FreshPorts -- The Place For Ports notbugIf you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
nginx-devel Robust and small WWW server
1.13.8 www on this many watch lists=29 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 15 Jun 2007 08:23:21
Also Listed In: ipv6
License: BSD2CLAUSE
NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Homepage : PortsMon
    Pseudo-pkg-plist information, but much better, from make generate-plist
    Expand this list (22 items)
  1. /usr/local/share/licenses/nginx-devel-1.13.8/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.13.8/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.13.8/BSD2CLAUSE
  4. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  5. etc/nginx/koi-utf
  6. etc/nginx/koi-win
  7. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  8. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  9. etc/nginx/win-utf
  10. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  11. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  12. @postexec mkdir -p -m 755 %D/www/nginx-dist
  13. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  14. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  15. www/nginx-dist/index.html
  16. www/nginx-dist/50x.html
  17. @postexec chmod a-w %D/www/nginx-dist
  18. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  19. sbin/nginx
  20. @dir /var/tmp/nginx
  21. @dir /var/log/nginx
  22. man/man8/nginx.8.gz
  23. Collapse this list.

To install the port: cd /usr/ports/www/nginx-devel/ && make install clean
To add the package: pkg install nginx-devel

PKGNAME: nginx-devel

distinfo:

TIMESTAMP = 1515182031
SHA256 (nginx-1.13.8.tar.gz) = 8410b6c31ff59a763abf7e5a5316e7629f5a5033c95a3a0ebde727f9ec8464c5
SIZE (nginx-1.13.8.tar.gz) = 992237
SHA256 (ngx_cache_purge-2.3.tar.gz) = 279e0d8a46d3b1521fd43b3f78bc1c08b263899142a7cc5058c1c0361a92c89c
SIZE (ngx_cache_purge-2.3.tar.gz) = 12248
SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae
SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208
SHA256 (nginx_mod_h264_streaming-2.2.7.tar.gz) = 6d974ba630cef59de1f60996c66b401264a345d25988a76037c2856cec756c19
SIZE (nginx_mod_h264_streaming-2.2.7.tar.gz) = 44012
SHA256 (ngx_http_redis-0.3.8.tar.gz) = 95d0ed7be40da2efc88883d72e52e5e272d2c34463583b7078e8fd6d55004934
SIZE (ngx_http_redis-0.3.8.tar.gz) = 12342
SHA256 (ngx_http_response-0.3.tar.gz) = 0835584029f053051c624adbe33a826ab0205c9d85a02af6019e6b57607e9045
SIZE (ngx_http_response-0.3.tar.gz) = 2244
SHA256 (08a395c66e42.tar.gz) = 53e440737ed1aff1f09fae150219a45f16add0c8d6e84546cb7d80f73ebffd90
SIZE (08a395c66e42.tar.gz) = 120603
SHA256 (modsecurity-2.9.1.tar.gz) = 958cc5a7a7430f93fac0fd6f8b9aa92fc1801efce0cda797d6029d44080a9b24
SIZE (modsecurity-2.9.1.tar.gz) = 4261212
SHA256 (passenger-5.1.12.tar.gz) = 1705bd6d1f9b9d055fb58b3545ca6f38ca6d222c07201f53c5014e0eb09f4495
SIZE (passenger-5.1.12.tar.gz) = 4245993
SHA256 (ngx_slowfs_cache-1.10.tar.gz) = 1e81453942e5b0877de1f1f06c56ae82918ea9818255cb935bcb673c95a758a1
SIZE (ngx_slowfs_cache-1.10.tar.gz) = 11809
SHA256 (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 5534ca63cdfc2a7dc4e1cbf9c2d54d3ed3f0e6c86b4a95be48ec0a3f41cc1eb0
SIZE (giom-nginx_accept_language_module-2f69842_GH0.tar.gz) = 3393
SHA256 (atomx-nginx-http-auth-digest-519dc2a_GH0.tar.gz) = 6ef8c81267cbb2f912fa3add846fddaaab06d604155de322dad83912410adafc
SIZE (atomx-nginx-http-auth-digest-519dc2a_GH0.tar.gz) = 17778
SHA256 (stnoonan-spnego-http-auth-nginx-module-0c6ff3f_GH0.tar.gz) = 3d3fed1e19a532cdd2a37726953f2b2d4e20891a44119ff6075a6b5891324d2d
SIZE (stnoonan-spnego-http-auth-nginx-module-0c6ff3f_GH0.tar.gz) = 18212
SHA256 (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 0ec4f099e50cc12a6319e37700e71540498d354831d1f09e113ee046ee0bb7b2
SIZE (kvspb-nginx-auth-ldap-dbcef31_GH0.tar.gz) = 17001
SHA256 (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 77676842919134af88a7b4bfca4470223e3a00d287d17c0dbdc9a114a685b6e7
SIZE (sto-ngx_http_auth_pam_module-v1.5.1_GH0.tar.gz) = 6863
SHA256 (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 9e3f78ea73e2d606a95ee64fd3affa4c249f9b342e66b6b11b63061791f28316
SIZE (yaoweibin-nginx_ajp_module-bf6cd93_GH0.tar.gz) = 109704
SHA256 (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = db7ceef4ae22cf5bfaf5abae64830dfeef203ca85f9f40f7d1f1d90f277478c0
SIZE (anomalizer-ngx_aws_auth-1e62670_GH0.tar.gz) = 8260
SHA256 (nginx-clojure-nginx-clojure-v0.4.5_GH0.tar.gz) = c6d500f935dde5f87a6eb47ca473094a8ee2c9b4bb4578c9f99ccdc70a12d59e
SIZE (nginx-clojure-nginx-clojure-v0.4.5_GH0.tar.gz) = 602064
SHA256 (grahamedgecombe-nginx-ct-v1.3.2_GH0.tar.gz) = b4ceae549b9dbf84b2e511633982e4efeee0388e3b7a038a8bac555008a77b88
SIZE (grahamedgecombe-nginx-ct-v1.3.2_GH0.tar.gz) = 6844
SHA256 (openresty-echo-nginx-module-d95da35_GH0.tar.gz) = d1cd947c9ab3174857781e7e8a481125e3f05596be76a6114ba4a6e19ee5e902
SIZE (openresty-echo-nginx-module-d95da35_GH0.tar.gz) = 53162
SHA256 (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 58daa08a5ab9b9de5459817fc088230f4092fb818b87a2cb61b217952a5af54d
SIZE (happyfish100-fastdfs-nginx-module-5a8110f_GH0.tar.gz) = 17980
SHA256 (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = d3442be9058682ed0ad1d294ab27effcb245c0a320fcf418c452dc923f714531
SIZE (openresty-headers-more-nginx-module-84241e4_GH0.tar.gz) = 27951
