notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
Port details
nginx-devel Robust and small WWW server
1.27.2_5 www on this many watch lists=29 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.27.1_4Version of this port present on the latest quarterly branch.
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2007-06-15 08:23:21
Last Update: 2024-11-21 20:52:38
Commit Hash: ca283be
People watching this port, also watch:: nginx, sudo, wget, bash, lsof
License: BSD2CLAUSE
WWW:
https://nginx.com/
Description:
NGINX is a high performance edge web server with the lowest memory footprint and the key features to build modern and efficient web infrastructure. NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching, load balancing, compression, request throttling, connection multiplexing and reuse, SSL offload and HTTP media streaming. See also: https://nginx.org/
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (112 items)
Collapse this list.
  1. /usr/local/share/licenses/nginx-devel-1.27.2_5/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.27.2_5/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.27.2_5/BSD2CLAUSE
  4. etc/nginx/koi-utf
  5. etc/nginx/koi-win
  6. etc/nginx/win-utf
  7. @comment include/ngx_link_func_module.h
  8. @comment etc/nginx/naxsi_core.rules
  9. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  10. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  11. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  12. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  13. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  14. @comment libexec/nginx/ngx_http_ajp_module.so
  15. @comment libexec/nginx/ngx_http_array_var_module.so
  16. @comment libexec/nginx/ngx_http_aws_auth_module.so
  17. @comment libexec/nginx/ngx_http_brotli_filter_module.so
  18. @comment libexec/nginx/ngx_http_brotli_static_module.so
  19. @comment libexec/nginx/ngx_http_cache_purge_module.so
  20. @comment libexec/nginx/ngx_http_ssl_ct_module.so
  21. @comment libexec/nginx/ngx_ssl_ct_module.so
  22. @comment libexec/nginx/ndk_http_module.so
  23. @comment libexec/nginx/ngx_http_drizzle_module.so
  24. @comment libexec/nginx/ngx_http_dynamic_upstream_module.so
  25. @comment libexec/nginx/ngx_http_echo_module.so
  26. @comment libexec/nginx/ngx_http_encrypted_session_module.so
  27. @comment libexec/nginx/ngx_fips_check_module.so
  28. @comment libexec/nginx/ngx_http_form_input_module.so
  29. @comment libexec/nginx/ngx_http_gridfs_module.so
  30. @comment libexec/nginx/ngx_http_headers_more_filter_module.so
  31. @comment libexec/nginx/ngx_http_accept_language_module.so
  32. @comment libexec/nginx/ngx_http_auth_digest_module.so
  33. @comment libexec/nginx/ngx_http_auth_spnego_module.so
  34. @comment libexec/nginx/ngx_http_auth_ldap_module.so
  35. @comment libexec/nginx/ngx_http_auth_pam_module.so
  36. @comment libexec/nginx/ngx_http_dav_ext_module.so
  37. @comment libexec/nginx/ngx_http_eval_module.so
  38. @comment libexec/nginx/ngx_http_fancyindex_module.so
  39. @comment libexec/nginx/ngx_http_footer_filter_module.so
  40. @comment libexec/nginx/ngx_http_image_filter_module.so
  41. @comment libexec/nginx/ngx_http_ip2location_module.so
  42. @comment libexec/nginx/ngx_http_ip2proxy_module.so
  43. @comment libexec/nginx/ngx_http_json_status_module.so
  44. @comment libexec/nginx/ngx_http_mogilefs_module.so
  45. @comment libexec/nginx/ngx_http_notice_module.so
  46. @comment libexec/nginx/ngx_http_perl_module.so
  47. @comment libexec/nginx/ngx_http_push_stream_module.so
  48. @comment libexec/nginx/ngx_nchan_module.so
  49. @comment libexec/nginx/ngx_http_redis_module.so
  50. @comment libexec/nginx/ngx_http_subs_filter_module.so
  51. @comment libexec/nginx/ngx_http_tnt_module.so
  52. @comment libexec/nginx/ngx_http_uploadprogress_module.so
  53. @comment libexec/nginx/ngx_http_upload_module.so
  54. @comment libexec/nginx/ngx_http_upstream_fair_module.so
  55. @comment libexec/nginx/ngx_http_sticky_module.so
  56. @comment libexec/nginx/ngx_http_video_thumbextractor_module.so
  57. @comment libexec/nginx/ngx_http_xslt_filter_module.so
  58. @comment libexec/nginx/ngx_http_zip_module.so
  59. @comment libexec/nginx/ngx_http_geoip2_module.so
  60. @comment libexec/nginx/ngx_http_js_module.so
  61. @comment libexec/nginx/ngx_http_iconv_module.so
  62. @comment libexec/nginx/ngx_http_let_module.so
  63. @comment libexec/nginx/ngx_http_link_func_module.so
  64. @comment libexec/nginx/ngx_http_lua_module.so
  65. @comment libexec/nginx/ngx_stream_lua_module.so
  66. @comment libexec/nginx/ngx_mail_ssl_ct_module.so
  67. libexec/nginx/ngx_mail_module.so
  68. @comment libexec/nginx/ngx_http_memc_module.so
  69. @comment libexec/nginx/ngx_http_modsecurity_module.so
  70. @comment libexec/nginx/ngx_http_naxsi_module.so
  71. @comment libexec/nginx/ngx_otel_module.so
  72. @comment libexec/nginx/ngx_http_passenger_module.so
  73. @comment libexec/nginx/ngx_postgres_module.so
  74. @comment libexec/nginx/ngx_http_rds_csv_filter_module.so
  75. @comment libexec/nginx/ngx_http_rds_json_filter_module.so
  76. @comment libexec/nginx/ngx_http_redis2_module.so
  77. @comment libexec/nginx/ngx_rtmp_module.so
  78. @comment libexec/nginx/ngx_http_set_misc_module.so
  79. @comment libexec/nginx/ngx_http_shibboleth_module.so
  80. @comment libexec/nginx/ngx_http_slowfs_module.so
  81. @comment libexec/nginx/ngx_http_srcache_filter_module.so
  82. @comment libexec/nginx/ngx_stream_ssl_ct_module.so
  83. @comment libexec/nginx/ngx_stream_geoip2_module.so
  84. @comment libexec/nginx/ngx_stream_js_module.so
  85. libexec/nginx/ngx_stream_module.so
  86. @comment libexec/nginx/ngx_http_stream_server_traffic_status_module.so
  87. @comment libexec/nginx/ngx_http_vod_module.so
  88. @comment libexec/nginx/ngx_http_vhost_traffic_status_module.so
  89. @comment libexec/nginx/ngx_http_websockify_module.so
  90. @comment libexec/nginx/ngx_http_xss_filter_module.so
  91. @comment libexec/nginx/ngx_http_zstd_filter_module.so
  92. @comment libexec/nginx/ngx_http_zstd_static_module.so
  93. @comment %%SITE_ARCH%%/auto/nginx/nginx.so
  94. @comment %%SITE_ARCH%%/nginx.pm
  95. sbin/nginx
  96. share/vim/vimfiles/ftdetect/nginx.vim
  97. share/vim/vimfiles/ftplugin/nginx.vim
  98. share/vim/vimfiles/indent/nginx.vim
  99. share/vim/vimfiles/syntax/nginx.vim
  100. @postexec mkdir -p -m 755 %D/www/nginx-dist
  101. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  102. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  103. www/nginx-dist/index.html
  104. www/nginx-dist/50x.html
  105. @postexec chmod a-w %D/www/nginx-dist
  106. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  107. @dir /var/tmp/nginx
  108. @dir /var/log/nginx
  109. share/man/man8/nginx.8.gz
  110. @owner
  111. @group
  112. @mode
Collapse this list.
Dependency lines:
  • nginx-devel>0:www/nginx-devel
Conflicts:
CONFLICTS:
  • nginx-1.*
  • nginx-full-1.*
  • nginx-lite-1.*
  • nginx-naxsi-1.*
CONFLICTS_INSTALL:
  • nginx
To install the port:
cd /usr/ports/www/nginx-devel/ && make install clean
To add the package, run one of these commands:
  • pkg install www/nginx-devel
  • pkg install nginx-devel
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: nginx-devel
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1729691573 SHA256 (nginx-1.27.2.tar.gz) = a91ecfc3a0b3a2c1413afca627bd886d76e0414b81cad0fb7872a9655a1b25fa SIZE (nginx-1.27.2.tar.gz) = 1258098

Expand this list (140 items)

Collapse this list.

SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208 SHA256 (ngx_http_redis-0.3.9.tar.gz) = 21f87540f0a44b23ffa5df16fb3d788bc90803b255ef14f9c26e3847a6f26f46 SIZE (ngx_http_redis-0.3.9.tar.gz) = 13051 SHA256 (passenger-6.0.23.tar.gz) = 897555224fb11340677780d929b5099da62303b1ae15f2e7c65cd3f6d3e7920c SIZE (passenger-6.0.23.tar.gz) = 8298217 SHA256 (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 522e94c59f5783f281d868ede2adf325bf2f8ffb9e62cf8451d4b9ac0516916c SIZE (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 110807 SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80 SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280 SHA256 (anomalizer-ngx_aws_auth-21931b2_GH0.tar.gz) = d8a2422da96a638e9a911e4edb592954d9c0fe1576456fec9809ef4e2a0a863d SIZE (anomalizer-ngx_aws_auth-21931b2_GH0.tar.gz) = 15580 SHA256 (google-ngx_brotli-a71f931_GH0.tar.gz) = b3312a045d5303a40d02beb34711b8ca27f7b72d647e9ee2012a8eddd14d9b22 SIZE (google-ngx_brotli-a71f931_GH0.tar.gz) = 16376 SHA256 (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = ddfd4fdd99075d906b7b75c49f56ec96b76df7951dfa54502e0f83890447031f SIZE (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = 17162 SHA256 (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 72fdd125b9207cdda135f368095f85b943a78a4ff004d1cd217972e12b1571b2 SIZE (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 7224 SHA256 (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = faa2fcd5168b10764d35081356511d5f84db5c526a1aa4b6add2db94b6853b2b SIZE (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = 66561 SHA256 (openresty-drizzle-nginx-module-c631276_GH0.tar.gz) = 215ebeb3bad3a907f13fbdae66a25939b6820bdba2f339394cbb9c8b8557308a SIZE (openresty-drizzle-nginx-module-c631276_GH0.tar.gz) = 51675 SHA256 (ZigzagAK-ngx_dynamic_upstream-960eef2_GH0.tar.gz) = 86e7c6ed6dba2d4c5f5b87ecb91f25ccdb7a08b8a88236e632114f830b9e354b SIZE (ZigzagAK-ngx_dynamic_upstream-960eef2_GH0.tar.gz) = 23003 SHA256 (openresty-echo-nginx-module-5a402aa_GH0.tar.gz) = bb2a4b1a0e5ffa0203c1be854e663fc92cee0d7b5e0f7a38c0e163ae9124a38f SIZE (openresty-echo-nginx-module-5a402aa_GH0.tar.gz) = 53336 SHA256 (openresty-encrypted-session-nginx-module-v0.09_GH0.tar.gz) = fe9b95acf9726aefd71bf0aca6c11bee007f1da67e64be9b21a7131f0ed75ba6 SIZE (openresty-encrypted-session-nginx-module-v0.09_GH0.tar.gz) = 11847 SHA256 (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = d52fbb0f2819cd91b710ad85e6c8b452fdca6a5d81b0694d6637adba3fc2382c SIZE (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = 6494 SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106 SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090 SHA256 (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 9b059b5ae7b602d12d32d5ebe2700827ea625f22c0fb3b9956242e11de63845b SIZE (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 4674 SHA256 (openresty-headers-more-nginx-module-06dc0be_GH0.tar.gz) = 883b1e31d59f3eb1e76b34259711ad65a3443102973dcf22df329397f3d5eaa4 SIZE (openresty-headers-more-nginx-module-06dc0be_GH0.tar.gz) = 29438 SHA256 (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = a58feb576f2231498b8a3863d3c6fba45c7d48bc48735fa714e07a7bfbedb6e3 SIZE (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = 3425 SHA256 (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 0839c33c2f8d519f92daae274f62cf87eb68415d562c6500ee3e3721ce80557c SIZE (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 17815 SHA256 (stnoonan-spnego-http-auth-nginx-module-3575542_GH0.tar.gz) = 6d710f97bef58b2d5dc54445c0e48103786425f6d4ab18cf30a2168904d0ba62 SIZE (stnoonan-spnego-http-auth-nginx-module-3575542_GH0.tar.gz) = 24680 SHA256 (kvspb-nginx-auth-ldap-83c059b_GH0.tar.gz) = e76e9e117ad51af578a68fa7a30c256178796bb271fa77f01c93281a92b09921 SIZE (kvspb-nginx-auth-ldap-83c059b_GH0.tar.gz) = 18547 SHA256 (sto-ngx_http_auth_pam_module-v1.5.3_GH0.tar.gz) = 882018fea8d6955ab3fe294aafa8ebb1fdff4eac313c29583fef02c6de76fae7 SIZE (sto-ngx_http_auth_pam_module-v1.5.3_GH0.tar.gz) = 7084 SHA256 (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = d2499d94d82d4e4eac8425d799e52883131ae86a956524040ff2fd230ef9f859 SIZE (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = 14558 SHA256 (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 014bedb2b334ba8e8e23b4c660590357f8055dbed7b9b017e4cc2937876a8822 SIZE (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 14849 SHA256 (aperezdc-ngx-fancyindex-v0.5.2_GH0.tar.gz) = c3dd84d8ba0b8daeace3041ef5987e3fb96e9c7c17df30c9ffe2fe3aa2a0ca31 SIZE (aperezdc-ngx-fancyindex-v0.5.2_GH0.tar.gz) = 29052 SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813 SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934 SHA256 (leev-ngx_http_geoip2_module-3.4_GH0.tar.gz) = ad72fc23348d715a330994984531fab9b3606e160483236737f9a4a6957d9452 SIZE (leev-ngx_http_geoip2_module-3.4_GH0.tar.gz) = 8877 SHA256 (ip2location-ip2location-nginx-2df35fb_GH0.tar.gz) = 86d6d6d6b4437ecc621c5aac7bd5475dffd33afb70a51c5ea3c7f341ded46efb SIZE (ip2location-ip2location-nginx-2df35fb_GH0.tar.gz) = 5462 SHA256 (ip2location-ip2proxy-nginx-02ce447_GH0.tar.gz) = edbafe23087f019364f9d1c1c615fdbc5116ec727c49bf442e3e4b39441fc4cc SIZE (ip2location-ip2proxy-nginx-02ce447_GH0.tar.gz) = 5177 SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997 SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736 SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885 SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343 SHA256 (slact-nchan-v1.3.6_GH0.tar.gz) = ba0b7cc6b710a20ce1ed2554caf56154035291aaf115e407d7a6bb699fde42df SIZE (slact-nchan-v1.3.6_GH0.tar.gz) = 761436 SHA256 (wandenberg-nginx-push-stream-module-8c02220_GH0.tar.gz) = ab4fbe236e8bc500f0c5e13403d6a0e2e4e4ec17b81e0fcedaf669b4339626a6 SIZE (wandenberg-nginx-push-stream-module-8c02220_GH0.tar.gz) = 196720 SHA256 (yaoweibin-ngx_http_substitutions_filter_module-c6f825f_GH0.tar.gz) = 4ab034f2e056148469b440394e1664c46405712ef27bc4f3197e42bf7df8460e SIZE (yaoweibin-ngx_http_substitutions_filter_module-c6f825f_GH0.tar.gz) = 94062 SHA256 (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 514aa57155c73c2e3f7bdfe00c580183df343f2fa4b34e77f040cf6557caffae SIZE (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 