead of patching openssl one
- Clang i386 no longer uses 16-byte aligned stack

Changes:	https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n4.0:/Changelog
ABI:		https://abi-laboratory.pro/tracker/timeline/ffmpeg/
PR:		227726
Exp-run by:	antoine
Differential Revision:	https://reviews.freebsd.org/D15175
26 Apr 2018 22:11:26
Original commit files touched by this commit  1.14.0_3
Revision:468388 This port version is marked as vulnerable.
osa search for other commits by this committer
Cleanup Makefile.extmod file.
Upgrade third-party modules to their recent versions.

Bump PORTREVISION.
24 Apr 2018 22:29:18
Original commit files touched by this commit  1.14.0_2
Revision:468248 This port version is marked as vulnerable.
osa search for other commits by this committer
Merge from www/nginx and adopt next revisions:
	468201, 468240.

Update third-party modules to their recent versions.
Enable libxml usage for third-party vod module.

Bump PORTREVISION.
23 Apr 2018 00:33:54
Original commit files touched by this commit  1.14.0_1
Revision:468068 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove the needless patch.
22 Apr 2018 21:35:52
Original commit files touched by this commit  1.14.0_1
Revision:468061 This port version is marked as vulnerable.
osa search for other commits by this committer
Merge from www/nginx and adopt next revisions:
	465814, 465851, 465931, 468031.

Bump PORTREVISION.
17 Apr 2018 23:19:32
Original commit files touched by this commit  1.14.0
Revision:467662 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.12 to 1.14.0.

<ChangeLog>

*) 1.14.x stable branch.

</ChangeLog>
11 Apr 2018 23:45:27
Original commit files touched by this commit  1.13.12
Revision:467118 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.11 to 1.13.12.

While I'm here add back modsecurity3 distinfo records.

<ChangeLog>

*) Bugfix: connections with gRPC backends might be closed unexpectedly
   when returning a large response.

</ChangeLog>
08 Apr 2018 21:11:08
Original commit files touched by this commit  1.13.11
Revision:466832 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.10 to 1.13.11.

While I'm here upgrade next third-party modules to their
recent version:
o) passenger;
o) njs.

<ChangeLog>

*) Feature: the "proxy_protocol" parameter of the "listen" directive now
   supports the PROXY protocol version 2.

*) Bugfix: nginx could not be built with OpenSSL 1.1.1 statically on
   Linux.

*) Bugfix: in the "http_404", "http_500", etc. parameters of the
   "proxy_next_upstream" directive.

</ChangeLog>
22 Mar 2018 23:53:55
Original commit files touched by this commit  1.13.10
Revision:465328 This port version is marked as vulnerable.
osa search for other commits by this committer
Add modsecurity v3 distinfo entries.

PR:	226848
21 Mar 2018 23:13:57
Original commit files touched by this commit  1.13.10
Revision:465248 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.9 to 1.13.10.
Upgrade third-party modules to their recent version.

<ChangeLog>

*) Feature: the "set" parameter of the "include" SSI directive now
   allows writing arbitrary responses to a variable; the
   "subrequest_output_buffer_size" directive defines maximum response
   size.

*) Feature: now nginx uses clock_gettime(CLOCK_MONOTONIC) if available,
   to avoid timeouts being incorrectly triggered on system time changes.

*) Feature: the "escape=none" parameter of the "log_format" directive.
   Thanks to Johannes Baiter and Calin Don.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Mar 2018 17:38:46
Original commit files touched by this commit  1.13.9
Revision:464189 This port version is marked as vulnerable.
brnrd search for other commits by this committer
Migrate USE_APACHE to USES= apache (category www)

 - Following migration of Mk/bsd.apache.mk to Mk/Uses/apache.mk

With hat:	apache
21 Feb 2018 03:47:53
Original commit files touched by this commit  1.13.9
Revision:462474 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.8 to 1.13.9.
Upgrade third-party modules to their recent version.
Remove needless patches.

<ChangeLog>

*) Feature: HTTP/2 server push support; the "http2_push" and
   "http2_push_preload" directives.

*) Bugfix: "header already sent" alerts might appear in logs when using
   cache; the bug had appeared in 1.9.13.

*) Bugfix: a segmentation fault might occur in a worker process if the
   "ssl_verify_client" directive was used and no SSL certificate was
   specified in a virtual server.

