FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

We also have a status page: https://freshports.wordpress.com/

Port details
nginx-devel Robust and small WWW server
1.13.6_1 www on this many watch lists=29 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 15 Jun 2007 08:23:21
Also Listed In: ipv6
License: BSD2CLAUSE
NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Homepage : PortsMon
    Pseudo-pkg-plist information, but much better, from make generate-plist
    Expand this list (22 items)
  1. /usr/local/share/licenses/nginx-devel-1.13.6_1/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.13.6_1/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.13.6_1/BSD2CLAUSE
  4. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  5. etc/nginx/koi-utf
  6. etc/nginx/koi-win
  7. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  8. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  9. etc/nginx/win-utf
  10. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  11. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  12. @exec mkdir -p -m 755 %D/www/nginx-dist
  13. @exec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  14. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  15. www/nginx-dist/index.html
  16. www/nginx-dist/50x.html
  17. @exec chmod a-w %D/www/nginx-dist
  18. @unexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  19. sbin/nginx
  20. @dir /var/tmp/nginx
  21. @dir /var/log/nginx
  22. man/man8/nginx.8.gz
  23. Collapse this list.

To install the port: cd /usr/ports/www/nginx-devel/ && make install clean
To add the package: pkg install nginx-devel

PKGNAME: nginx-devel

distinfo:

TIMESTAMP = 1508201592
SHA256 (nginx-1.13.6.tar.gz) = 8512fc6f986a20af293b61f33b0e72f64a72ea5b1acbcc790c4c4e2d6f63f8f8
SIZE (nginx-1.13.6.tar.gz) = 989760
SHA256 (ngx_cache_purge-2.3.tar.gz) = 279e0d8a46d3b1521fd43b3f78bc1c08b263899142a7cc5058c1c0361a92c89c
SIZE (ngx_cache_purge-2.3.tar.gz) = 12248
SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae
SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208
SHA256 (nginx_mod_h264_streaming-2.2.7.tar.gz) = 6d974ba630cef59de1f60996c66b401264a345d25988a76037c2856cec756c19
SIZE (nginx_mod_h264_streaming-2.2.7.tar.gz) = 44012
SHA256 (ngx_http_redis-0.3.8.tar.gz) = 95d0ed7be40da2efc88883d72e52e5e272d2c34463583b7078e8fd6d55004934
SIZE (ngx_http_redis-0.3.8.tar.gz) = 12342
SHA256 (ngx_http_response-0.3.tar.gz) = 0835584029f053051c624adbe33a826ab0205c9d85a02af6019e6b57607e9045
SIZE (ngx_http_response-0.3.tar.gz) = 2244
SHA256 (08a395c66e42.tar.gz) = 53e440737ed1aff1f09fae150219a45f16add0c8d6e84546cb7d80f73ebffd90
SIZE (08a395c66e42.tar.gz) = 120603
SHA256 (modsecurity-2.9.1.tar.gz) = 958cc5a7a7430f93fac0fd6f8b9aa92fc1801efce0cda797d6029d44080a9b24
SIZE (modsecurity-2.9.1.tar.gz) = 4261212
SHA256 (passenger-5.1.11.tar.gz) = 26fc56b2f6d27ed58b948d9601a17a4f61e98fd16349bcb46f3ecebcac3177dd
SIZE (passenger-5.1.11.tar.gz) = 4243340
SHA256 (ngx_slowfs_cache-1.10.tar.gz) = 1e81453942e5b0877de1f1f06c56ae82918ea9818255cb935bcb673c95a758a1
SIZE (ngx_slowfs_cache-1.10.tar.gz) = 11809
SHA256 (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 5534ca63cdfc2a7dc4e1cbf9c2d54d3ed3f0e6c86b4a95be48ec0a3f41cc1eb0
SIZE (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 3393
SHA256 (atomx-nginx-http-auth-digest-519dc2a_GH0.tar.gz) = 6ef8c81267cbb2f912fa3add846fddaaab06d604155de322dad83912410adafc
SIZE (atomx-nginx-http-auth-digest-519dc2a_GH0.tar.gz) = 17778
SHA256 (stnoonan-spnego-http-auth-nginx-module-0c6ff3f_GH0.tar.gz) = 3d3fed1e19a532cdd2a37726953f2b2d4e20891a44119ff6075a6b5891324d2d
SIZE (stnoonan-spnego-http-auth-nginx-module-0c6ff3f_GH0.tar.gz) = 18212
SHA256 (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 0ec4f099e50cc12a6319e37700e71540498d354831d1f09e113ee046ee0bb7b2
SIZE (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 17001
SHA256 (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 77676842919134af88a7b4bfca4470223e3a00d287d17c0dbdc9a114a685b6e7
SIZE (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 6863
SHA256 (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 9e3f78ea73e2d606a95ee64fd3affa4c249f9b342e66b6b11b63061791f28316
SIZE (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 109704
SHA256 (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = db7ceef4ae22cf5bfaf5abae64830dfeef203ca85f9f40f7d1f1d90f277478c0
SIZE (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = 8260
SHA256 (nginx-clojure-nginx-clojure-v0.4.5_GH0.tar.gz) = c6d500f935dde5f87a6eb47ca473094a8ee2c9b4bb4578c9f99ccdc70a12d59e
SIZE (nginx-clojure-nginx-clojure-v0.4.5_GH0.tar.gz) = 602064
SHA256 (grahamedgecombe-nginx-ct-v1.3.2_GH0.tar.gz) = b4ceae549b9dbf84b2e511633982e4efeee0388e3b7a038a8bac555008a77b88
SIZE (grahamedgecombe-nginx-ct-v1.3.2_GH0.tar.gz) = 6844
SHA256 (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 00d42a5f562a0be5570110d9b70c8f2cace93b292421a6f994cf4ec76a8979f0
SIZE (openresty-echo-nginx-module-46334b3_GH0.tar.gz) = 52766
SHA256 (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 58daa08a5ab9b9de5459817fc088230f4092fb818b87a2cb61b217952a5af54d
SIZE (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 17980
SHA256 (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = d3442be9058682ed0ad1d294ab27effcb245c0a320fcf418c452dc923f714531
SIZE (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = 27951
SHA256 (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = d428a0236c933779cb40ac8c91afb19d5c25a376dc3caab825bfd543e1ee530d
SIZE (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = 6260
SHA256 (openresty-nginx-eval-module-342c812_GH0.tar.gz) = c45f6438474593f0cf5229160327d20c2f2d72e9c0b5c8cf9e0ef8d5295de177
SIZE (openresty-nginx-eval-module-342c812_GH0.tar.gz) = 14183
SHA256 (aperezdc-ngx-fancyindex-v0.4.1_GH0.tar.gz) = 2b00d8e0ad2a67152a9cee7b7ee67990c742d501412df912baaf1eee9bb6dc71
SIZE (aperezdc-ngx-fancyindex-v0.4.1_GH0.tar.gz) = 21130
SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813
SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934
SHA256 (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = ebb4652c4f9a2e1ee31fddefc4c93ff78e651a4b2727d3453d026bccbd708d99
SIZE (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = 6766
SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997
SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736
SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885
SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343
SHA256 (slact-nchan-v0.99.16_GH0.tar.gz) = 200cc1b02931a067c3edb07243a7faac80265ce6aab37af680cf7373011efc41
SIZE (slact-nchan-v0.99.16_GH0.tar.gz) = 378626
SHA256 (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = a95f31e80120fd7324795b92a0d94c0b43e1265df7fd0f1eba11a337c1e0a626
SIZE (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = 175263
SHA256 (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = ed4ddbcf0c434f4a1e97b61251a63ace759792764bd5cb79ff20efe348db8db3
SIZE (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = 92230
SHA256 (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 34d51afcd464582e6011a5d3abe6829c5690ddb9b50c993dfdafb4c725a4803a
SIZE (tarantool-nginx_upstream_module-1278ee5_GH0.tar.gz) = 48378
SHA256 (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = c6d4e38ad0712c898cc53721f492f8f73acf2753cc0a0769fa34d4d6ba4e8efd
SIZE (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = 28303
SHA256 (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 93e29b9b437a2e34713de54c2861ea51151624aca09f73f9f44d1caaff01a6b1
SIZE (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 16990
SHA256 (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 52e6acd8c0264a59c5c948271015a59acd3cbcf91377456b7c8dc6f9feecef4a
SIZE (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 128281
SHA256 (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = e765afcaab6cd1601e914039a8d00ab18eb6fe01180c58e0e4e098bc5b4d8233
SIZE (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = 10174
SHA256 (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 382bb41fa739f471fdab9fbabc5384d8ec7f25b5bb0c45c153f5cc01d428abe2
SIZE (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 2709351
SHA256 (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 0d780e6fef91814fbaa577c9f7cfb7b78f6898e50c34d63f3c5d101eb45afd44
SIZE (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 26125
SHA256 (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = aafb79d87273eec023025333c34d6d0108026a1ce2e09b20a53e8e2d9bf65080
SIZE (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = 59024
SHA256 (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = bf60cf196c86193376d11f8c7a3826994b24a48bb36943bab8a25af6e776af3b
SIZE (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = 10921
SHA256 (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 88e05a99a8a7419066f5ae75966fb1efc409bad4522d14986da074554ae61619
SIZE (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 66455
SHA256 (openresty-encrypted-session-nginx-module-v0.06_GH0.tar.gz) = fa6537c406cee1dc7acd6152d16dba4581d53587860a0642f1b0f7c817ee006d
SIZE (openresty-encrypted-session-nginx-module-v0.06_GH0.tar.gz) = 11128
SHA256 (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = ef843824e0aac1dd60b392802861cc06426a4bc5f87d472c7ee00b1296693f2a
SIZE (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = 18883
SHA256 (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 552c54aff81c4701ace4eb1ce20c114433ee783b4b06c0105921a830c9486172
SIZE (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 53024
SHA256 (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = cbf6fcddc00a7e30289134bdeace12565e000cc7d4efee2d2ebb8799d0b88270
SIZE (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = 20534
SHA256 (openresty-lua-nginx-module-v0.10.8_GH0.tar.gz) = d67449c71051b3cc2d6dd60df0ae0d21fca08aa19c9b30c5b95ee21ff38ef8dd
SIZE (openresty-lua-nginx-module-v0.10.8_GH0.tar.gz) = 606643
SHA256 (openresty-memc-nginx-module-v0.18_GH0.tar.gz) = 4e280d1dcb8b312bc7875604c1e35b17879279126d3d5fbf482aa9cc7c11276d
SIZE (openresty-memc-nginx-module-v0.18_GH0.tar.gz) = 37113
SHA256 (nbs-system-naxsi-0.54_GH0.tar.gz) = 9cc2c09405bc71f78ef26a8b6d70afcea3fccbe8125df70cb0cfc480133daba5
SIZE (nbs-system-naxsi-0.54_GH0.tar.gz) = 163809
SHA256 (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = c942e674a7273ab87caab4dcad626ab54852be192c29b1add50d2cb535e3cbb9
SIZE (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = 40742
SHA256 (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = b204909c6fb194fe8fed7627a3733bc9598f64251dc04a5b6a5bbd612e925324
SIZE (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = 19444
SHA256 (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 99aedf222a9664484918392988cce41b1a6238240d42f8bd44f5ff102c05c36c
SIZE (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 33496
SHA256 (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = baf5274c815a5f27854747df09ff5bcd6d82e0baa2f224a9db6450d2f3a35a4f
SIZE (openresty-redis2-nginx-module-v0.12_GH0.tar.gz) = 28981
SHA256 (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = de5866111a5b18c9dfb1c10f3a0e84b56af77f7005a41807368f7769b8a50965
SIZE (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = 519647
SHA256 (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 5f32c484b29b9047dfa65fd3eec511c0f7c65f0f3ec0a4e0453359cf4642d405
SIZE (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 29340
SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955
SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504
SHA256 (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = c25f284bc934f59a267d319385a3e11858efef786c84b49a77d09e7f5274bbf1
SIZE (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = 16688
SHA256 (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 8f513d6d3df32c3b05327d40e16efd020532a911d3eeca8015eb6271f2d4fd1c
SIZE (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 55918
SHA256 (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = e34b1ab5f5007661f73819f9c20fd6c2a46ed3e53364e9449b02ef2bd3628633
SIZE (openresty-srcache-nginx-module-v0.30_GH0.tar.gz) = 58777
SHA256 (kaltura-nginx-vod-module-1.18_GH0.tar.gz) = cba0673725f66279671d9dc0ac7bea6ea78cf963ce1b6582320d10a857a818d3
SIZE (kaltura-nginx-vod-module-1.18_GH0.tar.gz) = 388548
SHA256 (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 958bd8de773601d8d3138501cc4be0420f1c818a3987a70cc9c0023371e432cf
SIZE (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 11477
SHA256 (nginx-njs-bd40aea_GH0.tar.gz) = 0fea9022d79db2b74d2da1b44f6366a3c60fe47475b77a80c506ef02ad976151
SIZE (nginx-njs-bd40aea_GH0.tar.gz) = 203897
SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80
SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280
SHA256 (google-ngx_brotli-12529813_GH0.tar.gz) = 788b25c4a3285b34d06e48a469fd0d0cb52d43b43edccd2935e22802dcfd2d69
SIZE (google-ngx_brotli-12529813_GH0.tar.gz) = 10448
SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106
SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090
SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462
SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Library dependencies:
  1. libpcre.so : devel/pcre
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for nginx-devel-1.13.6_1:
     DSO=on: Enable dynamic modules support
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     FILE_AIO=on: Enable file aio
     IPV6=on: Enable IPv6 support
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=on: Enable http_addition module
     HTTP_AUTH_REQ=on: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=on: Enable http_webdav module
     HTTP_FLV=on: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GZIP_STATIC=on: Enable http_gzip_static module
     HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_MP4=on: Enable http_mp4 module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=on: Enable http_random_index module
     HTTP_REALIP=on: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=on: Enable http_secure_link module
     HTTP_SLICE=on: Enable http_slice module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=on: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     MAIL=on: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=on: Enable mail_ssl module
     HTTPV2=on: Enable HTTP/2 protocol support (SSL req.)
     NJS=off: Enable http_javascript module
     STREAM=on: Enable stream module
     STREAM_SSL=on: Enable stream_ssl module (SSL req.)
     STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.)
     THREADS=on: Enable threads support
     WWW=on: Enable html sample files
     AJP=off: 3rd party ajp module
     AWS_AUTH=off: 3rd party aws auth module
     CACHE_PURGE=off: 3rd party cache_purge module
     CLOJURE=off: 3rd party clojure module
     CT=off: 3rd party cert_transparency module (SSL req.)
     ECHO=off: 3rd party echo module
     FASTDFS=off: 3rd party fastdfs module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_GEOIP2=off: 3rd party geoip2 module
     HTTP_JSON_STATUS=off: 3rd party http_json_status module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_TARANTOOL=off: 3rd party tarantool upstream module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module
     HTTP_ZIP=off: 3rd party http_zip module
     ARRAYVAR=off: 3rd party array_var module
     BROTLI=off: 3rd party brotli module
     DRIZZLE=off: 3rd party drizzlie module
     DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     NAXSI=off: 3rd party naxsi module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgres module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SHIBBOLETH=off: 3rd party shibboleth module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SMALL_LIGHT=off: 3rd party small_light module
     SRCACHE=off: 3rd party srcache module
     VOD=off: 3rd party vod module
     X11=off: graphics/ImageMagick[-nox11] dependency
     XSS=off: 3rd party xss module
===> Use 'make config' to modify these settings