SHA256 (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = d428a0236c933779cb40ac8c91afb19d5c25a376dc3caab825bfd543e1ee530d
SIZE (arut-nginx-dav-ext-module-v0.0.3_GH0.tar.gz) = 6260
SHA256 (openresty-nginx-eval-module-342c812_GH0.tar.gz) = c45f6438474593f0cf5229160327d20c2f2d72e9c0b5c8cf9e0ef8d5295de177
SIZE (openresty-nginx-eval-module-342c812_GH0.tar.gz) = 14183
SHA256 (aperezdc-ngx-fancyindex-v0.4.2_GH0.tar.gz) = 8327150864ca267b735d550d3304030efbbd863fdddfe0a94e970f249a8827ee
SIZE (aperezdc-ngx-fancyindex-v0.4.2_GH0.tar.gz) = 22047
SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813
SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934
SHA256 (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = ebb4652c4f9a2e1ee31fddefc4c93ff78e651a4b2727d3453d026bccbd708d99
SIZE (leev-ngx_http_geoip2_module-2.0_GH0.tar.gz) = 6766
SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997
SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736
SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885
SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343
SHA256 (slact-nchan-v1.1.13_GH0.tar.gz) = 8e869ea92fd885f5d9755f926e809ee81ca21967044b98e9932a8eb661d91709
SIZE (slact-nchan-v1.1.13_GH0.tar.gz) = 629850
SHA256 (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = a95f31e80120fd7324795b92a0d94c0b43e1265df7fd0f1eba11a337c1e0a626
SIZE (wandenberg-nginx-push-stream-module-0.5.1_GH0.tar.gz) = 175263
SHA256 (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = ed4ddbcf0c434f4a1e97b61251a63ace759792764bd5cb79ff20efe348db8db3
SIZE (yaoweibin-ngx_http_substitutions_filter_module-v0.6.4_GH0.tar.gz) = 92230
SHA256 (tarantool-nginx_upstream_module-4ca8684_GH0.tar.gz) = e1ce39052f2df4972dc7ce827a3ff774660586955c5894cf38997c6f687d8fa4
SIZE (tarantool-nginx_upstream_module-4ca8684_GH0.tar.gz) = 59005
SHA256 (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = c6d4e38ad0712c898cc53721f492f8f73acf2753cc0a0769fa34d4d6ba4e8efd
SIZE (Austinb-nginx-upload-module-72ec037_GH0.tar.gz) = 28303
SHA256 (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 93e29b9b437a2e34713de54c2861ea51151624aca09f73f9f44d1caaff01a6b1
SIZE (masterzen-nginx-upload-progress-module-v0.9.0_GH0.tar.gz) = 16990
SHA256 (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 52e6acd8c0264a59c5c948271015a59acd3cbcf91377456b7c8dc6f9feecef4a
SIZE (yaoweibin-nginx_upstream_check_module-10782ea_GH0.tar.gz) = 128281
SHA256 (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = e765afcaab6cd1601e914039a8d00ab18eb6fe01180c58e0e4e098bc5b4d8233
SIZE (cryptofuture-nginx-upstream-fair-b5be36f_GH0.tar.gz) = 10174
SHA256 (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 382bb41fa739f471fdab9fbabc5384d8ec7f25b5bb0c45c153f5cc01d428abe2
SIZE (wandenberg-nginx-video-thumbextractor-module-0.7.0_GH0.tar.gz) = 2709351
SHA256 (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 0d780e6fef91814fbaa577c9f7cfb7b78f6898e50c34d63f3c5d101eb45afd44
SIZE (anthonyryan1-mod_zip-74ef235_GH0.tar.gz) = 26125
SHA256 (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = aafb79d87273eec023025333c34d6d0108026a1ce2e09b20a53e8e2d9bf65080
SIZE (openresty-drizzle-nginx-module-v0.1.9_GH0.tar.gz) = 59024
SHA256 (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = bf60cf196c86193376d11f8c7a3826994b24a48bb36943bab8a25af6e776af3b
SIZE (cubicdaiya-ngx_dynamic_upstream-v0.1.3_GH0.tar.gz) = 10921
SHA256 (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 88e05a99a8a7419066f5ae75966fb1efc409bad4522d14986da074554ae61619
SIZE (simpl-ngx_devel_kit-v0.3.0_GH0.tar.gz) = 66455
SHA256 (openresty-encrypted-session-nginx-module-v0.06_GH0.tar.gz) = fa6537c406cee1dc7acd6152d16dba4581d53587860a0642f1b0f7c817ee006d
SIZE (openresty-encrypted-session-nginx-module-v0.06_GH0.tar.gz) = 11128
SHA256 (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = ef843824e0aac1dd60b392802861cc06426a4bc5f87d472c7ee00b1296693f2a
SIZE (mdirolf-nginx-gridfs-v0.8_GH0.tar.gz) = 18883
SHA256 (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 552c54aff81c4701ace4eb1ce20c114433ee783b4b06c0105921a830c9486172
SIZE (mongodb-mongo-c-driver-v0.3.1_GH0.tar.gz) = 53024
SHA256 (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = cbf6fcddc00a7e30289134bdeace12565e000cc7d4efee2d2ebb8799d0b88270
SIZE (arut-nginx-let-module-v0.0.4_GH0.tar.gz) = 20534
SHA256 (openresty-lua-nginx-module-v0.10.11_GH0.tar.gz) = c0fb91fcfd1c6e7dec34ca64826ef81ffebafdef6174d254467636f380566626
SIZE (openresty-lua-nginx-module-v0.10.11_GH0.tar.gz) = 616653
SHA256 (openresty-memc-nginx-module-v0.18_GH0.tar.gz) = 4e280d1dcb8b312bc7875604c1e35b17879279126d3d5fbf482aa9cc7c11276d
SIZE (openresty-memc-nginx-module-v0.18_GH0.tar.gz) = 37113
SHA256 (nbs-system-naxsi-0.54_GH0.tar.gz) = 9cc2c09405bc71f78ef26a8b6d70afcea3fccbe8125df70cb0cfc480133daba5
SIZE (nbs-system-naxsi-0.54_GH0.tar.gz) = 163809
SHA256 (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = c942e674a7273ab87caab4dcad626ab54852be192c29b1add50d2cb535e3cbb9
SIZE (FRiCKLE-ngx_postgres-1.0rc7_GH0.tar.gz) = 40742
SHA256 (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = b204909c6fb194fe8fed7627a3733bc9598f64251dc04a5b6a5bbd612e925324
SIZE (openresty-rds-csv-nginx-module-v0.07_GH0.tar.gz) = 19444
SHA256 (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 99aedf222a9664484918392988cce41b1a6238240d42f8bd44f5ff102c05c36c
SIZE (openresty-rds-json-nginx-module-v0.14_GH0.tar.gz) = 33496
