notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Hardware failure

The website is running on the old server. The new server stopped working at about 0200 UTC on 2020-08-22. The database was restored from 2020-08-21 00:59:15+00 UTC. We think we have covered all commits. Nothing should be missing. Any changes you made to your accounts after the restore date will be lost. Sorry about that.
Port details
nginx Robust and small WWW server
1.18.0_30,2 www on this many watch lists=111 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. 1.18.0_25,2Version of this port present on the latest quarterly branch.
Maintainer: joneum@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2004-10-21 18:03:06
Last Update: 2020-11-06 21:06:25
SVN Revision: 554318

People watching this port, also watch: sudo, curl, rsync, wget

License: BSD2CLAUSE
Description:
SVNWeb : Homepage
pkg-plist: as obtained via: make generate-plist
Expand this list (108 items)
Collapse this list.
  1. /usr/local/share/licenses/nginx-1.18.0_30,2/catalog.mk
  2. /usr/local/share/licenses/nginx-1.18.0_30,2/LICENSE
  3. /usr/local/share/licenses/nginx-1.18.0_30,2/BSD2CLAUSE
  4. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  5. etc/nginx/koi-utf
  6. etc/nginx/koi-win
  7. @comment include/ngx_link_func_module.h
  8. @comment etc/nginx/naxsi_core.rules
  9. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  10. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  11. etc/nginx/win-utf
  12. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  13. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  14. @comment libexec/nginx/ngx_http_array_var_module.so
  15. @comment libexec/nginx/ngx_http_aws_auth_module.so
  16. @comment libexec/nginx/ngx_http_brotli_filter_module.so
  17. @comment libexec/nginx/ngx_http_brotli_static_module.so
  18. @comment libexec/nginx/ngx_http_clojure_module.so
  19. @comment libexec/nginx/ngx_ssl_ct_module.so
  20. @comment libexec/nginx/ngx_http_ssl_ct_module.so
  21. @comment libexec/nginx/ngx_http_echo_module.so
  22. @comment libexec/nginx/ngx_http_dynamic_healthcheck_module.so
  23. @comment libexec/nginx/ngx_http_dynamic_upstream_module.so
  24. @comment libexec/nginx/ndk_http_module.so
  25. @comment libexec/nginx/ngx_http_drizzle_module.so
  26. @comment libexec/nginx/ngx_http_encrypted_session_module.so
  27. @comment libexec/nginx/ngx_http_form_input_module.so
  28. @comment libexec/nginx/ngx_http_gridfs_module.so
  29. @comment libexec/nginx/ngx_http_headers_more_filter_module.so
  30. @comment libexec/nginx/ngx_http_accept_language_module.so
  31. @comment libexec/nginx/ngx_http_auth_digest_module.so
  32. @comment libexec/nginx/ngx_http_auth_jwt_module.so
  33. @comment libexec/nginx/ngx_http_auth_spnego_module.so
  34. @comment libexec/nginx/ngx_http_auth_ldap_module.so
  35. @comment libexec/nginx/ngx_http_auth_pam_module.so
  36. @comment libexec/nginx/ngx_http_dav_ext_module.so
  37. @comment libexec/nginx/ngx_http_eval_module.so
  38. @comment libexec/nginx/ngx_http_fancyindex_module.so
  39. @comment libexec/nginx/ngx_http_footer_filter_module.so
  40. @comment libexec/nginx/ngx_http_geoip2_module.so
  41. @comment libexec/nginx/ngx_stream_geoip2_module.so
  42. @comment libexec/nginx/ngx_http_image_filter_module.so
  43. @comment libexec/nginx/ngx_http_ip2location_module.so
  44. @comment libexec/nginx/ngx_http_ip2proxy_module.so
  45. @comment libexec/nginx/ngx_http_json_status_module.so
  46. @comment libexec/nginx/ngx_http_mogilefs_module.so
  47. @comment libexec/nginx/ngx_http_h264_streaming_module.so
  48. @comment libexec/nginx/ngx_http_notice_module.so
  49. @comment libexec/nginx/ngx_http_perl_module.so
  50. @comment libexec/nginx/ngx_nchan_module.so
  51. @comment libexec/nginx/ngx_http_push_stream_module.so
  52. @comment libexec/nginx/ngx_http_redis_module.so
  53. @comment libexec/nginx/ngx_http_response_module.so
  54. @comment libexec/nginx/ngx_http_subs_filter_module.so
  55. @comment libexec/nginx/ngx_http_tnt_module.so
  56. @comment libexec/nginx/ngx_http_upload_module.so
  57. @comment libexec/nginx/ngx_http_uploadprogress_module.so
  58. @comment libexec/nginx/ngx_http_upstream_fair_module.so
  59. @comment libexec/nginx/ngx_http_sticky_module.so
  60. @comment libexec/nginx/ngx_http_video_thumbextractor_module.so
  61. @comment libexec/nginx/ngx_http_xslt_filter_module.so
  62. @comment libexec/nginx/ngx_http_zip_module.so
  63. @comment libexec/nginx/ngx_http_iconv_module.so
  64. @comment libexec/nginx/ngx_http_let_module.so
  65. @comment libexec/nginx/ngx_http_link_func_module.so
  66. @comment libexec/nginx/ngx_http_lua_module.so
  67. libexec/nginx/ngx_mail_module.so
  68. @comment libexec/nginx/ngx_http_memc_module.so
  69. @comment libexec/nginx/ngx_http_modsecurity_module.so
  70. @comment libexec/nginx/ngx_http_naxsi_module.so
  71. @comment libexec/nginx/ngx_http_js_module.so
  72. @comment libexec/nginx/ngx_stream_js_module.so
  73. @comment libexec/nginx/ngx_http_opentracing_module.so
  74. @comment libexec/nginx/ngx_http_passenger_module.so
  75. @comment libexec/nginx/ngx_postgres_module.so
  76. @comment libexec/nginx/ngx_http_rds_csv_filter_module.so
  77. @comment libexec/nginx/ngx_http_rds_json_filter_module.so
  78. @comment libexec/nginx/ngx_http_redis2_module.so
  79. @comment libexec/nginx/ngx_rtmp_module.so
  80. @comment libexec/nginx/ngx_http_set_misc_module.so
  81. @comment libexec/nginx/ngx_http_shibboleth_module.so
  82. @comment libexec/nginx/ngx_http_slowfs_module.so
  83. @comment libexec/nginx/ngx_http_small_light_module.so
  84. @comment libexec/nginx/ngx_http_srcache_filter_module.so
  85. libexec/nginx/ngx_stream_module.so
  86. @comment libexec/nginx/ngx_http_vod_module.so
  87. @comment libexec/nginx/ngx_http_xss_filter_module.so
  88. @postexec mkdir -p -m 755 %D/www/nginx-dist
  89. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  90. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  91. www/nginx-dist/index.html
  92. www/nginx-dist/50x.html
  93. @postexec chmod a-w %D/www/nginx-dist
  94. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  95. @comment sbin/njs
  96. sbin/nginx
  97. share/vim/vimfiles/ftdetect/nginx.vim
  98. share/vim/vimfiles/ftplugin/nginx.vim
  99. share/vim/vimfiles/indent/nginx.vim
  100. share/vim/vimfiles/syntax/nginx.vim
  101. @dir /var/tmp/nginx
  102. @dir /var/log/nginx
  103. man/man8/nginx.8.gz
  104. @comment %%SITE_ARCH%%/auto/nginx/nginx.so
  105. @comment %%SITE_ARCH%%/nginx.pm
  106. @owner
  107. @group
  108. @mode
Collapse this list.
Dependency lines:
  • nginx>0:www/nginx
Conflicts:
CONFLICTS:
  • nginx-devel-1.*
  • nginx-full-1.*
  • nginx-lite-1.*
  • nginx-naxsi-1.*
CONFLICTS_INSTALL:
  • nginx-devel
Conflicts Matches:
There are no Conflicts Matches for this port. This is usually an error.
To install the port: cd /usr/ports/www/nginx/ && make install clean
To add the package: pkg install nginx
PKGNAME: nginx
Flavors: there is no flavor information for this port.
distinfo:
Packages: (move your mouse over the cells for more information)
nginx
ABIlatestquarterly
FreeBSD:11:aarch641.14.0_11,21.18.0_15,2
FreeBSD:11:amd641.18.0_30,21.18.0_25,2
FreeBSD:11:armv61.10.1,21.18.0_15,2
FreeBSD:11:i3861.18.0_30,21.18.0_25,2
FreeBSD:11:mips--
FreeBSD:11:mips64--
FreeBSD:12:aarch641.14.0_12,21.18.0_15,2
FreeBSD:12:amd641.18.0_30,21.18.0_25,2
FreeBSD:12:armv61.14.0_12,21.18.0_25,2
FreeBSD:12:armv71.14.0_12,21.18.0_25,2
FreeBSD:12:i3861.18.0_30,21.18.0_25,2
FreeBSD:12:mips--
FreeBSD:12:mips64--
FreeBSD:12:powerpc641.14.0_12,21.18.0_15,2
FreeBSD:13:aarch641.18.0_15,2-
FreeBSD:13:amd641.18.0_30,2-
FreeBSD:13:armv61.18.0_30,2-
FreeBSD:13:armv71.18.0_30,2-
FreeBSD:13:i3861.18.0_30,2-
FreeBSD:13:mips--
FreeBSD:13:mips64--
FreeBSD:13:powerpc641.18.0_25,2-
 

