summaryrefslogtreecommitdiff
path: root/databases/postgresql92-server/distinfo (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove expired ports:Rene Ladan2018-02-101-5/+0
| | | | | | | | | 2018-01-01 devel/p5-Parse-Pidl: yes 2018-02-08 devel/rubygem-piston: No longer maintained upstream 2017-04-05 databases/postgresql92-server: PostgreSQL 9.2 support has reached End-of-line. Please upgrade to a later version. Notes: svn path=/head/; revision=461438
* Update to latest versions of PostgreSQLPalle Girgensohn2017-11-091-3/+3
| | | | | | | | | | | | | | | | | | The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 10.1, 9.6.6, 9.5.10, 9.4.15, 9.3.20, and 9.2.24. This release fixes three security issues. This release also fixes issues found in BRIN indexing, logical replication and other bugs reported over the past three months. Please note that the CVE-2017-12172 does not affect the FreeBSD port unless you decided to not use the contrib/startscript instead of the startscript distributed with the FreeBSD port/package. Security: CVE-2017-12172, CVE-2017-15099, CVE-2017-15098 URL: https://www.postgresql.org/about/news/1801/ Notes: svn path=/head/; revision=453847
* The PostgreSQL Global Development Group has released an update to allPalle Girgensohn2017-09-051-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | supported versions of our database system, including 9.6.5, 9.5.9, 9.4.14, 9.3.19, and 9.2.23. This release includes fixes that prevent a crash in pg_restore when using parallel mode. It also patches over a few other bugs reported since the last releases in August. Additionally, in 9.4.14 only, there is a fix to an issue with walsenders preventing primary-server shutdown unless immediate shutdown mode is used. Users should plan to update at the next convenient downtime. Bug Fixes and Improvements This update also fixes a number of bugs reported in the last few weeks. Some of these issues affect only version 9.6, but many affect all supported versions: * Show foreign tables in information_schema.table_privileges view. This fix applies to new databases, see the release notes for the procedure to apply the fix to an existing database. * Correctly identify columns that are of a range type or domain type over a composite type or domain type being searched for * Prevent crash when passing fixed-length pass-by-reference data types to parallel worker processes * Change ecpg’s parser to allow RETURNING clauses without attached C variables * Change ecpg’s parser to recognize backslash continuation of C preprocessor command lines * Improve selection of compiler flags for PL/Perl on Windows Notes: svn path=/head/; revision=449278
* The PostgreSQL Global Development Group has released an update to allPalle Girgensohn2017-08-101-3/+3
| | | | | | | | | | | | | | | | | supported versions of our database system, including 9.6.4, 9.5.8, 9.4.13, 9.3.18, and 9.2.22. This release fixes three security issues. It also patches over 50 other bugs reported over the last three months. Users who are affected by the below security issues should update as soon as possible. Users affected by CVE-2017-7547 (https://access.redhat.com/security/cve/CVE-2017-7547) will need to perform additional steps after upgrading to resolve the issue. Other users should plan to update at the next convenient downtime. URL: https://www.postgresql.org/about/news/1772/ Security: CVE-2017-7546, CVE-2017-7547, CVE-2017-7548 Notes: svn path=/head/; revision=447678
* PostgreSQL security updatesPalle Girgensohn2017-05-111-3/+3
| | | | | | | | | | | | | | | | | | | | The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.3, 9.5.7, 9.4.12, 9.3.17, and 9.2.21. This release fixes three security issues. It also patches a number of other bugs reported over the last three months. Users who use the PGREQUIRESSL environment variable to control connections, and users who rely on security isolation between database users when using foreign servers, should update as soon as possible. Other users should plan to update at the next convenient downtime. URL: https://www.postgresql.org/about/news/1746/ Security: CVE-2017-7484, CVE-2017-7485, CVE-2017-7486 Also modify rcorder and let sshd start before PostgreSQL, so any problems during startup can be reviewed promplty from an ssh login. Notes: svn path=/head/; revision=440628
