FreshPorts -- The Place For Ports notbugIf you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
nginx-devel Robust and small WWW server
1.15.1_2 www on this many watch lists=29 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 15 Jun 2007 08:23:21
Also Listed In: ipv6
License: BSD2CLAUSE
NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Homepage : PortsMon
    Pseudo-pkg-plist information, but much better, from make generate-plist
    Expand this list (78 items)
  1. /usr/local/share/licenses/nginx-devel-1.15.1_2/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.15.1_2/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.15.1_2/BSD2CLAUSE
  4. @comment @sample etc/fdfs/mod_fastdfs.conf.sample
  5. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  6. etc/nginx/koi-utf
  7. etc/nginx/koi-win
  8. @comment etc/nginx/naxsi_core.rules
  9. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  10. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  11. etc/nginx/win-utf
  12. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  13. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  14. @comment libexec/nginx/ngx_http_array_var_module.so
  15. @comment libexec/nginx/ngx_http_aws_auth_module.so
  16. @comment libexec/nginx/ngx_http_brotli_filter_module.so
  17. @comment libexec/nginx/ngx_http_brotli_static_module.so
  18. @comment libexec/nginx/ngx_http_clojure_module.so
  19. @comment libexec/nginx/ngx_ssl_ct_module.so
  20. @comment libexec/nginx/ngx_http_ssl_ct_module.so
  21. @comment libexec/nginx/ngx_http_echo_module.so
  22. @comment libexec/nginx/ngx_dynamic_upstream_module.so
  23. @comment libexec/nginx/ndk_http_module.so
  24. @comment libexec/nginx/ngx_http_encrypted_session_module.so
  25. @comment libexec/nginx/ngx_http_fastdfs_module.so
  26. @comment libexec/nginx/ngx_http_form_input_module.so
  27. @comment libexec/nginx/ngx_http_headers_more_filter_module.so
  28. @comment libexec/nginx/ngx_http_auth_digest_module.so
  29. @comment libexec/nginx/ngx_http_auth_spnego_module.so
  30. @comment libexec/nginx/ngx_http_auth_ldap_module.so
  31. @comment libexec/nginx/ngx_http_auth_pam_module.so
  32. @comment libexec/nginx/ngx_http_eval_module.so
  33. @comment libexec/nginx/ngx_http_fancyindex_module.so
  34. @comment libexec/nginx/ngx_http_geoip_module.so
  35. @comment libexec/nginx/ngx_http_geoip2_module.so
  36. @comment libexec/nginx/ngx_stream_geoip2_module.so
  37. @comment libexec/nginx/ngx_http_image_filter_module.so
  38. @comment libexec/nginx/ngx_http_perl_module.so
  39. @comment libexec/nginx/ngx_nchan_module.so
  40. @comment libexec/nginx/ngx_http_redis_module.so
  41. @comment libexec/nginx/ngx_http_tnt_module.so
  42. @comment libexec/nginx/ngx_http_upload_module.so
  43. @comment libexec/nginx/ngx_http_uploadprogress_module.so
  44. @comment libexec/nginx/ngx_http_upstream_fair_module.so
  45. @comment libexec/nginx/ngx_http_xslt_filter_module.so
  46. @comment libexec/nginx/ngx_http_iconv_module.so
  47. @comment libexec/nginx/ngx_http_lua_module.so
  48. libexec/nginx/ngx_mail_module.so
  49. @comment libexec/nginx/ngx_http_memc_module.so
  50. @comment libexec/nginx/ngx_http_naxsi_module.so
  51. @comment libexec/nginx/ngx_http_js_module.so
  52. @comment libexec/nginx/ngx_stream_js_module.so
  53. @comment libexec/nginx/ngx_http_passenger_module.so
  54. @comment libexec/nginx/ngx_http_redis2_module.so
  55. @comment libexec/nginx/ngx_rtmp_module.so
  56. @comment libexec/nginx/ngx_http_set_misc_module.so
  57. @comment libexec/nginx/ngx_http_shibboleth_module.so
  58. @comment libexec/nginx/ngx_http_small_light_module.so
  59. @comment libexec/nginx/ngx_http_srcache_filter_module.so
  60. libexec/nginx/ngx_stream_module.so
  61. @comment libexec/nginx/ngx_http_vod_module.so
  62. @postexec mkdir -p -m 755 %D/www/nginx-dist
  63. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  64. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  65. www/nginx-dist/index.html
  66. www/nginx-dist/50x.html
  67. @postexec chmod a-w %D/www/nginx-dist
  68. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  69. sbin/nginx
  70. share/vim/vimfiles/ftdetect/nginx.vim
  71. share/vim/vimfiles/ftplugin/nginx.vim
  72. share/vim/vimfiles/indent/nginx.vim
  73. share/vim/vimfiles/syntax/nginx.vim
  74. @dir /var/tmp/nginx
  75. @dir /var/log/nginx
  76. man/man8/nginx.8.gz
  77. @comment %%SITE_ARCH%%/auto/nginx/nginx.so
  78. @comment %%SITE_ARCH%%/nginx.pm
  79. Collapse this list.

To install the port: cd /usr/ports/www/nginx-devel/ && make install clean
To add the package: pkg install nginx-devel

PKGNAME: nginx-devel

distinfo:

TIMESTAMP = 1531801682
SHA256 (nginx-1.15.1.tar.gz) = c7206858d7f832b8ef73a45c9b8f8e436bcb1ee88db2bc85b8e438ecec9d5460
SIZE (nginx-1.15.1.tar.gz) = 1024086
SHA256 (ngx_cache_purge-2.3.tar.gz) = 279e0d8a46d3b1521fd43b3f78bc1c08b263899142a7cc5058c1c0361a92c89c
SIZE (ngx_cache_purge-2.3.tar.gz) = 12248
SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae
SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208
SHA256 (nginx_mod_h264_streaming-2.2.7.tar.gz) = 6d974ba630cef59de1f60996c66b401264a345d25988a76037c2856cec756c19
SIZE (nginx_mod_h264_streaming-2.2.7.tar.gz) = 44012
SHA256 (ngx_http_redis-0.3.9.tar.gz) = 21f87540f0a44b23ffa5df16fb3d788bc90803b255ef14f9c26e3847a6f26f46
SIZE (ngx_http_redis-0.3.9.tar.gz) = 13051
SHA256 (ngx_http_response-0.3.tar.gz) = 0835584029f053051c624adbe33a826ab0205c9d85a02af6019e6b57607e9045
SIZE (ngx_http_response-0.3.tar.gz) = 2244
SHA256 (modsecurity-2.9.2.tar.gz) = 41a8f73476ec891f3a9e8736b98b64ea5c2105f1ce15ea57a1f05b4bf2ffaeb5
SIZE (modsecurity-2.9.2.tar.gz) = 4298993
SHA256 (passenger-5.3.3.tar.gz) = 97c4f023894215ac672cc6515cc22a74167a2ee4937709e267065a80c716c90f
SIZE (passenger-5.3.3.tar.gz) = 7040055
SHA256 (ngx_slowfs_cache-1.10.tar.gz) = 1e81453942e5b0877de1f1f06c56ae82918ea9818255cb935bcb673c95a758a1
SIZE (ngx_slowfs_cache-1.10.tar.gz) = 11809
SHA256 (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 9e3f78ea73e2d606a95ee64fd3affa4c249f9b342e66b6b11b63061791f28316
SIZE (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 109704
SHA256 (anomalizer-ngx_aws_auth-f1bcf3b_GH0.tar.gz) = e250ce159a10dfbfa0d665870436d706a2dd95c3bd72db06253ec12d1e9e19f3
SIZE (anomalizer-ngx_aws_auth-f1bcf3b_GH0.tar.gz) = 15369
SHA256 (eustas-ngx_brotli-e26248e_GH0.tar.gz) = 915d35ecbc58ceb20f8d1b9463719f9934ca24f5a5ab261f44cb8263f8c5aa0f
SIZE (eustas-ngx_brotli-e26248e_GH0.tar.gz) = 12673
SHA256 (nginx-clojure-nginx-clojure-1129712_GH0.tar.gz) = 2be00e9a51241f70d3eb38c0063400963e4f20f3ec4c6dea2affdd6ae50d4db3
SIZE (nginx-clojure-nginx-clojure-1129712_GH0.tar.gz) = 624143
SHA256 (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 72fdd125b9207cdda135f368095f85b943a78a4ff004d1cd217972e12b1571b2
SIZE (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 7224
SHA256 (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 88e05a99a8a7419066f5ae75966fb1efc409bad4522d14986da074554ae61619
SIZE (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 66455
SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80
SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280
SHA256 (openresty-drizzle-nginx-module-b4f94ec_GH0.tar.gz) = 68f3781c989da36a20513741321076e3a627dac8b635c9d34242376c6c8d76b4
SIZE (openresty-drizzle-nginx-module-b4f94ec_GH0.tar.gz) = 50864
SHA256 (cubicdaiya-ngx_dynamic_upstream-v0.1.6_GH0.tar.gz) = 056fcd63cab39c2f0144d6a8c3ce16e8ae2cfb6e02ad66e5972ffeeca6c6a4d3
SIZE (cubicdaiya-ngx_dynamic_upstream-v0.1.6_GH0.tar.gz) = 11015
SHA256 (openresty-echo-nginx-module-c65f5c6_GH0.tar.gz) = aea1d10d9175a6471b34d436df937b5c97e7ba1ac4b4b2582a2cb6716d7fba4b
SIZE (openresty-echo-nginx-module-c65f5c6_GH0.tar.gz) = 53121
SHA256 (openresty-encrypted-session-nginx-module-v0.08_GH0.tar.gz) = 6e526ea097c6805ec2cf1d0d3d79ed24326bc2d0babe158c29edd07d8c0d106a
SIZE (openresty-encrypted-session-nginx-module-v0.08_GH0.tar.gz) = 11802
SHA256 (happyfish100-fastdfs-nginx-module-85347be_GH0.tar.gz) = 00bbcc70bfd711cd67ca685ad5620764c54be13f95299b8a5d175cdeb10b6d3c
SIZE (happyfish100-fastdfs-nginx-module-85347be_GH0.tar.gz) = 19835
SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106
SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090
SHA256 (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = ef843824e0aac1dd60b392802861cc06426a4bc5f87d472c7ee00b1296693f2a
SIZE (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = 18883
SHA256 (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 552c54aff81c4701ace4eb1ce20c114433ee783b4b06c0105921a830c9486172
SIZE (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 53024
SHA256 (openresty-headers-more-nginx-module-55fbdab_GH0.tar.gz) = ed996dc994ba31ae071e05f12bfac6ff86ee03a2e7d4263346b919870d8135ac
SIZE (openresty-headers-more-nginx-module-55fbdab_GH0.tar.gz) = 28139
SHA256 (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 5534ca63cdfc2a7dc4e1cbf9c2d54d3ed3f0e6c86b4a95be48ec0a3f41cc1eb0
SIZE (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 3393
SHA256 (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 0839c33c2f8d519f92daae274f62cf87eb68415d562c6500ee3e3721ce80557c
SIZE (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 17815
SHA256 (stnoonan-spnego-http-auth-nginx-module-7e028a5_GH0.tar.gz) = 13f9f8ce2e815a14e43c4741af054f96b0714327d9e248dada241d4d3eaee40d
SIZE (stnoonan-spnego-http-auth-nginx-module-7e028a5_GH0.tar.gz) = 18227
SHA256 (kvspb-nginx-auth-ldap-42d195d_GH0.tar.gz) = 78d74697f89821a7ed31c6c672f6c06923bb53a681ebb203eabebb657bdafd80
SIZE (kvspb-nginx-auth-ldap-42d195d_GH0.tar.gz) = 18455
SHA256 (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 77676842919134af88a7b4bfca4470223e3a00d287d17c0dbdc9a114a685b6e7
SIZE (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 6863
SHA256 (arut-nginx-dav-ext-module-v0.1.0_GH0.tar.gz) = 6b004eed8ea16ad8de4d304027bf0413cc323a95914e58625a7dc066481aae3a
SIZE (arut-nginx-dav-ext-module-v0.1.0_GH0.tar.gz) = 6614
SHA256 (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 014bedb2b334ba8e8e23b4c660590357f8055dbed7b9b017e4cc2937876a8822
SIZE (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 14849
SHA256 (aperezdc-ngx-fancyindex-v0.4.2_GH0.tar.gz) = 8327150864ca267b735d550d3304030efbbd863fdddfe0a94e970f249a8827ee
SIZE (aperezdc-ngx-fancyindex-v0.4.2_GH0.tar.gz) = 22047
SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813
SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934
SHA256 (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = ebb4652c4f9a2e1ee31fddefc4c93ff78e651a4b2727d3453d026bccbd708d99
SIZE (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = 6766
SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997
SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736
SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885
SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343
SHA256 (slact-nchan-v1.1.14_GH0.tar.gz) = 70b38d9e54826b2a69a9a5f3de5fb0e25fb03177ec3ac0bc69b9fd2c087143b8
SIZE (slact-nchan-v1.1.14_GH0.tar.gz) = 630564
SHA256 (wandenberg-nginx-push-stream-module-0.5.4_GH0.tar.gz) = 5253bb8a804ea679e514137a234637298f044c3ef63c053670bf3802ff3535b1
SIZE (wandenberg-nginx-push-stream-module-0.5.4_GH0.tar.gz) = 183493
SHA256 (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = ed4ddbcf0c434f4a1e97b61251a63ace759792764bd5cb79ff20efe348db8db3
SIZE (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = 92230
SHA256 (tarantool-nginx_upstream_module-4ca8684_GH0.tar.gz) = e1ce39052f2df4972dc7ce827a3ff774660586955c5894cf38997c6f687d8fa4
SIZE (tarantool-nginx_upstream_module-4ca8684_GH0.tar.gz) = 59005
SHA256 (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = c6d4e38ad0712c898cc53721f492f8f73acf2753cc0a0769fa34d4d6ba4e8efd
SIZE (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = 28303
SHA256 (masterzen-nginx-upload-progress-module-afb2d31_GH0.tar.gz) = 6318851cc3a624aaad3b1f4cd9f51f79c86575c53dfe0c28bbdcf9470b6a33e6
SIZE (masterzen-nginx-upload-progress-module-afb2d31_GH0.tar.gz) = 17269
SHA256 (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 4404c64e845e19feeb07a37976347987892a8e8680a961f793ff0d3ef96c07f4
SIZE (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 130039
SHA256 (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = e765afcaab6cd1601e914039a8d00ab18eb6fe01180c58e0e4e098bc5b4d8233
SIZE (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = 10174
SHA256 (thomsonreuters-nginx-sticky-module-ng-0d58565_GH0.tar.gz) = 85c178046de8036ce6339d69c1c12f470c1d9aa797b45d3151118dbe9b8fe2a5
SIZE (thomsonreuters-nginx-sticky-module-ng-0d58565_GH0.tar.gz) = 120608
SHA256 (wandenberg-nginx-video-thumbextractor-module-0.9.0_GH0.tar.gz) = 6ad7d12b3f7b65ec8e7f3e0f471463929967cb76ff1a81b35a5a34b33604f3cb
SIZE (wandenberg-nginx-video-thumbextractor-module-0.9.0_GH0.tar.gz) = 2709894
SHA256 (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 0d780e6fef91814fbaa577c9f7cfb7b78f6898e50c34d63f3c5d101eb45afd44
SIZE (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 26125
SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462
SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133
SHA256 (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = cbf6fcddc00a7e30289134bdeace12565e000cc7d4efee2d2ebb8799d0b88270
SIZE (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = 20534
SHA256 (openresty-lua-nginx-module-v0.10.13_GH0.tar.gz) = ecea8c3d7f69dd48c6132498ddefb5d83ba9f387fa3d4da14e2abeacdfc8a3ee
SIZE (openresty-lua-nginx-module-v0.10.13_GH0.tar.gz) = 624102
SHA256 (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 8c2bdbe875e4f5225d0778bfb09a2668f9281d7de6218c7b462a7ba2cee06fe8
SIZE (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 34654
SHA256 (SpiderLabs-ModSecurity-nginx-4cde86b_GH0.tar.gz) = d56e12955d933a39c7573ebc327e0aed32fdcc40cc39770a612b9a584b3f1705
SIZE (SpiderLabs-ModSecurity-nginx-4cde86b_GH0.tar.gz) = 26453
SHA256 (nbs-system-naxsi-0.56_GH0.tar.gz) = 0a66dcadd32432460fab180be9f2efe24e911e3798917b2787ee710e02901eb4
SIZE (nbs-system-naxsi-0.56_GH0.tar.gz) = 192120
SHA256 (nginx-njs-b4a58c4_GH0.tar.gz) = d4b245b8f2e95ce062ed2a60f841421e7705c34aa28b282ad16072d9f0987a35
SIZE (nginx-njs-b4a58c4_GH0.tar.gz) = 253407
SHA256 (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = c942e674a7273ab87caab4dcad626ab54852be192c29b1add50d2cb535e3cbb9
SIZE (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = 40742
SHA256 (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 896be99c0cad50218417800a159e43ec088d6b58c099472ed3b3d7f179d6c0ea
SIZE (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 20531
SHA256 (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = eaf18f60e981ea2442a7902689a26eba6cf6f36ebee712feeb1f4429eb654bdc
SIZE (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = 34744
SHA256 (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = d255571bcfb9939b78099df39cb4d42f174d789aec8c8e5e47b93942b0299438
SIZE (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = 25471
SHA256 (arut-nginx-rtmp-module-v1.2.1_GH0.tar.gz) = 87aa597400b0b5a05274ee2d23d8cb8224e12686227a0abe31d783b3a645ea37
SIZE (arut-nginx-rtmp-module-v1.2.1_GH0.tar.gz) = 519919
SHA256 (openresty-set-misc-nginx-module-cda7e50_GH0.tar.gz) = 6fb2c99d4aecdd0335f55493b0dd4170efa46b0014a4c2e41f2ea519b633aca2
SIZE (openresty-set-misc-nginx-module-cda7e50_GH0.tar.gz) = 29291
SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955
SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504
SHA256 (nginx-shib-nginx-http-shibboleth-f07bf3c_GH0.tar.gz) = db0c244fbd553846539e4020c5131e2c99700cddc0e5664aac0b807733607b05
SIZE (nginx-shib-nginx-http-shibboleth-f07bf3c_GH0.tar.gz) = 22177
SHA256 (cubicdaiya-ngx_small_light-v0.9.2_GH0.tar.gz) = 4cf660651d11330a13aab29eb1722bf792d7c3c42e2919a36a1957c4ed0f1533
SIZE (cubicdaiya-ngx_small_light-v0.9.2_GH0.tar.gz) = 56502
SHA256 (openresty-srcache-nginx-module-v0.31_GH0.tar.gz) = 3f9729e73a8340926fa9d9fc15707c2f287cd27b6a9fe42e83f660ca48a5972d
SIZE (openresty-srcache-nginx-module-v0.31_GH0.tar.gz) = 48310
SHA256 (kaltura-nginx-vod-module-1.23_GH0.tar.gz) = 800cf3de639567e27f4cb75527392f23842b349fb680abefd12d4db9a5be951f
SIZE (kaltura-nginx-vod-module-1.23_GH0.tar.gz) = 442053
SHA256 (vozlt-nginx-module-vts-v0.1.15_GH0.tar.gz) = 5112a054b1b1edb4c0042a9a840ef45f22abb3c05c68174e28ebf483164fb7e1
SIZE (vozlt-nginx-module-vts-v0.1.15_GH0.tar.gz) = 371128
SHA256 (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 958bd8de773601d8d3138501cc4be0420f1c818a3987a70cc9c0023371e432cf
SIZE (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 11477