*) Bugfix: in the ngx_http_v2_module.

*) Bugfix: in the ngx_http_dav_module.

</ChangeLog>
05 Jan 2018 20:03:34
Original commit files touched by this commit  1.13.8
Revision:458168 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.7 to 1.13.8.

While I'm here remove needless patch.

<ChangeLog>

*) Feature: now nginx automatically preserves the CAP_NET_RAW capability
   in worker processes when using the "transparent" parameter of the
   "proxy_bind", "fastcgi_bind", "memcached_bind", "scgi_bind", and
   "uwsgi_bind" directives.

*) Feature: improved CPU cache line size detection.
   Thanks to Debayan Ghosh.

*) Feature: new directives in vim syntax highlighting scripts.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
15 Dec 2017 00:56:39
Original commit files touched by this commit  1.13.7_3
Revision:456378 This port version is marked as vulnerable.
osa search for other commits by this committer
Use @postexec keyword instead of deprecated @exec one in pkg-plist.
Bump PORTREVISION.

While I'm here upgrade third-party fancyindex module to the latest
version - 0.4.2.
05 Dec 2017 03:49:20
Original commit files touched by this commit  1.13.7_2
Revision:455565 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party vts (virtual host traffic status) module.

Suggested by:	"Eugene M. Zheganin" <emz@norma.perm.ru>
05 Dec 2017 03:17:30
Original commit files touched by this commit  1.13.7_2
Revision:455563 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade next third-party modules to their recent versions:
o) njs;
o) echo;
o) lua;
o) nchan;
o) redis2;
o) srcache;
o) tarantul;
o) vod.

Remove needless patches cause most of them have been added to their
upstreams.
05 Dec 2017 02:09:22
Original commit files touched by this commit  1.13.7_2
Revision:455560 This port version is marked as vulnerable.
osa search for other commits by this committer
Switch to fork that uses new brotli ABI.

Thanks to:	Evgenii Kliuchnikov <eustas@google.com>

PR:		224000

While I'm here add CONFLICTS_INSTALL and PORTSCOUNT.
Bump PORTREVISION.
29 Nov 2017 00:43:23
Original commit files touched by this commit  1.13.7_1
Revision:455088 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 5.1.11 to 5.1.12:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
26 Nov 2017 02:14:19
Original commit files touched by this commit  1.13.7_1
Revision:454901 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.6 to 1.13.7.

<ChangeLog>

*) Bugfix: in the $upstream_status variable.

*) Bugfix: a segmentation fault might occur in a worker process if a
   backend returned a "101 Switching Protocols" response to a
   subrequest.

*) Bugfix: a segmentation fault occurred in a master process if a shared
   memory zone size was changed during a reconfiguration and the
   reconfiguration failed.

*) Bugfix: in the ngx_http_fastcgi_module.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
21 Oct 2017 06:50:50
Original commit files touched by this commit  1.13.6_1
Revision:452570 This port version is marked as vulnerable.
jbeich search for other commits by this committer
multimedia/ffmpeg: update to 3.4

Notable changes:
- i386/amd64 now depend on NASM per
https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/4f9297ac3b39
- NETCDF is now MYSOFA but the dependency doesn't exist in ports yet
- SCHROEDINGER is gone per
https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/220b24c7c9
- DRM, LIBRSVG2, LIBXML2 are new options
- ABI isn't completely compatible: some structs have changed

Minor cleanup:
- Don't pass --disable-{in,out}dev when it's already blocked by disabled
dependency
- Drop redundant "Enable" from option descriptions
- Switch CDIO_DESC to use Mk/bsd.options.desc.mk

Changes:	https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n3.4:/Changelog
ABI:		https://abi-laboratory.pro/tracker/timeline/ffmpeg/
PR:		223057
Exp-run by:	antoine
18 Oct 2017 16:58:39
Original commit files touched by this commit  1.13.6
Revision:452356 This port version is marked as vulnerable.
osa search for other commits by this committer
Security (*) upgrade from 5.1.8 to 5.1.11:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx-devel;

MFH:	2017Q4

See
details:	https://blog.phusion.nl/2017/10/13/passenger-security-advisory-5-1-11/
12 Oct 2017 15:57:51
Original commit files touched by this commit  1.13.6
Revision:451901 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove WANT_GNOME and HAVE_GNOME.