75708 SHA256 (fdintino-nginx-upload-module-643b4c1_GH0.tar.gz) = a5bb48589b5c242683da33a9f1acc7847acc3ce4f2c4213ea524858aa789a6e9 SIZE (fdintino-nginx-upload-module-643b4c1_GH0.tar.gz) = 42571 SHA256 (masterzen-nginx-upload-progress-module-68b3ab3_GH0.tar.gz) = 35b506e57e19e780e01ecc7c3c31a64473c35e4a022f5a3f98092a60cd1c1602 SIZE (masterzen-nginx-upload-progress-module-68b3ab3_GH0.tar.gz) = 17322 SHA256 (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 4404c64e845e19feeb07a37976347987892a8e8680a961f793ff0d3ef96c07f4 SIZE (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 130039 SHA256 (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 93f71b7cf0db9c6dbf97e3ee11cf8efbc149946c0949d7abd19c74c7620eea50 SIZE (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 10433 SHA256 (dvershinin-nginx-sticky-module-ng-2753211_GH0.tar.gz) = e4a533dfa214ea28122301aeebbb1a38e1d1972edb7ee9bc72271c14f2693005 SIZE (dvershinin-nginx-sticky-module-ng-2753211_GH0.tar.gz) = 120676 SHA256 (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 9113f887a8740fe72614ee32f481177d33e9542c3b0625627da19a1c4f3da2cb SIZE (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 2710072 SHA256 (vince2678-mod_zip-5b2604b_GH0.tar.gz) = 4fe63be3b842882494152e586f0b87e73f51bfbfd801b78f033c71a011cba789 SIZE (vince2678-mod_zip-5b2604b_GH0.tar.gz) = 29559 SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462 SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133 SHA256 (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 7393809d5d8877812da1bd5b5fbd1d8b00bc85e71f2f387c344f007773e49050 SIZE (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 20617 SHA256 (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 20c3679199ba7efe1598f03b2fa0b13591226363c8dd7930d7f02702cd5abada SIZE (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 139656 SHA256 (openresty-lua-nginx-module-v0.10.26_GH0.tar.gz) = a75983287a2bdc5e964ace56a51b215dc2ec996639d4916cd393d6ebba94b565 SIZE (openresty-lua-nginx-module-v0.10.26_GH0.tar.gz) = 745785 SHA256 (openresty-stream-lua-nginx-module-bea8a0c_GH0.tar.gz) = 8f3b5894269336377a5e1b50eb42c5f07d4ead90087f8bed88a95074f0352f89 SIZE (openresty-stream-lua-nginx-module-bea8a0c_GH0.tar.gz) = 383699 SHA256 (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 8c2bdbe875e4f5225d0778bfb09a2668f9281d7de6218c7b462a7ba2cee06fe8 SIZE (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 34654 SHA256 (SpiderLabs-ModSecurity-nginx-v1.0.3_GH0.tar.gz) = 32a42256616cc674dca24c8654397390adff15b888b77eb74e0687f023c8751b SIZE (SpiderLabs-ModSecurity-nginx-v1.0.3_GH0.tar.gz) = 34063 SHA256 (wargio-naxsi-1.6_GH0.tar.gz) = e5920fdd09cae155b89eb21a94a21c029ebfdb056c284130221525be54044aae SIZE (wargio-naxsi-1.6_GH0.tar.gz) = 1116227 SHA256 (libinjection-libinjection-4aa3894_GH0.tar.gz) = ededea133e89e238ef2e60d0d62ef7ef9e741449eed8c5d856007132505bcd5b SIZE (libinjection-libinjection-4aa3894_GH0.tar.gz) = 2218294 SHA256 (nginx-njs-0.8.7_GH0.tar.gz) = e959b01637d6684387347cc6dea073949467193d273f58062129e52b110aefa2 SIZE (nginx-njs-0.8.7_GH0.tar.gz) = 880217 SHA256 (osokin-nginx-otel-52efd18_GH0.tar.gz) = db2fe2e6986266a74113ef338ae0b649d162728acc549d1496290d33b8deb64d SIZE (osokin-nginx-otel-52efd18_GH0.tar.gz) = 30622 SHA256 (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = c69ad4495de7c7883ebc23e1e6c4cc83a4ac6a7fddd4d5c12e49d33b65f7c50b SIZE (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = 48544 SHA256 (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 896be99c0cad50218417800a159e43ec088d6b58c099472ed3b3d7f179d6c0ea SIZE (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 20531 SHA256 (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = eaf18f60e981ea2442a7902689a26eba6cf6f36ebee712feeb1f4429eb654bdc SIZE (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = 34744 SHA256 (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = d255571bcfb9939b78099df39cb4d42f174d789aec8c8e5e47b93942b0299438 SIZE (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = 25471 SHA256 (arut-nginx-rtmp-module-v1.2.2_GH0.tar.gz) = 07f19b7bffec5e357bb8820c63e5281debd45f5a2e6d46b1636d9202c3e09d78 SIZE (arut-nginx-rtmp-module-v1.2.2_GH0.tar.gz) = 519934 SHA256 (openresty-set-misc-nginx-module-3937e7b_GH0.tar.gz) = cb3a4675ab6b8741e5847cf5bc41ee3f6ec5cbceec53188f9ae96e48feea17c5 SIZE (openresty-set-misc-nginx-module-3937e7b_GH0.tar.gz) = 29335 SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955 SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504 SHA256 (nginx-shib-nginx-http-shibboleth-be12df5_GH0.tar.gz) = aff9830b5de78dd9ce32cd2c55c5cf9173c99fe1a1d2190407c96668e7517bab SIZE (nginx-shib-nginx-http-shibboleth-be12df5_GH0.tar.gz) = 23872 SHA256 (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 6ae8abb01a2aff788e75ec68621cb0159148a6f73730a84b30b0bdbc6cdc1758 SIZE (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 11186 SHA256 (openresty-srcache-nginx-module-be22ac0_GH0.tar.gz) = 5753d1ffe87b5d6f5b7a0696667bb5ff1388738136fdee26ba55bc33f5796061 SIZE (openresty-srcache-nginx-module-be22ac0_GH0.tar.gz) = 51029 SHA256 (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 748b67ceb82b3b843ae915bf7863fd08b7c2427c045e5ec540242d050f7b30d0 SIZE (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 352431 SHA256 (kaltura-nginx-vod-module-1.31_GH0.tar.gz) = ace04201cf2d2b1a3e5e732a22b92225b8ce61a494df9cc7f79d97efface8952 SIZE (kaltura-nginx-vod-module-1.31_GH0.tar.gz) = 470904 SHA256 (vozlt-nginx-module-vts-bf64dbf_GH0.tar.gz) = d2782c75e39cb2ecf68453922b43ab2295adb6a35fa6a0f9c14173f70d22d7b1 SIZE (vozlt-nginx-module-vts-bf64dbf_GH0.tar.gz) = 180394 SHA256 (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = aca454bffcee2476dc92682ebfb8c0378a271fda178be7e945d648419d220758 SIZE (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = 14646 SHA256 (openresty-xss-nginx-module-v0.06_GH0.tar.gz) = 0b12bbc53a41f3e3d6df419c173b8c87434be3e6cd255a8193aa91345a2de6cf SIZE (openresty-xss-nginx-module-v0.06_GH0.tar.gz) = 12448 SHA256 (tokers-zstd-nginx-module-f4ba115_GH0.tar.gz) = 20045e8ac80e2cc9fd3659573153cb1f22d98a653a10fe939a4be0e90160826a SIZE (tokers-zstd-nginx-module-f4ba115_GH0.tar.gz) = 55848

