notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine

Bot filter coming soon

To deter bots pegging the database CPU to 100%, a bot testing filter to be added to the website. This should not affect newsfeeds etc. Anubis seems light-weight - it is already in use within the FreeBSD Project. This notice is just a heads up in case you see something odd. This notice will be updated after Anubis is installed.

Port details
nginx-devel Robust and small WWW server
1.29.0_2 www on this many watch lists=29 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.29.0Version of this port present on the latest quarterly branch.
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2007-06-15 08:23:21
Last Update: 2025-07-03 19:52:31
Commit Hash: 7939013
People watching this port, also watch:: nginx, sudo, bash, wget, lsof
License: BSD2CLAUSE
WWW:
https://nginx.com/
Description:
NGINX is a high performance edge web server with the lowest memory footprint and the key features to build modern and efficient web infrastructure. NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching, load balancing, compression, request throttling, connection multiplexing and reuse, SSL offload and HTTP media streaming. See also: https://nginx.org/
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
pkg-plist: as obtained via: make generate-plist
Expand this list (109 items)
Collapse this list.
  1. /usr/local/share/licenses/nginx-devel-1.29.0_2/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.29.0_2/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.29.0_2/BSD2CLAUSE
  4. etc/nginx/koi-utf
  5. etc/nginx/koi-win
  6. etc/nginx/win-utf
  7. @comment include/ngx_link_func_module.h
  8. @comment etc/nginx/naxsi_core.rules
  9. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  10. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  11. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  12. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  13. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  14. @comment libexec/nginx/ngx_http_ajp_module.so
  15. @comment libexec/nginx/ngx_http_array_var_module.so
  16. @comment libexec/nginx/ngx_http_aws_auth_module.so
  17. @comment libexec/nginx/ngx_http_brotli_filter_module.so
  18. @comment libexec/nginx/ngx_http_brotli_static_module.so
  19. @comment libexec/nginx/ngx_http_cache_purge_module.so
  20. @comment libexec/nginx/ndk_http_module.so
  21. @comment libexec/nginx/ngx_http_drizzle_module.so
  22. @comment libexec/nginx/ngx_http_dynamic_upstream_module.so
  23. @comment libexec/nginx/ngx_http_echo_module.so
  24. @comment libexec/nginx/ngx_http_encrypted_session_module.so
  25. @comment libexec/nginx/ngx_fips_check_module.so
  26. @comment libexec/nginx/ngx_http_form_input_module.so
  27. @comment libexec/nginx/ngx_http_gridfs_module.so
  28. @comment libexec/nginx/ngx_http_headers_more_filter_module.so
  29. @comment libexec/nginx/ngx_http_accept_language_module.so
  30. @comment libexec/nginx/ngx_http_auth_digest_module.so
  31. @comment libexec/nginx/ngx_http_auth_jwt_module.so
  32. @comment libexec/nginx/ngx_http_auth_spnego_module.so
  33. @comment libexec/nginx/ngx_http_auth_ldap_module.so
  34. @comment libexec/nginx/ngx_http_auth_pam_module.so
  35. @comment libexec/nginx/ngx_http_dav_ext_module.so
  36. @comment libexec/nginx/ngx_http_eval_module.so
  37. @comment libexec/nginx/ngx_http_fancyindex_module.so
  38. @comment libexec/nginx/ngx_http_footer_filter_module.so
  39. @comment libexec/nginx/ngx_http_image_filter_module.so
  40. @comment libexec/nginx/ngx_http_ip2location_module.so
  41. @comment libexec/nginx/ngx_http_ip2proxy_module.so
  42. @comment libexec/nginx/ngx_http_json_status_module.so
  43. @comment libexec/nginx/ngx_http_mogilefs_module.so
  44. @comment libexec/nginx/ngx_http_notice_module.so
  45. @comment libexec/nginx/ngx_http_perl_module.so
  46. @comment libexec/nginx/ngx_http_push_stream_module.so
  47. @comment libexec/nginx/ngx_nchan_module.so
  48. @comment libexec/nginx/ngx_http_redis_module.so
  49. @comment libexec/nginx/ngx_http_subs_filter_module.so
  50. @comment libexec/nginx/ngx_http_tnt_module.so
  51. @comment libexec/nginx/ngx_http_uploadprogress_module.so
  52. @comment libexec/nginx/ngx_http_upload_module.so
  53. @comment libexec/nginx/ngx_http_upstream_fair_module.so
  54. @comment libexec/nginx/ngx_http_sticky_module.so
  55. @comment libexec/nginx/ngx_http_video_thumbextractor_module.so
  56. @comment libexec/nginx/ngx_http_xslt_filter_module.so
  57. @comment libexec/nginx/ngx_http_zip_module.so
  58. @comment libexec/nginx/ngx_http_geoip2_module.so
  59. @comment libexec/nginx/ngx_http_js_module.so
  60. @comment libexec/nginx/ngx_http_iconv_module.so
  61. @comment libexec/nginx/ngx_http_let_module.so
  62. @comment libexec/nginx/ngx_http_link_func_module.so
  63. @comment libexec/nginx/ngx_http_lua_module.so
  64. @comment libexec/nginx/ngx_stream_lua_module.so
  65. libexec/nginx/ngx_mail_module.so
  66. @comment libexec/nginx/ngx_http_memc_module.so
  67. @comment libexec/nginx/ngx_http_modsecurity_module.so
  68. @comment libexec/nginx/ngx_http_naxsi_module.so
  69. @comment libexec/nginx/ngx_otel_module.so
  70. @comment libexec/nginx/ngx_http_passenger_module.so
  71. @comment libexec/nginx/ngx_postgres_module.so
  72. @comment libexec/nginx/ngx_http_rds_csv_filter_module.so
  73. @comment libexec/nginx/ngx_http_rds_json_filter_module.so
  74. @comment libexec/nginx/ngx_http_redis2_module.so
  75. @comment libexec/nginx/ngx_rtmp_module.so
  76. @comment libexec/nginx/ngx_http_set_misc_module.so
  77. @comment libexec/nginx/ngx_http_shibboleth_module.so
  78. @comment libexec/nginx/ngx_http_slowfs_module.so
  79. @comment libexec/nginx/ngx_http_srcache_filter_module.so
  80. @comment libexec/nginx/ngx_stream_geoip2_module.so
  81. @comment libexec/nginx/ngx_stream_js_module.so
  82. libexec/nginx/ngx_stream_module.so
  83. @comment libexec/nginx/ngx_http_stream_server_traffic_status_module.so
  84. @comment libexec/nginx/ngx_http_vod_module.so
  85. @comment libexec/nginx/ngx_http_vhost_traffic_status_module.so
  86. @comment libexec/nginx/ngx_http_websockify_module.so
  87. @comment libexec/nginx/ngx_http_xss_filter_module.so
  88. @comment libexec/nginx/ngx_http_zstd_filter_module.so
  89. @comment libexec/nginx/ngx_http_zstd_static_module.so
  90. @comment %%SITE_ARCH%%/auto/nginx/nginx.so
  91. @comment %%SITE_ARCH%%/nginx.pm
  92. sbin/nginx
  93. share/vim/vimfiles/ftdetect/nginx.vim
  94. share/vim/vimfiles/ftplugin/nginx.vim
  95. share/vim/vimfiles/indent/nginx.vim
  96. share/vim/vimfiles/syntax/nginx.vim
  97. @postexec mkdir -p -m 755 %D/www/nginx-dist
  98. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  99. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  100. www/nginx-dist/index.html
  101. www/nginx-dist/50x.html
  102. @postexec chmod a-w %D/www/nginx-dist
  103. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  104. @dir /var/tmp/nginx
  105. @dir /var/log/nginx
  106. share/man/man8/nginx.8.gz
  107. @owner
  108. @group
  109. @mode
Collapse this list.
Dependency lines:
  • nginx-devel>0:www/nginx-devel
Conflicts:
CONFLICTS:
  • nginx-1.*
  • nginx-full-1.*
  • nginx-lite-1.*
  • nginx-naxsi-1.*
CONFLICTS_INSTALL:
  • nginx
To install the port:
cd /usr/ports/www/nginx-devel/ && make install clean
To add the package, run one of these commands:
  • pkg install www/nginx-devel
  • pkg install nginx-devel
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: nginx-devel
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1751572263 SHA256 (nginx-1.29.0.tar.gz) = 109754dfe8e5169a7a0cf0db6718e7da2db495753308f933f161e525a579a664 SIZE (nginx-1.29.0.tar.gz) = 1284291

Expand this list (142 items)

Collapse this list.

SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208 SHA256 (osokin-ngx_http_redis-0.4.0_GH0.tar.gz) = e5b699243035575cb8ffcd26fc3a8287bcd11ff414e30fd0a52c96729fd22d0d SIZE (osokin-ngx_http_redis-0.4.0_GH0.tar.gz) = 11858 SHA256 (passenger-6.0.27.tar.gz) = 82c830aee98feece09e84309c2d0c6bb3f7b22a3c8e33cfe93b5e0d498615d0f SIZE (passenger-6.0.27.tar.gz) = 7548637 SHA256 (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 522e94c59f5783f281d868ede2adf325bf2f8ffb9e62cf8451d4b9ac0516916c SIZE (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 110807 SHA256 (openresty-array-var-nginx-module-v0.06_GH0.tar.gz) = 2c3577265d1d51a2d0646311b9c651520a74455253b6f7a5776af79e9bff5cb1 SIZE (openresty-array-var-nginx-module-v0.06_GH0.tar.gz) = 12005 SHA256 (anomalizer-ngx_aws_auth-f3d9862_GH0.tar.gz) = 3e8cbb594abccb84ce9660d31e9d623b615eab3720bca206cfddeeab9eb2383e SIZE (anomalizer-ngx_aws_auth-f3d9862_GH0.tar.gz) = 16080 SHA256 (google-ngx_brotli-a71f931_GH0.tar.gz) = b3312a045d5303a40d02beb34711b8ca27f7b72d647e9ee2012a8eddd14d9b22 SIZE (google-ngx_brotli-a71f931_GH0.tar.gz) = 16376 SHA256 (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = ddfd4fdd99075d906b7b75c49f56ec96b76df7951dfa54502e0f83890447031f SIZE (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = 17162 SHA256 (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = faa2fcd5168b10764d35081356511d5f84db5c526a1aa4b6add2db94b6853b2b SIZE (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = 66561 SHA256 (openresty-drizzle-nginx-module-c631276_GH0.tar.gz) = 215ebeb3bad3a907f13fbdae66a25939b6820bdba2f339394cbb9c8b8557308a SIZE (openresty-drizzle-nginx-module-c631276_GH0.tar.gz) = 51675 SHA256 (ZigzagAK-ngx_dynamic_upstream-ab67fe7_GH0.tar.gz) = 4610da3ce9c35e3eef0e6d12a6285b9c8020f6d44fb094b4af94c1275bc01156 SIZE (ZigzagAK-ngx_dynamic_upstream-ab67fe7_GH0.tar.gz) = 22991 SHA256 (openresty-echo-nginx-module-4eeda3c_GH0.tar.gz) = 64093d606c7bc61a26ca49bfa7c4a2dacec6013ce158463a377592a6f7224444 SIZE (openresty-echo-nginx-module-4eeda3c_GH0.tar.gz) = 53544 SHA256 (openresty-encrypted-session-nginx-module-7ffe4ec_GH0.tar.gz) = 1848ee88be81350326918930463e0f2be2013ab76ae589d01f00fd81c5da0c07 SIZE (openresty-encrypted-session-nginx-module-7ffe4ec_GH0.tar.gz) = 11899 SHA256 (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = d52fbb0f2819cd91b710ad85e6c8b452fdca6a5d81b0694d6637adba3fc2382c SIZE (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = 6494 SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106 SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090 SHA256 (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 9b059b5ae7b602d12d32d5ebe2700827ea625f22c0fb3b9956242e11de63845b SIZE (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 4674 SHA256 (openresty-headers-more-nginx-module-84a65d6_GH0.tar.gz) = e99175b8eddcaaaea94856c9a9a90036f8b959c016cedf42cbfbc9cdd63b035f SIZE (openresty-headers-more-nginx-module-84a65d6_GH0.tar.gz) = 29468 SHA256 (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = a58feb576f2231498b8a3863d3c6fba45c7d48bc48735fa714e07a7bfbedb6e3 SIZE (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = 3425 SHA256 (atomx-nginx-http-auth-digest-ac91c88_GH0.tar.gz) = 31b2a737d3d5d118a286a0b8a6e2637eda313dba07a9a5824e4c6e33ea6e2b80 SIZE (atomx-nginx-http-auth-digest-ac91c88_GH0.tar.gz) = 17890 SHA256 (TeslaGov-ngx-http-auth-jwt-module-2.3.1_GH0.tar.gz) = a3865859a1476bd5e8a1468d9dee23d46c716b6b932649fde04238748eafe6d5 SIZE (TeslaGov-ngx-http-auth-jwt-module-2.3.1_GH0.tar.gz) = 32459 SHA256 (stnoonan-spnego-http-auth-nginx-module-60f0811_GH0.tar.gz) = 205e1ee4b5fcab1a7f136e39c569ddb470a35120761b8acc1463bda5e3062c42 SIZE (stnoonan-spnego-http-auth-nginx-module-60f0811_GH0.tar.gz) = 30464 SHA256 (kvspb-nginx-auth-ldap-241200e_GH0.tar.gz) = d3aa3a5ead311b34059d6ab1b6d2cf3ac8269c47a87b768523c07381229db470 SIZE (kvspb-nginx-auth-ldap-241200e_GH0.tar.gz) = 18541 SHA256 (sto-ngx_http_auth_pam_module-v1.5.5_GH0.tar.gz) = 98a71617d9119ae784993e3789ce8766fdf2ff2479691f3dc6cf8d8763f8d364 SIZE (sto-ngx_http_auth_pam_module-v1.5.5_GH0.tar.gz) = 7233 SHA256 (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = d2499d94d82d4e4eac8425d799e52883131ae86a956524040ff2fd230ef9f859 SIZE (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = 14558 SHA256 (openresty-nginx-eval-module-13425e8_GH0.tar.gz) = 48664ecd18041633829fc66b5e339ca7e75f44648c7bcbdd18e8cf8691a100bd SIZE (openresty-nginx-eval-module-13425e8_GH0.tar.gz) = 14936 SHA256 (aperezdc-ngx-fancyindex-cbc0d3f_GH0.tar.gz) = ded74515205e1e7a3a0175214bbe62ac3a13c21bd428084783d6345520bed782 SIZE (aperezdc-ngx-fancyindex-cbc0d3f_GH0.tar.gz) = 30334 SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813 SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934 SHA256 (leev-ngx_http_geoip2_module-445df24_GH0.tar.gz) = f19985b13e4095168a60aab5a1b29940ff586bf7571c61aa70ca7cd2f807850c SIZE (leev-ngx_http_geoip2_module-445df24_GH0.tar.gz) = 8889 SHA256 (ip2location-ip2location-nginx-5f2c59a_GH0.tar.gz) = 3eb29b516d80afcc5267ef436bd527b0810257437bce48bdfd6070dd10f1b767 SIZE (ip2location-ip2location-nginx-5f2c59a_GH0.tar.gz) = 5506 SHA256 (ip2location-ip2proxy-nginx-f3e7e7d_GH0.tar.gz) = 90dc4a10dd8fc4af3ffdd2cf451368eca1d3b90261ec1944ad629b2302932638 SIZE (ip2location-ip2proxy-nginx-f3e7e7d_GH0.tar.gz) = 5253 SHA256 (nginx-modules-ngx_http_json_status_module-c77dff4_GH0.tar.gz) = a071c50834142dc094a2915a5ac7bd80765d76bbe736fe291e40f593c8278f16 SIZE (nginx-modules-ngx_http_json_status_module-c77dff4_GH0.tar.gz) = 6753 SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885 SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343 SHA256 (slact-nchan-v1.3.7_GH0.tar.gz) = 6e82c673cedc7d33ee48ea1c198964fdcf6853bf851de797002199a496f08263 SIZE (slact-nchan-v1.3.7_GH0.tar.gz) = 665133 SHA256 (wandenberg-nginx-push-stream-module-0.6.0_GH0.tar.gz) = 84f6ad280c5eaf34e145bae3b835ef826b6e4aa490a94fed7350c8093be67d61 SIZE (wandenberg-nginx-push-stream-module-0.6.0_GH0.tar.gz) = 210766 SHA256 (yaoweibin-ngx_http_substitutions_filter_module-e12e965_GH0.tar.gz) = 40f9d43fdb39f4a8c60697e366469a42e229b12f1993376f33431e700bd9a50f SIZE (yaoweibin-ngx_http_substitutions_filter_module-e12e965_GH0.tar.gz) = 94055 SHA256 (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 514aa57155c73c2e3f7bdfe00c580183df343f2fa4b34e77f040cf6557caffae SIZE (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 75708 SHA256 (fdintino-nginx-upload-module-96e6460_GH0.tar.gz) = 7643e724edc3e3ffb70b1685312f4e2f405b9b6cc186621b947a640ead6fcc0d SIZE (fdintino-nginx-upload-module-96e6460_GH0.tar.gz) = 42561 SHA256 (masterzen-nginx-upload-progress-module-v0.9.3_GH0.tar.gz) = 7d810069f6f3e26f3b00989448fceb891a934c2a2f7eb55e0358b70291c23942 SIZE (masterzen-nginx-upload-progress-module-v0.9.3_GH0.tar.gz) = 17303 SHA256 (yaoweibin-nginx_upstream_check_module-87bfa66_GH0.tar.gz) = bffdae53677f703f99401d5d8924f3351832f1ade224e7e45c4e33e930316bb4 SIZE (yaoweibin-nginx_upstream_check_module-87bfa66_GH0.tar.gz) = 130913 SHA256 (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 93f71b7cf0db9c6dbf97e3ee11cf8efbc149946c0949d7abd19c74c7620eea50 SIZE (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 10433 SHA256 (gdongca-nginx-sticky-module-ng-a3263ad_GH0.tar.gz) = 610bd7fa83d6f8fdb17cf689f36b2dfc5e5638869dcd225528eb69d8a0a40ac8 SIZE (gdongca-nginx-sticky-module-ng-a3263ad_GH0.tar.gz) = 122022 SHA256 (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 9113f887a8740fe72614ee32f481177d33e9542c3b0625627da19a1c4f3da2cb SIZE (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 2710072 SHA256 (vince2678-mod_zip-39dc908_GH0.tar.gz) = bc5c3d725268abbe1c5c38de5b18a4ad9dbe5821c4afeaccabd3eec38b272be4 SIZE (vince2678-mod_zip-39dc908_GH0.tar.gz) = 30275 SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462 SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133 SHA256 (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 7393809d5d8877812da1bd5b5fbd1d8b00bc85e71f2f387c344f007773e49050 SIZE (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 20617 SHA256 (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 20c3679199ba7efe1598f03b2fa0b13591226363c8dd7930d7f02702cd5abada SIZE (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 139656 SHA256 (openresty-lua-nginx-module-v0.10.28_GH0.tar.gz) = 634827d54de6216cb0502d14f76610788b3a3e33160e91d5578d6db0d9a34a20 SIZE (openresty-lua-nginx-module-v0.10.28_GH0.tar.gz) = 869217 SHA256 (openresty-stream-lua-nginx-module-v0.0.16_GH0.tar.gz) = 3b1103cf5ee940ea94711eae1a7ccc1a161273ec9a08eb415f1d45ad385f967d SIZE (openresty-stream-lua-nginx-module-v0.0.16_GH0.tar.gz) = 395259 SHA256 (openresty-memc-nginx-module-v0.20_GH0.tar.gz) = a42dd56dd6e2144755a127bcd2a6cc1a488258dc5cdb751d6a3e5dd5b6989239 SIZE (openresty-memc-nginx-module-v0.20_GH0.tar.gz) = 34736 SHA256 (owasp-modsecurity-ModSecurity-nginx-fd28e6a_GH0.tar.gz) = deafee4e4145a73b9369999e261368b34d4f7ff1be2596a559abd9e1d5df5526 SIZE (owasp-modsecurity-ModSecurity-nginx-fd28e6a_GH0.tar.gz) = 1160686 SHA256 (wargio-naxsi-1.7_GH0.tar.gz) = adee817da71913f64a9fb0fca142d9520bb0e5014b1acc797841cd8e31273f4d SIZE (wargio-naxsi-1.7_GH0.tar.gz) = 1132392 SHA256 (libinjection-libinjection-b9fcaaf_GH0.tar.gz) = 7812e1316b61a7a7d3a65a57a07c6d5235ac40fe35e6edda983f31a44661a38e SIZE (libinjection-libinjection-b9fcaaf_GH0.tar.gz) = 2218207 SHA256 (nginx-njs-0.9.0_GH0.tar.gz) = 7b0446f0b3e0b63b57883e0464d883f0ac4eab82ec7746599d37563dc6808203 SIZE (nginx-njs-0.9.0_GH0.tar.gz) = 942562 SHA256 (osokin-nginx-otel-3a655df_GH0.tar.gz) = 71ee1561303c289d4562148f8719b60796c36abe16de1b3c10d10b8e6f03a952 SIZE (osokin-nginx-otel-3a655df_GH0.tar.gz) = 27169 SHA256 (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = c69ad4495de7c7883ebc23e1e6c4cc83a4ac6a7fddd4d5c12e49d33b65f7c50b SIZE (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = 48544 SHA256 (openresty-rds-csv-nginx-module-6a90686_GH0.tar.gz) = 92068b96a9cf152e8f10db2b661a031adbb2a29db4b075773c2495846d4c926c SIZE (openresty-rds-csv-nginx-module-6a90686_GH0.tar.gz) = 20631 SHA256 (openresty-rds-json-nginx-module-e6517b9_GH0.tar.gz) = 93dc271ff64d9dcbd48e494b72ac7af7a169c58ce4d4a98d732fb71b07e6bf1c SIZE (openresty-rds-json-nginx-module-e6517b9_GH0.tar.gz) = 35794 SHA256 (openresty-redis2-nginx-module-454c223_GH0.tar.gz) = dd27c5c1766d67518c42f51c11ca2f74b2db8a71946f90b4fadf5d868fbede65 SIZE (openresty-redis2-nginx-module-454c223_GH0.tar.gz) = 25731 SHA256 (arut-nginx-rtmp-module-6c7719d_GH0.tar.gz) = af459cb16d276cf76a73adba55bc063330136090f7ce9279b851c35eea8c57da SIZE (arut-nginx-rtmp-module-6c7719d_GH0.tar.gz) = 520109 SHA256 (openresty-set-misc-nginx-module-eb223c9_GH0.tar.gz) = 1eeea5ea1df3531e5a1fafde1464b3bb688a7ef1451875017dc25f72c733244b SIZE (openresty-set-misc-nginx-module-eb223c9_GH0.tar.gz) = 30088 SHA256 (sflow-nginx-sflow-module-f15c87f_GH0.tar.gz) = 251de3a5b588a4721effe88f3dbc632706321b7cd1af5fae7aa4f38ca50d2637 SIZE (sflow-nginx-sflow-module-f15c87f_GH0.tar.gz) = 29515 SHA256 (nginx-shib-nginx-http-shibboleth-629ae1f_GH0.tar.gz) = 79d3d8330c58254605e569bb34371c030122ad2f52e0191cbf06df3bc316952c SIZE (nginx-shib-nginx-http-shibboleth-629ae1f_GH0.tar.gz) = 23907 SHA256 (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 6ae8abb01a2aff788e75ec68621cb0159148a6f73730a84b30b0bdbc6cdc1758 SIZE (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 11186 SHA256 (openresty-srcache-nginx-module-bcdcfdc_GH0.tar.gz) = fbe15bc0c2d52f778b04d4433e220f219bde0660d19c6acedf67aa194049b130 SIZE (openresty-srcache-nginx-module-bcdcfdc_GH0.tar.gz) = 50848 SHA256 (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 748b67ceb82b3b843ae915bf7863fd08b7c2427c045e5ec540242d050f7b30d0 SIZE (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 352431 SHA256 (kaltura-nginx-vod-module-26f0687_GH0.tar.gz) = 7c098d4b1c0f0a3d694ece364fa190d5c88a920352e4c3e9377ae3b38904a08b SIZE (kaltura-nginx-vod-module-26f0687_GH0.tar.gz) = 475372 SHA256 (vozlt-nginx-module-vts-c382342_GH0.tar.gz) = 1252c7fe0636d658172055d7e2598487479a54adc00e90af6b23ddb4b6641952 SIZE (vozlt-nginx-module-vts-c382342_GH0.tar.gz) = 184988 SHA256 (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = aca454bffcee2476dc92682ebfb8c0378a271fda178be7e945d648419d220758 SIZE (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = 14646 SHA256 (openresty-xss-nginx-module-de2d87a_GH0.tar.gz) = f830c9300d751046e2592c74d09f39ac4b4b4567078c96c24951de5554861b5e SIZE (openresty-xss-nginx-module-de2d87a_GH0.tar.gz) = 12779 SHA256 (tokers-zstd-nginx-module-f4ba115_GH0.tar.gz) = 20045e8ac80e2cc9fd3659573153cb1f22d98a653a10fe939a4be0e90160826a SIZE (tokers-zstd-nginx-module-f4ba115_GH0.tar.gz) = 55848 SHA256 (0bb7489cb2fcc60ce24fae2d5581c7441bfa0931.patch) = 2b2eea23d23fa70b80cb7cf8468d404e851e9cab023639969c7bb1df328914ab SIZE (0bb7489cb2fcc60ce24fae2d5581c7441bfa0931.patch) = 1132

