notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

Port details
nginx-devel Robust and small WWW server
1.25.5 www on this many watch lists=26 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.25.4_6Version of this port present on the latest quarterly branch.
Maintainer: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2007-06-15 08:23:21
Last Update: 2024-04-18 17:07:41
Commit Hash: d83020df
People watching this port, also watch:: nginx, sudo, rsync, lsof, wget
License: BSD2CLAUSE
WWW:
https://nginx.com/
Description:
NGINX is a high performance edge web server with the lowest memory footprint and the key features to build modern and efficient web infrastructure. NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching, load balancing, compression, request throttling, connection multiplexing and reuse, SSL offload and HTTP media streaming. See also: https://nginx.org/
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (109 items)
Collapse this list.
  1. /usr/local/share/licenses/nginx-devel-1.25.5/catalog.mk
  2. /usr/local/share/licenses/nginx-devel-1.25.5/LICENSE
  3. /usr/local/share/licenses/nginx-devel-1.25.5/BSD2CLAUSE
  4. etc/nginx/koi-utf
  5. etc/nginx/koi-win
  6. etc/nginx/win-utf
  7. @comment include/ngx_link_func_module.h
  8. @comment etc/nginx/naxsi_core.rules
  9. @sample etc/nginx/fastcgi_params-dist etc/nginx/fastcgi_params
  10. @sample etc/nginx/mime.types-dist etc/nginx/mime.types
  11. @sample etc/nginx/nginx.conf-dist etc/nginx/nginx.conf
  12. @sample etc/nginx/scgi_params-dist etc/nginx/scgi_params
  13. @sample etc/nginx/uwsgi_params-dist etc/nginx/uwsgi_params
  14. @comment libexec/nginx/ngx_http_ajp_module.so
  15. @comment libexec/nginx/ngx_http_array_var_module.so
  16. @comment libexec/nginx/ngx_http_aws_auth_module.so
  17. @comment libexec/nginx/ngx_http_brotli_filter_module.so
  18. @comment libexec/nginx/ngx_http_brotli_static_module.so
  19. @comment libexec/nginx/ngx_http_cache_purge_module.so
  20. @comment libexec/nginx/ngx_http_ssl_ct_module.so
  21. @comment libexec/nginx/ngx_ssl_ct_module.so
  22. @comment libexec/nginx/ndk_http_module.so
  23. @comment libexec/nginx/ngx_http_drizzle_module.so
  24. @comment libexec/nginx/ngx_http_dynamic_upstream_module.so
  25. @comment libexec/nginx/ngx_http_echo_module.so
  26. @comment libexec/nginx/ngx_http_encrypted_session_module.so
  27. @comment libexec/nginx/ngx_fips_check_module.so
  28. @comment libexec/nginx/ngx_http_form_input_module.so
  29. @comment libexec/nginx/ngx_http_gridfs_module.so
  30. @comment libexec/nginx/ngx_http_headers_more_filter_module.so
  31. @comment libexec/nginx/ngx_http_accept_language_module.so
  32. @comment libexec/nginx/ngx_http_auth_digest_module.so
  33. @comment libexec/nginx/ngx_http_auth_spnego_module.so
  34. @comment libexec/nginx/ngx_http_auth_ldap_module.so
  35. @comment libexec/nginx/ngx_http_auth_pam_module.so
  36. @comment libexec/nginx/ngx_http_dav_ext_module.so
  37. @comment libexec/nginx/ngx_http_eval_module.so
  38. @comment libexec/nginx/ngx_http_fancyindex_module.so
  39. @comment libexec/nginx/ngx_http_footer_filter_module.so
  40. @comment libexec/nginx/ngx_http_image_filter_module.so
  41. @comment libexec/nginx/ngx_http_ip2location_module.so
  42. @comment libexec/nginx/ngx_http_ip2proxy_module.so
  43. @comment libexec/nginx/ngx_http_json_status_module.so
  44. @comment libexec/nginx/ngx_http_mogilefs_module.so
  45. @comment libexec/nginx/ngx_http_notice_module.so
  46. @comment libexec/nginx/ngx_http_perl_module.so
  47. @comment libexec/nginx/ngx_http_push_stream_module.so
  48. @comment libexec/nginx/ngx_nchan_module.so
  49. @comment libexec/nginx/ngx_http_redis_module.so
  50. @comment libexec/nginx/ngx_http_subs_filter_module.so
  51. @comment libexec/nginx/ngx_http_tnt_module.so
  52. @comment libexec/nginx/ngx_http_uploadprogress_module.so
  53. @comment libexec/nginx/ngx_http_upload_module.so
  54. @comment libexec/nginx/ngx_http_upstream_fair_module.so
  55. @comment libexec/nginx/ngx_http_sticky_module.so
  56. @comment libexec/nginx/ngx_http_video_thumbextractor_module.so
  57. @comment libexec/nginx/ngx_http_xslt_filter_module.so
  58. @comment libexec/nginx/ngx_http_zip_module.so
  59. @comment libexec/nginx/ngx_http_geoip2_module.so
  60. @comment libexec/nginx/ngx_http_js_module.so
  61. @comment libexec/nginx/ngx_http_iconv_module.so
  62. @comment libexec/nginx/ngx_http_let_module.so
  63. @comment libexec/nginx/ngx_http_link_func_module.so
  64. @comment libexec/nginx/ngx_http_lua_module.so
  65. @comment libexec/nginx/ngx_mail_ssl_ct_module.so
  66. libexec/nginx/ngx_mail_module.so
  67. @comment libexec/nginx/ngx_http_memc_module.so
  68. @comment libexec/nginx/ngx_http_modsecurity_module.so
  69. @comment libexec/nginx/ngx_http_naxsi_module.so
  70. @comment libexec/nginx/ngx_otel_module.so
  71. @comment libexec/nginx/ngx_http_passenger_module.so
  72. @comment libexec/nginx/ngx_postgres_module.so
  73. @comment libexec/nginx/ngx_http_rds_csv_filter_module.so
  74. @comment libexec/nginx/ngx_http_rds_json_filter_module.so
  75. @comment libexec/nginx/ngx_http_redis2_module.so
  76. @comment libexec/nginx/ngx_rtmp_module.so
  77. @comment libexec/nginx/ngx_http_set_misc_module.so
  78. @comment libexec/nginx/ngx_http_shibboleth_module.so
  79. @comment libexec/nginx/ngx_http_slowfs_module.so
  80. @comment libexec/nginx/ngx_http_srcache_filter_module.so
  81. @comment libexec/nginx/ngx_stream_ssl_ct_module.so
  82. @comment libexec/nginx/ngx_stream_geoip2_module.so
  83. @comment libexec/nginx/ngx_stream_js_module.so
  84. libexec/nginx/ngx_stream_module.so
  85. @comment libexec/nginx/ngx_http_stream_server_traffic_status_module.so
  86. @comment libexec/nginx/ngx_http_vod_module.so
  87. @comment libexec/nginx/ngx_http_vhost_traffic_status_module.so
  88. @comment libexec/nginx/ngx_http_websockify_module.so
  89. @comment libexec/nginx/ngx_http_xss_filter_module.so
  90. @comment %%SITE_ARCH%%/auto/nginx/nginx.so
  91. @comment %%SITE_ARCH%%/nginx.pm
  92. sbin/nginx
  93. share/vim/vimfiles/ftdetect/nginx.vim
  94. share/vim/vimfiles/ftplugin/nginx.vim
  95. share/vim/vimfiles/indent/nginx.vim
  96. share/vim/vimfiles/syntax/nginx.vim
  97. @postexec mkdir -p -m 755 %D/www/nginx-dist
  98. @postexec if [ ! -d %D/www/nginx/ ] ; then ln -fs %D/www/nginx-dist %D/www/nginx; fi
  99. www/nginx-dist/EXAMPLE_DIRECTORY-DONT_ADD_OR_TOUCH_ANYTHING
  100. www/nginx-dist/index.html
  101. www/nginx-dist/50x.html
  102. @postexec chmod a-w %D/www/nginx-dist
  103. @postunexec if [ -L %D/www/nginx ]; then rm -f %D/www/nginx; fi
  104. @dir /var/tmp/nginx
  105. @dir /var/log/nginx
  106. share/man/man8/nginx.8.gz
  107. @owner
  108. @group
  109. @mode
Collapse this list.
Dependency lines:
  • nginx-devel>0:www/nginx-devel
Conflicts:
CONFLICTS:
  • nginx-1.*
  • nginx-full-1.*
  • nginx-lite-1.*
  • nginx-naxsi-1.*
CONFLICTS_INSTALL:
  • nginx
Conflicts Matches:
There are no Conflicts Matches for this port. This is usually an error.
To install the port:
cd /usr/ports/www/nginx-devel/ && make install clean
To add the package, run one of these commands:
  • pkg install www/nginx-devel
  • pkg install nginx-devel
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: nginx-devel
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1713445894 SHA256 (nginx-1.25.5.tar.gz) = 2fe2294f8af4144e7e842eaea884182a84ee7970e11046ba98194400902bbec0 SIZE (nginx-1.25.5.tar.gz) = 1244060

Expand this list (136 items)

Collapse this list.