SHA256 (openresty-redis2-nginx-module-v0.14_GH0.tar.gz) = d830e072fcb4acee8490ba3e38eee6034fd884a954d17ad4efeb397032c58a71
SIZE (openresty-redis2-nginx-module-v0.14_GH0.tar.gz) = 27924
SHA256 (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = de5866111a5b18c9dfb1c10f3a0e84b56af77f7005a41807368f7769b8a50965
SIZE (arut-nginx-rtmp-module-v1.1.8_GH0.tar.gz) = 519647
SHA256 (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 5f32c484b29b9047dfa65fd3eec511c0f7c65f0f3ec0a4e0453359cf4642d405
SIZE (openresty-set-misc-nginx-module-f808ef4_GH0.tar.gz) = 29340
SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955
SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504
SHA256 (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = c25f284bc934f59a267d319385a3e11858efef786c84b49a77d09e7f5274bbf1
SIZE (nginx-shib-nginx-http-shibboleth-4f1119b_GH0.tar.gz) = 16688
SHA256 (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 8f513d6d3df32c3b05327d40e16efd020532a911d3eeca8015eb6271f2d4fd1c
SIZE (cubicdaiya-ngx_small_light-v0.8.0_GH0.tar.gz) = 55918
SHA256 (openresty-srcache-nginx-module-v0.31_GH0.tar.gz) = 3f9729e73a8340926fa9d9fc15707c2f287cd27b6a9fe42e83f660ca48a5972d
SIZE (openresty-srcache-nginx-module-v0.31_GH0.tar.gz) = 48310
SHA256 (kaltura-nginx-vod-module-1.22_GH0.tar.gz) = 79214a1c2f9b133e039ae78d6a09635ad2bec183c77e2a32bf03003841b3c35b
SIZE (kaltura-nginx-vod-module-1.22_GH0.tar.gz) = 438203
SHA256 (vozlt-nginx-module-vts-v0.1.15_GH0.tar.gz) = 5112a054b1b1edb4c0042a9a840ef45f22abb3c05c68174e28ebf483164fb7e1
SIZE (vozlt-nginx-module-vts-v0.1.15_GH0.tar.gz) = 371128
SHA256 (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 958bd8de773601d8d3138501cc4be0420f1c818a3987a70cc9c0023371e432cf
SIZE (openresty-xss-nginx-module-v0.05_GH0.tar.gz) = 11477
SHA256 (nginx-njs-4ed8a0b_GH0.tar.gz) = 44cd86b48bf6a65e6faf76b59cbf75b6317d62d33081671d192632baaf43f165
SIZE (nginx-njs-4ed8a0b_GH0.tar.gz) = 229162
SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80
SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280
SHA256 (eustas-ngx_brotli-14dede1_GH0.tar.gz) = 655e47be5d947b105b7fd53303c5a94b78e9c8ed9cd96fc786cedc7445fbf539
SIZE (eustas-ngx_brotli-14dede1_GH0.tar.gz) = 10583
SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106
SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090
SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462
SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Library dependencies:
  1. libpcre.so : devel/pcre
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for nginx-devel-1.13.8:
     DSO=on: Enable dynamic modules support
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     FILE_AIO=on: Enable file aio
     IPV6=on: Enable IPv6 support
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=on: Enable http_addition module
     HTTP_AUTH_REQ=on: Enable http_auth_request module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=on: Enable http_webdav module
     HTTP_FLV=on: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GZIP_STATIC=on: Enable http_gzip_static module
     HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_MP4=on: Enable http_mp4 module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=on: Enable http_random_index module
     HTTP_REALIP=on: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=on: Enable http_secure_link module
     HTTP_SLICE=on: Enable http_slice module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=on: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     MAIL=on: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=on: Enable mail_ssl module
     HTTPV2=on: Enable HTTP/2 protocol support (SSL req.)
     NJS=off: Enable http_javascript module
     STREAM=on: Enable stream module
     STREAM_SSL=on: Enable stream_ssl module (SSL req.)
     STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.)
     THREADS=on: Enable threads support
     WWW=on: Enable html sample files
     AJP=off: 3rd party ajp module
     AWS_AUTH=off: 3rd party aws auth module
     CACHE_PURGE=off: 3rd party cache_purge module
     CLOJURE=off: 3rd party clojure module
     CT=off: 3rd party cert_transparency module (SSL req.)
     ECHO=off: 3rd party echo module
     FASTDFS=off: 3rd party fastdfs module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_GEOIP2=off: 3rd party geoip2 module
     HTTP_JSON_STATUS=off: 3rd party http_json_status module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_TARANTOOL=off: 3rd party tarantool upstream module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module
     HTTP_ZIP=off: 3rd party http_zip module
     ARRAYVAR=off: 3rd party array_var module
     BROTLI=off: 3rd party brotli module
     DRIZZLE=off: 3rd party drizzlie module
     DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     NAXSI=off: 3rd party naxsi module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgres module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SHIBBOLETH=off: 3rd party shibboleth module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SMALL_LIGHT=off: 3rd party small_light module
     SRCACHE=off: 3rd party srcache module
     VOD=off: 3rd party vod module
     VTS=off: 3rd party vts module
     X11=off: graphics/ImageMagick[-nox11] dependency
     XSS=off: 3rd party xss module
===> Use 'make config' to modify these settings

