from small one page howto to huge articles all in one place
 

search text in:




Other .linuxhowtos.org sites: www.linuxhowtos.org
toolsntoys.linuxhowtos.org



Last additions:
How to make X listen on port 6000

How to make X listen on port 6000

words:

34

views:

44369

userrating:

average rating: 1.5 (4 votes) (1=very good 6=terrible)


May, 25th 2007:
April, 26th 2007:
Apr, 10th. 2007:
Druckversion . pdf icon
You are here: Portage


Details of www-servers/nginx:

Description: Robust, small and high performance http and reverse proxy server
Homepage:
https://nginx.org

available versions:

releasesalphaamd64armhppaia64mipsppcppc64ppc macoss390shsparcx86USE-Flagsdependenciesebuild warnings
nginx-1.15.8-r1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.15.7-r1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.15.6 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.14.2-r2 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.14.2-r1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.14.1 -+~---~~----+$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
Legend:
+ stable
~ testing
- not available
some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown.


back



Other free services
toURL.org
Shorten long
URLs to short
links like
http://tourl.org/2
tourl.org
.
Reverse DNS lookup
Find out which hostname(s)
resolve to a
given IP or other hostnames for the server
www.reversednslookup.org

New Packages

- as rdf newsfeed
- as rss newsfeed
- as Atom newsfeed
2019-01-19
bson - 4.4.1
Ebuild name:

dev-ruby/bson-4.4.1

Description

A Ruby BSON implementation for MongoDB. (Includes binary C-based extension.)

Added to portage

2019-01-19

chrome-binary-plugins - 72.0.3626.64_beta
Ebuild name:

www-plugins/chrome-binary-plugins-72.0.3626.64_beta

Description

Binary plugins from Google Chrome for use in Ch

Added to portage

2019-01-19

chrome-binary-plugins - 73.0.3673.0_alpha
Ebuild name:

www-plugins/chrome-binary-plugins-73.0.3673.0_alpha

Description

Binary plugins from Google Chrome for use in Ch

Added to portage

2019-01-19

cyberjack - 3.99.5_p13
Ebuild name:

dev-libs/cyberjack-3.99.5_p13

Description

REINER SCT cyberJack USB chipcard reader user space driver

Added to portage

2019-01-19

discord-bin - 0.0.8
Ebuild name:

net-im/discord-bin-0.0.8

Description

All-in-one voice and text chat for gamers

Added to portage

2019-01-19

drupal - 7.63
Ebuild name:

www-apps/drupal-7.63

Description

PHP-based open-source platform and content management system

Added to portage

2019-01-19

drupal - 8.6.7
Ebuild name:

www-apps/drupal-8.6.7

Description

PHP-based open-source platform and content management system

Added to portage

2019-01-19

google-chrome-beta - 72.0.3626.64
Ebuild name:

www-client/google-chrome-beta-72.0.3626.64

Description

The web browser from Google

Added to portage

2019-01-19

google-chrome-unstable - 73.0.3673.0
Ebuild name:

www-client/google-chrome-unstable-73.0.3673.0

Description

The web browser from Google

Added to portage

2019-01-19

graylog2 - 2.5.1
Ebuild name:

app-admin/graylog2-2.5.1

Description

Free and open source log management

Added to portage

2019-01-19

gtk+ - 3.24.3-r1
Ebuild name:

x11-libs/gtk+-3.24.3-r1

Description

Gimp ToolKit +

Added to portage

2019-01-19

hitimes - 1.3.1
Ebuild name:

dev-ruby/hitimes-1.3.1

Description

A fast, high resolution timer library

Added to portage

2019-01-19

icedtea - 3.10.0
Ebuild name:

dev-java/icedtea-3.10.0

Description

A harness to build OpenJDK using Free Software build tools and dependencies

Added to portage

2019-01-19

icedtea-bin - 3.10.0
Ebuild name:

dev-java/icedtea-bin-3.10.0

Description

A Gentoo-made binary build of the IcedTea JDK

Added to portage

2019-01-19

kodi-pvr-mythtv - 5.10.4
Ebuild name:

media-plugins/kodi-pvr-mythtv-5.10.4

Description

MythTV PVR for Kodi

Added to portage

2019-01-19

libtrace - 4.0.6
Ebuild name:

net-libs/libtrace-4.0.6

Description

A library and tools for trace processing

Added to portage

2019-01-19

libtrace - 99999
Ebuild name:

net-libs/libtrace-99999

Description

A library and tools for trace processing

Added to portage

2019-01-19

linkchecker - 9.4.0
Ebuild name:

net-analyzer/linkchecker-9.4.0

Description

Check websites for broken links

Added to portage

2019-01-19

lxd - 3.9
Ebuild name:

app-emulation/lxd-3.9

Description

Fast, dense and secure container management

Added to portage

2019-01-19

mit-krb5 - 1.16.3
Ebuild name:

app-crypt/mit-krb5-1.16.3

Description

MIT Kerberos V

Added to portage

2019-01-19

mitmproxy - 4.0.4
Ebuild name:

net-proxy/mitmproxy-4.0.4

Description

An interactive, SSL-capable, man-in-the-middle HTTP proxy

Added to portage

2019-01-19

mongo-c-driver - 1.13.0-r1
Ebuild name:

dev-libs/mongo-c-driver-1.13.0-r1

Description

Client library written in C for MongoDB

Added to portage

2019-01-19

mysqlclient - 1.4.0
Ebuild name:

dev-python/mysqlclient-1.4.0

Description

Fork of MySQL-python

Added to portage

2019-01-19

nagios - 4.4.3
Ebuild name:

net-analyzer/nagios-4.4.3

Description

The Nagios metapackage

Added to portage

2019-01-19

nagios-core - 4.4.3
Ebuild name:

net-analyzer/nagios-core-4.4.3

Description

Nagios core - monitoring daemon, web GUI, and documentation

Added to portage

2019-01-19

networkmanager-strongswan - 1.4.4-r1
Ebuild name:

net-misc/networkmanager-strongswan-1.4.4-r1

Description

NetworkManager StrongSwan plugin

Added to portage

2019-01-19

nodejs - 11.7.0
Ebuild name:

net-libs/nodejs-11.7.0

Description

A JavaScript runtime built on Chrome's V8 JavaScript engine

Added to portage

2019-01-19

pam_ssh - 2.2
Ebuild name:

sys-auth/pam_ssh-2.2

Description

Uses ssh-agent to provide single sign-on

Added to portage

2019-01-19

pecl-mcrypt - 1.0.2
Ebuild name:

dev-php/pecl-mcrypt-1.0.2

Description

Bindings for the libmcrypt library

Added to portage

2019-01-19

perf - 4.20.3
Ebuild name:

dev-util/perf-4.20.3

Description

Userland tools for Linux Performance Counters

Added to portage

2019-01-19

pundit - 2.0.1
Ebuild name:

dev-ruby/pundit-2.0.1

Description

Object oriented authorization for Rails applications

Added to portage

2019-01-19

sbc - 1.4
Ebuild name:

media-libs/sbc-1.4

Description

Audio codec to connect bluetooth HQ audio devices as headphones or loudspeakers

Added to portage

2019-01-19

setuptools_scm - 3.2.0
Ebuild name:

dev-python/setuptools_scm-3.2.0

Description

package to manage versions by scm tags via setuptools

Added to portage

2019-01-19

term-ansicolor - 1.7.1
Ebuild name:

dev-ruby/term-ansicolor-1.7.1

Description

Small Ruby library that colors strings using ANSI escape sequences

Added to portage

2019-01-19

thefuck - 3.28
Ebuild name:

app-shells/thefuck-3.28

Description

Magnificent app which corrects your previous console command

Added to portage

2019-01-19

thinkfan - 1.0.1
Ebuild name:

app-laptop/thinkfan-1.0.1

Description

simple fan control program for thinkpads

Added to portage

2019-01-19

trojan - 1.10.0
Ebuild name:

net-proxy/trojan-1.10.0

Description

An unidentifiable mechanism that helps you bypass GFW

Added to portage

2019-01-19

ubuntu-wallpapers - 18.10.2
Ebuild name:

x11-themes/ubuntu-wallpapers-18.10.2

Description

Ubuntu wallpapers

Added to portage

2019-01-19

vim - 8.1.0648-r1
Ebuild name:

app-editors/vim-8.1.0648-r1

Description

Vim, an improved vi-style text editor

Added to portage

2019-01-19

xboxdrv - 0.8.8_p20190118
Ebuild name:

games-util/xboxdrv-0.8.8_p20190118

Description

Userspace Xbox 360 Controller driver

Added to portage

2019-01-19

xen - 4.12.0_rc1
Ebuild name:

app-emulation/xen-4.12.0_rc1

Description

The Xen virtual machine monitor

Added to portage

2019-01-19

xen-pvgrub - 4.12.0_rc1
Ebuild name:

app-emulation/xen-pvgrub-4.12.0_rc1

Description

allows to boot Xen domU kernels from a menu.lst laying inside g

Added to portage

2019-01-19

xen-tools - 4.12.0_rc1
Ebuild name:

app-emulation/xen-tools-4.12.0_rc1

Description

Xen tools including QEMU and xl

Added to portage

2019-01-19

yarn - 1.13.0
Ebuild name:

sys-apps/yarn-1.13.0

Description

Fast, reliable, and secure node dependency management

Added to portage

2019-01-19

yash - 2.48
Ebuild name:

app-shells/yash-2.48

Description

Yash is a POSIX-compliant command line shell

Added to portage

2019-01-19

zim - 0.70_rc1
Ebuild name:

x11-misc/zim-0.70_rc1

Description

A desktop wiki

Added to portage

2019-01-19

2019-01-18
addressable - 2.6.0
Ebuild name:

dev-ruby/addressable-2.6.0

Description

A replacement for the URI implementation that is part of Ruby's standard

Added to portage

2019-01-18

ansible - 2.6.12
Ebuild name:

app-admin/ansible-2.6.12

Description

Model-driven deployment, config management, and command execution framewor

Added to portage

2019-01-18

ansible - 2.7.6
Ebuild name:

app-admin/ansible-2.7.6

Description

Model-driven deployment, config management, and command execution framework

Added to portage

2019-01-18

autoprefixer-rails - 9.4.5
Ebuild name:

dev-ruby/autoprefixer-rails-9.4.5

Description

Add vendor prefixes to CSS rules using values from the Can I Use

Added to portage

2019-01-18

awscli - 1.16.91
Ebuild name:

dev-python/awscli-1.16.91

Description

Universal Command Line Environment for AWS

Added to portage

2019-01-18

bless - 0.6.0-r4
Ebuild name:

dev-util/bless-0.6.0-r4

Description

GTK Hex Editor

Added to portage

2019-01-18

botocore - 1.12.81
Ebuild name:

dev-python/botocore-1.12.81

Description

Low-level, data-driven core of boto 3.

Added to portage

2019-01-18

bundler-audit - 0.6.1
Ebuild name:

dev-ruby/bundler-audit-0.6.1

Description

Provides patch-level verification for Bundled apps

Added to portage

2019-01-18

burrow_exporter - 0.0.6-r1
Ebuild name:

app-metrics/burrow_exporter-0.0.6-r1

Description

Prometheus exporter for Burrow

Added to portage

2019-01-18

cargo - 1.32.0
Ebuild name:

virtual/cargo-1.32.0

Description

Package manager for Rust

Added to portage

2019-01-18

daemontools-encore - 1.11
Ebuild name:

sys-process/daemontools-encore-1.11

Description

Collection of tools for managing UNIX services

Added to portage

2019-01-18

detachtty - 11.0.0
Ebuild name:

app-misc/detachtty-11.0.0

Description

Attach/detach from interactive processes across the network

Added to portage

2019-01-18

docker-registry - 2.7.1
Ebuild name:

app-emulation/docker-registry-2.7.1

Description

Docker Registry 2.0

Added to portage

2019-01-18

dvipost - 1.1-r3
Ebuild name:

dev-tex/dvipost-1.1-r3

Description

post processor for dvi files

Added to portage

2019-01-18

elasticsearch - 5.6.14
Ebuild name:

app-misc/elasticsearch-5.6.14

Description

Open Source, Distributed, RESTful, Search Engine

Added to portage

2019-01-18

gcr - 3.28.1
Ebuild name:

app-crypt/gcr-3.28.1

Description

Libraries for cryptographic UIs and accessing PKCS11 modules

Added to portage

2019-01-18

glib-networking - 2.58.0
Ebuild name:

net-libs/glib-networking-2.58.0

Description

Network-related giomodules for glib

Added to portage

2019-01-18

gnucap - 0.35.20091207-r1
Ebuild name:

sci-electronics/gnucap-0.35.20091207-r1

Description

GNUCap is the GNU Circuit Analysis Package

Added to portage

2019-01-18

gupnp-av - 0.12.11
Ebuild name:

net-libs/gupnp-av-0.12.11

Description

Utility library aiming to ease the handling UPnP A/V profiles

Added to portage

2019-01-18

i18n - 1.5.2
Ebuild name:

dev-ruby/i18n-1.5.2

Description

Add Internationalization support to your Ruby application

Added to portage

2019-01-18

inkscape - 0.92.4
Ebuild name:

media-gfx/inkscape-0.92.4

Description

SVG based generic vector-drawing program

Added to portage

2019-01-18

java-sdk-docs - 1.8.0.202
Ebuild name:

dev-java/java-sdk-docs-1.8.0.202

Description

Oracle's documentation bundle (including API) for Java SE

Added to portage

2019-01-18

java-sdk-docs - 11.0.2
Ebuild name:

dev-java/java-sdk-docs-11.0.2

Description

Oracle's documentation bundle (including API) for Java SE

Added to portage

2019-01-18

kalzium - 18.12.1-r1
Ebuild name:

kde-apps/kalzium-18.12.1-r1

Description

Periodic table of the elements

Added to portage

2019-01-18

kdevelop - 5.3.1-r1
Ebuild name:

dev-util/kdevelop-5.3.1-r1

Description

Integrated Development Environment, supporting KF5/Qt, C/C++ and much mo

Added to portage

2019-01-18

kibana-bin - 5.6.14
Ebuild name:

www-apps/kibana-bin-5.6.14

Description

Analytics and search dashboard for Elasticsearch

Added to portage

2019-01-18

kube-apiserver - 1.12.5
Ebuild name:

sys-cluster/kube-apiserver-1.12.5

Description

Kubernetes API server

Added to portage

2019-01-18

kube-controller-manager - 1.12.5
Ebuild name:

sys-cluster/kube-controller-manager-1.12.5

Description

Kubernetes Controller Manager

Added to portage

2019-01-18

kube-proxy - 1.12.5
Ebuild name:

sys-cluster/kube-proxy-1.12.5

Description

Kubernetes Proxy service

Added to portage

2019-01-18

kube-scheduler - 1.12.5
Ebuild name:

sys-cluster/kube-scheduler-1.12.5

Description

Kubernetes Scheduler

Added to portage

2019-01-18

kubectl - 1.12.5
Ebuild name:

sys-cluster/kubectl-1.12.5

Description

CLI to run commands against Kubernetes clusters

Added to portage

2019-01-18

kubelet - 1.12.5
Ebuild name:

sys-cluster/kubelet-1.12.5

Description

Kubernetes Node Agent

Added to portage

2019-01-18

libsecret - 0.18.7
Ebuild name:

app-crypt/libsecret-0.18.7

Description

GObject library for accessing the freedesktop.org Secret Service API

Added to portage

2019-01-18

libvncserver - 0.9.12
Ebuild name:

net-libs/libvncserver-0.9.12

Description

library for creating vnc servers

Added to portage

2019-01-18

listen - 3.1.5-r3
Ebuild name:

dev-ruby/listen-3.1.5-r3

Description

Listens to file modifications and notifies you about the changes

Added to portage

2019-01-18

minikube - 0.33.0
Ebuild name:

sys-cluster/minikube-0.33.0

Description

Single Node Kubernetes Cluster

Added to portage

2019-01-18

mod_h2 - 1.12.1
Ebuild name:

www-apache/mod_h2-1.12.1

Description

HTTP/2 module for Apache

Added to portage

2019-01-18

nghttp2 - 1.36.0
Ebuild name:

net-libs/nghttp2-1.36.0

Description

HTTP/2 C Library

Added to portage

2019-01-18

openconnect - 8.02
Ebuild name:

net-vpn/openconnect-8.02

Description

Free client for Cisco AnyConnect SSL VPN software

Added to portage

2019-01-18

paint - 2.1.0
Ebuild name:

dev-ruby/paint-2.1.0

Description

Terminal painter

Added to portage

2019-01-18

parallel - 1.13.0
Ebuild name:

dev-ruby/parallel-1.13.0

Description

Run any code in parallel Processes or Threads

Added to portage

2019-01-18

percona-toolkit - 3.0.13
Ebuild name:

dev-db/percona-toolkit-3.0.13

Description

Advanced command-line tools to perform a variety of MySQL and system

Added to portage

2019-01-18

process-exporter - 0.4.0-r1
Ebuild name:

app-metrics/process-exporter-0.4.0-r1

Description

Process exporter for prometheus

Added to portage

2019-01-18

rust - 1.32.0
Ebuild name:

dev-lang/rust-1.32.0

Description

Systems programming language from Mozilla

Added to portage

2019-01-18

rust - 1.32.0
Ebuild name:

virtual/rust-1.32.0

Description

Virtual for Rust language compiler

Added to portage

2019-01-18

rust-bin - 1.32.0
Ebuild name:

dev-lang/rust-bin-1.32.0

Description

Systems programming language from Mozilla

Added to portage

2019-01-18

s390-tools - 2.4.0-r1
Ebuild name:

sys-apps/s390-tools-2.4.0-r1

Description

User space utilities for the zSeries (s390) Linux kernel and device dr

Added to portage

2019-01-18

slack-bin - 3.3.7
Ebuild name:

net-im/slack-bin-3.3.7

Description

Team collaboration tool

Added to portage

2019-01-18

slibtool - 0.5.28
Ebuild name:

sys-devel/slibtool-0.5.28

Description

A skinny libtool implementation, written in C

Added to portage

2019-01-18

smatch - 1.60
Ebuild name:

sys-devel/smatch-1.60

Description

static analysis tool for C

Added to portage

2019-01-18

unifi - 5.10.5-r1
Ebuild name:

net-wireless/unifi-5.10.5-r1

Description

A Management Controller for Ubiquiti Networks UniFi APs

Added to portage

2019-01-18

vanilla-sources - 4.14.94
Ebuild name:

sys-kernel/vanilla-sources-4.14.94

Description

Full sources for the Linux kernel

Added to portage

2019-01-18

vanilla-sources - 4.19.16
Ebuild name:

sys-kernel/vanilla-sources-4.19.16

Description

Full sources for the Linux kernel

Added to portage

2019-01-18

vanilla-sources - 4.20.3
Ebuild name:

sys-kernel/vanilla-sources-4.20.3

Description

Full sources for the Linux kernel

Added to portage

2019-01-18

vanilla-sources - 4.4.171
Ebuild name:

sys-kernel/vanilla-sources-4.4.171

Description

Full sources for the Linux kernel

Added to portage

2019-01-18

vanilla-sources - 4.9.151
Ebuild name:

sys-kernel/vanilla-sources-4.9.151

Description

Full sources for the Linux kernel

Added to portage

2019-01-18

vivaldi-snapshot - 2.3.1430.4_p1
Ebuild name:

www-client/vivaldi-snapshot-2.3.1430.4_p1

Description

A browser for our friends

Added to portage

2019-01-18

xloadimage - 4.1-r12
Ebuild name:

media-gfx/xloadimage-4.1-r12

Description

utility to view many different types of images under X11

Added to portage

2019-01-18

rdf newsfeed | rss newsfeed | Atom newsfeed
- Powered by LeopardCMS - Running on Gentoo -
Copyright 2004-2018 Sascha Nitsch Unternehmensberatung UG(haftungsbeschänkt)
Valid XHTML1.1 : Valid CSS : buttonmaker
- Level Triple-A Conformance to Web Content Accessibility Guidelines 1.0 -
- Copyright and legal notices -
Time to create this page: 10.5 ms