Slave ports
  1. www/nginx-full
  2. www/nginx-lite
  3. www/nginx-naxsi

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Library dependencies:
  1. libpcre.so : devel/pcre
This port is required by:
for Build

    Deleted ports which required this port:

    Expand this list of 1 deleted port
    1. www/bigbluebutton*
    2. Collapse this list of deleted ports.
for Run
  1. www/p5-Nginx-ReadBody

Deleted ports which required this port:

Expand this list of 2 deleted ports
  1. sysutils/pcbsd-appweb*
  2. www/bigbluebutton*
  3. Collapse this list of deleted ports.
* - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

Configuration Options

USES:

Master Sites:
Expand this list (6 items)
    Collapse this list.
  1. http://distcache.FreeBSD.org/local-distfiles/joneum/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/joneum/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/joneum/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/joneum/
  5. http://nginx.org/download/
  6. https://nginx.org/download/
  7. Collapse this list.
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2016-09-06
    Affects: uses of www/nginx
    Author: marino@FreeBSD.org
    Reason: 
      Nginx now creates logs under /var/log/nginx/ and changes default log
      names from "nginx-access.log" and "nginx-error.log" to "access.log" and
      "error.log" respectively.  This is important for the error log because
      the location is encoded and touched by nginx during startup regardless
      of the configured location for the error log.
    
      See http://trac.nginx.org/nginx/ticket/147 for additional information
      on why this happens.
    
    
  • Expand this list ( items)Collapse this list.


  • 2016-02-29
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      The ${MODULESDIR}, default directory for dynamic modules, has been
      changed from ${ETCDIR}/modules to ${PREFIX}/libexec/${PORTNAME}.
      It's highly recommended to review existing configuration files of
      nginx, i.e. ${PREFIX}/etc/nginx/nginx.conf.
    