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Library dependencies:
  1. libpcre.so : devel/pcre
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for nginx-devel-1.15.1_2:
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     DSO=on: Enable dynamic modules support
     FILE_AIO=on: Enable file aio
     IPV6=on: Enable IPv6 support
     THREADS=on: Enable threads support
     WWW=on: Enable html sample files
====> Modules that require MAIL module
     MAIL=on: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=on: Enable mail_ssl module
====> Modules that require HTTP module
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=on: Enable http_addition module
     HTTP_AUTH_REQ=on: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=on: Enable http_webdav module
     HTTP_FLV=on: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module
     HTTP_GZIP_STATIC=on: Enable http_gzip_static module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_MP4=on: Enable http_mp4 module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=on: Enable http_random_index module
     HTTP_REALIP=on: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=on: Enable http_secure_link module
     HTTP_SLICE=on: Enable http_slice module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=on: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     HTTPV2=on: Enable HTTP/2 protocol support (SSL req.)
     STREAM=on: Enable stream module
     STREAM_SSL=on: Enable stream_ssl module (SSL req.)
     STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.)
     AJP=off: 3rd party ajp module
     AWS_AUTH=off: 3rd party aws auth module
     BROTLI=off: 3rd party brotli module
     CACHE_PURGE=off: 3rd party cache_purge module
     CLOJURE=off: 3rd party clojure module
     CT=off: 3rd party cert_transparency module (SSL req.)
     DEVEL_KIT=off: 3rd party Nginx Development Kit module
     ARRAYVAR=off: 3rd party array_var module
     DRIZZLE=off: 3rd party drizzle module
     DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module
     ECHO=off: 3rd party echo module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FASTDFS=off: 3rd party fastdfs module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_GEOIP2=off: 3rd party geoip2 module
     HTTP_JSON_STATUS=off: 3rd party http_json_status module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_TARANTOOL=off: 3rd party tarantool upstream module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module
     HTTP_ZIP=off: 3rd party http_zip module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     MODSECURITY3=off: 3rd party mod_security v3 module
     NAXSI=off: 3rd party naxsi module
     NJS=off: Enable http_javascript module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgres module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SHIBBOLETH=off: 3rd party shibboleth module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SMALL_LIGHT=off: 3rd party small_light module
     SRCACHE=off: 3rd party srcache module
     VOD=off: 3rd party vod module
     VTS=off: 3rd party vts module
     XSS=off: 3rd party xss module
====> GSSAPI implementation (imply HTTP_AUTH_KRB5): you can only select none or one of them
     GSSAPI_BASE=off: GSSAPI support via base system (needs Kerberos)
     GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal
     GSSAPI_MIT=off: GSSAPI support via security/krb5
===> Use 'make config' to modify these settings