Approved by:	bapt kwm
Sponsored by:	Absolight
Differential Revision:	  https://reviews.freebsd.org/D12643
11 Oct 2017 02:34:40
Original commit files touched by this commit  1.13.6
Revision:451726 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.5 to 1.13.6.

<ChangeLog>

*) Bugfix: switching to the next upstream server in the stream module
   did not work when using the "ssl_preread" directive.

*) Bugfix: in the ngx_http_v2_module.
   Thanks to Piotr Sikora.

*) Bugfix: nginx did not support dates after the year 2038 on 32-bit
   platforms with 64-bit time_t.

*) Bugfix: in handling of dates prior to the year 1970 and after the
   year 10000.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
23 Sep 2017 20:34:20
Original commit files touched by this commit  1.13.5
Revision:450471 This port version is marked as vulnerable.
osa search for other commits by this committer
Do the port clean-up:

o) replace `!empty(PORT_OPTIONS:M...)' with `${PORT_OPTIONS:M...}';
o) http_accesskey was removed in r439844, cleanup it.

Do not bump PORTREVISION.

PR:	222338
07 Sep 2017 21:15:16
Original commit files touched by this commit  1.13.5
Revision:449429 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.1.5 to 5.1.8:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx;       (*)
o) third-party passenger module for www/nginx-devel.

Approved by:	joneum (maintainer) (*)
07 Sep 2017 18:12:35
Original commit files touched by this commit  1.13.5
Revision:449411 This port version is marked as vulnerable.
joneum search for other commits by this committer
- www/nginx-devel: Update from 1.13.4 to 1.13.5
- Changelog:
    *) Feature: the $ssl_client_escaped_cert variable.

    *) Bugfix: the "ssl_session_ticket_key" directive and the "include"
       parameter of the "geo" directive did not work on Windows.

    *) Bugfix: incorrect response length was returned on 32-bit platforms
       when requesting more than 4 gigabytes with multiple ranges.

    *) Bugfix: the "expires modified" directive and processing of the
       "If-Range" request header line did not use the response last
       modification time if proxying without caching was used.

Approved by:	osa (maintainer)
Approved by:	tz (mentor)
Differential Revision:	https://reviews.freebsd.org/D12247
06 Sep 2017 20:08:12
Original commit files touched by this commit  1.13.4
Revision:449373 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from 0.1.10 to post-0.1.13.

Do not bump PORTREVISION.
11 Aug 2017 08:07:34
Original commit files touched by this commit  1.13.4
Revision:447740 This port version is marked as vulnerable.
joneum search for other commits by this committer
- www/nginx-devel: Update from 1.13.3 to 1.13.4
- pet Portlint

- Changelog:
  *) Feature: the ngx_http_mirror_module.

  *) Bugfix: client connections might be dropped during configuration
       testing when using the "reuseport" parameter of the "listen"
       directive on Linux.

  *) Bugfix: request body might not be available in subrequests if it was
       saved to a file and proxying was used.

  *) Bugfix: cleaning cache based on the "max_size" parameter did not work
       on Windows.

  *) Bugfix: any shared memory allocation required 4096 bytes on Windows.

  *) Bugfix: nginx worker might be terminated abnormally when using the
       "zone" directive inside the "upstream" block on Windows.

Approved by:	osa (maintainer)
Approved by:	miwi (mentor)
MFH:		2017Q3
Differential Revision:	https://reviews.freebsd.org/D11951
13 Jul 2017 11:17:36
Original commit files touched by this commit  1.13.3
Revision:445646 This port version is marked as vulnerable.
osa search for other commits by this committer
Updade third-party ngx_brotli module to recent version, update
dependences.

No cookie for:	brnrd
12 Jul 2017 00:21:05
Original commit files touched by this commit  1.13.3
Revision:445556 This port version is marked as vulnerable.
osa search for other commits by this committer
Security upgrade to 1.13.3.

MFH:		2017Q3
Security:	CVE-2017-7529
04 Jul 2017 15:44:05
Original commit files touched by this commit  1.13.2
Revision:445025 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party clojure module from 0.4.4 to 0.4.5.
04 Jul 2017 15:37:06
Original commit files touched by this commit  1.13.2
Revision:445024 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 5.1.4 to 5.1.5:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
01 Jul 2017 14:29:39
Original commit files touched by this commit  1.13.2
Revision:444824 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.1 to 1.13.2.