    
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    
  • Collapse this list.

Number of commits found: 842 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
13 Jun 2015 00:00:37
Original commit files touched by this commit  1.8.0_1,2
Revision:389307 This port version is marked as vulnerable.
osa search for other commits by this committer
Welcome back third-party upload module.

PR:	200809
12 Jun 2015 01:31:18
Original commit files touched by this commit  1.8.0_1,2
Revision:389257 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.9 to 5.0.10:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
05 Jun 2015 03:10:09
Original commit files touched by this commit  1.8.0_1,2
Revision:388563 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.8 to 5.0.9:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
02 Jun 2015 07:51:00
Original commit files touched by this commit  1.8.0_1,2
Revision:388308 This port version is marked as vulnerable.
peter search for other commits by this committer
Update the optional (defaults to off) ldap authentication module to a more
recent version.  Of particular importance is that the old one
connected/disconnected to the ldap server for every single URL being served
while this one has a configurable cache.

PR:		200550
Reviewed by:	osa
29 May 2015 14:01:15
Original commit files touched by this commit  1.8.0_1,2
Revision:387856 This port version is marked as vulnerable.
mat search for other commits by this committer
Convert nginx, nginx-devel and tengine to USE_GITHUB.

Sponsored by:	Absolight
28 May 2015 02:38:04
Original commit files touched by this commit  1.8.0_1,2
Revision:387698 This port version is marked as vulnerable.
osa search for other commits by this committer
Make 'make makesum' happy.
26 May 2015 23:12:04
Original commit files touched by this commit  1.8.0_1,2
Revision:387518 This port version is marked as vulnerable.
osa search for other commits by this committer
Add patches for third-party postgres module.
26 May 2015 23:10:53
Original commit files touched by this commit  1.8.0_1,2
Revision:387517 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party postgres module back.

Based on patch from:	Alexander Ushakov <alexander@tauruna.ru>
24 May 2015 16:27:38
Original commit files touched by this commit  1.8.0_1,2
Revision:387280 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.7 to 5.0.8:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
22 May 2015 20:34:29
Original commit files touched by this commit  1.8.0_1,2
Revision:387082 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove $FreeBSD$ from patches files everywhere.

With hat:	portmgr
Sponsored by:	Absolight
14 May 2015 10:15:09
Original commit files touched by this commit  1.8.0_1,2
Revision:386312 This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
05 May 2015 16:16:32
Original commit files touched by this commit  1.8.0_1,2
Revision:385478 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
Fix selection of HTTP_XSLT and MODSECURITY so that the proper LIB_DEPENDS on
libxslt is added.
30 Apr 2015 00:33:01
Original commit files touched by this commit  1.8.0,2
Revision:385018 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove useless code.
29 Apr 2015 01:03:03
Original commit files touched by this commit  1.8.0,2
Revision:384952 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 5.0.6 to 5.0.7:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
29 Apr 2015 00:32:36
Original commit files touched by this commit  1.8.0,2
Revision:384949 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless code.
27 Apr 2015 02:26:18
Original commit files touched by this commit  1.8.0,2
Revision:384808 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless patch, I've just forgotten to remove it in previous commit.
27 Apr 2015 02:16:04
Original commit files touched by this commit  1.8.0,2
Revision:384807 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove support for next unsupported third-party modules:

o) http_upload;
o) postgres;
o) supervisord;
o) tcp_proxy;

Add back third-party http_upstream_sticky module's checksums.
22 Apr 2015 11:47:23
Original commit files touched by this commit  1.8.0,2
Revision:384487 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove third-party syslog support, it's available out of box now,
see http://nginx.org/en/docs/syslog.html for details.
21 Apr 2015 23:26:57
Original commit files touched by this commit  1.8.0,2
Revision:384469 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade to latest stable version 1.8.0.

According to vendor's recommendations safely remove NGX_THREADS macro
with some long unused code from some third-party modules.

Merge changes from www/nginx-devel to www/nginx.
Merge third-pary upstream_sticky module from www/nginx to www/nginx-devel.

Remove outdated syslog support.
21 Apr 2015 18:03:22
Original commit files touched by this commit  1.6.3,2
Revision:384435 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party set_misc module from 0.24 to 0.28.
21 Apr 2015 00:26:54
Original commit files touched by this commit  1.6.3,2
Revision:384394 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) echo from 0.51 to 0.57;
o) memc from 0.14 to 0.15;
o) srcache from 0.25 to 0.29.
21 Apr 2015 00:08:55
Original commit files touched by this commit  1.6.3,2
Revision:384393 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party redis2 module from 0.10 to 0.11.
20 Apr 2015 23:58:03
Original commit files touched by this commit  1.6.3,2
Revision:384392 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-pary redis2 module from 0.9.4 to 0.9.15.
17 Apr 2015 21:55:56
Original commit files touched by this commit  1.6.3,2
Revision:384190 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party headers-more module from 0.25 to 0.26.

Patch from:	Denis Denisov <denji0k@gmail.com> (via mail)
07 Apr 2015 23:37:49
Original commit files touched by this commit  1.6.3,2
Revision:383550 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.6.2 to 1.6.3.

<ChangeLog>

*) Feature: now the "tcp_nodelay" directive works with SPDY connections.

*) Bugfix: in error handling.
   Thanks to Yichun Zhang and Daniil Bondarev.

*) Bugfix: alerts "header already sent" appeared in logs if the
   "post_action" directive was used; the bug had appeared in 1.5.4.

