summaryrefslogtreecommitdiff
path: root/www/nginx-devel
diff options
context:
space:
mode:
authorimil <imil@pkgsrc.org>2013-12-05 15:04:05 +0000
committerimil <imil@pkgsrc.org>2013-12-05 15:04:05 +0000
commit6083253b45e37b22ced8d89628eba5fabeaab838 (patch)
tree1c4eaac7233ed65cd2f661471b316291d600e4b8 /www/nginx-devel
parenta643dc3b61ab602ee7ceccd3bb3efe0791f7de6f (diff)
downloadpkgsrc-6083253b45e37b22ced8d89628eba5fabeaab838.tar.gz
Updated to nginx 1.5.7
Changes with nginx 1.5.7 19 Nov 2013 *) Security: a character following an unescaped space in a request line was handled incorrectly (CVE-2013-4547); the bug had appeared in 0.8.41. Thanks to Ivan Fratric of the Google Security Team. *) Change: a logging level of auth_basic errors about no user/password provided has been lowered from "error" to "info". *) Feature: the "proxy_cache_revalidate", "fastcgi_cache_revalidate", "scgi_cache_revalidate", and "uwsgi_cache_revalidate" directives. *) Feature: the "ssl_session_ticket_key" directive. Thanks to Piotr Sikora. *) Bugfix: the directive "add_header Cache-Control ''" added a "Cache-Control" response header line with an empty value. *) Bugfix: the "satisfy any" directive might return 403 error instead of 401 if auth_request and auth_basic directives were used. Thanks to Jan Marc Hoffmann. *) Bugfix: the "accept_filter" and "deferred" parameters of the "listen" directive were ignored for listen sockets created during binary upgrade. Thanks to Piotr Sikora. *) Bugfix: some data received from a backend with unbufferred proxy might not be sent to a client immediately if "gzip" or "gunzip" directives were used. Thanks to Yichun Zhang. *) Bugfix: in error handling in ngx_http_gunzip_filter_module. *) Bugfix: responses might hang if the ngx_http_spdy_module was used with the "auth_request" directive. *) Bugfix: memory leak in nginx/Windows. Changes with nginx 1.5.6 01 Oct 2013 *) Feature: the "fastcgi_buffering" directive. *) Feature: the "proxy_ssl_protocols" and "proxy_ssl_ciphers" directives. Thanks to Piotr Sikora. *) Feature: optimization of SSL handshakes when using long certificate chains. *) Feature: the mail proxy supports SMTP pipelining. *) Bugfix: in the ngx_http_auth_basic_module when using "$apr1$" password encryption method. Thanks to Markus Linnala. *) Bugfix: in MacOSX, Cygwin, and nginx/Windows incorrect location might be used to process a request if locations were given using characters in different cases. *) Bugfix: automatic redirect with appended trailing slash for proxied locations might not work. *) Bugfix: in the mail proxy server. *) Bugfix: in the ngx_http_spdy_module. Changes with nginx 1.5.5 17 Sep 2013 *) Change: now nginx assumes HTTP/1.0 by default if it is not able to detect protocol reliably. *) Feature: the "disable_symlinks" directive now uses O_PATH on Linux. *) Feature: now nginx uses EPOLLRDHUP events to detect premature connection close by clients if the "epoll" method is used. *) Bugfix: in the "valid_referers" directive if the "server_names" parameter was used. *) Bugfix: the $request_time variable did not work in nginx/Windows. *) Bugfix: in the "image_filter" directive. Thanks to Lanshun Zhou. *) Bugfix: OpenSSL 1.0.1f compatibility. Thanks to Piotr Sikora. Changes with nginx 1.5.4 27 Aug 2013 *) Change: the "js" extension MIME type has been changed to "application/javascript"; default value of the "charset_types" directive was changed accordingly. *) Change: now the "image_filter" directive with the "size" parameter returns responses with the "application/json" MIME type. *) Feature: the ngx_http_auth_request_module. *) Bugfix: a segmentation fault might occur on start or during reconfiguration if the "try_files" directive was used with an empty parameter. *) Bugfix: memory leak if relative paths were specified using variables in the "root" or "auth_basic_user_file" directives. *) Bugfix: the "valid_referers" directive incorrectly executed regular expressions if a "Referer" header started with "https://". Thanks to Liangbin Li. *) Bugfix: responses might hang if subrequests were used and an SSL handshake error happened during subrequest processing. Thanks to Aviram Cohen. *) Bugfix: in the ngx_http_autoindex_module. *) Bugfix: in the ngx_http_spdy_module.