SHA256 (nginx_mogilefs_module-1.0.4.tar.gz) = 7ac230d30907f013dff8d435a118619ea6168aa3714dba62c6962d350c6295ae SIZE (nginx_mogilefs_module-1.0.4.tar.gz) = 11208 SHA256 (ngx_http_redis-0.3.9.tar.gz) = 21f87540f0a44b23ffa5df16fb3d788bc90803b255ef14f9c26e3847a6f26f46 SIZE (ngx_http_redis-0.3.9.tar.gz) = 13051 SHA256 (passenger-6.0.20.tar.gz) = fa8d9a37edb92f4a8f064b3005b57bccf10392ce4eb067838883206060e27107 SIZE (passenger-6.0.20.tar.gz) = 8476308 SHA256 (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 522e94c59f5783f281d868ede2adf325bf2f8ffb9e62cf8451d4b9ac0516916c SIZE (msva-nginx_ajp_module-fcbb2cc_GH0.tar.gz) = 110807 SHA256 (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = c949d4be6f3442c8e2937046448dc8d8def25c0e0fa6f4e805144cea45eabe80 SIZE (openresty-array-var-nginx-module-v0.05_GH0.tar.gz) = 11280 SHA256 (anomalizer-ngx_aws_auth-21931b2_GH0.tar.gz) = d8a2422da96a638e9a911e4edb592954d9c0fe1576456fec9809ef4e2a0a863d SIZE (anomalizer-ngx_aws_auth-21931b2_GH0.tar.gz) = 15580 SHA256 (google-ngx_brotli-a71f931_GH0.tar.gz) = b3312a045d5303a40d02beb34711b8ca27f7b72d647e9ee2012a8eddd14d9b22 SIZE (google-ngx_brotli-a71f931_GH0.tar.gz) = 16376 SHA256 (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = ddfd4fdd99075d906b7b75c49f56ec96b76df7951dfa54502e0f83890447031f SIZE (nginx-modules-ngx_cache_purge-a84b0f3_GH0.tar.gz) = 17162 SHA256 (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 72fdd125b9207cdda135f368095f85b943a78a4ff004d1cd217972e12b1571b2 SIZE (grahamedgecombe-nginx-ct-93e9884_GH0.tar.gz) = 7224 SHA256 (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = faa2fcd5168b10764d35081356511d5f84db5c526a1aa4b6add2db94b6853b2b SIZE (vision5-ngx_devel_kit-v0.3.3_GH0.tar.gz) = 66561 SHA256 (openresty-drizzle-nginx-module-3504fc6_GH0.tar.gz) = 86076735597f14db28cffabc0ab1f233cd51aab7cf112c56e267783e7814fc65 SIZE (openresty-drizzle-nginx-module-3504fc6_GH0.tar.gz) = 51596 SHA256 (ZigzagAK-ngx_dynamic_upstream-960eef2_GH0.tar.gz) = 86e7c6ed6dba2d4c5f5b87ecb91f25ccdb7a08b8a88236e632114f830b9e354b SIZE (ZigzagAK-ngx_dynamic_upstream-960eef2_GH0.tar.gz) = 23003 SHA256 (openresty-echo-nginx-module-5a402aa_GH0.tar.gz) = bb2a4b1a0e5ffa0203c1be854e663fc92cee0d7b5e0f7a38c0e163ae9124a38f SIZE (openresty-echo-nginx-module-5a402aa_GH0.tar.gz) = 53336 SHA256 (openresty-encrypted-session-nginx-module-v0.09_GH0.tar.gz) = fe9b95acf9726aefd71bf0aca6c11bee007f1da67e64be9b21a7131f0ed75ba6 SIZE (openresty-encrypted-session-nginx-module-v0.09_GH0.tar.gz) = 11847 SHA256 (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 5c1869d55897075adb3fdf840b21060dc54669a1f840a36d1539acc7e59dd106 SIZE (calio-form-input-nginx-module-v0.12_GH0.tar.gz) = 11090 SHA256 (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = d52fbb0f2819cd91b710ad85e6c8b452fdca6a5d81b0694d6637adba3fc2382c SIZE (ogarrett-nginx-fips-check-module-6cb4270_GH0.tar.gz) = 6494 SHA256 (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 9b059b5ae7b602d12d32d5ebe2700827ea625f22c0fb3b9956242e11de63845b SIZE (nieoding-nginx-gridfs-059bdc3_GH0.tar.gz) = 4674 SHA256 (openresty-headers-more-nginx-module-06dc0be_GH0.tar.gz) = 883b1e31d59f3eb1e76b34259711ad65a3443102973dcf22df329397f3d5eaa4 SIZE (openresty-headers-more-nginx-module-06dc0be_GH0.tar.gz) = 29438 SHA256 (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = a58feb576f2231498b8a3863d3c6fba45c7d48bc48735fa714e07a7bfbedb6e3 SIZE (dvershinin-nginx_accept_language_module-5683967_GH0.tar.gz) = 3425 SHA256 (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 0839c33c2f8d519f92daae274f62cf87eb68415d562c6500ee3e3721ce80557c SIZE (atomx-nginx-http-auth-digest-274490c_GH0.tar.gz) = 17815 SHA256 (stnoonan-spnego-http-auth-nginx-module-3575542_GH0.tar.gz) = 6d710f97bef58b2d5dc54445c0e48103786425f6d4ab18cf30a2168904d0ba62 SIZE (stnoonan-spnego-http-auth-nginx-module-3575542_GH0.tar.gz) = 24680 SHA256 (kvspb-nginx-auth-ldap-83c059b_GH0.tar.gz) = e76e9e117ad51af578a68fa7a30c256178796bb271fa77f01c93281a92b09921 SIZE (kvspb-nginx-auth-ldap-83c059b_GH0.tar.gz) = 18547 SHA256 (sto-ngx_http_auth_pam_module-v1.5.3_GH0.tar.gz) = 882018fea8d6955ab3fe294aafa8ebb1fdff4eac313c29583fef02c6de76fae7 SIZE (sto-ngx_http_auth_pam_module-v1.5.3_GH0.tar.gz) = 7084 SHA256 (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = d2499d94d82d4e4eac8425d799e52883131ae86a956524040ff2fd230ef9f859 SIZE (arut-nginx-dav-ext-module-v3.0.0_GH0.tar.gz) = 14558 SHA256 (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 014bedb2b334ba8e8e23b4c660590357f8055dbed7b9b017e4cc2937876a8822 SIZE (openresty-nginx-eval-module-582bd25_GH0.tar.gz) = 14849 SHA256 (aperezdc-ngx-fancyindex-v0.5.2_GH0.tar.gz) = c3dd84d8ba0b8daeace3041ef5987e3fb96e9c7c17df30c9ffe2fe3aa2a0ca31 SIZE (aperezdc-ngx-fancyindex-v0.5.2_GH0.tar.gz) = 29052 SHA256 (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3493b54460c59370f9f60c6e662862752f1920fc6e684f7a66bb2b3260692813 SIZE (alibaba-nginx-http-footer-filter-1.2.2_GH0.tar.gz) = 3934 SHA256 (leev-ngx_http_geoip2_module-3.4_GH0.tar.gz) = ad72fc23348d715a330994984531fab9b3606e160483236737f9a4a6957d9452 SIZE (leev-ngx_http_geoip2_module-3.4_GH0.tar.gz) = 8877 SHA256 (ip2location-ip2location-nginx-2df35fb_GH0.tar.gz) = 86d6d6d6b4437ecc621c5aac7bd5475dffd33afb70a51c5ea3c7f341ded46efb SIZE (ip2location-ip2location-nginx-2df35fb_GH0.tar.gz) = 5462 SHA256 (ip2location-ip2proxy-nginx-02ce447_GH0.tar.gz) = edbafe23087f019364f9d1c1c615fdbc5116ec727c49bf442e3e4b39441fc4cc SIZE (ip2location-ip2proxy-nginx-02ce447_GH0.tar.gz) = 5177 SHA256 (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = fdc34e0e712d28f4452ce3858ba05a38cc00703f14502095189c4a1063a36997 SIZE (nginx-modules-ngx_http_json_status_module-1d2f303_GH0.tar.gz) = 6736 SHA256 (kr-nginx-notice-3c95966_GH0.tar.gz) = e829fc94178cc8c91fef15a1fc44ee7ac162c13eddc0bba4c9427aaa23386885 SIZE (kr-nginx-notice-3c95966_GH0.tar.gz) = 3343 SHA256 (slact-nchan-v1.3.6_GH0.tar.gz) = ba0b7cc6b710a20ce1ed2554caf56154035291aaf115e407d7a6bb699fde42df SIZE (slact-nchan-v1.3.6_GH0.tar.gz) = 761436 SHA256 (wandenberg-nginx-push-stream-module-8c02220_GH0.tar.gz) = ab4fbe236e8bc500f0c5e13403d6a0e2e4e4ec17b81e0fcedaf669b4339626a6 SIZE (wandenberg-nginx-push-stream-module-8c02220_GH0.tar.gz) = 196720 SHA256 (yaoweibin-ngx_http_substitutions_filter_module-c6f825f_GH0.tar.gz) = 