Collapse this list.


Packages (timestamps in pop-ups are UTC):
nginx-devel
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest1.28.0_71.29.01.19.6_41.28.0_71.29.0-1.19.6_4-
FreeBSD:13:quarterly1.27.4_41.27.4_51.25.1_11.27.4_41.27.4_51.25.3_91.25.3_91.25.4
FreeBSD:14:latest1.28.0_71.29.01.23.31.28.0_21.29.0_11.25.1-1.25.1
FreeBSD:14:quarterly1.27.4_41.27.4_5-1.27.4_41.27.4_51.25.3_91.25.3_91.25.4
FreeBSD:15:latest1.28.0_71.28.0_7n/a1.28.0_1n/a1.25.3_111.25.3_111.25.4_2
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Library dependencies:
  1. libpcre2-8.so : devel/pcre2
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for nginx-devel-1.29.0_2: DEBUG=off: Build with debugging support DEBUGLOG=off: Enable debug log (--with-debug) DSO=on: Enable dynamic modules support FILE_AIO=on: Enable file aio IPV6=on: Enable IPv6 support NJS=off: Enable javascript (NJS) module OTEL=off: Enable OpenTELemetry module THREADS=on: Enable threads support WWW=on: Enable html sample files ====> Modules that require HTTP module GOOGLE_PERFTOOLS=off: Enable google perftools module HTTP=on: Enable HTTP module HTTP_ADDITION=on: Enable http_addition module HTTP_AUTH_REQ=on: Enable http_auth_request module HTTP_CACHE=on: Enable http_cache module HTTP_DAV=on: Enable http_webdav module HTTP_DEGRADATION=off: Enable http_degradation module HTTP_FLV=on: Enable http_flv module HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module HTTP_GZIP_STATIC=on: Enable http_gzip_static module HTTP_IMAGE_FILTER=off: Enable http_image_filter module HTTP_MP4=on: Enable http_mp4 module HTTP_PERL=off: Enable http_perl module HTTP_RANDOM_INDEX=on: Enable http_random_index module HTTP_REALIP=on: Enable http_realip module HTTP_SECURE_LINK=on: Enable http_secure_link module HTTP_SLICE=on: Enable http_slice module HTTP_SSL=on: Enable http_ssl module HTTP_STATUS=on: Enable http_stub_status module HTTP_SUB=on: Enable http_sub module HTTP_XSLT=off: Enable http_xslt module HTTPV2=on: Enable HTTP/2 protocol support (SSL req.) HTTPV3=on: Enable HTTP/3 protocol support HTTPV3_BORING=off: Use security/boringssl HTTPV3_LSSL=off: Use security/libressl-devel HTTPV3_OSSL35=off: Use security/openssl35 ====> Modules that require MAIL module MAIL=on: Enable IMAP4/POP3/SMTP proxy module MAIL_IMAP=off: Enable IMAP4 proxy module MAIL_POP3=off: Enable POP3 proxy module MAIL_SMTP=off: Enable SMTP proxy module MAIL_SSL=on: Enable mail_ssl module ====> Modules that require STREAM module STREAM=on: Enable stream module STREAM_REALIP=on: Enable stream_realip module STREAM_SSL=on: Enable stream_ssl module (SSL req.) STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.) ====> Third-party modules AJP=off: 3rd party ajp module AWS_AUTH=off: 3rd party aws auth module BROTLI=off: 3rd party brotli module CACHE_PURGE=off: 3rd party cache_purge module DEVEL_KIT=off: 3rd party Nginx Development Kit module ARRAYVAR=off: 3rd party array_var module DRIZZLE=off: 3rd party drizzle module DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module ECHO=off: 3rd party echo module ENCRYPTSESSION=off: 3rd party encrypted_session module FIPS_CHECK=off: 3rd party fips_check module FORMINPUT=off: 3rd party form_input module GRIDFS=off: 3rd party gridfs module HEADERS_MORE=off: 3rd party headers_more module HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module HTTP_AUTH_JWT=off: 3rd party http_auth_jwt module HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module HTTP_AUTH_PAM=off: 3rd party http_auth_pam module HTTP_DAV_EXT=off: 3rd party webdav_ext module HTTP_EVAL=off: 3rd party eval module HTTP_FANCYINDEX=off: 3rd party http_fancyindex module HTTP_FOOTER=off: 3rd party http_footer module HTTP_GEOIP2=off: 3rd party geoip2 module HTTP_IP2LOCATION=off: 3rd party ip2location-nginx module HTTP_IP2PROXY=off: 3rd party ip2proxy-nginx module HTTP_JSON_STATUS=off: 3rd party http_json_status module HTTP_MOGILEFS=off: 3rd party mogilefs module HTTP_NOTICE=off: 3rd party notice module HTTP_PUSH=off: 3rd party push module HTTP_PUSH_STREAM=off: 3rd party push stream module HTTP_REDIS=off: 3rd party http_redis module HTTP_SLICE_AHEAD=off: 3rd party http_slice_ahead module HTTP_SUBS_FILTER=off: 3rd party subs filter module HTTP_TARANTOOL=off: 3rd party tarantool upstream module HTTP_UPLOAD=off: 3rd party upload module HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module HTTP_ZIP=off: 3rd party http_zip module ICONV=off: 3rd party iconv module LET=off: 3rd party let module LINK=off: 3rd party link function module LUA=off: 3rd party lua module LUASTREAM=off: 3rd party lua stream module MEMC=off: 3rd party memc (memcached) module MODSECURITY3=off: 3rd party modsecurity3 module NAXSI=off: 3rd party naxsi module PASSENGER=off: 3rd party passenger module POSTGRES=off: 3rd party postgres module RDS_CSV=off: 3rd party rds_csv module RDS_JSON=off: 3rd party rds_json module REDIS2=off: 3rd party redis2 module RTMP=off: 3rd party rtmp module SET_MISC=off: 3rd party set_misc module SFLOW=off: 3rd party sflow module SHIBBOLETH=off: 3rd party shibboleth module SLOWFS_CACHE=off: 3rd party slowfs_cache module SRCACHE=off: 3rd party srcache module STS=off: 3rd party sts module VOD=off: 3rd party vod module VTS=off: 3rd party vts module XSS=off: 3rd party xss module WEBSOCKIFY=off: 3rd party websockify module ZSTD=off: 3rd party zstd module ====> GSSAPI implementation (imply HTTP_AUTH_KRB5): you can only select none or one of them GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal GSSAPI_MIT=off: GSSAPI support via security/krb5 ===> Use 'make config' to modify these settings
Options name:
www_nginx-devel
USES:
cpe compiler:env ssl ssl ssl
pkg-message:
For install:
Recent version of the NGINX introduces dynamic modules support. In FreeBSD ports tree this feature was enabled by default with the DSO knob. Several vendor's and third-party modules have been converted to dynamic modules. Unset the DSO knob builds an NGINX without dynamic modules support. To load a module at runtime, include the new `load_module' directive in the main context, specifying the path to the shared object file for the module, enclosed in quotation marks. When you reload the configuration or restart NGINX, the module is loaded in. It is possible to specify a path relative to the source directory, or a full path, please see https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ and http://nginx.org/en/docs/ngx_core_module.html#load_module for details. Default path for the NGINX dynamic modules is /usr/local/libexec/nginx.
Master Sites:
Expand this list (5 items)
Collapse this list.
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. https://nginx.org/download/
Collapse this list.

Number of commits found: 1223 (showing only 100 on this page)

[First Page]  «  3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  »  [Last Page]

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
0.8.12
31 Aug 2009 13:22:00
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.11 to 0.8.12.
Remove needless vendor patch.

<ChangeLog>

*) Feature: the "sendfile" parameter in the "aio" directive on FreeBSD.

*) Bugfix: in try_files; the bug had appeared in 0.8.11.

*) Bugfix: in memcached; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.11_1
31 Aug 2009 09:48:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add vendor patch for memcached module.
Update nginx_upload module from 2.0.9 to 2.0.10.
Update nginx_http_redis module from 0.1 to 0.1.1.

Bump PORTREVISION.
0.8.11
28 Aug 2009 16:13:10
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.10 to 0.8.11.
Remove needless extra patch.

<ChangeLog>

*) Change: directive "gzip_disable msie6" enables gzipping for
   MSIE 6.0 SV1.

*) Feature: file AIO support on FreeBSD and Linux.

*) Feature: the "directio_alignment" directive.

</ChangeLog>
0.8.10
24 Aug 2009 11:46:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.9 to 0.8.10.

<ChangeLog>

*) Bugfix: memory leaks if GeoIP City database was used.

*) Bugfix: in copying temporary files to permanent storage area; the
   bug had appeared in 0.8.9.

</ChangeLog>
0.8.9
24 Aug 2009 10:02:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add http_redis module support.
Add experimental file aio support.

Do not bump PORTREVISION cause new features are disabled by default.
0.8.9
18 Aug 2009 05:43:08
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.8 to 0.8.9.

<ChangeLog>

*) Feature: now the start cache loader runs in a separate process; this
   should improve large caches handling.

*) Feature: now temporarily files and permanent storage area may reside
   at different file systems.

</ChangeLog>
0.8.8
10 Aug 2009 10:32:38
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.7 to 0.8.8.

<ChangeLog>

*) Bugfix: in handling FastCGI headers split in records.

*) Bugfix: a segmentation fault occurred in worker process, if a
   request was handled in two proxied or FastCGIed locations and a
   caching was enabled in the first location; the bug had appeared in
   0.8.7.

</ChangeLog>
0.8.7
27 Jul 2009 16:56:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.6 to 0.8.7.

<ChangeLog>

*) Change: minimum supported OpenSSL version is 0.9.7.

*) Change: the "ask" parameter of the "ssl_verify_client" directive was
   changed to the "optional" parameter and now it checks a client
   certificate if it was offered.
   Thanks to Brice Figureau.

*) Feature: the $ssl_client_verify variable.
   Thanks to Brice Figureau.

*) Feature: the "ssl_crl" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.6
27 Jul 2009 05:59:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update mogilefs module from 1.0.1 to 1.0.2.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: directive mogilefs_methods and support for PUT and
   DELETE methods
*) Feature: dynamic evaluation of tracker name
*) Feature: ability to pass noverify parameter to tracker

</ChangeLog>
0.8.6
21 Jul 2009 13:53:14
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for http_geoip module (introduced in 0.8.6).
Do not bump PORTREVISION.
0.8.6
20 Jul 2009 09:04:55
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.5 to 0.8.6.

Add two new variables NGINX_ACCESSLOG and NGINX_ERRORLOG
to allow log paths customization, i.e.

% make NGINX_ACCESSLOG=/dev/null

NOTE.  If you want nginx to log errors into stderr it's
better to use

% make NGINX_ERRORLOG=stderr

instead of NGINX_ERRORLOG=/dev/stderr to avoid duplicate
error messages during startup.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.5
17 Jul 2009 06:12:47
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add two more third-party modules: http_mp4_streaming_lite
and http_notice_module.