USES:
cpe ssl

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2016-09-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx now creates logs under /var/log/nginx/ and changes default log
      names from "nginx-access.log" and "nginx-error.log" to "access.log" and
      "error.log" respectively.  This is important for the error log because
      the location is encoded and touched by nginx during startup regardless
      of the configured location for the error log.
    
      See http://trac.nginx.org/nginx/ticket/147 for additional information
      on why this happens.
    
    
  • 2016-02-29
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      The ${MODULESDIR}, default directory for dynamic modules, has been
      changed from ${ETCDIR}/modules to ${PREFIX}/libexec/${PORTNAME}.
      It's highly recommended to review existing configuration files of
      nginx, i.e. ${PREFIX}/etc/nginx/nginx.conf.
    
    
  • 2016-02-17
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_dynamic_upstream_module.so";
      load_module "modules/ngx_http_small_light_module.so";
    
    
  • 2016-02-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_http_echo_module.so";
      load_module "modules/ngx_http_headers_more_filter_module.so";
      load_module "modules/ngx_http_eval_module.so";
      load_module "modules/ngx_http_lua_module.so";
      load_module "modules/ngx_http_set_misc_module.so";
    
    
  • 2016-02-13
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled.  In case of usage following
      modules please update nginx configuration file for load these modules:
    
      load_module "modules/ngx_http_geoip_module.so";
      load_module "modules/ngx_http_image_filter_module.so";
      load_module "modules/ngx_http_xslt_filter_module.so";
      load_module "modules/ngx_mail_module.so";
      load_module "modules/ngx_stream_module.so";
    
      See https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ for details.
    
    
  • 2011-09-28
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Note: 1.1.4 release introduces several API changes which may affect
      third-party modules.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 802 (showing only 100 on this page)

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
21 Oct 2017 06:50:50
Original commit files touched by this commit  1.13.6_1
Revision:452570
jbeich search for other commits by this committer
multimedia/ffmpeg: update to 3.4

Notable changes:
- i386/amd64 now depend on NASM per
https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/4f9297ac3b39
- NETCDF is now MYSOFA but the dependency doesn't exist in ports yet
- SCHROEDINGER is gone per
https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/220b24c7c9
- DRM, LIBRSVG2, LIBXML2 are new options
- ABI isn't completely compatible: some structs have changed

Minor cleanup:
- Don't pass --disable-{in,out}dev when it's already blocked by disabled
dependency
- Drop redundant "Enable" from option descriptions
- Switch CDIO_DESC to use Mk/bsd.options.desc.mk

Changes:	https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n3.4:/Changelog
ABI:		https://abi-laboratory.pro/tracker/timeline/ffmpeg/
PR:		223057
Exp-run by:	antoine
18 Oct 2017 16:58:39
Original commit files touched by this commit  1.13.6
Revision:452356
osa search for other commits by this committer
Security (*) upgrade from 5.1.8 to 5.1.11:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx-devel;

MFH:	2017Q4

See
details:	https://blog.phusion.nl/2017/10/13/passenger-security-advisory-5-1-11/
12 Oct 2017 15:57:51
Original commit files touched by this commit  1.13.6
Revision:451901
mat search for other commits by this committer
Remove WANT_GNOME and HAVE_GNOME.

Approved by:	bapt kwm
Sponsored by:	Absolight
Differential Revision:	  https://reviews.freebsd.org/D12643
11 Oct 2017 02:34:40
Original commit files touched by this commit  1.13.6
Revision:451726
osa search for other commits by this committer
Upgrade from 1.13.5 to 1.13.6.

<ChangeLog>

*) Bugfix: switching to the next upstream server in the stream module
   did not work when using the "ssl_preread" directive.

*) Bugfix: in the ngx_http_v2_module.
   Thanks to Piotr Sikora.

*) Bugfix: nginx did not support dates after the year 2038 on 32-bit
   platforms with 64-bit time_t.

*) Bugfix: in handling of dates prior to the year 1970 and after the
   year 10000.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
23 Sep 2017 20:34:20
Original commit files touched by this commit  1.13.5
Revision:450471
osa search for other commits by this committer
Do the port clean-up:

o) replace `!empty(PORT_OPTIONS:M...)' with `${PORT_OPTIONS:M...}';
o) http_accesskey was removed in r439844, cleanup it.

Do not bump PORTREVISION.

PR:	222338
07 Sep 2017 21:15:16
Original commit files touched by this commit  1.13.5
Revision:449429
osa search for other commits by this committer
Upgrade from 5.1.5 to 5.1.8:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx;       (*)
o) third-party passenger module for www/nginx-devel.