4ab034f2e056148469b440394e1664c46405712ef27bc4f3197e42bf7df8460e SIZE (yaoweibin-ngx_http_substitutions_filter_module-c6f825f_GH0.tar.gz) = 94062 SHA256 (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 514aa57155c73c2e3f7bdfe00c580183df343f2fa4b34e77f040cf6557caffae SIZE (tarantool-nginx_upstream_module-aeb8696_GH0.tar.gz) = 75708 SHA256 (fdintino-nginx-upload-module-643b4c1_GH0.tar.gz) = a5bb48589b5c242683da33a9f1acc7847acc3ce4f2c4213ea524858aa789a6e9 SIZE (fdintino-nginx-upload-module-643b4c1_GH0.tar.gz) = 42571 SHA256 (masterzen-nginx-upload-progress-module-68b3ab3_GH0.tar.gz) = 35b506e57e19e780e01ecc7c3c31a64473c35e4a022f5a3f98092a60cd1c1602 SIZE (masterzen-nginx-upload-progress-module-68b3ab3_GH0.tar.gz) = 17322 SHA256 (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 4404c64e845e19feeb07a37976347987892a8e8680a961f793ff0d3ef96c07f4 SIZE (yaoweibin-nginx_upstream_check_module-9aecf15_GH0.tar.gz) = 130039 SHA256 (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 93f71b7cf0db9c6dbf97e3ee11cf8efbc149946c0949d7abd19c74c7620eea50 SIZE (jaygooby-nginx-upstream-fair-10ecdcf_GH0.tar.gz) = 10433 SHA256 (dvershinin-nginx-sticky-module-ng-2753211_GH0.tar.gz) = e4a533dfa214ea28122301aeebbb1a38e1d1972edb7ee9bc72271c14f2693005 SIZE (dvershinin-nginx-sticky-module-ng-2753211_GH0.tar.gz) = 120676 SHA256 (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 9113f887a8740fe72614ee32f481177d33e9542c3b0625627da19a1c4f3da2cb SIZE (wandenberg-nginx-video-thumbextractor-module-e81f850_GH0.tar.gz) = 2710072 SHA256 (vince2678-mod_zip-5b2604b_GH0.tar.gz) = 4fe63be3b842882494152e586f0b87e73f51bfbfd801b78f033c71a011cba789 SIZE (vince2678-mod_zip-5b2604b_GH0.tar.gz) = 29559 SHA256 (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = b8b9f355c05c0790226512f6732348a2404d48531688a1fc04ce6768163bf462 SIZE (calio-iconv-nginx-module-v0.14_GH0.tar.gz) = 13133 SHA256 (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 7393809d5d8877812da1bd5b5fbd1d8b00bc85e71f2f387c344f007773e49050 SIZE (baysao-nginx-let-module-c1f23aa_GH0.tar.gz) = 20617 SHA256 (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 20c3679199ba7efe1598f03b2fa0b13591226363c8dd7930d7f02702cd5abada SIZE (Taymindis-nginx-link-function-3.2.4_GH0.tar.gz) = 139656 SHA256 (openresty-lua-nginx-module-v0.10.26_GH0.tar.gz) = a75983287a2bdc5e964ace56a51b215dc2ec996639d4916cd393d6ebba94b565 SIZE (openresty-lua-nginx-module-v0.10.26_GH0.tar.gz) = 745785 SHA256 (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 8c2bdbe875e4f5225d0778bfb09a2668f9281d7de6218c7b462a7ba2cee06fe8 SIZE (openresty-memc-nginx-module-v0.19_GH0.tar.gz) = 34654 SHA256 (SpiderLabs-ModSecurity-nginx-v1.0.3_GH0.tar.gz) = 32a42256616cc674dca24c8654397390adff15b888b77eb74e0687f023c8751b SIZE (SpiderLabs-ModSecurity-nginx-v1.0.3_GH0.tar.gz) = 34063 SHA256 (wargio-naxsi-1.6_GH0.tar.gz) = e5920fdd09cae155b89eb21a94a21c029ebfdb056c284130221525be54044aae SIZE (wargio-naxsi-1.6_GH0.tar.gz) = 1116227 SHA256 (libinjection-libinjection-4aa3894_GH0.tar.gz) = ededea133e89e238ef2e60d0d62ef7ef9e741449eed8c5d856007132505bcd5b SIZE (libinjection-libinjection-4aa3894_GH0.tar.gz) = 2218294 SHA256 (nginx-njs-0.8.3_GH0.tar.gz) = 5e1341ee8c1dfce420ea6456475dafa7d5f4b9aed310faca32597cf4d221cfe0 SIZE (nginx-njs-0.8.3_GH0.tar.gz) = 735235 SHA256 (osokin-nginx-otel-8f0857d_GH0.tar.gz) = bbf93813928460bdaf78f752f74ecc6c34d13078e97fdffcaa29dbd8689314fc SIZE (osokin-nginx-otel-8f0857d_GH0.tar.gz) = 30197 SHA256 (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = c69ad4495de7c7883ebc23e1e6c4cc83a4ac6a7fddd4d5c12e49d33b65f7c50b SIZE (konstruxi-ngx_postgres-8aa7359_GH0.tar.gz) = 48544 SHA256 (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 896be99c0cad50218417800a159e43ec088d6b58c099472ed3b3d7f179d6c0ea SIZE (openresty-rds-csv-nginx-module-v0.09_GH0.tar.gz) = 20531 SHA256 (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = eaf18f60e981ea2442a7902689a26eba6cf6f36ebee712feeb1f4429eb654bdc SIZE (openresty-rds-json-nginx-module-v0.15_GH0.tar.gz) = 34744 SHA256 (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = d255571bcfb9939b78099df39cb4d42f174d789aec8c8e5e47b93942b0299438 SIZE (openresty-redis2-nginx-module-v0.15_GH0.tar.gz) = 25471 SHA256 (arut-nginx-rtmp-module-v1.2.2_GH0.tar.gz) = 07f19b7bffec5e357bb8820c63e5281debd45f5a2e6d46b1636d9202c3e09d78 SIZE (arut-nginx-rtmp-module-v1.2.2_GH0.tar.gz) = 519934 SHA256 (openresty-set-misc-nginx-module-3937e7b_GH0.tar.gz) = cb3a4675ab6b8741e5847cf5bc41ee3f6ec5cbceec53188f9ae96e48feea17c5 SIZE (openresty-set-misc-nginx-module-3937e7b_GH0.tar.gz) = 29335 SHA256 (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 95efdb1f6cfd6c32c577707f693eb6795c6f21ae062842bf84fe762d8b842955 SIZE (sflow-nginx-sflow-module-543c72a_GH0.tar.gz) = 29504 SHA256 (nginx-shib-nginx-http-shibboleth-be12df5_GH0.tar.gz) = aff9830b5de78dd9ce32cd2c55c5cf9173c99fe1a1d2190407c96668e7517bab SIZE (nginx-shib-nginx-http-shibboleth-be12df5_GH0.tar.gz) = 23872 SHA256 (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 6ae8abb01a2aff788e75ec68621cb0159148a6f73730a84b30b0bdbc6cdc1758 SIZE (baysao-ngx_slowfs_cache-d011a18_GH0.tar.gz) = 11186 SHA256 (openresty-srcache-nginx-module-be22ac0_GH0.tar.gz) = 5753d1ffe87b5d6f5b7a0696667bb5ff1388738136fdee26ba55bc33f5796061 SIZE (openresty-srcache-nginx-module-be22ac0_GH0.tar.gz) = 51029 SHA256 (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 748b67ceb82b3b843ae915bf7863fd08b7c2427c045e5ec540242d050f7b30d0 SIZE (vozlt-nginx-module-sts-3c10d42_GH0.tar.gz) = 352431 SHA256 (kaltura-nginx-vod-module-1.31_GH0.tar.gz) = ace04201cf2d2b1a3e5e732a22b92225b8ce61a494df9cc7f79d97efface8952 SIZE (kaltura-nginx-vod-module-1.31_GH0.tar.gz) = 470904 SHA256 (vozlt-nginx-module-vts-bf64dbf_GH0.tar.gz) = d2782c75e39cb2ecf68453922b43ab2295adb6a35fa6a0f9c14173f70d22d7b1 SIZE (vozlt-nginx-module-vts-bf64dbf_GH0.tar.gz) = 180394 SHA256 (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = aca454bffcee2476dc92682ebfb8c0378a271fda178be7e945d648419d220758 SIZE (tg123-websockify-nginx-module-c11bc9a_GH0.tar.gz) = 14646 SHA256 (openresty-xss-nginx-module-v0.06_GH0.tar.gz) = 0b12bbc53a41f3e3d6df419c173b8c87434be3e6cd255a8193aa91345a2de6cf SIZE (openresty-xss-nginx-module-v0.06_GH0.tar.gz) = 12448