USES:
cpe ssl

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2016-09-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx now creates logs under /var/log/nginx/ and changes default log
      names from "nginx-access.log" and "nginx-error.log" to "access.log" and
      "error.log" respectively.  This is important for the error log because
      the location is encoded and touched by nginx during startup regardless
      of the configured location for the error log.
    
      See http://trac.nginx.org/nginx/ticket/147 for additional information
      on why this happens.
    
    
  • 2016-02-29
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      The ${MODULESDIR}, default directory for dynamic modules, has been
      changed from ${ETCDIR}/modules to ${PREFIX}/libexec/${PORTNAME}.
      It's highly recommended to review existing configuration files of
      nginx, i.e. ${PREFIX}/etc/nginx/nginx.conf.
    
    
  • 2016-02-17
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_dynamic_upstream_module.so";
      load_module "modules/ngx_http_small_light_module.so";
    
    
  • 2016-02-14
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled for the following third-party
      modules, in case of usage of these modules please update nginx
      configuration file for load these modules:
    
      load_module "modules/ngx_http_echo_module.so";
      load_module "modules/ngx_http_headers_more_filter_module.so";
      load_module "modules/ngx_http_eval_module.so";
      load_module "modules/ngx_http_lua_module.so";
      load_module "modules/ngx_http_set_misc_module.so";
    
    
  • 2016-02-13
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Dynamic modules support has been enabled.  In case of usage following
      modules please update nginx configuration file for load these modules:
    
      load_module "modules/ngx_http_geoip_module.so";
      load_module "modules/ngx_http_image_filter_module.so";
      load_module "modules/ngx_http_xslt_filter_module.so";
      load_module "modules/ngx_mail_module.so";
      load_module "modules/ngx_stream_module.so";
    
      See https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ for details.
    
    
  • 2011-09-28
    Affects: users of www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Note: 1.1.4 release introduces several API changes which may affect
      third-party modules.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 809 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
10 Jun 2010 17:12:31
Original commit files touched by this commit  0.8.40_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.2 to 0.2.5.
Remove needless patches.

Do not bump PORTREVISIONs.
10 Jun 2010 07:19:18
Original commit files touched by this commit  0.8.40_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Configure temporary path for ngx_http_uwsgi_module.
Bump PORTREVISION.

Submitted by:   Piotr Sikora aka piotr dot sikora at frickle dot com
08 Jun 2010 11:28:41
Original commit files touched by this commit  0.8.40
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.4 to 1.5.
Remove needless patch.

Do not bump PORTREVISIONs.
08 Jun 2010 04:47:29
Original commit files touched by this commit  0.8.40
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party cache_purge module from 1.0 to 1.1.

Do not bump PORTREVISIONs.
07 Jun 2010 13:34:24
Original commit files touched by this commit  0.8.40
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.39 to 0.8.40.
License.

<ChangeLog>

*) Security: now nginx/Windows ignores default file stream name.
   Thanks to Jose Antonio Vazquez Gonzalez.

*) Feature: the ngx_http_uwsgi_module.
   Thanks to Roberto De Ioris.

*) Feature: a "fastcgi_param" directive with value starting with
   "HTTP_" overrides a client request header line.

*) Bugfix: the "If-Modified-Since", "If-Range", etc. client request
   header lines were passed to FastCGI-server while caching.

*) Bugfix: listen unix domain socket could not be changed during
   reconfiguration.
   Thanks to Maxim Dounin.

</ChangeLog>
07 Jun 2010 02:45:14
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.09 to 0.10.

Do not bump PORTREVISIONs.
06 Jun 2010 07:09:19
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 2.2.12 to 2.2.14:

1) third-party passenger module for www/nginx and www/nginx-devel
2) www/rubygem-passenger

Do not bump PORTREVISIONs. [1]

Approved by:    Jacob Atzen aka jatzen at gmail dot com [2]
02 Jun 2010 17:14:56
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.08 to 0.09.

Do not bump PORTREVISIONs.
01 Jun 2010 09:43:03
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update:

1) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx
2) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx-devel
3) www/rubygem-passenger from 2.2.11 to 2.2.12

Remove needless patch. [2]

Do not bump PORTREVISIONs.

Approved by:    Jacob Atzen aka jatzen at gmail dot com [3]
31 May 2010 16:34:49
Original commit files touched by this commit  0.8.39
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.38 to 0.8.39.

<ChangeLog>

*) Bugfix: an inherited "alias" directive worked incorrectly in
   inclusive location.

*) Bugfix: in "alias" with variables and "try_files" directives
   combination.

*) Bugfix: listen unix domain and IPv6 sockets did not inherit while
   online upgrade.
   Thanks to Maxim Dounin.

</ChangeLog>
25 May 2010 16:10:57
Original commit files touched by this commit  0.8.38
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.3 to 1.4.
Remove needless patch.

Do not bump PORTREVISIONs.
24 May 2010 17:17:17
Original commit files touched by this commit  0.8.38
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.37 to 0.8.38.
Add four hacks for third-party modules.

<ChangeLog>

*) Feature: the "proxy_no_cache" and "fastcgi_no_cache" directives.

*) Feature: now the "rewrite" directive does a redirect automatically
   if the $scheme variable is used.
   Thanks to Piotr Sikora.

*) Bugfix: now "limit_req" delay directive conforms to the described
   algorithm.
   Thanks to Maxim Dounin.

*) Bugfix: the $uid_got variable might not be used in the SSI and perl
   modules.

</ChangeLog>
17 May 2010 06:39:22
Original commit files touched by this commit  0.8.37
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.36 to 0.8.37.

<ChangeLog>

*) Feature: the ngx_http_split_clients_module.

*) Feature: the "map" directive supports keys more than 255 characters.

*) Bugfix: nginx ignored the "private" and "no-store" values in the
   "Cache-Control" backend response header line.

*) Bugfix: a "stub" parameter of an "include" SSI directive was not
   used, if empty response has 200 status code.

*) Bugfix: if a proxied or FastCGI request was internally redirected to
   another proxied or FastCGI location, then a segmentation fault might
   occur in a worker process; the bug had appeared in 0.8.33.
   Thanks to Yichun Zhang.

*) Bugfix: IMAP connections may hang until they timed out while talking
   to Zimbra server.
   Thanks to Alan Batie.

</ChangeLog>
07 May 2010 03:56:19
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.28 to 0.30.

Do not bump PORTREVISIONs.
03 May 2010 13:58:42
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.27 to 0.28.

Do not bump PORTREVISIONs.
29 Apr 2010 04:18:25
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party supervisord module from 1.3 to 1.4.

Do not bump PORTREVISIONs.
28 Apr 2010 19:18:28
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party headers_more module from 0.07 to 0.08.
23 Apr 2010 03:43:21
Original commit files touched by this commit  0.8.36
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.35 to fresh bugfix release 0.8.36.
Update third party http_memc module from 0.06 to 0.08.

<ChangeLog>

*) Bugfix: the ngx_http_dav_module handled incorrectly the DELETE,
   COPY, and MOVE methods for symlinks.

*) Bugfix: values of the $query_string, $arg_..., etc. variables cached
   in main request were used by the SSI module in subrequests.

*) Bugfix: a variable value was repeatedly encoded after each an "echo"
   SSI-command output; the bug had appeared in 0.6.14.

*) Bugfix: a worker process hung if a FIFO file was requested.
   Thanks to Vicente Aguilar and Maxim Dounin.