Diffstat (limited to 'www/nginx-devel')
-rw-r--r--www/nginx-devel/Makefile4
-rw-r--r--www/nginx-devel/distinfo12
-rw-r--r--www/nginx-devel/patches/patch-auto_install (renamed from www/nginx-devel/patches/patch-ab)8
-rw-r--r--www/nginx-devel/patches/patch-conf_nginx.conf (renamed from www/nginx-devel/patches/patch-aa)26
4 files changed, 23 insertions, 27 deletions
diff --git a/www/nginx-devel/Makefile b/www/nginx-devel/Makefile
index 0afd2499323..2fccbb5951c 100644
--- a/www/nginx-devel/Makefile
+++ b/www/nginx-devel/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.7 2013/08/18 08:11:04 imil Exp $
+# $NetBSD: Makefile,v 1.8 2013/12/05 15:04:05 imil Exp $
-DISTNAME= nginx-1.5.3
+DISTNAME= nginx-1.5.7
MAINTAINER= imil@NetBSD.org
.include "../../www/nginx/Makefile.common"
diff --git a/www/nginx-devel/distinfo b/www/nginx-devel/distinfo
index bd9dd07412c..ab57ee57eed 100644
--- a/www/nginx-devel/distinfo
+++ b/www/nginx-devel/distinfo
@@ -1,16 +1,16 @@
-$NetBSD: distinfo,v 1.5 2013/08/18 08:11:04 imil Exp $
+$NetBSD: distinfo,v 1.6 2013/12/05 15:04:05 imil Exp $
SHA1 (naxsi-core-0.51-1.tgz) = e6b97c599955d1b7dc3559c5e391a551174abe91
RMD160 (naxsi-core-0.51-1.tgz) = ce29bf13805fb512f2099c2599fe705f17bf3c2d
Size (naxsi-core-0.51-1.tgz) = 53908 bytes
-SHA1 (nginx-1.5.3.tar.gz) = 88f4548e46c25d32f08681c0aba39b86b84ec3a3
-RMD160 (nginx-1.5.3.tar.gz) = fb57b7609d8e1de06e6dc1376bf4d239c06daa37
-Size (nginx-1.5.3.tar.gz) = 769755 bytes
+SHA1 (nginx-1.5.7.tar.gz) = 4dd04c73c3081277fe9c98c4a386c8baf956f5ca
+RMD160 (nginx-1.5.7.tar.gz) = a74277133f5028b4c63acc53de84c1439b14df0a
+Size (nginx-1.5.7.tar.gz) = 779985 bytes
SHA1 (nginx_http_push_module-0.692.tar.gz) = 72103084cad8f4d3d9a49a6b04cf780e4541605d
RMD160 (nginx_http_push_module-0.692.tar.gz) = 9d2be16074cf28115af0f1d8f3646937cda649ad
Size (nginx_http_push_module-0.692.tar.gz) = 29119 bytes
SHA1 (nginx_upload_module-2.2.0.tar.gz) = 93d6e83e613a0ce2ed057a434b344fa1b6609b47
RMD160 (nginx_upload_module-2.2.0.tar.gz) = 5734af837be3fe8ec444a7e5e7f6707118594098
Size (nginx_upload_module-2.2.0.tar.gz) = 25796 bytes
-SHA1 (patch-aa) = adf433d1b56a88c6c2ed09c4bd54fdb1a336582f
-SHA1 (patch-ab) = 6f20ef8ac9a042faf7e22770de7c16b351cb1191
+SHA1 (patch-auto_install) = 723e2ae222146775ae66aed7815bf3f911dd1cd7
+SHA1 (patch-conf_nginx.conf) = ee9fbc3838cc006f6e1cddddadf6603f4941d171
diff --git a/www/nginx-devel/patches/patch-ab b/www/nginx-devel/patches/patch-auto_install
index 0c37fdfc799..01566c9a51c 100644
--- a/www/nginx-devel/patches/patch-ab
+++ b/www/nginx-devel/patches/patch-auto_install
@@ -1,10 +1,10 @@
-$NetBSD: patch-ab,v 1.1 2013/02/22 17:06:54 imil Exp $
+$NetBSD: patch-auto_install,v 1.1 2013/12/05 15:04:06 imil Exp $
-Workaround for /bin/sh bug on NetBSD
+Do not create PID directory.
