summaryrefslogtreecommitdiff
path: root/databases/postgresql90-server (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Delete the now expired postgresql90 ports. Upstream support forMatthew Seaman2016-07-0127-2676/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | postgresql-9.0.x was declared EoL in September 2015. Summary: Remove 9.0 from the list of postgresql versions available in ports Disconnect postgresql90 ports from the build Remove postgresql90-pgtcl port Remove postgresql90-client port Move the master postgreslXY-plperl makefile to postgresql95-plperl/Makefile. Adjust include lines in other postgresqlXY-plperl ports Delete postgresql90-plperl Move the master postgreslXY-plpython/{Makefile,pkg-descr} to postgresl95-plpython/{Makefile,pkg-descr} Adjust all other postgresqlXY-plpython/Makefile to include the new master Remove postgresql90-server Reviewers: jgh, girgen, #portmgr, O5 Ports Framework, bapt, crees Reviewed By: #portmgr, O5 Ports Framework, bapt, crees Subscribers: mat Differential Revision: https://reviews.freebsd.org/D6898 Notes: svn path=/head/; revision=417899
* Rename all files containing a : in their filename.Mathieu Arnold2016-06-171-0/+0
| | | | | | | | | | While there, run make makepatch on affected ports, and rename patches accordingly. Sponsored by: Absolight Notes: svn path=/head/; revision=417041
* - Fix trailing whitespace in pkg-messagesDmitry Marakasov2016-05-191-1/+1
| | | | | | | Approved by: portmgr blanket Notes: svn path=/head/; revision=415503
* - Fix trailing whitespace in pkg-descrs, categories [a-f]*Dmitry Marakasov2016-05-191-11/+11
| | | | | | | Approved by: portmgr blanket Notes: svn path=/head/; revision=415498
* Re-add databases/postgresql90-server, for nowRene Ladan2016-05-1627-0/+2676
| | | | | | | databases/postgresql9*-pl{perl|python} need it. Notes: svn path=/head/; revision=415347
* Remove expired ports:Rene Ladan2016-05-1627-2676/+0
| | | | | | | | | | | 2016-04-13 databases/postgresql90-contrib: "EOL was reached in September 2015" 2016-04-13 databases/postgresql90-pltcl: "EOL was reached in September 2015" 2016-04-13 databases/postgresql90-client: "EOL was reached in September 2015" 2016-04-13 databases/postgresql90-docs: "EOL was reached in September 2015" 2016-04-13 databases/postgresql90-server: "EOL was reached in September 2015" Notes: svn path=/head/; revision=415344
* Deprecate PostgreSQL 9.0Palle Girgensohn2016-02-131-0/+5
| | | | | | | | EOL was reached in September 2015 http://www.postgresql.org/support/versioning/ Notes: svn path=/head/; revision=408836
* Update PostgreSQL to latest versions.Palle Girgensohn2016-02-131-12/+16
| | | | | | | | | | | | | | | | | | | | Security Fixes for Regular Expressions, PL/Java This release closes security hole CVE-2016-0773, an issue with regular expression (regex) parsing. Prior code allowed users to pass in expressions which included out-of-range Unicode characters, triggering a backend crash. This issue is critical for PostgreSQL systems with untrusted users or which generate regexes based on user input. The update also fixes CVE-2016-0766, a privilege escalation issue for users of PL/Java. Certain custom configuration settings (GUCS) for PL/Java will now be modifiable only by the database superuser URL: http://www.postgresql.org/about/news/1644/ Security: CVE-2016-0773, CVE-2016-0766 Notes: svn path=/head/; revision=408835
* Update PostgreSQL port to latest version.Palle Girgensohn2015-10-083-4/+4
| | | | | | | | | | | | | | | | | | | | | | | Two security issues have been fixed in this release which affect users of specific PostgreSQL features: CVE-2015-5289: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. CVE-2015-5288: The crypt( function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. This update will also disable SSL renegotiation by default; previously, it was enabled by default. SSL renegotiation will be removed entirely in PostgreSQL versions 9.5 and later. URL: http://www.postgresql.org/about/news/1615/ Security: CVE-2015-5288 CVE-2015-5289 Notes: svn path=/head/; revision=398895
* Simplify a bit the MakefilesBaptiste Daroussin2015-07-222-191/+191
| | | | | | | | Use OPTIONS_SUB to automatically PLIST_SUB Use OPTIONS helpers Notes: svn path=/head/; revision=392699
