Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 25 May 2016 23:43:24 +0000 (UTC)
From:      "Sergey A. Osokin" <osa@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r415868 - in head/www/nginx-devel: . files
Message-ID:  <201605252343.u4PNhOOh047579@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: osa
Date: Wed May 25 23:43:23 2016
New Revision: 415868
URL: https://svnweb.freebsd.org/changeset/ports/415868

Log:
  Upgrade from 1.10.0 to 1.11.0.
  
  <ChangeLog>
  
  *) Feature: the "transparent" parameter of the "proxy_bind",
     "fastcgi_bind", "memcached_bind", "scgi_bind", and "uwsgi_bind"
     directives.
  
  *) Feature: the $request_id variable.
  
  *) Feature: the "map" directive supports combinations of multiple
     variables as resulting values.
  
  *) Feature: now nginx checks if EPOLLRDHUP events are supported by
     kernel, and optimizes connection handling accordingly if the "epoll"
     method is used.
  
  *) Feature: the "ssl_certificate" and "ssl_certificate_key" directives
     can be specified multiple times to load certificates of different
     types (for example, RSA and ECDSA).
  
  *) Feature: the "ssl_ecdh_curve" directive now allows specifying a list
     of curves when using OpenSSL 1.0.2 or newer; by default a list built
     into OpenSSL is used.
  
  *) Change: to use DHE ciphers it is now required to specify parameters
     using the "ssl_dhparam" directive.
  
  *) Feature: the $proxy_protocol_port variable.
  
  *) Feature: the $realip_remote_port variable in the
     ngx_http_realip_module.
  
  *) Feature: the ngx_http_realip_module is now able to set the client
     port in addition to the address.
  
  *) Change: the "421 Misdirected Request" response now used when
     rejecting requests to a virtual server different from one negotiated
     during an SSL handshake; this improves interoperability with some
     HTTP/2 clients when using client certificates.
  
  *) Change: HTTP/2 clients can now start sending request body
     immediately; the "http2_body_preread_size" directive controls size of
     the buffer used before nginx will start reading client request body.
  
  *) Bugfix: cached error responses were not updated when using the
     "proxy_cache_bypass" directive.
  
  </ChangeLog>

Added:
  head/www/nginx-devel/files/extra-patch-ngx_inet_slab.c   (contents, props changed)
  head/www/nginx-devel/files/extra-patch-ngx_rtmp_core_module.c   (contents, props changed)
  head/www/nginx-devel/files/extra-patch-src-c-ngx_http_clojure_socket.c   (contents, props changed)
Modified:
  head/www/nginx-devel/Makefile
  head/www/nginx-devel/distinfo

Modified: head/www/nginx-devel/Makefile
==============================================================================
--- head/www/nginx-devel/Makefile	Wed May 25 22:31:53 2016	(r415867)
+++ head/www/nginx-devel/Makefile	Wed May 25 23:43:23 2016	(r415868)
@@ -2,8 +2,7 @@
 # $FreeBSD$
 
 PORTNAME=	nginx
-PORTVERSION=	1.10.0
-PORTREVISION=	3
+PORTVERSION=	1.11.0
 CATEGORIES=	www
 MASTER_SITES=	http://nginx.org/download/
 MASTER_SITES+=	LOCAL/osa
@@ -412,6 +411,7 @@ GH_PROJECT+=	nginx-clojure:clojure
 GH_TAGNAME+=	v${NGINX_CLOJURE_VERSION}:clojure
 CONFIGURE_ENV+=	"JNI_INCS=-I${LOCALBASE}/openjdk8/include -I${LOCALBASE}/openjdk8/include/freebsd"
 CONFIGURE_ARGS+=--add-module=${WRKSRC_clojure}/src/c
+EXTRA_PATCHES+=	${PATCHDIR}/extra-patch-src-c-ngx_http_clojure_socket.c
 .endif
 
 .if ${PORT_OPTIONS:MCT}
@@ -747,6 +747,7 @@ CONFIGURE_ARGS+=--add-dynamic-module=${W
 .else
 CONFIGURE_ARGS+=--add-module=${WRKSRC_dyn_upstream}
 .endif
+EXTRA_PATCHES+=	${PATCHDIR}/extra-patch-ngx_inet_slab.c
 .endif
 
 .if ${PORT_OPTIONS:MARRAYVAR} || ${PORT_OPTIONS:MENCRYPTSESSION} || ${PORT_OPTIONS:MFORMINPUT} || ${PORT_OPTIONS:MICONV} || ${PORT_OPTIONS:MLUA} || ${PORT_OPTIONS:MSET_MISC}
@@ -894,6 +895,7 @@ GH_ACCOUNT+=	arut:rtmp
 GH_PROJECT+=	nginx-rtmp-module:rtmp
 GH_TAGNAME+=	v${NGINX_RTMP_VERSION}:rtmp
 CONFIGURE_ARGS+=--add-module=${WRKSRC_rtmp}
+EXTRA_PATCHES+=	${PATCHDIR}/extra-patch-ngx_rtmp_core_module.c
 .endif
 