*) Bugfix: alerts "sem_post() failed" might appear in logs.

*) Bugfix: in hash table handling.
   Thanks to Chris West.

*) Bugfix: in integer overflow handling.
   Thanks to Regis Leroy.

</ChangeLog>
07 Apr 2015 23:32:17
Original commit files touched by this commit  1.6.2_1,2
Revision:383547 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix a couple portlint warnings.

PR:		199163
05 Apr 2015 16:02:05
Original commit files touched by this commit  1.6.2_1,2
Revision:383302 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 1.1.6 to 1.1.7.
04 Apr 2015 23:38:24
Original commit files touched by this commit  1.6.2_1,2
Revision:383248 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.4 to 5.0.6:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

The passenger now uses its own libev fork, so remove devel/libev dependency.

<ChangeLog>

Release 5.0.6
-------------

* The turbocache no longer caches responses for which the Cache-Control header
  contains "no-cache". Please note that "no-cache" does not mean "do not cache
  this response". Instead, it means "any caching servers may only serve the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
24 Mar 2015 18:19:24
Original commit files touched by this commit  1.6.2_1,2
Revision:382150 This port version is marked as vulnerable.
marino search for other commits by this committer
4 ports categories: Remove $PTHREAD_LIBS

Categories: www, ftp, net-im, net-mgmt

approved by:	PTHREAD blanket
23 Mar 2015 04:07:09
Original commit files touched by this commit  1.6.2_1,2
Revision:381979 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
Properly set MAKE_ENV and MAKE_CMD.

With hat:	portmgr
13 Mar 2015 00:41:06
Original commit files touched by this commit  1.6.2_1,2
Revision:381156 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.2 to 5.0.4:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 5.0.3
-------------

 * [Standalone] When using the builtin engine, `passenger start` may crash
during
   startup due to an initialization race condition. This has been fixed.
 * [Enterprise] Fixes a bug in passenger-irb. Running passenger-irb without a
PID
   parameter worked, but running it with a PID parameter didn't.
 * Fixes an integer overflow that resulted in a file descriptor leak and stalled
(Only the first 15 lines of the commit message are shown above View all of this commit message)
13 Mar 2015 00:06:30
Original commit files touched by this commit  1.6.2_1,2
Revision:381154 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.59 to 5.0.2:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 5.0.2
-------------

 * Fixes a connection freeze that could occur when processing large responses.
This would
   manifest itself under the error message "This website is under heavy load" or
"Request
   queue is full, returning an error". Closes GH-1404.
 * Debian and Ubuntu packages have been reintroduces.
 * When `passenger-config restart-app` is run interactively, if Passenger is not
serving
(Only the first 15 lines of the commit message are shown above View all of this commit message)
13 Feb 2015 12:49:33
Original commit files touched by this commit  1.6.2_1,2
Revision:378927 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modsecurity module from 2.8.0 to 2.9.0.

<ChangeLog>

12 Feb 2015 - 2.9.0
-------------------

 * Fix apr_crypto.h include, now checking if apr_crypto.h is available by
   checking the definition WITH_APU_CRYPTO.
   [martinjina and ModSecurity team]

15 Dez 2014 - 2.9.0-RC2
-----------------------

 * OpenSSL dependency was removed on MS Windows builds. ModSecurity is now using
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Feb 2015 03:23:11
Original commit files touched by this commit  1.6.2_1,2
Revision:378812 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.58 to 4.0.59:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.59
--------------

* [Enterprise] Fixed support for free-style Node.js apps.

</ChangeLog>
23 Jan 2015 23:28:01
Original commit files touched by this commit  1.6.2_1,2
Revision:377773 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.57 to 4.0.58:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.58
--------------

* [Enterprise] Fixed a bug in the Debian packages which caused Flying Passenger
to break when used with non-system Rubies.
* The Debian packages no longer require Ruby 1.9. Closes GH-1353.

</ChangeLog>
04 Jan 2015 16:54:50
Original commit files touched by this commit  1.6.2_1,2
Revision:376243 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party dav_ext module from 0.0.2 to 0.0.3.
04 Jan 2015 16:38:28
Original commit files touched by this commit  1.6.2_1,2
Revision:376242 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party drizzle module from 0.1.7 to 0.1.8.
Rename extra patch for the module.
04 Jan 2015 16:03:30
Original commit files touched by this commit  1.6.2_1,2
Revision:376241 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 1.1.5 to 1.1.6.
Remove necessary patch for the module.
04 Jan 2015 03:27:15
Original commit files touched by this commit  1.6.2_1,2
Revision:376178 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_fancyindex module from 0.3.1 to 0.3.4.

Submitted by:	Miguel Clara <miguelmclara@gmail.com>

<ChangeLog>

v0.3.4
======
- Viewport is now defined in the generated HTML, which works better
  for mobile devices.
- Even-odd row styling moved to the CSS using :nth-child(). This
  makes the HTML served to clients smaller.

v0.3.3
======
- New feature: table headers in the default template are now clickable
  to set the sorting criteria and direction of the index entries.
  (https://github.com/aperezdc/ngx-fancyindex/issues/7)

v0.3.2
======
- Solved a bug that would leave certain clients stalled forever.
- Improved handling of subrequests for non-builtin headers/footers.

</ChangeLog>
03 Jan 2015 17:08:25
Original commit files touched by this commit  1.6.2_1,2
Revision:376130 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_cache_purge module from 2.1 to 2.3 (as preparation to
upgrade the www/nginx-devel to 1.7.9).

<ChangeLog>

2014-12-23    VERSION 2.3
    * Fix compatibility with nginx-1.7.9+.