Collapse this list.


Packages (timestamps in pop-ups are UTC):
nginx-devel
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest1.27.2_31.27.2_41.19.6_41.27.2_31.27.2_4-1.19.6_4-
FreeBSD:13:quarterly1.27.1_51.27.1_51.25.1_11.27.1_51.27.1_51.25.3_91.25.3_91.25.4
FreeBSD:14:latest1.27.2_21.27.2_41.23.31.27.2_21.27.2_41.25.1-1.25.1
FreeBSD:14:quarterly1.27.1_51.27.1_5-1.27.1_51.27.1_51.25.3_91.25.3_91.25.4
FreeBSD:15:latest1.27.2_41.27.2_4n/a1.27.2_4n/a1.25.3_111.25.3_111.25.4_2
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Library dependencies:
  1. libpcre2-8.so : devel/pcre2
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for nginx-devel-1.27.2_5: DEBUG=off: Build with debugging support DEBUGLOG=off: Enable debug log (--with-debug) DSO=on: Enable dynamic modules support FILE_AIO=on: Enable file aio IPV6=on: Enable IPv6 support NJS=off: Enable javascript (NJS) module NJS_QJS=off: Enable QuickJS engine in NJS module NJS_XML=off: Enable XML functionality in NJS module OTEL=off: Enable OpenTELemetry module THREADS=on: Enable threads support WWW=on: Enable html sample files ====> Modules that require HTTP module GOOGLE_PERFTOOLS=off: Enable google perftools module HTTP=on: Enable HTTP module HTTP_ADDITION=on: Enable http_addition module HTTP_AUTH_REQ=on: Enable http_auth_request module HTTP_CACHE=on: Enable http_cache module HTTP_DAV=on: Enable http_webdav module HTTP_DEGRADATION=off: Enable http_degradation module HTTP_FLV=on: Enable http_flv module HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module HTTP_GZIP_STATIC=on: Enable http_gzip_static module HTTP_IMAGE_FILTER=off: Enable http_image_filter module HTTP_MP4=on: Enable http_mp4 module HTTP_PERL=off: Enable http_perl module HTTP_RANDOM_INDEX=on: Enable http_random_index module HTTP_REALIP=on: Enable http_realip module HTTP_SECURE_LINK=on: Enable http_secure_link module HTTP_SLICE=on: Enable http_slice module HTTP_SSL=on: Enable http_ssl module HTTP_STATUS=on: Enable http_stub_status module HTTP_SUB=on: Enable http_sub module HTTP_XSLT=off: Enable http_xslt module HTTPV2=on: Enable HTTP/2 protocol support (SSL req.) HTTPV3=on: Enable HTTP/3 protocol support HTTPV3_BORING=off: Use security/boringssl HTTPV3_LSSL=off: Use security/libressl-devel HTTPV3_QTLS=off: Use security/openssl-quictls ====> Modules that require MAIL module MAIL=on: Enable IMAP4/POP3/SMTP proxy module MAIL_IMAP=off: Enable IMAP4 proxy module MAIL_POP3=off: Enable POP3 proxy module MAIL_SMTP=off: Enable SMTP proxy module MAIL_SSL=on: Enable mail_ssl module ====> Modules that require STREAM module STREAM=on: Enable stream module STREAM_REALIP=on: Enable stream_realip module STREAM_SSL=on: Enable stream_ssl module (SSL req.) STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.) ====> Third-party modules AJP=off: 3rd party ajp module AWS_AUTH=off: 3rd party aws auth module BROTLI=off: 3rd party brotli module CACHE_PURGE=off: 3rd party cache_purge module CT=off: 3rd party cert_transparency module (SSL req.) DEVEL_KIT=off: 3rd party Nginx Development Kit module ARRAYVAR=off: 3rd party array_var module DRIZZLE=off: 3rd party drizzle module DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module ECHO=off: 3rd party echo module ENCRYPTSESSION=off: 3rd party encrypted_session module FIPS_CHECK=off: 3rd party fips_check module FORMINPUT=off: 3rd party form_input module GRIDFS=off: 3rd party gridfs module HEADERS_MORE=off: 3rd party headers_more module HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module HTTP_AUTH_PAM=off: 3rd party http_auth_pam module HTTP_DAV_EXT=off: 3rd party webdav_ext module HTTP_EVAL=off: 3rd party eval module HTTP_FANCYINDEX=off: 3rd party http_fancyindex module HTTP_FOOTER=off: 3rd party http_footer module HTTP_GEOIP2=off: 3rd party geoip2 module HTTP_IP2LOCATION=off: 3rd party ip2location-nginx module HTTP_IP2PROXY=off: 3rd party ip2proxy-nginx module HTTP_JSON_STATUS=off: 3rd party http_json_status module HTTP_MOGILEFS=off: 3rd party mogilefs module HTTP_NOTICE=off: 3rd party notice module HTTP_PUSH=off: 3rd party push module HTTP_PUSH_STREAM=off: 3rd party push stream module HTTP_REDIS=off: 3rd party http_redis module HTTP_SLICE_AHEAD=off: 3rd party http_slice_ahead module HTTP_SUBS_FILTER=off: 3rd party subs filter module HTTP_TARANTOOL=off: 3rd party tarantool upstream module HTTP_UPLOAD=off: 3rd party upload module HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module HTTP_ZIP=off: 3rd party http_zip module ICONV=off: 3rd party iconv module LET=off: 3rd party let module LINK=off: 3rd party link function module LUA=off: 3rd party lua module LUASTREAM=off: 3rd party lua stream module MEMC=off: 3rd party memc (memcached) module MODSECURITY3=off: 3rd party modsecurity3 module NAXSI=off: 3rd party naxsi module PASSENGER=off: 3rd party passenger module POSTGRES=off: 3rd party postgres module RDS_CSV=off: 3rd party rds_csv module RDS_JSON=off: 3rd party rds_json module REDIS2=off: 3rd party redis2 module RTMP=off: 3rd party rtmp module SET_MISC=off: 3rd party set_misc module SFLOW=off: 3rd party sflow module SHIBBOLETH=off: 3rd party shibboleth module SLOWFS_CACHE=off: 3rd party slowfs_cache module SRCACHE=off: 3rd party srcache module STS=off: 3rd party sts module VOD=off: 3rd party vod module VTS=off: 3rd party vts module XSS=off: 3rd party xss module WEBSOCKIFY=off: 3rd party websockify module ZSTD=off: 3rd party zstd module ====> GSSAPI implementation (imply HTTP_AUTH_KRB5): you can only select none or one of them GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal GSSAPI_MIT=off: GSSAPI support via security/krb5 ===> Use 'make config' to modify these settings
Options name:
www_nginx-devel
USES:
cpe ssl ssl ssl
pkg-message:
For install:
Recent version of the NGINX introduces dynamic modules support. In FreeBSD ports tree this feature was enabled by default with the DSO knob. Several vendor's and third-party modules have been converted to dynamic modules. Unset the DSO knob builds an NGINX without dynamic modules support. To load a module at runtime, include the new `load_module' directive in the main context, specifying the path to the shared object file for the module, enclosed in quotation marks. When you reload the configuration or restart NGINX, the module is loaded in. It is possible to specify a path relative to the source directory, or a full path, please see https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ and http://nginx.org/en/docs/ngx_core_module.html#load_module for details. Default path for the NGINX dynamic modules is /usr/local/libexec/nginx.
Master Sites:
Expand this list (5 items)
Collapse this list.
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. https://nginx.org/download/
Collapse this list.

Number of commits found: 1177 (showing only 100 on this page)

[First Page]  «  2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  »  [Last Page]

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
1.9.0_1
14 May 2015 10:15:09
Revision:386312Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
1.9.0_1
05 May 2015 16:16:32
Revision:385478Original commit files touched by this commit This port version is marked as vulnerable.
bdrewery search for other commits by this committer
Fix selection of HTTP_XSLT and MODSECURITY so that the proper LIB_DEPENDS on
libxslt is added.
1.9.0
30 Apr 2015 23:15:09
Revision:385074Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix typo.

Reported by:	pluknet
1.9.0
30 Apr 2015 00:33:01
Revision:385018Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Remove useless code.
1.9.0
29 Apr 2015 01:03:03
Revision:384952Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 5.0.6 to 5.0.7:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
1.9.0
29 Apr 2015 00:42:07
Revision:384950Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for stream and stream_ssl modules.
1.9.0
29 Apr 2015 00:29:20
Revision:384948Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.8.0 to 1.9.0.

<ChangeLog>

*) Change: obsolete aio and rtsig event methods have been removed.

*) Feature: the "zone" directive inside the "upstream" block.

*) Feature: the stream module.

*) Feature: byte ranges support in the ngx_http_memcached_module.
   Thanks to Martin Mlynar.

*) Feature: shared memory can now be used on Windows versions with
   address space layout randomization.
   Thanks to Sergey Brester.