*) Bugfix: OpenSSL-1.0.0 compatibility on 64-bit Linux.
   Thanks to Maxim Dounin.

*) Bugfix: nginx could not be built --without-http-cache; the bug had
   appeared in 0.8.35.

<ChangeLog>
08 Apr 2010 11:08:05
Original commit files touched by this commit  0.8.35
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.26 to 0.27.
Remove needless extra patch.

Do not bump PORTREVISIONs.
01 Apr 2010 17:03:35
Original commit files touched by this commit  0.8.35
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.34 to 0.8.35.

Add quick fix for ngx_echo_module, also sent the patch to upstream.

<ChangeLog>

*) Change: now the charset filter runs before the SSI filter.

*) Feature: the "chunked_transfer_encoding" directive.

*) Bugfix: an "&" character was not escaped when it was copied in
   arguments part in a rewrite rule.

*) Bugfix: nginx might be terminated abnormally while a signal
   processing or if the directive "timer_resolution" was used on
(Only the first 15 lines of the commit message are shown above View all of this commit message)
28 Mar 2010 04:44:55
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Cleanse uneeded RC_SUBR variables

Approved by:    pgolluci
27 Mar 2010 00:15:24
Original commit files touched by this commit  0.8.35
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
25 Mar 2010 10:02:43
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third-party echo module version 0.26.

Do not bump PORTREVISIONs.
25 Mar 2010 02:37:06
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party auth request module from 0.1 to 0.2.

Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: auth_request_set directive.

*) Bugfix: segmentation fault happened on auth request handled by
   proxy_pass or fastcgi_pass if initial request has non-empty body.

</ChangeLog>
23 Mar 2010 05:01:02
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party gunzip filter module from 0.2 to 0.3.

Do not bump PORTREVISIONs.
10 Mar 2010 04:30:34
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.1 to 0.2.2.

Do not bump PORTREVISIONs.

PR:     144557
09 Mar 2010 09:49:09
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update CATEGORIES if defined passenger module support.

Do not bump PORTREVISIONs.
05 Mar 2010 11:46:00
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party passenger module from 2.0.10 to 2.0.11.

Do not bump PORTREVISIONs.

Feature safe:   yes
03 Mar 2010 18:48:59
Original commit files touched by this commit  0.8.34
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.33 to 0.8.34.

Feature safe: yes

<ChangeLog>

*) Bugfix: nginx did not support all ciphers and digests used in client
   certificates.
   Thanks to Innocenty Enikeew.

*) Bugfix: nginx cached incorrectly FastCGI responses if there was
   large stderr output before response.

*) Bugfix: nginx did not support HTTPS referrers.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
02 Mar 2010 10:31:38
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upload module from 2.0.11 to 2.0.12.
Remove needless patch for www/nginx-devel.

Do not bump PORTREVISIONs.

Feature safe:   yes
27 Feb 2010 19:56:07
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party auth_request module, version 0.1.

Do not bump PORTREVISIONs.

Feature safe:   yes
27 Feb 2010 19:20:20
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party headers_more module, version 0.07.

Do not bump PORTREVISIONs.

Feature safe:   yes
22 Feb 2010 17:29:33
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party modules:

o) http_push from 0.69 to 0.692;
o) passenger from 2.2.9 to 2.2.10.

Do not bump PORTREVISIONs.

Feature safe:   yes
22 Feb 2010 13:53:25
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party modules for www/nginx and www/nginx-devel:

o) h264_streaming from 2.2.5 to 2.2.7;
o) passenger from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.

Feature safe:   yes
18 Feb 2010 19:16:13
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party module accept language.

Do not bump PORTREVISIONs.

Feature safe:   yes

Submitted by:   Mike Stupalov aka landy2005 at gmail dot com
PR:             ports/143787
08 Feb 2010 03:56:37
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update memc (aka advanced memcached) module
from 0.05 to 0.06.

Do not bump PORTREVISIONs.
07 Feb 2010 10:21:47
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update upstream_hash module from 0.3 to 0.3.1.

Do not bump PORTREVISION.
06 Feb 2010 18:52:56
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update fancyindex module from 0.1_beta5 to 0.2.1.
Remove needless patches.

Do not bump PORTREVISIONs.
04 Feb 2010 10:08:56
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update gunzip_filter module from 0.1 to 0.2 for
www/nginx and www/nginx-devel.

Do not bump PORTREVISIONs.

Spotted by:     Maxim Dounin aka mdounin at mdounin dot ru
02 Feb 2010 00:56:26
Original commit files touched by this commit  0.8.33
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.32 to 0.8.33.

Feature safe:   yes

<ChangeLog>

*) Security: now nginx/Windows ignores trailing spaces in URI.
   Thanks to Dan Crowley, Core Security Technologies.

*) Security: now nginx/Windows ignores short files names.
   Thanks to Dan Crowley, Core Security Technologies.

*) Change: now keepalive connections after POST requests are not
   disabled for MSIE 7.0+. Thanks to Adam Lounds.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
18 Jan 2010 19:53:37
Original commit files touched by this commit  0.8.32
 This port version is marked as vulnerable.
osa search for other commits by this committer
This is accordingly update for www/nginx and www/nginx-devel.

Add one more third-party module: upstream_hash, version 0.3.1.
Update slowfs_cache module from 1.2 to 1.3.
Update mogilefs module from 1.0.2 to 1.0.3.

Do not bump PORTREVISIONs.
14 Jan 2010 18:55:41
Original commit files touched by this commit  0.8.32
 This port version is marked as vulnerable.
osa search for other commits by this committer
Use USE_OPENSSL instead of bsd.openssl.mk.

Do not remove default DISTFILES due to port building
failure when third-party module (i.e. additional DISTFILES)
selected.

Do not bump PORTREVISIONs.

PRs:    142831, 142833
11 Jan 2010 17:23:35
Original commit files touched by this commit  0.8.32
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.31 to 0.8.32.

<ChangeLog>

*) Bugfix: UTF-8 encoding usage in the ngx_http_autoindex_module.
   Thanks to Maxim Dounin.

*) Bugfix: regular expression named captures worked for two names only.
   Thanks to Maxim Dounin.

*) Bugfix: now the "localhost" name is used in the "Host" request
   header line, if an unix domain socket is defined in the "auth_http"
   directive.
   Thanks to Maxim Dounin.

*) Bugfix: nginx did nor support chunked transfer encoding for 201
   responses.
   Thanks to Julian Reich.

*) Bugfix: if the "expires modified" set date in the past, the a
   negative number was set in the "Cache-Control" response header
   line.
   Thanks to Alex Kapranoff.