USES:
cpe ssl ssl

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2016-09-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx now creates logs under /var/log/nginx/ and changes default log
      names from "nginx-access.log" and "nginx-error.log" to "access.log" and
      "error.log" respectively.  This is important for the error log because
      the location is encoded and touched by nginx during startup regardless
      of the configured location for the error log.
    
      See http://trac.nginx.org/nginx/ticket/147 for additional information
      on why this happens.
    
    
  • 2016-02-29
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      The ${MODULESDIR}, default directory for dynamic modules, has been
      changed from ${ETCDIR}/modules to ${PREFIX}/libexec/${PORTNAME}.
      It's highly recommended to review existing configuration files of
      nginx, i.e. ${PREFIX}/etc/nginx/nginx.conf.
    
    
  • 2016-02-17
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_dynamic_upstream_module.so";
      load_module "modules/ngx_http_small_light_module.so";
    
    
  • 2016-02-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_http_echo_module.so";
      load_module "modules/ngx_http_headers_more_filter_module.so";
      load_module "modules/ngx_http_eval_module.so";
      load_module "modules/ngx_http_lua_module.so";
      load_module "modules/ngx_http_set_misc_module.so";
    
    
  • 2016-02-13
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled.  In case of usage following
      modules please update nginx configuration file for load these modules:
    
      load_module "modules/ngx_http_geoip_module.so";
      load_module "modules/ngx_http_image_filter_module.so";
      load_module "modules/ngx_http_xslt_filter_module.so";
      load_module "modules/ngx_mail_module.so";
      load_module "modules/ngx_stream_module.so";
    
      See https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ for details.
    
    
  • 2011-09-28
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Note: 1.1.4 release introduces several API changes which may affect
      third-party modules.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 833 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
12 Mar 2013 17:21:02
Original commit files touched by this commit  1.3.14
Revision:313990 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 67 to 68.
10 Mar 2013 18:12:04
Original commit files touched by this commit  1.3.14
Revision:313835 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 66 to 67.
07 Mar 2013 14:30:48
Original commit files touched by this commit  1.3.14
Revision:313591 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party slowfs_cache module from 1.9 to 1.10.
Do not bump PORTREVISION.

<ChangeLog>

* Fix compatibility with nginx-1.1.12+.
  Due to the changes in cache index usage accounting (1 per request
  instead of 1 per access) initial cache insert of "small" file was
  decreasing usage count, rendering index entry invalid.
  Because cache manager ignores invalid entries, expired cache files
  were not being removed from the cache, which forced it to outgrow
  specified "max_size" value.

</ChangeLog>
05 Mar 2013 15:49:44
Original commit files touched by this commit  1.3.14
Revision:313456 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.13 to 1.3.14.
Update SPDY patch from version 65 to 66.

<ChangeLog>

*) Feature: $connections_active, $connections_reading, and
   $connections_writing variables in the ngx_http_stub_status_module.

*) Feature: support of WebSocket connections in the
   ngx_http_uwsgi_module and ngx_http_scgi_module.

*) Bugfix: in virtual servers handling with SNI.

*) Bugfix: new sessions were not always stored if the "ssl_session_cache
   shared" directive was used and there was no free space in shared
   memory.
   Thanks to Piotr Sikora.

*) Bugfix: multiple X-Forwarded-For headers were handled incorrectly.
   Thanks to Neal Poole for sponsoring this work.

*) Bugfix: in the ngx_http_mp4_module.
   Thanks to Gernot Vormayr.