* PostgreSQL 9.6.2, 9.5.6, 9.4.11, 9.3.16 and 9.2.20 released!Palle Girgensohn2017-02-091-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.2, 9.5.6, 9.4.11, 9.3.16, and 9.2.20. This release includes fixes that prevent data corruption issues in index builds and in certain write-ahead-log replay situations, which are detailed below. It also patches over 75 other bugs reported over the last three months. Users should plan to apply this update at the next scheduled downtime. Build corruption with CREATE INDEX CONCURRENTLY There existed a race condition if CREATE INDEX CONCURRENTLY was called on a column that had not been indexed before, then rows that were updated by transactions running at the same time as the CREATE INDEX CONCURRENTLY command could have been indexed incorrectly. If you suspect this may have happened, the most reliable solution is to rebuild affected indexes after installing this update. This issue is present in the 9.2, 9.3, 9.4, 9.5, and 9.6 series of PostgreSQL. URL https://www.postgresql.org/about/news/1733/ Notes: svn path=/head/; revision=433738
* Update PostgreSQL to latest versions.Palle Girgensohn2016-10-271-3/+3
| | | | | | | | | | | | | | The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.1, 9.5.5, 9.4.10, 9.3.15, 9.2.19, and 9.1.24. This release fixes two issues that can cause data corruption, which are described in more detail below. It also patches a number of other bugs reported over the last three months. The project urges users to apply this update at the next possible downtime. Notes: svn path=/head/; revision=424765
* - fix sizesOlli Hauer2016-08-111-1/+1
| | | | | | | | | - s/USE_OPENSSL/USES=ssl/ assumed OK for commit ~1h after first notify about wrong sizes in distinfo Notes: svn path=/head/; revision=420093
* The PostgreSQL Global Development Group has released an update to all supportedPalle Girgensohn2016-08-111-4/+5
| | | | | | | | | | | | | | | | | | versions of our database system, including 9.5.4, 9.4.9, 9.3.14, 9.2.18 and 9.1.23. This release fixes two security issues. It also patches a number of other bugs reported over the last three months. Users who rely on security isolation between database users should update as soon as possible. Other users should plan to update at the next convenient downtime. If you are using the ICU patch, please consult UPDATING. Improve periodic cleanup, suggested by claudius (at) ambtec.de. [1] PR: 210941 [1] Security: CVE-2016-5423, CVE-2016-5424 Notes: svn path=/head/; revision=420089
* Update PostgreSQL to latest versionsPalle Girgensohn2016-05-121-2/+2
| | | | | | | URL: http://www.postgresql.org/docs/9.5/static/release-9-5-3.html Notes: svn path=/head/; revision=415091
* Update PostgreSQL 9.1, 9.2 9.3 and 9.4 to latest versions.Palle Girgensohn2016-03-311-2/+2
| | | | | | | URL: http://www.postgresql.org/about/news/1656/ Notes: svn path=/head/; revision=412227
* Update PostgreSQL to latest versions.Palle Girgensohn2016-02-131-2/+2
| | | | | | | | | | | | | | | | | | | | Security Fixes for Regular Expressions, PL/Java This release closes security hole CVE-2016-0773, an issue with regular expression (regex) parsing. Prior code allowed users to pass in expressions which included out-of-range Unicode characters, triggering a backend crash. This issue is critical for PostgreSQL systems with untrusted users or which generate regexes based on user input. The update also fixes CVE-2016-0766, a privilege escalation issue for users of PL/Java. Certain custom configuration settings (GUCS) for PL/Java will now be modifiable only by the database superuser URL: http://www.postgresql.org/about/news/1644/ Security: CVE-2016-0773, CVE-2016-0766 Notes: svn path=/head/; revision=408835
* Update PostgreSQL port to latest version.Palle Girgensohn2015-10-081-2/+2
| | | | | | | | | | | | | | | | | | | | | | | Two security issues have been fixed in this release which affect users of specific PostgreSQL features: CVE-2015-5289: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. CVE-2015-5288: The crypt( function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. This update will also disable SSL renegotiation by default; previously, it was enabled by default. SSL renegotiation will be removed entirely in PostgreSQL versions 9.5 and later. URL: http://www.postgresql.org/about/news/1615/ Security: CVE-2015-5288 CVE-2015-5289 Notes: svn path=/head/; revision=398895
