notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine

Newsfeed changes

The news feed page[s] were not laid out well. Two pages, disjointed information, hard to figure out how to use the optional parameters...

Thankfully, someone told me.

The new page is ready for your review. Please compare these two:

You may also be interested in the Github issue.
Port details
nginx-devel Robust and small WWW server
1.27.5_1 www on this many watch lists=29 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.27.4_4Version of this port present on the latest quarterly branch.
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2007-06-15 08:23:21
Last Update: 2025-04-18 05:37:04
Commit Hash: 186a878
People watching this port, also watch:: nginx, sudo, bash, wget, lsof
License: BSD2CLAUSE
WWW:
https://nginx.com/
Description:
NGINX is a high performance edge web server with the lowest memory footprint and the key features to build modern and efficient web infrastructure. NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching, load balancing, compression, request throttling, connection multiplexing and reuse, SSL offload and HTTP media streaming. See also: https://nginx.org/
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (113 items)
Collapse this list.
  1. /usr/local/share/licenses/nginx-devel-1.27.5_1/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.27.5_1/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.27.5_1/BSD2CLAUSE
  4. etc/nginx/koi-utf
  5. etc/nginx/koi-win
  6. etc/nginx/win-utf
  7. @comment include/ngx_link_func_module.h
  8. @comment etc/nginx/naxsi_core.rules
  9. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  10. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  11. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  12. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  13. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  14. @comment libexec/nginx/ngx_http_ajp_module.so
  15. @comment libexec/nginx/ngx_http_array_var_module.so
  16. @comment libexec/nginx/ngx_http_aws_auth_module.so
  17. @comment libexec/nginx/ngx_http_brotli_filter_module.so
  18. @comment libexec/nginx/ngx_http_brotli_static_module.so
  19. @comment libexec/nginx/ngx_http_cache_purge_module.so
  20. @comment libexec/nginx/ngx_http_ssl_ct_module.so
  21. @comment libexec/nginx/ngx_ssl_ct_module.so
  22. @comment libexec/nginx/ndk_http_module.so
  23. @comment libexec/nginx/ngx_http_drizzle_module.so
  24. @comment libexec/nginx/ngx_http_dynamic_upstream_module.so
  25. @comment libexec/nginx/ngx_http_echo_module.so
  26. @comment libexec/nginx/ngx_http_encrypted_session_module.so
  27. @comment libexec/nginx/ngx_fips_check_module.so
  28. @comment libexec/nginx/ngx_http_form_input_module.so
  29. @comment libexec/nginx/ngx_http_gridfs_module.so
  30. @comment libexec/nginx/ngx_http_headers_more_filter_module.so
  31. @comment libexec/nginx/ngx_http_accept_language_module.so
  32. @comment libexec/nginx/ngx_http_auth_digest_module.so
  33. @comment libexec/nginx/ngx_http_auth_jwt_module.so
  34. @comment libexec/nginx/ngx_http_auth_spnego_module.so
  35. @comment libexec/nginx/ngx_http_auth_ldap_module.so
  36. @comment libexec/nginx/ngx_http_auth_pam_module.so
  37. @comment libexec/nginx/ngx_http_dav_ext_module.so
  38. @comment libexec/nginx/ngx_http_eval_module.so
  39. @comment libexec/nginx/ngx_http_fancyindex_module.so
  40. @comment libexec/nginx/ngx_http_footer_filter_module.so
  41. @comment libexec/nginx/ngx_http_image_filter_module.so
  42. @comment libexec/nginx/ngx_http_ip2location_module.so
  43. @comment libexec/nginx/ngx_http_ip2proxy_module.so
  44. @comment libexec/nginx/ngx_http_json_status_module.so
  45. @comment libexec/nginx/ngx_http_mogilefs_module.so
  46. @comment libexec/nginx/ngx_http_notice_module.so
  47. @comment libexec/nginx/ngx_http_perl_module.so
  48. @comment libexec/nginx/ngx_http_push_stream_module.so
  49. @comment libexec/nginx/ngx_nchan_module.so
  50. @comment libexec/nginx/ngx_http_redis_module.so
  51. @comment libexec/nginx/ngx_http_subs_filter_module.so
  52. @comment libexec/nginx/ngx_http_tnt_module.so
  53. @comment libexec/nginx/ngx_http_uploadprogress_module.so
  54. @comment libexec/nginx/ngx_http_upload_module.so
  55. @comment libexec/nginx/ngx_http_upstream_fair_module.so
  56. @comment libexec/nginx/ngx_http_sticky_module.so
  57. @comment libexec/nginx/ngx_http_video_thumbextractor_module.so
  58. @comment libexec/nginx/ngx_http_xslt_filter_module.so
  59. @comment libexec/nginx/ngx_http_zip_module.so
  60. @comment libexec/nginx/ngx_http_geoip2_module.so
  61. @comment libexec/nginx/ngx_http_js_module.so
  62. @comment libexec/nginx/ngx_http_iconv_module.so
  63. @comment libexec/nginx/ngx_http_let_module.so
  64. @comment libexec/nginx/ngx_http_link_func_module.so
  65. @comment libexec/nginx/ngx_http_lua_module.so
  66. @comment libexec/nginx/ngx_stream_lua_module.so
  67. @comment libexec/nginx/ngx_mail_ssl_ct_module.so
  68. libexec/nginx/ngx_mail_module.so
  69. @comment libexec/nginx/ngx_http_memc_module.so
  70. @comment libexec/nginx/ngx_http_modsecurity_module.so
  71. @comment libexec/nginx/ngx_http_naxsi_module.so
  72. @comment libexec/nginx/ngx_otel_module.so
  73. @comment libexec/nginx/ngx_http_passenger_module.so
  74. @comment libexec/nginx/ngx_postgres_module.so
  75. @comment libexec/nginx/ngx_http_rds_csv_filter_module.so
  76. @comment libexec/nginx/ngx_http_rds_json_filter_module.so
  77. @comment libexec/nginx/ngx_http_redis2_module.so
  78. @comment libexec/nginx/ngx_rtmp_module.so
  79. @comment libexec/nginx/ngx_http_set_misc_module.so
  80. @comment libexec/nginx/ngx_http_shibboleth_module.so
  81. @comment libexec/nginx/ngx_http_slowfs_module.so
  82. @comment libexec/nginx/ngx_http_srcache_filter_module.so
  83. @comment libexec/nginx/ngx_stream_ssl_ct_module.so
  84. @comment libexec/nginx/ngx_stream_geoip2_module.so
  85. @comment libexec/nginx/ngx_stream_js_module.so
  86. libexec/nginx/ngx_stream_module.so
  87. @comment libexec/nginx/ngx_http_stream_server_traffic_status_module.so
  88. @comment libexec/nginx/ngx_http_vod_module.so
  89. @comment libexec/nginx/ngx_http_vhost_traffic_status_module.so
  90. @comment libexec/nginx/ngx_http_websockify_module.so
  91. @comment libexec/nginx/ngx_http_xss_filter_module.so
  92. @comment libexec/nginx/ngx_http_zstd_filter_module.so
  93. @comment libexec/nginx/ngx_http_zstd_static_module.so
  94. @comment %%SITE_ARCH%%/auto/nginx/nginx.so
  95. @comment %%SITE_ARCH%%/nginx.pm
  96. sbin/nginx
  97. share/vim/vimfiles/ftdetect/nginx.vim
  98. share/vim/vimfiles/ftplugin/nginx.vim
  99. share/vim/vimfiles/indent/nginx.vim
  100. share/vim/vimfiles/syntax/nginx.vim
  101. @postexec mkdir -p -m 755 %D/www/nginx-dist
  102. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  103. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  104. www/nginx-dist/index.html
  105. www/nginx-dist/50x.html
  106. @postexec chmod a-w %D/www/nginx-dist
  107. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  108. @dir /var/tmp/nginx
  109. @dir /var/log/nginx
  110. share/man/man8/nginx.8.gz
  111. @owner
  112. @group
  113. @mode
Collapse this list.
Dependency lines:
  • nginx-devel>0:www/nginx-devel
Conflicts:
CONFLICTS:
  • nginx-1.*
  • nginx-full-1.*
  • nginx-lite-1.*
  • nginx-naxsi-1.*
CONFLICTS_INSTALL:
  • nginx
To install the port:
cd /usr/ports/www/nginx-devel/ && make install clean
To add the package, run one of these commands:
  • pkg install www/nginx-devel
  • pkg install nginx-devel
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: nginx-devel
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1744884495 SHA256 (nginx-1.27.5.tar.gz) = e96acebb9c2a6db8a000c3dd1b32ecba1b810f0cd586232d4d921e376674dd0e SIZE (nginx-1.27.5.tar.gz) = 1279891

Expand this list (142 items)

Collapse this list.

SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208 SHA256 (ngx_http_redis-0.3.9.tar.gz) = 21f87540f0a44b23ffa5df16fb3d788bc90803b255ef14f9c26e3847a6f26f46 SIZE (ngx_http_redis-0.3.9.tar.gz) = 13051 SHA256 (passenger-6.0.27.tar.gz) = 82c830aee98feece09e84309c2d0c6bb3f7b22a3c8e33cfe93b5e0d498615d0f SIZE (passenger-6.0.27.tar.gz) = 7548637 SHA256 (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 522e94c59f5783f281d868ede2adf325bf2f8ffb9e62cf8451d4b9ac0516916c SIZE (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 110807 SHA256 (openresty-array-var-nginx-module-v0.06_GH0.tar.gz) = 2c3577265d1d51a2d0646311b9c651520a74455253b6f7a5776af79e9bff5cb1 SIZE (openresty-array-var-nginx-module-v0.06_GH0.tar.gz) = 12005 SHA256 (anomalizer-ngx_aws_auth-f3d9862_GH0.tar.gz) = 3e8cbb594abccb84ce9660d31e9d623b615eab3720bca206cfddeeab9eb2383e SIZE (anomalizer-ngx_aws_auth-f3d9862_GH0.tar.gz) = 16080 SHA256 (google-ngx_brotli-a71f931_GH0.tar.gz) = b3312a045d5303a40d02beb34711b8ca27f7b72d647e9ee2012a8eddd14d9b22 SIZE (google-ngx_brotli-a71f931_GH0.tar.gz) = 16376 SHA256 (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = ddfd4fdd99075d906b7b75c49f56ec96b76df7951dfa54502e0f83890447031f SIZE (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = 17162 SHA256 (BenBE-nginx-ct-71bf4d2_GH0.tar.gz) = 15441194cf9ffee84394ac75f0c3ded8712ae07b0ee8194aa5ca47ec8f670321 SIZE (BenBE-nginx-ct-71bf4d2_GH0.tar.gz) = 8212 SHA256 (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = faa2fcd5168b10764d35081356511d5f84db5c526a1aa4b6add2db94b6853b2b SIZE (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = 66561 SHA256 (openresty-drizzle-nginx-module-c631276_GH0.tar.gz) = 215ebeb3bad3a907f13fbdae66a25939b6820bdba2f339394cbb9c8b8557308a SIZE (openresty-drizzle-nginx-module-c631276_GH0.tar.gz) = 51675 SHA256 (ZigzagAK-ngx_dynamic_upstream-ab67fe7_GH0.tar.gz) = 4610da3ce9c35e3eef0e6d12a6285b9c8020f6d44fb094b4af94c1275bc01156 SIZE (ZigzagAK-ngx_dynamic_upstream-ab67fe7_GH0.tar.gz) = 22991 SHA256 (openresty-echo-nginx-module-4eeda3c_GH0.tar.gz) = 64093d606c7bc61a26ca49bfa7c4a2dacec6013ce158463a377592a6f7224444 SIZE (openresty-echo-nginx-module-4eeda3c_GH0.tar.gz) = 53544 SHA256 (openresty-encrypted-session-nginx-module-7ffe4ec_GH0.tar.gz) = 1848ee88be81350326918930463e0f2be2013ab76ae589d01f00fd81c5da0c07 SIZE (openresty-encrypted-session-nginx-module-7ffe4ec_GH0.tar.gz) = 11899 SHA256 (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = d52fbb0f2819cd91b710ad85e6c8b452fdca6a5d81b0694d6637adba3fc2382c SIZE (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = 6494 SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106 SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090 SHA256 (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 9b059b5ae7b602d12d32d5ebe2700827ea625f22c0fb3b9956242e11de63845b SIZE (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 4674 SHA256 (openresty-headers-more-nginx-module-84a65d6_GH0.tar.gz) = e99175b8eddcaaaea94856c9a9a90036f8b959c016cedf42cbfbc9cdd63b035f SIZE (openresty-headers-more-nginx-module-84a65d6_GH0.tar.gz) = 29468 SHA256 (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = a58feb576f2231498b8a3863d3c6fba45c7d48bc48735fa714e07a7bfbedb6e3 SIZE (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = 3425 SHA256 (atomx-nginx-http-auth-digest-ac91c88_GH0.tar.gz) = 31b2a737d3d5d118a286a0b8a6e2637eda313dba07a9a5824e4c6e33ea6e2b80 SIZE (atomx-nginx-http-auth-digest-ac91c88_GH0.tar.gz) = 17890 SHA256 (TeslaGov-ngx-http-auth-jwt-module-2.3.0_GH0.tar.gz) = 520c348416f5265be9aeb094e7c22ba7e34ed3611569a56c16265260ab39fd90 SIZE (TeslaGov-ngx-http-auth-jwt-module-2.3.0_GH0.tar.gz) = 31526 SHA256 (stnoonan-spnego-http-auth-nginx-module-60f0811_GH0.tar.gz) = 205e1ee4b5fcab1a7f136e39c569ddb470a35120761b8acc1463bda5e3062c42 SIZE (stnoonan-spnego-http-auth-nginx-module-60f0811_GH0.tar.gz) = 30464 SHA256 (kvspb-nginx-auth-ldap-241200e_GH0.tar.gz) = d3aa3a5ead311b34059d6ab1b6d2cf3ac8269c47a87b768523c07381229db470 SIZE (kvspb-nginx-auth-ldap-241200e_GH0.tar.gz) = 18541 SHA256 (sto-ngx_http_auth_pam_module-v1.5.5_GH0.tar.gz) = 98a71617d9119ae784993e3789ce8766fdf2ff2479691f3dc6cf8d8763f8d364 SIZE (sto-ngx_http_auth_pam_module-v1.5.5_GH0.tar.gz) = 7233 SHA256 (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = d2499d94d82d4e4eac8425d799e52883131ae86a956524040ff2fd230ef9f859 SIZE (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = 14558 SHA256 (openresty-nginx-eval-module-13425e8_GH0.tar.gz) = 48664ecd18041633829fc66b5e339ca7e75f44648c7bcbdd18e8cf8691a100bd SIZE (openresty-nginx-eval-module-13425e8_GH0.tar.gz) = 14936 SHA256 (aperezdc-ngx-fancyindex-cbc0d3f_GH0.tar.gz) = ded74515205e1e7a3a0175214bbe62ac3a13c21bd428084783d6345520bed782 SIZE (aperezdc-ngx-fancyindex-cbc0d3f_GH0.tar.gz) = 30334 SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813 SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934 SHA256 (leev-ngx_http_geoip2_module-445df24_GH0.tar.gz) = f19985b13e4095168a60aab5a1b29940ff586bf7571c61aa70ca7cd2f807850c SIZE (leev-ngx_http_geoip2_module-445df24_GH0.tar.gz) = 8889 SHA256 (ip2location-ip2location-nginx-5f2c59a_GH0.tar.gz) = 3eb29b516d80afcc5267ef436bd527b0810257437bce48bdfd6070dd10f1b767 SIZE (ip2location-ip2location-nginx-5f2c59a_GH0.tar.gz) = 5506 SHA256 (ip2location-ip2proxy-nginx-f3e7e7d_GH0.tar.gz) = 90dc4a10dd8fc4af3ffdd2cf451368eca1d3b90261ec1944ad629b2302932638 SIZE (ip2location-ip2proxy-nginx-f3e7e7d_GH0.tar.gz) = 5253 SHA256 (nginx-modules-ngx_http_json_status_module-c77dff4_GH0.tar.gz) = a071c50834142dc094a2915a5ac7bd80765d76bbe736fe291e40f593c8278f16 SIZE (nginx-modules-ngx_http_json_status_module-c77dff4_GH0.tar.gz) = 6753 SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885 SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343 SHA256 (slact-nchan-v1.3.7_GH0.tar.gz) = 6e82c673cedc7d33ee48ea1c198964fdcf6853bf851de797002199a496f08263 SIZE (slact-nchan-v1.3.7_GH0.tar.gz) = 665133 SHA256 (wandenberg-nginx-push-stream-module-0.6.0_GH0.tar.gz) = 84f6ad280c5eaf34e145bae3b835ef826b6e4aa490a94fed7350c8093be67d61 SIZE (wandenberg-nginx-push-stream-module-0.6.0_GH0.tar.gz) = 210766 SHA256 (yaoweibin-ngx_http_substitutions_filter_module-e12e965_GH0.tar.gz) = 40f9d43fdb39f4a8c60697e366469a42e229b12f1993376f33431e700bd9a50f SIZE (yaoweibin-ngx_http_substitutions_filter_module-e12e965_GH0.tar.gz) = 94055 SHA256 (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 