*) Feature: the "error_log" directive can now be used on mail and server
   levels in mail proxy.

*) Bugfix: the "proxy_protocol" parameter of the "listen" directive did
   not work if not specified in the first "listen" directive for a
   listen socket.

</ChangeLog>
1.8.0
27 Apr 2015 02:26:18
Revision:384808Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Remove needless patch, I've just forgotten to remove it in previous commit.
1.8.0
27 Apr 2015 02:16:04
Revision:384807Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Remove support for next unsupported third-party modules:

o) http_upload;
o) postgres;
o) supervisord;
o) tcp_proxy;

Add back third-party http_upstream_sticky module's checksums.
1.8.0
22 Apr 2015 11:47:23
Revision:384487Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Remove third-party syslog support, it's available out of box now,
see http://nginx.org/en/docs/syslog.html for details.
1.8.0
21 Apr 2015 23:26:57
Revision:384469Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade to latest stable version 1.8.0.

According to vendor's recommendations safely remove NGX_THREADS macro
with some long unused code from some third-party modules.

Merge changes from www/nginx-devel to www/nginx.
Merge third-pary upstream_sticky module from www/nginx to www/nginx-devel.

Remove outdated syslog support.
1.7.12
21 Apr 2015 18:03:22
Revision:384435Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party set_misc module from 0.24 to 0.28.
1.7.12
21 Apr 2015 00:26:54
Revision:384394Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party modules:

o) echo from 0.51 to 0.57;
o) memc from 0.14 to 0.15;
o) srcache from 0.25 to 0.29.
1.7.12
21 Apr 2015 00:08:55
Revision:384393Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party redis2 module from 0.10 to 0.11.
1.7.12
20 Apr 2015 23:58:03
Revision:384392Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-pary redis2 module from 0.9.4 to 0.9.15.
1.7.12
17 Apr 2015 21:55:56
Revision:384190Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party headers-more module from 0.25 to 0.26.

Patch from:	Denis Denisov <denji0k@gmail.com> (via mail)
1.7.12
08 Apr 2015 22:52:29
Revision:383614Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Remove THREADS option support.

Enable following third-party modules back:
o) arrayvar
o) echo
o) headers_more
o) http_mogilefs
o) drizzle
o) encryptsession
o) forminput
o) iconv
o) let
o) lua
o) memc
o) modsecurity
o) rds_csv
o) rds_json
o) redis2
o) set_misc
o) sflow
o) srcache
o) xrid_header
o) xss

Don't bump PORTREVISION cause all these third-party modules and THREADS option
are disabled by default.
1.7.12
08 Apr 2015 00:43:43
Revision:383552Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.7.11 to 1.7.12.

Temporary disable following third-party modules:
o) arrayvar
o) echo
o) headers_more
o) http_mogilefs
o) drizzle
o) encryptsession
o) forminput
o) iconv
o) let
o) lua
o) memc
o) modsecurity
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.11
07 Apr 2015 23:32:17
Revision:383547Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix a couple portlint warnings.

PR:		199163
1.7.11
05 Apr 2015 16:11:10
Revision:383303Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.7.10 to 1.7.11.
Temporary disable third-party upload module.

<ChangeLog>

*) Change: the "sendfile" parameter of the "aio" directive is
   deprecated; now nginx automatically uses AIO to pre-load data for
   sendfile if both "aio" and "sendfile" directives are used.

*) Feature: experimental thread pools support.

*) Feature: the "proxy_request_buffering", "fastcgi_request_buffering",
   "scgi_request_buffering", and "uwsgi_request_buffering" directives.

*) Feature: request body filters experimental API.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.10
05 Apr 2015 16:02:05
Revision:383302Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 1.1.6 to 1.1.7.
1.7.10
04 Apr 2015 23:38:24
Revision:383248Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.4 to 5.0.6:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

The passenger now uses its own libev fork, so remove devel/libev dependency.

<ChangeLog>

Release 5.0.6
-------------

* The turbocache no longer caches responses for which the Cache-Control header
  contains "no-cache". Please note that "no-cache" does not mean "do not cache
  this response". Instead, it means "any caching servers may only serve the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.10
24 Mar 2015 18:19:24
Revision:382150Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
4 ports categories: Remove $PTHREAD_LIBS

Categories: www, ftp, net-im, net-mgmt

approved by:	PTHREAD blanket
1.7.10
23 Mar 2015 04:07:09
Revision:381979Original commit files touched by this commit This port version is marked as vulnerable.
bdrewery search for other commits by this committer
Properly set MAKE_ENV and MAKE_CMD.

With hat:	portmgr
1.7.10
13 Mar 2015 00:41:06
Revision:381156Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 5.0.2 to 5.0.4:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 5.0.3
-------------

 * [Standalone] When using the builtin engine, `passenger start` may crash
during
   startup due to an initialization race condition. This has been fixed.
 * [Enterprise] Fixes a bug in passenger-irb. Running passenger-irb without a
PID
   parameter worked, but running it with a PID parameter didn't.
 * Fixes an integer overflow that resulted in a file descriptor leak and stalled
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.10
13 Mar 2015 00:06:30
Revision:381154Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.59 to 5.0.2:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 5.0.2
-------------

 * Fixes a connection freeze that could occur when processing large responses.
This would
   manifest itself under the error message "This website is under heavy load" or
"Request
   queue is full, returning an error". Closes GH-1404.
 * Debian and Ubuntu packages have been reintroduces.
 * When `passenger-config restart-app` is run interactively, if Passenger is not
serving
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.10
13 Feb 2015 12:49:33
Revision:378927Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modsecurity module from 2.8.0 to 2.9.0.

<ChangeLog>

12 Feb 2015 - 2.9.0
-------------------

 * Fix apr_crypto.h include, now checking if apr_crypto.h is available by
   checking the definition WITH_APU_CRYPTO.
   [martinjina and ModSecurity team]

15 Dez 2014 - 2.9.0-RC2
-----------------------

 * OpenSSL dependency was removed on MS Windows builds. ModSecurity is now using
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.10
11 Feb 2015 03:23:11
Revision:378812Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.58 to 4.0.59:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.59
--------------

* [Enterprise] Fixed support for free-style Node.js apps.

</ChangeLog>
1.7.10
11 Feb 2015 03:07:09
Revision:378811Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.7.9 to 1.7.10.

<ChangeLog>

Changes with nginx 1.7.10                                    10 Feb 2015

*) Feature: the "use_temp_path" parameter of the "proxy_cache_path",
   "fastcgi_cache_path", "scgi_cache_path", and "uwsgi_cache_path"
   directives.

*) Feature: the $upstream_header_time variable.

*) Workaround: now on disk overflow nginx tries to write error logs once
   a second only.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.9
23 Jan 2015 23:28:01
Revision:377773Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.57 to 4.0.58:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.58
--------------

* [Enterprise] Fixed a bug in the Debian packages which caused Flying Passenger
to break when used with non-system Rubies.
* The Debian packages no longer require Ruby 1.9. Closes GH-1353.

</ChangeLog>
1.7.9
04 Jan 2015 16:54:50
Revision:376243Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party dav_ext module from 0.0.2 to 0.0.3.
1.7.9
04 Jan 2015 16:38:28
Revision:376242Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party drizzle module from 0.1.7 to 0.1.8.
Rename extra patch for the module.
1.7.9
04 Jan 2015 16:03:30
Revision:376241Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party rtmp module from 1.1.5 to 1.1.6.
Remove necessary patch for the module.
1.7.9
04 Jan 2015 03:27:15
Revision:376178Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_fancyindex module from 0.3.1 to 0.3.4.

Submitted by:	Miguel Clara <miguelmclara@gmail.com>

<ChangeLog>

v0.3.4
======
- Viewport is now defined in the generated HTML, which works better
  for mobile devices.
- Even-odd row styling moved to the CSS using :nth-child(). This
  makes the HTML served to clients smaller.

v0.3.3
======
- New feature: table headers in the default template are now clickable
  to set the sorting criteria and direction of the index entries.
  (https://github.com/aperezdc/ngx-fancyindex/issues/7)

v0.3.2
======
- Solved a bug that would leave certain clients stalled forever.
- Improved handling of subrequests for non-builtin headers/footers.