* Update PostgreSQL to latest versions.Palle Girgensohn2015-06-121-2/+2
| | | | | | | | | | | | | Earlier update releases attempted to fix an issue in PostgreSQL 9.3 and 9.4 with "multixact wraparound", but failed to account for issues doing multixact cleanup during crash recovery. This could cause servers to be unable to restart after a crash. As such, all users of 9.3 and 9.4 should apply this update as soon as possible. URL: http://www.postgresql.org/about/news/1592/ Notes: svn path=/head/; revision=389267
* Update PostgreSQL to latest versions.Palle Girgensohn2015-06-051-2/+2
| | | | | | | | | | The update is mostly to fix the file persmission problem described in the URL below. You might want to wait until next upgrade, depending on you local configuration. URL: http://www.postgresql.org/about/news/1590/ Notes: svn path=/head/; revision=388585
* Update PostgreSQL ports to latest version.Palle Girgensohn2015-05-221-2/+2
| | | | | | | | | | | | | | | | | | Data Corruption Fix For users of PostgreSQL versions 9.3 or 9.4, this release fixes a problem where the database will fail to protect against "multixact wraparound", resulting in data corruption or loss. Users with a high transaction rate (1 million or more per hour) in a database with many foreign keys are especially vulnerable. We strongly urge all users of 9.4 and 9.3 to update their installations in the next few days. Users of versions 9.2 and earlier are not affected by this issue. Security: fc38cd83-00b3-11e5-8ebd-0026551a22dc Notes: svn path=/head/; revision=387089
* Chase upcoming update of ICU to 5.5.Palle Girgensohn2015-04-181-2/+2
| | | | Notes: svn path=/head/; revision=384223
* Update PostgreSQL-9.x to latests versions.Palle Girgensohn2015-02-051-2/+2
| | | | | | | | | | | | | | This update fixes multiple security issues reported in PostgreSQL over the past few months. All of these issues require prior authentication, and some require additional conditions, and as such are not considered generally urgent. However, users should examine the list of security holes patched below in case they are particularly vulnerable. Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243, CVE-2015-0244,CVE-2014-8161 Notes: svn path=/head/; revision=378500
* Update to the latest snapshots.Chris Rees2014-07-301-2/+2
| | | | | | | | | | | uuid-ossp patch has been outdated with irrelevant changes (for us), so massage back in. In head of postgresql, this is handled properly, so eventually the ossp patches can go. Notes: svn path=/head/; revision=363500
* Prepare for upcoming ICU-5.3 upgrade.Palle Girgensohn2014-06-091-2/+2
| | | | Notes: svn path=/head/; revision=357209
* Fixed bad filesize in distinfoPalle Girgensohn2014-03-201-1/+1
| | | | Notes: svn path=/head/; revision=348722
* The PostgreSQL Global Development Group has released an update to all supportedPalle Girgensohn2014-03-201-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | version of the database system, including versions 9.3.4, 9.2.8, 9.1.13, 9.0.17, and 8.4.21. This minor release fixes a data corruption issue with replication and crash recovery in version 9.3, as well as several other minor issues in all versions. All users of version 9.3 are urged to update their installations at the next possible downtime. Users of older versions should update at their convenience. The data corruption issue in PostgreSQL 9.3 affects binary replication standbys, servers being recovered from point-in-time-recovery backup, and standalone servers which recover from a system crash. The bug causes unrecoverable index corruption during recovery due to incorrect replay of row locking operations. This can then cause query results to be inconsistent depending on whether or not an index is used, and eventually lead to primary key violations and similar issues. For this reason, users are encouraged to replace each of their standby databases with a new base backup after applying the update. See release notes for more changes. URL: http://www.postgresql.org/docs/current/static/release.html URL: https://wiki.postgresql.org/wiki/20140320UpdateIssues A change specific to the FreeBSD port: Modify the contrib/uuid-ossp to actually work (not crashing the backend) by using the libc implementation of uuid instead of the ossp port. Schemas and queries will just work. Based on the work of Andrew Gierth. 9.1+ EXTENSION support added by girgen@. URL: http://pgfoundry.org/projects/uuid-freebsd PR: ports/121745, ports/182846 Notes: svn path=/head/; revision=348685
