notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

Port details
nginx-devel Robust and small WWW server
1.26.0_1 www on this many watch lists=26 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.25.4_6Version of this port present on the latest quarterly branch.
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2007-06-15 08:23:21
Last Update: 2024-04-30 22:27:10
Commit Hash: 86ecf20
People watching this port, also watch:: nginx, sudo, rsync, lsof, wget
License: BSD2CLAUSE
WWW:
https://nginx.com/
Description:
NGINX is a high performance edge web server with the lowest memory footprint and the key features to build modern and efficient web infrastructure. NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching, load balancing, compression, request throttling, connection multiplexing and reuse, SSL offload and HTTP media streaming. See also: https://nginx.org/
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (109 items)
Collapse this list.
  1. /usr/local/share/licenses/nginx-devel-1.26.0_1/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.26.0_1/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.26.0_1/BSD2CLAUSE
  4. etc/nginx/koi-utf
  5. etc/nginx/koi-win
  6. etc/nginx/win-utf
  7. @comment include/ngx_link_func_module.h
  8. @comment etc/nginx/naxsi_core.rules
  9. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  10. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  11. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  12. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  13. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  14. @comment libexec/nginx/ngx_http_ajp_module.so
  15. @comment libexec/nginx/ngx_http_array_var_module.so
  16. @comment libexec/nginx/ngx_http_aws_auth_module.so
  17. @comment libexec/nginx/ngx_http_brotli_filter_module.so
  18. @comment libexec/nginx/ngx_http_brotli_static_module.so
  19. @comment libexec/nginx/ngx_http_cache_purge_module.so
  20. @comment libexec/nginx/ngx_http_ssl_ct_module.so
  21. @comment libexec/nginx/ngx_ssl_ct_module.so
  22. @comment libexec/nginx/ndk_http_module.so
  23. @comment libexec/nginx/ngx_http_drizzle_module.so
  24. @comment libexec/nginx/ngx_http_dynamic_upstream_module.so
  25. @comment libexec/nginx/ngx_http_echo_module.so
  26. @comment libexec/nginx/ngx_http_encrypted_session_module.so
  27. @comment libexec/nginx/ngx_fips_check_module.so
  28. @comment libexec/nginx/ngx_http_form_input_module.so
  29. @comment libexec/nginx/ngx_http_gridfs_module.so
  30. @comment libexec/nginx/ngx_http_headers_more_filter_module.so
  31. @comment libexec/nginx/ngx_http_accept_language_module.so
  32. @comment libexec/nginx/ngx_http_auth_digest_module.so
  33. @comment libexec/nginx/ngx_http_auth_spnego_module.so
  34. @comment libexec/nginx/ngx_http_auth_ldap_module.so
  35. @comment libexec/nginx/ngx_http_auth_pam_module.so
  36. @comment libexec/nginx/ngx_http_dav_ext_module.so
  37. @comment libexec/nginx/ngx_http_eval_module.so
  38. @comment libexec/nginx/ngx_http_fancyindex_module.so
  39. @comment libexec/nginx/ngx_http_footer_filter_module.so
  40. @comment libexec/nginx/ngx_http_image_filter_module.so
  41. @comment libexec/nginx/ngx_http_ip2location_module.so
  42. @comment libexec/nginx/ngx_http_ip2proxy_module.so
  43. @comment libexec/nginx/ngx_http_json_status_module.so
  44. @comment libexec/nginx/ngx_http_mogilefs_module.so
  45. @comment libexec/nginx/ngx_http_notice_module.so
  46. @comment libexec/nginx/ngx_http_perl_module.so
  47. @comment libexec/nginx/ngx_http_push_stream_module.so
  48. @comment libexec/nginx/ngx_nchan_module.so
  49. @comment libexec/nginx/ngx_http_redis_module.so
  50. @comment libexec/nginx/ngx_http_subs_filter_module.so
  51. @comment libexec/nginx/ngx_http_tnt_module.so
  52. @comment libexec/nginx/ngx_http_uploadprogress_module.so
  53. @comment libexec/nginx/ngx_http_upload_module.so
  54. @comment libexec/nginx/ngx_http_upstream_fair_module.so
  55. @comment libexec/nginx/ngx_http_sticky_module.so
  56. @comment libexec/nginx/ngx_http_video_thumbextractor_module.so
  57. @comment libexec/nginx/ngx_http_xslt_filter_module.so
  58. @comment libexec/nginx/ngx_http_zip_module.so
  59. @comment libexec/nginx/ngx_http_geoip2_module.so
  60. @comment libexec/nginx/ngx_http_js_module.so
  61. @comment libexec/nginx/ngx_http_iconv_module.so
  62. @comment libexec/nginx/ngx_http_let_module.so
  63. @comment libexec/nginx/ngx_http_link_func_module.so
  64. @comment libexec/nginx/ngx_http_lua_module.so
  65. @comment libexec/nginx/ngx_mail_ssl_ct_module.so
  66. libexec/nginx/ngx_mail_module.so
  67. @comment libexec/nginx/ngx_http_memc_module.so
  68. @comment libexec/nginx/ngx_http_modsecurity_module.so
  69. @comment libexec/nginx/ngx_http_naxsi_module.so
  70. @comment libexec/nginx/ngx_otel_module.so
  71. @comment libexec/nginx/ngx_http_passenger_module.so
  72. @comment libexec/nginx/ngx_postgres_module.so
  73. @comment libexec/nginx/ngx_http_rds_csv_filter_module.so
  74. @comment libexec/nginx/ngx_http_rds_json_filter_module.so
  75. @comment libexec/nginx/ngx_http_redis2_module.so
  76. @comment libexec/nginx/ngx_rtmp_module.so
  77. @comment libexec/nginx/ngx_http_set_misc_module.so
  78. @comment libexec/nginx/ngx_http_shibboleth_module.so
  79. @comment libexec/nginx/ngx_http_slowfs_module.so
  80. @comment libexec/nginx/ngx_http_srcache_filter_module.so
  81. @comment libexec/nginx/ngx_stream_ssl_ct_module.so
  82. @comment libexec/nginx/ngx_stream_geoip2_module.so
  83. @comment libexec/nginx/ngx_stream_js_module.so
  84. libexec/nginx/ngx_stream_module.so
  85. @comment libexec/nginx/ngx_http_stream_server_traffic_status_module.so
  86. @comment libexec/nginx/ngx_http_vod_module.so
  87. @comment libexec/nginx/ngx_http_vhost_traffic_status_module.so
  88. @comment libexec/nginx/ngx_http_websockify_module.so
  89. @comment libexec/nginx/ngx_http_xss_filter_module.so
  90. @comment %%SITE_ARCH%%/auto/nginx/nginx.so
  91. @comment %%SITE_ARCH%%/nginx.pm
  92. sbin/nginx
  93. share/vim/vimfiles/ftdetect/nginx.vim
  94. share/vim/vimfiles/ftplugin/nginx.vim
  95. share/vim/vimfiles/indent/nginx.vim
  96. share/vim/vimfiles/syntax/nginx.vim
  97. @postexec mkdir -p -m 755 %D/www/nginx-dist
  98. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  99. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  100. www/nginx-dist/index.html
  101. www/nginx-dist/50x.html
  102. @postexec chmod a-w %D/www/nginx-dist
  103. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  104. @dir /var/tmp/nginx
  105. @dir /var/log/nginx
  106. share/man/man8/nginx.8.gz
  107. @owner
  108. @group
  109. @mode
Collapse this list.
Dependency lines:
  • nginx-devel>0:www/nginx-devel
Conflicts:
CONFLICTS:
  • nginx-1.*
  • nginx-full-1.*
  • nginx-lite-1.*
  • nginx-naxsi-1.*
CONFLICTS_INSTALL:
  • nginx
Conflicts Matches:
There are no Conflicts Matches for this port. This is usually an error.
To install the port:
cd /usr/ports/www/nginx-devel/ && make install clean
To add the package, run one of these commands:
  • pkg install www/nginx-devel
  • pkg install nginx-devel
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: nginx-devel
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1714506394 SHA256 (nginx-1.26.0.tar.gz) = d2e6c8439d6c6db5015d8eaab2470ab52aef85a7bf363182879977e084370497 SIZE (nginx-1.26.0.tar.gz) = 1244118

Expand this list (136 items)

Collapse this list.

SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208 SHA256 (ngx_http_redis-0.3.9.tar.gz) = 21f87540f0a44b23ffa5df16fb3d788bc90803b255ef14f9c26e3847a6f26f46 SIZE (ngx_http_redis-0.3.9.tar.gz) = 13051 SHA256 (passenger-6.0.20.tar.gz) = fa8d9a37edb92f4a8f064b3005b57bccf10392ce4eb067838883206060e27107 SIZE (passenger-6.0.20.tar.gz) = 8476308 SHA256 (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 522e94c59f5783f281d868ede2adf325bf2f8ffb9e62cf8451d4b9ac0516916c SIZE (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 110807 SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80 SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280 SHA256 (anomalizer-ngx_aws_auth-21931b2_GH0.tar.gz) = d8a2422da96a638e9a911e4edb592954d9c0fe1576456fec9809ef4e2a0a863d SIZE (anomalizer-ngx_aws_auth-21931b2_GH0.tar.gz) = 15580 SHA256 (google-ngx_brotli-a71f931_GH0.tar.gz) = b3312a045d5303a40d02beb34711b8ca27f7b72d647e9ee2012a8eddd14d9b22 SIZE (google-ngx_brotli-a71f931_GH0.tar.gz) = 16376 SHA256 (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = ddfd4fdd99075d906b7b75c49f56ec96b76df7951dfa54502e0f83890447031f SIZE (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = 17162 SHA256 (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 72fdd125b9207cdda135f368095f85b943a78a4ff004d1cd217972e12b1571b2 SIZE (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 7224 SHA256 (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = faa2fcd5168b10764d35081356511d5f84db5c526a1aa4b6add2db94b6853b2b SIZE (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = 66561 SHA256 (openresty-drizzle-nginx-module-3504fc6_GH0.tar.gz) = 86076735597f14db28cffabc0ab1f233cd51aab7cf112c56e267783e7814fc65 SIZE (openresty-drizzle-nginx-module-3504fc6_GH0.tar.gz) = 51596 SHA256 (ZigzagAK-ngx_dynamic_upstream-960eef2_GH0.tar.gz) = 86e7c6ed6dba2d4c5f5b87ecb91f25ccdb7a08b8a88236e632114f830b9e354b SIZE (ZigzagAK-ngx_dynamic_upstream-960eef2_GH0.tar.gz) = 23003 SHA256 (openresty-echo-nginx-module-5a402aa_GH0.tar.gz) = bb2a4b1a0e5ffa0203c1be854e663fc92cee0d7b5e0f7a38c0e163ae9124a38f SIZE (openresty-echo-nginx-module-5a402aa_GH0.tar.gz) = 53336 SHA256 (openresty-encrypted-session-nginx-module-v0.09_GH0.tar.gz) = fe9b95acf9726aefd71bf0aca6c11bee007f1da67e64be9b21a7131f0ed75ba6 SIZE (openresty-encrypted-session-nginx-module-v0.09_GH0.tar.gz) = 11847 SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106 SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090 SHA256 (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = d52fbb0f2819cd91b710ad85e6c8b452fdca6a5d81b0694d6637adba3fc2382c SIZE (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = 6494 SHA256 (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 9b059b5ae7b602d12d32d5ebe2700827ea625f22c0fb3b9956242e11de63845b SIZE (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 4674 SHA256 (openresty-headers-more-nginx-module-06dc0be_GH0.tar.gz) = 883b1e31d59f3eb1e76b34259711ad65a3443102973dcf22df329397f3d5eaa4 SIZE (openresty-headers-more-nginx-module-06dc0be_GH0.tar.gz) = 29438 SHA256 (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = a58feb576f2231498b8a3863d3c6fba45c7d48bc48735fa714e07a7bfbedb6e3 SIZE (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = 3425 SHA256 (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 0839c33c2f8d519f92daae274f62cf87eb68415d562c6500ee3e3721ce80557c SIZE (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 17815 SHA256 (stnoonan-spnego-http-auth-nginx-module-3575542_GH0.tar.gz) = 6d710f97bef58b2d5dc54445c0e48103786425f6d4ab18cf30a2168904d0ba62 SIZE (stnoonan-spnego-http-auth-nginx-module-3575542_GH0.tar.gz) = 24680 SHA256 (kvspb-nginx-auth-ldap-83c059b_GH0.tar.gz) = e76e9e117ad51af578a68fa7a30c256178796bb271fa77f01c93281a92b09921 SIZE (kvspb-nginx-auth-ldap-83c059b_GH0.tar.gz) = 18547 SHA256 (sto-ngx_http_auth_pam_module-v1.5.3_GH0.tar.gz) = 882018fea8d6955ab3fe294aafa8ebb1fdff4eac313c29583fef02c6de76fae7 SIZE (sto-ngx_http_auth_pam_module-v1.5.3_GH0.tar.gz) = 7084 SHA256 (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = d2499d94d82d4e4eac8425d799e52883131ae86a956524040ff2fd230ef9f859 SIZE (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = 14558 SHA256 (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 014bedb2b334ba8e8e23b4c660590357f8055dbed7b9b017e4cc2937876a8822 SIZE (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 14849 SHA256 (aperezdc-ngx-fancyindex-v0.5.2_GH0.tar.gz) = c3dd84d8ba0b8daeace3041ef5987e3fb96e9c7c17df30c9ffe2fe3aa2a0ca31 SIZE (aperezdc-ngx-fancyindex-v0.5.2_GH0.tar.gz) = 29052 SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813 SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934 SHA256 (leev-ngx_http_geoip2_module-3.4_GH0.tar.gz) = ad72fc23348d715a330994984531fab9b3606e160483236737f9a4a6957d9452 SIZE (leev-ngx_http_geoip2_module-3.4_GH0.tar.gz) = 8877 SHA256 (ip2location-ip2location-nginx-2df35fb_GH0.tar.gz) = 86d6d6d6b4437ecc621c5aac7bd5475dffd33afb70a51c5ea3c7f341ded46efb SIZE (ip2location-ip2location-nginx-2df35fb_GH0.tar.gz) = 5462 SHA256 (ip2location-ip2proxy-nginx-02ce447_GH0.tar.gz) = edbafe23087f019364f9d1c1c615fdbc5116ec727c49bf442e3e4b39441fc4cc SIZE (ip2location-ip2proxy-nginx-02ce447_GH0.tar.gz) = 5177 SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997 SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736 SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885 SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343 SHA256 (slact-nchan-v1.3.6_GH0.tar.gz) = ba0b7cc6b710a20ce1ed2554caf56154035291aaf115e407d7a6bb699fde42df SIZE (slact-nchan-v1.3.6_GH0.tar.gz) = 761436 SHA256 (wandenberg-nginx-push-stream-module-8c02220_GH0.tar.gz) = ab4fbe236e8bc500f0c5e13403d6a0e2e4e4ec17b81e0fcedaf669b4339626a6 SIZE (wandenberg-nginx-push-stream-module-8c02220_GH0.tar.gz) = 196720 SHA256 (yaoweibin-ngx_http_substitutions_filter_module-c6f825f_GH0.tar.gz) = 4ab034f2e056148469b440394e1664c46405712ef27bc4f3197e42bf7df8460e SIZE (yaoweibin-ngx_http_substitutions_filter_module-c6f825f_GH0.tar.gz) = 