* Cleanup plist and avoid useless @execBaptiste Daroussin2015-07-227-90/+2
| | | | Notes: svn path=/head/; revision=392696
* Update PostgreSQL to latest versions.Palle Girgensohn2015-06-122-3/+3
| | | | | | | | | | | | | Earlier update releases attempted to fix an issue in PostgreSQL 9.3 and 9.4 with "multixact wraparound", but failed to account for issues doing multixact cleanup during crash recovery. This could cause servers to be unable to restart after a crash. As such, all users of 9.3 and 9.4 should apply this update as soon as possible. URL: http://www.postgresql.org/about/news/1592/ Notes: svn path=/head/; revision=389267
* Update PostgreSQL to latest versions.Palle Girgensohn2015-06-052-3/+3
| | | | | | | | | | The update is mostly to fix the file persmission problem described in the URL below. You might want to wait until next upgrade, depending on you local configuration. URL: http://www.postgresql.org/about/news/1590/ Notes: svn path=/head/; revision=388585
* Update PostgreSQL ports to latest version.Palle Girgensohn2015-05-222-3/+3
| | | | | | | | | | | | | | | | | | Data Corruption Fix For users of PostgreSQL versions 9.3 or 9.4, this release fixes a problem where the database will fail to protect against "multixact wraparound", resulting in data corruption or loss. Users with a high transaction rate (1 million or more per hour) in a database with many foreign keys are especially vulnerable. We strongly urge all users of 9.4 and 9.3 to update their installations in the next few days. Users of versions 9.2 and earlier are not affected by this issue. Security: fc38cd83-00b3-11e5-8ebd-0026551a22dc Notes: svn path=/head/; revision=387089
* Commit the missing part of last commit: Chase upcoming update of ICU to 5.5.Palle Girgensohn2015-04-191-1/+1
| | | | Notes: svn path=/head/; revision=384279
* Chase upcoming update of ICU to 5.5.Palle Girgensohn2015-04-181-2/+2
| | | | Notes: svn path=/head/; revision=384223
* remove redundant cpe markers on the slave portsPalle Girgensohn2015-04-051-2/+0
| | | | Notes: svn path=/head/; revision=383272
* databases/postgresql90-server: add CPE informationBartek Rutkowski2015-03-191-0/+2
| | | | | | | | | | - Maintainer's timeout (pgsql@FreeBSD.org) PR: 197485 Submitted by: Shun <shun.fbsd.pr@dropcut.net> Notes: svn path=/head/; revision=381696
* In previous commit,Palle Girgensohn2015-02-071-1/+1
| | | | | | | | | | "Revert the change from readline to libedit, and instead make libedit optional.", I failed to get the PORTREVISION set correctly. Fixed now. PR: ports/197362 Notes: svn path=/head/; revision=378608
* Update PostgreSQL-9.x to latests versions.Palle Girgensohn2015-02-058-791/+794
| | | | | | | | | | | | | | This update fixes multiple security issues reported in PostgreSQL over the past few months. All of these issues require prior authentication, and some require additional conditions, and as such are not considered generally urgent. However, users should examine the list of security holes patched below in case they are particularly vulnerable. Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243, CVE-2015-0244,CVE-2014-8161 Notes: svn path=/head/; revision=378500
* - Unbreak builds after the lang/python27 update (r363790)Marcus von Appen2014-08-021-11/+0
| | | | | | | Exp-run: 192242, 192244 Notes: svn path=/head/; revision=363792
* Update to the latest snapshots.Chris Rees2014-07-304-102/+106
| | | | | | | | | | | uuid-ossp patch has been outdated with irrelevant changes (for us), so massage back in. In head of postgresql, this is handled properly, so eventually the ossp patches can go. Notes: svn path=/head/; revision=363500
* Prepare for upcoming ICU-5.3 upgrade.Palle Girgensohn2014-06-092-3/+3
| | | | Notes: svn path=/head/; revision=357209
* Fix mistake with ossp-uuid: don't use --with-ossp-uuid, since it will needPalle Girgensohn2014-03-211-0/+10
| | | | | | | the ossp library present, and then we never use it. Notes: svn path=/head/; revision=348732
* The PostgreSQL Global Development Group has released an update to all supportedPalle Girgensohn2014-03-204-6/+377