* The PostgreSQL Global Development Group has released an importantPalle Girgensohn2014-02-201-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | update to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.3, 9.2.7, 9.1.12, 9.0.16, and 8.4.20. This update contains fixes for multiple security issues, as well as several fixes for replication and data integrity issues. All users are urged to update their installations at the earliest opportunity, especially those using binary replication or running a high-security application. This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. Before this fix, any member of a ROLE was able to grant others access to the same ROLE regardless if the member was given the WITH ADMIN OPTION permission. It also fixes multiple privilege escalation issues, including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, and CVE-2014-0066. More information on these issues can be found on our security page and the security issue detail wiki page. Security: CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063 CVE-2014-0064,CVE-2014-0065,CVE-2014-0066,CVE-2014-0067 Notes: svn path=/head/; revision=345257
* fix messed up file sizes for icu patchPalle Girgensohn2014-02-101-1/+1
| | | | Notes: svn path=/head/; revision=343714
* Chase ICU updatePalle Girgensohn2014-02-101-2/+2
| | | | Notes: svn path=/head/; revision=343650
* The PostgreSQL Global Development Group has released a critical updatePalle Girgensohn2013-12-051-2/+2
| | | | | | | | | | | | | to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.2, 9.2.6, 9.1.11, 9.0.15, and 8.4.19. This update fixes three serious data-loss bugs affecting replication and database maintenance. All users are urged to update their installations at the earliest opportunity. URL: http://www.postgresql.org/about/news/1492/ Notes: svn path=/head/; revision=335673
* Update PostgreSQL ports to 9.3.1, 9.2.5, 9.1.10, 9.0.14, and 8.4.18.Palle Girgensohn2013-10-121-2/+2
| | | | | | | | | | | Note that users of the hstore extension on version 9.3 must take an additional, post upgrade step of running "ALTER EXTENSION hstore UPDATE" in each database after update. URL: http://www.postgresql.org/about/news/1487/ Notes: svn path=/head/; revision=330109
* The PostgreSQL Global Development Group has released a securityPalle Girgensohn2013-04-041-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | update to all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update *immediately*. A major security issue (for versions 9.x only) fixed in this release, [CVE-2013-1899](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899), makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. This issue was discovered by Mitsumasa Kondo and Kyotaro Horiguchi of NTT Open Source Software Center. Two lesser security fixes are also included in this release: [CVE-2013-1900](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900), wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess (all versions), and [CVE-2013-1901](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901), which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups (for versions 9.x only). Approved by: portmgr (bdrewery) URL: http://www.postgresql.org/about/news/1456/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901 Notes: svn path=/head/; revision=315718
* PostgreSQL 9.2.3, 9.1.8, 9.0.12, 8.4.16 and 8.3.23 releasedPalle Girgensohn2013-02-081-2/+2
| | | | | | | | | | | | | | | This update fixes a denial-of-service (DOS) vulnerability. All users should update their PostgreSQL installations as soon as possible. The security issue fixed in this release, CVE-2013-0255, allows a previously authenticated user to crash the server by calling an internal function with invalid arguments. URL: http://www.postgresql.org/about/news/1446/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255 Notes: svn path=/head/; revision=311915