</ChangeLog>
24 Feb 2013 07:03:47
Original commit files touched by this commit  1.3.13
Revision:312862 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 0.8.7 to 0.9.8.
23 Feb 2013 10:44:18
Original commit files touched by this commit  1.3.13
Revision:312805 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules (according to latest stable ngx_openresty-1.2.6.6):

o) echo from 0.41 to 0.42;
o) headers_more from 0.18 to 0.19;
o) lua from 0.6.10 to 0.7.15;
o) srcache from 0.16 to 0.19;
o) forminput from 0.07rc5 to 0.07.
22 Feb 2013 03:26:05
Original commit files touched by this commit  1.3.13
Revision:312749 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix build third-party upload module by adding the patch.

Issue:		https://github.com/vkholodkov/nginx-upload-module/issues/41
Patch from:	http://paste.davromaniak.eu/index.php?show=110

Submitted by:	grzegorz@piklus.pl via private mail
20 Feb 2013 17:47:36
Original commit files touched by this commit  1.3.13
Revision:312634 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_auth_ldap module.

PR:	176297
19 Feb 2013 17:36:56
Original commit files touched by this commit  1.3.13
Revision:312593 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party http_push_stream module.

PR:	174423
19 Feb 2013 17:31:35
Original commit files touched by this commit  1.3.13
Revision:312592 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.12 to 1.3.13.
Update SPDY patch from version 61 to 65.

<ChangeLog>

*) Change: a compiler with name "cc" is now used by default.

*) Feature: support for proxying of WebSocket connections.
   Thanks to Apcera and CloudBees for sponsoring this work.

*) Feature: the "auth_basic_user_file" directive supports "{SHA}"
   password encryption method.
   Thanks to Louis Opter.

</ChangeLog>
13 Feb 2013 09:23:58
Original commit files touched by this commit  1.3.12_1
Revision:312147 This port version is marked as vulnerable.
osa search for other commits by this committer
Add nginx_pid_prefix rcvar for ability to prevent collision with other PIDs
names
when using with profiles.

Bump PORTREVISION.

PR:	175823
07 Feb 2013 12:37:48
Original commit files touched by this commit  1.3.12
Revision:311829 This port version is marked as vulnerable.
gahr search for other commits by this committer
- Get rid of PTHREAD_CFLAGS and PTHREAD_LIBS (category: www)

Approved by:	portmgr
07 Feb 2013 03:16:17
Original commit files touched by this commit  1.3.12
Revision:311809 This port version is marked as vulnerable.
osa search for other commits by this committer
Update devel-kit third-party module from 0.2.17 to 0.2.18.

USE_NGINX_DEVEL_KIT internal knob has been deprecated.

Fix third-party modules build by change configure order.
Fix build with iconv third-party module.			 (*)

Do not bump PORTREVISION.

PR:	175862 (*)
05 Feb 2013 17:16:34
Original commit files touched by this commit  1.3.12
Revision:311724 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.11 to 1.3.12.
Update SPDY patch from version 60 to 61.

<ChangeLog>

*) Feature: variables support in the "proxy_bind", "fastcgi_bind",
   "memcached_bind", "scgi_bind", and "uwsgi_bind" directives.

*) Feature: the $pipe, $request_length, $time_iso8601, and $time_local
   variables can now be used not only in the "log_format" directive.
   Thanks to Kiril Kalchev.

*) Feature: IPv6 support in the ngx_http_geoip_module.
   Thanks to Gregor Kaliie|nik.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 Feb 2013 03:40:57
Original commit files touched by this commit  1.3.11
Revision:311572 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 59 to 60.
27 Jan 2013 16:35:12
Original commit files touched by this commit  1.3.11
Revision:311073 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 58 to 59.
17 Jan 2013 03:36:31
Original commit files touched by this commit  1.3.11
Revision:310538 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 0.8.4 to 0.8.7.

Requested by:	Roman Arutyunyan <arutyunyan.roman@gmail.com> (author)
16 Jan 2013 03:38:23
Original commit files touched by this commit  1.3.11
Revision:310471 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 54 to 58.
12 Jan 2013 07:26:28
Original commit files touched by this commit  1.3.11
Revision:310263 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.8 to 1.3.11.
Update SPDY patch from version 53 to 54.

Chunked support has been implemented and enabled by default in nginx' base, so
remove support for third-party chunkin module.

There are two third-party features are temporary disabled:
o) ngx_http_upload_module;
o) syslog support.

<ChangeLog>

Changes with nginx 1.3.11                                        10 Jan 2013

*) Bugfix: a segmentation fault might occur if logging was used; the bug
(Only the first 15 lines of the commit message are shown above View all of this commit message)
09 Jan 2013 15:52:35
Original commit files touched by this commit  1.3.8_1
Revision:310153 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.17 to 3.0.19:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.

<Changes>

Release 3.0.19
--------------

* Nginx security fix: do not display Nginx version when
  server_tokens are off.
* Fixed compilation problems on some systems.
* Fixed some Union Station-related bugs.

Release 3.0.18
--------------

* Fixed compilation problems on Fedora 17.
* Fixed Union Station compatibility with Rails 3.2.
* Phusion Passenger Enterprise Standalone now supports rolling
  restarts and deployment error resistance.

</Changes>
21 Dec 2012 05:22:17
Original commit files touched by this commit  1.3.8_1
Revision:309339 This port version is marked as vulnerable.
osa search for other commits by this committer
Add PORTREVISION back, introduced in r309338.
21 Dec 2012 05:20:28
Original commit files touched by this commit  1.3.8
Revision:309338 This port version is marked as vulnerable.
osa search for other commits by this committer
Update rtmp third-party module from 0.6.1 to 0.8.4.

Spotted by:	Roman Arutyunyan <arutyunyan.roman@gmail.com> (author)
11 Dec 2012 19:05:28
Original commit files touched by this commit  1.3.8_1
Revision:308706 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_cache_purge module from 1.6 to 2.0.
10 Dec 2012 19:11:12
Original commit files touched by this commit  1.3.8_1
Revision:308630  Sanity Test Failure This port version is marked as vulnerable.
mm search for other commits by this committer
Update PCRE to 8.32
Introduces the UTF-32 library pcre32
Bump PORTREVISION in dependent ports
22 Nov 2012 03:47:21
Original commit files touched by this commit  1.3.8
Revision:307636 This port version is marked as vulnerable.
osa search for other commits by this committer
Use more canonical names for patches.
No functionaly changes.
Don't bump PORTREVISION.

Feature safe: yes
12 Nov 2012 18:37:49
Original commit files touched by this commit  1.3.8
Revision:307342 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 52 to 53.

Feature safe: yes
30 Oct 2012 23:39:59
Original commit files touched by this commit  1.3.8
Revision:306730 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.7 to 1.3.8.