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | version of the database system, including versions 9.3.4, 9.2.8, 9.1.13, 9.0.17, and 8.4.21. This minor release fixes a data corruption issue with replication and crash recovery in version 9.3, as well as several other minor issues in all versions. All users of version 9.3 are urged to update their installations at the next possible downtime. Users of older versions should update at their convenience. The data corruption issue in PostgreSQL 9.3 affects binary replication standbys, servers being recovered from point-in-time-recovery backup, and standalone servers which recover from a system crash. The bug causes unrecoverable index corruption during recovery due to incorrect replay of row locking operations. This can then cause query results to be inconsistent depending on whether or not an index is used, and eventually lead to primary key violations and similar issues. For this reason, users are encouraged to replace each of their standby databases with a new base backup after applying the update. See release notes for more changes. URL: http://www.postgresql.org/docs/current/static/release.html URL: https://wiki.postgresql.org/wiki/20140320UpdateIssues A change specific to the FreeBSD port: Modify the contrib/uuid-ossp to actually work (not crashing the backend) by using the libc implementation of uuid instead of the ossp port. Schemas and queries will just work. Based on the work of Andrew Gierth. 9.1+ EXTENSION support added by girgen@. URL: http://pgfoundry.org/projects/uuid-freebsd PR: ports/121745, ports/182846 Notes: svn path=/head/; revision=348685
* Stage supportAntoine Brodin2014-02-262-9/+226
| | | | | | | | Reviewed by: postgresql@ Tested by: miwi and me Notes: svn path=/head/; revision=346217
* The PostgreSQL Global Development Group has released an importantPalle Girgensohn2014-02-203-11/+3
| | | | | | | | | | | | | | | | | | | | | | | | | update to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.3, 9.2.7, 9.1.12, 9.0.16, and 8.4.20. This update contains fixes for multiple security issues, as well as several fixes for replication and data integrity issues. All users are urged to update their installations at the earliest opportunity, especially those using binary replication or running a high-security application. This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. Before this fix, any member of a ROLE was able to grant others access to the same ROLE regardless if the member was given the WITH ADMIN OPTION permission. It also fixes multiple privilege escalation issues, including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, and CVE-2014-0066. More information on these issues can be found on our security page and the security issue detail wiki page. Security: CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063 CVE-2014-0064,CVE-2014-0065,CVE-2014-0066,CVE-2014-0067 Notes: svn path=/head/; revision=345257
* Chase ICU updatePalle Girgensohn2014-02-103-53/+3
| | | | Notes: svn path=/head/; revision=343650
* Add forgotten bits from boost chasingBaptiste Daroussin2014-02-071-2/+2
| | | | Notes: svn path=/head/; revision=343215
* The PostgreSQL Global Development Group has released a critical updatePalle Girgensohn2013-12-052-3/+3
| | | | | | | | | | | | | to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.2, 9.2.6, 9.1.11, 9.0.15, and 8.4.19. This update fixes three serious data-loss bugs affecting replication and database maintenance. All users are urged to update their installations at the earliest opportunity. URL: http://www.postgresql.org/about/news/1492/ Notes: svn path=/head/; revision=335673
* - Remove DISTV: only used in PKGNAMESUFFIX and complained by portlintSunpoet Po-Chuan Hsieh2013-10-151-2/+1
| | | | | | | | | | | - Convert to new LIB_DEPENDS format for postgresql*-contrib Submitted by: sunpoet (myself) Reviewed by: crees (pgsql) Approved by: jgh (pgsql) Notes: svn path=/head/; revision=330414
* Update PostgreSQL ports to 9.3.1, 9.2.5, 9.1.10, 9.0.14, and 8.4.18.Palle Girgensohn2013-10-122-3/+3
| | | | | | | | | | | Note that users of the hstore extension on version 9.3 must take an additional, post upgrade step of running "ALTER EXTENSION hstore UPDATE" in each database after update. URL: http://www.postgresql.org/about/news/1487/ Notes: svn path=/head/; revision=330109
