head 1.32; access; symbols pkgsrc-2015Q3:1.31.0.6 pkgsrc-2015Q3-base:1.31 pkgsrc-2015Q2:1.31.0.4 pkgsrc-2015Q2-base:1.31 pkgsrc-2015Q1:1.31.0.2 pkgsrc-2015Q1-base:1.31 pkgsrc-2014Q4:1.30.0.4 pkgsrc-2014Q4-base:1.30 pkgsrc-2014Q3:1.30.0.2 pkgsrc-2014Q3-base:1.30 pkgsrc-2014Q2:1.29.0.4 pkgsrc-2014Q2-base:1.29 pkgsrc-2014Q1:1.29.0.2 pkgsrc-2014Q1-base:1.29 pkgsrc-2013Q4:1.27.0.2 pkgsrc-2013Q4-base:1.27 pkgsrc-2013Q3:1.25.0.4 pkgsrc-2013Q3-base:1.25 pkgsrc-2013Q2:1.25.0.2 pkgsrc-2013Q2-base:1.25 pkgsrc-2013Q1:1.24.0.2 pkgsrc-2013Q1-base:1.24 pkgsrc-2012Q4:1.23.0.2 pkgsrc-2012Q4-base:1.23 pkgsrc-2012Q3:1.21.0.2 pkgsrc-2012Q3-base:1.21 pkgsrc-2012Q2:1.17.0.4 pkgsrc-2012Q2-base:1.17 pkgsrc-2012Q1:1.17.0.2 pkgsrc-2012Q1-base:1.17 pkgsrc-2011Q4:1.16.0.2 pkgsrc-2011Q4-base:1.16 pkgsrc-2011Q3:1.14.0.2 pkgsrc-2011Q3-base:1.14 pkgsrc-2011Q2:1.11.0.2 pkgsrc-2011Q2-base:1.11 pkgsrc-2011Q1:1.10.0.2 pkgsrc-2011Q1-base:1.10 pkgsrc-2010Q4:1.8.0.2 pkgsrc-2010Q4-base:1.8 pkgsrc-2010Q3:1.7.0.2 pkgsrc-2010Q3-base:1.7 pkgsrc-2010Q2:1.5.0.2 pkgsrc-2010Q2-base:1.5 pkgsrc-2010Q1:1.3.0.4 pkgsrc-2010Q1-base:1.3 pkgsrc-2009Q4:1.3.0.2 pkgsrc-2009Q4-base:1.3 pkgsrc-2009Q3:1.2.0.2 pkgsrc-2009Q3-base:1.2 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.32 date 2015.10.24.21.36.49; author joerg; state dead; branches; next 1.31; commitid T4FidtL7Sm5xlpGy; 1.31 date 2015.01.23.15.06.00; author joerg; state Exp; branches; next 1.30; commitid n41aabIdCwBAZ97y; 1.30 date 2014.07.25.22.14.55; author adam; state Exp; branches; next 1.29; commitid SvqZhpeMLYWtdOJx; 1.29 date 2014.03.27.20.57.54; author adam; state Exp; branches; next 1.28; commitid MYjSLNdlsO03Enux; 1.28 date 2014.02.23.11.25.50; author adam; state Exp; branches; next 1.27; commitid VdgZfCOG5HBvvdqx; 1.27 date 2013.12.10.22.32.56; author adam; state Exp; branches; next 1.26; commitid ohMN3aaPeA02CDgx; 1.26 date 2013.10.12.20.39.42; author adam; state Exp; branches; next 1.25; commitid ZB5WBHGWppIMS29x; 1.25 date 2013.04.04.21.08.32; author adam; state Exp; branches; next 1.24; 1.24 date 2013.02.09.11.19.09; author adam; state Exp; branches 1.24.2.1; next 1.23; 1.23 date 2012.12.07.21.19.51; author adam; state Exp; branches; next 1.22; 1.22 date 2012.10.05.22.15.35; author adam; state Exp; branches; next 1.21; 1.21 date 2012.08.23.16.56.38; author adam; state Exp; branches; next 1.20; 1.20 date 2012.07.16.21.17.11; author asau; state Exp; branches; next 1.19; 1.19 date 2012.07.12.18.57.27; author marino; state Exp; branches; next 1.18; 1.18 date 2012.07.01.19.30.23; author morr; state Exp; branches; next 1.17; 1.17 date 2012.03.05.14.13.19; author adam; state Exp; branches 1.17.4.1; next 1.16; 1.16 date 2011.12.15.17.16.13; author adam; state Exp; branches; next 1.15; 1.15 date 2011.10.12.19.44.51; author hans; state Exp; branches; next 1.14; 1.14 date 2011.09.27.11.04.30; author adam; state Exp; branches; next 1.13; 1.13 date 2011.09.14.15.55.26; author hans; state Exp; branches; next 1.12; 1.12 date 2011.09.11.10.53.31; author marino; state Exp; branches; next 1.11; 1.11 date 2011.04.22.13.01.30; author adam; state Exp; branches; next 1.10; 1.10 date 2011.02.15.08.14.15; author adam; state Exp; branches; next 1.9; 1.9 date 2011.01.20.12.38.49; author markd; state Exp; branches; next 1.8; 1.8 date 2010.12.19.09.53.41; author adam; state Exp; branches; next 1.7; 1.7 date 2010.10.07.15.53.22; author adam; state Exp; branches; next 1.6; 1.6 date 2010.08.04.06.00.55; author mbalmer; state Exp; branches; next 1.5; 1.5 date 2010.05.20.12.36.38; author adam; state Exp; branches; next 1.4; 1.4 date 2010.04.12.09.58.38; author adam; state Exp; branches; next 1.3; 1.3 date 2009.12.16.13.30.53; author adam; state Exp; branches 1.3.4.1; next 1.2; 1.2 date 2009.09.10.10.06.19; author adam; state Exp; branches; next 1.1; 1.1 date 2009.07.29.06.26.17; author adam; state Exp; branches 1.1.1.1; next ; 1.24.2.1 date 2013.04.09.10.33.31; author tron; state Exp; branches; next ; 1.17.4.1 date 2012.07.03.19.58.23; author tron; state Exp; branches; next ; 1.3.4.1 date 2010.05.12.21.20.06; author tron; state Exp; branches; next 1.3.4.2; 1.3.4.2 date 2010.05.22.10.38.54; author