head 1.2; access; symbols pkgsrc-2026Q1:1.2.0.80 pkgsrc-2026Q1-base:1.2 pkgsrc-2025Q4:1.2.0.78 pkgsrc-2025Q4-base:1.2 pkgsrc-2025Q3:1.2.0.76 pkgsrc-2025Q3-base:1.2 pkgsrc-2025Q2:1.2.0.74 pkgsrc-2025Q2-base:1.2 pkgsrc-2025Q1:1.2.0.72 pkgsrc-2025Q1-base:1.2 pkgsrc-2024Q4:1.2.0.70 pkgsrc-2024Q4-base:1.2 pkgsrc-2024Q3:1.2.0.68 pkgsrc-2024Q3-base:1.2 pkgsrc-2024Q2:1.2.0.66 pkgsrc-2024Q2-base:1.2 pkgsrc-2024Q1:1.2.0.64 pkgsrc-2024Q1-base:1.2 pkgsrc-2023Q4:1.2.0.62 pkgsrc-2023Q4-base:1.2 pkgsrc-2023Q3:1.2.0.60 pkgsrc-2023Q3-base:1.2 pkgsrc-2023Q2:1.2.0.58 pkgsrc-2023Q2-base:1.2 pkgsrc-2023Q1:1.2.0.56 pkgsrc-2023Q1-base:1.2 pkgsrc-2022Q4:1.2.0.54 pkgsrc-2022Q4-base:1.2 pkgsrc-2022Q3:1.2.0.52 pkgsrc-2022Q3-base:1.2 pkgsrc-2022Q2:1.2.0.50 pkgsrc-2022Q2-base:1.2 pkgsrc-2022Q1:1.2.0.48 pkgsrc-2022Q1-base:1.2 pkgsrc-2021Q4:1.2.0.46 pkgsrc-2021Q4-base:1.2 pkgsrc-2021Q3:1.2.0.44 pkgsrc-2021Q3-base:1.2 pkgsrc-2021Q2:1.2.0.42 pkgsrc-2021Q2-base:1.2 pkgsrc-2021Q1:1.2.0.40 pkgsrc-2021Q1-base:1.2 pkgsrc-2020Q4:1.2.0.38 pkgsrc-2020Q4-base:1.2 pkgsrc-2020Q3:1.2.0.36 pkgsrc-2020Q3-base:1.2 pkgsrc-2020Q2:1.2.0.32 pkgsrc-2020Q2-base:1.2 pkgsrc-2020Q1:1.2.0.12 pkgsrc-2020Q1-base:1.2 pkgsrc-2019Q4:1.2.0.34 pkgsrc-2019Q4-base:1.2 pkgsrc-2019Q3:1.2.0.30 pkgsrc-2019Q3-base:1.2 pkgsrc-2019Q2:1.2.0.28 pkgsrc-2019Q2-base:1.2 pkgsrc-2019Q1:1.2.0.26 pkgsrc-2019Q1-base:1.2 pkgsrc-2018Q4:1.2.0.24 pkgsrc-2018Q4-base:1.2 pkgsrc-2018Q3:1.2.0.22 pkgsrc-2018Q3-base:1.2 pkgsrc-2018Q2:1.2.0.20 pkgsrc-2018Q2-base:1.2 pkgsrc-2018Q1:1.2.0.18 pkgsrc-2018Q1-base:1.2 pkgsrc-2017Q4:1.2.0.16 pkgsrc-2017Q4-base:1.2 pkgsrc-2017Q3:1.2.0.14 pkgsrc-2017Q3-base:1.2 pkgsrc-2017Q2:1.2.0.10 pkgsrc-2017Q2-base:1.2 pkgsrc-2017Q1:1.2.0.8 pkgsrc-2017Q1-base:1.2 pkgsrc-2016Q4:1.2.0.6 pkgsrc-2016Q4-base:1.2 pkgsrc-2016Q3:1.2.0.4 pkgsrc-2016Q3-base:1.2 pkgsrc-2016Q2:1.2.0.2 pkgsrc-2016Q2-base:1.2 pkgsrc-2016Q1:1.1.0.22 pkgsrc-2016Q1-base:1.1 pkgsrc-2015Q4:1.1.0.20 pkgsrc-2015Q4-base:1.1 pkgsrc-2015Q3:1.1.0.18 pkgsrc-2015Q3-base:1.1 pkgsrc-2015Q2:1.1.0.16 pkgsrc-2015Q2-base:1.1 pkgsrc-2015Q1:1.1.0.14 pkgsrc-2015Q1-base:1.1 pkgsrc-2014Q4:1.1.0.12 pkgsrc-2014Q4-base:1.1 pkgsrc-2014Q3:1.1.0.10 pkgsrc-2014Q3-base:1.1 pkgsrc-2014Q2:1.1.0.8 pkgsrc-2014Q2-base:1.1 pkgsrc-2014Q1:1.1.0.6 pkgsrc-2014Q1-base:1.1 pkgsrc-2013Q4:1.1.0.4 pkgsrc-2013Q4-base:1.1 pkgsrc-2013Q3:1.1.0.2; locks; strict; comment @# @; 1.2 date 2016.06.15.14.53.48; author fhajny; state Exp; branches; next 1.1; commitid bBc0m00eb1SYxzaz; 1.1 date 2013.12.05.15.04.06; author imil; state Exp; branches 1.1.2.1; next ; commitid A03dLDAAGx1WhXfx; 1.1.2.1 date 2013.12.05.15.04.06; author schnoebe; state dead; branches; next 1.1.2.2; commitid ktiMY53fRwigbYfx; 1.1.2.2 date 2013.12.05.17.45.04; author schnoebe; state Exp; branches; next ; commitid ktiMY53fRwigbYfx; desc @@ 1.2 log @Update www/nginx-devel to 1.11.1. Changes with nginx 1.11.1 - Security: a segmentation fault might occur in a worker process while writing a specially crafted request body to a temporary file (CVE-2016-4450); the bug had appeared in 1.3.9. Changes with nginx 1.11.0 - Feature: the "transparent" parameter of the "proxy_bind", "fastcgi_bind", "memcached_bind", "scgi_bind", and "uwsgi_bind" directives. - Feature: the $request_id variable. - Feature: the "map" directive supports combinations of multiple variables as resulting values. - Feature: now nginx checks if EPOLLRDHUP events are supported by kernel, and optimizes connection handling accordingly if the "epoll" method is used. - Feature: the "ssl_certificate" and "ssl_certificate_key" directives can be specified multiple times to load certificates of different types (for example, RSA and ECDSA). - Feature: the "ssl_ecdh_curve" directive now allows specifying a list of curves when using OpenSSL 1.0.2 or newer; by default a list built into OpenSSL is used. - Change: to use DHE ciphers it is now required to specify parameters using the "ssl_dhparam" directive. - Feature: the $proxy_protocol_port variable. - Feature: the $realip_remote_port variable in the ngx_http_realip_module. - Feature: the ngx_http_realip_module is now able to set the client port in addition to the address. - Change: the "421 Misdirected Request" response now used when rejecting requests to a virtual server different from one negotiated during an SSL handshake; this improves interoperability with some HTTP/2 clients when using client certificates. - Change: HTTP/2 clients can now start sending request body immediately; the "http2_body_preread_size" directive controls size of the buffer used before nginx will start reading client request body. - Bugfix: cached error responses were not updated when using the "proxy_cache_bypass" directive. Changes with nginx 1.9.15 - Bugfix: "recv() failed" errors might occur when using HHVM as a FastCGI server. - Bugfix: when using HTTP/2 and the "limit_req" or "auth_request" directives a timeout or a "client violated flow control" error might occur while reading client request body; the bug had appeared in 1.9.14. - Workaround: a response might not be shown by some browsers if HTTP/2 was used and client request body was not fully read; the bug had appeared in 1.9.14. - Bugfix: connections might hang when using the "aio threads" directive. Thanks to Mindaugas Rasiukevicius. Changes with nginx 1.9.14 - Feature: OpenSSL 1.1.0 compatibility. - Feature: the "proxy_request_buffering", "fastcgi_request_buffering", "scgi_request_buffering", and "uwsgi_request_buffering" directives now work with HTTP/2. - Bugfix: "zero size buf in output" alerts might appear in logs when using HTTP/2. - Bugfix: the "client_max_body_size" directive might work incorrectly when using HTTP/2. - Bugfix: of minor bugs in logging. Changes with nginx 1.9.13 - Change: non-idempotent requests (POST, LOCK, PATCH) are no longer passed to the next server by default if a request has been sent to a backend; the "non_idempotent" parameter of the "proxy_next_upstream" directive explicitly allows retrying such requests. - Feature: the ngx_http_perl_module can be built dynamically. - Feature: UDP support in the stream module. - Feature: the "aio_write" directive. - Feature: now cache manager monitors number of elements in caches and tries to avoid cache keys zone overflows. - Bugfix: "task already active" and "second aio post" alerts might appear in logs when using the "sendfile" and "aio" directives with subrequests. - Bugfix: "zero size buf in output" alerts might appear in logs if caching was used and a client closed a connection prematurely. - Bugfix: connections with clients might be closed needlessly if caching was used. Thanks to Justin Li. - Bugfix: nginx might hog CPU if the "sendfile" directive was used on Linux or Solaris and a file being sent was changed during sending. - Bugfix: connections might hang when using the "sendfile" and "aio threads" directives. - Bugfix: in the "proxy_pass", "fastcgi_pass", "scgi_pass", and "uwsgi_pass" directives when using variables. Thanks to Piotr Sikora. - Bugfix: in the ngx_http_sub_filter_module. - Bugfix: if an error occurred