94062 SHA256 (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 514aa57155c73c2e3f7bdfe00c580183df343f2fa4b34e77f040cf6557caffae SIZE (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 75708 SHA256 (fdintino-nginx-upload-module-643b4c1_GH0.tar.gz) = a5bb48589b5c242683da33a9f1acc7847acc3ce4f2c4213ea524858aa789a6e9 SIZE (fdintino-nginx-upload-module-643b4c1_GH0.tar.gz) = 42571 SHA256 (masterzen-nginx-upload-progress-module-68b3ab3_GH0.tar.gz) = 35b506e57e19e780e01ecc7c3c31a64473c35e4a022f5a3f98092a60cd1c1602 SIZE (masterzen-nginx-upload-progress-module-68b3ab3_GH0.tar.gz) = 17322 SHA256 (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 4404c64e845e19feeb07a37976347987892a8e8680a961f793ff0d3ef96c07f4 SIZE (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 130039 SHA256 (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 93f71b7cf0db9c6dbf97e3ee11cf8efbc149946c0949d7abd19c74c7620eea50 SIZE (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 10433 SHA256 (dvershinin-nginx-sticky-module-ng-2753211_GH0.tar.gz) = e4a533dfa214ea28122301aeebbb1a38e1d1972edb7ee9bc72271c14f2693005 SIZE (dvershinin-nginx-sticky-module-ng-2753211_GH0.tar.gz) = 120676 SHA256 (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 9113f887a8740fe72614ee32f481177d33e9542c3b0625627da19a1c4f3da2cb SIZE (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 2710072 SHA256 (vince2678-mod_zip-5b2604b_GH0.tar.gz) = 4fe63be3b842882494152e586f0b87e73f51bfbfd801b78f033c71a011cba789 SIZE (vince2678-mod_zip-5b2604b_GH0.tar.gz) = 29559 SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462 SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133 SHA256 (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 7393809d5d8877812da1bd5b5fbd1d8b00bc85e71f2f387c344f007773e49050 SIZE (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 20617 SHA256 (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 20c3679199ba7efe1598f03b2fa0b13591226363c8dd7930d7f02702cd5abada SIZE (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 139656 SHA256 (openresty-lua-nginx-module-v0.10.26_GH0.tar.gz) = a75983287a2bdc5e964ace56a51b215dc2ec996639d4916cd393d6ebba94b565 SIZE (openresty-lua-nginx-module-v0.10.26_GH0.tar.gz) = 745785 SHA256 (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 8c2bdbe875e4f5225d0778bfb09a2668f9281d7de6218c7b462a7ba2cee06fe8 SIZE (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 34654 SHA256 (SpiderLabs-ModSecurity-nginx-v1.0.3_GH0.tar.gz) = 32a42256616cc674dca24c8654397390adff15b888b77eb74e0687f023c8751b SIZE (SpiderLabs-ModSecurity-nginx-v1.0.3_GH0.tar.gz) = 34063 SHA256 (wargio-naxsi-1.6_GH0.tar.gz) = e5920fdd09cae155b89eb21a94a21c029ebfdb056c284130221525be54044aae SIZE (wargio-naxsi-1.6_GH0.tar.gz) = 1116227 SHA256 (libinjection-libinjection-4aa3894_GH0.tar.gz) = ededea133e89e238ef2e60d0d62ef7ef9e741449eed8c5d856007132505bcd5b SIZE (libinjection-libinjection-4aa3894_GH0.tar.gz) = 2218294 SHA256 (nginx-njs-0.8.4_GH0.tar.gz) = fe197e254204c15e9f1df0acf375add57be3416901ec8d7b87319dccb490f90d SIZE (nginx-njs-0.8.4_GH0.tar.gz) = 743910 SHA256 (osokin-nginx-otel-8f0857d_GH0.tar.gz) = bbf93813928460bdaf78f752f74ecc6c34d13078e97fdffcaa29dbd8689314fc SIZE (osokin-nginx-otel-8f0857d_GH0.tar.gz) = 30197 SHA256 (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = c69ad4495de7c7883ebc23e1e6c4cc83a4ac6a7fddd4d5c12e49d33b65f7c50b SIZE (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = 48544 SHA256 (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 896be99c0cad50218417800a159e43ec088d6b58c099472ed3b3d7f179d6c0ea SIZE (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 20531 SHA256 (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = eaf18f60e981ea2442a7902689a26eba6cf6f36ebee712feeb1f4429eb654bdc SIZE (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = 34744 SHA256 (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = d255571bcfb9939b78099df39cb4d42f174d789aec8c8e5e47b93942b0299438 SIZE (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = 25471 SHA256 (arut-nginx-rtmp-module-v1.2.2_GH0.tar.gz) = 07f19b7bffec5e357bb8820c63e5281debd45f5a2e6d46b1636d9202c3e09d78 SIZE (arut-nginx-rtmp-module-v1.2.2_GH0.tar.gz) = 519934 SHA256 (openresty-set-misc-nginx-module-3937e7b_GH0.tar.gz) = cb3a4675ab6b8741e5847cf5bc41ee3f6ec5cbceec53188f9ae96e48feea17c5 SIZE (openresty-set-misc-nginx-module-3937e7b_GH0.tar.gz) = 29335 SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955 SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504 SHA256 (nginx-shib-nginx-http-shibboleth-be12df5_GH0.tar.gz) = aff9830b5de78dd9ce32cd2c55c5cf9173c99fe1a1d2190407c96668e7517bab SIZE (nginx-shib-nginx-http-shibboleth-be12df5_GH0.tar.gz) = 23872 SHA256 (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 6ae8abb01a2aff788e75ec68621cb0159148a6f73730a84b30b0bdbc6cdc1758 SIZE (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 11186 SHA256 (openresty-srcache-nginx-module-be22ac0_GH0.tar.gz) = 5753d1ffe87b5d6f5b7a0696667bb5ff1388738136fdee26ba55bc33f5796061 SIZE (openresty-srcache-nginx-module-be22ac0_GH0.tar.gz) = 51029 SHA256 (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 748b67ceb82b3b843ae915bf7863fd08b7c2427c045e5ec540242d050f7b30d0 SIZE (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 352431 SHA256 (kaltura-nginx-vod-module-1.31_GH0.tar.gz) = ace04201cf2d2b1a3e5e732a22b92225b8ce61a494df9cc7f79d97efface8952 SIZE (kaltura-nginx-vod-module-1.31_GH0.tar.gz) = 470904 SHA256 (vozlt-nginx-module-vts-bf64dbf_GH0.tar.gz) = d2782c75e39cb2ecf68453922b43ab2295adb6a35fa6a0f9c14173f70d22d7b1 SIZE (vozlt-nginx-module-vts-bf64dbf_GH0.tar.gz) = 180394 SHA256 (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = aca454bffcee2476dc92682ebfb8c0378a271fda178be7e945d648419d220758 SIZE (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = 14646 SHA256 (openresty-xss-nginx-module-v0.06_GH0.tar.gz) = 0b12bbc53a41f3e3d6df419c173b8c87434be3e6cd255a8193aa91345a2de6cf SIZE (openresty-xss-nginx-module-v0.06_GH0.tar.gz) = 12448