tron; state Exp; branches; next ; 1.1.1.1 date 2009.07.29.06.26.17; author adam; state Exp; branches; next ; desc @@ 1.32 log @Retire EOLed PostgreSQL 8.4 and 9.0. @ text @$NetBSD: distinfo,v 1.31 2015/01/23 15:06:00 joerg Exp $ SHA1 (postgresql-8.4.22.tar.bz2) = 66a1286c4983121af35b76c97b97288013edc151 RMD160 (postgresql-8.4.22.tar.bz2) = c46d1fd3405150f0ed25012dad1ef8110d2c2d64 Size (postgresql-8.4.22.tar.bz2) = 14651732 bytes SHA1 (patch-aa) = 72437773d67939c8d8c8e9a99caf430590fd726f SHA1 (patch-ab) = aa46d88c8a72edaf95880de48474ea484d6d2bf5 SHA1 (patch-ac) = 0b82797d0b80bdd1e9b5f3de4989fe3848adf6cb SHA1 (patch-ad) = fb75df841bbcc25e840ed9c2fed59232d7189200 SHA1 (patch-af) = a73769cf05223d2ee06249c9e69c85038c2cd936 SHA1 (patch-ag) = 85dac95e40efc16270885087f868aeb76e1b9214 SHA1 (patch-ah) = 25102dce1b9b22385353af23500636fb18e3bf64 SHA1 (patch-ai) = 0d6f536f7593e362ec216eafa73c718ad6bed8fc SHA1 (patch-ao) = b098032408fc951865966710554667a249db6320 SHA1 (patch-ba) = f8de4ee18a433b65a54280d047d18b161d3e9ca8 SHA1 (patch-bb) = 22859530d2694cf4c347f5e4c02eff0483d536d1 SHA1 (patch-src_backend_utils_adt_datetime.c) = a23fb1bf4c05faf818853643fcd851a9f796e13a SHA1 (patch-src_interfaces_ecpg_pgtypeslib_interval.c) = 39d256ee9a429986ea4dc8b9eefff420a37d119c SHA1 (patch-src_pl_plperl_plperl.h) = 8d448cc8e0e0dbc4d15dad369d3ca7a796874ac2 SHA1 (patch-src_pl_plpgsql_src_Makefile) = 1592ecb85d6ef1bd691f77b320f639b6fc822e14 @ 1.31 log @Apply strtoi fix for NetBSD/current to all PostgreSQL versions. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.30 2014/07/25 22:14:55 adam Exp $ @ 1.30 log @The PostgreSQL Global Development Group has released an update to all supported version of the database system, including versions 9.3.5, 9.2.9, 9.1.14, 9.0.18, and 8.4.22. This minor release fixes a number of issues discovered and reported by users over the last four months, including some data corruption issues, and is the last update of version 8.4. Users of version 9.3 will want to update at the earliest opportunity; users of version 8.4 will want to schedule an upgrade to a supported PostgreSQL version. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.29 2014/03/27 20:57:54 adam Exp $ d17 2 @ 1.29 log @This minor release fixes a data corruption issue with replication and crash recovery in version 9.3, as well as several other minor issues in all versions. All users of version 9.3 are urged to update their installations at the next possible downtime. Users of older versions should update at their convenience. The data corruption issue in PostgreSQL 9.3 affects binary replication standbys, servers being recovered from point-in-time-recovery backup, and standalone servers which recover from a system crash. The bug causes unrecoverable index corruption during recovery due to incorrect replay of row locking operations. This can then cause query results to be inconsistent depending on whether or not an index is used, and eventually lead to primary key violations and similar issues. For this reason, users are encouraged to replace each of their standby databases with a new base backup after applying the update. Other PostgreSQL 9.3-only fixes in this update include: Make sure that statistics files for dropped databases get deleted Allow materialized views to be referenced in UPDATE and DELETE queries Add read-only data_checksum parameter Prevent erroneous operator push-down in postgres_fdw This release resolves some other issues in all versions of PostgreSQL, including: Fix timing consistency issue with NOTIFY Allow regular expression execution to be cancelled Improve performance of index checks for newly added rows Prevent premature walsender disconnection Prevent memory errors on newer Windows versions Update timezone files @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.28 2014/02/23 11:25:50 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.21.tar.bz2) = 2669ace05665cf3f7234fdfd8c3e8bf225cbd4af RMD160 (postgresql-8.4.21.tar.bz2) = 5bb580b8b8aa20c463c99c3e699c3bc87e4eecc8 Size (postgresql-8.4.21.tar.bz2) = 14645050 bytes a18 1 SHA1 (patch-src_pl_plpython_Makefile) = d70e0cf5e20479851df3ededa50776fd04846d49 @ 1.28 log @Changes: This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. This update also fixes some issues which affect binary replication and row locking, and can cause recoverable data corruption in some cases. In addition to the above, the following issues are fixed in this release: Fix WAL logging of visibility map change Make sure that GIN indexes log all insertions Get pause_at_recovery_target to pause at correct time Ensure walreceiver sends hot-standby feedback messages on time Prevent timeout interrupts from taking control away from mainline code Eliminate several race conditions Fix some broken HINTs in error messages Prevent server lockup on SSL connection loss Fix two Unicode handling issues Prevent crash on certain subselect syntax Prevent crash on select from zero column table Fix two bugs with LATERAL Fix issue with UNION ALL, partitioning, and updates Ensure that ANALYZE understands domains over ranges Eliminate permissions check when using default tablespace Fix memory leakage in JSON functions Allow extensions with event triggers Distinguish numbers correctly in JSON output Fix permissions for pg_start_backup() and pg_stop_backup() Accept SHIFT_JIS as locale name Fix .* expansion for SQL function variables Prevent infinite loop on some COPY connection failures Several fixes for client issues on Windows Enable building PostgreSQL with Visual Studio 2013 Update time zone files for recent changes @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.27 2013/12/10 22:32:56 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.20.tar.bz2) = bad68fc70f90a28212459e5347c32ebbdfcf2c8e RMD160 (postgresql-8.4.20.tar.bz2) = 974a4ccf2170ef8f42bbf639c1a74d3100ffa727 Size (postgresql-8.4.20.tar.bz2) = 14642312 bytes @ 1.27 log @The PostgreSQL Global Development Group has released a critical update to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.2, 9.2.6, 9.1.11, 9.0.15, and 8.4.19. This update fixes three serious data-loss bugs affecting replication and database maintenance. All users are urged to update their installations at the earliest opportunity. The replication issue affects some users of PostgreSQL binary replication, and can cause minor data loss between the master and the standby. While not all users are affected, it is difficult to predict when the bug will occur, so we urge all users of replication and continuous backup (PITR) to update immediately. Additionally, users who had replication running under PostgreSQL minor versions 9.3.0, 9.3.1, 9.2.5, 9.1.10, or 9.0.14 should plan to take a fresh base backup of each standby after update, in order to ensure no prior data corruption already exists. This release also fixes two timing issues with VACUUM, which can cause old, overwritten or deleted rows to re-appear at a later date under some circumstances. Users with very high transaction rates, particularly those who experience "transaction ID wraparound" every few weeks or less, are the most at risk for this issue. Those users should set vacuum_freeze_table_age to 0, and run a database-wide VACUUM after the update. The second of the two VACUUM issues affects only 9.3, making it expecially important for 9.3 users to update. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.26 2013/10/12 20:39:42 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.19.tar.bz2) = 1e1ae13727cea95545650df06b0035400c6f7bdd RMD160 (postgresql-8.4.19.tar.bz2) = d88bf270e23c7f01fc2a3e182e4f76a6c1ce8df7 Size (postgresql-8.4.19.tar.bz2) = 14825794 bytes @ 1.26 log @Changes Guarantee transmission of all WAL files before replica failover Prevent downcasing of non-ASCII identifiers Fix several minor memory leaks Correct overcommit behavior when using more than 24GB of work memory Improve planner cost estimates for choosing generic plans Fix estimates of NULL rows in boolean columns Make UNION ALL and inheritance query plans recheck parameterized paths Correct pg_dump bugs for foreign tables, views, and extensions Prevent a parallel pg_restore failure on certain indexes Make REINDEX revalidate constraints Prevent two deadlock issues in SP-GIST and REINDEX CONCURRENTLY Prevent