514aa57155c73c2e3f7bdfe00c580183df343f2fa4b34e77f040cf6557caffae SIZE (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 75708 SHA256 (fdintino-nginx-upload-module-96e6460_GH0.tar.gz) = 7643e724edc3e3ffb70b1685312f4e2f405b9b6cc186621b947a640ead6fcc0d SIZE (fdintino-nginx-upload-module-96e6460_GH0.tar.gz) = 42561 SHA256 (masterzen-nginx-upload-progress-module-v0.9.3_GH0.tar.gz) = 7d810069f6f3e26f3b00989448fceb891a934c2a2f7eb55e0358b70291c23942 SIZE (masterzen-nginx-upload-progress-module-v0.9.3_GH0.tar.gz) = 17303 SHA256 (yaoweibin-nginx_upstream_check_module-87bfa66_GH0.tar.gz) = bffdae53677f703f99401d5d8924f3351832f1ade224e7e45c4e33e930316bb4 SIZE (yaoweibin-nginx_upstream_check_module-87bfa66_GH0.tar.gz) = 130913 SHA256 (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 93f71b7cf0db9c6dbf97e3ee11cf8efbc149946c0949d7abd19c74c7620eea50 SIZE (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 10433 SHA256 (gdongca-nginx-sticky-module-ng-a3263ad_GH0.tar.gz) = 610bd7fa83d6f8fdb17cf689f36b2dfc5e5638869dcd225528eb69d8a0a40ac8 SIZE (gdongca-nginx-sticky-module-ng-a3263ad_GH0.tar.gz) = 122022 SHA256 (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 9113f887a8740fe72614ee32f481177d33e9542c3b0625627da19a1c4f3da2cb SIZE (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 2710072 SHA256 (vince2678-mod_zip-39dc908_GH0.tar.gz) = bc5c3d725268abbe1c5c38de5b18a4ad9dbe5821c4afeaccabd3eec38b272be4 SIZE (vince2678-mod_zip-39dc908_GH0.tar.gz) = 30275 SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462 SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133 SHA256 (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 7393809d5d8877812da1bd5b5fbd1d8b00bc85e71f2f387c344f007773e49050 SIZE (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 20617 SHA256 (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 20c3679199ba7efe1598f03b2fa0b13591226363c8dd7930d7f02702cd5abada SIZE (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 139656 SHA256 (openresty-lua-nginx-module-v0.10.28_GH0.tar.gz) = 634827d54de6216cb0502d14f76610788b3a3e33160e91d5578d6db0d9a34a20 SIZE (openresty-lua-nginx-module-v0.10.28_GH0.tar.gz) = 869217 SHA256 (openresty-stream-lua-nginx-module-v0.0.16_GH0.tar.gz) = 3b1103cf5ee940ea94711eae1a7ccc1a161273ec9a08eb415f1d45ad385f967d SIZE (openresty-stream-lua-nginx-module-v0.0.16_GH0.tar.gz) = 395259 SHA256 (openresty-memc-nginx-module-v0.20_GH0.tar.gz) = a42dd56dd6e2144755a127bcd2a6cc1a488258dc5cdb751d6a3e5dd5b6989239 SIZE (openresty-memc-nginx-module-v0.20_GH0.tar.gz) = 34736 SHA256 (owasp-modsecurity-ModSecurity-nginx-17405e0_GH0.tar.gz) = 356f2dcf7160c739dc05fe3b011d0515d5d721d9e9c7c8b3864a822614d7523b SIZE (owasp-modsecurity-ModSecurity-nginx-17405e0_GH0.tar.gz) = 1159946 SHA256 (wargio-naxsi-1.7_GH0.tar.gz) = adee817da71913f64a9fb0fca142d9520bb0e5014b1acc797841cd8e31273f4d SIZE (wargio-naxsi-1.7_GH0.tar.gz) = 1132392 SHA256 (libinjection-libinjection-b9fcaaf_GH0.tar.gz) = 7812e1316b61a7a7d3a65a57a07c6d5235ac40fe35e6edda983f31a44661a38e SIZE (libinjection-libinjection-b9fcaaf_GH0.tar.gz) = 2218207 SHA256 (nginx-njs-0.8.10_GH0.tar.gz) = 0be4bdd79184cd43f55a0377e59107fddfeef33e54f97c890894f0fe72628d26 SIZE (nginx-njs-0.8.10_GH0.tar.gz) = 942446 SHA256 (osokin-nginx-otel-3a655df_GH0.tar.gz) = 71ee1561303c289d4562148f8719b60796c36abe16de1b3c10d10b8e6f03a952 SIZE (osokin-nginx-otel-3a655df_GH0.tar.gz) = 27169 SHA256 (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = c69ad4495de7c7883ebc23e1e6c4cc83a4ac6a7fddd4d5c12e49d33b65f7c50b SIZE (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = 48544 SHA256 (openresty-rds-csv-nginx-module-6a90686_GH0.tar.gz) = 92068b96a9cf152e8f10db2b661a031adbb2a29db4b075773c2495846d4c926c SIZE (openresty-rds-csv-nginx-module-6a90686_GH0.tar.gz) = 20631 SHA256 (openresty-rds-json-nginx-module-e6517b9_GH0.tar.gz) = 93dc271ff64d9dcbd48e494b72ac7af7a169c58ce4d4a98d732fb71b07e6bf1c SIZE (openresty-rds-json-nginx-module-e6517b9_GH0.tar.gz) = 35794 SHA256 (openresty-redis2-nginx-module-454c223_GH0.tar.gz) = dd27c5c1766d67518c42f51c11ca2f74b2db8a71946f90b4fadf5d868fbede65 SIZE (openresty-redis2-nginx-module-454c223_GH0.tar.gz) = 25731 SHA256 (arut-nginx-rtmp-module-6c7719d_GH0.tar.gz) = af459cb16d276cf76a73adba55bc063330136090f7ce9279b851c35eea8c57da SIZE (arut-nginx-rtmp-module-6c7719d_GH0.tar.gz) = 520109 SHA256 (openresty-set-misc-nginx-module-eb223c9_GH0.tar.gz) = 1eeea5ea1df3531e5a1fafde1464b3bb688a7ef1451875017dc25f72c733244b SIZE (openresty-set-misc-nginx-module-eb223c9_GH0.tar.gz) = 30088 SHA256 (sflow-nginx-sflow-module-f15c87f_GH0.tar.gz) = 251de3a5b588a4721effe88f3dbc632706321b7cd1af5fae7aa4f38ca50d2637 SIZE (sflow-nginx-sflow-module-f15c87f_GH0.tar.gz) = 29515 SHA256 (nginx-shib-nginx-http-shibboleth-629ae1f_GH0.tar.gz) = 79d3d8330c58254605e569bb34371c030122ad2f52e0191cbf06df3bc316952c SIZE (nginx-shib-nginx-http-shibboleth-629ae1f_GH0.tar.gz) = 23907 SHA256 (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 6ae8abb01a2aff788e75ec68621cb0159148a6f73730a84b30b0bdbc6cdc1758 SIZE (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 11186 SHA256 (openresty-srcache-nginx-module-bcdcfdc_GH0.tar.gz) = fbe15bc0c2d52f778b04d4433e220f219bde0660d19c6acedf67aa194049b130 SIZE (openresty-srcache-nginx-module-bcdcfdc_GH0.tar.gz) = 50848 SHA256 (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 748b67ceb82b3b843ae915bf7863fd08b7c2427c045e5ec540242d050f7b30d0 SIZE (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 352431 SHA256 (kaltura-nginx-vod-module-26f0687_GH0.tar.gz) = 7c098d4b1c0f0a3d694ece364fa190d5c88a920352e4c3e9377ae3b38904a08b SIZE (kaltura-nginx-vod-module-26f0687_GH0.tar.gz) = 475372 SHA256 (vozlt-nginx-module-vts-b6f6528_GH0.tar.gz) = 4ce293881889ae3543db64a7dbe3d263c3f01124addf64f8eb560d6c7bcbedff SIZE (vozlt-nginx-module-vts-b6f6528_GH0.tar.gz) = 182368 SHA256 (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = aca454bffcee2476dc92682ebfb8c0378a271fda178be7e945d648419d220758 SIZE (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = 14646 SHA256 (openresty-xss-nginx-module-de2d87a_GH0.tar.gz) = f830c9300d751046e2592c74d09f39ac4b4b4567078c96c24951de5554861b5e SIZE (openresty-xss-nginx-module-de2d87a_GH0.tar.gz) = 12779 SHA256 (tokers-zstd-nginx-module-f4ba115_GH0.tar.gz) = 20045e8ac80e2cc9fd3659573153cb1f22d98a653a10fe939a4be0e90160826a SIZE (tokers-zstd-nginx-module-f4ba115_GH0.tar.gz) = 55848