Feature safe:	yes

<ChangeLog>

*) Feature: the "optional_no_ca" parameter of the "ssl_verify_client"
   directive.
   Thanks to Mike Kazantsev and Eric O'Connor.

*) Feature: the $bytes_sent, $connection, and $connection_requests
   variables can now be used not only in the "log_format" directive.
   Thanks to Benjamin Grts+ssing.

*) Feature: the "auto" parameter of the "worker_processes" directive.

*) Bugfix: "cache file ... has md5 collision" alert.

*) Bugfix: in the ngx_http_gunzip_filter_module.

*) Bugfix: in the "ssl_stapling" directive.

</ChangeLog>
17 Oct 2012 02:17:42
Original commit files touched by this commit  1.3.7
Revision:305998 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) drizzle - from 0.1.2 to 0.1.4;
o) lua     - from 0.5.14 to 0.6.10;
o) redis2  - from 0.08rc4 to 0.09;
o) rtmp    - from 0.2.3 to 0.6.1;
o) srcache - from 0.14 to 0.16.

Convert header to modern manner.

Feature safe:	yes
02 Oct 2012 15:04:02
Original commit files touched by this commit  1.3.7
Revision:305163 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.6 to 1.3.7.

<ChangeLog>

*) Feature: OCSP stapling support.
   Thanks to Comodo, DigiCert and GlobalSign for sponsoring this work.

*) Feature: the "ssl_trusted_certificate" directive.

*) Feature: resolver now randomly rotates addresses returned from cache.
   Thanks to Anton Jouline.

*) Bugfix: OpenSSL 0.9.7 compatibility.

</ChangeLog>

Fix SIZE line for ldap third-party module.
20 Sep 2012 03:56:12
Original commit files touched by this commit  1.3.6_1
Revision:304561 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party CT++ module.

Subnmitted:	Veniamin Gvozdikov <g.veniamin@googlemail.com>
PR:		171702
20 Sep 2012 03:44:21
Original commit files touched by this commit  1.3.6_1
Revision:304560 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party http_auth_ldap module.

Submitted by:	rm
PR:		171745
19 Sep 2012 18:29:13
Original commit files touched by this commit  1.3.6_1
Revision:304538 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix rc script for nginx with profiles.		(*)
Configure build with original http_dav if third-party http_dav_ext defined.

Bump PORTREVISIONs.

Found by:	Slava Kokorin <slava.kokorin@gmail.com> (*)
12 Sep 2012 17:00:55
Original commit files touched by this commit  1.3.6
Revision:304154 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.5 to 1.3.6.

<ChangeLog>

*) Feature: the ngx_http_gunzip_filter_module.

*) Feature: the "memcached_gzip_flag" directive.

*) Feature: the "always" parameter of the "gzip_static" directive.

*) Bugfix: in the "limit_req" directive; the bug had appeared in 1.1.14.
   Thanks to Charles Chen.

*) Bugfix: nginx could not be built by gcc 4.7 with -O2 optimization if
   the --with-ipv6 option was used.

</ChangeLog>
28 Aug 2012 18:01:09
Original commit files touched by this commit  1.3.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.15 to 3.0.17:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
26 Aug 2012 16:56:32
Original commit files touched by this commit  1.3.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_substitutions_filter module to "numeric"
release - 0.6.2.
26 Aug 2012 10:58:51
Original commit files touched by this commit  1.3.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_substitutions_filter module to latest snapshot.
21 Aug 2012 17:39:37
Original commit files touched by this commit  1.3.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.4 to 1.3.5.

<ChangeLog>

*) Change: the ngx_http_mp4_module module no longer skips tracks in
   formats other than H.264 and AAC.

*) Bugfix: a segmentation fault might occur in a worker process if the
   "map" directive was used with variables as values.

*) Bugfix: a segmentation fault might occur in a worker process if the
   "geo" directive was used with the "ranges" parameter but without the
   "default" parameter; the bug had appeared in 0.8.43.
   Thanks to Zhen Chen and Weibin Yao.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
21 Aug 2012 03:38:25
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_substitutions_filter module from 0.5.2.r59 to 0.6.0,
relocated to github.

Fix typo for upstream_fair module.				[*]

Submitted by:		Artis Caune <Artis.Caune@gmail.com>	[*]
PR:			170795					[*]
15 Aug 2012 16:02:13
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (sync with openresty-1.2.1.14):

o) lua from 0.5.13 to 0.5.14;
o) srcache from 0.13rc8 to 0.14.
13 Aug 2012 16:38:07
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (sync with openresty-1.2.1.13):

o) lua from 0.5.12 to 0.5.13;
o) echo from 0.38rc2 to 0.41.
13 Aug 2012 16:30:19
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 51 to 52.
09 Aug 2012 12:31:57
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 48 to 51.
07 Aug 2012 17:30:44
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (sync with openresty-1.2.1.9):

o) lua from 0.5.7 to 0.5.12;
o) headers_more from 0.17 to 0.18;
o) drizzle from 0.1.2rc7 to 0.1.2.
04 Aug 2012 06:01:12
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.14 to 3.0.15:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
31 Jul 2012 17:54:29
Original commit files touched by this commit  1.3.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.3 to 1.3.4.

<ChangeLog>

*) Change: the "ipv6only" parameter is now turned on by default for
   listening IPv6 sockets.

*) Feature: the Clang compiler support.

*) Bugfix: extra listening sockets might be created.
   Thanks to Roman Odaisky.

*) Bugfix: nginx/Windows might hog CPU if a worker process failed to
   start.
   Thanks to Ricardo Villalobos Guevara.

*) Bugfix: the "proxy_pass_header", "fastcgi_pass_header",
   "scgi_pass_header", "uwsgi_pass_header", "proxy_hide_header",
   "fastcgi_hide_header", "scgi_hide_header", and "uwsgi_hide_header"
   directives might be inherited incorrectly.

</ChangeLog>
31 Jul 2012 17:50:51
Original commit files touched by this commit  1.3.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update:

o) third-party rtmp module from 0.1.10 to 0.2.3;		(*)
o) prefix path for third-party sflow module.