Approved by:	joneum (maintainer) (*)
07 Sep 2017 18:12:35
Original commit files touched by this commit  1.13.5
Revision:449411
joneum search for other commits by this committer
- www/nginx-devel: Update from 1.13.4 to 1.13.5
- Changelog:
    *) Feature: the $ssl_client_escaped_cert variable.

    *) Bugfix: the "ssl_session_ticket_key" directive and the "include"
       parameter of the "geo" directive did not work on Windows.

    *) Bugfix: incorrect response length was returned on 32-bit platforms
       when requesting more than 4 gigabytes with multiple ranges.

    *) Bugfix: the "expires modified" directive and processing of the
       "If-Range" request header line did not use the response last
       modification time if proxying without caching was used.

Approved by:	osa (maintainer)
Approved by:	tz (mentor)
Differential Revision:	https://reviews.freebsd.org/D12247
06 Sep 2017 20:08:12
Original commit files touched by this commit  1.13.4
Revision:449373
osa search for other commits by this committer
Upgrade third-party njs module from 0.1.10 to post-0.1.13.

Do not bump PORTREVISION.
11 Aug 2017 08:07:34
Original commit files touched by this commit  1.13.4
Revision:447740
joneum search for other commits by this committer
- www/nginx-devel: Update from 1.13.3 to 1.13.4
- pet Portlint

- Changelog:
  *) Feature: the ngx_http_mirror_module.

  *) Bugfix: client connections might be dropped during configuration
       testing when using the "reuseport" parameter of the "listen"
       directive on Linux.

  *) Bugfix: request body might not be available in subrequests if it was
       saved to a file and proxying was used.

  *) Bugfix: cleaning cache based on the "max_size" parameter did not work
       on Windows.

  *) Bugfix: any shared memory allocation required 4096 bytes on Windows.

  *) Bugfix: nginx worker might be terminated abnormally when using the
       "zone" directive inside the "upstream" block on Windows.

Approved by:	osa (maintainer)
Approved by:	miwi (mentor)
MFH:		2017Q3
Differential Revision:	https://reviews.freebsd.org/D11951
13 Jul 2017 11:17:36
Original commit files touched by this commit  1.13.3
Revision:445646
osa search for other commits by this committer
Updade third-party ngx_brotli module to recent version, update
dependences.

No cookie for:	brnrd
12 Jul 2017 00:21:05
Original commit files touched by this commit  1.13.3
Revision:445556
osa search for other commits by this committer
Security upgrade to 1.13.3.

MFH:		2017Q3
Security:	CVE-2017-7529
04 Jul 2017 15:44:05
Original commit files touched by this commit  1.13.2
Revision:445025 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party clojure module from 0.4.4 to 0.4.5.
04 Jul 2017 15:37:06
Original commit files touched by this commit  1.13.2
Revision:445024 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 5.1.4 to 5.1.5:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
01 Jul 2017 14:29:39
Original commit files touched by this commit  1.13.2
Revision:444824 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.1 to 1.13.2.

<ChangeLog>

*) Change: nginx now returns 200 instead of 416 when a range starting
   with 0 is requested from an empty file.

*) Feature: the "add_trailer" directive.
   Thanks to Piotr Sikora.

*) Bugfix: nginx could not be built on Cygwin and NetBSD; the bug had
   appeared in 1.13.0.

*) Bugfix: nginx could not be built under MSYS2 / MinGW 64-bit.
   Thanks to Orgad Shaneh.

*) Bugfix: a segmentation fault might occur in a worker process when
   using SSI with many includes and proxy_pass with variables.

*) Bugfix: in the ngx_http_v2_module.
   Thanks to Piotr Sikora.

</ChangeLog>
09 Jun 2017 23:58:55
Original commit files touched by this commit  1.13.1
Revision:443047 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party vod module.

Requsted by:	Alexander Ushakov <alexander@tauruna.ru>
31 May 2017 01:35:21
Original commit files touched by this commit  1.13.1
Revision:442132 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove the legacy third-party module checksums.

Do not bump PORTREVISION.
31 May 2017 01:29:46
Original commit files touched by this commit  1.13.1
Revision:442131 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.13.0 to 1.13.1.

<ChangeLog>

*) Feature: now a hostname can be used as the "set_real_ip_from"
   directive parameter.

*) Feature: vim syntax highlighting scripts improvements.

*) Feature: the "worker_cpu_affinity" directive now works on DragonFly
   BSD.
   Thanks to Sepherosa Ziehau.

*) Bugfix: SSL renegotiation on backend connections did not work when
   using OpenSSL before 1.1.0.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
21 May 2017 19:05:01
Original commit files touched by this commit  1.13.0_3
Revision:441422 This port version is marked as vulnerable.
osa search for other commits by this committer
A customer has reported about an issue when unable to load a dynamic
module because of wrong order of those modules in the default confi-
guration file, so remove the auto generation of the load modules list.

Bump PORTREVISION.
13 May 2017 20:34:50
Original commit files touched by this commit  1.13.0_2
Revision:440855 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.1.3 to 5.1.4:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
11 May 2017 21:22:28
Original commit files touched by this commit  1.13.0_2
Revision:440668 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix the build when libressl defined.
Bump PORTREVISION.

Reported by:	many
03 May 2017 22:33:19
Original commit files touched by this commit  1.13.0_1
Revision:440065 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party http_auth_pam module from 1.2 to 1.5.1.
Change upstream to github.
It's possible to build the module as dynamic now.

Do not bump PORTREVISION.
03 May 2017 22:16:25
Original commit files touched by this commit  1.13.0_1
Revision:440064 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party auth_digest module from cc61b4a to 519dc2a,
it's possible to build it as dynamic module.

Do not bump PORTREVISION.
03 May 2017 22:03:09
Original commit files touched by this commit  1.13.0_1
Revision:440062 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party memc module from 0.17 to 0.18.
Remove the needless patch (incorporated into upstream).

Do not bump PORTREVISION.
03 May 2017 21:36:42
Original commit files touched by this commit  1.13.0_1
Revision:440047 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.1.2 to 5.1.3:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
01 May 2017 23:30:03
Original commit files touched by this commit  1.13.0_1
Revision:439916 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix third-party lua-nginx module build with LibreSSL.

While I'm here clean-up distinfo from the checksums of legacy
third-party modules.

Do not bump PORTREVISION.

PR:	218595
30 Apr 2017 20:56:09
Original commit files touched by this commit  1.13.0_1
Revision:439844 This port version is marked as vulnerable.
osa search for other commits by this committer
Add IPV6 support knob back.

Remove obsolete third-party modules:

o) http_accesskey;
o) xrid_header. (*)

Bump PORTREVISION.

PR:	218956 (*)
25 Apr 2017 23:30:58
Original commit files touched by this commit  1.13.0
Revision:439422 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.12.0 to latest "mainline" 1.13.0.

