diff options
author | imil <imil> | 2013-12-05 15:04:05 +0000 |
---|---|---|
committer | imil <imil> | 2013-12-05 15:04:05 +0000 |
commit | 758cff9b5aa6a313d52686138b0f385b1d7f4712 (patch) | |
tree | 1c4eaac7233ed65cd2f661471b316291d600e4b8 | |
parent | e511cee7f9aa477eb779a18bce4c5538414d5967 (diff) | |
download | pkgsrc-758cff9b5aa6a313d52686138b0f385b1d7f4712.tar.gz |
Updated to nginx 1.5.7
Changes with nginx 1.5.7 19 Nov 2013
*) Security: a character following an unescaped space in a request line
was handled incorrectly (CVE-2013-4547); the bug had appeared in
0.8.41.
Thanks to Ivan Fratric of the Google Security Team.
*) Change: a logging level of auth_basic errors about no user/password
provided has been lowered from "error" to "info".
*) Feature: the "proxy_cache_revalidate", "fastcgi_cache_revalidate",
"scgi_cache_revalidate", and "uwsgi_cache_revalidate" directives.
*) Feature: the "ssl_session_ticket_key" directive.
Thanks to Piotr Sikora.
*) Bugfix: the directive "add_header Cache-Control ''" added a
"Cache-Control" response header line with an empty value.
*) Bugfix: the "satisfy any" directive might return 403 error instead of
401 if auth_request and auth_basic directives were used.
Thanks to Jan Marc Hoffmann.
*) Bugfix: the "accept_filter" and "deferred" parameters of the "listen"
directive were ignored for listen sockets created during binary
upgrade.
Thanks to Piotr Sikora.
*) Bugfix: some data received from a backend with unbufferred proxy
might not be sent to a client immediately if "gzip" or "gunzip"
directives were used.
Thanks to Yichun Zhang.
*) Bugfix: in error handling in ngx_http_gunzip_filter_module.
*) Bugfix: responses might hang if the ngx_http_spdy_module was used
with the "auth_request" directive.
*) Bugfix: memory leak in nginx/Windows.
Changes with nginx 1.5.6 01 Oct 2013
*) Feature: the "fastcgi_buffering" directive.
*) Feature: the "proxy_ssl_protocols" and "proxy_ssl_ciphers"
directives.
Thanks to Piotr Sikora.
*) Feature: optimization of SSL handshakes when using long certificate
chains.
*) Feature: the mail proxy supports SMTP pipelining.
*) Bugfix: in the ngx_http_auth_basic_module when using "$apr1$"
password encryption method.
Thanks to Markus Linnala.
*) Bugfix: in MacOSX, Cygwin, and nginx/Windows incorrect location might
be used to process a request if locations were given using characters
in different cases.
*) Bugfix: automatic redirect with appended trailing slash for proxied
locations might not work.
*) Bugfix: in the mail proxy server.
*) Bugfix: in the ngx_http_spdy_module.
Changes with nginx 1.5.5 17 Sep 2013
*) Change: now nginx assumes HTTP/1.0 by default if it is not able to
detect protocol reliably.
*) Feature: the "disable_symlinks" directive now uses O_PATH on Linux.
*) Feature: now nginx uses EPOLLRDHUP events to detect premature
connection close by clients if the "epoll" method is used.
*) Bugfix: in the "valid_referers" directive if the "server_names"
parameter was used.
*) Bugfix: the $request_time variable did not work in nginx/Windows.
*) Bugfix: in the "image_filter" directive.
Thanks to Lanshun Zhou.
*) Bugfix: OpenSSL 1.0.1f compatibility.
Thanks to Piotr Sikora.
Changes with nginx 1.5.4 27 Aug 2013
*) Change: the "js" extension MIME type has been changed to
"application/javascript"; default value of the "charset_types"
directive was changed accordingly.
*) Change: now the "image_filter" directive with the "size" parameter
returns responses with the "application/json" MIME type.
*) Feature: the ngx_http_auth_request_module.
*) Bugfix: a segmentation fault might occur on start or during
reconfiguration if the "try_files" directive was used with an empty
parameter.
*) Bugfix: memory leak if relative paths were specified using variables
in the "root" or "auth_basic_user_file" directives.