* - Fix pkg name collisionJason Helfman2013-10-101-1/+3
| | | | | | | | Reviewed by: pgsql@ With hat: pgsql@ Notes: svn path=/head/; revision=329946
* - revert r329725Jason Helfman2013-10-071-2/+1
| | | | | | | | Reported by: qat@ With hat: pgsql@ Notes: svn path=/head/; revision=329729
* - Fix pkg name collisionJason Helfman2013-10-071-1/+2
| | | | | | | | Reviewed by: crees@ With hat: pgsql@ Notes: svn path=/head/; revision=329725
* Add NO_STAGE all over the place in preparation for the staging support (cat: ↵Baptiste Daroussin2013-09-201-5/+2
| | | | | | | databases) Notes: svn path=/head/; revision=327717
* The PostgreSQL Global Development Group has released a securityPalle Girgensohn2013-04-043-3/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | update to all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update *immediately*. A major security issue (for versions 9.x only) fixed in this release, [CVE-2013-1899](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899), makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. This issue was discovered by Mitsumasa Kondo and Kyotaro Horiguchi of NTT Open Source Software Center. Two lesser security fixes are also included in this release: [CVE-2013-1900](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900), wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess (all versions), and [CVE-2013-1901](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901), which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups (for versions 9.x only). Approved by: portmgr (bdrewery) URL: http://www.postgresql.org/about/news/1456/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901 Notes: svn path=/head/; revision=315718
* PostgreSQL 9.2.3, 9.1.8, 9.0.12, 8.4.16 and 8.3.23 releasedPalle Girgensohn2013-02-083-3/+4
| | | | | | | | | | | | | | | This update fixes a denial-of-service (DOS) vulnerability. All users should update their PostgreSQL installations as soon as possible. The security issue fixed in this release, CVE-2013-0255, allows a previously authenticated user to crash the server by calling an internal function with invalid arguments. URL: http://www.postgresql.org/about/news/1446/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255 Notes: svn path=/head/; revision=311915
* Chase ICU update to 50Palle Girgensohn2012-12-191-3/+7
| | | | Notes: svn path=/head/; revision=309246
* The PostgreSQL Global Development Group has released an update to all currentPalle Girgensohn2012-12-062-3/+3
| | | | | | | | | | | | | | | | versions of the PostgreSQL database system, including versions 9.2.2, 9.1.7, 9.0.11, 8.4.15, and 8.3.22. Users of PostgreSQL Hot Standby replication should update at the next possible opportunity. Other users should update at their next maintenance window. Deprecate the 8.3.22 version, since it is near end-of-life. URL: http://www.postgresql.org/about/news/1430/ Feature safe: yes Notes: svn path=/head/; revision=308391
* Update PostgreSQL to 9.2.1, 9.1.6, 9.0.10, 8.4.14 and 8.3.21 respectively.Palle Girgensohn2012-09-242-3/+3
| | | | | | | | | | This update fixes critical issues for major versions 9.1 and 9.2, and users running those versions should apply it as soon as possible. URL: http://www.postgresql.org/about/news/1416/ Notes: svn path=/head/; revision=304804
* The PostgreSQL Global Development Group today released security updates for ↵Jason Helfman2012-08-172-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | all active branches of the PostgreSQL database system, including versions 9.1.5, 9.0.9, 8.4.13 and 8.3.20. This update patches security holes associated with libxml2 and libxslt, similar to those affecting other open source projects. All users are urged to update their installations at the first available opportunity. This security release fixes a vulnerability in the built-in XML functionality, and a vulnerability in the XSLT functionality supplied by the optional XML2 extension. Both vulnerabilities allow reading of arbitrary files by any authenticated database user, and the XSLT vulnerability allows writing files as well. The fixes cause limited backwards compatibility