<ChangeLog>

*) Change: SSL renegotiation is now allowed on backend connections.

*) Feature: the "rcvbuf" and "sndbuf" parameters of the "listen"
   directives of the mail proxy and stream modules.

*) Feature: the "return" and "error_page" directives can now be used to
   return 308 redirections.
   Thanks to Simon Leblanc.

*) Feature: the "TLSv1.3" parameter of the "ssl_protocols" directive.

*) Feature: when logging signals nginx now logs PID of the process which
   sent the signal.

*) Bugfix: in memory allocation error handling.

*) Bugfix: if a server in the stream module listened on a wildcard
   address, the source address of a response UDP datagram could differ
   from the original datagram destination address.

</ChangeLog>
16 Apr 2017 13:25:41
Original commit files touched by this commit  1.12.0
Revision:438659 This port version is marked as vulnerable.
osa search for other commits by this committer
Move the patches for third-party lua module to lua code block.
Do not bump PORTREVISION.

PR:	218683
15 Apr 2017 17:39:36
Original commit files touched by this commit  1.12.0
Revision:438592 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove IPV6 knob, IPv6 now compiled-in automatically if support is found.

Upgrade third-party upload module, enable it back.
Upgrade third-party http_auth_krb5 module to 0c6ff3f.
Upgrade third-party njs module to 0.1.10.
15 Apr 2017 16:09:01
Original commit files touched by this commit  1.12.0
Revision:438589 This port version is marked as vulnerable.
osa search for other commits by this committer
Enable third_party mod_zip module back by changing upstream.
Do not bump PORTREVISION.
15 Apr 2017 15:55:19
Original commit files touched by this commit  1.12.0
Revision:438588 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.10 to 1.12.0.

ChangeLog:	http://nginx.org/en/CHANGES-1.12

Also, remove third-party modules:
o) udplog
o) statsd

Upgrade third-party modules:
o) lua to 0.10.8
o) upstream_fair to b5be36f (upstream has been changed)

Please see this comment in case of the production use of the lua module:
https://github.com/openresty/lua-nginx-module/pull/1017#issuecomment-294076002

Patches obtained from:
o)
https://github.com/openresty/lua-nginx-module/commit/0459a285ca0159d45e73da8bd1164edb5c57cde3
o)
https://github.com/SpiderLabs/ModSecurity/pull/1373/commits/d19df159043106a4d6dfd113696900b5b0dae24b
21 Feb 2017 00:41:18
Original commit files touched by this commit  1.11.10
Revision:434493 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.9 to 1.11.10.

<ChangeLog>

*) Change: cache header format has been changed, previously cached
   responses will be invalidated.

*) Feature: support of "stale-while-revalidate" and "stale-if-error"
   extensions in the "Cache-Control" backend response header line.

*) Feature: the "proxy_cache_background_update",
   "fastcgi_cache_background_update", "scgi_cache_background_update",
   and "uwsgi_cache_background_update" directives.

*) Feature: nginx is now able to cache responses with the "Vary" header
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Feb 2017 03:30:07
Original commit files touched by this commit  1.11.9_1
Revision:434065 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) fancyindex from 0.3.6 to 0.4.1;
o) encrypted-session from 0.05 to 0.06.
11 Feb 2017 22:46:59
Original commit files touched by this commit  1.11.9_1
Revision:433920 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.30 to 5.1.2:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
05 Feb 2017 21:20:24
Original commit files touched by this commit  1.11.9_1
Revision:433456 This port version is marked as vulnerable.
tijl search for other commits by this committer
- Remove inclusion of bsd.default-versions.mk from ftp/curl/Makefile so
  bsd.default-versions.mk can rely on ARCH being defined.
- In bsd.port.mk move inclusion of bsd.default-versions.mk from the
  pre-makefile section to the options section so the variables can be used
  earlier.  Also put the bit of code sitting between the options section and
  the pre-makefile section into the options section.
- Remove last few cases where ports set WITH_OPENSSL_PORT.  This variable is
  handled in bsd.default-versions.mk and some ports were setting it after
  including bsd.port.options.mk.  After FreeBSD 9 EoL all but a few ports,
  and then only when setting non-default options, work without setting that
  variable.

PR:		215996
Exp-run by:	antoine
Approved by:	portmgr (antoine)
01 Feb 2017 23:22:34
Original commit files touched by this commit  1.11.9
Revision:433118 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from f8c642a (0.1.6+) to f106743 (aka 0.1.9).
01 Feb 2017 23:09:29
Original commit files touched by this commit  1.11.9
Revision:433117 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party ct module from f3cad5e (aka 1.2.0) to 1.3.2.
01 Feb 2017 01:02:06
Original commit files touched by this commit  1.11.9
Revision:432963 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.8 to 1.11.9.

<ChangeLog>

*) Bugfix: nginx might hog CPU when using the stream module; the bug had
   appeared in 1.11.5.

*) Bugfix: EXTERNAL authentication mechanism in mail proxy was accepted
   even if it was not enabled in the configuration.

*) Bugfix: a segmentation fault might occur in a worker process if the
   "ssl_verify_client" directive of the stream module was used.

*) Bugfix: the "ssl_verify_client" directive of the stream module might
   not work.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
01 Feb 2017 00:54:32
Original commit files touched by this commit  1.11.8
Revision:432961 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.10.6 to 0.10.7.
12 Jan 2017 17:06:11
Original commit files touched by this commit  1.11.8
Revision:431290 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Always check OPSYS along with OSVERSION

Approved by:	portmgr blanket
10 Jan 2017 23:16:34
Original commit files touched by this commit  1.11.8
Revision:431141 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.7 to 1.11.8.

<ChangeLog>

*) Feature: the "absolute_redirect" directive.

*) Feature: the "escape" parameter of the "log_format" directive.

*) Feature: client SSL certificates verification in the stream module.

*) Feature: the "ssl_session_ticket_key" directive supports AES256
   encryption of TLS session tickets when used with 80-byte keys.

*) Feature: vim-commentary support in vim scripts.
   Thanks to Armin Grodon.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
18 Dec 2016 16:56:18
Original commit files touched by this commit  1.11.7
Revision:428880 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.6 to 1.11.7.
Upgrade njs module from 8c01042 to f8c642a.

<ChangeLog>

*) Change: now in case of a client certificate verification error the
   $ssl_client_verify variable contains a string with the failure
   reason, for example, "FAILED:certificate has expired".

*) Feature: the $ssl_ciphers, $ssl_curves, $ssl_client_v_start,
   $ssl_client_v_end, and $ssl_client_v_remain variables.

*) Feature: the "volatile" parameter of the "map" directive.