<ChangeLog>

*) Change: nginx now returns 200 instead of 416 when a range starting
   with 0 is requested from an empty file.

*) Feature: the "add_trailer" directive.
   Thanks to Piotr Sikora.

*) Bugfix: nginx could not be built on Cygwin and NetBSD; the bug had
   appeared in 1.13.0.

*) Bugfix: nginx could not be built under MSYS2 / MinGW 64-bit.
   Thanks to Orgad Shaneh.

*) Bugfix: a segmentation fault might occur in a worker process when
   using SSI with many includes and proxy_pass with variables.

*) Bugfix: in the ngx_http_v2_module.
   Thanks to Piotr Sikora.

</ChangeLog>
09 Jun 2017 23:58:55
Original commit files touched by this commit  1.13.1
Revision:443047 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party vod module.

Requsted by:	Alexander Ushakov <alexander@tauruna.ru>
31 May 2017 01:35:21
Original commit files touched by this commit  1.13.1
Revision:442132 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove the legacy third-party module checksums.

Do not bump PORTREVISION.
31 May 2017 01:29:46
Original commit files touched by this commit  1.13.1
Revision:442131 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.0 to 1.13.1.

<ChangeLog>

*) Feature: now a hostname can be used as the "set_real_ip_from"
   directive parameter.

*) Feature: vim syntax highlighting scripts improvements.

*) Feature: the "worker_cpu_affinity" directive now works on DragonFly
   BSD.
   Thanks to Sepherosa Ziehau.

*) Bugfix: SSL renegotiation on backend connections did not work when
   using OpenSSL before 1.1.0.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
21 May 2017 19:05:01
Original commit files touched by this commit  1.13.0_3
Revision:441422 This port version is marked as vulnerable.
osa search for other commits by this committer
A customer has reported about an issue when unable to load a dynamic
module because of wrong order of those modules in the default confi-
guration file, so remove the auto generation of the load modules list.

Bump PORTREVISION.
13 May 2017 20:34:50
Original commit files touched by this commit  1.13.0_2
Revision:440855 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.1.3 to 5.1.4:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
11 May 2017 21:22:28
Original commit files touched by this commit  1.13.0_2
Revision:440668 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix the build when libressl defined.
Bump PORTREVISION.

Reported by:	many
03 May 2017 22:33:19
Original commit files touched by this commit  1.13.0_1
Revision:440065 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party http_auth_pam module from 1.2 to 1.5.1.
Change upstream to github.
It's possible to build the module as dynamic now.

Do not bump PORTREVISION.
03 May 2017 22:16:25
Original commit files touched by this commit  1.13.0_1
Revision:440064 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party auth_digest module from cc61b4a to 519dc2a,
it's possible to build it as dynamic module.

Do not bump PORTREVISION.
03 May 2017 22:03:09
Original commit files touched by this commit  1.13.0_1
Revision:440062 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party memc module from 0.17 to 0.18.
Remove the needless patch (incorporated into upstream).

Do not bump PORTREVISION.
03 May 2017 21:36:42
Original commit files touched by this commit  1.13.0_1
Revision:440047 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.1.2 to 5.1.3:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
01 May 2017 23:30:03
Original commit files touched by this commit  1.13.0_1
Revision:439916 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix third-party lua-nginx module build with LibreSSL.

While I'm here clean-up distinfo from the checksums of legacy
third-party modules.

Do not bump PORTREVISION.

PR:	218595
30 Apr 2017 20:56:09
Original commit files touched by this commit  1.13.0_1
Revision:439844 This port version is marked as vulnerable.
osa search for other commits by this committer
Add IPV6 support knob back.

Remove obsolete third-party modules:

o) http_accesskey;
o) xrid_header. (*)

Bump PORTREVISION.

PR:	218956 (*)
25 Apr 2017 23:30:58
Original commit files touched by this commit  1.13.0
Revision:439422 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.12.0 to latest "mainline" 1.13.0.

<ChangeLog>

*) Change: SSL renegotiation is now allowed on backend connections.

*) Feature: the "rcvbuf" and "sndbuf" parameters of the "listen"
   directives of the mail proxy and stream modules.