* Chase ICU update to 50Palle Girgensohn2012-12-191-2/+2
| | | | Notes: svn path=/head/; revision=309246
* The PostgreSQL Global Development Group has released an update to all currentPalle Girgensohn2012-12-061-2/+2
| | | | | | | | | | | | | | | | versions of the PostgreSQL database system, including versions 9.2.2, 9.1.7, 9.0.11, 8.4.15, and 8.3.22. Users of PostgreSQL Hot Standby replication should update at the next possible opportunity. Other users should update at their next maintenance window. Deprecate the 8.3.22 version, since it is near end-of-life. URL: http://www.postgresql.org/about/news/1430/ Feature safe: yes Notes: svn path=/head/; revision=308391
* Update PostgreSQL to 9.2.1, 9.1.6, 9.0.10, 8.4.14 and 8.3.21 respectively.Palle Girgensohn2012-09-241-2/+2
| | | | | | | | | | This update fixes critical issues for major versions 9.1 and 9.2, and users running those versions should apply it as soon as possible. URL: http://www.postgresql.org/about/news/1416/ Notes: svn path=/head/; revision=304804
* PostgreSQL 9.2 is released.Palle Girgensohn2012-09-101-2/+2
| | | | | | | | | | | | | "PostgreSQL 9.2 will ship with native JSON support, covering indexes, replication and performance improvements, and many more features." Read more at the web site. URL: http://www.postgresql.org/about/news/1415/ Notes: svn path=/head/; revision=304028
* update postgresql 9.2 to RC1Palle Girgensohn2012-08-271-2/+2
| | | | Notes: svn path=/head/; revision=303230
* update postgresql 9.2 to beta4Palle Girgensohn2012-08-171-2/+2
| | | | Notes: svn path=/head/; revision=302695
* The PostgreSQL Global Development Group announces the third beta releasePalle Girgensohn2012-08-071-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | of PostgreSQL 9.2, which will include major increases in performance and both vertical and horizontal scalability. The PostgreSQL Project asks all users to download and begin testing 9.2 beta 3 as soon as possible. 9.2 Beta 3 includes multiple bug fixes to earlier beta releases, fixing almost all known outstanding issues as of last week. Among them are: * Multiple documentation updates * Apply translation updates * Fixes to transaction log and replication issues with SP-GiST * Replace libpq's "row processor" API with a "single row" mode. * Fix WITH issue with set operations (UNION/INTERSECT/EXCEPT) * Improvements to Autovacuum cancellation * Multiple pg_upgrade fixes * Fix memory leak in pg_recievexlog * Restore statistics collection broken by change to bgwriter * Prevent corner-case coredump with rfree(). If you previously tested 9.2 beta and found one or more bugs, please test 9.2 beta 3 and make sure that those issues are resolved. If you haven't yet tested 9.2, please help out the PostgreSQL project by testing it now! More information on how to test and report issues: http://www.postgresql.org/developer/beta Notes: svn path=/head/; revision=302226
* The PostgreSQL Global Development Group today released security updates for allPalle Girgensohn2012-06-041-2/+2
| | | | | | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL database system, including versions 9.1.4, 9.0.8, 8.4.12 and 8.3.19. Users of the crypt(text, text) function with DES encryption in the optional pg_crypto module should upgrade their installations immediately, if you have'nt already updated since the port was patched on May 30. All other database administrators are urged to upgrade your version of PostgreSQL at the next scheduled downtime. URL: http://www.postgresql.org/about/news/1398/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143 Fix incorrect password transformation in contrib/pgcrypto’s DES crypt() function This was fixed in a patch release for the FreeBSD ports on May 30. Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655 Ignore SECURITY DEFINER and SET attributes for a procedural language’s call handle Notes: svn path=/head/; revision=298347