in a cached backend connection, the request was passed to the next server regardless of the proxy_next_upstream directive. - Bugfix: "CreateFile() failed" errors when creating temporary files on Windows. Changes with nginx 1.9.12 - Feature: Huffman encoding of response headers in HTTP/2. Thanks to Vlad Krasnov. - Feature: the "worker_cpu_affinity" directive now supports more than 64 CPUs. - Bugfix: compatibility with 3rd party C++ modules; the bug had appeared in 1.9.11. Thanks to Piotr Sikora. - Bugfix: nginx could not be built statically with OpenSSL on Linux; the bug had appeared in 1.9.11. - Bugfix: the "add_header ... always" directive with an empty value did not delete "Last-Modified" and "ETag" header lines from error responses. - Workaround: "called a function you should not call" and "shutdown while in init" messages might appear in logs when using OpenSSL 1.0.2f. - Bugfix: invalid headers might be logged incorrectly. - Bugfix: socket leak when using HTTP/2. - Bugfix: in the ngx_http_v2_module. Changes with nginx 1.9.11 - Feature: TCP support in resolver. - Feature: dynamic modules. - Bugfix: the $request_length variable did not include size of request headers when using HTTP/2. - Bugfix: in the ngx_http_v2_module. @ text @$NetBSD: patch-auto_install,v 1.1 2013/12/05 15:04:06 imil Exp $ Do not create PID directory. --- auto/install.orig 2016-05-31 13:43:50.000000000 +0000 +++ auto/install @@@@ -148,9 +148,6 @@@@ install: build $NGX_INSTALL_PERL_MODULES || cp conf/nginx.conf '\$(DESTDIR)$NGX_CONF_PATH' cp conf/nginx.conf '\$(DESTDIR)$NGX_CONF_PREFIX/nginx.conf.default' - test -d '\$(DESTDIR)`dirname "$NGX_PID_PATH"`' \\ - || mkdir -p '\$(DESTDIR)`dirname "$NGX_PID_PATH"`' - test -d '\$(DESTDIR)`dirname "$NGX_HTTP_LOG_PATH"`' \\ || mkdir -p '\$(DESTDIR)`dirname "$NGX_HTTP_LOG_PATH"`' @ 1.1 log @Updated to nginx 1.5.7 Changes with nginx 1.5.7 19 Nov 2013 *) Security: a character following an unescaped space in a request line was handled incorrectly (CVE-2013-4547); the bug had appeared in 0.8.41. Thanks to Ivan Fratric of the Google Security Team. *) Change: a logging level of auth_basic errors about no user/password provided has been lowered from "error" to "info". *) Feature: the "proxy_cache_revalidate", "fastcgi_cache_revalidate", "scgi_cache_revalidate", and "uwsgi_cache_revalidate" directives. *) Feature: the "ssl_session_ticket_key" directive. Thanks to Piotr Sikora. *) Bugfix: the directive "add_header Cache-Control ''" added a "Cache-Control" response header line with an empty value. *) Bugfix: the "satisfy any" directive might return 403 error instead of 401 if auth_request and auth_basic directives were used. Thanks to Jan Marc Hoffmann. *) Bugfix: the "accept_filter" and "deferred" parameters of the "listen" directive were ignored for listen sockets created during binary upgrade. Thanks to Piotr Sikora. *) Bugfix: some data received from a backend with unbufferred proxy might not be sent to a client immediately if "gzip" or "gunzip" directives were used. Thanks to Yichun Zhang. *) Bugfix: in error handling in ngx_http_gunzip_filter_module. *) Bugfix: responses might hang if the ngx_http_spdy_module was used with the "auth_request" directive. *) Bugfix: memory leak in nginx/Windows. Changes with nginx 1.5.6 01 Oct 2013 *) Feature: the "fastcgi_buffering" directive. *) Feature: the "proxy_ssl_protocols" and "proxy_ssl_ciphers" directives. Thanks to Piotr Sikora. *) Feature: optimization of SSL handshakes when using long certificate chains. *) Feature: the