</ChangeLog>
1.7.9
03 Jan 2015 17:13:55
Revision:376137Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.7.8 to 1.7.9.

<ChangeLog>

Changes with nginx 1.7.9                                         23 Dec 2014

*) Feature: variables support in the "proxy_cache", "fastcgi_cache",
   "scgi_cache", and "uwsgi_cache" directives.

*) Feature: variables support in the "expires" directive.

*) Feature: loading of secret keys from hardware tokens with OpenSSL
   engines.
   Thanks to Dmitrii Pichulin.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.8
03 Jan 2015 17:08:25
Revision:376130Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_cache_purge module from 2.1 to 2.3 (as preparation to
upgrade the www/nginx-devel to 1.7.9).

<ChangeLog>

2014-12-23    VERSION 2.3
    * Fix compatibility with nginx-1.7.9+.

2014-12-02    VERSION 2.2
    * Fix compatibility with nginx-1.7.8+.

2014-05-19
    * Fix build on Solaris with SunCC (Solaris Studio).
      Reported by Jussi Sallinen.

</ChangeLog>
1.7.8
03 Jan 2015 16:58:40
Revision:376127Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 4.0.53 to 4.0.57 (as preparation to upgrade the www/nginx-devel to
1.7.9):

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.57
--------------

 * Fixed a native extension compatibility problem with Ruby 2.2.
   Closes [ruby-core:67152](https://bugs.ruby-lang.org/issues/10656).
 * Fixed compatibility with Nginx 1.7.9. Closes GH-1335.

Release 4.0.56
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.8
12 Dec 2014 22:51:48
Revision:374609Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing dependency.
Don't bump PORTREVISION cause the third-party modsecurity module disabled by
default.

Patch from:	Ilya Komandyshko <ikomander@gmail.com>
1.7.8
10 Dec 2014 23:12:10
Revision:374495Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.7.7 to 1.7.8.

<ChangeLog>

*) Change: now the "If-Modified-Since", "If-Range", etc. client request
   header lines are passed to a backend while caching if nginx knows in
   advance that the response will not be cached (e.g., when using
   proxy_cache_min_uses).

*) Change: now after proxy_cache_lock_timeout nginx sends a request to a
   backend with caching disabled; the new directives
   "proxy_cache_lock_age", "fastcgi_cache_lock_age",
   "scgi_cache_lock_age", and "uwsgi_cache_lock_age" specify a time
   after which the lock will be released and another attempt to cache a
   response will be made.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.7_1
04 Dec 2014 21:26:03
Revision:373984Original commit files touched by this commit This port version is marked as vulnerable.
feld search for other commits by this committer
Update LICENSE to make the warnings go away
1.7.7_1
26 Nov 2014 13:08:38
Revision:373448Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Change the way Perl modules are installed, update the default Perl to 5.18.

Before, we had:

  site_perl :           lib/perl5/site_perl/5.18
  site_perl/perl_arch : lib/perl5/site_perl/5.18/mach
  perl_man3 :           lib/perl5/5.18/man/man3

Now we have:

  site_perl : lib/perl5/site_perl
  site_arch : lib/perl5/site_perl/mach/5.18
  perl_man3 : lib/perl5/site_perl/man/man3

Modules without any .so will be installed at the same place regardless of the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.7
29 Oct 2014 11:37:18
Revision:371674Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade from 1.7.6 to 1.7.7.

<ChangeLog>

*) Change: now nginx takes into account the "Vary" header line in a
   backend response while caching.

*) Feature: the "proxy_force_ranges", "fastcgi_force_ranges",
   "scgi_force_ranges", and "uwsgi_force_ranges" directives.

*) Feature: the "proxy_limit_rate", "fastcgi_limit_rate",
   "scgi_limit_rate", and "uwsgi_limit_rate" directives.

*) Feature: the "Vary" parameter of the "proxy_ignore_headers",
   "fastcgi_ignore_headers", "scgi_ignore_headers", and
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.6
04 Oct 2014 14:16:17
Revision:369965Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.52 to 4.0.53:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Upgraded the preferred Nginx version to 1.6.2.
* Improved RVM gemset autodetection.
* Fixed some Ruby 2.2 compatibility issues.

</ChangeLog>
1.7.6
01 Oct 2014 01:18:56
Revision:369682Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.50 to 4.0.52:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Fixed a null termination bug when autodetecting application types.
* Node.js apps can now also trigger the inverse port binding mechanism by
passing `'/passenger'`
  as argument.  This was introduced in order to be able to support the Hapi.js
framework.
  Please read
 
http://stackoverflow.com/questions/20645231/phusion-passenger-error-http-server-listen-was-called-more-than-once/20645549
  for more information regarding Hapi.js support.
* It is now possible to abort Node.js WebSocket connections upon application
restart.
  Please refer to
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.6
01 Oct 2014 00:00:22
Revision:369681Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update patch for third party upload module.

PR:     193891
1.7.6
30 Sep 2014 17:08:23
Revision:369648Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.7.5 to 1.7.6.

<ChangeLog>

*) Change: the deprecated "limit_zone" directive is not supported
   anymore.

*) Feature: the "limit_conn_zone" and "limit_req_zone" directives now
   can be used with combinations of multiple variables.

*) Bugfix: request body might be transmitted incorrectly when retrying a
   FastCGI request to the next upstream server.

*) Bugfix: in logging to syslog.

</ChangeLog>
1.7.5
26 Sep 2014 00:02:08
Revision:369298Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update CPE_VENDOR.
1.7.5
19 Sep 2014 01:27:24
Revision:368537Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 1.1.4 to 1.1.5.
Fix compilation issue (1).
Do not bump PORTREVISION.

Obtained
from:	https://github.com/arut/nginx-rtmp-module/commit/dd5f2aa117c617e1f0fde26f8fd58903be2d85e8.patch	(1)
1.7.5
19 Sep 2014 00:56:18
Revision:368536Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.7.4 to 1.7.5.
Temporary disable two third-party modules: supervisord and rtmp.

<ChangeLog>

*) Security: it was possible to reuse SSL sessions in unrelated contexts
   if a shared SSL session cache or the same TLS session ticket key was
   used for multiple "server" blocks (CVE-2014-3616).
   Thanks to Antoine Delignat-Lavaud.

*) Change: now the "stub_status" directive does not require a parameter.

*) Feature: the "always" parameter of the "add_header" directive.

*) Feature: the "proxy_next_upstream_tries",
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.4_1
17 Sep 2014 14:55:34
Revision:368382Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
OPTIONS_SINGLE must have one value selected at all time, let's guess that MP4
is optional and switch to OPTIONS_RADIO.

Sponsored by:	Absolight
1.7.4_1
29 Aug 2014 11:09:43
Revision:366502Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.49 to 4.0.50:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Fixed a potential heap corruption bug.
* Added Union Station support for Rails 4.1.

</ChangeLog>
1.7.4_1
25 Aug 2014 12:19:44
Revision:366069Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Convert to USES=pgsql
1.7.4_1
22 Aug 2014 22:06:37
Revision:365702Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.48 to 4.0.49:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

 * Upgraded the preferred Nginx version to 1.6.1.
 * Fixed a crash that may be triggered by the `passenger_max_requests` feature.
 * Introduced the `spawn_failed` hook, which is called when an application
   process fails to spawn. You could use this hook to setup an error
   notification system. Closes GH-1252.
 * Fonts, RSS and XML are now gzip-compressed by default in Phusion Passenger
   Standalone. Thanks to Jacob Elder. Closes GH-1254.
 * Fixed some user and group information lookup issues. Closes GH-1253.
 * Fixed some request handling crashes. Closes GH-1250.
 * Fixed some compilation problems on Gentoo. Closes GH-1261.
 * Fixed some compilation problems on Solaris. Closes GH-1260.

</ChangeLog>
1.7.4_1
11 Aug 2014 17:05:50
Revision:364628Original commit files touched by this commit This port version is marked as vulnerable.
adamw search for other commits by this committer
Bump PORTREVISION on all ports that depend on net/GeoIP for
r364627.