* The PostgreSQL Global Development Group announces the beta release ofPalle Girgensohn2012-05-151-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | PostgreSQL 9.2, which will include major increases in performance and both vertical and horizontal scalability. The PostgreSQL Project asks all users to download and begin testing 9.2 Beta as soon as possible. Major performance and scalability advances in this version include: * Index-only scans, allowing users to avoid inefficient scans of base tables * Enhanced read-only workload scaling to 64 cores and over 300,000 queries per second * Improvements to data write speeds, including group commit * Reductions in CPU power consumption * Cascading replication, supporting geographically distributed standby databases PostgreSQL 9.2 will also offer many new features for application developers, including: * JSON data support, enabling hybrid document-relational databases * Range types, supporting new types of calendar, time-series and * analytic applications * Multiple improvements to ALTER and other statements, easing runtime * database updates For a full listing of the features in version 9.2 Beta, please see the release notes: http://www.postgresql.org/docs/devel/static/release-9-2.html We depend on our community to help test the next version in order to guarantee that it is high-performance and bug-free. Please install PostgreSQL 9.2 Beta and try it with your workloads and applications as soon as you can, and give feedback to the PostgreSQL developers. More information on how to test and report issues: http://www.postgresql.org/developer/beta Notes: svn path=/head/; revision=296704
* The PostgreSQL Global Development Group today released security updates for allPalle Girgensohn2012-02-271-2/+2
| | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL object-relational database system, including versions 9.1.3, 9.0.7, 8.4.11 and 8.3.18. Users of pg_dump, users of SSL certificates for validation or users of triggers using SECURITY DEFINER should upgrade their installations immediately. All other database administrators are urged to upgrade your version of PostgreSQL at the next scheduled downtime. More details on the security fixes here: URL: http://www.postgresql.org/about/news/1377/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868 Notes: svn path=/head/; revision=292310
* The PostgreSQL Global Development Group today released updates for allPalle Girgensohn2011-12-051-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL object-relational database system, including versions 9.1.2, 9.0.6, 8.4.10, 8.3.17 and 8.2.23. This release contains 52 fixes to version 9.1, and a smaller number of fixes to older versions, including: - Fix bugs in information_schema.referential_constraints view** - Correct collations for citext columns and indexes** - Prevent possible crash when joining to a scalar function - Prevent transitory data corruption of GIN indexes after a crash - Prevent data corruption on TOAST columns when copying data - Fix failures during hot standby startup - Correct another "variable not found in subplan target list" bug - Fix bug with sorting on aggregate expressions in windowing functions - Multiple bug fixes for pg_upgrade - Change Foreign Key creation order to better support self-referential keys** - Multiple bug fixes to CREATE EXTENSION - Ensure that function return type and data returned from PL/perl agree - Ensure that PL/perl strings are always UTF-8 - Assorted bug fixes for various Extensions - Updates to the time zone database, particularly to CST6 Changes marked with ** above require additional, post-update steps in order to fix all described issues. URL: http://www.postgresql.org/docs/current/static/release.html Also, fix a pthread problem in the FreeBSD port. [1] PR: 160580 [1] Feature safe: yes Notes: svn path=/head/; revision=286930
* The PostgreSQL Global Development Group today released minor version updatesPalle Girgensohn2011-10-181-2/+2
| | | | | | | | | | | | | | | | for all active branches of the PostgreSQL object-relational database system, including versions 9.1.1, 9.0.5, 8.4.9, 8.3.16 and 8.2.22. All users are strongly urged to update their installations at the next scheduled downtime. URL: http://www.postgresql.org/about/news.1355 Cleanup ports. Better handling of the knob PG_USER. Also add uuid to 9.0 and 9.1 contrib ports. Notes: svn path=/head/; revision=283757
* - Add ICU support to PostgreSQL 9.1 serverMartin Matuska2011-10-061-2/+2