issues. These issues correspond to the following two vulnerabilities: CVE-2012-3488: PostgreSQL insecure use of libxslt CVE-2012-3489: PostgreSQL insecure use of libxml2 This release also contains several fixes to version 9.1, and a smaller number of fixes to older versions, including: Updates and corrections to time zone data Multiple documentation updates and corrections Add limit on max_wal_senders Fix dependencies generated during ALTER TABLE ADD CONSTRAINT USING INDEX. Correct behavior of unicode conversions for PL/Python Fix WITH attached to a nested set operation (UNION/INTERSECT/EXCEPT). Fix syslogger so that log_truncate_on_rotation works in the first rotation. Only allow autovacuum to be auto-canceled by a directly blocked process. Improve fsync request queue operation Prevent corner-case core dump in rfree(). Fix Walsender so that it responds correctly to timeouts and deadlocks Several PL/Perl fixes for encoding-related issues Make selectivity operators use the correct collation Prevent unsuitable slaves from being selected for synchronous replication Make REASSIGN OWNED work on extensions as well Fix race condition with ENUM comparisons Make NOTIFY cope with out-of-disk-space Fix memory leak in ARRAY subselect queries Reduce data loss at replication failover Fix behavior of subtransactions with Hot Standby Notes: svn path=/head/; revision=302694
* The PostgreSQL Global Development Group today released security updates for allPalle Girgensohn2012-06-044-16/+5
| | | | | | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL database system, including versions 9.1.4, 9.0.8, 8.4.12 and 8.3.19. Users of the crypt(text, text) function with DES encryption in the optional pg_crypto module should upgrade their installations immediately, if you have'nt already updated since the port was patched on May 30. All other database administrators are urged to upgrade your version of PostgreSQL at the next scheduled downtime. URL: http://www.postgresql.org/about/news/1398/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143 Fix incorrect password transformation in contrib/pgcrypto’s DES crypt() function This was fixed in a patch release for the FreeBSD ports on May 30. Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655 Ignore SECURITY DEFINER and SET attributes for a procedural language’s call handle Notes: svn path=/head/; revision=298347
* - Address postgresql*-servers for crypt vulnerability (CVE-2012-2143)Jason Helfman2012-05-302-1/+13
| | | | | | | | | http://www.postgresql.org/about/news/1397/ With hat: pgsql Notes: svn path=/head/; revision=297840
* Various tidiness patches:Chris Rees2012-03-051-1/+1
| | | | | | | | | | | | | | | - Compact -plperl ports - Portlint for 90-plperl - Update version numbers in pkg-install-server - s/spaces/tabs/ - Use ${} instead of $() - s/YES/yes/ - Tidy IGNORE values Submitted by: sunpoet Notes: svn path=/head/; revision=292772
* Over to new team, pgsql@FreeBSD.orgChris Rees2012-03-041-1/+1
| | | | Notes: svn path=/head/; revision=292678
* Fix pkg-plistPalle Girgensohn2012-02-283-0/+9
| | | | Notes: svn path=/head/; revision=292397
* The PostgreSQL Global Development Group today released security updates for allPalle Girgensohn2012-02-273-15/+3
| | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL object-relational database system, including versions 9.1.3, 9.0.7, 8.4.11 and 8.3.18. Users of pg_dump, users of SSL certificates for validation or users of triggers using SECURITY DEFINER should upgrade their installations immediately. All other database administrators are urged to upgrade your version of PostgreSQL at the next scheduled downtime. More details on the security fixes here: URL: http://www.postgresql.org/about/news/1377/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868 Notes: svn path=/head/; revision=292310
* Remove p5- from postgresql*-plperl 's mention in pkg-message-clientChris Rees2012-02-191-1/+1
| | | | Notes: svn path=/head/; revision=291849
* - To preserve my sanity, slave 82 and 83 to 84, and 90 to 91, resulting inChris Rees2012-01-251-381/+6
| | | | | | | | | | | three fewer Makefiles to maintain - Switch patch master site - Various cleanups Notes: svn path=/head/; revision=289804