Collapse this list.


Packages (timestamps in pop-ups are UTC):
nginx-devel
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest1.26.01.26.0_11.19.6_41.26.01.26.0_1-1.19.6_4-
FreeBSD:13:quarterly1.25.4_61.25.4_61.25.1_11.25.4_61.25.4_61.25.3_91.25.3_91.25.4
FreeBSD:14:latest1.26.01.26.0_11.23.31.26.01.26.0_11.25.1-1.25.1
FreeBSD:14:quarterly1.25.4_61.25.4_6-1.25.4_61.25.4_61.25.3_91.25.3_91.25.4
FreeBSD:15:latest1.26.0_11.26.0_1n/a1.26.0n/a1.25.3_111.25.3_111.25.4_2
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Library dependencies:
  1. libpcre2-8.so : devel/pcre2
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for nginx-devel-1.26.0_1: DEBUG=off: Build with debugging support DEBUGLOG=off: Enable debug log (--with-debug) DSO=on: Enable dynamic modules support FILE_AIO=on: Enable file aio IPV6=on: Enable IPv6 support NJS=off: Enable javascript (NJS) module NJS_XML=off: Enable XML functionality in NJS module OTEL=off: Enable OpenTELemetry module THREADS=on: Enable threads support WWW=on: Enable html sample files ====> Modules that require HTTP module GOOGLE_PERFTOOLS=off: Enable google perftools module HTTP=on: Enable HTTP module HTTP_ADDITION=on: Enable http_addition module HTTP_AUTH_REQ=on: Enable http_auth_request module HTTP_CACHE=on: Enable http_cache module HTTP_DAV=on: Enable http_webdav module HTTP_DEGRADATION=off: Enable http_degradation module HTTP_FLV=on: Enable http_flv module HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module HTTP_GZIP_STATIC=on: Enable http_gzip_static module HTTP_IMAGE_FILTER=off: Enable http_image_filter module HTTP_MP4=on: Enable http_mp4 module HTTP_PERL=off: Enable http_perl module HTTP_RANDOM_INDEX=on: Enable http_random_index module HTTP_REALIP=on: Enable http_realip module HTTP_SECURE_LINK=on: Enable http_secure_link module HTTP_SLICE=on: Enable http_slice module HTTP_SSL=on: Enable http_ssl module HTTP_STATUS=on: Enable http_stub_status module HTTP_SUB=on: Enable http_sub module HTTP_XSLT=off: Enable http_xslt module HTTPV2=on: Enable HTTP/2 protocol support (SSL req.) HTTPV3=on: Enable HTTP/3 protocol support HTTPV3_BORING=off: Use security/boringssl HTTPV3_LSSL=off: Use security/libressl-devel HTTPV3_QTLS=off: Use security/openssl-quictls ====> Modules that require MAIL module MAIL=on: Enable IMAP4/POP3/SMTP proxy module MAIL_IMAP=off: Enable IMAP4 proxy module MAIL_POP3=off: Enable POP3 proxy module MAIL_SMTP=off: Enable SMTP proxy module MAIL_SSL=on: Enable mail_ssl module ====> Modules that require STREAM module STREAM=on: Enable stream module STREAM_REALIP=on: Enable stream_realip module STREAM_SSL=on: Enable stream_ssl module (SSL req.) STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.) ====> Third-party modules AJP=off: 3rd party ajp module AWS_AUTH=off: 3rd party aws auth module BROTLI=off: 3rd party brotli module CACHE_PURGE=off: 3rd party cache_purge module CT=off: 3rd party cert_transparency module (SSL req.) DEVEL_KIT=off: 3rd party Nginx Development Kit module ARRAYVAR=off: 3rd party array_var module DRIZZLE=off: 3rd party drizzle module DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module ECHO=off: 3rd party echo module ENCRYPTSESSION=off: 3rd party encrypted_session module FIPS_CHECK=off: 3rd party fips_check module FORMINPUT=off: 3rd party form_input module GRIDFS=off: 3rd party gridfs module HEADERS_MORE=off: 3rd party headers_more module HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module HTTP_AUTH_PAM=off: 3rd party http_auth_pam module HTTP_DAV_EXT=off: 3rd party webdav_ext module HTTP_EVAL=off: 3rd party eval module HTTP_FANCYINDEX=off: 3rd party http_fancyindex module HTTP_FOOTER=off: 3rd party http_footer module HTTP_GEOIP2=off: 3rd party geoip2 module HTTP_IP2LOCATION=off: 3rd party ip2location-nginx module HTTP_IP2PROXY=off: 3rd party ip2proxy-nginx module HTTP_JSON_STATUS=off: 3rd party http_json_status module HTTP_MOGILEFS=off: 3rd party mogilefs module HTTP_NOTICE=off: 3rd party notice module HTTP_PUSH=off: 3rd party push module HTTP_PUSH_STREAM=off: 3rd party push stream module HTTP_REDIS=off: 3rd party http_redis module HTTP_SLICE_AHEAD=off: 3rd party http_slice_ahead module HTTP_SUBS_FILTER=off: 3rd party subs filter module HTTP_TARANTOOL=off: 3rd party tarantool upstream module HTTP_UPLOAD=off: 3rd party upload module HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module HTTP_ZIP=off: 3rd party http_zip module ICONV=off: 3rd party iconv module LET=off: 3rd party let module LINK=off: 3rd party link function module LUA=off: 3rd party lua module MEMC=off: 3rd party memc (memcached) module MODSECURITY3=off: 3rd party modsecurity3 module NAXSI=off: 3rd party naxsi module PASSENGER=off: 3rd party passenger module POSTGRES=off: 3rd party postgres module RDS_CSV=off: 3rd party rds_csv module RDS_JSON=off: 3rd party rds_json module REDIS2=off: 3rd party redis2 module RTMP=off: 3rd party rtmp module SET_MISC=off: 3rd party set_misc module SFLOW=off: 3rd party sflow module SHIBBOLETH=off: 3rd party shibboleth module SLOWFS_CACHE=off: 3rd party slowfs_cache module SRCACHE=off: 3rd party srcache module STS=off: 3rd party sts module VOD=off: 3rd party vod module VTS=off: 3rd party vts module XSS=off: 3rd party xss module WEBSOCKIFY=off: 3rd party websockify module ====> GSSAPI implementation (imply HTTP_AUTH_KRB5): you can only select none or one of them GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal GSSAPI_MIT=off: GSSAPI support via security/krb5 ===> Use 'make config' to modify these settings
Options name:
www_nginx-devel
USES:
cpe ssl ssl ssl
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (5 items)
Collapse this list.
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. https://nginx.org/download/
Collapse this list.

Number of commits found: 1153 (showing only 100 on this page)

[First Page]  «  2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  »  [Last Page]

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
0.9.5
25 Feb 2011 11:07:45
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.2 to 3.0.3:

o) www/rubygem-passenger; (1)
o) passenger support for www/nginx and www/nginx-devel. (2)

Adopt passenger's version update for extra patches.

Do not bump PORTREVISIONs. (2)

Approved by:    Jacob Atzen <jatzen@gmail.com> (maintainer) (1)
0.9.5
21 Feb 2011 09:59:32
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.4 to 0.9.5.

<ChangeLog>

*) Change: now nginx uses a default listen backlog value -1 on
   Linux.
   Thanks to Andrei Nigmatulin.

*) Feature: the "utf8" parameter of "geoip_country" and "geoip_city"
   directives.
   Thanks to Denis F. Latypoff.