---- auto/install.orig 2010-06-15 19:50:33.000000000 +0000
+--- auto/install.orig 2013-11-19 10:03:47.000000000 +0000
+++ auto/install
-@@ -114,9 +114,6 @@ install: $NGX_OBJS${ngx_dirsep}nginx${ng
+@@ -141,9 +141,6 @@ install: $NGX_OBJS${ngx_dirsep}nginx${ng
|| cp conf/nginx.conf '\$(DESTDIR)$NGX_CONF_PATH'
cp conf/nginx.conf '\$(DESTDIR)$NGX_CONF_PREFIX/nginx.conf.default'
diff --git a/www/nginx-devel/patches/patch-aa b/www/nginx-devel/patches/patch-conf_nginx.conf
index b19839affcc..f51b9ee0d75 100644
--- a/www/nginx-devel/patches/patch-aa
+++ b/www/nginx-devel/patches/patch-conf_nginx.conf
@@ -1,10 +1,10 @@
-$NetBSD: patch-aa,v 1.1 2013/02/22 17:06:54 imil Exp $
+$NetBSD: patch-conf_nginx.conf,v 1.1 2013/12/05 15:04:06 imil Exp $
This patch provides config file adapted to pkgsrc settings.
---- conf/nginx.conf.orig 2011-06-27 15:47:51.000000000 +0000
+--- conf/nginx.conf.orig 2013-11-19 10:03:47.000000000 +0000
+++ conf/nginx.conf
-@@ -1,28 +1,29 @@
+@@ -1,28 +1,23 @@
-#user nobody;
+user %%NGINX_USER%% %%NGINX_GROUP%%;
@@ -15,12 +15,8 @@ This patch provides config file adapted to pkgsrc settings.
-#error_log logs/error.log info;
-
-#pid logs/nginx.pid;
-+#error_log %%NGINX_LOGDIR%%/error.log;
-+#error_log %%NGINX_LOGDIR%%/error.log notice;
-+#error_log %%NGINX_LOGDIR%%/error.log info;
-
-+#pid %%NGINX_PIDDIR%%/nginx.pid;
-
+-
+-
events {
+ # After increasing this value You probably should increase limit
+ # of file descriptors (for example in start_precmd in startup script)
@@ -42,7 +38,7 @@ This patch provides config file adapted to pkgsrc settings.
sendfile on;
#tcp_nopush on;
-@@ -38,10 +39,10 @@ http {
+@@ -38,10 +33,10 @@ http {
#charset koi8-r;
@@ -55,7 +51,7 @@ This patch provides config file adapted to pkgsrc settings.
index index.html index.htm;
}
-@@ -51,7 +52,7 @@ http {
+@@ -51,7 +46,7 @@ http {
#
error_page 500 502 503 504 /50x.html;
location = /50x.html {
@@ -64,7 +60,7 @@ This patch provides config file adapted to pkgsrc settings.
}
# proxy the PHP scripts to Apache listening on 127.0.0.1:80
-@@ -67,7 +68,7 @@ http {
+@@ -67,7 +62,7 @@ http {
# fastcgi_pass 127.0.0.1:9000;
# fastcgi_index index.php;
# fastcgi_param SCRIPT_FILENAME /scripts$fastcgi_script_name;
@@ -73,7 +69,7 @@ This patch provides config file adapted to pkgsrc settings.
#}
# deny access to .htaccess files, if Apache's document root
-@@ -87,7 +88,7 @@ http {
+@@ -87,7 +82,7 @@ http {
# server_name somename alias another.alias;
# location / {
@@ -82,8 +78,8 @@ This patch provides config file adapted to pkgsrc settings.
# index index.html index.htm;
# }
#}
-@@ -110,7 +111,7 @@ http {
- # ssl_prefer_server_ciphers on;
+@@ -109,7 +104,7 @@ http {
+ # ssl_prefer_server_ciphers on;
# location / {
- # root html;