Collapse this list.


Packages (timestamps in pop-ups are UTC):
nginx-devel
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest1.27.4_31.27.4_41.19.6_41.27.4_31.27.4_4-1.19.6_4-
FreeBSD:13:quarterly1.27.4_41.27.4_41.25.1_11.27.3_41.27.4_41.25.3_91.25.3_91.25.4
FreeBSD:14:latest1.27.4_31.27.4_71.23.31.27.4_31.27.4_71.25.1-1.25.1
FreeBSD:14:quarterly1.27.3_41.27.4_4-1.27.3_41.27.4_41.25.3_91.25.3_91.25.4
FreeBSD:15:latest1.27.4_31.27.4_3n/a1.27.4_3n/a1.25.3_111.25.3_111.25.4_2
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Library dependencies:
  1. libpcre2-8.so : devel/pcre2
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for nginx-devel-1.27.5_1: DEBUG=off: Build with debugging support DEBUGLOG=off: Enable debug log (--with-debug) DSO=on: Enable dynamic modules support FILE_AIO=on: Enable file aio IPV6=on: Enable IPv6 support NJS=off: Enable javascript (NJS) module OTEL=off: Enable OpenTELemetry module THREADS=on: Enable threads support WWW=on: Enable html sample files ====> Modules that require HTTP module GOOGLE_PERFTOOLS=off: Enable google perftools module HTTP=on: Enable HTTP module HTTP_ADDITION=on: Enable http_addition module HTTP_AUTH_REQ=on: Enable http_auth_request module HTTP_CACHE=on: Enable http_cache module HTTP_DAV=on: Enable http_webdav module HTTP_DEGRADATION=off: Enable http_degradation module HTTP_FLV=on: Enable http_flv module HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module HTTP_GZIP_STATIC=on: Enable http_gzip_static module HTTP_IMAGE_FILTER=off: Enable http_image_filter module HTTP_MP4=on: Enable http_mp4 module HTTP_PERL=off: Enable http_perl module HTTP_RANDOM_INDEX=on: Enable http_random_index module HTTP_REALIP=on: Enable http_realip module HTTP_SECURE_LINK=on: Enable http_secure_link module HTTP_SLICE=on: Enable http_slice module HTTP_SSL=on: Enable http_ssl module HTTP_STATUS=on: Enable http_stub_status module HTTP_SUB=on: Enable http_sub module HTTP_XSLT=off: Enable http_xslt module HTTPV2=on: Enable HTTP/2 protocol support (SSL req.) HTTPV3=on: Enable HTTP/3 protocol support HTTPV3_BORING=off: Use security/boringssl HTTPV3_LSSL=off: Use security/libressl-devel HTTPV3_QTLS=off: Use security/openssl-quictls ====> Modules that require MAIL module MAIL=on: Enable IMAP4/POP3/SMTP proxy module MAIL_IMAP=off: Enable IMAP4 proxy module MAIL_POP3=off: Enable POP3 proxy module MAIL_SMTP=off: Enable SMTP proxy module MAIL_SSL=on: Enable mail_ssl module ====> Modules that require STREAM module STREAM=on: Enable stream module STREAM_REALIP=on: Enable stream_realip module STREAM_SSL=on: Enable stream_ssl module (SSL req.) STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.) ====> Third-party modules AJP=off: 3rd party ajp module AWS_AUTH=off: 3rd party aws auth module BROTLI=off: 3rd party brotli module CACHE_PURGE=off: 3rd party cache_purge module CT=off: 3rd party cert_transparency module (SSL req.) DEVEL_KIT=off: 3rd party Nginx Development Kit module ARRAYVAR=off: 3rd party array_var module DRIZZLE=off: 3rd party drizzle module DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module ECHO=off: 3rd party echo module ENCRYPTSESSION=off: 3rd party encrypted_session module FIPS_CHECK=off: 3rd party fips_check module FORMINPUT=off: 3rd party form_input module GRIDFS=off: 3rd party gridfs module HEADERS_MORE=off: 3rd party headers_more module HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module HTTP_AUTH_JWT=off: 3rd party http_auth_jwt module HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module HTTP_AUTH_PAM=off: 3rd party http_auth_pam module HTTP_DAV_EXT=off: 3rd party webdav_ext module HTTP_EVAL=off: 3rd party eval module HTTP_FANCYINDEX=off: 3rd party http_fancyindex module HTTP_FOOTER=off: 3rd party http_footer module HTTP_GEOIP2=off: 3rd party geoip2 module HTTP_IP2LOCATION=off: 3rd party ip2location-nginx module HTTP_IP2PROXY=off: 3rd party ip2proxy-nginx module HTTP_JSON_STATUS=off: 3rd party http_json_status module HTTP_MOGILEFS=off: 3rd party mogilefs module HTTP_NOTICE=off: 3rd party notice module HTTP_PUSH=off: 3rd party push module HTTP_PUSH_STREAM=off: 3rd party push stream module HTTP_REDIS=off: 3rd party http_redis module HTTP_SLICE_AHEAD=off: 3rd party http_slice_ahead module HTTP_SUBS_FILTER=off: 3rd party subs filter module HTTP_TARANTOOL=off: 3rd party tarantool upstream module HTTP_UPLOAD=off: 3rd party upload module HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module HTTP_ZIP=off: 3rd party http_zip module ICONV=off: 3rd party iconv module LET=off: 3rd party let module LINK=off: 3rd party link function module LUA=off: 3rd party lua module LUASTREAM=off: 3rd party lua stream module MEMC=off: 3rd party memc (memcached) module MODSECURITY3=off: 3rd party modsecurity3 module NAXSI=off: 3rd party naxsi module PASSENGER=off: 3rd party passenger module POSTGRES=off: 3rd party postgres module RDS_CSV=off: 3rd party rds_csv module RDS_JSON=off: 3rd party rds_json module REDIS2=off: 3rd party redis2 module RTMP=off: 3rd party rtmp module SET_MISC=off: 3rd party set_misc module SFLOW=off: 3rd party sflow module SHIBBOLETH=off: 3rd party shibboleth module SLOWFS_CACHE=off: 3rd party slowfs_cache module SRCACHE=off: 3rd party srcache module STS=off: 3rd party sts module VOD=off: 3rd party vod module VTS=off: 3rd party vts module XSS=off: 3rd party xss module WEBSOCKIFY=off: 3rd party websockify module ZSTD=off: 3rd party zstd module ====> GSSAPI implementation (imply HTTP_AUTH_KRB5): you can only select none or one of them GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal GSSAPI_MIT=off: GSSAPI support via security/krb5 ===> Use 'make config' to modify these settings
Options name:
www_nginx-devel
USES:
cpe ssl ssl ssl
pkg-message:
For install:
Recent version of the NGINX introduces dynamic modules support. In FreeBSD ports tree this feature was enabled by default with the DSO knob. Several vendor's and third-party modules have been converted to dynamic modules. Unset the DSO knob builds an NGINX without dynamic modules support. To load a module at runtime, include the new `load_module' directive in the main context, specifying the path to the shared object file for the module, enclosed in quotation marks. When you reload the configuration or restart NGINX, the module is loaded in. It is possible to specify a path relative to the source directory, or a full path, please see https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ and http://nginx.org/en/docs/ngx_core_module.html#load_module for details. Default path for the NGINX dynamic modules is /usr/local/libexec/nginx.
Master Sites:
Expand this list (5 items)
Collapse this list.
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. https://nginx.org/download/
Collapse this list.