Submitted by:   Konrad Lapsz aka konrad dot lapsz at gmail dot com
0.8.5
15 Jul 2009 16:56:10
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
0.8.5
15 Jul 2009 14:09:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Resort options to make third party modules distinguishable.
Apply these changes accordingly for stable and devel versions.
Do not bump PORTREVISIONs.

Submitted by:   Maxim Dounin aka mdounin at mdounin dot ru
0.8.5
15 Jul 2009 14:03:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix whitespaces.
0.8.5
13 Jul 2009 12:19:04
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.4 to 0.8.5.

<ChangeLog>

*) Bugfix: now nginx allows underscores in a request method.

*) Bugfix: a 500 error code was returned for invalid login/password
   while HTTP Basic authentication on Windows.

*) Bugfix: ngx_http_perl_module responses did not work in subrequests.

*) Bugfix: in ngx_http_limit_req_module.
   Thanks to Maxim Dounin.

</ChangeLog>
0.8.4_1
04 Jul 2009 09:47:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Really bump PORTREVISION by fix typo.

Pointy hat to:  osa
0.8.4
02 Jul 2009 10:31:13
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Default stop signal is SIGTERM, the quick shutdown.  Also nginx
understands QUIT signal for graceful (gradual) stop.

Add gracefulstop extra command accordingly for stable and devel
versions.
Bump PORTREVISIONs.

PR:     ports/136232 (partialy)
0.8.4
02 Jul 2009 09:13:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix typo.

Pointy hat to:  osa
0.8.4
02 Jul 2009 09:00:16
Original commit files touched by this commit Sanity Test Failure This port version is marked as vulnerable.
osa search for other commits by this committer
Fix X-Progress-ID argument parsing in third-party uploadprogress module.
Do not bump PORTREVISIONs.

PR:     ports/136064
0.8.4
26 Jun 2009 08:16:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add eval module version 1.0.1 accordingly.
Do not bump PORTREVISIONs.

WWW:    http://www.grid.net.ru/nginx/eval.en.html
0.8.4
22 Jun 2009 15:31:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger module support from 2.2.3 to 2.2.4.
Do not bump PORTREVISIONs.
0.8.4
22 Jun 2009 12:39:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.3 to 0.8.4.
Add WITHOUT_HTTP_CACHE knob.

<ChangeLog>

*) Bugfix: nginx could not be built --without-http-cache; the bug had
   appeared in 0.8.3.

</ChangeLog>
0.8.3
19 Jun 2009 13:48:07
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.2 to 0.8.3.

<ChangeLog>

*) Feature: the $upstream_cache_status variable.

*) Bugfix: nginx could not be built on MacOSX 10.6. the bug had
   appeared in 0.8.2.

*) Bugfix: nginx could not be built --without-http-cache; the bug had
   appeared in 0.8.2.

*) Bugfix: a segmentation fault occurred in worker process, if a
   backend 401 error was intercepted and the backend did not set the
   "WWW-Authenticate" response header line.
   Thanks to Eugene Mychlo.

</ChangeLog>
0.8.2
18 Jun 2009 06:54:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger module support from 2.2.2 to
fresh bug fix edition 2.2.3.
Do not bump PORTREVISIONs.
0.8.2
15 Jun 2009 10:37:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.1 to 0.8.2.

<ChangeLog>

*) Bugfix: in open_file_cache and proxy/fastcgi cache interaction on
   start up.

*) Bugfix: open_file_cache might cache open file descriptors too long.

</ChangeLog>
0.8.1
09 Jun 2009 19:37:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.0 to 0.8.1.

<ChangeLog>

*) Feature: the "updating" parameter in "proxy_cache_use_stale" and
   "fastcgi_cache_use_stale" directives.

*) Bugfix: the "If-Modified-Since", "If-Range", etc. client request
   header lines were passed to backend while caching if no
   "proxy_set_header" directive was used with any parameters.

*) Bugfix: the "Set-Cookie" and "P3P" response header lines were not
   hidden while caching if no "proxy_hide_header/fastcgi_hide_header"
   directives were used with any parameters.

*) Bugfix: the ngx_http_image_filter_module did not support GIF87a
   format.
   Thanks to Denis Ilyinyh.

*) Bugfix: nginx could not be built modules on Solaris 10 and early;
   the bug had appeared in 0.7.56.

</ChangeLog>
0.8.0
03 Jun 2009 12:59:53
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.59 to 0.8.0.
Remove IGNORE cause this is new development version (tree).
Update patch for fancyindex module.

<ChangeLog>

*) Feature: the "keepalive_requests" directive.

*) Feature: the "limit_rate_after" directive.
   Thanks to Ivan Debnar.

*) Bugfix: XLST filter did not work in subrequests.

*) Bugfix: in relative paths handling in nginx/Windows.

*) Bugfix: in proxy_store, fastcgi_store, proxy_cache, and
   fastcgi_cache in nginx/Windows.

*) Bugfix: in memory allocation error handling.
   Thanks to Maxim Dounin and Kirill A. Korinskiy.

</ChangeLog>
0.7.59
28 May 2009 19:48:11
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.6.37 to latest stable version 0.7.59.
Merge all features from -devel port.
Also mark -devel port IGNORE before new releases.
0.7.59
27 May 2009 19:22:37
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.58 to 0.7.59.

<ChangeLog>

*) Feature: the "proxy_cache_methods" and "fastcgi_cache_methods"
   directives.

*) Bugfix: socket leak; the bug had appeared in 0.7.25.
   Thanks to Maxim Dounin.

*) Bugfix: a segmentation fault occurred in worker process,
   if a request had no body and the $request_body variable was used;
   the bug had appeared in 0.7.58.

*) Bugfix: the SSL modules might not built on Solaris and Linux;
   the bug had appeared in 0.7.58.

*) Bugfix: ngx_http_xslt_filter_module responses were not handled by
   SSI, charset, and gzip filters.

*) Bugfix: a "charset" directive did not set a charset to
   ngx_http_gzip_static_module responses.

</ChangeLog>
0.7.58
18 May 2009 13:54:54
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.57 to 0.7.58.

<ChangeLog>

*) Feature: a "listen" directive of the mail proxy module supports IPv6.

*) Feature: the "image_filter_jpeg_quality" directive.

*) Feature: the "client_body_in_single_buffer" directive.

*) Feature: the $request_body variable.

*) Bugfix: in ngx_http_autoindex_module in file name links having a ":"
   symbol in the name.

*) Bugfix: "make upgrade" procedure did not work; the bug had appeared
   in 0.7.53.
   Thanks to Denis F. Latypoff.

</ChangeLog>
0.7.57
12 May 2009 13:05:30
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.56 to 0.7.57.

<ChangeLog>

*) Bugfix: a segmentation fault occurred in worker process, if the
   ngx_http_image_filter_module errors were redirected to named
   location; the bug had appeared in 0.7.56.

</ChangeLog>
0.7.56
12 May 2009 06:51:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.55 to 0.7.56.

<ChangeLog>

*) Feature: nginx/Windows supports IPv6 in a "listen" directive of the
   HTTP module.

*) Bugfix: in ngx_http_image_filter_module.

</ChangeLog>
0.7.55
06 May 2009 11:07:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.54 to 0.7.55.

<ChangeLog>

*) Bugfix: the http_XXX parameters in "proxy_cache_use_stale" and
   "fastcgi_cache_use_stale" directives did not work.

*) Bugfix: fastcgi cache did not cache header only responses.

*) Bugfix: of "select() failed (9: Bad file descriptor)" error in
   nginx/Unix and "select() failed (10022: ...)" error in nginx/Windows.

*) Bugfix: a segmentation fault might occur in worker process, if an
   "debug_connection" directive was used; the bug had appeared in
   0.7.54.

*) Bugfix: fix ngx_http_image_filter_module building errors.

*) Bugfix: the files bigger than 2G could not be transferred using
   $r->sendfile.
   Thanks to Maxim Dounin.

</ChangeLog>
0.7.54
04 May 2009 05:51:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.53 to 0.7.54.

<ChangeLog>

*) Feature: the ngx_http_image_filter_module.

*) Feature: the "proxy_ignore_headers" and "fastcgi_ignore_headers"
   directives.

*) Bugfix: a segmentation fault might occur in worker process, if an
   "open_file_cache_errors off" directive was used; the bug had
   appeared in 0.7.53.

*) Bugfix: the "port_in_redirect off" directive did not work; the bug
   had appeared in 0.7.39.

*) Bugfix: improve handling of "select" method errors.

*) Bugfix: of "select() failed (10022: ...)" error in nginx/Windows.

*) Bugfix: in error text descriptions in nginx/Windows; the bug had
   appeared in 0.7.53.

</ChangeLog>
0.7.53
30 Apr 2009 12:47:46
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Keep -DPASSENGER_DEBUG flag for third-party passenger module. [*]
Other way respect CXXFLAGS.
Do not bump PORTREVISION.

[*] Notice from:        Hongli Lai aka hongli at plan99 dot net
0.7.53
28 Apr 2009 10:58:45
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party passenger module from 2.2.1 to 2.2.2.
Do not bump PORTREVISION.
0.7.53
27 Apr 2009 14:16:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.52 to 0.7.53.
Respect compile/build flags for thirdparty passenger module.