Collapse this list.


No package information for this port in our database
Sometimes this happens. Not all ports have packages.
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Library dependencies:
  1. libpcre2-8.so : devel/pcre2
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for nginx-devel-1.25.5: DEBUG=off: Build with debugging support DEBUGLOG=off: Enable debug log (--with-debug) DSO=on: Enable dynamic modules support FILE_AIO=on: Enable file aio IPV6=on: Enable IPv6 support NJS=off: Enable javascript (NJS) module NJS_XML=off: Enable XML functionality in NJS module OTEL=off: Enable OpenTELemetry module THREADS=on: Enable threads support WWW=on: Enable html sample files ====> Modules that require HTTP module GOOGLE_PERFTOOLS=off: Enable google perftools module HTTP=on: Enable HTTP module HTTP_ADDITION=on: Enable http_addition module HTTP_AUTH_REQ=on: Enable http_auth_request module HTTP_CACHE=on: Enable http_cache module HTTP_DAV=on: Enable http_webdav module HTTP_DEGRADATION=off: Enable http_degradation module HTTP_FLV=on: Enable http_flv module HTTP_GUNZIP_FILTER=on: Enable http_gunzip_filter module HTTP_GZIP_STATIC=on: Enable http_gzip_static module HTTP_IMAGE_FILTER=off: Enable http_image_filter module HTTP_MP4=on: Enable http_mp4 module HTTP_PERL=off: Enable http_perl module HTTP_RANDOM_INDEX=on: Enable http_random_index module HTTP_REALIP=on: Enable http_realip module HTTP_SECURE_LINK=on: Enable http_secure_link module HTTP_SLICE=on: Enable http_slice module HTTP_SSL=on: Enable http_ssl module HTTP_STATUS=on: Enable http_stub_status module HTTP_SUB=on: Enable http_sub module HTTP_XSLT=off: Enable http_xslt module HTTPV2=on: Enable HTTP/2 protocol support (SSL req.) HTTPV3=on: Enable HTTP/3 protocol support HTTPV3_BORING=off: Use security/boringssl HTTPV3_LSSL=off: Use security/libressl-devel HTTPV3_QTLS=off: Use security/openssl-quictls ====> Modules that require MAIL module MAIL=on: Enable IMAP4/POP3/SMTP proxy module MAIL_IMAP=off: Enable IMAP4 proxy module MAIL_POP3=off: Enable POP3 proxy module MAIL_SMTP=off: Enable SMTP proxy module MAIL_SSL=on: Enable mail_ssl module ====> Modules that require STREAM module STREAM=on: Enable stream module STREAM_REALIP=on: Enable stream_realip module STREAM_SSL=on: Enable stream_ssl module (SSL req.) STREAM_SSL_PREREAD=on: Enable stream_ssl_preread module (SSL req.) ====> Third-party modules AJP=off: 3rd party ajp module AWS_AUTH=off: 3rd party aws auth module BROTLI=off: 3rd party brotli module CACHE_PURGE=off: 3rd party cache_purge module CT=off: 3rd party cert_transparency module (SSL req.) DEVEL_KIT=off: 3rd party Nginx Development Kit module ARRAYVAR=off: 3rd party array_var module DRIZZLE=off: 3rd party drizzle module DYNAMIC_UPSTREAM=off: 3rd party dynamic_upstream module ECHO=off: 3rd party echo module ENCRYPTSESSION=off: 3rd party encrypted_session module FIPS_CHECK=off: 3rd party fips_check module FORMINPUT=off: 3rd party form_input module GRIDFS=off: 3rd party gridfs module HEADERS_MORE=off: 3rd party headers_more module HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module HTTP_AUTH_KRB5=off: 3rd party http_auth_gss module HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module HTTP_AUTH_PAM=off: 3rd party http_auth_pam module HTTP_DAV_EXT=off: 3rd party webdav_ext module HTTP_EVAL=off: 3rd party eval module HTTP_FANCYINDEX=off: 3rd party http_fancyindex module HTTP_FOOTER=off: 3rd party http_footer module HTTP_GEOIP2=off: 3rd party geoip2 module HTTP_IP2LOCATION=off: 3rd party ip2location-nginx module HTTP_IP2PROXY=off: 3rd party ip2proxy-nginx module HTTP_JSON_STATUS=off: 3rd party http_json_status module HTTP_MOGILEFS=off: 3rd party mogilefs module HTTP_NOTICE=off: 3rd party notice module HTTP_PUSH=off: 3rd party push module HTTP_PUSH_STREAM=off: 3rd party push stream module HTTP_REDIS=off: 3rd party http_redis module HTTP_SLICE_AHEAD=off: 3rd party http_slice_ahead module HTTP_SUBS_FILTER=off: 3rd party subs filter module HTTP_TARANTOOL=off: 3rd party tarantool upstream module HTTP_UPLOAD=off: 3rd party upload module HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module HTTP_UPSTREAM_CHECK=off: 3rd party upstream check module HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module HTTP_VIDEO_THUMBEXTRACTOR=off: 3rd party video_thumbextractor module HTTP_ZIP=off: 3rd party http_zip module ICONV=off: 3rd party iconv module LET=off: 3rd party let module LINK=off: 3rd party link function module LUA=off: 3rd party lua module MEMC=off: 3rd party memc (memcached) module MODSECURITY3=off: 3rd party modsecurity3 module NAXSI=off: 3rd party naxsi module PASSENGER=off: 3rd party passenger module POSTGRES=off: 3rd party postgres module RDS_CSV=off: 3rd party rds_csv module RDS_JSON=off: 3rd party rds_json module REDIS2=off: 3rd party redis2 module RTMP=off: 3rd party rtmp module SET_MISC=off: 3rd party set_misc module SFLOW=off: 3rd party sflow module SHIBBOLETH=off: 3rd party shibboleth module SLOWFS_CACHE=off: 3rd party slowfs_cache module SRCACHE=off: 3rd party srcache module STS=off: 3rd party sts module VOD=off: 3rd party vod module VTS=off: 3rd party vts module XSS=off: 3rd party xss module WEBSOCKIFY=off: 3rd party websockify module ====> GSSAPI implementation (imply HTTP_AUTH_KRB5): you can only select none or one of them GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal GSSAPI_MIT=off: GSSAPI support via security/krb5 ===> Use 'make config' to modify these settings
Options name:
www_nginx-devel
USES:
cpe ssl ssl ssl
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (5 items)
Collapse this list.
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  5. https://nginx.org/download/
Collapse this list.

Number of commits found: 1150 (showing only 100 on this page)

[First Page]  «  2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  »  [Last Page]

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
0.8.30
19 Dec 2009 23:05:28
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party http_auth_pam module, version 1.1.
Do not bump PORTREVISIONs.

Spotted by:     Paul Cockings aka dspam at cytringan dot co dot uk
0.8.30
19 Dec 2009 10:56:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update uploadprogress module with patch from github.
Do not bump PORTREVISIONs.

Spotted by:     Vladimir Getmanshchuk aka vladget at openfilm dot com
Requested by:   Brice Figureau aka brice at daysofwonder dot com
                (uploadprogress module author)
0.8.30
17 Dec 2009 11:23:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update Passenger(tm) module from 2.2.7 to 2.2.8.
0.8.30
15 Dec 2009 16:11:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.29 to 0.8.30.

<ChangeLog>

*) Change: now the default buffer size of the
   "large_client_header_buffers" directive is 8K.
   Thanks to Andrew Cholakian.

*) Feature: the conf/fastcgi.conf for simple FastCGI configurations.

*) Bugfix: nginx/Windows tried to rename a temporary file twice if the
   file should replace an already existent file.

*) Bugfix: of "double free or corruption" error issued if host could
   not be resolved; the bug had appeared in 0.8.22.
   Thanks to Konstantin Svist.

*) Bugfix: in libatomic usage on some platforms.
   Thanks to W-Mark Kubacki.

</ChangeLog>
0.8.29
01 Dec 2009 04:22:10
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make uploadprogress module fetchtable (accordingly).

Notice from:    Vladimir Getmanshchuk aka vladget at openfilm dot com
0.8.29
30 Nov 2009 14:12:05
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.28 to 0.8.29.

<ChangeLog>

*) Change: now the "009" status code is written to an access log for
   proxied HTTP/0.9 responses.

*) Feature: the "addition_types", "charset_types", "gzip_types",
   "ssi_types", "sub_filter_types", and "xslt_types" directives support
   an "*" parameter.

*) Feature: GCC 4.1+ built-in atomic operations usage.
   Thanks to W-Mark Kubacki.

*) Feature: the --with-libatomic[=DIR] option in the configure.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.28
26 Nov 2009 06:52:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix upload module bug:
keepalive connection was hanging after upload has been completed.

Do not bump PORTREVISION.
0.8.28
24 Nov 2009 12:08:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.27 to 0.8.28.

<ChangeLog>

*) Bugfix: nginx could not be built with the --without-pcre parameter;
   the bug had appeared in 0.8.25.