Number of commits found: 1208 (showing only 100 on this page)

[First Page]  «  3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  »  [Last Page]

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
0.8.40_1
10 Jun 2010 07:19:18
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Configure temporary path for ngx_http_uwsgi_module.
Bump PORTREVISION.

Submitted by:   Piotr Sikora aka piotr dot sikora at frickle dot com
0.8.40
08 Jun 2010 11:28:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.4 to 1.5.
Remove needless patch.

Do not bump PORTREVISIONs.
0.8.40
08 Jun 2010 04:47:29
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party cache_purge module from 1.0 to 1.1.

Do not bump PORTREVISIONs.
0.8.40
07 Jun 2010 13:34:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.39 to 0.8.40.
License.

<ChangeLog>

*) Security: now nginx/Windows ignores default file stream name.
   Thanks to Jose Antonio Vazquez Gonzalez.

*) Feature: the ngx_http_uwsgi_module.
   Thanks to Roberto De Ioris.

*) Feature: a "fastcgi_param" directive with value starting with
   "HTTP_" overrides a client request header line.

*) Bugfix: the "If-Modified-Since", "If-Range", etc. client request
   header lines were passed to FastCGI-server while caching.

*) Bugfix: listen unix domain socket could not be changed during
   reconfiguration.
   Thanks to Maxim Dounin.

</ChangeLog>
0.8.39
07 Jun 2010 02:45:14
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.09 to 0.10.

Do not bump PORTREVISIONs.
0.8.39
06 Jun 2010 07:09:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 2.2.12 to 2.2.14:

1) third-party passenger module for www/nginx and www/nginx-devel
2) www/rubygem-passenger

Do not bump PORTREVISIONs. [1]

Approved by:    Jacob Atzen aka jatzen at gmail dot com [2]
0.8.39
02 Jun 2010 17:14:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.08 to 0.09.

Do not bump PORTREVISIONs.
0.8.39
01 Jun 2010 09:43:03
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update:

1) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx
2) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx-devel
3) www/rubygem-passenger from 2.2.11 to 2.2.12

Remove needless patch. [2]

Do not bump PORTREVISIONs.

Approved by:    Jacob Atzen aka jatzen at gmail dot com [3]
0.8.39
31 May 2010 16:34:49
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.38 to 0.8.39.

<ChangeLog>

*) Bugfix: an inherited "alias" directive worked incorrectly in
   inclusive location.

*) Bugfix: in "alias" with variables and "try_files" directives
   combination.

*) Bugfix: listen unix domain and IPv6 sockets did not inherit while
   online upgrade.
   Thanks to Maxim Dounin.

</ChangeLog>
0.8.38
25 May 2010 16:10:57
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.3 to 1.4.
Remove needless patch.

Do not bump PORTREVISIONs.
0.8.38
24 May 2010 17:17:17
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.37 to 0.8.38.
Add four hacks for third-party modules.

<ChangeLog>

*) Feature: the "proxy_no_cache" and "fastcgi_no_cache" directives.

*) Feature: now the "rewrite" directive does a redirect automatically
   if the $scheme variable is used.
   Thanks to Piotr Sikora.

*) Bugfix: now "limit_req" delay directive conforms to the described
   algorithm.
   Thanks to Maxim Dounin.

*) Bugfix: the $uid_got variable might not be used in the SSI and perl
   modules.

</ChangeLog>
0.8.37
17 May 2010 06:39:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.36 to 0.8.37.

<ChangeLog>

*) Feature: the ngx_http_split_clients_module.

*) Feature: the "map" directive supports keys more than 255 characters.

*) Bugfix: nginx ignored the "private" and "no-store" values in the
   "Cache-Control" backend response header line.

*) Bugfix: a "stub" parameter of an "include" SSI directive was not
   used, if empty response has 200 status code.

*) Bugfix: if a proxied or FastCGI request was internally redirected to
   another proxied or FastCGI location, then a segmentation fault might
   occur in a worker process; the bug had appeared in 0.8.33.
   Thanks to Yichun Zhang.

*) Bugfix: IMAP connections may hang until they timed out while talking
   to Zimbra server.
   Thanks to Alan Batie.

</ChangeLog>
0.8.36
07 May 2010 03:56:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.28 to 0.30.

Do not bump PORTREVISIONs.
0.8.36
03 May 2010 13:58:42
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.27 to 0.28.

Do not bump PORTREVISIONs.
0.8.36
29 Apr 2010 04:18:25
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party supervisord module from 1.3 to 1.4.

Do not bump PORTREVISIONs.
0.8.36
28 Apr 2010 19:18:28
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party headers_more module from 0.07 to 0.08.
0.8.36
23 Apr 2010 03:43:21
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.35 to fresh bugfix release 0.8.36.
Update third party http_memc module from 0.06 to 0.08.

<ChangeLog>

*) Bugfix: the ngx_http_dav_module handled incorrectly the DELETE,
   COPY, and MOVE methods for symlinks.

*) Bugfix: values of the $query_string, $arg_..., etc. variables cached
   in main request were used by the SSI module in subrequests.

*) Bugfix: a variable value was repeatedly encoded after each an "echo"
   SSI-command output; the bug had appeared in 0.6.14.