*) Feature: the "return" and "error_page" directives can now be used to
   return 308 redirections.
   Thanks to Simon Leblanc.

*) Feature: the "TLSv1.3" parameter of the "ssl_protocols" directive.

*) Feature: when logging signals nginx now logs PID of the process which
   sent the signal.

*) Bugfix: in memory allocation error handling.

*) Bugfix: if a server in the stream module listened on a wildcard
   address, the source address of a response UDP datagram could differ
   from the original datagram destination address.

</ChangeLog>
16 Apr 2017 13:25:41
Original commit files touched by this commit  1.12.0
Revision:438659 This port version is marked as vulnerable.
osa search for other commits by this committer
Move the patches for third-party lua module to lua code block.
Do not bump PORTREVISION.

PR:	218683
15 Apr 2017 17:39:36
Original commit files touched by this commit  1.12.0
Revision:438592 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove IPV6 knob, IPv6 now compiled-in automatically if support is found.

Upgrade third-party upload module, enable it back.
Upgrade third-party http_auth_krb5 module to 0c6ff3f.
Upgrade third-party njs module to 0.1.10.
15 Apr 2017 16:09:01
Original commit files touched by this commit  1.12.0
Revision:438589 This port version is marked as vulnerable.
osa search for other commits by this committer
Enable third_party mod_zip module back by changing upstream.
Do not bump PORTREVISION.
15 Apr 2017 15:55:19
Original commit files touched by this commit  1.12.0
Revision:438588 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.10 to 1.12.0.

ChangeLog:	http://nginx.org/en/CHANGES-1.12

Also, remove third-party modules:
o) udplog
o) statsd

Upgrade third-party modules:
o) lua to 0.10.8
o) upstream_fair to b5be36f (upstream has been changed)

Please see this comment in case of the production use of the lua module:
https://github.com/openresty/lua-nginx-module/pull/1017#issuecomment-294076002

Patches obtained from:
o)
https://github.com/openresty/lua-nginx-module/commit/0459a285ca0159d45e73da8bd1164edb5c57cde3
o)
https://github.com/SpiderLabs/ModSecurity/pull/1373/commits/d19df159043106a4d6dfd113696900b5b0dae24b
21 Feb 2017 00:41:18
Original commit files touched by this commit  1.11.10
Revision:434493 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.9 to 1.11.10.

<ChangeLog>

*) Change: cache header format has been changed, previously cached
   responses will be invalidated.

*) Feature: support of "stale-while-revalidate" and "stale-if-error"
   extensions in the "Cache-Control" backend response header line.

*) Feature: the "proxy_cache_background_update",
   "fastcgi_cache_background_update", "scgi_cache_background_update",
   and "uwsgi_cache_background_update" directives.

*) Feature: nginx is now able to cache responses with the "Vary" header
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Feb 2017 03:30:07
Original commit files touched by this commit  1.11.9_1
Revision:434065 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) fancyindex from 0.3.6 to 0.4.1;
o) encrypted-session from 0.05 to 0.06.
11 Feb 2017 22:46:59
Original commit files touched by this commit  1.11.9_1
Revision:433920 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.30 to 5.1.2:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
05 Feb 2017 21:20:24
Original commit files touched by this commit  1.11.9_1
Revision:433456 This port version is marked as vulnerable.
tijl search for other commits by this committer
- Remove inclusion of bsd.default-versions.mk from ftp/curl/Makefile so
  bsd.default-versions.mk can rely on ARCH being defined.
- In bsd.port.mk move inclusion of bsd.default-versions.mk from the
  pre-makefile section to the options section so the variables can be used
  earlier.  Also put the bit of code sitting between the options section and
  the pre-makefile section into the options section.
- Remove last few cases where ports set WITH_OPENSSL_PORT.  This variable is
  handled in bsd.default-versions.mk and some ports were setting it after
  including bsd.port.options.mk.  After FreeBSD 9 EoL all but a few ports,
  and then only when setting non-default options, work without setting that
  variable.

PR:		215996
Exp-run by:	antoine
Approved by:	portmgr (antoine)
01 Feb 2017 23:22:34
Original commit files touched by this commit  1.11.9
Revision:433118 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from f8c642a (0.1.6+) to f106743 (aka 0.1.9).
01 Feb 2017 23:09:29
Original commit files touched by this commit  1.11.9
Revision:433117 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party ct module from f3cad5e (aka 1.2.0) to 1.3.2.
01 Feb 2017 01:02:06
Original commit files touched by this commit  1.11.9
Revision:432963 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.8 to 1.11.9.