*) Bugfix: dependencies specified for a module were ignored while
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Dec 2016 15:22:47
Original commit files touched by this commit  1.11.6_3
Revision:428352 This port version is marked as vulnerable.
jbeich search for other commits by this committer
multimedia/ffmpeg: update to 3.2.2

Changes:	https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n3.2.2:/Changelog
PR:		207547
Submitted by:	riggs, ebirth@b0ss.net (libressl fix)
Exp-run by:	antoine (3 tries)
10 Dec 2016 18:45:04
Original commit files touched by this commit  1.11.6_2
Revision:428313 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix the build issues when:
o) the drizzle module can't find the libdrizzle headers;
o) the geoip2 can't find the libmaxminddb.

Do not bump PORTREVISION, those third-party modules are disabled by default.
06 Dec 2016 01:49:32
Original commit files touched by this commit  1.11.6_2
Revision:427927 This port version is marked as vulnerable.
osa search for other commits by this committer
Add and enable vendor's stream_ssl_preread module.
Bump PORTREVISION.

PR:	213661
03 Dec 2016 15:52:40
Original commit files touched by this commit  1.11.6_1
Revision:427624 This port version is marked as vulnerable.
robak search for other commits by this committer
www/nginx-devel: make the port slave friendly and update CONFLICTS

Approved by:	osa
01 Dec 2016 11:18:04
Original commit files touched by this commit  1.11.6_1
Revision:427491 This port version is marked as vulnerable.
mat search for other commits by this committer
Don't quote {} in find -exec calls.

Braces are not shell metacharacters, and they do not need to be quoted.
By the time find parses its arguments and dicovers them, the quoting
will have been removed by the shell anyway.

Sponsored by:	Absolight
26 Nov 2016 21:32:50
Original commit files touched by this commit  1.11.6_1
Revision:427183 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix the functionality issue of the third-party modsecurity module.

Found by:	Rami Jebara <rami.jebara@tuangru.com> (in private mail)
25 Nov 2016 07:46:56
Original commit files touched by this commit  1.11.6_1
Revision:427081 This port version is marked as vulnerable.
jbeich search for other commits by this committer
www/nginx: drop unused ImageMagick dependency

nginx-video-thumbextractor-module-0.7.0/README.textile:

  h2(#0_5_0). v0.5.0
  * remove MagickWand dependency which cause memory leak

which saved it from being BROKEN by r358176:

  In file included from src/ngx_http_video_thumbextractor_module.c:3:
  src/ngx_http_video_thumbextractor_module_utils.c:5:10: fatal error:
'wand/magick_wand.h' file not found
  #include <wand/magick_wand.h>
	   ^
  1 error generated.
  *** Error code 1

Reported by:	antoine (via exp-run for www/tengine)
25 Nov 2016 06:44:26
Original commit files touched by this commit  1.11.6
Revision:427079 This port version is marked as vulnerable.
jbeich search for other commits by this committer
www/nginx: apply r390310

=======================<phase: lib-depends    >============================
===>   nginx-1.10.2_1,2 depends on shared library: libjpeg.so - not found
===>   Installing existing package /packages/All/jpeg-8_6.txz
Installing jpeg-8_6...
Extracting jpeg-8_6: .......... done
===>   nginx-1.10.2_1,2 depends on shared library: libjpeg.so - found
(/usr/local/lib/libjpeg.so)
===>   Returning to build of nginx-1.10.2_1,2
===>   nginx-1.10.2_1,2 depends on shared library: libavformat.so - not found
===>   Installing existing package /packages/All/ffmpeg-3.2,1.txz
Installing ffmpeg-3.2,1...
`-- Installing libv4l-1.6.3_2...
|   `-- Installing jpeg-turbo-1.5.1...
pkg-static: jpeg-turbo-1.5.1 conflicts with jpeg-8_6 (installs files into the
same place).  Problematic file: /usr/local/bin/cjpeg

Failed to install the following 1 package(s): /packages/All/ffmpeg-3.2,1.txz
*** Error code 70

PR:		207547
Reported by:	antoine (via exp-run)
Approved by:	portmgr blanket
25 Nov 2016 02:52:05
Original commit files touched by this commit  1.11.6
Revision:427073 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from ee84984 to 8c01042.
20 Nov 2016 20:41:33
Original commit files touched by this commit  1.11.6
Revision:426625 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove IGNORE for drizzle and postgres third-party modules.
20 Nov 2016 20:19:51
Original commit files touched by this commit  1.11.6
Revision:426620 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove IGNORE for memc and redis2 third-party modules.

Patches obtained from:
o)
https://github.com/openresty/memc-nginx-module/commit/c08cb7043440e427867838caf21cfd1e6cb2127a
o)
https://github.com/openresty/redis2-nginx-module/commit/8cc7304787ae9542db4feb50d9e27beb485caa0f
18 Nov 2016 02:37:16
Original commit files touched by this commit  1.11.6
Revision:426305 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.5 to 1.11.6.

Mark following third-party modules with IGNORE, a patches require from
upstreams:
o) http_upstream_fair;
o) drizzle;
o) memc;
o) postgres;
o) redis2.

<ChangeLog>

*) Change: format of the $ssl_client_s_dn and $ssl_client_i_dn variables
   has been changed to follow RFC 2253 (RFC 4514); values in the old
   format are available in the $ssl_client_s_dn_legacy and
   $ssl_client_i_dn_legacy variables.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
18 Nov 2016 01:06:27
Original commit files touched by this commit  1.11.5_1
Revision:426303 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party fastdfs module.

PR:	213979
10 Nov 2016 14:22:58
Original commit files touched by this commit  1.11.5_1
Revision:425846 This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more third-party module:  ngx_http_geoip2, v.2.0.

PR:	210294
21 Oct 2016 15:33:54
Original commit files touched by this commit  1.11.5_1
Revision:424428 This port version is marked as vulnerable.
mat search for other commits by this committer
Fix the three ports not handling the ImageMagick-nox11 dependency
correctly.

Sponsored by:	Absolight
18 Oct 2016 23:10:35
Original commit files touched by this commit  1.11.5
Revision:424223 This port version is marked as vulnerable.
osa search for other commits by this committer
Use ImageMagick-nox11 instead of original one as it's more
convenient for the server-based product.

Do not bump PORTREVISION because this change affects disabled by
default third-party modules only.
14 Oct 2016 11:53:53
Original commit files touched by this commit  1.11.5
Revision:423959 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party headers_more and memc modules tp their latest versions.
12 Oct 2016 00:44:52
Original commit files touched by this commit  1.11.5
Revision:423811 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party upstream_sticky module to its latest version 08a395c66e42
to fix crashing with SIGSEGV.

PR:	213113
12 Oct 2016 00:18:31
Original commit files touched by this commit  1.11.5
Revision:423809 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.10.6rc1 to 0.10.6.
12 Oct 2016 00:10:51
Original commit files touched by this commit  1.11.5
Revision:423806 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.4 to 1.11.5.
Upgrade third-party njs module to its latest version ee84984.