*) Bugfix: a worker process hung if a FIFO file was requested.
   Thanks to Vicente Aguilar and Maxim Dounin.

*) Bugfix: OpenSSL-1.0.0 compatibility on 64-bit Linux.
   Thanks to Maxim Dounin.

*) Bugfix: nginx could not be built --without-http-cache; the bug had
   appeared in 0.8.35.

<ChangeLog>
0.8.35
08 Apr 2010 11:08:05
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.26 to 0.27.
Remove needless extra patch.

Do not bump PORTREVISIONs.
0.8.35
01 Apr 2010 17:03:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.34 to 0.8.35.

Add quick fix for ngx_echo_module, also sent the patch to upstream.

<ChangeLog>

*) Change: now the charset filter runs before the SSI filter.

*) Feature: the "chunked_transfer_encoding" directive.

*) Bugfix: an "&" character was not escaped when it was copied in
   arguments part in a rewrite rule.

*) Bugfix: nginx might be terminated abnormally while a signal
   processing or if the directive "timer_resolution" was used on
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.34
28 Mar 2010 04:44:55
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Cleanse uneeded RC_SUBR variables

Approved by:    pgolluci
0.8.35
27 Mar 2010 00:15:24
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
0.8.34
25 Mar 2010 10:02:43
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third-party echo module version 0.26.

Do not bump PORTREVISIONs.
0.8.34
25 Mar 2010 02:37:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party auth request module from 0.1 to 0.2.

Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: auth_request_set directive.

*) Bugfix: segmentation fault happened on auth request handled by
   proxy_pass or fastcgi_pass if initial request has non-empty body.

</ChangeLog>
0.8.34
23 Mar 2010 05:01:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party gunzip filter module from 0.2 to 0.3.

Do not bump PORTREVISIONs.
0.8.34
10 Mar 2010 04:30:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.1 to 0.2.2.

Do not bump PORTREVISIONs.

PR:     144557
0.8.34
09 Mar 2010 09:49:09
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update CATEGORIES if defined passenger module support.

Do not bump PORTREVISIONs.
0.8.34
05 Mar 2010 11:46:00
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party passenger module from 2.0.10 to 2.0.11.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.34
03 Mar 2010 18:48:59
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.33 to 0.8.34.

Feature safe: yes

<ChangeLog>

*) Bugfix: nginx did not support all ciphers and digests used in client
   certificates.
   Thanks to Innocenty Enikeew.

*) Bugfix: nginx cached incorrectly FastCGI responses if there was
   large stderr output before response.

*) Bugfix: nginx did not support HTTPS referrers.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.33
02 Mar 2010 10:31:38
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upload module from 2.0.11 to 2.0.12.
Remove needless patch for www/nginx-devel.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
27 Feb 2010 19:56:07
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party auth_request module, version 0.1.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
27 Feb 2010 19:20:20
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party headers_more module, version 0.07.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
22 Feb 2010 17:29:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party modules:

o) http_push from 0.69 to 0.692;
o) passenger from 2.2.9 to 2.2.10.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
22 Feb 2010 13:53:25
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party modules for www/nginx and www/nginx-devel:

o) h264_streaming from 2.2.5 to 2.2.7;
o) passenger from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
18 Feb 2010 19:16:13
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party module accept language.

Do not bump PORTREVISIONs.

Feature safe:   yes

Submitted by:   Mike Stupalov aka landy2005 at gmail dot com
PR:             ports/143787
0.8.33
08 Feb 2010 03:56:37
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update memc (aka advanced memcached) module
from 0.05 to 0.06.

Do not bump PORTREVISIONs.
0.8.33
07 Feb 2010 10:21:47
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update upstream_hash module from 0.3 to 0.3.1.

Do not bump PORTREVISION.
0.8.33
06 Feb 2010 18:52:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update fancyindex module from 0.1_beta5 to 0.2.1.
Remove needless patches.

Do not bump PORTREVISIONs.
0.8.33
04 Feb 2010 10:08:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update gunzip_filter module from 0.1 to 0.2 for
www/nginx and www/nginx-devel.

Do not bump PORTREVISIONs.

Spotted by:     Maxim Dounin aka mdounin at mdounin dot ru
0.8.33
02 Feb 2010 00:56:26
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.32 to 0.8.33.

Feature safe:   yes

<ChangeLog>

*) Security: now nginx/Windows ignores trailing spaces in URI.
   Thanks to Dan Crowley, Core Security Technologies.

*) Security: now nginx/Windows ignores short files names.
   Thanks to Dan Crowley, Core Security Technologies.

*) Change: now keepalive connections after POST requests are not
   disabled for MSIE 7.0+. Thanks to Adam Lounds.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.32
18 Jan 2010 19:53:37
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
This is accordingly update for www/nginx and www/nginx-devel.

Add one more third-party module: upstream_hash, version 0.3.1.
Update slowfs_cache module from 1.2 to 1.3.
Update mogilefs module from 1.0.2 to 1.0.3.

Do not bump PORTREVISIONs.
0.8.32
14 Jan 2010 18:55:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Use USE_OPENSSL instead of bsd.openssl.mk.

Do not remove default DISTFILES due to port building
failure when third-party module (i.e. additional DISTFILES)
selected.

Do not bump PORTREVISIONs.

PRs:    142831, 142833
0.8.32
11 Jan 2010 17:23:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.31 to 0.8.32.

<ChangeLog>

*) Bugfix: UTF-8 encoding usage in the ngx_http_autoindex_module.
   Thanks to Maxim Dounin.

*) Bugfix: regular expression named captures worked for two names only.
   Thanks to Maxim Dounin.

*) Bugfix: now the "localhost" name is used in the "Host" request
   header line, if an unix domain socket is defined in the "auth_http"
   directive.
   Thanks to Maxim Dounin.

*) Bugfix: nginx did nor support chunked transfer encoding for 201
   responses.
   Thanks to Julian Reich.

*) Bugfix: if the "expires modified" set date in the past, the a
   negative number was set in the "Cache-Control" response header
   line.
   Thanks to Alex Kapranoff.

</ChangeLog>
0.8.31
11 Jan 2010 07:43:39
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add ngx_cache_purge-1.0, the module adding ability
to purge content from nginx's FastCGI and proxy caches.

Do not bump PORTREVISIONs.
0.8.31
09 Jan 2010 19:19:03
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Revert back update Passenger from 2.2.9 to 2.2.8
due to incompatible infrastructure.

Do not bump PORTREVISIONs.
0.8.31
08 Jan 2010 19:34:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update Passenger module from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.
0.8.31
06 Jan 2010 20:29:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add memc module - an extended version of the
standard memcached module that supports set, add, delete,
and many more memcached commands.

Do not bump PORTREVISIONs.
0.8.31
05 Jan 2010 22:06:43
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly commit changes for third-party modules in www/nginx
and www/nginx-devel:

 o) update uploadprogress from 0.7 to 0.8;
 o) update upstream_fair from 20081012 to 20090923;
 o) update supervisord from 1.2 to 1.3;
 o) add udplog (syslog) module version 1.0.0;
 o) s/modle/module/ for both Makefiles.

Remove needless patches.

Do not bump PORTREVISIONs.
0.8.31
03 Jan 2010 17:53:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update upstream_keepalive module, from 0.1 to 0.2.
Do not bump PORTREVISIONs.
0.8.31
29 Dec 2009 07:14:11
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update slowfs_cache module, from 1.1 to 1.2.
Do not bump PORTREVISIONs.
0.8.31
29 Dec 2009 07:04:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add http_gunzip_filter module, version 0.1.
Do not bump PORTREVISIONs.
0.8.31
26 Dec 2009 13:04:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update http_redis module from 0.3.0 to 0.3.1.
Cosmetic whitespace fix for Makefile.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Change: return 502 instead of 404 for error.