</ChangeLog>
11 Jan 2010 07:43:39
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add ngx_cache_purge-1.0, the module adding ability
to purge content from nginx's FastCGI and proxy caches.

Do not bump PORTREVISIONs.
09 Jan 2010 19:19:03
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Revert back update Passenger from 2.2.9 to 2.2.8
due to incompatible infrastructure.

Do not bump PORTREVISIONs.
08 Jan 2010 19:34:15
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update Passenger module from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.
06 Jan 2010 20:29:50
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add memc module - an extended version of the
standard memcached module that supports set, add, delete,
and many more memcached commands.

Do not bump PORTREVISIONs.
05 Jan 2010 22:06:43
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly commit changes for third-party modules in www/nginx
and www/nginx-devel:

 o) update uploadprogress from 0.7 to 0.8;
 o) update upstream_fair from 20081012 to 20090923;
 o) update supervisord from 1.2 to 1.3;
 o) add udplog (syslog) module version 1.0.0;
 o) s/modle/module/ for both Makefiles.

Remove needless patches.

Do not bump PORTREVISIONs.
03 Jan 2010 17:53:22
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update upstream_keepalive module, from 0.1 to 0.2.
Do not bump PORTREVISIONs.
29 Dec 2009 07:14:11
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update slowfs_cache module, from 1.1 to 1.2.
Do not bump PORTREVISIONs.
29 Dec 2009 07:04:33
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add http_gunzip_filter module, version 0.1.
Do not bump PORTREVISIONs.
26 Dec 2009 13:04:41
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update http_redis module from 0.3.0 to 0.3.1.
Cosmetic whitespace fix for Makefile.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Change: return 502 instead of 404 for error.

*) Change: better error messages diagnostics.

*) Bugfix: interoperability with redis; the bug had
   appeared in 0.3.0.

</ChangeLog>
25 Dec 2009 15:20:15
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more know WITH_DEBUGLOG by split debug features
for distro (--with-debug) and system (-g) specific.
25 Dec 2009 09:53:04
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Improve redis protocol support.
Do not bump PORTREVISION.
23 Dec 2009 21:22:26
Original commit files touched by this commit  0.8.31
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.30 to 0.8.31.
Update http_redis module from 0.2.0 to 0.3.0.
Remove needless extra patch.

<ChangeLog>

*) Feature: now the "error_page" directive may redirect the 301 and 302
   responses.

*) Feature: the $geoip_city_continent_code, $geoip_latitude, and
   $geoip_longitude variables.
   Thanks to Arvind Sundararajan.

*) Feature: now the ngx_http_image_filter_module deletes always EXIF
   and other application specific data if the data consume more than 5%
(Only the first 15 lines of the commit message are shown above View all of this commit message)
22 Dec 2009 11:42:22
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update slowfs_cache module, from 1.0 to 1.1.
Do not bump PORTREVISION.
22 Dec 2009 04:55:50
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third party slowfs_cache module, version 1.0.
Do not bump PORTREVISION.
21 Dec 2009 20:31:46
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party supervisord module, version 1.2.
Do not bump PORTREVISIONs.
21 Dec 2009 18:46:06
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party http_push module, version 0.69.
Do not bump PORTREVISIONs.
19 Dec 2009 23:05:28
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party http_auth_pam module, version 1.1.
Do not bump PORTREVISIONs.

Spotted by:     Paul Cockings aka dspam at cytringan dot co dot uk
19 Dec 2009 10:56:33
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update uploadprogress module with patch from github.
Do not bump PORTREVISIONs.

Spotted by:     Vladimir Getmanshchuk aka vladget at openfilm dot com
Requested by:   Brice Figureau aka brice at daysofwonder dot com
                (uploadprogress module author)
17 Dec 2009 11:23:06
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update Passenger(tm) module from 2.2.7 to 2.2.8.
15 Dec 2009 16:11:19
Original commit files touched by this commit  0.8.30
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.29 to 0.8.30.

<ChangeLog>

*) Change: now the default buffer size of the
   "large_client_header_buffers" directive is 8K.
   Thanks to Andrew Cholakian.

*) Feature: the conf/fastcgi.conf for simple FastCGI configurations.

*) Bugfix: nginx/Windows tried to rename a temporary file twice if the
   file should replace an already existent file.

*) Bugfix: of "double free or corruption" error issued if host could
   not be resolved; the bug had appeared in 0.8.22.
   Thanks to Konstantin Svist.

*) Bugfix: in libatomic usage on some platforms.
   Thanks to W-Mark Kubacki.

</ChangeLog>
01 Dec 2009 04:22:10
Original commit files touched by this commit  0.8.29
 This port version is marked as vulnerable.
osa search for other commits by this committer
Make uploadprogress module fetchtable (accordingly).

Notice from:    Vladimir Getmanshchuk aka vladget at openfilm dot com
30 Nov 2009 14:12:05
Original commit files touched by this commit  0.8.29
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.28 to 0.8.29.

<ChangeLog>

*) Change: now the "009" status code is written to an access log for
   proxied HTTP/0.9 responses.

*) Feature: the "addition_types", "charset_types", "gzip_types",
   "ssi_types", "sub_filter_types", and "xslt_types" directives support
   an "*" parameter.

*) Feature: GCC 4.1+ built-in atomic operations usage.
   Thanks to W-Mark Kubacki.

*) Feature: the --with-libatomic[=DIR] option in the configure.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
26 Nov 2009 06:52:33
Original commit files touched by this commit  0.8.28
 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix upload module bug:
keepalive connection was hanging after upload has been completed.

Do not bump PORTREVISION.
24 Nov 2009 12:08:22
Original commit files touched by this commit  0.8.28
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.27 to 0.8.28.

<ChangeLog>

*) Bugfix: nginx could not be built with the --without-pcre parameter;
   the bug had appeared in 0.8.25.

</ChangeLog>
24 Nov 2009 11:56:27
Original commit files touched by this commit  0.8.28
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update (www/nginx and www/nginx-devel):

 passenger module support from 2.2.5 to 2.2.7;
 upload module to 2.0.11;
 uploadprogress module from 0.6 to 0.7.

Remove needless patch.

Also, h264 module distfile re-rolled due moon phase.

Do not bump PORTREVISIONs.
19 Nov 2009 10:09:29
Original commit files touched by this commit  0.8.27
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.24 to 0.8.27.

<ChangeLog>

Changes with nginx 0.8.27

*) Bugfix: regular expressions did work in nginx/Windows; the bug had
   appeared in 0.8.25.