Approved by:	portmgr (not really, but touches unstaged ports)
1.7.4
10 Aug 2014 17:47:05
Revision:364551Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modsecurity module from 2.7.5 to latest version 2.8.0.
1.7.4
10 Aug 2014 15:21:35
Revision:364549Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.45 to 4.0.48:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

Add CPE information.

<ChangeLog>

Release 4.0.48
--------------

 * Fixed a race condition while determining what user an application should
   be executed as. This bug could lead to applications being run as the wrong
   user. Closes GH-1241.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.4
10 Aug 2014 03:27:49
Revision:364497Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add CPE information.
1.7.4
09 Aug 2014 18:29:45
Revision:364458Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.7.3 to 1.7.4.

<ChangeLog>

*) Security: pipelined commands were not discarded after STARTTLS
   command in SMTP proxy (CVE-2014-3556); the bug had appeared in 1.5.6.
   Thanks to Chris Boulton.

*) Change: URI escaping now uses uppercase hexadecimal digits.
   Thanks to Piotr Sikora.

*) Feature: now nginx can be build with BoringSSL and LibreSSL.
   Thanks to Piotr Sikora.

*) Bugfix: requests might hang if resolver was used and a DNS server
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.3_1
24 Jul 2014 18:34:16
Revision:362835Original commit files touched by this commit This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.3
13 Jul 2014 23:13:32
Revision:361724Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.7.2 to 1.7.3.

<ChangeLog>

*) Feature: weak entity tags are now preserved on response
   modifications, and strong ones are changed to weak.

*) Feature: cache revalidation now uses If-None-Match header if
   possible.

*) Feature: the "ssl_password_file" directive.

*) Bugfix: the If-None-Match request header line was ignored if there
   was no Last-Modified header in a response returned from cache.

*) Bugfix: "peer closed connection in SSL handshake" messages were
   logged at "info" level instead of "error" while connecting to
   backends.

*) Bugfix: in the ngx_http_dav_module module in nginx/Windows.

*) Bugfix: SPDY connections might be closed prematurely if caching was
   used.

</ChangeLog>
1.7.2_2
23 Jun 2014 13:44:39
Revision:358946Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Switch devel/google-perftools to USES=libtool, drop .la files
- Bump dependent ports as .so version has changed

Approved by:	portmgr blanket
1.7.2_1
20 Jun 2014 09:50:30
Revision:358542Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.44 to 4.0.45:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
1.7.2_1
19 Jun 2014 23:42:05
Revision:358475Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.7.1 to 1.7.2.
Remove nginx_upstream_hash third-party module support, please use
http_upstream_hash_module instead.

<ChangeLog>

*) Feature: the "hash" directive inside the "upstream" block.

*) Feature: defragmentation of free shared memory blocks.
   Thanks to Wandenberg Peixoto and Yichun Zhang.

*) Bugfix: a segmentation fault might occur in a worker process if the
   default value of the "access_log" directive was used; the bug had
   appeared in 1.7.0.
   Thanks to Piotr Sikora.

*) Bugfix: trailing slash was mistakenly removed from the last parameter
   of the "try_files" directive.

*) Bugfix: nginx could not be built on OS X in some cases.

*) Bugfix: in the ngx_http_spdy_module.

</ChangeLog>
1.7.1_1
12 Jun 2014 09:17:33
Revision:357574Original commit files touched by this commit This port version is marked as vulnerable.
tijl search for other commits by this committer
Bump PORTREVISION on everything that depends on devel/apr1 due to the
library version change.

Approved by:	portmgr (implicit)
1.7.1
10 Jun 2014 12:14:14
Revision:357300Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Remove all the bootstrap files (.bs) from the plists.

Starting with perl 5.20, they're not installed any more if empty,
and on FreeBSD, they're (always ?) empty.

PR:		190681
Submitted by:	mat
Exp-Run by:	antoine
Sponsored by:	Absolight
1.7.1
02 Jun 2014 10:57:38
Revision:356210Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Multiple third-party modules as well as repos have been moved from agentzh and
chaoslawful
to openresty and renamed accordingly.

Do not dump PORTREVISION.

PR:	190074
1.7.1
02 Jun 2014 09:49:58
Revision:356208Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party rtmp module from 1.1.2 to 1.1.4.
Remove whitespaces.
1.7.1
02 Jun 2014 02:14:54
Revision:356191Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.41 to 4.0.44:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.44
--------------

 * The issue tracker has now been moved from Google Code to Github.
   Before version 4.0.44 (May 29 2014, commit 3dd0964c9f4), all
   issue numbers referred to Google Code. From now on, all issue
   numbers will refer to Github Issues.
 * Fixed compilation problems on OS X Lion and OS X Mountain Lion.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.1
01 Jun 2014 20:12:42
Revision:356170Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.7.0 to 1.7.1.

<ChangeLog>

*) Feature: the "$upstream_cookie_..." variables.

*) Feature: the $ssl_client_fingerprint variable.

*) Feature: the "error_log" and "access_log" directives now support
   logging to syslog.

*) Feature: the mail proxy now logs client port on connect.

*) Bugfix: memory leak if the "ssl_stapling" directive was used.
   Thanks to Filipe da Silva.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.7.0
04 May 2014 15:54:50
Revision:352964Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.13 to 1.7.0.
Temporary disable passenger support, patching require.

<ChangeLog>

*) Feature: backend SSL certificate verification.

*) Feature: support for SNI while working with SSL backends.

*) Feature: the $ssl_server_name variable.

*) Feature: the "if" parameter of the "access_log" directive.

</ChangeLog>
1.5.13_1
16 Apr 2014 18:28:50
Revision:351411Original commit files touched by this commit This port version is marked as vulnerable.
zeising search for other commits by this committer
The FreeBSD x11@ and graphics team proudly presents
a zeising, kwm production, with help from dumbbell, bdrewery:

NEW XORG ON FREEBSD 9-STABLE AND 10-STABLE

This update switches over to use the new xorg stack by default on FreeBSD 9
and 10 stable, on osversions where vt(9) is available.
It is still possible to use the old stack by specifying WITHOUT_NEW_XORG in
/etc/make.conf .
FreeBSD 8-STABLE and released versions of FreeBSD still use
the old version.
A package repository with binary packages for new xorg will
be available soon.

This patch also contains updates of libxcb and related ports, pixman, as well
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.13
09 Apr 2014 02:36:09
Revision:350664Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.35 to 4.0.41:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

STAGEfy www/rubygem-passenger.
1.5.13
09 Apr 2014 01:19:51
Revision:350656Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.12 to 1.5.13.

<ChangeLog>

*) Change: improved hash table handling; the default values of the
   "variables_hash_max_size" and "types_hash_bucket_size" were changed
   to 1024 and 64 respectively.

*) Feature: the ngx_http_mp4_module now supports the "end" argument.

*) Feature: byte ranges support in the ngx_http_mp4_module and while
   saving responses to cache.

*) Bugfix: alerts "ngx_slab_alloc() failed: no memory" no longer logged
   when using shared memory in the "ssl_session_cache" directive and in
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.12
24 Mar 2014 17:46:54
Revision:349035Original commit files touched by this commit This port version is marked as vulnerable.
az search for other commits by this committer
- fix typo (wrong distfile name in SIZE section)
1.5.12
23 Mar 2014 02:35:12
Revision:348827Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.5.11 to 1.5.12.

<ChangeLog>

*) Security: a heap memory buffer overflow might occur in a worker
   process while handling a specially crafted request by
   ngx_http_spdy_module, potentially resulting in arbitrary code
   execution (CVE-2014-0133).
   Thanks to Lucas Molas, researcher at Programa STIC, Fundacion Dr.
   Manuel Sadosky, Buenos Aires, Argentina.

*) Feature: the "proxy_protocol" parameters of the "listen" and
   "real_ip_header" directives, the $proxy_protocol_addr variable.

*) Bugfix: in the "fastcgi_next_upstream" directive.
   Thanks to Lucas Molas.

</ChangeLog>
1.5.11
06 Mar 2014 00:07:55
Revision:347157Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.10 to 1.5.11.