| | | | | | | | | | | | - Make SSL available as an option - Make portlint happier - Fix some typos PR: ports/160915 Approved by: maintainer (timeout) Notes: svn path=/head/; revision=283031
* Update to PostgreSQL version 9.1.0Palle Girgensohn2011-09-121-2/+2
| | | | | | | SITE: http://www.postgresql.org/docs/9.1/static/release-9-1.html Notes: svn path=/head/; revision=281659
* Update to 9.1 beta 3Palle Girgensohn2011-07-201-2/+2
| | | | | | | | Fix broken plist for the postgres user's home directory Release notes at http://www.postgresql.org/about/news.1331 Notes: svn path=/head/; revision=278000
* Update to 9.1beta2Palle Girgensohn2011-06-141-2/+2
| | | | | | | Fix proken plists wrt NLS Notes: svn path=/head/; revision=275539
* Add postgresql 9.1 beta1.Palle Girgensohn2011-06-111-2/+2
| | | | | | | | | | | | | See http://www.postgresql.org/about/news.1313 for more info. Also, use USERS knob instead of explicitally creating the pgsql user while still accepting alternative names, using [1] with some added magic. PR: 157667 [1] Notes: svn path=/head/; revision=275407
* Update PostgreSQL to 9.0.4, 8.4.8, 8.3.15 and 8.2.21.Palle Girgensohn2011-04-181-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | This update contains a critical fix to the pg_upgrade utility which prevents significant downtime issues. Do not use pg_upgrade without installing this update first. The issue with pg_upgrade and the fix are detailed on the PostgreSQL wiki: http://wiki.postgresql.org/wiki/20110408pg_upgrade_fix Users who have already used pg_upgrade should run the database repair script given on that page on their databases as soon as possible. See the release notes for each version at http://www.postgresql.org/docs/current/static/release.html for a full list of changes with details. Allow the username of the postgresql user to configurable for 8.4 and 9.0. Largely inspired by the work of Jason Helfman [153668, 153136]. Change PGUSER knob to PG_USER not to clash with PGUSER environment. PR: 153668, 153136, 155493, 155137 Notes: svn path=/head/; revision=272900
* Update to versions 9.0.3, 8.4.7, 8.3.14 and 8.2.20.Palle Girgensohn2011-02-011-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This update includes a security fix which prevents a buffer overrun in the contrib module intarray's input function for the query_int type. This bug is a security risk since the function's return address could be overwritten by malicious code. All supported versions of PostgreSQL are impacted. However, the affected contrib module is optional. Only users who have installed the intarray module in their database are affected. See the CVE Advisory at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4015 This release includes 63 bugfixes, including: - Avoid unexpected conversion overflow in planner for distant date values - Fix assignment to an array slice that is before the existing range of subscripts - Fix pg_restore to do the right thing when escaping large objects - Avoid failures when EXPLAIN tries to display a simple-form CASE expression - Improved build support for Windows version - Fix bug in contrib/seg's GiST picksplit algorithm which caused performance degredation The 9.0.3 update also contains several fixes for issues with features introduced or changed in version 9.0: - Ensure all the received WAL is fsync'd to disk before exiting walreceiver - Improve performance of walreceiver by avoiding excess fsync activity - Make ALTER TABLE revalidate uniqueness and exclusion constraints when needed - Fix EvalPlanQual for UPDATE of an inheritance tree when the tables are not all alike PR: ports/154436 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4015 Feature safe: yes Approved by: portmgr Notes: svn path=/head/; revision=268521
* - Update to 9.0.2Martin Matuska2010-12-311-4/+2
| | | | | | | | | | - Unify ICU handling PR: ports/153245 Approved by: maintainer (timeout) Notes: svn path=/head/; revision=267208
* Update all PostgreSQL ports to latest versions.Palle Girgensohn2010-10-071-3/+3
| | | | | | | | | | | Also, try to break the previous 1:1 relation between FreeBSD system and PostgreSQL versions installed. Use different PREFIX:es to install different versions on the same system. PR: ports/132402, ports/145002, ports/146657 Notes: svn path=/head/; revision=262548