*) Change: better error messages diagnostics.

*) Bugfix: interoperability with redis; the bug had
   appeared in 0.3.0.

</ChangeLog>
0.8.31
25 Dec 2009 15:20:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more know WITH_DEBUGLOG by split debug features
for distro (--with-debug) and system (-g) specific.
0.8.31
25 Dec 2009 09:53:04
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Improve redis protocol support.
Do not bump PORTREVISION.
0.8.31
23 Dec 2009 21:22:26
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.30 to 0.8.31.
Update http_redis module from 0.2.0 to 0.3.0.
Remove needless extra patch.

<ChangeLog>

*) Feature: now the "error_page" directive may redirect the 301 and 302
   responses.

*) Feature: the $geoip_city_continent_code, $geoip_latitude, and
   $geoip_longitude variables.
   Thanks to Arvind Sundararajan.

*) Feature: now the ngx_http_image_filter_module deletes always EXIF
   and other application specific data if the data consume more than 5%
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.30
22 Dec 2009 11:42:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update slowfs_cache module, from 1.0 to 1.1.
Do not bump PORTREVISION.
0.8.30
22 Dec 2009 04:55:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add third party slowfs_cache module, version 1.0.
Do not bump PORTREVISION.
0.8.30
21 Dec 2009 20:31:46
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party supervisord module, version 1.2.
Do not bump PORTREVISIONs.
0.8.30
21 Dec 2009 18:46:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party http_push module, version 0.69.
Do not bump PORTREVISIONs.
0.8.30
19 Dec 2009 23:05:28
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party http_auth_pam module, version 1.1.
Do not bump PORTREVISIONs.

Spotted by:     Paul Cockings aka dspam at cytringan dot co dot uk
0.8.30
19 Dec 2009 10:56:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update uploadprogress module with patch from github.
Do not bump PORTREVISIONs.

Spotted by:     Vladimir Getmanshchuk aka vladget at openfilm dot com
Requested by:   Brice Figureau aka brice at daysofwonder dot com
                (uploadprogress module author)
0.8.30
17 Dec 2009 11:23:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update Passenger(tm) module from 2.2.7 to 2.2.8.
0.8.30
15 Dec 2009 16:11:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.29 to 0.8.30.

<ChangeLog>

*) Change: now the default buffer size of the
   "large_client_header_buffers" directive is 8K.
   Thanks to Andrew Cholakian.

*) Feature: the conf/fastcgi.conf for simple FastCGI configurations.

*) Bugfix: nginx/Windows tried to rename a temporary file twice if the
   file should replace an already existent file.

*) Bugfix: of "double free or corruption" error issued if host could
   not be resolved; the bug had appeared in 0.8.22.
   Thanks to Konstantin Svist.

*) Bugfix: in libatomic usage on some platforms.
   Thanks to W-Mark Kubacki.

</ChangeLog>
0.8.29
01 Dec 2009 04:22:10
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make uploadprogress module fetchtable (accordingly).

Notice from:    Vladimir Getmanshchuk aka vladget at openfilm dot com
0.8.29
30 Nov 2009 14:12:05
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.28 to 0.8.29.

<ChangeLog>

*) Change: now the "009" status code is written to an access log for
   proxied HTTP/0.9 responses.

*) Feature: the "addition_types", "charset_types", "gzip_types",
   "ssi_types", "sub_filter_types", and "xslt_types" directives support
   an "*" parameter.

*) Feature: GCC 4.1+ built-in atomic operations usage.
   Thanks to W-Mark Kubacki.

*) Feature: the --with-libatomic[=DIR] option in the configure.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.28
26 Nov 2009 06:52:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix upload module bug:
keepalive connection was hanging after upload has been completed.

Do not bump PORTREVISION.
0.8.28
24 Nov 2009 12:08:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.27 to 0.8.28.

<ChangeLog>

*) Bugfix: nginx could not be built with the --without-pcre parameter;
   the bug had appeared in 0.8.25.

</ChangeLog>
0.8.28
24 Nov 2009 11:56:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update (www/nginx and www/nginx-devel):

 passenger module support from 2.2.5 to 2.2.7;
 upload module to 2.0.11;
 uploadprogress module from 0.6 to 0.7.

Remove needless patch.

Also, h264 module distfile re-rolled due moon phase.

Do not bump PORTREVISIONs.
0.8.27
19 Nov 2009 10:09:29
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.24 to 0.8.27.

<ChangeLog>

Changes with nginx 0.8.27

*) Bugfix: regular expressions did work in nginx/Windows; the bug had
   appeared in 0.8.25.

Changes with nginx 0.8.26

*) Bugfix: in captures usage in "rewrite" directive; the bug had
   appeared in 0.8.25.

*) Bugfix: nginx could not be built without the --with-debug option;
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.24
12 Nov 2009 08:20:12
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.22 to 0.8.24.

<ChangeLog>

Changes with nginx 0.8.24

*) Bugfix: nginx always added "Content-Encoding: gzip" response header
   line in 304 responses sent by ngx_http_gzip_static_module.

*) Bugfix: nginx could not be built without the --with-debug option;
   the bug had appeared in 0.8.23.

*) Bugfix: the "unix:" parameter of the "set_real_ip_from" directive
   inherited incorrectly from previous level.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.22
09 Nov 2009 19:51:42
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update h264 (aka http_mp4_h264) module from the dated material to
version 2.2.5 for www/nginx and www/nginx-devel accordingly.

Do not bump PORTREVISIONs.

Requested by:   many
0.8.22
04 Nov 2009 21:24:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing library dependence for http_image_filter module for
www/nginx and www/nginx-devel accordingly.

Do not bump PORTREVISIONs.
0.8.22
03 Nov 2009 19:55:53
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.21 to 0.8.22.

<ChangeLog>

*) Feature: the "proxy_bind", "fastcgi_bind", and "memcached_bind"
   directives.

*) Feature: the "access" and the "deny" directives support IPv6.

*) Feature: the "set_real_ip_from" directive supports IPv6 addresses in
   request headers.

*) Feature: the "unix:" parameter of the "set_real_ip_from" directive.

*) Bugfix: nginx did not delete unix domain socket after configuration
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.21
26 Oct 2009 16:05:53
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.20 to 0.8.21.
Illuminate http_image_filter module.

<ChangeLog>

*) Feature: now the "-V" switch shows TLS SNI support.

*) Feature: the "listen" directive of the HTTP module supports unix
   domain sockets.
   Thanks to Hongli Lai.

*) Feature: the "default_server" parameter of the "listen" directive.

*) Feature: now a "default" parameter is not required to set listen
   socket options.

*) Bugfix: nginx did not support dates in 2038 year on 32-bit platforms;

*) Bugfix: socket leak; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.20
14 Oct 2009 17:08:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.19 to 0.8.20.

<ChangeLog>

*) Change: now default SSL ciphers are "HIGH:!ADH:!MD5".

*) Bugfix: the ngx_http_autoindex_module did not show the trailing
   slash in links to a directory; the bug had appeared in 0.7.15.

*) Bugfix: nginx did not close a log file set by the --error-log-path
   configuration option; the bug had appeared in 0.7.53.

*) Bugfix: nginx did not treat a comma as separator in the
   "Cache-Control" backend response header line.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.19
06 Oct 2009 17:20:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.18 to 0.8.19.

<ChangeLog>

*) Change: now SSLv2 protocol is disabled by default.

*) Change: now default SSL ciphers are "ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM".

*) Bugfix: a "limit_req" directive did not work; the bug had appeared
   in 0.8.18.

</ChangeLog>
0.8.18
06 Oct 2009 13:24:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.17 to 0.8.18.

<ChangeLog>

*) Feature: the "read_ahead" directive.