*) Bugfix: in a default "proxy_redirect" directive if "proxy_pass"
   directive has no URI part.
   Thanks to Maxim Dounin.

*) Bugfix: an "error_page" directive did not work with nonstandard
   error codes; the bug had appeared in 0.8.53.
   Thanks to Maxim Dounin.

</ChangeLog>
0.9.4
01 Feb 2011 10:47:21
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party headers_more module from 0.13 to 0.14.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.9.4
21 Jan 2011 11:50:29
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.3 to 0.9.4.

Feature safe: yes

<ChangeLog>

*) Feature: the "server_name" directive supports the $hostname variable.

*) Feature: 494 code for "Request Header Too Large" error.

</ChangeLog>
0.9.3
20 Dec 2010 04:15:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party headers_more module from 0.10 to 0.13.

Do not bump PORTREVISIONs.
0.9.3
17 Dec 2010 21:57:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) uploadprogress from 0.8 to 0.8.2;
o) echo from 0.30 to 0.34;

Do not bump PORTREVISIONs.
0.9.3
17 Dec 2010 14:49:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.1 to 3.0.2:

o) www/rubygem-passenger; [*]
o) passenger support for www/nginx and www/nginx-devel.

Remove needless extra patches.

Approved by:    maintainer [*]
0.9.3
13 Dec 2010 11:33:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.2 to 0.9.3.
Also sync extra patch for passenger with www/nginx.

<ChangeLog>

*) Bugfix: if there was a single server for given IPv6 address:port
   pair, then captures in regular expressions in a "server_name"
   directive did not work.

*) Bugfix: nginx could not be built on Solaris; the bug had appeared in
   0.9.0.

</ChangeLog>
0.9.2
12 Dec 2010 13:20:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party syslog support, original patch obtained from
http://dl.dropbox.com/u/5836407/Patches/Nginx_0.8.49-syslog-support.txt.

Do not bump PORTREVISIONs.

Submitted by:   Anes Muhametov aka anes at anes dot su
PR:             ports/152920
0.9.2
12 Dec 2010 12:22:47
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger as well as support for passenger-specific ports
from 3.0.0 to 3.0.1.

Also:

 o) respect CC/CXX/CFLAGS/PTHREAD_LIBS flags;
 o) build depends against devel/libev instead of internal libev;
 o) change depends from curl binary to libcurl;
 o) revert back GEM_LIB_DIR for pkg-message.    (!)

Do not bump PORTREVISIONs for www/nginx and www/nginx-devel ports.

<Note>

Patch extra-patch-passenger::ext::common::Utils.cpp obtained from
passenger's git:
https://github.com/FooBarWidget/passenger/commit/9a811060db56cfad2e2056d90cac1a354870dbad
and should be remove in next [3.0.2] port update.

</Note>

Approved by:    maintainer [*]
Pointy hat to:  wen (!)
0.9.2
06 Dec 2010 12:11:28
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.1 to 0.9.2.

<ChangeLog>

*) Feature: the "If-Unmodified-Since" client request header line
   support.

*) Workaround: fallback to accept() syscall if accept4() was not
   implemented; the issue had appeared in 0.9.0.

*) Bugfix: nginx could not be built on Cygwin; the issue had appeared
   in 0.9.0.

*) Bugfix: for OpenSSL vulnerability CVE-2010-4180.
   Thanks to Maxim Dounin.

</ChangeLog>
0.9.1
06 Dec 2010 06:28:05
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Speed up build passenger(tm) support by accurate corresponding patch.

Do not bump PORTREVISIONs.
0.9.1
01 Dec 2010 20:18:57
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for passenger 3.0.0.

<Note>

www/nginx and www/nginx-devel build support for nginx only.
For full support www/rubygem-passenger port compiled with
option WITH_NGINXPORT should be installed.

</Note>

Do not bump PORTREVISIONs.
0.9.1
30 Nov 2010 15:25:52
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.9.0 to 0.9.1.

<ChangeLog>

*) Bugfix: "return CODE message" directrives did not work; the bug had
   appeared in 0.9.0.

</ChangeLog>
0.9.0
29 Nov 2010 18:29:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.53 to latest development version 0.9.0.
Remove nginx.8.in from port, nginx(8) is in the distro.

<ChangeLog>

*) Feature: the "keepalive_disable" directive.

*) Feature: the "map" directive supports variables as value of a
   defined variable.

*) Feature: the "map" directive supports empty strings as value of the
   first parameter.

*) Feature: the "map" directive supports expressions as the first
   parameter.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.53_1
23 Nov 2010 12:39:09
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add nginx(8).
Bump PORTREVISION.

Thanks to:
o) Maxim Dounin aka mdounin at mdounin dot ru
o) Ruslan Ermilov aka ru@

Spotted by:     Sergey Svishchev aka svs at ropnet dot ru
PR:             ports/152212
0.8.53
16 Nov 2010 19:32:10
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly (www/nginx and www/nginx-devel):
*) update third-party http_auth_pam module from 1.1 to 1.2.
*) remove MD5.

Do not bump PORTREVISIONs.
0.8.53
28 Oct 2010 09:45:31
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly (www/nginx and www/nginx-devel):

*) update third party memc module from 0.08 to 0.11;
*) remove third party passenger module, since it possible to run as
   standalone server.
0.8.53
18 Oct 2010 12:58:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.52 to 0.8.53.
Update third-party fancyindex module from 0.2.5 to 0.3.

<ChangeLog>

*) Feature: now the "error_page" directive allows to change a status
   code in a redirect.

*) Feature: the "gzip_disable" directive supports special "degradation"
   mask.

*) Bugfix: a socket leak might occurred if file AIO was used.
   Thanks to Maxim Dounin.

*) Bugfix: if the first server had no "listen" directive and there was
   no explicit default server, then a next server with a "listen"
   directive became the default server; the bug had appeared in 0.8.21.

</ChangeLog>
0.8.52_1
30 Sep 2010 09:45:23
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix CONFLICTS.

Bump PORTREVISION.

PR:     ports/151072
0.8.52
30 Sep 2010 09:41:59
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.51 to 0.8.52.
Remove the IGNORE after understanding the coexistence of two ports.

<ChangeLog>

*) Bugfix: nginx used SSL mode for a listen socket if any listen option
   was set; the bug had appeared in 0.8.51.

</ChangeLog>
0.8.51
28 Sep 2010 06:32:17
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.67 to latest stable version 0.8.51 by merge changes from
www/nginx-devel.

Update CONFLIGS and temporary mark IGNORE www/nginx-devel, because latest
version available from www/nginx.

<Announcement>

Now the 0.8.x branch becomes a stable branch.  The new features have been
appeared during 0.8 development:

o named regular expression captures;
o file AIO in FreeBSD and Linux;
o SSL CRL;
o SCGI and uwsgi modules.

</Announcement>
0.8.51
28 Sep 2010 04:00:32
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upload module from 2.0.12 to 2.2.0.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Added feature: resumable uploads.
*) Added feature: allow to use of $variables in "upload_pass"
   directive (Piotr Sikora).
*) Added feature: allow module's directives inside if
   statements (David Backeus).
*) Added feature: directive upload_tame_arrays and ability to
   do some magic with php arrays.

</ChangeLog>
0.8.51
27 Sep 2010 14:24:51
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.50 to 0.8.51.

<ChangeLog>

*) Change: the "secure_link_expires" directive has been canceled.

*) Change: a logging level of resolver errors has been lowered from
   "alert" to "error".

*) Feature: now a listen socket "ssl" parameter may be set several
   times.