<ChangeLog>

*) Security: memory corruption might occur in a worker process on 32-bit
   platforms while handling a specially crafted request by
   ngx_http_spdy_module, potentially resulting in arbitrary code
   execution (CVE-2014-0088); the bug had appeared in 1.5.10.
   Thanks to Lucas Molas, researcher at Programa STIC, Fundacion Dr.
   Manuel Sadosky, Buenos Aires, Argentina.

*) Feature: the $ssl_session_reused variable.

*) Bugfix: the "client_max_body_size" directive might not work when
   reading a request body using chunked transfer encoding; the bug had
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.10
05 Feb 2014 12:56:08
Revision:342692Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.8 to 1.5.10.
Disable third-party ctpp2 module.

<ChangeLog>

Changes with nginx 1.5.10                                        04 Feb 2014

*) Feature: the ngx_http_spdy_module now uses SPDY 3.1 protocol.
   Thanks to Automattic and MaxCDN for sponsoring this work.

*) Feature: the ngx_http_mp4_module now skips tracks too short for a
   seek requested.

*) Bugfix: a segmentation fault might occur in a worker process if the
   $ssl_session_id variable was used in logs; the bug had appeared in
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.8_1
30 Jan 2014 10:01:52
Revision:341828Original commit files touched by this commit This port version is marked as vulnerable.
decke search for other commits by this committer
- By popular request enable HTTP_SSL option per default

With hat:	portmgr
Discussed with:	osa@ (maintainer)
1.5.8
21 Jan 2014 23:40:23
Revision:340674Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Fix properties on pkg-plist
1.5.8
17 Jan 2014 01:27:34
Revision:340006Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.33 to 4.0.35:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.
1.5.8
16 Jan 2014 01:49:34
Revision:339882Original commit files touched by this commit This port version is marked as vulnerable.
vanilla search for other commits by this committer
Upgrade 3rd party modules to latest version.

echo          0.50 => 0.51
headers_more  0.24 => 0.25
drizzle       0.1.6 => 0.1.7
rtmp          1.0.8 => 1.1.2
set_misc      0.23 => 0.24
srcache       0.24 => 0.25

Approved by:	osa@
1.5.8
14 Jan 2014 10:52:23
Revision:339677Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.5.7 to 1.5.8.

<ChangeLog>

*) Feature: IPv6 support in resolver.

*) Feature: the "listen" directive supports the "fastopen" parameter.
   Thanks to Mathew Rodley.

*) Feature: SSL support in the ngx_http_uwsgi_module.
   Thanks to Roberto De Ioris.

*) Feature: vim syntax highlighting scripts were added to contrib.
   Thanks to Evan Miller.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.7
14 Jan 2014 10:45:24
Revision:339676Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party lua module from 0.9.3 to 0.9.4.
1.5.7
04 Jan 2014 05:01:54
Revision:338622Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.30 to 4.0.33:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.33
--------------

* Fixed a compatibility problem in passenger-install-apache2-module with Ruby
1.8.
  The language selection menu didn't work properly.

Release 4.0.32
--------------
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.7
03 Jan 2014 01:13:00
Revision:338513Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Part 2 at removing now useless FETCH_ARGS redifition
1.5.7
31 Dec 2013 15:24:37
Revision:338325Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.29 to 4.0.30:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Fixed wrong autogeneration of HTTP Date header. If the web app does
  not supply a Date header, then Passenger will add one. Unfortunately
  due to the use of the wrong format string, December 30 2013 is
  formatted as December 30 2014. As a result, cookies that expire before
  2014 would expire on December 30 2013 and December 31 2013. Details can
  be found at [Github pull request
93](https://github.com/phusion/passenger/pull/93).

  This issue only affects Phusion Passenger for Nginx and Phusion Passenger
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.7
22 Dec 2013 08:58:22
Revision:337176Original commit files touched by this commit This port version is marked as vulnerable.
vanilla search for other commits by this committer
1: Upgrade 3rd party modules to latest version.

echo          0.49 => 0.50
headers_more  0.22 => 0.24
drizzle       0.1.5 => 0.1.6
ndk           0.2.18 => 0.2.19
memc          0.13rc3 => 0.14
rds_csv       0.5rc2 => 0.5
rds_json      0.12rc10 => 0.13
rtmp          1.0.6 => 1.0.8
set_misc      0.22rc8 => 0.23
sflow         0.9.6 => 0.9.7
srcache       0.22 => 0.24
xss           0.3rc9 => 0.4
arrayvar      0.03rc1 => 0.03

2: add http_footer module.

Approved by:	osa@ (maintainer)
1.5.7
19 Dec 2013 17:46:59
Revision:336940Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party lua module from 0.9.2 to 0.9.3.
1.5.7
19 Dec 2013 17:31:04
Revision:336939Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Be more correct with openssl on modern FreeBSD10.

Do not bump PORTREVISION cause SPDY module disable by default.
1.5.7
14 Dec 2013 15:59:55
Revision:336456Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.27 to 4.0.29:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

Release 4.0.29
--------------

* Fixed a compilation problem on OS X Mavericks.

Release 4.0.28
--------------
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.7
06 Dec 2013 02:28:13
Revision:335722Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.26 to 4.0.27:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* [Apache] Fixed a bug in the Apache module which could lock up the Apache
  process or thread. This is a regression introduced in version 4.0.24.
* Node.js application processes now have friendly process titles.

</ChangeLog>
1.5.7
04 Dec 2013 05:06:16
Revision:335603Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make third-party accept_language module fetchable by update to latest version.

PR:	ports/184153
1.5.7
03 Dec 2013 02:37:52
Revision:335545Original commit files touched by this commit This port version is marked as vulnerable.
vanilla search for other commits by this committer
Upgrade lua module to 0.9.2, echo module to 0.49.

Approved by:	maintainer (osa@)
1.5.7
01 Dec 2013 16:11:27
Revision:335402Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Upgrade third-party ngx_http_redis module from 0.3.6 to 0.3.7.

<ChangeLog>

*) Bugfix: ngx_http_redis_module might issue the error message
   "redis sent invalid trailer" for nginx >= 1.5.3.
   Thanks to Maxim Dounin.

</ChangeLog>
1.5.7
30 Nov 2013 10:29:01
Revision:335279Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.25 to 4.0.26:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

<ChangeLog>

* Introduced the `PassengerBufferUpload` option for Apache. This option allows
one
  to disable upload buffering, e.g. in order to be able to track upload
progress.
* [Nginx] The `HTTPS` variable is now set correctly for HTTPS connections, even
  without setting `ssl on`. Fixes issue #401.
* [Standalone] It is now possible to listen on both a normal HTTP and an HTTPS
port.
* [Enterprise] The `passenger-status` tool now displays rolling restart status.

</ChangeLog>
1.5.7
24 Nov 2013 14:21:08
Revision:334729Original commit files touched by this commit This port version is marked as vulnerable.
vanilla search for other commits by this committer
Update rtmp module to 1.0.6.

Approved by:	osa@ (maintainer)
1.5.7
20 Nov 2013 18:13:08
Revision:334435Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.24 to 4.0.25:

o) www/rubygem-passenger;
o) third-party passenger modules for www/nginx and www/nginx-devel.
1.5.7
19 Nov 2013 18:30:54
Revision:334340Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 4.0.23 to 4.0.24:

o) www/rubygem-passenger;
o) third-party modules for www/nginx and www/nginx-devel.

Try to fix build www/rubygem-passenger with upcoming FreeBSD 10.
1.5.7
19 Nov 2013 18:00:23
Revision:334337Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 1.5.6 to 1.5.7.

<ChangeLog>

*) Security: a character following an unescaped space in a request line
   was handled incorrectly (CVE-2013-4547); the bug had appeared in
   0.8.41.
   Thanks to Ivan Fratric of the Google Security Team.

*) Change: a logging level of auth_basic errors about no user/password
   provided has been lowered from "error" to "info".

*) Feature: the "proxy_cache_revalidate", "fastcgi_cache_revalidate",
   "scgi_cache_revalidate", and "uwsgi_cache_revalidate" directives.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.5.6
04 Nov 2013 13:20:45
Revision:332711Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Stagefy.

Thanks to:	danfe

Number of commits found: 1177 (showing only 100 on this page)

[First Page]  «  2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  »  [Last Page]