Requested by:	Rudolph Sand aka r dot sand at new-net dot net	(*)
26 Jul 2012 06:28:02
Original commit files touched by this commit  1.3.3
 This port version is marked as vulnerable.
ak search for other commits by this committer
- Fix MAIL_* options

Approved by:	osa (maintainer)
26 Jul 2012 06:10:32
Original commit files touched by this commit  1.3.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 47 to 48.
22 Jul 2012 13:39:34
Original commit files touched by this commit  1.3.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger from 3.0.13 to 3.0.14.
16 Jul 2012 17:47:56
Original commit files touched by this commit  1.3.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Move rc script nginx.sh.in to more canonical nginx.in.
16 Jul 2012 17:38:33
Original commit files touched by this commit  1.3.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) lua from 0.5.0rc30 to 0.5.7;
o) headers_more from 0.17rc1 to 0.17.
s/_MODULE//.
12 Jul 2012 13:45:46
Original commit files touched by this commit  1.3.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 46 to 47.
10 Jul 2012 16:18:19
Original commit files touched by this commit  1.3.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.2 to 1.3.3.

<ChangeLog>

*) Feature: entity tags support and the "etag" directive.

*) Bugfix: trailing dot in a source value was not ignored if the "map"
   directive was used with the "hostnames" parameter.

*) Bugfix: incorrect location might be used to process a request if a
   URI was changed via a "rewrite" directive before an internal redirect
   to a named location.

</ChangeLog>
04 Jul 2012 22:33:52
Original commit files touched by this commit  1.3.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 45 to 46.
03 Jul 2012 03:48:32
Original commit files touched by this commit  1.3.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) cache_purge from 1.5 to 1.6;
o) slowfs_cache from 1.8 to 1.9;
o) upload_progress from 0.8.3 to 0.9.0. [*]

Remove needless extra patch.

PR:     169602                          [*]
01 Jul 2012 23:18:57
Original commit files touched by this commit  1.3.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 44 to 45.
29 Jun 2012 21:05:05
Original commit files touched by this commit  1.3.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 43 to 44.
29 Jun 2012 21:01:03
Original commit files touched by this commit  1.3.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Truncate variable name for third-party h264_streaming module, s/_MODULE//.
28 Jun 2012 19:09:47
Original commit files touched by this commit  1.3.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 42 to 43.
28 Jun 2012 14:25:06
Original commit files touched by this commit  1.3.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix build without mail-specific modules after switch to OptionsNG.

PR:     169498
27 Jun 2012 06:28:47
Original commit files touched by this commit  1.3.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.1 to 1.3.2.

<ChangeLog>

*) Change: the "single" parameter of the "keepalive" directive is now
   ignored.

*) Change: SSL compression is now disabled when using all versions of
   OpenSSL, including ones prior to 1.0.0.

*) Feature: it is now possible to use the "ip_hash" directive to balance
   IPv6 clients.

*) Feature: the $status variable can now be used not only in the
   "log_format" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
26 Jun 2012 13:57:07
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 40 to 42.
25 Jun 2012 02:43:21
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 39 to 40.
22 Jun 2012 18:06:46
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 38 to 39.
22 Jun 2012 17:59:14
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update the name of recent added tcp_proxy third-party module.
21 Jun 2012 06:35:24
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party tcp_proxy module, ver.0.26,
https://github.com/yaoweibin/nginx_tcp_proxy_module/

Requested by:   Weibin Yao <yaoweibin@gmail.com>
20 Jun 2012 14:04:44
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from version 37 to 38.
19 Jun 2012 06:27:32
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Do not require specific versions of shared libraries.
18 Jun 2012 16:18:19
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update SPDY patch from 36 to 37 version.
18 Jun 2012 16:12:38
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update subs_filter third-party module from 0.5.2.r53 to 0.5.2.r59.
Configure pcre module support if subs_filter module defined.
17 Jun 2012 17:59:01
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add SPDY support.

Please read http://nginx.org/patches/spdy/README.txt before use.
17 Jun 2012 17:54:56
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless bsd.ports.[pre|post].mk includes, use bsd.port.mk.
14 Jun 2012 11:29:08
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) drizzle - from 0.1.2rc6 to 0.1.2rc7, sync with
   ngx_openresty 1.0.15.10 stable;
o) rtmp    - from 0.1.5 to 0.1.10.

Do not bump PORTREVISION because these modules are disabled by default.
14 Jun 2012 10:53:34
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.12 to 3.0.13:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
14 Jun 2012 08:12:29
Original commit files touched by this commit  1.3.1_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Create temporary directory with install(1).
Remove duplicate code from Makefile and pkg-plist.

Bump PORTREVISION.

Requested by:   dougb
13 Jun 2012 04:46:14
Original commit files touched by this commit  1.3.1_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Check existence temporary directory %%NGINX_TMPDIR%% before
test configuration.     (1)
Use %%NGINX_RUNDIR%%, %%WWWOWN%% and %%WWWGRP%% variables defined
in Makefile instead of hardcoded or new values.

Bump PORTREVISION.

Idea from PR:   168836  (1)
07 Jun 2012 16:57:23
Original commit files touched by this commit  1.3.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) lua      - from 0.5.0rc28 to 0.5.0rc30;
o) rds-json - from 0.12rc7 to 0.12rc10.

Do not bump PORTREVISION because these modules are disabled by default.
07 Jun 2012 01:24:03
Original commit files touched by this commit  1.3.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Be more correct after latest changes in ngx_regex_t.
07 Jun 2012 01:09:44
Original commit files touched by this commit  1.3.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party slow module, v.0.9.6,
http://code.google.com/p/nginx-sflow-module/.

Do not bump PORTREVISION because this module is disabled by default.
06 Jun 2012 13:25:53
Original commit files touched by this commit  1.3.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add back checksums and size for h264_streaming and xss third-party modules.
06 Jun 2012 13:22:17
Original commit files touched by this commit  1.3.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Return back XSS third-party module.
06 Jun 2012 13:21:26
Original commit files touched by this commit  1.3.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.3.0 to 1.3.1.

<ChangeLog>

*) Security: now nginx/Windows ignores trailing dot in URI path
   component, and does not allow URIs with ":$" in it.
   Thanks to Vladimir Kochetkov, Positive Research Center.

*) Feature: the "proxy_pass", "fastcgi_pass", "scgi_pass", "uwsgi_pass"
   directives, and the "server" directive inside the "upstream" block,
   now support IPv6 addresses.

*) Feature: the "resolver" directive now support IPv6 addresses and an
   optional port specification.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
06 Jun 2012 12:10:13
Original commit files touched by this commit  1.3.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix issue with HTTP_CACHE option.

Spotted by:     many people
04 Jun 2012 17:33:25
Original commit files touched by this commit  1.3.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add VIDEO knob to OPTIONS_DEFINE for choose original or third-party
MP4 module.
04 Jun 2012 04:07:38
Original commit files touched by this commit  1.3.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
OptionsNGfy.
Most name of variables are shortened, s/_MODULE_//g.

Thanks to:      bapt
24 May 2012 08:04:58
Original commit files touched by this commit  1.3.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party module naxsi from 0.45 to 0.46-1.

