from small one page howto to huge articles all in one place
 

search text in:




Other .linuxhowtos.org sites: www.linuxhowtos.org
toolsntoys.linuxhowtos.org



Last additions:
How to make X listen on port 6000

How to make X listen on port 6000

words:

34

views:

58907

userrating:

average rating: 1.5 (4 votes) (1=very good 6=terrible)


May, 25th 2007:
April, 26th 2007:
Apr, 10th. 2007:
Druckversion . pdf icon
You are here: Portage


Details of www-servers/nginx:

Description: Robust, small and high performance http and reverse proxy server
Homepage:
https://nginx.org

available versions:

releasesalphaamd64armhppaia64mipsppcppc64ppc macoss390shsparcx86USE-Flagsdependenciesebuild warnings
nginx-1.21.3 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX}/var/log/nginx
  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.21.2 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX}/var/log/nginx
  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.21.1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX}/var/log/nginx
  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.21.0-r2 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX}/var/log/nginx
  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.20.1-r2 -++---~~----+$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX}/var/log/nginx
  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
Legend:
+ stable
~ testing
- not available
some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown.


back



Support us on Content Nation

New Packages

- as rdf newsfeed
- as rss newsfeed
- as Atom newsfeed
2021-10-24
git-big-picture - 1.1.1-r1
Ebuild name:

dev-vcs/git-big-picture-1.1.1-r1

Description

Visualization tool for Git repositories

Added to portage

2021-10-24

hypothesis - 6.24.0
Ebuild name:

dev-python/hypothesis-6.24.0

Description

A library for property based testing

Added to portage

2021-10-24

libjson-rpc-cpp - 1.4.0
Ebuild name:

dev-cpp/libjson-rpc-cpp-1.4.0

Description

JSON-RPC (1.0 & 2.0) framework for C++

Added to portage

2021-10-24

limnoria - 99999999
Ebuild name:

net-irc/limnoria-99999999

Description

Python based extensible IRC infobot and channel bot

Added to portage

2021-10-24

meson - 0.59.3
Ebuild name:

dev-util/meson-0.59.3

Description

Open source build system

Added to portage

2021-10-24

nltk-data - 20211023
Ebuild name:

dev-python/nltk-data-20211023

Description

Data files for NLTK

Added to portage

2021-10-24

pyparsing - 3.0.0
Ebuild name:

dev-python/pyparsing-3.0.0

Description

Easy-to-use Python module for text parsing

Added to portage

2021-10-24

snapraid - 11.6
Ebuild name:

sys-fs/snapraid-11.6

Description

a backup program for disk array for home media centers

Added to portage

2021-10-24

spirv-headers - 99999999
Ebuild name:

dev-util/spirv-headers-99999999

Description

Machine-readable files for the SPIR-V Registry

Added to portage

2021-10-24

spirv-tools - 99999999
Ebuild name:

dev-util/spirv-tools-99999999

Description

Provides an API and commands for processing SPIR-V modules

Added to portage

2021-10-24

stardict-cdict-en-zh-big5 - 2.4.2
Ebuild name:

app-dicts/stardict-cdict-en-zh-big5-2.4.2

Description

Added to portage

2021-10-24

svneverever - 1.7.1-r1
Ebuild name:

dev-vcs/svneverever-1.7.1-r1

Description

Tool collecting path entries across SVN history

Added to portage

2021-10-24

vhba - 20211023
Ebuild name:

sys-fs/vhba-20211023

Description

Virtual (SCSI) Host Bus Adapter kernel module for the CDEmu suite

Added to portage

2021-10-24

virtualenv - 20.9.0
Ebuild name:

dev-python/virtualenv-20.9.0

Description

Virtual Python Environment builder

Added to portage

2021-10-24

wine-staging - 6.20
Ebuild name:

app-emulation/wine-staging-6.20

Description

Free implementation of Windows(tm) on Unix, with Wine-Staging patch

Added to portage

2021-10-24

wine-vanilla - 6.20
Ebuild name:

app-emulation/wine-vanilla-6.20

Description

Free implementation of Windows(tm) on Unix, without external patchs

Added to portage

2021-10-24

x42-plugins - 99999999
Ebuild name:

media-plugins/x42-plugins-99999999

Description

Collection of LV2 plugins

Added to portage

2021-10-24

2021-10-23
Devel-Hide - 0.1.500
Ebuild name:

dev-perl/Devel-Hide-0.1.500

Description

Forces the unavailability of specified Perl modules (for testing)