mail proxy supports SMTP pipelining. *) Bugfix: in the ngx_http_auth_basic_module when using "$apr1$" password encryption method. Thanks to Markus Linnala. *) Bugfix: in MacOSX, Cygwin, and nginx/Windows incorrect location might be used to process a request if locations were given using characters in different cases. *) Bugfix: automatic redirect with appended trailing slash for proxied locations might not work. *) Bugfix: in the mail proxy server. *) Bugfix: in the ngx_http_spdy_module. Changes with nginx 1.5.5 17 Sep 2013 *) Change: now nginx assumes HTTP/1.0 by default if it is not able to detect protocol reliably. *) Feature: the "disable_symlinks" directive now uses O_PATH on Linux. *) Feature: now nginx uses EPOLLRDHUP events to detect premature connection close by clients if the "epoll" method is used. *) Bugfix: in the "valid_referers" directive if the "server_names" parameter was used. *) Bugfix: the $request_time variable did not work in nginx/Windows. *) Bugfix: in the "image_filter" directive. Thanks to Lanshun Zhou. *) Bugfix: OpenSSL 1.0.1f compatibility. Thanks to Piotr Sikora. Changes with nginx 1.5.4 27 Aug 2013 *) Change: the "js" extension MIME type has been changed to "application/javascript"; default value of the "charset_types" directive was changed accordingly. *) Change: now the "image_filter" directive with the "size" parameter returns responses with the "application/json" MIME type. *) Feature: the ngx_http_auth_request_module. *) Bugfix: a segmentation fault might occur on start or during reconfiguration if the "try_files" directive was used with an empty parameter. *) Bugfix: memory leak if relative paths were specified using variables in the "root" or "auth_basic_user_file" directives. *) Bugfix: the "valid_referers" directive incorrectly executed regular expressions if a "Referer" header started with "https://". Thanks to Liangbin Li. *) Bugfix: responses might hang if subrequests were used and an SSL handshake error happened during subrequest processing. Thanks to Aviram Cohen. *) Bugfix: in the ngx_http_autoindex_module. *) Bugfix: in the ngx_http_spdy_module. @ text @d1 1 a1 1 $NetBSD$ d5 1 a5 1 --- auto/install.orig 2013-11-19 10:03:47.000000000 +0000 d7 1 a7 1 @@@@ -141,9 +141,6 @@@@ install: $NGX_OBJS${ngx_dirsep}nginx${ng d11 1 a11 1 - test -d '\$(DESTDIR)`dirname "$NGX_PID_PATH"`' \ d14 2 a15 2 test -d '\$(DESTDIR)`dirname "$NGX_HTTP_LOG_PATH"`' || \ mkdir -p '\$(DESTDIR)`dirname "$NGX_HTTP_LOG_PATH"`' @ 1.1.2.1 log @file patch-auto_install was added on branch pkgsrc-2013Q3 on 2013-12-05 17:45:04 +0000 @ text @d1 16 @ 1.1.2.2 log @pullup to pkgsrc-2013Q3, resolves ticket #4263 Updated to nginx 1.5.7 Changes with nginx 1.5.7 19 Nov 2013 *) Security: a character following an unescaped space in a request line was handled incorrectly (CVE-2013-4547); the bug had appeared in 0.8.41. Thanks to Ivan Fratric of the Google Security Team. *) Change: a logging level of auth_basic errors about no user/password provided has been lowered from "error" to "info". *) Feature: the "proxy_cache_revalidate", "fastcgi_cache_revalidate", "scgi_cache_revalidate", and "uwsgi_cache_revalidate" directives. *) Feature: the "ssl_session_ticket_key" directive. Thanks to Piotr Sikora. *) Bugfix: the directive "add_header Cache-Control ''" added a "Cache-Control" response header line with an empty value. *) Bugfix: the "satisfy any" directive might return 403 error instead of 401 if auth_request and auth_basic directives were used. Thanks to Jan Marc Hoffmann. *) Bugfix: the "accept_filter" and "deferred" parameters of the "listen" directive were ignored for listen sockets created during binary upgrade. Thanks to Piotr Sikora. *) Bugfix: some data received from a backend with unbufferred proxy might not be sent to a client immediately if "gzip" or "gunzip" directives were used. Thanks to Yichun Zhang. *) Bugfix: in error handling in ngx_http_gunzip_filter_module. *) Bugfix: responses might hang if the ngx_http_spdy_module was used with the "auth_request" directive. *) Bugfix: memory leak in nginx/Windows. Changes with nginx 1.5.6 01 Oct 2013 *) Feature: the "fastcgi_buffering" directive. *) Feature: the "proxy_ssl_protocols" and "proxy_ssl_ciphers" directives. Thanks to Piotr Sikora. *) Feature: optimization of SSL handshakes when using long certificate chains. *) Feature: the mail proxy supports SMTP pipelining. *) Bugfix: in the ngx_http_auth_basic_module when using "$apr1$" password encryption method. Thanks to Markus Linnala. *) Bugfix: in MacOSX, Cygwin, and nginx/Windows incorrect location might be used to process a request if locations were given using characters in different cases. *) Bugfix: automatic redirect with appended trailing slash for proxied locations might not work. *) Bugfix: in the mail proxy server. *) Bugfix: in the ngx_http_spdy_module. Changes with nginx 1.5.5 17 Sep 2013 *) Change: now nginx assumes HTTP/1.0 by default if it is not able to detect protocol reliably. *) Feature: the "disable_symlinks" directive now uses O_PATH on Linux. *) Feature: now nginx uses EPOLLRDHUP events to detect premature connection close by clients if the "epoll" method is used. *) Bugfix: in the "valid_referers" directive if the "server_names" parameter was used. *) Bugfix: the $request_time variable did not work in nginx/Windows. *) Bugfix: in the "image_filter" directive. Thanks to Lanshun Zhou. *) Bugfix: OpenSSL 1.0.1f compatibility. Thanks to Piotr Sikora. Changes with nginx 1.5.4 27 Aug 2013 *) Change: the "js" extension MIME type has been changed to "application/javascript"; default value of the "charset_types" directive was changed accordingly. *) Change: now the "image_filter" directive with the "size" parameter returns responses with the "application/json" MIME type. *) Feature: the ngx_http_auth_request_module. *) Bugfix: a segmentation fault might occur on start or during reconfiguration if the "try_files" directive was used with an empty parameter. *) Bugfix: memory leak if relative paths were specified using variables in the "root" or "auth_basic_user_file" directives. *) Bugfix: the "valid_referers" directive incorrectly executed regular expressions if a "Referer" header started with "https://". Thanks to Liangbin Li. *) Bugfix: responses might hang if subrequests were used and an SSL handshake error happened during subrequest processing. Thanks to Aviram Cohen. *) Bugfix: in the ngx_http_autoindex_module. *) Bugfix: in the ngx_http_spdy_module. @ text @a0 16 $NetBSD: patch-auto_install,v 1.1 2013/12/05 15:04:06 imil Exp $ Do not create PID directory. --- auto/install.orig 2013-11-19 10:03:47.000000000 +0000 +++ auto/install @@@@ -141,9 +141,6 @@@@ install: $NGX_OBJS${ngx_dirsep}nginx${ng || cp conf/nginx.conf '\$(DESTDIR)$NGX_CONF_PATH' cp conf/nginx.conf '\$(DESTDIR)$NGX_CONF_PREFIX/nginx.conf.default' - test -d '\$(DESTDIR)`dirname "$NGX_PID_PATH"`' \ - || mkdir -p '\$(DESTDIR)`dirname "$NGX_PID_PATH"`' - test -d '\$(DESTDIR)`dirname "$NGX_HTTP_LOG_PATH"`' || \ mkdir -p '\$(DESTDIR)`dirname "$NGX_HTTP_LOG_PATH"`' @