*) Feature: now several "perl_modules" directive may be used.

*) Feature: the "limit_req_log_level" and "limit_conn_log_level"
   directives.

*) Bugfix: now "limit_req" directive conforms to the leaky bucket
   algorithm.
   Thanks to Maxim Dounin.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.17
28 Sep 2009 18:11:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.16 to 0.8.17.

Feature safe:   yes

<ChangeLog>

*) Security: now "/../" are disabled in "Destination" request header
   line.

*) Change: now $host variable value is always low case.

*) Feature: the $ssl_session_id variable.

*) Bugfix: socket leak; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.16
22 Sep 2009 19:54:43
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update ngx_http_redis module from 0.1.2 to 0.2.0 accordingly.
Do not bump PORTREVISION.

Feature safe:   yes

<ChangeLog>

*) Feature: the $redis_db variable: now the ngx_http_redis
   module uses the $redis_db variable value as the parameter
   for SELECT command.

*) Cleanup: style/spaces fixes.

</ChangeLog>
0.8.16
22 Sep 2009 17:23:57
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.15 to 0.8.16.

Feature safe:   yes

<ChangeLog>

*) Feature: the "image_filter_transparency" directive.

*) Bugfix: "addition_types" directive was incorrectly named
   "addtion_types".

*) Bugfix: resolver cache poisoning.
   Thanks to Matthew Dempsky.

*) Bugfix: memory leak in resolver.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.15
14 Sep 2009 17:12:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 0.8.14 to 0.8.15.
Update http_redis module from 0.1.1 to 0.1.2.

<ChangeLog>

*) Security: a segmentation fault might occur in worker process while
   specially crafted request handling.
   Thanks to Chris Ries.

*) Bugfix: if names .domain.tld, .sub.domain.tld, and .domain-some.tld
   were defined, then the name .sub.domain.tld was matched by
   .domain.tld.

*) Bugfix: in transparency support in the ngx_http_image_filter_module.

*) Bugfix: in file AIO.

*) Bugfix: in X-Accel-Redirect usage; the bug had appeared in 0.8.11.

*) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.14
13 Sep 2009 08:42:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update upload_progress module from 0.5 to 0.6.
Remove needless patch.
Do not bump PORTREVISION.

Notice from:    Brice Figureau aka brice at daysofwonder dot com
0.8.14
12 Sep 2009 18:20:23
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Merge new fix existing patch for uploadprogress module for
nginx and nginx-devel accordingly.
Do not bump PORTREVISIONs.

Patch from:     Brice Figureau aka brice at daysofwonder dot com
Tested by:      Vladimir Getmanshchuk aka vladget at openfilm dot com
0.8.14
07 Sep 2009 18:42:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.13 to 0.8.14.

<ChangeLog>

*) Bugfix: an expired cached response might stick in the "UPDATING"
   state.

*) Bugfix: a segmentation fault might occur in worker process, if
   error_log was set to info or debug level.
   Thanks to Sergey Bochenkov.

*) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.

*) Bugfix: an "error_page" directive did not redirect a 413 error; the
   bug had appeared in 0.6.10.

</ChangeLog>
0.8.13
04 Sep 2009 10:37:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger module from 2.2.4 to 2.2.5.

Update mod_zip module from 1.1.4 to 1.1.5.
Also change MASTER_SITE for mod_zip module.

Do not bump PORTREVISION.
0.8.13
31 Aug 2009 16:18:42
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.12 to 0.8.13.

<ChangeLog>

*) Bugfix: in the "aio sendfile" directive. the bug had appeared in
   0.8.12.

*) Bugfix: nginx could not be built without the --with-file-aio option
   on FreeBSD; the bug had appeared in 0.8.12.

</ChangeLog>
0.8.12
31 Aug 2009 13:22:00
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.11 to 0.8.12.
Remove needless vendor patch.

<ChangeLog>

*) Feature: the "sendfile" parameter in the "aio" directive on FreeBSD.

*) Bugfix: in try_files; the bug had appeared in 0.8.11.

*) Bugfix: in memcached; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.11_1
31 Aug 2009 09:48:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add vendor patch for memcached module.
Update nginx_upload module from 2.0.9 to 2.0.10.
Update nginx_http_redis module from 0.1 to 0.1.1.

Bump PORTREVISION.
0.8.11
28 Aug 2009 16:13:10
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.10 to 0.8.11.
Remove needless extra patch.

<ChangeLog>

*) Change: directive "gzip_disable msie6" enables gzipping for
   MSIE 6.0 SV1.

*) Feature: file AIO support on FreeBSD and Linux.

*) Feature: the "directio_alignment" directive.

</ChangeLog>
0.8.10
24 Aug 2009 11:46:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.9 to 0.8.10.

<ChangeLog>

*) Bugfix: memory leaks if GeoIP City database was used.

*) Bugfix: in copying temporary files to permanent storage area; the
   bug had appeared in 0.8.9.

</ChangeLog>
0.8.9
24 Aug 2009 10:02:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add http_redis module support.
Add experimental file aio support.

Do not bump PORTREVISION cause new features are disabled by default.
0.8.9
18 Aug 2009 05:43:08
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.8 to 0.8.9.

<ChangeLog>

*) Feature: now the start cache loader runs in a separate process; this
   should improve large caches handling.

*) Feature: now temporarily files and permanent storage area may reside
   at different file systems.

</ChangeLog>
0.8.8
10 Aug 2009 10:32:38
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.7 to 0.8.8.

<ChangeLog>

*) Bugfix: in handling FastCGI headers split in records.

*) Bugfix: a segmentation fault occurred in worker process, if a
   request was handled in two proxied or FastCGIed locations and a
   caching was enabled in the first location; the bug had appeared in
   0.8.7.

</ChangeLog>
0.8.7
27 Jul 2009 16:56:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.6 to 0.8.7.

<ChangeLog>

*) Change: minimum supported OpenSSL version is 0.9.7.

*) Change: the "ask" parameter of the "ssl_verify_client" directive was
   changed to the "optional" parameter and now it checks a client
   certificate if it was offered.
   Thanks to Brice Figureau.

*) Feature: the $ssl_client_verify variable.
   Thanks to Brice Figureau.

*) Feature: the "ssl_crl" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.6
27 Jul 2009 05:59:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update mogilefs module from 1.0.1 to 1.0.2.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: directive mogilefs_methods and support for PUT and
   DELETE methods
*) Feature: dynamic evaluation of tracker name
*) Feature: ability to pass noverify parameter to tracker

</ChangeLog>
0.8.6
21 Jul 2009 13:53:14
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for http_geoip module (introduced in 0.8.6).
Do not bump PORTREVISION.
0.8.6
20 Jul 2009 09:04:55
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.5 to 0.8.6.

Add two new variables NGINX_ACCESSLOG and NGINX_ERRORLOG
to allow log paths customization, i.e.

% make NGINX_ACCESSLOG=/dev/null

NOTE.  If you want nginx to log errors into stderr it's
better to use

% make NGINX_ERRORLOG=stderr

instead of NGINX_ERRORLOG=/dev/stderr to avoid duplicate
error messages during startup.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.5
17 Jul 2009 06:12:47
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add two more third-party modules: http_mp4_streaming_lite
and http_notice_module.

Submitted by:   Konrad Lapsz aka konrad dot lapsz at gmail dot com
0.8.5
15 Jul 2009 16:56:10
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
0.8.5
15 Jul 2009 14:09:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Resort options to make third party modules distinguishable.
Apply these changes accordingly for stable and devel versions.
Do not bump PORTREVISIONs.

Submitted by:   Maxim Dounin aka mdounin at mdounin dot ru
0.8.5
15 Jul 2009 14:03:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix whitespaces.

Number of commits found: 1208 (showing only 100 on this page)

[First Page]  «  3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  »  [Last Page]