2014-12-02    VERSION 2.2
    * Fix compatibility with nginx-1.7.8+.

2014-05-19
    * Fix build on Solaris with SunCC (Solaris Studio).
      Reported by Jussi Sallinen.

</ChangeLog>
03 Jan 2015 16:58:40
Original commit files touched by this commit  1.6.2_1,2
Revision:376127 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.53 to 4.0.57 (as preparation to upgrade the www/nginx-devel to
1.7.9):

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.57
--------------

 * Fixed a native extension compatibility problem with Ruby 2.2.
   Closes [ruby-core:67152](https://bugs.ruby-lang.org/issues/10656).
 * Fixed compatibility with Nginx 1.7.9. Closes GH-1335.

Release 4.0.56
(Only the first 15 lines of the commit message are shown above View all of this commit message)
12 Dec 2014 22:51:48
Original commit files touched by this commit  1.6.2_1,2
Revision:374609 This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing dependency.
Don't bump PORTREVISION cause the third-party modsecurity module disabled by
default.

Patch from:	Ilya Komandyshko <ikomander@gmail.com>
04 Dec 2014 21:26:03
Original commit files touched by this commit  1.6.2_1,2
Revision:373984 This port version is marked as vulnerable.
feld search for other commits by this committer
Update LICENSE to make the warnings go away
26 Nov 2014 13:08:38
Original commit files touched by this commit  1.6.2_1,2
Revision:373448 This port version is marked as vulnerable.
mat search for other commits by this committer
Change the way Perl modules are installed, update the default Perl to 5.18.

Before, we had:

  site_perl :           lib/perl5/site_perl/5.18
  site_perl/perl_arch : lib/perl5/site_perl/5.18/mach
  perl_man3 :           lib/perl5/5.18/man/man3

Now we have:

  site_perl : lib/perl5/site_perl
  site_arch : lib/perl5/site_perl/mach/5.18
  perl_man3 : lib/perl5/site_perl/man/man3

Modules without any .so will be installed at the same place regardless of the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 Oct 2014 14:16:17
Original commit files touched by this commit  1.6.2,2
Revision:369965 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.52 to 4.0.53:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Upgraded the preferred Nginx version to 1.6.2.
* Improved RVM gemset autodetection.
* Fixed some Ruby 2.2 compatibility issues.

</ChangeLog>
01 Oct 2014 01:18:56
Original commit files touched by this commit  1.6.2,2
Revision:369682 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.50 to 4.0.52:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Fixed a null termination bug when autodetecting application types.
* Node.js apps can now also trigger the inverse port binding mechanism by
passing `'/passenger'`
  as argument.  This was introduced in order to be able to support the Hapi.js
framework.
  Please read
 
http://stackoverflow.com/questions/20645231/phusion-passenger-error-http-server-listen-was-called-more-than-once/20645549
  for more information regarding Hapi.js support.
* It is now possible to abort Node.js WebSocket connections upon application
restart.
  Please refer to
(Only the first 15 lines of the commit message are shown above View all of this commit message)
01 Oct 2014 00:00:22
Original commit files touched by this commit  1.6.2,2
Revision:369681 This port version is marked as vulnerable.
osa search for other commits by this committer
Update patch for third party upload module.

PR:     193891
26 Sep 2014 00:02:08
Original commit files touched by this commit  1.6.2,2
Revision:369298 This port version is marked as vulnerable.
osa search for other commits by this committer
Update CPE_VENDOR.
19 Sep 2014 01:27:24
Original commit files touched by this commit  1.6.2,2
Revision:368537 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 1.1.4 to 1.1.5.
Fix compilation issue (1).
Do not bump PORTREVISION.

Obtained
from:	https://github.com/arut/nginx-rtmp-module/commit/dd5f2aa117c617e1f0fde26f8fd58903be2d85e8.patch	(1)
17 Sep 2014 14:55:34
Original commit files touched by this commit  1.6.2,2
Revision:368382 This port version is marked as vulnerable.
mat search for other commits by this committer
OPTIONS_SINGLE must have one value selected at all time, let's guess that MP4
is optional and switch to OPTIONS_RADIO.

Sponsored by:	Absolight
16 Sep 2014 17:47:48
Original commit files touched by this commit  1.6.2,2
Revision:368340 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.6.1 to 1.6.2.

<ChangeLog>

*) Security: it was possible to reuse SSL sessions in unrelated contexts
   if a shared SSL session cache or the same TLS session ticket key was
   used for multiple "server" blocks (CVE-2014-3616).
   Thanks to Antoine Delignat-Lavaud.

*) Bugfix: requests might hang if resolver was used and a DNS server
   returned a malformed response; the bug had appeared in 1.5.8.

*) Bugfix: requests might hang if resolver was used and a timeout
   occurred during a DNS request.

</ChangeLog>
29 Aug 2014 11:09:43
Original commit files touched by this commit  1.6.1_1,2
Revision:366502 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.49 to 4.0.50:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Fixed a potential heap corruption bug.
* Added Union Station support for Rails 4.1.

</ChangeLog>
25 Aug 2014 12:19:44
Original commit files touched by this commit  1.6.1_1,2
Revision:366069 This port version is marked as vulnerable.
bapt search for other commits by this committer
Convert to USES=pgsql
22 Aug 2014 22:06:37
Original commit files touched by this commit  1.6.1_1,2
Revision:365702 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.48 to 4.0.49:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

 * Upgraded the preferred Nginx version to 1.6.1.
 * Fixed a crash that may be triggered by the `passenger_max_requests` feature.
 * Introduced the `spawn_failed` hook, which is called when an application
   process fails to spawn. You could use this hook to setup an error
   notification system. Closes GH-1252.
 * Fonts, RSS and XML are now gzip-compressed by default in Phusion Passenger
   Standalone. Thanks to Jacob Elder. Closes GH-1254.
 * Fixed some user and group information lookup issues. Closes GH-1253.
 * Fixed some request handling crashes. Closes GH-1250.
 * Fixed some compilation problems on Gentoo. Closes GH-1261.
 * Fixed some compilation problems on Solaris. Closes GH-1260.