Do not bump PORTREVISION because this module is disabled by default.
18 May 2012 04:43:43
Original commit files touched by this commit  1.3.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party RTMP module, v.0.1.5,
https://github.com/arut/nginx-rtmp-module.

Note! The RTMP module does not share data between workers and only
works in one-worker mode.

Do not bump PORTREVISION because this module is disabled by default.

Spotted by:     Patrick Ernst aka patrick dot ernst at maxxbone dot com
16 May 2012 11:24:12
Original commit files touched by this commit  1.3.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (openresty 1.0.15.5):

o) lua     - from 0.5.0rc27 to 0.5.0rc28;
o) rds_scv - from 0.05rc1 to 0.05rc2.

Remove needless patch.

Do not bump PORTREVISIONs because these modules are disabled by default.
15 May 2012 15:15:38
Original commit files touched by this commit  1.3.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.2.0 to 1.3.0.

<ChangeLog>

*) Feature: the "debug_connection" directive now supports IPv6 addresses
   and the "unix:" parameter.

*) Feature: the "set_real_ip_from" directive and the "proxy" parameter
   of the "geo" directive now support IPv6 addresses.

*) Feature: the "real_ip_recursive", "geoip_proxy", and
   "geoip_proxy_recursive" directives.

*) Feature: the "proxy_recursive" parameter of the "geo" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
15 May 2012 15:11:42
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (openresty 1.0.15.3):

o) lua      - from 0.5.0rc24 to 0.5.0rc27;
o) set_misc - from 0.22rc5 to 0.22rc7;
o) srcache  - from 0.13rc6 to 0.13rc8;

Do not bump PORTREVISIONs because these modules are disabled by default.
11 May 2012 10:42:26
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add two new third-party modules:

1) let, 0.0.4;
2) upstream_sticky, 1.0;

Do not bump PORTREVISIONs because these modules are disabled by default.

Spotted by:     Serguei Okladnikov <oklaspec@mail.ru> (1)
PR:             167494                                (2)
26 Apr 2012 08:11:12
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules (openresty 1.0.11.28):

o) echo    - from 0.38rc1 to 0.38rc2;
o) lua     - from 0.4.1 to 0.5.0rc24;
o) rds-csv - from 0.04 to 0.05rc1;
o) redis2  - from 0.08rc2 to 0.08rc4;
o) srcache - from 0.13rc3 to 0.13.rc6;
o) xss     - from 0.03rc8 to 0.03rc9;
o) iconv   - from 0.10rc5 to 0.10rc7;

Do not bump PORTREVISIONs because these modules are disabled by default.
25 Apr 2012 17:01:38
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more WWW site to pkg-descr file.
Remove -DNGX_DEBUG_MALLOC flag.         (*)
Bump PORTREVISION.

Requested by:   Maxim Dounin aka mdounin at mdounin dot ru (*)
23 Apr 2012 14:01:35
Original commit files touched by this commit  1.2.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update to latest stable version 1.2.0.

<ChangeLog>

*) Bugfix: a segmentation fault might occur in a worker process if the
   "try_files" directive was used; the bug had appeared in 1.1.19.

*) Bugfix: response might be truncated if there were more than IOV_MAX
   buffers used.

*) Bugfix: in the "crop" parameter of the "image_filter" directive.
   Thanks to Maxim Bublis.

</ChangeLog>
23 Apr 2012 12:18:43
Original commit files touched by this commit  1.1.19_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update pkg-descr to modern variant.
Bump PORTREVISIONs.

PR:     ports/167089
23 Apr 2012 12:04:37
Original commit files touched by this commit  1.1.19
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party naxsi module rom 0.43 to 0.45.

Do not bump PORTREVISIONs because this module disabled by default.

PR:     ports/167166, ports/167167
22 Apr 2012 18:52:26
Original commit files touched by this commit  1.1.19
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.11 to 3.0.12:

o) www/rubygem-passenger;
o) third-party passenger module for www/nginx and www/nginx-devel.
13 Apr 2012 12:17:05
Original commit files touched by this commit  1.1.19
 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.1.18 to 1.1.19.

<ChangeLog>

*) Security: specially crafted mp4 file might allow to overwrite memory
   locations in a worker process if the ngx_http_mp4_module was used,
   potentially resulting in arbitrary code execution (CVE-2012-2089).
   Thanks to Matthew Daley.

*) Bugfix: nginx/Windows might be terminated abnormally.
   Thanks to Vincent Lee.

*) Bugfix: nginx hogged CPU if all servers in an upstream were marked as
   "backup".
(Only the first 15 lines of the commit message are shown above View all of this commit message)
03 Apr 2012 16:16:10
Original commit files touched by this commit  1.1.18
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_http_redis from 0.3.5 to 0.3.6.
Add USERS/GROUPS for www/nginx.

Do not bump PORTREVISIONs because this module disabled by default.

Feature safe:   yes

<ChangeLog>

*) Feature: redis_gzip_flag.  Usefull if you are prefer to
   store data compressed in redis.  Works with ngx_http_gunzip_filter
   module.
   Thanks to Maxim Dounin.

*) Bugfix: ngx_http_redis_module might issue the error message
   "redis sent invalid trailer".
   Thanks to agentzh.

</ChangeLog>
29 Mar 2012 07:27:45
Original commit files touched by this commit  1.1.18
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.1.17 to 1.1.18.
Add USERS/GROUPS.

Feature safe:   yes

<ChangeLog>

*) Change: keepalive connections are no longer disabled for Safari by
   default.

*) Feature: the $connection_requests variable.

*) Feature: $tcpinfo_rtt, $tcpinfo_rttvar, $tcpinfo_snd_cwnd and
   $tcpinfo_rcv_space variables.
(Only the first 15 lines of the commit message are shown above View all of this commit message)

Number of commits found: 833 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
slurm-wlmJun 16
nodeJun 15
node6Jun 15
node8Jun 15
libgcrypt*Jun 14
password-storeJun 14
asterisk13*Jun 12
libresslJun 12
libressl-develJun 12
opensslJun 12
openssl-develJun 12
asterisk13Jun 11
asterisk15Jun 11
asterisk15Jun 11
chromiumJun 10

14 vulnerabilities affecting 116 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2018-06-16 15:43:50


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 34425
Broken 82
Deprecated 102
Ignore 334
Forbidden 2
Restricted 160
No CDROM 76
Vulnerable 32
Expired 12
Set to expire 89
Interactive 0
new 24 hours 12
new 48 hours20
new 7 days43
new fortnight88
new month15986

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2018 Dan Langille. All rights reserved.