</ChangeLog>
0.8.28
24 Nov 2009 11:56:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update (www/nginx and www/nginx-devel):

 passenger module support from 2.2.5 to 2.2.7;
 upload module to 2.0.11;
 uploadprogress module from 0.6 to 0.7.

Remove needless patch.

Also, h264 module distfile re-rolled due moon phase.

Do not bump PORTREVISIONs.
0.8.27
19 Nov 2009 10:09:29
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.24 to 0.8.27.

<ChangeLog>

Changes with nginx 0.8.27

*) Bugfix: regular expressions did work in nginx/Windows; the bug had
   appeared in 0.8.25.

Changes with nginx 0.8.26

*) Bugfix: in captures usage in "rewrite" directive; the bug had
   appeared in 0.8.25.

*) Bugfix: nginx could not be built without the --with-debug option;
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.24
12 Nov 2009 08:20:12
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.22 to 0.8.24.

<ChangeLog>

Changes with nginx 0.8.24

*) Bugfix: nginx always added "Content-Encoding: gzip" response header
   line in 304 responses sent by ngx_http_gzip_static_module.

*) Bugfix: nginx could not be built without the --with-debug option;
   the bug had appeared in 0.8.23.

*) Bugfix: the "unix:" parameter of the "set_real_ip_from" directive
   inherited incorrectly from previous level.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.22
09 Nov 2009 19:51:42
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update h264 (aka http_mp4_h264) module from the dated material to
version 2.2.5 for www/nginx and www/nginx-devel accordingly.

Do not bump PORTREVISIONs.

Requested by:   many
0.8.22
04 Nov 2009 21:24:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add missing library dependence for http_image_filter module for
www/nginx and www/nginx-devel accordingly.

Do not bump PORTREVISIONs.
0.8.22
03 Nov 2009 19:55:53
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.21 to 0.8.22.

<ChangeLog>

*) Feature: the "proxy_bind", "fastcgi_bind", and "memcached_bind"
   directives.

*) Feature: the "access" and the "deny" directives support IPv6.

*) Feature: the "set_real_ip_from" directive supports IPv6 addresses in
   request headers.

*) Feature: the "unix:" parameter of the "set_real_ip_from" directive.

*) Bugfix: nginx did not delete unix domain socket after configuration
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.21
26 Oct 2009 16:05:53
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.20 to 0.8.21.
Illuminate http_image_filter module.

<ChangeLog>

*) Feature: now the "-V" switch shows TLS SNI support.

*) Feature: the "listen" directive of the HTTP module supports unix
   domain sockets.
   Thanks to Hongli Lai.

*) Feature: the "default_server" parameter of the "listen" directive.

*) Feature: now a "default" parameter is not required to set listen
   socket options.

*) Bugfix: nginx did not support dates in 2038 year on 32-bit platforms;

*) Bugfix: socket leak; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.20
14 Oct 2009 17:08:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.19 to 0.8.20.

<ChangeLog>

*) Change: now default SSL ciphers are "HIGH:!ADH:!MD5".

*) Bugfix: the ngx_http_autoindex_module did not show the trailing
   slash in links to a directory; the bug had appeared in 0.7.15.

*) Bugfix: nginx did not close a log file set by the --error-log-path
   configuration option; the bug had appeared in 0.7.53.

*) Bugfix: nginx did not treat a comma as separator in the
   "Cache-Control" backend response header line.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.19
06 Oct 2009 17:20:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.18 to 0.8.19.

<ChangeLog>

*) Change: now SSLv2 protocol is disabled by default.

*) Change: now default SSL ciphers are "ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM".

*) Bugfix: a "limit_req" directive did not work; the bug had appeared
   in 0.8.18.

</ChangeLog>
0.8.18
06 Oct 2009 13:24:22
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.17 to 0.8.18.

<ChangeLog>

*) Feature: the "read_ahead" directive.

*) Feature: now several "perl_modules" directive may be used.

*) Feature: the "limit_req_log_level" and "limit_conn_log_level"
   directives.

*) Bugfix: now "limit_req" directive conforms to the leaky bucket
   algorithm.
   Thanks to Maxim Dounin.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.17
28 Sep 2009 18:11:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.16 to 0.8.17.

Feature safe:   yes

<ChangeLog>

*) Security: now "/../" are disabled in "Destination" request header
   line.

*) Change: now $host variable value is always low case.

*) Feature: the $ssl_session_id variable.

*) Bugfix: socket leak; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.16
22 Sep 2009 19:54:43
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update ngx_http_redis module from 0.1.2 to 0.2.0 accordingly.
Do not bump PORTREVISION.

Feature safe:   yes

<ChangeLog>

*) Feature: the $redis_db variable: now the ngx_http_redis
   module uses the $redis_db variable value as the parameter
   for SELECT command.

*) Cleanup: style/spaces fixes.

</ChangeLog>
0.8.16
22 Sep 2009 17:23:57
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.15 to 0.8.16.

Feature safe:   yes

<ChangeLog>

*) Feature: the "image_filter_transparency" directive.

*) Bugfix: "addition_types" directive was incorrectly named
   "addtion_types".

*) Bugfix: resolver cache poisoning.
   Thanks to Matthew Dempsky.

*) Bugfix: memory leak in resolver.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.15
14 Sep 2009 17:12:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Security update from 0.8.14 to 0.8.15.
Update http_redis module from 0.1.1 to 0.1.2.

<ChangeLog>

*) Security: a segmentation fault might occur in worker process while
   specially crafted request handling.
   Thanks to Chris Ries.

*) Bugfix: if names .domain.tld, .sub.domain.tld, and .domain-some.tld
   were defined, then the name .sub.domain.tld was matched by
   .domain.tld.

*) Bugfix: in transparency support in the ngx_http_image_filter_module.

*) Bugfix: in file AIO.

*) Bugfix: in X-Accel-Redirect usage; the bug had appeared in 0.8.11.

*) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.14
13 Sep 2009 08:42:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update upload_progress module from 0.5 to 0.6.
Remove needless patch.
Do not bump PORTREVISION.

Notice from:    Brice Figureau aka brice at daysofwonder dot com
0.8.14
12 Sep 2009 18:20:23
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Merge new fix existing patch for uploadprogress module for
nginx and nginx-devel accordingly.
Do not bump PORTREVISIONs.

Patch from:     Brice Figureau aka brice at daysofwonder dot com
Tested by:      Vladimir Getmanshchuk aka vladget at openfilm dot com
0.8.14
07 Sep 2009 18:42:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.13 to 0.8.14.

<ChangeLog>

*) Bugfix: an expired cached response might stick in the "UPDATING"
   state.

*) Bugfix: a segmentation fault might occur in worker process, if
   error_log was set to info or debug level.
   Thanks to Sergey Bochenkov.

*) Bugfix: in embedded perl module; the bug had appeared in 0.8.11.

*) Bugfix: an "error_page" directive did not redirect a 413 error; the
   bug had appeared in 0.6.10.

</ChangeLog>
0.8.13
04 Sep 2009 10:37:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger module from 2.2.4 to 2.2.5.

Update mod_zip module from 1.1.4 to 1.1.5.
Also change MASTER_SITE for mod_zip module.

Do not bump PORTREVISION.
0.8.13
31 Aug 2009 16:18:42
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.12 to 0.8.13.

<ChangeLog>

*) Bugfix: in the "aio sendfile" directive. the bug had appeared in
   0.8.12.

*) Bugfix: nginx could not be built without the --with-file-aio option
   on FreeBSD; the bug had appeared in 0.8.12.

</ChangeLog>
0.8.12
31 Aug 2009 13:22:00
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.11 to 0.8.12.
Remove needless vendor patch.

<ChangeLog>

*) Feature: the "sendfile" parameter in the "aio" directive on FreeBSD.

*) Bugfix: in try_files; the bug had appeared in 0.8.11.

*) Bugfix: in memcached; the bug had appeared in 0.8.11.

</ChangeLog>
0.8.11_1
31 Aug 2009 09:48:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add vendor patch for memcached module.
Update nginx_upload module from 2.0.9 to 2.0.10.
Update nginx_http_redis module from 0.1 to 0.1.1.

Bump PORTREVISION.
0.8.11
28 Aug 2009 16:13:10
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.10 to 0.8.11.
Remove needless extra patch.

<ChangeLog>

*) Change: directive "gzip_disable msie6" enables gzipping for
   MSIE 6.0 SV1.

*) Feature: file AIO support on FreeBSD and Linux.

*) Feature: the "directio_alignment" directive.

</ChangeLog>
0.8.10
24 Aug 2009 11:46:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.9 to 0.8.10.

<ChangeLog>

*) Bugfix: memory leaks if GeoIP City database was used.

*) Bugfix: in copying temporary files to permanent storage area; the
   bug had appeared in 0.8.9.

</ChangeLog>
0.8.9
24 Aug 2009 10:02:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add http_redis module support.
Add experimental file aio support.

Do not bump PORTREVISION cause new features are disabled by default.
0.8.9
18 Aug 2009 05:43:08
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.8 to 0.8.9.

<ChangeLog>

*) Feature: now the start cache loader runs in a separate process; this
   should improve large caches handling.