Changes with nginx 0.8.26

*) Bugfix: in captures usage in "rewrite" directive; the bug had
   appeared in 0.8.25.

*) Bugfix: nginx could not be built without the --with-debug option;
(Only the first 15 lines of the commit message are shown above View all of this commit message)
12 Nov 2009 08:20:12
Original commit files touched by this commit  0.8.24
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.22 to 0.8.24.

<ChangeLog>

Changes with nginx 0.8.24

*) Bugfix: nginx always added "Content-Encoding: gzip" response header
   line in 304 responses sent by ngx_http_gzip_static_module.

*) Bugfix: nginx could not be built without the --with-debug option;
   the bug had appeared in 0.8.23.

*) Bugfix: the "unix:" parameter of the "set_real_ip_from" directive
   inherited incorrectly from previous level.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
09 Nov 2009 19:51:42
Original commit files touched by this commit  0.8.22
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update h264 (aka http_mp4_h264) module from the dated material to
version 2.2.5 for www/nginx and www/nginx-devel accordingly.

Do not bump PORTREVISIONs.

Requested by:   many
04 Nov 2009 21:24:35
Original commit files touched by this commit  0.8.22
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing library dependence for http_image_filter module for
www/nginx and www/nginx-devel accordingly.

Do not bump PORTREVISIONs.
03 Nov 2009 19:55:53
Original commit files touched by this commit  0.8.22
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.21 to 0.8.22.

<ChangeLog>

*) Feature: the "proxy_bind", "fastcgi_bind", and "memcached_bind"
   directives.

*) Feature: the "access" and the "deny" directives support IPv6.

*) Feature: the "set_real_ip_from" directive supports IPv6 addresses in
   request headers.

*) Feature: the "unix:" parameter of the "set_real_ip_from" directive.

*) Bugfix: nginx did not delete unix domain socket after configuration
(Only the first 15 lines of the commit message are shown above View all of this commit message)
26 Oct 2009 16:05:53
Original commit files touched by this commit  0.8.21
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.20 to 0.8.21.
Illuminate http_image_filter module.

<ChangeLog>

*) Feature: now the "-V" switch shows TLS SNI support.

*) Feature: the "listen" directive of the HTTP module supports unix
   domain sockets.
   Thanks to Hongli Lai.

*) Feature: the "default_server" parameter of the "listen" directive.

*) Feature: now a "default" parameter is not required to set listen
   socket options.

*) Bugfix: nginx did not support dates in 2038 year on 32-bit platforms;

*) Bugfix: socket leak; the bug had appeared in 0.8.11.

</ChangeLog>
14 Oct 2009 17:08:50
Original commit files touched by this commit  0.8.20
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.19 to 0.8.20.

<ChangeLog>

*) Change: now default SSL ciphers are "HIGH:!ADH:!MD5".

*) Bugfix: the ngx_http_autoindex_module did not show the trailing
   slash in links to a directory; the bug had appeared in 0.7.15.

*) Bugfix: nginx did not close a log file set by the --error-log-path
   configuration option; the bug had appeared in 0.7.53.

*) Bugfix: nginx did not treat a comma as separator in the
   "Cache-Control" backend response header line.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
06 Oct 2009 17:20:33
Original commit files touched by this commit  0.8.19
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.18 to 0.8.19.

<ChangeLog>

*) Change: now SSLv2 protocol is disabled by default.

*) Change: now default SSL ciphers are "ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM".

*) Bugfix: a "limit_req" directive did not work; the bug had appeared
   in 0.8.18.

</ChangeLog>
06 Oct 2009 13:24:22
Original commit files touched by this commit  0.8.18
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.17 to 0.8.18.

<ChangeLog>

*) Feature: the "read_ahead" directive.

*) Feature: now several "perl_modules" directive may be used.

*) Feature: the "limit_req_log_level" and "limit_conn_log_level"
   directives.

*) Bugfix: now "limit_req" directive conforms to the leaky bucket
   algorithm.
   Thanks to Maxim Dounin.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
28 Sep 2009 18:11:01
Original commit files touched by this commit  0.8.17
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.16 to 0.8.17.

Feature safe:   yes

<ChangeLog>

*) Security: now "/../" are disabled in "Destination" request header
   line.

*) Change: now $host variable value is always low case.

*) Feature: the $ssl_session_id variable.

*) Bugfix: socket leak; the bug had appeared in 0.8.11.

</ChangeLog>
22 Sep 2009 19:54:43
Original commit files touched by this commit  0.8.16
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update ngx_http_redis module from 0.1.2 to 0.2.0 accordingly.
Do not bump PORTREVISION.

Feature safe:   yes

<ChangeLog>

*) Feature: the $redis_db variable: now the ngx_http_redis
   module uses the $redis_db variable value as the parameter
   for SELECT command.

*) Cleanup: style/spaces fixes.

</ChangeLog>
22 Sep 2009 17:23:57
Original commit files touched by this commit  0.8.16
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.15 to 0.8.16.

Feature safe:   yes

<ChangeLog>

*) Feature: the "image_filter_transparency" directive.

*) Bugfix: "addition_types" directive was incorrectly named
   "addtion_types".

*) Bugfix: resolver cache poisoning.
   Thanks to Matthew Dempsky.

*) Bugfix: memory leak in resolver.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Sep 2009 17:12:50
Original commit files touched by this commit  0.8.15
 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 0.8.14 to 0.8.15.
Update http_redis module from 0.1.1 to 0.1.2.

<ChangeLog>

*) Security: a segmentation fault might occur in worker process while
   specially crafted request handling.
   Thanks to Chris Ries.

*) Bugfix: if names .domain.tld, .sub.domain.tld, and .domain-some.tld
   were defined, then the name .sub.domain.tld was matched by
   .domain.tld.

*) Bugfix: in transparency support in the ngx_http_image_filter_module.

*) Bugfix: in file AIO.

*) Bugfix: in X-Accel-Redirect usage; the bug had appeared in 0.8.11.

*) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.

</ChangeLog>
13 Sep 2009 08:42:27
Original commit files touched by this commit  0.8.14
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update upload_progress module from 0.5 to 0.6.
Remove needless patch.
Do not bump PORTREVISION.

Notice from:    Brice Figureau aka brice at daysofwonder dot com
12 Sep 2009 18:20:23
Original commit files touched by this commit  0.8.14
 This port version is marked as vulnerable.
osa search for other commits by this committer
Merge new fix existing patch for uploadprogress module for
nginx and nginx-devel accordingly.
Do not bump PORTREVISIONs.