<ChangeLog>

*) Change: the --with-ipv6 configure option was removed, now IPv6
   support is configured automatically.

*) Change: now if there are no available servers in an upstream, nginx
   will not reset number of failures of all servers as it previously
   did, but will wait for fail_timeout to expire.

*) Feature: the ngx_stream_ssl_preread_module.

*) Feature: the "server" directive in the "upstream" context supports
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Sep 2016 22:25:07
Original commit files touched by this commit  1.11.4_1
Revision:422166 This port version is marked as vulnerable.
osa search for other commits by this committer
Do not littering /var/log by compiled-in error log.
Bump PORTREVISION.

PR:	212416
14 Sep 2016 22:15:29
Original commit files touched by this commit  1.11.4
Revision:422165 This port version is marked as vulnerable.
osa search for other commits by this committer
mod_zip: good-bye googlecode, welcome github!
Upgrade to the latest revision.
14 Sep 2016 22:09:52
Original commit files touched by this commit  1.11.4
Revision:422164 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.3 to 1.11.4.

<ChangeLog>

*) Feature: the $upstream_bytes_received variable.

*) Feature: the $bytes_received, $session_time, $protocol, $status,
   $upstream_addr, $upstream_bytes_sent, $upstream_bytes_received,
   $upstream_connect_time, $upstream_first_byte_time, and
   $upstream_session_time variables in the stream module.

*) Feature: the ngx_stream_log_module.

*) Feature: the "proxy_protocol" parameter of the "listen" directive,
   the $proxy_protocol_addr and $proxy_protocol_port variables in the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Sep 2016 15:59:34
Original commit files touched by this commit  1.11.3
Revision:422140 This port version is marked as vulnerable.
mat search for other commits by this committer
GOOGLE_CODE has gone away.

- If a port has another upstream, remove GOOGLE_CODE
- If a port only has GOOGLE_CODE mark it BROKEN

Some ports have a local mirror configured but for security reasons, it
is not considered upstream.

Sponsored by:	Absolight
12 Aug 2016 16:15:06
Original commit files touched by this commit  1.11.3
Revision:420134 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from f7d2d6f to the latest 0f11ace revision.
07 Aug 2016 23:20:36
Original commit files touched by this commit  1.11.3
Revision:419789 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party tarantool module from b852195 to 1278ee5.
Now it's possible to build it as dynamic module.
07 Aug 2016 02:03:59
Original commit files touched by this commit  1.11.3
Revision:419758 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) arrayvar from 0.03 to 0.05;
o) devel_kit from 0.2.19 to 0.3.0;
o) echo from 4f7aa50 to 46334b3;
o) encryptsession from 0.03 to 0.05;
o) forminput from 0.07 to 0.12;
o) iconv from 0.10 to 0.14;
o) lua from 0.10.5 to 0.10.6rc1;
o) set_misc from 6582fb4 to f808ef4;
o) sflow from 0.9.7 to 543c72a;
o) small_light from 0.6.15 to 0.8.0;
o) xss from 0.04 to 0.05.

Do not bump PORTREVISION.
31 Jul 2016 23:05:37
Original commit files touched by this commit  1.11.3
Revision:419419 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 1.1.7 to 1.1.8.
Remove needless patch.

PR:	211487
27 Jul 2016 03:56:37
Original commit files touched by this commit  1.11.3
Revision:419162 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.29 to 5.0.30:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
27 Jul 2016 03:39:06
Original commit files touched by this commit  1.11.3
Revision:419159 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.2 to 1.11.3.

<ChangeLog>

*) Change: now the "accept_mutex" directive is turned off by default.

*) Feature: now nginx uses EPOLLEXCLUSIVE on Linux.

*) Feature: the ngx_stream_geo_module.

*) Feature: the ngx_stream_geoip_module.

*) Feature: the ngx_stream_split_clients_module.

*) Feature: variables support in the "proxy_pass" and "proxy_ssl_name"
   directives in the stream module.

*) Bugfix: socket leak when using HTTP/2.

*) Bugfix: in configure tests.
   Thanks to Piotr Sikora.

</ChangeLog>
20 Jul 2016 09:33:32
Original commit files touched by this commit  1.11.2_1
Revision:418829 This port version is marked as vulnerable.
dinoex search for other commits by this committer
- update libgd to 2.2.2
- new MASTER_SITES
- add security patch
PR:		210913
Submitted by:	Piotr Kubaj
MFH:		2016Q3
Security: CVE-2015-8874
Security: CVE-2016-3074
Security: http://www.openwall.com/lists/oss-security/2016/07/12/4
14 Jul 2016 22:50:05
Original commit files touched by this commit  1.11.2
Revision:418565 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party brotli module from 4f08382 to ada972b.
13 Jul 2016 00:48:28
Original commit files touched by this commit  1.11.2
Revision:418453 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party njs module from 44fe9c1 to f71f005.
13 Jul 2016 00:36:11
Original commit files touched by this commit  1.11.2
Revision:418452 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.28 to 5.0.29:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
13 Jul 2016 00:17:04
Original commit files touched by this commit  1.11.2
Revision:418451 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.11.1 to 1.11.2.

<ChangeLog>

*) Change: now nginx always uses internal MD5 and SHA1 implementations;
   the --with-md5 and --with-sha1 configure options were canceled.

*) Feature: variables support in the stream module.

*) Feature: the ngx_stream_map_module.

*) Feature: the ngx_stream_return_module.

*) Feature: a port can be specified in the "proxy_bind", "fastcgi_bind",
   "memcached_bind", "scgi_bind", and "uwsgi_bind" directives.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
17 Jun 2016 23:43:22
Original commit files touched by this commit  1.11.1
Revision:417042 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party tarantool module from 3599ba0 to b852195.
The size of the distro has been decreased dramatically because an rpm
directory with nginx-1.8.0.tar.gz tarball inside has been removed.

PR:	210349
16 Jun 2016 22:24:49
Original commit files touched by this commit  1.11.1
Revision:416984 This port version is marked as vulnerable.
osa search for other commits by this committer
Revert r416983 back.

Suggested by:	mat
16 Jun 2016 22:12:02
Original commit files touched by this commit  1.11.1
Revision:416983 This port version is marked as vulnerable.
osa search for other commits by this committer
Replace WITH_OPENSSL_PORT=yes to DEFAULT_VERSIONS+=ssl=openssl after r416965.
Non-functional change.
04 Jun 2016 00:36:42
Original commit files touched by this commit  1.11.1
Revision:416342 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) http_auth_ldap from 8517bb0 to dbcef31;
o) brotli from 2fc6f12 to 4f08382;
o) lua from d44f8e0 to 0.10.5;
o) njs from c4a5f2b to 44fe9c1;
o) nchan (aka push) from 0.99.14 to 0.99.15.