</ChangeLog>
11 Aug 2014 17:05:50
Original commit files touched by this commit  1.6.1_1,2
Revision:364628 This port version is marked as vulnerable.
adamw search for other commits by this committer
Bump PORTREVISION on all ports that depend on net/GeoIP for
r364627.

Approved by:	portmgr (not really, but touches unstaged ports)
10 Aug 2014 17:47:05
Original commit files touched by this commit  1.6.1,2
Revision:364551 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modsecurity module from 2.7.5 to latest version 2.8.0.
10 Aug 2014 15:21:35
Original commit files touched by this commit  1.6.1,2
Revision:364549 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.45 to 4.0.48:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

Add CPE information.

<ChangeLog>

Release 4.0.48
--------------

 * Fixed a race condition while determining what user an application should
   be executed as. This bug could lead to applications being run as the wrong
   user. Closes GH-1241.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
10 Aug 2014 03:27:49
Original commit files touched by this commit  1.6.1,2
Revision:364497 This port version is marked as vulnerable.
osa search for other commits by this committer
Add CPE information.
09 Aug 2014 18:36:57
Original commit files touched by this commit  1.6.1,2
Revision:364460 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.6.0 to 1.6.1.

<ChangeLog>

*) Security: pipelined commands were not discarded after STARTTLS
   command in SMTP proxy (CVE-2014-3556); the bug had appeared in 1.5.6.
   Thanks to Chris Boulton.

*) Bugfix: the $uri variable might contain garbage when returning errors
   with code 400.
   Thanks to Sergey Bobrov.

*) Bugfix: in the "none" parameter in the "smtp_auth" directive; the bug
   had appeared in 1.5.6.
   Thanks to Svyatoslav Nikolsky.

</ChangeLog>
24 Jul 2014 18:34:16
Original commit files touched by this commit  1.6.0_3,2
Revision:362835 This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
23 Jun 2014 13:44:39
Original commit files touched by this commit  1.6.0_2,2
Revision:358946 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Switch devel/google-perftools to USES=libtool, drop .la files
- Bump dependent ports as .so version has changed

Approved by:	portmgr blanket
20 Jun 2014 09:53:46
Original commit files touched by this commit  1.6.0_1,2
Revision:358544 This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless empty string, introduced in r357965.
20 Jun 2014 09:50:30
Original commit files touched by this commit  1.6.0_1,2
Revision:358542 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.44 to 4.0.45:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
16 Jun 2014 09:55:54
Original commit files touched by this commit  1.6.0_1,2
Revision:357965 This port version is marked as vulnerable.
erwin search for other commits by this committer
Updated syslog support and upstream_sticky options to re-enable them.

PR:             189391
Submitted by:   dgeo@centrale-marseille.fr
Approved by:    maintainer timeout
12 Jun 2014 09:17:33
Original commit files touched by this commit  1.6.0_1,2
Revision:357574 This port version is marked as vulnerable.
tijl search for other commits by this committer
Bump PORTREVISION on everything that depends on devel/apr1 due to the
library version change.

Approved by:	portmgr (implicit)
10 Jun 2014 12:14:14
Original commit files touched by this commit  1.6.0,2
Revision:357300 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove all the bootstrap files (.bs) from the plists.

Starting with perl 5.20, they're not installed any more if empty,
and on FreeBSD, they're (always ?) empty.

PR:		190681
Submitted by:	mat
Exp-Run by:	antoine
Sponsored by:	Absolight
02 Jun 2014 10:57:38
Original commit files touched by this commit  1.6.0,2
Revision:356210 This port version is marked as vulnerable.
osa search for other commits by this committer
Multiple third-party modules as well as repos have been moved from agentzh and
chaoslawful
to openresty and renamed accordingly.

Do not dump PORTREVISION.

PR:	190074
02 Jun 2014 09:49:58
Original commit files touched by this commit  1.6.0,2
Revision:356208 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 1.1.2 to 1.1.4.
Remove whitespaces.
02 Jun 2014 02:14:54
Original commit files touched by this commit  1.6.0,2
Revision:356191 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.41 to 4.0.44:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.44
--------------

 * The issue tracker has now been moved from Google Code to Github.
   Before version 4.0.44 (May 29 2014, commit 3dd0964c9f4), all
   issue numbers referred to Google Code. From now on, all issue
   numbers will refer to Github Issues.
 * Fixed compilation problems on OS X Lion and OS X Mountain Lion.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 May 2014 16:41:17
Original commit files touched by this commit  1.6.0,2
Revision:352966 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.4.7 to 1.6.0.

Temporary disable third-party modules and patches:
o http_upstream_sticky
o postgres
o syslog_support
o tcp_proxy

ChangeLog:	http://nginx.org/en/CHANGES-1.6
16 Apr 2014 18:28:50
Original commit files touched by this commit  1.4.7_1,2
Revision:351411 This port version is marked as vulnerable.
zeising search for other commits by this committer
The FreeBSD x11@ and graphics team proudly presents
a zeising, kwm production, with help from dumbbell, bdrewery:

NEW XORG ON FREEBSD 9-STABLE AND 10-STABLE

This update switches over to use the new xorg stack by default on FreeBSD 9
and 10 stable, on osversions where vt(9) is available.
It is still possible to use the old stack by specifying WITHOUT_NEW_XORG in
/etc/make.conf .
FreeBSD 8-STABLE and released versions of FreeBSD still use
the old version.
A package repository with binary packages for new xorg will
be available soon.