Added to portage

2021-10-23

Devel-NYTProf - 6.110.0
Ebuild name:

dev-perl/Devel-NYTProf-6.110.0

Description

Powerful feature-rich perl source code profiler

Added to portage

2021-10-23

Devel-REPL - 1.3.28-r1
Ebuild name:

dev-perl/Devel-REPL-1.3.28-r1

Description

A modern perl interactive shell

Added to portage

2021-10-23

Devel-SimpleTrace - 0.80.0-r1
Ebuild name:

dev-perl/Devel-SimpleTrace-0.80.0-r1

Description

See where you code warns and dies using stack traces

Added to portage

2021-10-23

Devel-SmallProf - 2.20.0-r5
Ebuild name:

dev-perl/Devel-SmallProf-2.20.0-r5

Description

Per-line Perl profiler

Added to portage

2021-10-23

Devel-StackTrace-AsHTML - 0.150.0-r1
Ebuild name:

dev-perl/Devel-StackTrace-AsHTML-0.150.0-r1

Description

Displays stack trace in HTML

Added to portage

2021-10-23

Digest-JHash - 0.100.0-r1
Ebuild name:

dev-perl/Digest-JHash-0.100.0-r1

Description

Perl extension for 32 bit Jenkins Hashing Algorithm

Added to portage

2021-10-23

Dist-CheckConflicts - 0.110.0-r1
Ebuild name:

dev-perl/Dist-CheckConflicts-0.110.0-r1

Description

Declare version conflicts for your dist

Added to portage

2021-10-23

Dist-Metadata - 0.927.0-r1
Ebuild name:

dev-perl/Dist-Metadata-0.927.0-r1

Description

Information about a perl module distribution

Added to portage

2021-10-23

Dist-Zilla - 6.24.0
Ebuild name:

dev-perl/Dist-Zilla-6.24.0

Description

Distribution builder; installer not included

Added to portage

2021-10-23

Dist-Zilla-Plugin-AuthorsFromGit - 0.6.0-r1
Ebuild name:

dev-perl/Dist-Zilla-Plugin-AuthorsFromGit-0.6.0-r1

Description

Add per-file per-year copyright information

Added to portage

2021-10-23

Dist-Zilla-Plugin-Git - 2.48.0
Ebuild name:

dev-perl/Dist-Zilla-Plugin-Git-2.48.0

Description

Update your git repository after release

Added to portage

2021-10-23

Dist-Zilla-Plugin-MakeMaker-Awesome - 0.490.0
Ebuild name:

dev-perl/Dist-Zilla-Plugin-MakeMaker-Awesome-0.490.0

Description

A more awesome MakeMaker plugin for Dist

Added to portage

2021-10-23

Dist-Zilla-Plugin-Test-ReportPrereqs - 0.28.0
Ebuild name:

dev-perl/Dist-Zilla-Plugin-Test-ReportPrereqs-0.28.0

Description

Report on prerequisite versions during automat

Added to portage

2021-10-23

Lab-Measurement - 3.780
Ebuild name:

dev-perl/Lab-Measurement-3.780

Description

Measurement control and automation with Perl

Added to portage

2021-10-23

NativeThread - 0_pre20190914-r1
Ebuild name:

net-libs/NativeThread-0_pre20190914-r1

Description

NativeThread for priorities on linux for freenet

Added to portage

2021-10-23

Sys-CpuLoad - 0.310.0-r1
Ebuild name:

dev-perl/Sys-CpuLoad-0.310.0-r1

Description

A module to retrieve system load averages

Added to portage

2021-10-23

ae - 1.8.2-r1
Ebuild name:

dev-ruby/ae-1.8.2-r1

Description

Assertive Expressive is an assertions library designed for reuse

Added to portage

2021-10-23

arc-theme - 20211018
Ebuild name:

x11-themes/arc-theme-20211018

Description

A flat theme with transparent elements for GTK 2/3/4 and GNOME Shell

Added to portage

2021-10-23

arrow - 1.2.0
Ebuild name:

dev-python/arrow-1.2.0

Description

Better dates and times for Python

Added to portage

2021-10-23

awscli - 1.21.2
Ebuild name:

app-admin/awscli-1.21.2

Description

Universal Command Line Environment for AWS

Added to portage

2021-10-23

boto3 - 1.19.2
Ebuild name:

dev-python/boto3-1.19.2

Description

The AWS SDK for Python

Added to portage

2021-10-23

botocore - 1.22.2
Ebuild name:

dev-python/botocore-1.22.2

Description

Low-level, data-driven core of boto 3

Added to portage

2021-10-23

brass - 1.2.1-r1
Ebuild name:

dev-ruby/brass-1.2.1-r1

Description

BRASS is a very basic assertions framework for Ruby

Added to portage

2021-10-23

ceph - 16.2.6-r1
Ebuild name:

sys-cluster/ceph-16.2.6-r1

Description

Ceph distributed filesystem

Added to portage

2021-10-23

chromium - 97.0.4676.0
Ebuild name:

www-client/chromium-97.0.4676.0

Description

Open-source version of Google Chrome web browser

Added to portage

2021-10-23

csv - 3.2.1
Ebuild name:

dev-ruby/csv-3.2.1

Description

The CSV library provides a complete interface to CSV files and data

Added to portage

2021-10-23

dask - 2021.10.0
Ebuild name:

dev-python/dask-2021.10.0

Description

Task scheduling and blocked algorithms for parallel processing

Added to portage

2021-10-23

eduke32 - 20211010.9722
Ebuild name:

games-fps/eduke32-20211010.9722

Description

An open source engine port of the classic PC first person shooter D

Added to portage

2021-10-23

eventlet - 0.32.0-r1
Ebuild name:

dev-python/eventlet-0.32.0-r1

Description

Highly concurrent networking library

Added to portage

2021-10-23

fec - 1.0.4-r3
Ebuild name:

dev-java/fec-1.0.4-r3

Description

Forward Error Correction library in Java

Added to portage

2021-10-23

freerdp - 2.4.1
Ebuild name:

net-misc/freerdp-2.4.1

Description

Free implementation of the Remote Desktop Protocol

Added to portage

2021-10-23

gitdb - 4.0.8
Ebuild name:

dev-python/gitdb-4.0.8

Description

GitDB is a pure-Python git object database

Added to portage

2021-10-23

gzdoom - 4.7.1
Ebuild name:

games-fps/gzdoom-4.7.1

Description

A modder-friendly OpenGL source port based on the DOOM engine

Added to portage

2021-10-23

hashery - 2.1.2-r1
Ebuild name:

dev-ruby/hashery-2.1.2-r1

Description

The Hashery is a tight collection of Hash-like classes

Added to portage

2021-10-23

identify - 2.3.1
Ebuild name:

dev-python/identify-2.3.1

Description

File identification library for Python

Added to portage

2021-10-23

intel-compute-runtime - 21.42.21270
Ebuild name:

dev-libs/intel-compute-runtime-21.42.21270

Description

Intel Graphics Compute Runtime for oneAPI Level Zero and

Added to portage

2021-10-23

leafnode - 1.11.11-r1
Ebuild name:

net-nntp/leafnode-1.11.11-r1

Description

A USENET software package designed for small sites

Added to portage

2021-10-23

lemon - 0.9.1-r1
Ebuild name:

dev-ruby/lemon-0.9.1-r1

Description

Lemon is a unit testing framework

Added to portage

2021-10-23

lldpd - 1.0.12
Ebuild name:

net-misc/lldpd-1.0.12

Description

Implementation of IEEE 802.1ab (LLDP)

Added to portage

2021-10-23

lrslib - 071b
Ebuild name:

sci-libs/lrslib-071b

Description

Reverse-search algorithm for vertex enumeration problems

Added to portage

2021-10-23

lrslib - 071b-r1
Ebuild name:

sci-libs/lrslib-071b-r1

Description

Reverse-search algorithm for vertex enumeration problems

Added to portage

2021-10-23

lzma - 19.00
Ebuild name:

dev-java/lzma-19.00

Description

Java code for LZMA compression and decompression

Added to portage

2021-10-23

lzmajio - 0.95-r3
Ebuild name:

dev-java/lzmajio-0.95-r3

Description

LzmaInputStream/LzmaOutputStream interacting with underlying LZMA en-/deco

Added to portage

2021-10-23

mersennetwister - 0_pre23765-r2
Ebuild name:

dev-java/mersennetwister-0_pre23765-r2

Description

Modified MersenneTwister java port for Freenet

Added to portage

2021-10-23

moneydance - 2022.4058
Ebuild name:

app-office/moneydance-2022.4058

Description

A cross-platform personal finance application

Added to portage

2021-10-23

msmtp - 1.8.18
Ebuild name:

mail-mta/msmtp-1.8.18

Description

An SMTP client and SMTP plugin for mail user agents such as Mutt

Added to portage

2021-10-23

openssl - 1.1.1l-r1
Ebuild name:

dev-libs/openssl-1.1.1l-r1

Description

full-strength general purpose cryptography library (including SSL and TL

Added to portage

2021-10-23

papirus-icon-theme - 20211001
Ebuild name:

x11-themes/papirus-icon-theme-20211001

Description

Free and open source SVG icon theme

Added to portage

2021-10-23

parallel - 20211022
Ebuild name:

sys-process/parallel-20211022

Description

A shell tool for executing jobs in parallel locally or on remote mach

Added to portage

2021-10-23

pdf-reader - 1.4.1-r4
Ebuild name:

dev-ruby/pdf-reader-1.4.1-r4

Description

PDF parser conforming as much as possible to the PDF specification fro

Added to portage

2021-10-23

perl - 5.34.0-r4
Ebuild name:

dev-lang/perl-5.34.0-r4

Description

Larry Wall's Practical Extraction and Report Language

Added to portage

2021-10-23

pip - 21.3.1
Ebuild name:

dev-python/pip-21.3.1

Description

Installs python packages -- replacement for easy_install

Added to portage

2021-10-23

polymake - 4.5
Ebuild name:

sci-mathematics/polymake-4.5

Description

Tool for polyhedral geometry and combinatorics

Added to portage

2021-10-23

qed - 2.9.2-r1
Ebuild name:

dev-ruby/qed-2.9.2-r1

Description

QED (Quality Ensured Demonstrations) is a TDD/BDD framework

Added to portage

2021-10-23

regex - 2021.10.23
Ebuild name:

dev-python/regex-2021.10.23

Description

Alternative regular expression module to replace re

Added to portage

2021-10-23

rqlite - 6.1.0
Ebuild name:

dev-db/rqlite-6.1.0

Description

Replicated SQLite using the Raft consensus protocol

Added to portage

2021-10-23

rqlite - 6.7.0
Ebuild name:

dev-db/rqlite-6.7.0

Description

Replicated SQLite using the Raft consensus protocol

Added to portage

2021-10-23

rubberband - 2.0.0
Ebuild name:

media-libs/rubberband-2.0.0

Description

An audio time-stretching and pitch-shifting library and utility program

Added to portage

2021-10-23

ruby-rc4 - 0.1.5-r3
Ebuild name:

dev-ruby/ruby-rc4-0.1.5-r3

Description

A pure Ruby implementation of the Rc4 algorithm

Added to portage

2021-10-23

rubytest - 0.8.1-r1
Ebuild name:

dev-ruby/rubytest-0.8.1-r1

Description

Ruby Test is a universal test harness for Ruby

Added to portage

2021-10-23

rubytest-cli - 0.2.0-r1
Ebuild name:

dev-ruby/rubytest-cli-0.2.0-r1

Description

Rubytest CLI is a command-line interface for Rubytest

Added to portage

2021-10-23

seatd - 0.6.3
Ebuild name:

sys-auth/seatd-0.6.3

Description

Minimal seat management daemon and universal library

Added to portage

2021-10-23

simpleeval - 0.9.11
Ebuild name:

dev-python/simpleeval-0.9.11

Description

A simple, safe single expression evaluator library

Added to portage

2021-10-23

stardict-cdict-en-zh-big5 - 2.4.2
Ebuild name:

app-dicts/stardict-cdict-en-zh-big5-2.4.2

Description

Added to portage

2021-10-23

uim - 1.8.8-r2
Ebuild name:

app-i18n/uim-1.8.8-r2

Description

A multilingual input method framework

Added to portage

2021-10-23

uim - 1.8.9_pre20210103
Ebuild name:

app-i18n/uim-1.8.9_pre20210103

Description

A multilingual input method framework

Added to portage

2021-10-23

virtualenv - 20.7.2-r1
Ebuild name:

dev-python/virtualenv-20.7.2-r1

Description

Virtual Python Environment builder

Added to portage

2021-10-23

virtualenv - 20.8.1-r1
Ebuild name:

dev-python/virtualenv-20.8.1-r1

Description

Virtual Python Environment builder

Added to portage

2021-10-23

vivaldi - 4.3.2439.56
Ebuild name:

www-client/vivaldi-4.3.2439.56

Description

A browser for our friends

Added to portage

2021-10-23

yt-dlp - 2021.10.22
Ebuild name:

net-misc/yt-dlp-2021.10.22

Description

youtube-dl fork with additional features and fixes

Added to portage

2021-10-23

zeroconf - 0.36.9
Ebuild name:

dev-python/zeroconf-0.36.9

Description

Pure Python Multicast DNS Service Discovery Library (Bonjour/Avahi compa

Added to portage

2021-10-23

rdf newsfeed | rss newsfeed | Atom newsfeed
- Powered by LeopardCMS - Running on Gentoo -
Copyright 2004-2020 Sascha Nitsch Unternehmensberatung GmbH
Valid XHTML1.1 : Valid CSS : buttonmaker
- Level Triple-A Conformance to Web Content Accessibility Guidelines 1.0 -
- Copyright and legal notices -
Time to create this page: 16.5 ms