*) Bugfix: the "valid_referers" directive incorrectly executed regular
expressions if a "Referer" header started with "https://".
Thanks to Liangbin Li.
*) Bugfix: responses might hang if subrequests were used and an SSL
handshake error happened during subrequest processing.
Thanks to Aviram Cohen.
*) Bugfix: in the ngx_http_autoindex_module.
*) Bugfix: in the ngx_http_spdy_module.
-rw-r--r-- | www/nginx-devel/Makefile | 4 | ||||
-rw-r--r-- | www/nginx-devel/distinfo | 12 | ||||
-rw-r--r-- | www/nginx-devel/patches/patch-auto_install (renamed from www/nginx-devel/patches/patch-ab) | 8 | ||||
-rw-r--r-- | www/nginx-devel/patches/patch-conf_nginx.conf (renamed from www/nginx-devel/patches/patch-aa) | 26 |
4 files changed, 23 insertions, 27 deletions
diff --git a/www/nginx-devel/Makefile b/www/nginx-devel/Makefile index 0afd2499323..2fccbb5951c 100644 --- a/www/nginx-devel/Makefile +++ b/www/nginx-devel/Makefile @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.7 2013/08/18 08:11:04 imil Exp $ +# $NetBSD: Makefile,v 1.8 2013/12/05 15:04:05 imil Exp $ -DISTNAME= nginx-1.5.3 +DISTNAME= nginx-1.5.7 MAINTAINER= imil@NetBSD.org .include "../../www/nginx/Makefile.common" diff --git a/www/nginx-devel/distinfo b/www/nginx-devel/distinfo index bd9dd07412c..ab57ee57eed 100644 --- a/www/nginx-devel/distinfo +++ b/www/nginx-devel/distinfo @@ -1,16 +1,16 @@ -$NetBSD: distinfo,v 1.5 2013/08/18 08:11:04 imil Exp $ +$NetBSD: distinfo,v 1.6 2013/12/05 15:04:05 imil Exp $ SHA1 (naxsi-core-0.51-1.tgz) = e6b97c599955d1b7dc3559c5e391a551174abe91 RMD160 (naxsi-core-0.51-1.tgz) = ce29bf13805fb512f2099c2599fe705f17bf3c2d Size (naxsi-core-0.51-1.tgz) = 53908 bytes -SHA1 (nginx-1.5.3.tar.gz) = 88f4548e46c25d32f08681c0aba39b86b84ec3a3 -RMD160 (nginx-1.5.3.tar.gz) = fb57b7609d8e1de06e6dc1376bf4d239c06daa37 -Size (nginx-1.5.3.tar.gz) = 769755 bytes +SHA1 (nginx-1.5.7.tar.gz) = 4dd04c73c3081277fe9c98c4a386c8baf956f5ca +RMD160 (nginx-1.5.7.tar.gz) = a74277133f5028b4c63acc53de84c1439b14df0a +Size (nginx-1.5.7.tar.gz) = 779985 bytes SHA1 (nginx_http_push_module-0.692.tar.gz) = 72103084cad8f4d3d9a49a6b04cf780e4541605d RMD160 (nginx_http_push_module-0.692.tar.gz) = 9d2be16074cf28115af0f1d8f3646937cda649ad Size (nginx_http_push_module-0.692.tar.gz) = 29119 bytes SHA1 (nginx_upload_module-2.2.0.tar.gz) = 93d6e83e613a0ce2ed057a434b344fa1b6609b47 RMD160 (nginx_upload_module-2.2.0.tar.gz) = 5734af837be3fe8ec444a7e5e7f6707118594098 Size (nginx_upload_module-2.2.0.tar.gz) = 25796 bytes -SHA1 (patch-aa) = adf433d1b56a88c6c2ed09c4bd54fdb1a336582f -SHA1 (patch-ab) = 6f20ef8ac9a042faf7e22770de7c16b351cb1191 +SHA1 (patch-auto_install) = 723e2ae222146775ae66aed7815bf3f911dd1cd7 +SHA1 (patch-conf_nginx.conf) = ee9fbc3838cc006f6e1cddddadf6603f4941d171 diff --git a/www/nginx-devel/patches/patch-ab b/www/nginx-devel/patches/patch-auto_install index 0c37fdfc799..01566c9a51c 100644 --- a/www/nginx-devel/patches/patch-ab +++ b/www/nginx-devel/patches/patch-auto_install @@ -1,10 +1,10 @@ -$NetBSD: patch-ab,v 1.1 2013/02/22 17:06:54 imil Exp $ +$NetBSD: patch-auto_install,v 1.1 2013/12/05 15:04:06 imil Exp $ -Workaround for /bin/sh bug on NetBSD +Do not create PID directory. ---- auto/install.orig 2010-06-15 19:50:33.000000000 +0000 +--- auto/install.orig 2013-11-19 10:03:47.000000000 +0000 +++ auto/install -@@ -114,9 +114,6 @@ install: $NGX_OBJS${ngx_dirsep}nginx${ng +@@ -141,9 +141,6 @@ install: $NGX_OBJS${ngx_dirsep}nginx${ng || cp conf/nginx.conf '\$(DESTDIR)$NGX_CONF_PATH' cp conf/nginx.conf '\$(DESTDIR)$NGX_CONF_PREFIX/nginx.conf.default' diff --git a/www/nginx-devel/patches/patch-aa b/www/nginx-devel/patches/patch-conf_nginx.conf index b19839affcc..f51b9ee0d75 100644 --- a/www/nginx-devel/patches/patch-aa +++ b/www/nginx-devel/patches/patch-conf_nginx.conf @@ -1,10 +1,10 @@ -$NetBSD: patch-aa,v 1.1 2013/02/22 17:06:54 imil Exp $ +$NetBSD: patch-conf_nginx.conf,v 1.1 2013/12/05 15:04:06 imil Exp $ This patch provides config file adapted to pkgsrc settings. ---- conf/nginx.conf.orig 2011-06-27 15:47:51.000000000 +0000 +--- conf/nginx.conf.orig 2013-11-19 10:03:47.000000000 +0000 +++ conf/nginx.conf -@@ -1,28 +1,29 @@ +@@ -1,28 +1,23 @@ -#user nobody; +user %%NGINX_USER%% %%NGINX_GROUP%%; @@ -15,12 +15,8 @@ This patch provides config file adapted to pkgsrc settings. -#error_log logs/error.log info; - -#pid logs/nginx.pid; -+#error_log %%NGINX_LOGDIR%%/error.log; -+#error_log %%NGINX_LOGDIR%%/error.log notice; -+#error_log %%NGINX_LOGDIR%%/error.log info; - -+#pid %%NGINX_PIDDIR%%/nginx.pid; - +- +- events { + # After increasing this value You probably should increase limit + # of file descriptors (for example in start_precmd in startup script) @@ -42,7 +38,7 @@ This patch provides config file adapted to pkgsrc settings. sendfile on; #tcp_nopush on; -@@ -38,10 +39,10 @@ http { +@@ -38,10 +33,10 @@ http { #charset koi8-r; @@ -55,7 +51,7 @@ This patch provides config file adapted to pkgsrc settings. index index.html index.htm; } -@@ -51,7 +52,7 @@ http { +@@ -51,7 +46,7 @@ http { # error_page 500 502 503 504 /50x.html; location = /50x.html { @@ -64,7 +60,7 @@ This patch provides config file adapted to pkgsrc settings. } # proxy the PHP scripts to Apache listening on 127.0.0.1:80 -@@ -67,7 +68,7 @@ http { +@@ -67,7 +62,7 @@ http { # fastcgi_pass 127.0.0.1:9000; # fastcgi_index index.php; # fastcgi_param SCRIPT_FILENAME /scripts$fastcgi_script_name; @@ -73,7 +69,7 @@ This patch provides config file adapted to pkgsrc settings. #} # deny access to .htaccess files, if Apache's document root -@@ -87,7 +88,7 @@ http { +@@ -87,7 +82,7 @@ http { # server_name somename alias another.alias; # location / { @@ -82,8 +78,8 @@ This patch provides config file adapted to pkgsrc settings. # index index.html index.htm; # } #} -@@ -110,7 +111,7 @@ http { - # ssl_prefer_server_ciphers on; +@@ -109,7 +104,7 @@ http { + # ssl_prefer_server_ciphers on; # location / { - # root html; |