 .if ${PORT_OPTIONS:MSET_MISC}

Modified: head/www/nginx-devel/distinfo
==============================================================================
--- head/www/nginx-devel/distinfo	Wed May 25 22:31:53 2016	(r415867)
+++ head/www/nginx-devel/distinfo	Wed May 25 23:43:23 2016	(r415868)
@@ -1,5 +1,6 @@
-SHA256 (nginx-1.10.0.tar.gz) = 8ed647c3dd65bc4ced03b0e0f6bf9e633eff6b01bac772bcf97077d58bc2be4d
-SIZE (nginx-1.10.0.tar.gz) = 908954
+TIMESTAMP = 1464123738
+SHA256 (nginx-1.11.0.tar.gz) = 6ca0e7bf540cdae387ce9470568c2c3a826bc7e7f12def1ae7d20b66f4065a99
+SIZE (nginx-1.11.0.tar.gz) = 913282
 SHA256 (nginx-accesskey-2.0.3.tar.gz) = d9e94321e78a02de16c57f3e048fd31059fd8116ed03d6de7180f435c52502b1
 SIZE (nginx-accesskey-2.0.3.tar.gz) = 2632
 SHA256 (ngx_http_auth_pam_module-1.2.tar.gz) = 5a85970ba61a99f55a26d2536a11d512b39bbd622f5737d25a9a8c10db81efa9

Added: head/www/nginx-devel/files/extra-patch-ngx_inet_slab.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/www/nginx-devel/files/extra-patch-ngx_inet_slab.c	Wed May 25 23:43:23 2016	(r415868)
@@ -0,0 +1,29 @@
+--- ../ngx_dynamic_upstream-0.1.3/src/ngx_inet_slab.c.orig	2016-05-25 19:27:27.204200000 -0400
++++ ../ngx_dynamic_upstream-0.1.3/src/ngx_inet_slab.c	2016-05-25 19:28:07.177622000 -0400
+@@ -250,7 +250,7 @@
+             return NGX_ERROR;
+         }
+ 
+-        ngx_memcpy(sin, u->sockaddr, sizeof(struct sockaddr_in));
++        ngx_memcpy(sin, &u->sockaddr, sizeof(struct sockaddr_in));
+ 
+         u->addrs[0].sockaddr = (struct sockaddr *) sin;
+         u->addrs[0].socklen = sizeof(struct sockaddr_in);
+@@ -277,7 +277,7 @@
+ 
+     u->family = u->addrs[0].sockaddr->sa_family;
+     u->socklen = u->addrs[0].socklen;
+-    ngx_memcpy(u->sockaddr, u->addrs[0].sockaddr, u->addrs[0].socklen);
++    ngx_memcpy(&u->sockaddr, u->addrs[0].sockaddr, u->addrs[0].socklen);
+ 
+     switch (u->family) {
+ 
+@@ -405,7 +405,7 @@
+         return NGX_ERROR;
+     }
+ 
+-    ngx_memcpy(sin6, u->sockaddr, sizeof(struct sockaddr_in6));
++    ngx_memcpy(sin6, &u->sockaddr, sizeof(struct sockaddr_in6));
+ 
+     u->addrs[0].sockaddr = (struct sockaddr *) sin6;
+     u->addrs[0].socklen = sizeof(struct sockaddr_in6);

Added: head/www/nginx-devel/files/extra-patch-ngx_rtmp_core_module.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/www/nginx-devel/files/extra-patch-ngx_rtmp_core_module.c	Wed May 25 23:43:23 2016	(r415868)
@@ -0,0 +1,20 @@
+--- ../nginx-rtmp-module-1.1.7/ngx_rtmp_core_module.c.orig	2016-05-25 19:25:35.779720000 -0400
++++ ../nginx-rtmp-module-1.1.7/ngx_rtmp_core_module.c	2016-05-25 19:26:28.055352000 -0400
+@@ -545,7 +545,7 @@
+             break;
+         }
+ 
+-        if (ngx_memcmp(ls[i].sockaddr + off, u.sockaddr + off, len) != 0) {
++        if (ngx_memcmp(ls[i].sockaddr + off, &u.sockaddr + off, len) != 0) {
+             continue;
+         }
+ 
+@@ -565,7 +565,7 @@
+ 
+     ngx_memzero(ls, sizeof(ngx_rtmp_listen_t));
+ 
+-    ngx_memcpy(ls->sockaddr, u.sockaddr, u.socklen);
++    ngx_memcpy(ls->sockaddr, &u.sockaddr, u.socklen);
+ 
+     ls->socklen = u.socklen;
+     ls->wildcard = u.wildcard;

Added: head/www/nginx-devel/files/extra-patch-src-c-ngx_http_clojure_socket.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/www/nginx-devel/files/extra-patch-src-c-ngx_http_clojure_socket.c	Wed May 25 23:43:23 2016	(r415868)
@@ -0,0 +1,11 @@
+--- ../nginx-clojure-0.4.4/src/c/ngx_http_clojure_socket.c.orig	2016-05-24 17:39:48.898351000 -0400
++++ ../nginx-clojure-0.4.4/src/c/ngx_http_clojure_socket.c	2016-05-25 19:23:44.584704000 -0400
+@@ -317,7 +317,7 @@
+ 	}
+ 	u->resolved->host.data = url->host.data;
+ 	u->resolved->host.len = url->host.len;
+-	ngx_http_clojure_socket_upstream_connect(u, (struct sockaddr *)url->sockaddr, url->socklen);
++	ngx_http_clojure_socket_upstream_connect(u, &url->sockaddr, url->socklen);
+ }
+ 
+ static void ngx_http_clojure_socket_upstream_connect_inner(ngx_http_clojure_socket_upstream_t *u) {



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201605252343.u4PNhOOh047579>