</ChangeLog>
0.8.50_1
14 Sep 2010 18:57:55
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upstream_keepalive from 0.2 to 0.3.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Bugfix: cached connections might be closed needlessly.
   Thanks to Martin Fjordvald.

*) Bugfix: in memory allocation error handling on config creation.

</ChangeLog>

This commit is dedicate to my sister's birthday.
0.8.50_1
13 Sep 2010 17:10:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party mod_zip from 1.1.5 to 1.1.6.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: Support for UTF-8 filenames. Thanks to Robbie Scott/Bandcamp.

*) Feature: Issue subrequests serially. Thanks to Brian Moran/OneHub.

*) Feature: Use Zip64 when archive is larger than 4 GB. Thanks to Vasily
   Fedoseyev.

*) Bugfix: Support spaces in URLs.

</ChangeLog>
0.8.50_1
03 Sep 2010 13:21:31
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Install three plain configuration files with -dist prefix.
Do not remove *cgi_params configuration files, which may carefully
edited by the user.

Bump PORTREVISION.
0.8.50
03 Sep 2010 03:59:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party mogilefs module from 1.0.3 to 1.0.4.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Added feature: multiple $mogilefs_path variables.

*) Fixed bug: segfault on reconfiguration due to uninitialized class
   template (thanks to Pyry Hakulinen).

</ChangeLog>
0.8.50
02 Sep 2010 18:09:13
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.49 to 0.8.50.

<ChangeLog>

*) Feature: the "secure_link", "secure_link_md5", and
   "secure_link_expires" directives of the ngx_http_secure_link_module.

*) Feature: the -q switch.
   Thanks to Gena Makhomed.

*) Bugfix: worker processes may got caught in an endless loop during
   reconfiguration, if a caching was used; the bug had appeared in
   0.8.48.

*) Bugfix: in the "gzip_disable" directive.
   Thanks to Derrick Petzold.

*) Bugfix: nginx/Windows could not send stop, quit, reopen, and reload
   signals to a process run in other session.

</ChangeLog>
0.8.49
18 Aug 2010 09:37:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_http_redis module from 0.3.1 to 0.3.2.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Bugfix: ngx_http_redis_module might issue the error message
   "redis sent invalid trailer".  For more information see:

*) Change: now the $redis_db set is not obligatory; default
   value is "0".

</ChangeLog>
0.8.49
12 Aug 2010 03:30:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_cache_purge module from 1.1 to 1.2.
Do not bump PORTREVISIONs.

<ChangeLog>

* Fix various build scenarios with disabled upstream modules.
  Reported by Johan Bergstroem.

* Add ability to purge content from SCGI's cache.
  Requested by Johan Bergstroem.

</ChangeLog>
0.8.49
09 Aug 2010 09:15:38
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.48 to 0.8.49.

<ChangeLog>

*) Feature: the "image_filter_jpeg_quality" directive supports
   variables.

*) Bugfix: a segmentation fault might occur in a worker process, if the
   $geoip_region_name variables was used; the bug had appeared in
   0.8.48.

*) Bugfix: errors intercepted by error_page were cached only for next
   request; the bug had appeared in 0.8.48.

</ChangeLog>
0.8.48
03 Aug 2010 15:48:44
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.47 to 0.8.48.

<ChangeLog>

*) Change: now the "server_name" directive default value is an empty
   name "".
   Thanks to Gena Makhomed.

*) Change: now the "server_name_in_redirect" directive default value is
   "off".

*) Feature: the $geoip_dma_code, $geoip_area_code, and
   $geoip_region_name variables.
   Thanks to Christine McGonagle.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.47
28 Jul 2010 17:05:26
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.46 to 0.8.47.

<ChangeLog>

*) Bugfix: $request_time variable had invalid values for subrequests.

*) Bugfix: errors intercepted by error_page could be cached.

*) Bugfix: a cache manager process my got caught in an endless loop, if
   max_size parameter was used; the bug had appeared in 0.8.46.

</ChangeLog>
0.8.46
19 Jul 2010 20:52:03
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.45 to 0.8.46.

Feature safe:   yes

<ChangeLog>

*) Change: now the "proxy_no_cache", "fastcgi_no_cache",
   "uwsgi_no_cache", and "sÓgi_no_cache" directives affect on a cached
   response saving only.

*) Feature: the "proxy_cache_bypass", "fastcgi_cache_bypass",
   "uwsgi_cache_bypass", and "sÓgi_cache_bypass" directives.

*) Bugfix: nginx did not free memory in cache keys zones if there was
   an error during working with backend: the memory was freed only
   after inactivity time or on memory low condition.

</ChangeLog>
0.8.45
14 Jul 2010 12:19:44
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.44 to 0.8.45.
Add missing file scgi_params.

Feature safe:   yes

<ChangeLog>

*) Feature: ngx_http_xslt_filter improvements.
   Thanks to Laurence Rowe.

*) Bugfix: SSI response might be truncated after include with
   wait="yes"; the bug had appeared in 0.7.25.
   Thanks to Maxim Dounin.

*) Bugfix: the "listen" directive did not support the "setfib=0"
   parameter.

</ChangeLog>
0.8.44
05 Jul 2010 20:07:13
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.43 to 0.8.44.

Feature safe:   yes

<ChangeLog>

*) Change: now nginx does not cache by default backend responses, if
   they have a "Set-Cookie" header line.

*) Feature: the "listen" directive supports the "setfib" parameter.
   Thanks to Andrew Filonov.

*) Bugfix: the "sub_filter" directive might change character case on
   partial match.

*) Bugfix: compatibility with HP/UX.

*) Bugfix: compatibility with AIX xcl_r compiler.

*) Bugfix: nginx treated a large SSLv2 packets as plain requests.
   Thanks to Miroslaw Jaworski.

</ChangeLog>
0.8.43
01 Jul 2010 15:22:20
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Convert post-patch target to EXTRA_PATCHES entries for patches for third-party
modules.
No functionally changes.
Do not bump PORTREVISIONs.

Spotted by:     Maxim Dounin aka mdounin at mdounin dot ru

Feature safe:   yes
0.8.43
30 Jun 2010 17:35:58
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update passenger from 2.2.14 to 2.2.15 for:

o) www/nginx and www/nginx-devel        [1]
o) www/rubygem-passenger                [2]

Remove needless patch.

[1] Do not bump PORTREVISION.
[2] Approved by:        Jacob Atzen aka jatzen at gmail dot com (maintainer)

Feature safe:           yes
0.8.43
30 Jun 2010 15:41:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.42 to 0.8.43.

Feature safe:   yes

<ChangeLog>

*) Feature: large geo ranges base loading speed-up.

*) Bugfix: an error_page redirection to "location /zero { return 204;
   }" without changing status code kept the error body; the bug had
   appeared in 0.8.42.

*) Bugfix: nginx might close IPv6 listen socket during
   reconfiguration.
   Thanks to Maxim Dounin.

*) Bugfix: the $uid_set variable may be used at any request processing
   stage.

</ChangeLog>
0.8.42
21 Jun 2010 11:34:12
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.41 to 0.8.42.
Keep http*temp-path options sorted.

Feature safe: yes

<ChangeLog>

*) Change: now nginx tests locations given by regular expressions, if
   request was matched exactly by a location given by a prefix string.
   The previous behavior has been introduced in 0.7.1.

*) Feature: the ngx_http_scgi_module.
   Thanks to Manlio Perillo.

*) Feature: a text answer may be added to a "return" directive.

</ChangeLog>
0.8.41_1
18 Jun 2010 06:55:17
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Change broken MASTER_SITES for third-party fancyindex module to
MASTER_SITE_LOCAL. (*)
Uniform fancyindex tarball for stable and devel version.
No functionaly changes.
Do not bump PORTREVISION.