<ChangeLog>

*) Change: now a log set by --error-log-path is created from the very
   start-up.

*) Feature: now the start up errors and warnings are outputted to an
   error_log and stderr.

*) Feature: the empty --prefix= configure parameter forces nginx to use
   a directory where it was run as prefix.

*) Feature: the -p switch.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.52
23 Apr 2009 08:59:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make third-party fancyindex module fetchable through place
tarball to MASTER_SITE_LOCAL.
Fix build third-party passenger module by add
bsd.port.options.mk and USE_RUBY.
Do not bump PORTREVISION.

Special thanks to:      pav, stas
0.7.52
21 Apr 2009 11:37:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.51 to 0.7.52.
Update third-party upload module from 2.0.8 to 2.0.9 and remove
needless extra patch.

Add support for third-party modules:
 o Phusion Passenger(tm) 2.2.1
 o mogilefs 1.0.1

<nginx development ChangeLog>

*) Feature: the first native Windows binary release.

*) Bugfix: in processing HEAD method while caching.

*) Bugfix: in processing the "If-Modified-Since", "If-Range", etc.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.51
13 Apr 2009 06:49:31
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Force commit due to note add in previous commit third-party
module uploadprogress.

Pointy hat to:  osa
0.7.51
13 Apr 2009 06:05:49
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.50 to 0.7.51.

<ChangeLog>

*) Feature: the "try_files" directive supports a response code in the
   fallback parameter.

*) Feature: now any response code can be used in the "return" directive.

*) Bugfix: the "error_page" directive made an external redirect without
   query string; the bug had appeared in 0.7.44.

*) Bugfix: if servers listened on several defined explicitly addresses,
   then virtual servers might not work; the bug had appeared in 0.7.39.

</ChangeLog>
0.7.50
07 Apr 2009 10:10:47
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix MASTER_SITE_SUBDIR for upstream_fair module.
Do not bump PORTREVISION.

Notice from:    Gergely CZUCZY <gergely.czuczy@harmless.hu>
0.7.50
06 Apr 2009 14:04:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.47 to 0.7.50.
Add third-party upstream fair module. [*]

[*] Requested by:       Gergely CZUCZY <gergely.czuczy@harmless.hu>
[*] Redistribution OK:  Grzegorz Nosek <root@localdomain.pl> (author)

<ChangeLog>

Changes with nginx 0.7.50

*) Bugfix: the $arg_... variables did not work; the bug had appeared
   in 0.7.49.

Changes with nginx 0.7.49
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.47
01 Apr 2009 17:30:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.45 to 0.7.47.

<ChangeLog>

*) Bugfix: nginx could not be built on FreeBSD 6 and early versions;
   the bug had appeared in 0.7.46.

*) Bugfix: nginx could not be built on MacOSX; the bug had
   appeared in 0.7.46.

*) Bugfix: if the "max_size" parameter was set, then the cache manager
   might purge a whole cache; the bug had appeared in 0.7.46.

*) Change: a segmentation fault might occur in worker process, if the
   "proxy_cache"/"fastcgi_cache" and the "proxy_cache_valid"/
   "fastcgi_cache_valid" were set on different levels; the bug had
   appeared in 0.7.46.

*) Bugfix: a segmentation fault might occur in worker process, if a
   request was redirected to a proxied or FastCGI server via error_page
   or try_files; the bug had appeared in 0.7.44.

</ChangeLog>
0.7.45
31 Mar 2009 13:56:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make additional modules fetchable.
Do not bump PORTREVISION cause additional modules
are disabled by default.

Problem found:  Andrew Clark aka andrewclarkii at gmail dot com
Patch idea:     az
No cookie for:  az
0.7.45
30 Mar 2009 10:29:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.44 to 0.7.45.

<ChangeLog>

*) Change: now the "proxy_cache" and the "proxy_cache_valid"
   can be set on different levels.

*) Change: the "clean_time" parameter of the "proxy_cache_path"
   directive is canceled.

*) Feature: the "max_size" parameter of the "proxy_cache_path"
   directive.

*) Feature: the ngx_http_fastcgi_module preliminary cache support.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.44
26 Mar 2009 14:03:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for http_gzip_static module.
Do not bump PORTREVISION.

Patch from:     MZ aka zuborg at advancedhosters dot com
0.7.44
24 Mar 2009 15:07:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make modules fetchable by fix MASTER_SITES.
Do not bump PORTREVISION cause modules are disabled by default.

Problem and fix found by:       az
0.7.44
24 Mar 2009 10:15:07
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.43 to 0.7.44.
Add MAKE_JOBS_SAFE.
Add quick fix for nginx_upload_module due to changes in
ngx_conf_merge_path_value() function.

<ChangeLog>

*) Feature: the ngx_http_proxy_module preliminary cache support.

*) Feature: the --with-pcre option in the configure.

*) Feature: the "try_files" directive is now allowed on the server
   block level.

*) Bugfix: the "try_files" directive handled incorrectly a query string
   in a fallback parameter.

*) Bugfix: the "try_files" directive might test incorrectly directories.

*) Bugfix: if there is the single server for given address:port pair,
   then captures in regular expressions in a "server_name" directive
   did not work.

</ChangeLog>
0.7.43
18 Mar 2009 13:18:14
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.42 to 0.7.43.

<ChangeLog>

*) Bugfix: a request was handled incorrectly, if a "root" directive
   used variables; the bug had appeared in 0.7.42.

*) Bugfix: if a server listened on wildcard address, then the
   $server_addr variable value was "0.0.0.0"; the bug had appeared in
   0.7.36.

</ChangeLog>
0.7.42
16 Mar 2009 08:57:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.41 to 0.7.42.

<ChangeLog>

*) Change: now the "Invalid argument" error returned by
   setsockopt(TCP_NODELAY) on Solaris, is ignored.

*) Change: now if a file specified in a "auth_basic_user_file"
   directive is absent, then the 405 error is returned instead of the
   500 one.

*) Feature: the "auth_basic_user_file" directive supports variables.
   Thanks to Kirill A. Korinskiy.

*) Feature: the "listen" directive supports the "ipv6only" parameter.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.41
11 Mar 2009 15:57:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.40 to 0.7.41.

<ChangeLog>

*) Bugfix: a segmentation fault might occur in worker process, if a
   "server_name" or a "location" directives had captures in regular
   expressions; the issue had appeared in 0.7.40.
   Thanks to Vladimir Sopot.

</ChangeLog>
0.7.40
10 Mar 2009 09:43:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.39 to 0.7.40.

<ChangeLog>

*) Feature: the "location" directive supports captures in regular
   expressions.

*) Feature: an "alias" directive with capture references may be used
   inside a location given by a regular expression with captures.

*) Feature: the "server_name" directive supports captures in regular
   expressions.

*) Workaround: the ngx_http_autoindex_module did not show the trailing
   slash in directories on XFS filesystem; the issue had appeared in
   0.7.15.
   Thanks to Dmitry Kuzmenko.

</ChangeLog>
0.7.39
05 Mar 2009 18:11:52
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update HTTP_RESPONSE module from 0.2 to 0.3.
Change build schema from patch to distro.
Do not bump PORTREVISION.

Notice from:    Kirill A. Korinskiy aka catap at catap dot ru [author]
0.7.39
02 Mar 2009 13:06:51
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.38 to 0.7.39.
Add IPv6 support (introduced in 0.7.36).

<ChangeLog>

*) Bugfix: large response with SSI might hang, if gzipping was enabled;
   the bug had appeared in 0.7.28.
   Thanks to Artem Bokhan.

*) Bugfix: a segmentation fault might occur in worker process, if short
   static variants are used in a "try_files" directive.

</ChangeLog>
0.7.38
24 Feb 2009 09:14:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.35 to 0.7.38.

<ChangeLog>

Changes with nginx 0.7.38

*) Feature: authentication failures logging.

*) Bugfix: name/password in auth_basic_user_file were ignored after odd
   number of empty lines.
   Thanks to Alexander Zagrebin.

*) Bugfix: a segmentation fault occurred in a master process, if long
   path was used in unix domain socket; the bug had appeared in 0.7.36.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.35
16 Feb 2009 15:11:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.34 to 0.7.35.

<ChangeLog>

*) Bugfix: a "ssl_engine" directive did not use a SSL-accelerator for
   asymmetric ciphers.
   Thanks to Marcin Gozdalik.

*) Bugfix: a "try_files" directive set MIME type depending on an
   original request extension.

*) Bugfix: "*domain.tld" names were handled incorrectly in
   "server_name", "valid_referers", and "map" directives, if an
   ".domain.tld" and ".subdomain.domain.tld" wildcards were used;
   the bug had appeared in 0.7.9.

</ChangeLog>
0.7.34
10 Feb 2009 19:42:17
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.33 to 0.7.34.

<ChangeLog>

*) Feature: the "off" parameter of the "if_modified_since" directive.

*) Feature: now nginx sends an HELO/EHLO command after a XCLIENT
   command.
   Thanks to Maxim Dounin.

*) Feature: Microsoft specific "AUTH LOGIN with User Name" mode support
   in mail proxy server.
   Thanks to Maxim Dounin.