Patch from:     Brice Figureau aka brice at daysofwonder dot com
Tested by:      Vladimir Getmanshchuk aka vladget at openfilm dot com
07 Sep 2009 18:42:02
Original commit files touched by this commit  0.8.14
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.13 to 0.8.14.

<ChangeLog>

*) Bugfix: an expired cached response might stick in the "UPDATING"
   state.

*) Bugfix: a segmentation fault might occur in worker process, if
   error_log was set to info or debug level.
   Thanks to Sergey Bochenkov.

*) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.

*) Bugfix: an "error_page" directive did not redirect a 413 error; the
   bug had appeared in 0.6.10.

</ChangeLog>
04 Sep 2009 10:37:40
Original commit files touched by this commit  0.8.13
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger module from 2.2.4 to 2.2.5.

Update mod_zip module from 1.1.4 to 1.1.5.
Also change MASTER_SITE for mod_zip module.

Do not bump PORTREVISION.
31 Aug 2009 16:18:42
Original commit files touched by this commit  0.8.13
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.12 to 0.8.13.

<ChangeLog>

*) Bugfix: in the "aio sendfile" directive. the bug had appeared in
   0.8.12.

*) Bugfix: nginx could not be built without the --with-file-aio option
   on FreeBSD; the bug had appeared in 0.8.12.

</ChangeLog>
31 Aug 2009 13:22:00
Original commit files touched by this commit  0.8.12
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.11 to 0.8.12.
Remove needless vendor patch.

<ChangeLog>

*) Feature: the "sendfile" parameter in the "aio" directive on FreeBSD.

*) Bugfix: in try_files; the bug had appeared in 0.8.11.

*) Bugfix: in memcached; the bug had appeared in 0.8.11.

</ChangeLog>
31 Aug 2009 09:48:06
Original commit files touched by this commit  0.8.11_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add vendor patch for memcached module.
Update nginx_upload module from 2.0.9 to 2.0.10.
Update nginx_http_redis module from 0.1 to 0.1.1.

Bump PORTREVISION.
28 Aug 2009 16:13:10
Original commit files touched by this commit  0.8.11
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.10 to 0.8.11.
Remove needless extra patch.

<ChangeLog>

*) Change: directive "gzip_disable msie6" enables gzipping for
   MSIE 6.0 SV1.

*) Feature: file AIO support on FreeBSD and Linux.

*) Feature: the "directio_alignment" directive.

</ChangeLog>
24 Aug 2009 11:46:24
Original commit files touched by this commit  0.8.10
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.9 to 0.8.10.

<ChangeLog>

*) Bugfix: memory leaks if GeoIP City database was used.

*) Bugfix: in copying temporary files to permanent storage area; the
   bug had appeared in 0.8.9.

</ChangeLog>
24 Aug 2009 10:02:35
Original commit files touched by this commit  0.8.9
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add http_redis module support.
Add experimental file aio support.

Do not bump PORTREVISION cause new features are disabled by default.
18 Aug 2009 05:43:08
Original commit files touched by this commit  0.8.9
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.8 to 0.8.9.

<ChangeLog>

*) Feature: now the start cache loader runs in a separate process; this
   should improve large caches handling.

*) Feature: now temporarily files and permanent storage area may reside
   at different file systems.

</ChangeLog>
10 Aug 2009 10:32:38
Original commit files touched by this commit  0.8.8
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.7 to 0.8.8.

<ChangeLog>

*) Bugfix: in handling FastCGI headers split in records.

*) Bugfix: a segmentation fault occurred in worker process, if a
   request was handled in two proxied or FastCGIed locations and a
   caching was enabled in the first location; the bug had appeared in
   0.8.7.

</ChangeLog>
27 Jul 2009 16:56:50
Original commit files touched by this commit  0.8.7
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.6 to 0.8.7.

<ChangeLog>

*) Change: minimum supported OpenSSL version is 0.9.7.

*) Change: the "ask" parameter of the "ssl_verify_client" directive was
   changed to the "optional" parameter and now it checks a client
   certificate if it was offered.
   Thanks to Brice Figureau.

*) Feature: the $ssl_client_verify variable.
   Thanks to Brice Figureau.

*) Feature: the "ssl_crl" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
27 Jul 2009 05:59:19
Original commit files touched by this commit  0.8.6
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update mogilefs module from 1.0.1 to 1.0.2.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: directive mogilefs_methods and support for PUT and
   DELETE methods
*) Feature: dynamic evaluation of tracker name
*) Feature: ability to pass noverify parameter to tracker

</ChangeLog>
21 Jul 2009 13:53:14
Original commit files touched by this commit  0.8.6
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for http_geoip module (introduced in 0.8.6).
Do not bump PORTREVISION.
20 Jul 2009 09:04:55
Original commit files touched by this commit  0.8.6
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.5 to 0.8.6.

Add two new variables NGINX_ACCESSLOG and NGINX_ERRORLOG
to allow log paths customization, i.e.

% make NGINX_ACCESSLOG=/dev/null

NOTE.  If you want nginx to log errors into stderr it's
better to use

% make NGINX_ERRORLOG=stderr

instead of NGINX_ERRORLOG=/dev/stderr to avoid duplicate
error messages during startup.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
17 Jul 2009 06:12:47
Original commit files touched by this commit  0.8.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add two more third-party modules: http_mp4_streaming_lite
and http_notice_module.

Submitted by:   Konrad Lapsz aka konrad dot lapsz at gmail dot com
15 Jul 2009 16:56:10
Original commit files touched by this commit  0.8.5
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
15 Jul 2009 14:09:33
Original commit files touched by this commit  0.8.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Resort options to make third party modules distinguishable.
Apply these changes accordingly for stable and devel versions.
Do not bump PORTREVISIONs.

Submitted by:   Maxim Dounin aka mdounin at mdounin dot ru

Number of commits found: 809 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
transmission-daemonJan 14
xmltoolingJan 12
linux-flashplayerJan 09
awstatsJan 08
irssiJan 06
firefoxJan 05
waterfoxJan 05
libevhtp*Jan 04
oniguruma*Jan 04
php56-mbstring*Jan 04
php70-mbstring*Jan 04
php71-mbstring*Jan 04
irssi*Dec 31
roundcube*Dec 31
rsync*Dec 31

10 vulnerabilities affecting 42 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2018-01-14 03:23:30


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 32588
Broken 118
Deprecated 93
Ignore 355
Forbidden 0
Restricted 172
No CDROM 77
Vulnerable 39
Expired 7
Set to expire 84
Interactive 0
new 24 hours 10
new 48 hours14
new 7 days40
new fortnight446
new month960

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2018 Dan Langille. All rights reserved.