*) Feature: now temporarily files and permanent storage area may reside
   at different file systems.

</ChangeLog>
0.8.8
10 Aug 2009 10:32:38
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.7 to 0.8.8.

<ChangeLog>

*) Bugfix: in handling FastCGI headers split in records.

*) Bugfix: a segmentation fault occurred in worker process, if a
   request was handled in two proxied or FastCGIed locations and a
   caching was enabled in the first location; the bug had appeared in
   0.8.7.

</ChangeLog>
0.8.7
27 Jul 2009 16:56:50
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.6 to 0.8.7.

<ChangeLog>

*) Change: minimum supported OpenSSL version is 0.9.7.

*) Change: the "ask" parameter of the "ssl_verify_client" directive was
   changed to the "optional" parameter and now it checks a client
   certificate if it was offered.
   Thanks to Brice Figureau.

*) Feature: the $ssl_client_verify variable.
   Thanks to Brice Figureau.

*) Feature: the "ssl_crl" directive.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.6
27 Jul 2009 05:59:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update mogilefs module from 1.0.1 to 1.0.2.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: directive mogilefs_methods and support for PUT and
   DELETE methods
*) Feature: dynamic evaluation of tracker name
*) Feature: ability to pass noverify parameter to tracker

</ChangeLog>
0.8.6
21 Jul 2009 13:53:14
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for http_geoip module (introduced in 0.8.6).
Do not bump PORTREVISION.
0.8.6
20 Jul 2009 09:04:55
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.5 to 0.8.6.

Add two new variables NGINX_ACCESSLOG and NGINX_ERRORLOG
to allow log paths customization, i.e.

% make NGINX_ACCESSLOG=/dev/null

NOTE.  If you want nginx to log errors into stderr it's
better to use

% make NGINX_ERRORLOG=stderr

instead of NGINX_ERRORLOG=/dev/stderr to avoid duplicate
error messages during startup.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.8.5
17 Jul 2009 06:12:47
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add two more third-party modules: http_mp4_streaming_lite
and http_notice_module.

Submitted by:   Konrad Lapsz aka konrad dot lapsz at gmail dot com
0.8.5
15 Jul 2009 16:56:10
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
0.8.5
15 Jul 2009 14:09:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Resort options to make third party modules distinguishable.
Apply these changes accordingly for stable and devel versions.
Do not bump PORTREVISIONs.

Submitted by:   Maxim Dounin aka mdounin at mdounin dot ru
0.8.5
15 Jul 2009 14:03:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix whitespaces.
0.8.5
13 Jul 2009 12:19:04
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.4 to 0.8.5.

<ChangeLog>

*) Bugfix: now nginx allows underscores in a request method.

*) Bugfix: a 500 error code was returned for invalid login/password
   while HTTP Basic authentication on Windows.

*) Bugfix: ngx_http_perl_module responses did not work in subrequests.

*) Bugfix: in ngx_http_limit_req_module.
   Thanks to Maxim Dounin.

</ChangeLog>
0.8.4_1
04 Jul 2009 09:47:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Really bump PORTREVISION by fix typo.

Pointy hat to:  osa
0.8.4
02 Jul 2009 10:31:13
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Default stop signal is SIGTERM, the quick shutdown.  Also nginx
understands QUIT signal for graceful (gradual) stop.

Add gracefulstop extra command accordingly for stable and devel
versions.
Bump PORTREVISIONs.

PR:     ports/136232 (partialy)
0.8.4
02 Jul 2009 09:13:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix typo.

Pointy hat to:  osa
0.8.4
02 Jul 2009 09:00:16
Original commit files touched by this commit Sanity Test Failure This port version is marked as vulnerable.
osa search for other commits by this committer
Fix X-Progress-ID argument parsing in third-party uploadprogress module.
Do not bump PORTREVISIONs.

PR:     ports/136064
0.8.4
26 Jun 2009 08:16:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add eval module version 1.0.1 accordingly.
Do not bump PORTREVISIONs.

WWW:    http://www.grid.net.ru/nginx/eval.en.html
0.8.4
22 Jun 2009 15:31:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger module support from 2.2.3 to 2.2.4.
Do not bump PORTREVISIONs.
0.8.4
22 Jun 2009 12:39:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.3 to 0.8.4.
Add WITHOUT_HTTP_CACHE knob.

<ChangeLog>

*) Bugfix: nginx could not be built --without-http-cache; the bug had
   appeared in 0.8.3.

</ChangeLog>
0.8.3
19 Jun 2009 13:48:07
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.2 to 0.8.3.

<ChangeLog>

*) Feature: the $upstream_cache_status variable.

*) Bugfix: nginx could not be built on MacOSX 10.6. the bug had
   appeared in 0.8.2.

*) Bugfix: nginx could not be built --without-http-cache; the bug had
   appeared in 0.8.2.

*) Bugfix: a segmentation fault occurred in worker process, if a
   backend 401 error was intercepted and the backend did not set the
   "WWW-Authenticate" response header line.
   Thanks to Eugene Mychlo.

</ChangeLog>
0.8.2
18 Jun 2009 06:54:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger module support from 2.2.2 to
fresh bug fix edition 2.2.3.
Do not bump PORTREVISIONs.
0.8.2
15 Jun 2009 10:37:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.1 to 0.8.2.

<ChangeLog>

*) Bugfix: in open_file_cache and proxy/fastcgi cache interaction on
   start up.

*) Bugfix: open_file_cache might cache open file descriptors too long.

</ChangeLog>
0.8.1
09 Jun 2009 19:37:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.0 to 0.8.1.

<ChangeLog>

*) Feature: the "updating" parameter in "proxy_cache_use_stale" and
   "fastcgi_cache_use_stale" directives.

*) Bugfix: the "If-Modified-Since", "If-Range", etc. client request
   header lines were passed to backend while caching if no
   "proxy_set_header" directive was used with any parameters.

*) Bugfix: the "Set-Cookie" and "P3P" response header lines were not
   hidden while caching if no "proxy_hide_header/fastcgi_hide_header"
   directives were used with any parameters.

*) Bugfix: the ngx_http_image_filter_module did not support GIF87a
   format.
   Thanks to Denis Ilyinyh.

*) Bugfix: nginx could not be built modules on Solaris 10 and early;
   the bug had appeared in 0.7.56.

</ChangeLog>
0.8.0
03 Jun 2009 12:59:53
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.59 to 0.8.0.
Remove IGNORE cause this is new development version (tree).
Update patch for fancyindex module.

<ChangeLog>

*) Feature: the "keepalive_requests" directive.

*) Feature: the "limit_rate_after" directive.
   Thanks to Ivan Debnar.

*) Bugfix: XLST filter did not work in subrequests.

*) Bugfix: in relative paths handling in nginx/Windows.

*) Bugfix: in proxy_store, fastcgi_store, proxy_cache, and
   fastcgi_cache in nginx/Windows.

*) Bugfix: in memory allocation error handling.
   Thanks to Maxim Dounin and Kirill A. Korinskiy.

</ChangeLog>
0.7.59
28 May 2009 19:48:11
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.6.37 to latest stable version 0.7.59.
Merge all features from -devel port.
Also mark -devel port IGNORE before new releases.
0.7.59
27 May 2009 19:22:37
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.58 to 0.7.59.

<ChangeLog>

*) Feature: the "proxy_cache_methods" and "fastcgi_cache_methods"
   directives.

*) Bugfix: socket leak; the bug had appeared in 0.7.25.
   Thanks to Maxim Dounin.

*) Bugfix: a segmentation fault occurred in worker process,
   if a request had no body and the $request_body variable was used;
   the bug had appeared in 0.7.58.

*) Bugfix: the SSL modules might not built on Solaris and Linux;
   the bug had appeared in 0.7.58.

*) Bugfix: ngx_http_xslt_filter_module responses were not handled by
   SSI, charset, and gzip filters.

*) Bugfix: a "charset" directive did not set a charset to
   ngx_http_gzip_static_module responses.

</ChangeLog>
0.7.58
18 May 2009 13:54:54
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.57 to 0.7.58.

<ChangeLog>

*) Feature: a "listen" directive of the mail proxy module supports IPv6.

*) Feature: the "image_filter_jpeg_quality" directive.

*) Feature: the "client_body_in_single_buffer" directive.

*) Feature: the $request_body variable.

*) Bugfix: in ngx_http_autoindex_module in file name links having a ":"
   symbol in the name.

*) Bugfix: "make upgrade" procedure did not work; the bug had appeared
   in 0.7.53.
   Thanks to Denis F. Latypoff.

</ChangeLog>
0.7.57
12 May 2009 13:05:30
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.56 to 0.7.57.

<ChangeLog>

*) Bugfix: a segmentation fault occurred in worker process, if the
   ngx_http_image_filter_module errors were redirected to named
   location; the bug had appeared in 0.7.56.

</ChangeLog>
0.7.56
12 May 2009 06:51:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.55 to 0.7.56.

<ChangeLog>

*) Feature: nginx/Windows supports IPv6 in a "listen" directive of the
   HTTP module.