*) Bugfix: in a redirect rewrite directive original arguments were
   concatenated with new arguments by an "?" rather than an "&";
   the bug had appeared in 0.1.18.
   Thanks to Maxim Dounin.

*) Bugfix: nginx could not be built on AIX.

</ChangeLog>
0.7.33
10 Feb 2009 19:30:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add zip module (mod_zip-1.1.4) support.
Do not bump PORTREVISION.

Thanks to:      Evan Miller (http://www.evanmiller.org/) [author]
0.7.33
09 Feb 2009 07:11:29
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add fancyindex module support. [1]
Make fancyindex module linkable for 0.7.X. [2]
Do not bump PORTREVISION.

Spotted by:     Rafal Szkodzinski <uid at atnus dot com> [1]
Obtained from:  Russian nginx maillist <nginx-ru at sysoev dot ru> [2]
Author:         Sergey Bochenkov <bachan at j3qq4 dot org> [2]
0.7.33
09 Feb 2009 06:58:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make accesskey module fetchable by fix MASTER_SITE_SUBDIR.
Do not bump PORTREVISION.
0.7.33
02 Feb 2009 13:15:45
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.32 to 0.7.33.

[*] Add support for http_accesskey module from
http://wiki.codemongers.com/NginxHttpAccessKeyModule.

[*] Spotted by: Andrey Belashkov aka manager at capsida dot net

<ChangeLog>

*) Bugfix: a double response might be returned if the epoll or rtsig
   methods are used and a redirect was returned to a request with
   body.
   Thanks to Eden Li.

*) Bugfix: the $sent_http_location variable was empty for some
   redirects types.

*) Bugfix: a segmentation fault might occur in worker process if
   "resolver" directive was used in SMTP proxy.

</ChangeLog>
0.7.32
27 Jan 2009 09:43:16
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.31 to 0.7.32.

<ChangeLog>

*) Feature: now a directory existence testing can be set explicitly in
   the "try_files" directive.

*) Bugfix: fastcgi_store stored files not always.

*) Bugfix: in geo ranges.

*) Bugfix: in shared memory allocations if nginx was built without
   debugging.
   Thanks to Andrey Kvasov.

</ChangeLog>
0.7.31
20 Jan 2009 11:41:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.30 to 0.7.31.

<ChangeLog>

*) Change: now the "try_files" directive tests files only and ignores
   directories.

*) Feature: the "fastcgi_split_path_info" directive.

*) Bugfixes in an "Expect" request header line support.

*) Bugfixes in geo ranges.

*) Bugfix: in a miss case ngx_http_memcached_module returned the "END"
   line as response body instead of default 404 page body; the bug had
   appeared in 0.7.18.
   Thanks to Maxim Dounin.

*) Bugfix: while SMTP proxying nginx issued message "250 2.0.0 OK"
   instead of "235 2.0.0 OK"; the bug had appeared in 0.7.22.
   Thanks to Maxim Dounin.

</ChangeLog>
0.7.30
29 Dec 2008 09:31:11
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update http_response module from 0.1 to 0.2.

Requested by:   Kirill A. Korinskiy <catap at catap dot ru> (author)
0.7.30
25 Dec 2008 07:28:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.28 to 0.7.30.

<ChangeLog>

Changes with nginx 0.7.30

*) Bugfix: a segmentation fault occurred in worker process, if
   variables were used in the "fastcgi_pass" and "proxy_pass"
   directives and host name must be resolved; the bug had appeared in
   0.7.29.

Changes with nginx 0.7.29

*) Bugfix: the "fastcgi_pass" and "proxy_pass" directives did not
   support variables if unix domain sockets were used.

*) Bugfixes in subrequest processing; the bugs had appeared in 0.7.25.

*) Bugfix: a "100 Continue" response was issued for HTTP/1.0 requests;
   Thanks to Maxim Dounin.

*) Bugfix: in memory allocation in the ngx_http_gzip_filter_module on
   Cygwin.

</ChangeLog>
0.7.28
22 Dec 2008 13:38:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.27 to 0.7.28.

<ChangeLog>

*) Change: in memory allocation in the ngx_http_gzip_filter_module.

*) Change: the default "gzip_buffers" directive values have been
   changed to 32 4k or 16 8k from 4 4k/8k.

</ChangeLog>
0.7.27
22 Dec 2008 07:57:32
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update nginx upload module from 2.0.7 to 2.0.8.
Do not bump PORTREVISION.

<ChangeLog>

 Change: support for named locations
 Fixed bug: crash on missing Content-Type request header
 Fixed bug: compilation problem on amd 64

</ChangeLog>
0.7.27
15 Dec 2008 12:09:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.26 to 0.7.27.

<ChangeLog>

*) Feature: the "try_files" directive.

*) Feature: variables support in the "fastcgi_pass" directive.

*) Feature: now the $geo variable may get an address from a variable.
   Thanks to Andrei Nigmatulin.

*) Feature: now a location's modifier may be used without space before
   name.

*) Feature: the $upstream_response_length variable.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.26
09 Dec 2008 11:20:49
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.24 to 0.7.26.

<ChangeLog>

Changes with nginx 0.7.26

*) Bugfix: in subrequest processing; the bug had appeared in 0.7.25.

Changes with nginx 0.7.25

*) Change: in subrequest processing.

*) Change: now POSTs without "Content-Length" header line are allowed.

*) Bugfix: now the "limit_req" and "limit_conn" directives log a
   prohibition reason.

*) Bugfix: in the "delete" parameter of the "geo" directive.

</ChangeLog>
0.7.24
03 Dec 2008 08:32:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.22 to 0.7.24.

<ChangeLog>

Changes with nginx 0.7.24

*) Feature: the "if_modified_since" directive.

*) Bugfix: nginx did not process a FastCGI server response, if the
   server send too many messages to stderr before response.

*) Bugfix: the "$cookie_..." variables did not work in the SSI and the
   perl module.

Changes with nginx 0.7.23

*) Feature: the "delete" and "ranges" parameters in the "geo" directive.

*) Feature: speeding up loading of geo base with large number of values.

*) Feature: decrease of memory required for geo base load.

</ChangeLog>
0.7.22
21 Nov 2008 07:53:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.21 to 0.7.22.

<ChangeLog>

*) Feature: the "none" parameter in the "smtp_auth" directive.
   Thanks to Maxim Dounin.

*) Feature: the "$cookie_..." variables.

*) Bugfix: the "directio" directive did not work in XFS filesystem.

*) Bugfix: the resolver did not understand big DNS responses.
   Thanks to Zyb.

</ChangeLog>
0.7.21
12 Nov 2008 08:14:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.19 to 0.7.21.

<ChangeLog>

Changes with nginx 0.7.21                                        11 Nov 2008

*) Changes in the ngx_http_limit_req_module.

*) Feature: the EXSLT support in the ngx_http_xslt_module.
   Thanks to Denis F. Latypoff.

*) Workaround: compatibility with glibc 2.3.
   Thanks to Eric Benson and Maxim Dounin.

*) Bugfix: nginx could not run on MacOSX 10.4 and earlier; the bug had
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.19
29 Oct 2008 11:17:25
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add http_upstream_keepalive module version 0.1.
Thanks to Maxim Dounin <mdounin at mdounin dot ru> (author).

Do not bump PORTREVISION.
0.7.19
22 Oct 2008 07:36:57
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add nginx_response_module version 0.1.

Do not bump PORTREVISION.
0.7.19
21 Oct 2008 06:09:00
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update nginx_upload_module from 2.0.6 to 2.0.7.
Also illuminate two new modules at config stage.

Do not bump PORTREVISION.
0.7.19
15 Oct 2008 07:32:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.17 to 0.7.19.

<ChangeLog>

Changes with nginx 0.7.19                                        13 Oct 2008

*) Bugfix: version number update.

Changes with nginx 0.7.18                                        13 Oct 2008

*) Change: the "underscores_in_headers" directive; now nginx does not
   allows underscores in a client request header line names.

*) Feature: the ngx_http_secure_link_module.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.17
23 Sep 2008 06:52:11
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.14 to 0.7.17.

<ChangeLog>

Changes with nginx 0.7.17

*) Feature: now the "directio" directive works on Linux.

*) Feature: the $pid variable.

*) Bugfix: the "directio" optimization that had appeared in 0.7.15 did
   not work with open_file_cache.

*) Bugfix: the "access_log" with variables did not work on Linux; the
   bug had appeared in 0.7.7.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.14
02 Sep 2008 03:56:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.13 to 0.7.14.

<ChangeLog>

*) Change: now the ssl_certificate and ssl_certificate_key directives
   have not default values.

*) Feature: the "listen" directive supports the "ssl" parameter.

*) Feature: now nginx takes into account a time zone change while
   reconfiguration on FreeBSD and Linux.

*) Bugfix: the "listen" directive parameters such as "backlog",
   "rcvbuf", etc. were not set, if a default server was not the first
   one.

*) Bugfix: if URI part captured by a "rewrite" directive was used as a
   query string, then the query string was not escaped.

*) Bugfix: configuration file validity test improvements.