(*) Notice from:        Rafal Szkodzinski aka uid at atnus dot com
0.8.41_1
17 Jun 2010 14:08:53
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing file uwsgi_params.
Bump PORTREVISION.

Submitted by:   Hizbulin Ildar aka hizel at vyborg dot ru
PR:             ports/147937
0.8.41
15 Jun 2010 12:10:51
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.40 to 0.8.41.

<ChangeLog>

*) Security: nginx/Windows worker might be terminated abnormally if a
   requested file name has invalid UTF-8 encoding.

*) Change: now nginx allows to use spaces in a request line.

*) Bugfix: the "proxy_redirect" directive changed incorrectly a backend
   "Refresh" response header line.
   Thanks to Andrey Andreew and Max Sogin.

*) Bugfix: nginx did not support path without host name in
   "Destination" request header line.

</ChangeLog>
0.8.40_1
10 Jun 2010 17:12:31
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.2 to 0.2.5.
Remove needless patches.

Do not bump PORTREVISIONs.
0.8.40_1
10 Jun 2010 07:19:18
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Configure temporary path for ngx_http_uwsgi_module.
Bump PORTREVISION.

Submitted by:   Piotr Sikora aka piotr dot sikora at frickle dot com
0.8.40
08 Jun 2010 11:28:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.4 to 1.5.
Remove needless patch.

Do not bump PORTREVISIONs.
0.8.40
08 Jun 2010 04:47:29
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party cache_purge module from 1.0 to 1.1.

Do not bump PORTREVISIONs.
0.8.40
07 Jun 2010 13:34:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.39 to 0.8.40.
License.

<ChangeLog>

*) Security: now nginx/Windows ignores default file stream name.
   Thanks to Jose Antonio Vazquez Gonzalez.

*) Feature: the ngx_http_uwsgi_module.
   Thanks to Roberto De Ioris.

*) Feature: a "fastcgi_param" directive with value starting with
   "HTTP_" overrides a client request header line.

*) Bugfix: the "If-Modified-Since", "If-Range", etc. client request
   header lines were passed to FastCGI-server while caching.

*) Bugfix: listen unix domain socket could not be changed during
   reconfiguration.
   Thanks to Maxim Dounin.

</ChangeLog>
0.8.39
07 Jun 2010 02:45:14
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.09 to 0.10.

Do not bump PORTREVISIONs.
0.8.39
06 Jun 2010 07:09:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 2.2.12 to 2.2.14:

1) third-party passenger module for www/nginx and www/nginx-devel
2) www/rubygem-passenger

Do not bump PORTREVISIONs. [1]

Approved by:    Jacob Atzen aka jatzen at gmail dot com [2]
0.8.39
02 Jun 2010 17:14:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.08 to 0.09.

Do not bump PORTREVISIONs.
0.8.39
01 Jun 2010 09:43:03
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update:

1) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx
2) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx-devel
3) www/rubygem-passenger from 2.2.11 to 2.2.12

Remove needless patch. [2]

Do not bump PORTREVISIONs.

Approved by:    Jacob Atzen aka jatzen at gmail dot com [3]
0.8.39
31 May 2010 16:34:49
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.38 to 0.8.39.

<ChangeLog>

*) Bugfix: an inherited "alias" directive worked incorrectly in
   inclusive location.

*) Bugfix: in "alias" with variables and "try_files" directives
   combination.

*) Bugfix: listen unix domain and IPv6 sockets did not inherit while
   online upgrade.
   Thanks to Maxim Dounin.

</ChangeLog>
0.8.38
25 May 2010 16:10:57
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.3 to 1.4.
Remove needless patch.

Do not bump PORTREVISIONs.
0.8.38
24 May 2010 17:17:17
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.37 to 0.8.38.
Add four hacks for third-party modules.

<ChangeLog>

*) Feature: the "proxy_no_cache" and "fastcgi_no_cache" directives.

*) Feature: now the "rewrite" directive does a redirect automatically
   if the $scheme variable is used.
   Thanks to Piotr Sikora.

*) Bugfix: now "limit_req" delay directive conforms to the described
   algorithm.
   Thanks to Maxim Dounin.

*) Bugfix: the $uid_got variable might not be used in the SSI and perl
   modules.

</ChangeLog>
0.8.37
17 May 2010 06:39:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.36 to 0.8.37.

<ChangeLog>

*) Feature: the ngx_http_split_clients_module.

*) Feature: the "map" directive supports keys more than 255 characters.

*) Bugfix: nginx ignored the "private" and "no-store" values in the
   "Cache-Control" backend response header line.

*) Bugfix: a "stub" parameter of an "include" SSI directive was not
   used, if empty response has 200 status code.

*) Bugfix: if a proxied or FastCGI request was internally redirected to
   another proxied or FastCGI location, then a segmentation fault might
   occur in a worker process; the bug had appeared in 0.8.33.
   Thanks to Yichun Zhang.

*) Bugfix: IMAP connections may hang until they timed out while talking
   to Zimbra server.
   Thanks to Alan Batie.

</ChangeLog>
0.8.36
07 May 2010 03:56:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.28 to 0.30.

Do not bump PORTREVISIONs.
0.8.36
03 May 2010 13:58:42
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.27 to 0.28.

Do not bump PORTREVISIONs.
0.8.36
29 Apr 2010 04:18:25
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party supervisord module from 1.3 to 1.4.

Do not bump PORTREVISIONs.
0.8.36
28 Apr 2010 19:18:28
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party headers_more module from 0.07 to 0.08.
0.8.36
23 Apr 2010 03:43:21
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.35 to fresh bugfix release 0.8.36.
Update third party http_memc module from 0.06 to 0.08.

<ChangeLog>

*) Bugfix: the ngx_http_dav_module handled incorrectly the DELETE,
   COPY, and MOVE methods for symlinks.

*) Bugfix: values of the $query_string, $arg_..., etc. variables cached
   in main request were used by the SSI module in subrequests.

*) Bugfix: a variable value was repeatedly encoded after each an "echo"
   SSI-command output; the bug had appeared in 0.6.14.

*) Bugfix: a worker process hung if a FIFO file was requested.
   Thanks to Vicente Aguilar and Maxim Dounin.

*) Bugfix: OpenSSL-1.0.0 compatibility on 64-bit Linux.
   Thanks to Maxim Dounin.

*) Bugfix: nginx could not be built --without-http-cache; the bug had
   appeared in 0.8.35.

<ChangeLog>
0.8.35
08 Apr 2010 11:08:05
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.26 to 0.27.
Remove needless extra patch.

Do not bump PORTREVISIONs.
0.8.35
01 Apr 2010 17:03:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.34 to 0.8.35.

Add quick fix for ngx_echo_module, also sent the patch to upstream.

<ChangeLog>

*) Change: now the charset filter runs before the SSI filter.

*) Feature: the "chunked_transfer_encoding" directive.

*) Bugfix: an "&" character was not escaped when it was copied in
   arguments part in a rewrite rule.

*) Bugfix: nginx might be terminated abnormally while a signal
   processing or if the directive "timer_resolution" was used on
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.34
28 Mar 2010 04:44:55
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Cleanse uneeded RC_SUBR variables

Approved by:    pgolluci
0.8.35
27 Mar 2010 00:15:24
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
0.8.34
25 Mar 2010 10:02:43
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third-party echo module version 0.26.

Do not bump PORTREVISIONs.
0.8.34
25 Mar 2010 02:37:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party auth request module from 0.1 to 0.2.

Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: auth_request_set directive.