Also, it's possible now to build third-party http_auth_ldap module
as dynamic module.

Add java category for third-party clojure module.

Do not bump PORTREVISION.
31 May 2016 21:44:05
Original commit files touched by this commit  1.11.1
Revision:416221 This port version is marked as vulnerable.
osa search for other commits by this committer
Security upgrade:

o) nginx -- from 1.10.0 to 1.10.1;
o) nginx-devel -- from 1.11.0 to 1.11.1.

<ChangeLog>

*) Security: a segmentation fault might occur in a worker process while
   writing a specially crafted request body to a temporary file
   (CVE-2016-4450); the bug had appeared in 1.3.9.

</ChangeLog>
25 May 2016 23:43:24
Original commit files touched by this commit  1.11.0
Revision:415868 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.10.0 to 1.11.0.

<ChangeLog>

*) Feature: the "transparent" parameter of the "proxy_bind",
   "fastcgi_bind", "memcached_bind", "scgi_bind", and "uwsgi_bind"
   directives.

*) Feature: the $request_id variable.

*) Feature: the "map" directive supports combinations of multiple
   variables as resulting values.

*) Feature: now nginx checks if EPOLLRDHUP events are supported by
   kernel, and optimizes connection handling accordingly if the "epoll"
(Only the first 15 lines of the commit message are shown above View all of this commit message)
23 May 2016 20:35:01
Original commit files touched by this commit  1.10.0_3
Revision:415742 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
Remove NLS, DOCS, EXAMPLES and IPV6 from OPTIONS_DEFAULT, they are enabled by
default anyway and don't need to be listed

Approved by:	portmgr blanket
19 May 2016 10:57:35
Original commit files touched by this commit  1.10.0_3
Revision:415501 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Fix trailing whitespace in Makefiles

Approved by:	portmgr blanket
09 May 2016 23:38:21
Original commit files touched by this commit  1.10.0_3
Revision:414895 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party nchan (aka push) module from 0.99.12 to 0.99.14.
09 May 2016 22:51:30
Original commit files touched by this commit  1.10.0_3
Revision:414894 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.27 to 5.0.28:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
01 May 2016 20:54:58
Original commit files touched by this commit  1.10.0_3
Revision:414425 This port version is marked as vulnerable.
osa search for other commits by this committer
Add the pkg-message with the message about recent changes.
Bump PORTREVISION.
30 Apr 2016 18:31:57
Original commit files touched by this commit  1.10.0_2
Revision:414353 This port version is marked as vulnerable.
osa search for other commits by this committer
Do not force WITH_OPENSSL_PORT on 11.x and above.
Bump PORTREVISION.

PR:	209159
30 Apr 2016 17:28:01
Original commit files touched by this commit  1.10.0_1
Revision:414350 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix the nginx.conf-dist installation if DSO undefined.
Do not bump PORTREVISION because DSO is defined by default.

Pointed out by: mat
29 Apr 2016 23:08:12
Original commit files touched by this commit  1.10.0_1
Revision:414318 This port version is marked as vulnerable.
osa search for other commits by this committer
Change the MODULESDIR from ${ETCDIR}/modules to ${PREFIX}/libexec/${PORTNAME}.
Bump PORTREVISION.

PR:	209151
29 Apr 2016 02:18:51
Original commit files touched by this commit  1.10.0
Revision:414249 This port version is marked as vulnerable.
osa search for other commits by this committer
Add DSO knob - an ability to build an old "good" nginx without dynamic modules.
Do not bump PORTREVISION cause functionally nothing has been changed.

PR:	209124
28 Apr 2016 14:17:45
Original commit files touched by this commit  1.10.0
Revision:414175 This port version is marked as vulnerable.
swills search for other commits by this committer
www/nginx-devel: remove USE_RAKE
27 Apr 2016 01:18:07
Original commit files touched by this commit  1.10.0
Revision:414085 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.26 to 5.0.27:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
26 Apr 2016 21:21:35
Original commit files touched by this commit  1.10.0
Revision:414081 This port version is marked as vulnerable.
osa search for other commits by this committer
Please welcome, nginx 1.10.0 - new stable version.

<ChangeLog>

*) 1.10.x stable branch.

</ChangeLog>
19 Apr 2016 20:44:36
Original commit files touched by this commit  1.9.15
Revision:413662 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.9.14 to 1.9.15.

<ChangeLog>

*) Bugfix: "recv() failed" errors might occur when using HHVM as a
   FastCGI server.

*) Bugfix: when using HTTP/2 and the "limit_req" or "auth_request"
   directives a timeout or a "client violated flow control" error might
   occur while reading client request body; the bug had appeared in
   1.9.14.

*) Workaround: a response might not be shown by some browsers if HTTP/2
   was used and client request body was not fully read; the bug had
   appeared in 1.9.14.

*) Bugfix: connections might hang when using the "aio threads"
   directive.
   Thanks to Mindaugas Rasiukevicius.

</ChangeLog>
15 Apr 2016 21:59:54
Original commit files touched by this commit  1.9.14_1
Revision:413380 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade njs module from b9a54be to c4a5f2b.
15 Apr 2016 21:57:22
Original commit files touched by this commit  1.9.14_1
Revision:413379 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) push from 0.99.11 to 0.99.12;
o) lua from 7410339 to d44f8e0;
o) shibboleth from 20150121 to 4f1119b.
13 Apr 2016 10:36:15
Original commit files touched by this commit  1.9.14_1
Revision:413184 This port version is marked as vulnerable.
jbeich search for other commits by this committer
Consistently prefer ${CONFIGURE_CMD} over ./${CONFIGURE_SCRIPT}

This also fixes SET_LATE_CONFIGURE_ARGS with custom CONFIGURE_CMD.

PR:		208294
Exp-run by:	antoine
Approved by:	portmgr (antoine), perl (mat)
Differential Revision:	https://reviews.freebsd.org/D4158
13 Apr 2016 01:20:18
Original commit files touched by this commit  1.9.14_1
Revision:413165 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party upstream check module.

PR:	208380

Number of commits found: 802 (showing only 100 on this page)

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
opensslNov 02
openssl-develNov 02
wordpressNov 01
php56Oct 30
php70Oct 30
php71Oct 30
wiresharkOct 30
chromiumOct 28
wgetOct 27
wgetOct 27
openoffice-4*Oct 26
openoffice-devel*Oct 26
gitlabOct 25
nodeOct 25
node4Oct 25

No vulnerabilities have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 31872
Broken 126
Deprecated 55
Ignore 364
Forbidden 0
Restricted 175
No CDROM 78
Vulnerable 51
Expired 11
Set to expire 47
Interactive 0
new 24 hours 8
new 48 hours11
new 7 days3213
new fortnight3397
new month3451

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2017 Dan Langille. All rights reserved.