</ChangeLog>
0.7.13
29 Aug 2008 09:01:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Incorporate nginx_upload_module into nginx-devel port.
The module's information available at
http://www.grid.net.ru/nginx/upload.en.html

Thanks to Valery Kholodkov aka valery+nginx at grid dot net dot ru
for fresh 2.0.6 release.

Do not bump PORTREVISION.
0.7.13
27 Aug 2008 08:15:21
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.11 to 0.7.13.

<ChangeLog>

Changes with nginx 0.7.13

*) Bugfix: nginx could not be built on Linux and Solaris; the bug had
   appeared in 0.7.12.

Changes with nginx 0.7.12

*) Feature: the "server_name" directive supports empty name "".

*) Feature: the "gzip_disable" directive supports special "msie6" mask.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.11
18 Aug 2008 14:54:11
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.10 to 0.7.11.

<ChangeLog>

*) Change: now ngx_http_charset_module does not work by default with
   text/css MIME type.

*) Feature: now nginx returns the 405 status code for POST method
   requesting a static file only if the file exists.

*) Feature: the "proxy_ssl_session_reuse" directive.

*) Bugfix: a "proxy_pass" directive without URI part might use original
   request after the "X-Accel-Redirect" redirection was used;

*) Bugfix: if a directory has search only rights and the first index
   file was absent, then nginx returned the 500 status code.

*) Bugfix: in inclusive locations; the bugs had appeared in 0.7.1.

</ChangeLog>
0.7.10
14 Aug 2008 06:37:05
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.9 to 0.7.10.

<ChangeLog>

*) Bugfix: in the "addition_types", "charset_types", "gzip_types",
   "ssi_types", "sub_filter_types", and "xslt_types" directives; the
   bugs had appeared in 0.7.9.

*) Bugfix: of recursive error_page for 500 status code.

*) Bugfix: now the ngx_http_realip_module set address not for whole
   keepalive connection, but for each request passed via the connection.

</ChangeLog>
0.7.9
13 Aug 2008 06:34:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.8 to 0.7.9.

<ChangeLog>

*) Change: now ngx_http_charset_module works by default with following
   MIME types: text/html, text/css, text/xml, text/plain,
   text/vnd.wap.wml, application/x-javascript, and application/rss+xml.

*) Feature: the "charset_types" and "addition_types" directives.

*) Feature: now the "gzip_types", "ssi_types", and "sub_filter_types"
   directives use hash.

*) Feature: the ngx_cpp_test_module.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.8
05 Aug 2008 08:11:07
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.7 to 0.7.8.
Add new module knob WITH_HTTP_XSLT_MODULE.

<ChangeLog>

*) Feature: the ngx_http_xslt_module.

*) Feature: the "$arg_..." variables.

*) Feature: Solaris directio support.
   Thanks to Ivan Debnar.

*) Bugfix: now if FastCGI server sends a "Location" header line without
   status line, then nginx uses 302 status code.
   Thanks to Maxim Dounin.

</ChangeLog>
0.7.7
30 Jul 2008 15:21:16
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.6 to 0.7.7.
Remove useless function from rc script.
Cleanup whitespaces.

<ChangeLog>

*) Change: now the EAGAIN error returned by connect() is not considered
   as temporary error.

*) Change: now the $ssl_client_cert variable value is a certificate
   with TAB character intended before each line except first one; an
   unchanged certificate is available in the $ssl_client_raw_cert
   variable.

*) Feature: the "ask" parameter in the "ssl_verify_client" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.6_2
22 Jul 2008 05:55:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
[1] Don't remove NGINX_TMPDIR directory, if port upgrade running. (*)

[2] Add extra command upgrade for rc, allowing to change binary
on-the-fly without loosing any single request.

Remove empty string from rc.
Bump PORTREVISION.

[1,2] Problems reported by:     Maxim Dounin aka mdounin at mdounin dot ru
PR's:                           125762,125766
(*) Undocumented feature from:  skv@
0.7.6_1
14 Jul 2008 06:57:48
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix rc's reload command issue.
Bump PORTREVISION.

Problem reported by:    Maxim Dounin aka mdounin at mdounin dot ru
0.7.6
07 Jul 2008 14:00:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.5 to 0.7.6.
Add perl5 category wheh perl-specific defined.

<ChangeLog>

*) Bugfix: now if variables are used in the "access_log" directive a
   request root existence is always tested.

*) Bugfix: the ngx_http_flv_module did not support several values in a
   query string.

</ChangeLog>
0.7.5
01 Jul 2008 08:19:04
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.3 to 0.7.5.
Add profiles support (adopt rc from www/apache22). (*)
Update CONFLICTS.

Idea from PR:           ports/124940
Special thanks to:      az@ (*)

<ChangeLog>

Changes with nginx 0.7.5                                     01 Jul 2008

*) Bugfixes in variables support in the "access_log" directive; the bug
   had appeared in 0.7.4.

*) Bugfix: nginx could not be built --without-http_gzip_module; the bug
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.3
23 Jun 2008 11:13:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.2 to 0.7.3.

<ChangeLog>

*) Change: the "rss" extension MIME type has been changed to
   "application/rss+xml".

*) Change: now the "gzip_vary" directive turned on issues a
   "Vary: Accept-Encoding" header line for uncompressed responses too.

*) Feature: now the "rewrite" directive does a redirect automatically
   if the "https://" protocol is used.

*) Bugfix: the "proxy_pass" directive did not work with the HTTPS
   protocol; the bug had appeared in 0.6.9.

</ChangeLog>
0.7.2
17 Jun 2008 10:04:25
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.0 to 0.7.2.

<ChangeLog>

Changes with nginx 0.7.2                                         16 Jun 2008

    *) Feature: now nginx supports EDH key exchange ciphers.

    *) Feature: the "ssl_dhparam" directive.

    *) Feature: the $ssl_client_cert variable.
       Thanks to Manlio Perillo.

    *) Bugfix: after changing URI via a "rewrite" directive nginx did not
       search a new location; bug appeared in 0.7.1.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.0
19 May 2008 11:54:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update to latest development version 0.7.0.
NOTE: 0.6.31 moving to www/nginx as stable version soon.

<ChangeLog>

*) Change: now the 0x00-0x1F, '"' and '\' characters are escaped as
   \xXX in an access_log.
   Thanks to Maxim Dounin.

*) Change: now nginx allows several "Host" request header line.

*) Feature: the "modified" flag in the "expires" directive.

*) Feature: the $uid_got and $uid_set variables may be used at any
   request processing stage.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.6.31
13 May 2008 08:12:55
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update to 0.6.31.

<ChangeLog>

*) Bugfix: nginx did not process FastCGI response if header was at the
   end of FastCGI record; bug appeared in 0.6.2.
   Thanks to Sergey Serov.

*) Bugfix: a segmentation fault might occur in worker process if a file
   was deleted and the "open_file_cache_errors" directive was off.

</ChangeLog>
0.6.30
30 Apr 2008 09:10:46
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update to 0.6.30.

<ChangeLog>

    *) Change: now if an "include" directive pattern does not match any
       file, then nginx does not issue an error.

    *) Feature: now the time in directives may be specified without spaces,
       for example, "1h50m".

    *) Bugfix: memory leaks if the "ssl_verify_client" directive was on.
       Thanks to Chavelle Vincent.

    *) Bugfix: the "sub_filter" directive might set text to change into
       output.

    *) Bugfix: the "error_page" directive did not take into account
       arguments in redirected URI.

    *) Bugfix: now nginx always opens files in binary mode under Cygwin.

    *) Bugfix: nginx could not be built on OpenBSD; bug appeared in 0.6.15.

</ChangeLog>
0.6.29
20 Mar 2008 08:42:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.6.28 to 0.6.29.
Add knob GOOGLE_PERTOOLS.

<ChangeLog>

    *) Feature: the ngx_google_perftools_module.

    *) Bugfix: the ngx_http_perl_module could be not built on 64-bit
       platforms; bug appeared in 0.6.27.

</ChangeLog>
0.6.28
13 Mar 2008 08:06:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.6.26 to 0.6.28.

<ChangeLog>

Changes with nginx 0.6.28                                        13 Mar 2008

    *) Bugfix: the rtsig method could be not built; bug appeared in 0.6.27.

Changes with nginx 0.6.27                                        12 Mar 2008

    *) Change: now by default the rtsig method is not built on
       Linux 2.6.18+.

    *) Change: now a request method is not changed while redirection to a
       named location via an "error_page" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.6.26
13 Feb 2008 08:52:38
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.6.25 to 0.6.26.

<ChangeLog>

    *) Bugfix: the "proxy_store" and "fastcgi_store" directives did not
       check a response length.

    *) Bugfix: a segmentation fault occurred in worker process, if big
       value was used in a "expires" directive.
       Thanks to Joaquin Cuenca Abela.

    *) Bugfix: nginx incorrectly detected cache line size on Pentium 4.
       Thanks to Gena Makhomed.

    *) Bugfix: in proxied or FastCGI subrequests a client original method
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.6.25
22 Jan 2008 07:40:57
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix wrong mailproxy-specific (imap/pop3/smtp) configure keys.
By default all mailproxy options are off.
Do not bump PORTREVISION.

Problem found by:       Anton Yuzhaninov aka citrin at rambler-co dot ru

Number of commits found: 1223 (showing only 100 on this page)

[First Page]  «  3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  »  [Last Page]