*) Bugfix: in ngx_http_image_filter_module.

</ChangeLog>
0.7.55
06 May 2009 11:07:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.54 to 0.7.55.

<ChangeLog>

*) Bugfix: the http_XXX parameters in "proxy_cache_use_stale" and
   "fastcgi_cache_use_stale" directives did not work.

*) Bugfix: fastcgi cache did not cache header only responses.

*) Bugfix: of "select() failed (9: Bad file descriptor)" error in
   nginx/Unix and "select() failed (10022: ...)" error in nginx/Windows.

*) Bugfix: a segmentation fault might occur in worker process, if an
   "debug_connection" directive was used; the bug had appeared in
   0.7.54.

*) Bugfix: fix ngx_http_image_filter_module building errors.

*) Bugfix: the files bigger than 2G could not be transferred using
   $r->sendfile.
   Thanks to Maxim Dounin.

</ChangeLog>
0.7.54
04 May 2009 05:51:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.53 to 0.7.54.

<ChangeLog>

*) Feature: the ngx_http_image_filter_module.

*) Feature: the "proxy_ignore_headers" and "fastcgi_ignore_headers"
   directives.

*) Bugfix: a segmentation fault might occur in worker process, if an
   "open_file_cache_errors off" directive was used; the bug had
   appeared in 0.7.53.

*) Bugfix: the "port_in_redirect off" directive did not work; the bug
   had appeared in 0.7.39.

*) Bugfix: improve handling of "select" method errors.

*) Bugfix: of "select() failed (10022: ...)" error in nginx/Windows.

*) Bugfix: in error text descriptions in nginx/Windows; the bug had
   appeared in 0.7.53.

</ChangeLog>
0.7.53
30 Apr 2009 12:47:46
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Keep -DPASSENGER_DEBUG flag for third-party passenger module. [*]
Other way respect CXXFLAGS.
Do not bump PORTREVISION.

[*] Notice from:        Hongli Lai aka hongli at plan99 dot net
0.7.53
28 Apr 2009 10:58:45
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party passenger module from 2.2.1 to 2.2.2.
Do not bump PORTREVISION.
0.7.53
27 Apr 2009 14:16:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.52 to 0.7.53.
Respect compile/build flags for thirdparty passenger module.

<ChangeLog>

*) Change: now a log set by --error-log-path is created from the very
   start-up.

*) Feature: now the start up errors and warnings are outputted to an
   error_log and stderr.

*) Feature: the empty --prefix= configure parameter forces nginx to use
   a directory where it was run as prefix.

*) Feature: the -p switch.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.52
23 Apr 2009 08:59:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make third-party fancyindex module fetchable through place
tarball to MASTER_SITE_LOCAL.
Fix build third-party passenger module by add
bsd.port.options.mk and USE_RUBY.
Do not bump PORTREVISION.

Special thanks to:      pav, stas
0.7.52
21 Apr 2009 11:37:33
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.51 to 0.7.52.
Update third-party upload module from 2.0.8 to 2.0.9 and remove
needless extra patch.

Add support for third-party modules:
 o Phusion Passenger(tm) 2.2.1
 o mogilefs 1.0.1

<nginx development ChangeLog>

*) Feature: the first native Windows binary release.

*) Bugfix: in processing HEAD method while caching.

*) Bugfix: in processing the "If-Modified-Since", "If-Range", etc.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.51
13 Apr 2009 06:49:31
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Force commit due to note add in previous commit third-party
module uploadprogress.

Pointy hat to:  osa
0.7.51
13 Apr 2009 06:05:49
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.50 to 0.7.51.

<ChangeLog>

*) Feature: the "try_files" directive supports a response code in the
   fallback parameter.

*) Feature: now any response code can be used in the "return" directive.

*) Bugfix: the "error_page" directive made an external redirect without
   query string; the bug had appeared in 0.7.44.

*) Bugfix: if servers listened on several defined explicitly addresses,
   then virtual servers might not work; the bug had appeared in 0.7.39.

</ChangeLog>
0.7.50
07 Apr 2009 10:10:47
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Fix MASTER_SITE_SUBDIR for upstream_fair module.
Do not bump PORTREVISION.

Notice from:    Gergely CZUCZY <gergely.czuczy@harmless.hu>
0.7.50
06 Apr 2009 14:04:06
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.47 to 0.7.50.
Add third-party upstream fair module. [*]

[*] Requested by:       Gergely CZUCZY <gergely.czuczy@harmless.hu>
[*] Redistribution OK:  Grzegorz Nosek <root@localdomain.pl> (author)

<ChangeLog>

Changes with nginx 0.7.50

*) Bugfix: the $arg_... variables did not work; the bug had appeared
   in 0.7.49.

Changes with nginx 0.7.49
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.47
01 Apr 2009 17:30:01
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.45 to 0.7.47.

<ChangeLog>

*) Bugfix: nginx could not be built on FreeBSD 6 and early versions;
   the bug had appeared in 0.7.46.

*) Bugfix: nginx could not be built on MacOSX; the bug had
   appeared in 0.7.46.

*) Bugfix: if the "max_size" parameter was set, then the cache manager
   might purge a whole cache; the bug had appeared in 0.7.46.

*) Change: a segmentation fault might occur in worker process, if the
   "proxy_cache"/"fastcgi_cache" and the "proxy_cache_valid"/
   "fastcgi_cache_valid" were set on different levels; the bug had
   appeared in 0.7.46.

*) Bugfix: a segmentation fault might occur in worker process, if a
   request was redirected to a proxied or FastCGI server via error_page
   or try_files; the bug had appeared in 0.7.44.

</ChangeLog>
0.7.45
31 Mar 2009 13:56:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make additional modules fetchable.
Do not bump PORTREVISION cause additional modules
are disabled by default.

Problem found:  Andrew Clark aka andrewclarkii at gmail dot com
Patch idea:     az
No cookie for:  az
0.7.45
30 Mar 2009 10:29:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.44 to 0.7.45.

<ChangeLog>

*) Change: now the "proxy_cache" and the "proxy_cache_valid"
   can be set on different levels.

*) Change: the "clean_time" parameter of the "proxy_cache_path"
   directive is canceled.

*) Feature: the "max_size" parameter of the "proxy_cache_path"
   directive.

*) Feature: the ngx_http_fastcgi_module preliminary cache support.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.44
26 Mar 2009 14:03:41
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for http_gzip_static module.
Do not bump PORTREVISION.

Patch from:     MZ aka zuborg at advancedhosters dot com
0.7.44
24 Mar 2009 15:07:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make modules fetchable by fix MASTER_SITES.
Do not bump PORTREVISION cause modules are disabled by default.

Problem and fix found by:       az
0.7.44
24 Mar 2009 10:15:07
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.43 to 0.7.44.
Add MAKE_JOBS_SAFE.
Add quick fix for nginx_upload_module due to changes in
ngx_conf_merge_path_value() function.

<ChangeLog>

*) Feature: the ngx_http_proxy_module preliminary cache support.

*) Feature: the --with-pcre option in the configure.

*) Feature: the "try_files" directive is now allowed on the server
   block level.

*) Bugfix: the "try_files" directive handled incorrectly a query string
   in a fallback parameter.

*) Bugfix: the "try_files" directive might test incorrectly directories.

*) Bugfix: if there is the single server for given address:port pair,
   then captures in regular expressions in a "server_name" directive
   did not work.

</ChangeLog>
0.7.43
18 Mar 2009 13:18:14
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.42 to 0.7.43.

<ChangeLog>

*) Bugfix: a request was handled incorrectly, if a "root" directive
   used variables; the bug had appeared in 0.7.42.

*) Bugfix: if a server listened on wildcard address, then the
   $server_addr variable value was "0.0.0.0"; the bug had appeared in
   0.7.36.

</ChangeLog>
0.7.42
16 Mar 2009 08:57:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.41 to 0.7.42.

<ChangeLog>

*) Change: now the "Invalid argument" error returned by
   setsockopt(TCP_NODELAY) on Solaris, is ignored.

*) Change: now if a file specified in a "auth_basic_user_file"
   directive is absent, then the 405 error is returned instead of the
   500 one.

*) Feature: the "auth_basic_user_file" directive supports variables.
   Thanks to Kirill A. Korinskiy.

*) Feature: the "listen" directive supports the "ipv6only" parameter.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.41
11 Mar 2009 15:57:27
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.40 to 0.7.41.

<ChangeLog>

*) Bugfix: a segmentation fault might occur in worker process, if a
   "server_name" or a "location" directives had captures in regular
   expressions; the issue had appeared in 0.7.40.
   Thanks to Vladimir Sopot.

</ChangeLog>
0.7.40
10 Mar 2009 09:43:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.39 to 0.7.40.

<ChangeLog>

*) Feature: the "location" directive supports captures in regular
   expressions.

*) Feature: an "alias" directive with capture references may be used
   inside a location given by a regular expression with captures.

*) Feature: the "server_name" directive supports captures in regular
   expressions.

