Date: Wed, 25 May 2016 23:43:24 +0000 (UTC) From: "Sergey A. Osokin" <osa@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r415868 - in head/www/nginx-devel: . files Message-ID: <201605252343.u4PNhOOh047579@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: osa Date: Wed May 25 23:43:23 2016 New Revision: 415868 URL: https://svnweb.freebsd.org/changeset/ports/415868 Log: Upgrade from 1.10.0 to 1.11.0. <ChangeLog> *) Feature: the "transparent" parameter of the "proxy_bind", "fastcgi_bind", "memcached_bind", "scgi_bind", and "uwsgi_bind" directives. *) Feature: the $request_id variable. *) Feature: the "map" directive supports combinations of multiple variables as resulting values. *) Feature: now nginx checks if EPOLLRDHUP events are supported by kernel, and optimizes connection handling accordingly if the "epoll" method is used. *) Feature: the "ssl_certificate" and "ssl_certificate_key" directives can be specified multiple times to load certificates of different types (for example, RSA and ECDSA). *) Feature: the "ssl_ecdh_curve" directive now allows specifying a list of curves when using OpenSSL 1.0.2 or newer; by default a list built into OpenSSL is used. *) Change: to use DHE ciphers it is now required to specify parameters using the "ssl_dhparam" directive. *) Feature: the $proxy_protocol_port variable. *) Feature: the $realip_remote_port variable in the ngx_http_realip_module. *) Feature: the ngx_http_realip_module is now able to set the client port in addition to the address. *) Change: the "421 Misdirected Request" response now used when rejecting requests to a virtual server different from one negotiated during an SSL handshake; this improves interoperability with some HTTP/2 clients when using client certificates. *) Change: HTTP/2 clients can now start sending request body immediately; the "http2_body_preread_size" directive controls size of the buffer used before nginx will start reading client request body. *) Bugfix: cached error responses were not updated when using the "proxy_cache_bypass" directive. </ChangeLog> Added: head/www/nginx-devel/files/extra-patch-ngx_inet_slab.c (contents, props changed) head/www/nginx-devel/files/extra-patch-ngx_rtmp_core_module.c (contents, props changed) head/www/nginx-devel/files/extra-patch-src-c-ngx_http_clojure_socket.c (contents, props changed) Modified: head/www/nginx-devel/Makefile head/www/nginx-devel/distinfo Modified: head/www/nginx-devel/Makefile ============================================================================== --- head/www/nginx-devel/Makefile Wed May 25 22:31:53 2016 (r415867) +++ head/www/nginx-devel/Makefile Wed May 25 23:43:23 2016 (r415868) @@ -2,8 +2,7 @@ # $FreeBSD$ PORTNAME= nginx -PORTVERSION= 1.10.0 -PORTREVISION= 3 +PORTVERSION= 1.11.0 CATEGORIES= www MASTER_SITES= http://nginx.org/download/ MASTER_SITES+= LOCAL/osa @@ -412,6 +411,7 @@ GH_PROJECT+= nginx-clojure:clojure GH_TAGNAME+= v${NGINX_CLOJURE_VERSION}:clojure CONFIGURE_ENV+= "JNI_INCS=-I${LOCALBASE}/openjdk8/include -I${LOCALBASE}/openjdk8/include/freebsd" CONFIGURE_ARGS+=--add-module=${WRKSRC_clojure}/src/c +EXTRA_PATCHES+= ${PATCHDIR}/extra-patch-src-c-ngx_http_clojure_socket.c .endif .if ${PORT_OPTIONS:MCT} @@ -747,6 +747,7 @@ CONFIGURE_ARGS+=--add-dynamic-module=${W .else CONFIGURE_ARGS+=--add-module=${WRKSRC_dyn_upstream} .endif +EXTRA_PATCHES+= ${PATCHDIR}/extra-patch-ngx_inet_slab.c .endif .if ${PORT_OPTIONS:MARRAYVAR} || ${PORT_OPTIONS:MENCRYPTSESSION} || ${PORT_OPTIONS:MFORMINPUT} || ${PORT_OPTIONS:MICONV} || ${PORT_OPTIONS:MLUA} || ${PORT_OPTIONS:MSET_MISC} @@ -894,6 +895,7 @@ GH_ACCOUNT+= arut:rtmp GH_PROJECT+= nginx-rtmp-module:rtmp GH_TAGNAME+= v${NGINX_RTMP_VERSION}:rtmp CONFIGURE_ARGS+=--add-module=${WRKSRC_rtmp} +EXTRA_PATCHES+= ${PATCHDIR}/extra-patch-ngx_rtmp_core_module.c .endif .if ${PORT_OPTIONS:MSET_MISC} Modified: head/www/nginx-devel/distinfo ============================================================================== --- head/www/nginx-devel/distinfo Wed May 25 22:31:53 2016 (r415867) +++ head/www/nginx-devel/distinfo Wed May 25 23:43:23 2016 (r415868) @@ -1,5 +1,6 @@ -SHA256 (nginx-1.10.0.tar.gz) = 8ed647c3dd65bc4ced03b0e0f6bf9e633eff6b01bac772bcf97077d58bc2be4d -SIZE (nginx-1.10.0.tar.gz) = 908954 +TIMESTAMP = 1464123738 +SHA256 (nginx-1.11.0.tar.gz) = 6ca0e7bf540cdae387ce9470568c2c3a826bc7e7f12def1ae7d20b66f4065a99 +SIZE (nginx-1.11.0.tar.gz) = 913282 SHA256 (nginx-accesskey-2.0.3.tar.gz) = d9e94321e78a02de16c57f3e048fd31059fd8116ed03d6de7180f435c52502b1 SIZE (nginx-accesskey-2.0.3.tar.gz) = 2632 SHA256 (ngx_http_auth_pam_module-1.2.tar.gz) = 5a85970ba61a99f55a26d2536a11d512b39bbd622f5737d25a9a8c10db81efa9 Added: head/www/nginx-devel/files/extra-patch-ngx_inet_slab.c ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/www/nginx-devel/files/extra-patch-ngx_inet_slab.c Wed May 25 23:43:23 2016 (r415868) @@ -0,0 +1,29 @@ +--- ../ngx_dynamic_upstream-0.1.3/src/ngx_inet_slab.c.orig 2016-05-25 19:27:27.204200000 -0400 ++++ ../ngx_dynamic_upstream-0.1.3/src/ngx_inet_slab.c 2016-05-25 19:28:07.177622000 -0400 +@@ -250,7 +250,7 @@ + return NGX_ERROR; + } + +- ngx_memcpy(sin, u->sockaddr, sizeof(struct sockaddr_in)); ++ ngx_memcpy(sin, &u->sockaddr, sizeof(struct sockaddr_in)); + + u->addrs[0].sockaddr = (struct sockaddr *) sin; + u->addrs[0].socklen = sizeof(struct sockaddr_in); +@@ -277,7 +277,7 @@ + + u->family = u->addrs[0].sockaddr->sa_family; + u->socklen = u->addrs[0].socklen; +- ngx_memcpy(u->sockaddr, u->addrs[0].sockaddr, u->addrs[0].socklen); ++ ngx_memcpy(&u->sockaddr, u->addrs[0].sockaddr, u->addrs[0].socklen); + + switch (u->family) { + +@@ -405,7 +405,7 @@ + return NGX_ERROR; + } + +- ngx_memcpy(sin6, u->sockaddr, sizeof(struct sockaddr_in6)); ++ ngx_memcpy(sin6, &u->sockaddr, sizeof(struct sockaddr_in6)); + + u->addrs[0].sockaddr = (struct sockaddr *) sin6; + u->addrs[0].socklen = sizeof(struct sockaddr_in6); Added: head/www/nginx-devel/files/extra-patch-ngx_rtmp_core_module.c ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/www/nginx-devel/files/extra-patch-ngx_rtmp_core_module.c Wed May 25 23:43:23 2016 (r415868) @@ -0,0 +1,20 @@ +--- ../nginx-rtmp-module-1.1.7/ngx_rtmp_core_module.c.orig 2016-05-25 19:25:35.779720000 -0400 ++++ ../nginx-rtmp-module-1.1.7/ngx_rtmp_core_module.c 2016-05-25 19:26:28.055352000 -0400 +@@ -545,7 +545,7 @@ + break; + } + +- if (ngx_memcmp(ls[i].sockaddr + off, u.sockaddr + off, len) != 0) { ++ if (ngx_memcmp(ls[i].sockaddr + off, &u.sockaddr + off, len) != 0) { + continue; + } + +@@ -565,7 +565,7 @@ + + ngx_memzero(ls, sizeof(ngx_rtmp_listen_t)); + +- ngx_memcpy(ls->sockaddr, u.sockaddr, u.socklen); ++ ngx_memcpy(ls->sockaddr, &u.sockaddr, u.socklen); + + ls->socklen = u.socklen; + ls->wildcard = u.wildcard; Added: head/www/nginx-devel/files/extra-patch-src-c-ngx_http_clojure_socket.c ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/www/nginx-devel/files/extra-patch-src-c-ngx_http_clojure_socket.c Wed May 25 23:43:23 2016 (r415868) @@ -0,0 +1,11 @@ +--- ../nginx-clojure-0.4.4/src/c/ngx_http_clojure_socket.c.orig 2016-05-24 17:39:48.898351000 -0400 ++++ ../nginx-clojure-0.4.4/src/c/ngx_http_clojure_socket.c 2016-05-25 19:23:44.584704000 -0400 +@@ -317,7 +317,7 @@ + } + u->resolved->host.data = url->host.data; + u->resolved->host.len = url->host.len; +- ngx_http_clojure_socket_upstream_connect(u, (struct sockaddr *)url->sockaddr, url->socklen); ++ ngx_http_clojure_socket_upstream_connect(u, &url->sockaddr, url->socklen); + } + + static void ngx_http_clojure_socket_upstream_connect_inner(ngx_http_clojure_socket_upstream_t *u) {
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201605252343.u4PNhOOh047579>