*) Bugfix: segmentation fault happened on auth request handled by
   proxy_pass or fastcgi_pass if initial request has non-empty body.

</ChangeLog>
0.8.34
23 Mar 2010 05:01:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party gunzip filter module from 0.2 to 0.3.

Do not bump PORTREVISIONs.
0.8.34
10 Mar 2010 04:30:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.1 to 0.2.2.

Do not bump PORTREVISIONs.

PR:     144557
0.8.34
09 Mar 2010 09:49:09
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update CATEGORIES if defined passenger module support.

Do not bump PORTREVISIONs.
0.8.34
05 Mar 2010 11:46:00
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party passenger module from 2.0.10 to 2.0.11.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.34
03 Mar 2010 18:48:59
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.33 to 0.8.34.

Feature safe: yes

<ChangeLog>

*) Bugfix: nginx did not support all ciphers and digests used in client
   certificates.
   Thanks to Innocenty Enikeew.

*) Bugfix: nginx cached incorrectly FastCGI responses if there was
   large stderr output before response.

*) Bugfix: nginx did not support HTTPS referrers.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.33
02 Mar 2010 10:31:38
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upload module from 2.0.11 to 2.0.12.
Remove needless patch for www/nginx-devel.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
27 Feb 2010 19:56:07
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party auth_request module, version 0.1.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
27 Feb 2010 19:20:20
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party headers_more module, version 0.07.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
22 Feb 2010 17:29:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party modules:

o) http_push from 0.69 to 0.692;
o) passenger from 2.2.9 to 2.2.10.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
22 Feb 2010 13:53:25
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party modules for www/nginx and www/nginx-devel:

o) h264_streaming from 2.2.5 to 2.2.7;
o) passenger from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.

Feature safe:   yes
0.8.33
18 Feb 2010 19:16:13
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party module accept language.

Do not bump PORTREVISIONs.

Feature safe:   yes

Submitted by:   Mike Stupalov aka landy2005 at gmail dot com
PR:             ports/143787
0.8.33
08 Feb 2010 03:56:37
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update memc (aka advanced memcached) module
from 0.05 to 0.06.

Do not bump PORTREVISIONs.
0.8.33
07 Feb 2010 10:21:47
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update upstream_hash module from 0.3 to 0.3.1.

Do not bump PORTREVISION.
0.8.33
06 Feb 2010 18:52:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update fancyindex module from 0.1_beta5 to 0.2.1.
Remove needless patches.

Do not bump PORTREVISIONs.
0.8.33
04 Feb 2010 10:08:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update gunzip_filter module from 0.1 to 0.2 for
www/nginx and www/nginx-devel.

Do not bump PORTREVISIONs.

Spotted by:     Maxim Dounin aka mdounin at mdounin dot ru
0.8.33
02 Feb 2010 00:56:26
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.32 to 0.8.33.

Feature safe:   yes

<ChangeLog>

*) Security: now nginx/Windows ignores trailing spaces in URI.
   Thanks to Dan Crowley, Core Security Technologies.

*) Security: now nginx/Windows ignores short files names.
   Thanks to Dan Crowley, Core Security Technologies.

*) Change: now keepalive connections after POST requests are not
   disabled for MSIE 7.0+. Thanks to Adam Lounds.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.32
18 Jan 2010 19:53:37
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
This is accordingly update for www/nginx and www/nginx-devel.

Add one more third-party module: upstream_hash, version 0.3.1.
Update slowfs_cache module from 1.2 to 1.3.
Update mogilefs module from 1.0.2 to 1.0.3.

Do not bump PORTREVISIONs.
0.8.32
14 Jan 2010 18:55:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Use USE_OPENSSL instead of bsd.openssl.mk.

Do not remove default DISTFILES due to port building
failure when third-party module (i.e. additional DISTFILES)
selected.

Do not bump PORTREVISIONs.

PRs:    142831, 142833
0.8.32
11 Jan 2010 17:23:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.31 to 0.8.32.

<ChangeLog>

*) Bugfix: UTF-8 encoding usage in the ngx_http_autoindex_module.
   Thanks to Maxim Dounin.

*) Bugfix: regular expression named captures worked for two names only.
   Thanks to Maxim Dounin.

*) Bugfix: now the "localhost" name is used in the "Host" request
   header line, if an unix domain socket is defined in the "auth_http"
   directive.
   Thanks to Maxim Dounin.

*) Bugfix: nginx did nor support chunked transfer encoding for 201
   responses.
   Thanks to Julian Reich.

*) Bugfix: if the "expires modified" set date in the past, the a
   negative number was set in the "Cache-Control" response header
   line.
   Thanks to Alex Kapranoff.

</ChangeLog>
0.8.31
11 Jan 2010 07:43:39
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add ngx_cache_purge-1.0, the module adding ability
to purge content from nginx's FastCGI and proxy caches.

Do not bump PORTREVISIONs.
0.8.31
09 Jan 2010 19:19:03
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Revert back update Passenger from 2.2.9 to 2.2.8
due to incompatible infrastructure.

Do not bump PORTREVISIONs.
0.8.31
08 Jan 2010 19:34:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update Passenger module from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.
0.8.31
06 Jan 2010 20:29:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add memc module - an extended version of the
standard memcached module that supports set, add, delete,
and many more memcached commands.

Do not bump PORTREVISIONs.
0.8.31
05 Jan 2010 22:06:43
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly commit changes for third-party modules in www/nginx
and www/nginx-devel:

 o) update uploadprogress from 0.7 to 0.8;
 o) update upstream_fair from 20081012 to 20090923;
 o) update supervisord from 1.2 to 1.3;
 o) add udplog (syslog) module version 1.0.0;
 o) s/modle/module/ for both Makefiles.

Remove needless patches.

Do not bump PORTREVISIONs.
0.8.31
03 Jan 2010 17:53:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update upstream_keepalive module, from 0.1 to 0.2.
Do not bump PORTREVISIONs.
0.8.31
29 Dec 2009 07:14:11
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update slowfs_cache module, from 1.1 to 1.2.
Do not bump PORTREVISIONs.
0.8.31
29 Dec 2009 07:04:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add http_gunzip_filter module, version 0.1.
Do not bump PORTREVISIONs.
0.8.31
26 Dec 2009 13:04:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update http_redis module from 0.3.0 to 0.3.1.
Cosmetic whitespace fix for Makefile.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Change: return 502 instead of 404 for error.

*) Change: better error messages diagnostics.

*) Bugfix: interoperability with redis; the bug had
   appeared in 0.3.0.

</ChangeLog>
0.8.31
25 Dec 2009 15:20:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more know WITH_DEBUGLOG by split debug features
for distro (--with-debug) and system (-g) specific.
0.8.31
25 Dec 2009 09:53:04
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Improve redis protocol support.
Do not bump PORTREVISION.
0.8.31
23 Dec 2009 21:22:26
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.30 to 0.8.31.
Update http_redis module from 0.2.0 to 0.3.0.
Remove needless extra patch.

<ChangeLog>

*) Feature: now the "error_page" directive may redirect the 301 and 302
   responses.

*) Feature: the $geoip_city_continent_code, $geoip_latitude, and
   $geoip_longitude variables.
   Thanks to Arvind Sundararajan.

*) Feature: now the ngx_http_image_filter_module deletes always EXIF
   and other application specific data if the data consume more than 5%
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.30
22 Dec 2009 11:42:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update slowfs_cache module, from 1.0 to 1.1.
Do not bump PORTREVISION.

Number of commits found: 1153 (showing only 100 on this page)

[First Page]  «  2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  »  [Last Page]