*) Workaround: the ngx_http_autoindex_module did not show the trailing
   slash in directories on XFS filesystem; the issue had appeared in
   0.7.15.
   Thanks to Dmitry Kuzmenko.

</ChangeLog>
0.7.39
05 Mar 2009 18:11:52
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update HTTP_RESPONSE module from 0.2 to 0.3.
Change build schema from patch to distro.
Do not bump PORTREVISION.

Notice from:    Kirill A. Korinskiy aka catap at catap dot ru [author]
0.7.39
02 Mar 2009 13:06:51
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.38 to 0.7.39.
Add IPv6 support (introduced in 0.7.36).

<ChangeLog>

*) Bugfix: large response with SSI might hang, if gzipping was enabled;
   the bug had appeared in 0.7.28.
   Thanks to Artem Bokhan.

*) Bugfix: a segmentation fault might occur in worker process, if short
   static variants are used in a "try_files" directive.

</ChangeLog>
0.7.38
24 Feb 2009 09:14:24
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.35 to 0.7.38.

<ChangeLog>

Changes with nginx 0.7.38

*) Feature: authentication failures logging.

*) Bugfix: name/password in auth_basic_user_file were ignored after odd
   number of empty lines.
   Thanks to Alexander Zagrebin.

*) Bugfix: a segmentation fault occurred in a master process, if long
   path was used in unix domain socket; the bug had appeared in 0.7.36.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.35
16 Feb 2009 15:11:15
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.34 to 0.7.35.

<ChangeLog>

*) Bugfix: a "ssl_engine" directive did not use a SSL-accelerator for
   asymmetric ciphers.
   Thanks to Marcin Gozdalik.

*) Bugfix: a "try_files" directive set MIME type depending on an
   original request extension.

*) Bugfix: "*domain.tld" names were handled incorrectly in
   "server_name", "valid_referers", and "map" directives, if an
   ".domain.tld" and ".subdomain.domain.tld" wildcards were used;
   the bug had appeared in 0.7.9.

</ChangeLog>
0.7.34
10 Feb 2009 19:42:17
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.33 to 0.7.34.

<ChangeLog>

*) Feature: the "off" parameter of the "if_modified_since" directive.

*) Feature: now nginx sends an HELO/EHLO command after a XCLIENT
   command.
   Thanks to Maxim Dounin.

*) Feature: Microsoft specific "AUTH LOGIN with User Name" mode support
   in mail proxy server.
   Thanks to Maxim Dounin.

*) Bugfix: in a redirect rewrite directive original arguments were
   concatenated with new arguments by an "?" rather than an "&";
   the bug had appeared in 0.1.18.
   Thanks to Maxim Dounin.

*) Bugfix: nginx could not be built on AIX.

</ChangeLog>
0.7.33
10 Feb 2009 19:30:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add zip module (mod_zip-1.1.4) support.
Do not bump PORTREVISION.

Thanks to:      Evan Miller (http://www.evanmiller.org/) [author]
0.7.33
09 Feb 2009 07:11:29
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Add fancyindex module support. [1]
Make fancyindex module linkable for 0.7.X. [2]
Do not bump PORTREVISION.

Spotted by:     Rafal Szkodzinski <uid at atnus dot com> [1]
Obtained from:  Russian nginx maillist <nginx-ru at sysoev dot ru> [2]
Author:         Sergey Bochenkov <bachan at j3qq4 dot org> [2]
0.7.33
09 Feb 2009 06:58:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Make accesskey module fetchable by fix MASTER_SITE_SUBDIR.
Do not bump PORTREVISION.
0.7.33
02 Feb 2009 13:15:45
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.32 to 0.7.33.

[*] Add support for http_accesskey module from
http://wiki.codemongers.com/NginxHttpAccessKeyModule.

[*] Spotted by: Andrey Belashkov aka manager at capsida dot net

<ChangeLog>

*) Bugfix: a double response might be returned if the epoll or rtsig
   methods are used and a redirect was returned to a request with
   body.
   Thanks to Eden Li.

*) Bugfix: the $sent_http_location variable was empty for some
   redirects types.

*) Bugfix: a segmentation fault might occur in worker process if
   "resolver" directive was used in SMTP proxy.

</ChangeLog>
0.7.32
27 Jan 2009 09:43:16
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.31 to 0.7.32.

<ChangeLog>

*) Feature: now a directory existence testing can be set explicitly in
   the "try_files" directive.

*) Bugfix: fastcgi_store stored files not always.

*) Bugfix: in geo ranges.

*) Bugfix: in shared memory allocations if nginx was built without
   debugging.
   Thanks to Andrey Kvasov.

</ChangeLog>
0.7.31
20 Jan 2009 11:41:19
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.30 to 0.7.31.

<ChangeLog>

*) Change: now the "try_files" directive tests files only and ignores
   directories.

*) Feature: the "fastcgi_split_path_info" directive.

*) Bugfixes in an "Expect" request header line support.

*) Bugfixes in geo ranges.

*) Bugfix: in a miss case ngx_http_memcached_module returned the "END"
   line as response body instead of default 404 page body; the bug had
   appeared in 0.7.18.
   Thanks to Maxim Dounin.

*) Bugfix: while SMTP proxying nginx issued message "250 2.0.0 OK"
   instead of "235 2.0.0 OK"; the bug had appeared in 0.7.22.
   Thanks to Maxim Dounin.

</ChangeLog>
0.7.30
29 Dec 2008 09:31:11
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update http_response module from 0.1 to 0.2.

Requested by:   Kirill A. Korinskiy <catap at catap dot ru> (author)
0.7.30
25 Dec 2008 07:28:02
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.28 to 0.7.30.

<ChangeLog>

Changes with nginx 0.7.30

*) Bugfix: a segmentation fault occurred in worker process, if
   variables were used in the "fastcgi_pass" and "proxy_pass"
   directives and host name must be resolved; the bug had appeared in
   0.7.29.

Changes with nginx 0.7.29

*) Bugfix: the "fastcgi_pass" and "proxy_pass" directives did not
   support variables if unix domain sockets were used.

*) Bugfixes in subrequest processing; the bugs had appeared in 0.7.25.

*) Bugfix: a "100 Continue" response was issued for HTTP/1.0 requests;
   Thanks to Maxim Dounin.

*) Bugfix: in memory allocation in the ngx_http_gzip_filter_module on
   Cygwin.

</ChangeLog>
0.7.28
22 Dec 2008 13:38:40
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.27 to 0.7.28.

<ChangeLog>

*) Change: in memory allocation in the ngx_http_gzip_filter_module.

*) Change: the default "gzip_buffers" directive values have been
   changed to 32 4k or 16 8k from 4 4k/8k.

</ChangeLog>
0.7.27
22 Dec 2008 07:57:32
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update nginx upload module from 2.0.7 to 2.0.8.
Do not bump PORTREVISION.

<ChangeLog>

 Change: support for named locations
 Fixed bug: crash on missing Content-Type request header
 Fixed bug: compilation problem on amd 64

</ChangeLog>
0.7.27
15 Dec 2008 12:09:56
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.26 to 0.7.27.

<ChangeLog>

*) Feature: the "try_files" directive.

*) Feature: variables support in the "fastcgi_pass" directive.

*) Feature: now the $geo variable may get an address from a variable.
   Thanks to Andrei Nigmatulin.

*) Feature: now a location's modifier may be used without space before
   name.

*) Feature: the $upstream_response_length variable.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.7.26
09 Dec 2008 11:20:49
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.24 to 0.7.26.

<ChangeLog>

Changes with nginx 0.7.26

*) Bugfix: in subrequest processing; the bug had appeared in 0.7.25.

Changes with nginx 0.7.25

*) Change: in subrequest processing.

*) Change: now POSTs without "Content-Length" header line are allowed.

*) Bugfix: now the "limit_req" and "limit_conn" directives log a
   prohibition reason.

*) Bugfix: in the "delete" parameter of the "geo" directive.

</ChangeLog>
0.7.24
03 Dec 2008 08:32:35
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.22 to 0.7.24.

<ChangeLog>

Changes with nginx 0.7.24

*) Feature: the "if_modified_since" directive.

*) Bugfix: nginx did not process a FastCGI server response, if the
   server send too many messages to stderr before response.

*) Bugfix: the "$cookie_..." variables did not work in the SSI and the
   perl module.

Changes with nginx 0.7.23

*) Feature: the "delete" and "ranges" parameters in the "geo" directive.

*) Feature: speeding up loading of geo base with large number of values.

*) Feature: decrease of memory required for geo base load.

</ChangeLog>
0.7.22
21 Nov 2008 07:53:34
Original commit files touched by this commit This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.21 to 0.7.22.

<ChangeLog>

*) Feature: the "none" parameter in the "smtp_auth" directive.
   Thanks to Maxim Dounin.

*) Feature: the "$cookie_..." variables.

*) Bugfix: the "directio" directive did not work in XFS filesystem.

*) Bugfix: the resolver did not understand big DNS responses.
   Thanks to Zyb.

</ChangeLog>

Number of commits found: 1150 (showing only 100 on this page)

[First Page]  «  2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  »  [Last Page]