<ChangeLog>

*) Bugfix: nginx might hog CPU when using the stream module; the bug had
   appeared in 1.11.5.

*) Bugfix: EXTERNAL authentication mechanism in mail proxy was accepted
   even if it was not enabled in the configuration.

*) Bugfix: a segmentation fault might occur in a worker process if the
   "ssl_verify_client" directive of the stream module was used.

*) Bugfix: the "ssl_verify_client" directive of the stream module might
   not work.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
01 Feb 2017 00:54:32
Original commit files touched by this commit  1.11.8
Revision:432961 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.10.6 to 0.10.7.
12 Jan 2017 17:06:11
Original commit files touched by this commit  1.11.8
Revision:431290 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Always check OPSYS along with OSVERSION

Approved by:	portmgr blanket
10 Jan 2017 23:16:34
Original commit files touched by this commit  1.11.8
Revision:431141 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.7 to 1.11.8.

<ChangeLog>

*) Feature: the "absolute_redirect" directive.

*) Feature: the "escape" parameter of the "log_format" directive.

*) Feature: client SSL certificates verification in the stream module.

*) Feature: the "ssl_session_ticket_key" directive supports AES256
   encryption of TLS session tickets when used with 80-byte keys.

*) Feature: vim-commentary support in vim scripts.
   Thanks to Armin Grodon.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
18 Dec 2016 16:56:18
Original commit files touched by this commit  1.11.7
Revision:428880 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.6 to 1.11.7.
Upgrade njs module from 8c01042 to f8c642a.

<ChangeLog>

*) Change: now in case of a client certificate verification error the
   $ssl_client_verify variable contains a string with the failure
   reason, for example, "FAILED:certificate has expired".

*) Feature: the $ssl_ciphers, $ssl_curves, $ssl_client_v_start,
   $ssl_client_v_end, and $ssl_client_v_remain variables.

*) Feature: the "volatile" parameter of the "map" directive.

*) Bugfix: dependencies specified for a module were ignored while
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Dec 2016 15:22:47
Original commit files touched by this commit  1.11.6_3
Revision:428352 This port version is marked as vulnerable.
jbeich search for other commits by this committer
multimedia/ffmpeg: update to 3.2.2

Changes:	https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n3.2.2:/Changelog
PR:		207547
Submitted by:	riggs, ebirth@b0ss.net (libressl fix)
Exp-run by:	antoine (3 tries)
10 Dec 2016 18:45:04
Original commit files touched by this commit  1.11.6_2
Revision:428313 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix the build issues when:
o) the drizzle module can't find the libdrizzle headers;
o) the geoip2 can't find the libmaxminddb.

Do not bump PORTREVISION, those third-party modules are disabled by default.
06 Dec 2016 01:49:32
Original commit files touched by this commit  1.11.6_2
Revision:427927 This port version is marked as vulnerable.
osa search for other commits by this committer
Add and enable vendor's stream_ssl_preread module.
Bump PORTREVISION.

PR:	213661
03 Dec 2016 15:52:40
Original commit files touched by this commit  1.11.6_1
Revision:427624 This port version is marked as vulnerable.
robak search for other commits by this committer
www/nginx-devel: make the port slave friendly and update CONFLICTS

Approved by:	osa

Number of commits found: 856 (showing only 100 on this page)

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
wordpressDec 15
wordpressDec 15
wordpressDec 15
wordpressDec 15
wordpressDec 15
gitlab-ceDec 14
mbedtlsDec 14
typo3-8Dec 14
phpmyadminDec 12
firefoxDec 11
firefox-esrDec 11
libxulDec 11
linux-firefoxDec 11
linux-seamonkeyDec 11
linux-thunderbirdDec 11

14 vulnerabilities affecting 198 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2018-12-15 15:04:36


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 36159
Broken 125
Deprecated 1116
Ignore 383
Forbidden 3
Restricted 162
No CDROM 74
Vulnerable 36
Expired 5
Set to expire 1089
Interactive 0
new 24 hours 9
new 48 hours11
new 7 days48
new fortnight97
new month165

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2018 Dan Langille. All rights reserved.