This patch also contains updates of libxcb and related ports, pixman, as well
(Only the first 15 lines of the commit message are shown above View all of this commit message)
09 Apr 2014 02:36:09
Original commit files touched by this commit  1.4.7,2
Revision:350664 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.35 to 4.0.41:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

STAGEfy www/rubygem-passenger.
01 Apr 2014 00:40:05
Original commit files touched by this commit  1.4.7,2
Revision:349818 This port version is marked as vulnerable.
feld search for other commits by this committer
Update OpenSSL logic to match www/nginx-devel

PR:		ports/182985
Approved by:	maintainer timeout
23 Mar 2014 02:29:37
Original commit files touched by this commit  1.4.7,1
Revision:348826 This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.4.6 to 1.4.7.

<ChangeLog>

*) Security: a heap memory buffer overflow might occur in a worker
   process while handling a specially crafted request by
   ngx_http_spdy_module, potentially resulting in arbitrary code
   execution (CVE-2014-0133).
   Thanks to Lucas Molas, researcher at Programa STIC, Fundacion Dr.
   Manuel Sadosky, Buenos Aires, Argentina.

*) Bugfix: in the "fastcgi_next_upstream" directive.
   Thanks to Lucas Molas.

</ChangeLog>
06 Mar 2014 00:01:07
Original commit files touched by this commit  1.4.6,1
Revision:347156 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.4.5 to 1.4.6.

<ChangeLog>

*) Bugfix: the "client_max_body_size" directive might not work when
   reading a request body using chunked transfer encoding; the bug had
   appeared in 1.3.9.
   Thanks to Lucas Molas.

*) Bugfix: a segmentation fault might occur in a worker process when
   proxying WebSocket connections.

</ChangeLog>
16 Feb 2014 16:54:02
Original commit files touched by this commit  1.4.5,1
Revision:344610 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.4.4 to bugfix release 1.4.5.

<ChangeLog>

*) Bugfix: the $ssl_session_id variable contained full session
   serialized instead of just a session id.
   Thanks to Ivan Ristic.

*) Bugfix: client connections might be immediately closed if deferred
   accept was used; the bug had appeared in 1.3.15.

*) Bugfix: alerts "zero size buf in output" might appear in logs while
   proxying; the bug had appeared in 1.3.9.

*) Bugfix: a segmentation fault might occur in a worker process if the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
30 Jan 2014 10:01:52
Original commit files touched by this commit  1.4.4_3,1
Revision:341828 This port version is marked as vulnerable.
decke search for other commits by this committer
- By popular request enable HTTP_SSL option per default

With hat:	portmgr
Discussed with:	osa@ (maintainer)
21 Jan 2014 23:40:23
Original commit files touched by this commit  1.4.4_2,1
Revision:340674 This port version is marked as vulnerable.
bapt search for other commits by this committer
Fix properties on pkg-plist
17 Jan 2014 01:27:34
Original commit files touched by this commit  1.4.4_2,1
Revision:340006 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.33 to 4.0.35:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
16 Jan 2014 01:49:34
Original commit files touched by this commit  1.4.4_2,1
Revision:339882 This port version is marked as vulnerable.
vanilla search for other commits by this committer
Upgrade 3rd party modules to latest version.

echo          0.50 => 0.51
headers_more  0.24 => 0.25
drizzle       0.1.6 => 0.1.7
rtmp          1.0.8 => 1.1.2
set_misc      0.23 => 0.24
srcache       0.24 => 0.25

Approved by:	osa@
14 Jan 2014 10:45:24
Original commit files touched by this commit  1.4.4_2,1
Revision:339676 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.9.3 to 0.9.4.
04 Jan 2014 05:01:54
Original commit files touched by this commit  1.4.4_2,1
Revision:338622 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.30 to 4.0.33:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.33
--------------

* Fixed a compatibility problem in passenger-install-apache2-module with Ruby
1.8.
  The language selection menu didn't work properly.

Release 4.0.32
--------------
(Only the first 15 lines of the commit message are shown above View all of this commit message)
03 Jan 2014 01:13:00
Original commit files touched by this commit  1.4.4_2,1
Revision:338513 This port version is marked as vulnerable.
bapt search for other commits by this committer
Part 2 at removing now useless FETCH_ARGS redifition
31 Dec 2013 15:26:56
Original commit files touched by this commit  1.4.4_2,1
Revision:338326 This port version is marked as vulnerable.
osa search for other commits by this committer
Add distinfo for third-party footer module back, introduced in r338325.
31 Dec 2013 15:24:37
Original commit files touched by this commit  1.4.4_2,1
Revision:338325 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.29 to 4.0.30:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Fixed wrong autogeneration of HTTP Date header. If the web app does
  not supply a Date header, then Passenger will add one. Unfortunately
  due to the use of the wrong format string, December 30 2013 is
  formatted as December 30 2014. As a result, cookies that expire before
  2014 would expire on December 30 2013 and December 31 2013. Details can
  be found at [Github pull request
93](https://github.com/phusion/passenger/pull/93).

  This issue only affects Phusion Passenger for Nginx and Phusion Passenger
(Only the first 15 lines of the commit message are shown above View all of this commit message)
22 Dec 2013 08:58:22
Original commit files touched by this commit  1.4.4_2,1
Revision:337176 This port version is marked as vulnerable.
vanilla search for other commits by this committer
1: Upgrade 3rd party modules to latest version.

echo          0.49 => 0.50
headers_more  0.22 => 0.24
drizzle       0.1.5 => 0.1.6
ndk           0.2.18 => 0.2.19
memc          0.13rc3 => 0.14
rds_csv       0.5rc2 => 0.5
rds_json      0.12rc10 => 0.13
rtmp          1.0.6 => 1.0.8
set_misc      0.22rc8 => 0.23
sflow         0.9.6 => 0.9.7
srcache       0.22 => 0.24
xss           0.3rc9 => 0.4
arrayvar      0.03rc1 => 0.03

2: add http_footer module.

Approved by:	osa@ (maintainer)
19 Dec 2013 17:46:59
Original commit files touched by this commit  1.4.4_2,1
Revision:336940 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party lua module from 0.9.2 to 0.9.3.
19 Dec 2013 17:31:04
Original commit files touched by this commit  1.4.4_2,1
Revision:336939 This port version is marked as vulnerable.
osa search for other commits by this committer
Be more correct with openssl on modern FreeBSD10.

Do not bump PORTREVISION cause SPDY module disable by default.
14 Dec 2013 15:59:55
Original commit files touched by this commit  1.4.4_2,1
Revision:336456 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.27 to 4.0.29:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.29
--------------

* Fixed a compilation problem on OS X Mavericks.

Release 4.0.28
--------------
(Only the first 15 lines of the commit message are shown above View all of this commit message)
06 Dec 2013 02:28:13
Original commit files touched by this commit  1.4.4_2,1
Revision:335722 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.26 to 4.0.27:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* [Apache] Fixed a bug in the Apache module which could lock up the Apache
  process or thread. This is a regression introduced in version 4.0.24.
* Node.js application processes now have friendly process titles.

</ChangeLog>
04 Dec 2013 05:06:16
Original commit files touched by this commit  1.4.4_2,1
Revision:335603 This port version is marked as vulnerable.
osa search for other commits by this committer
Make third-party accept_language module fetchable by update to latest version.

PR:	ports/184153
03 Dec 2013 18:08:21
Original commit files touched by this commit  1.4.4_2,1
Revision:335584 This port version is marked as vulnerable.
osa search for other commits by this committer
Fix syslog support.
Do not bump PORTREVISION cause syslog support disabled by default.

Patch from:	rea
PR:		ports/180639
03 Dec 2013 07:25:51
Original commit files touched by this commit  1.4.4_2,1
Revision:335548 This port version is marked as vulnerable.
mat search for other commits by this committer
Revert r335523.

Asked by:	osa
03 Dec 2013 02:37:52
Original commit files touched by this commit  1.4.4_1,1
Revision:335545 This port version is marked as vulnerable.
vanilla search for other commits by this committer
Upgrade lua module to 0.9.2, echo module to 0.49.

Approved by:	maintainer (osa@)
02 Dec 2013 18:14:20
Original commit files touched by this commit  1.4.4_1,1
Revision:335523 This port version is marked as vulnerable.
mat search for other commits by this committer
The patch for adding syslog support sets the wrong define variable causing
syslog support to not be built.

maintainer timeout.

PR:		ports/180639
Submitted by:	Dave Duchscher
01 Dec 2013 16:11:27
Original commit files touched by this commit  1.4.4,1
Revision:335402 This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party ngx_http_redis module from 0.3.6 to 0.3.7.

<ChangeLog>

*) Bugfix: ngx_http_redis_module might issue the error message
   "redis sent invalid trailer" for nginx >= 1.5.3.
   Thanks to Maxim Dounin.

</ChangeLog>
30 Nov 2013 10:29:01
Original commit files touched by this commit  1.4.4,1
Revision:335279 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.25 to 4.0.26:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Introduced the `PassengerBufferUpload` option for Apache. This option allows
one
  to disable upload buffering, e.g. in order to be able to track upload
progress.
* [Nginx] The `HTTPS` variable is now set correctly for HTTPS connections, even
  without setting `ssl on`. Fixes issue #401.
* [Standalone] It is now possible to listen on both a normal HTTP and an HTTPS
port.
* [Enterprise] The `passenger-status` tool now displays rolling restart status.

</ChangeLog>
24 Nov 2013 14:21:08
Original commit files touched by this commit  1.4.4,1
Revision:334729 This port version is marked as vulnerable.
vanilla search for other commits by this committer
Update rtmp module to 1.0.6.

Approved by:	osa@ (maintainer)
20 Nov 2013 18:13:08
Original commit files touched by this commit  1.4.4,1
Revision:334435 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.24 to 4.0.25:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
19 Nov 2013 18:30:54
Original commit files touched by this commit  1.4.4,1
Revision:334340 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.23 to 4.0.24:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

Try to fix build www/rubygem-passenger with upcoming FreeBSD 10.

Number of commits found: 842 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
giteaNov 21
nodeNov 21
node12Nov 21
node14Nov 21
muttNov 20
mantisNov 14
goNov 12
py-saltNov 12
openoffice-4Nov 10
openoffice-develNov 10
raptor2Nov 09
py-notebookNov 08
mariadb103-server*Nov 07
mariadb104-server*Nov 07
mariadb105-server*Nov 07

9 vulnerabilities affecting 54 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-11-22 15:51:41


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 41470
Broken 61
Deprecated 279
Ignore 301
Forbidden 4
Restricted 142
No CDROM 73
Vulnerable 19
Expired 4
Set to expire 249
Interactive 0
new 24 hours 14
new 48 hours17
new 7 days42
new fortnight88
new month183

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.