GiST index lookup crash Fix several regular expression failures Allow ALTER DEFAULT PRIVILEGES to work on all schemas Loosen restrictions on keywords Allow various spellings of infinity Expand ability to compare rows to records and arrays Prevent psql client crash on bad PSQLRC file Add spinlock support for ARM64 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.25 2013/04/04 21:08:32 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.18.tar.bz2) = e3ae82eb864af03ebf213c430c65e69fef472fbd RMD160 (postgresql-8.4.18.tar.bz2) = b0e37aa00e4c83af13369456afe5cd124692dc42 Size (postgresql-8.4.18.tar.bz2) = 14819294 bytes d19 1 @ 1.25 log @The PostgreSQL Global Development Group has released a security update to all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update immediately. A major security issue fixed in this release, CVE-2013-1899, makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. Two lesser security fixes are also included in this release: CVE-2013-1900, wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess, and CVE-2013-1901, which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups. Finally, this release fixes two security issues with the graphical installers for Linux and Mac OS X: insecure passing of superuser passwords to a script, CVE-2013-1903 and the use of predictable filenames in /tmp CVE-2013-1902. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.24 2013/02/09 11:19:09 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.17.tar.bz2) = 1c8760ad7048f6e62ac8c822fee653117f5beb57 RMD160 (postgresql-8.4.17.tar.bz2) = 122acee594551be5e42f208dfde522a0ad1ce17d Size (postgresql-8.4.17.tar.bz2) = 14795028 bytes @ 1.24 log @The PostgreSQL Global Development Group has released a security update to all current versions of the PostgreSQL database system, including versions 9.2.3, 9.1.8, 9.0.12, 8.4.16, and 8.3.23. This update fixes a denial-of-service (DOS) vulnerability. All users should update their PostgreSQL installations as soon as possible. The security issue fixed in this release, CVE-2013-0255, allows a previously authenticated user to crash the server by calling an internal function with invalid arguments. This issue was discovered by independent security researcher Sumit Soni this week and reported via Secunia SVCRP, and we are grateful for their efforts in making PostgreSQL more secure. Today's update also fixes a performance regression which caused a decrease in throughput when using dynamic queries in stored procedures in version 9.2. Applications which use PL/pgSQL's EXECUTE are strongly affected by this regression and should be updated. Additionally, we have fixed intermittent crashes caused by CREATE/DROP INDEX CONCURRENTLY, and multiple minor issues with replication. This release is expected to be the final update for version 8.3, which is now End-of-Life (EOL). Users of version 8.3 should plan to upgrade to a later version of PostgreSQL immediately. For more information, see our Versioning Policy. This update release also contains fixes for many minor issues discovered and patched by the PostgreSQL community in the last two months, including: * Prevent unnecessary table scans during vacuuming * Prevent spurious cached plan error in PL/pgSQL * Allow sub-SELECTs to be subscripted * Prevent DROP OWNED from dropping databases or tablespaces * Make ECPG use translated messages * Allow PL/Python to use multi-table trigger functions (again) in 9.1 and 9.2 * Fix several activity log management issues on Windows * Prevent autovacuum file truncation from being cancelled by deadlock_timeout * Make extensions build with the .exe suffix automatically on Windows * Fix concurrency issues with CREATE/DROP DATABASE * Reject out-of-range values in to_date() conversion function * Revert cost estimation for large indexes back to pre-9.2 behavior * Make pg_basebackup tolerate timeline switches * Cleanup leftover temp table entries during crash recovery * Prevent infinite loop when COPY inserts a large tuple into a table with a large fillfactor * Prevent integer overflow in dynahash creation * Make pg_upgrade work with INVALID indexes * Fix bugs in TYPE privileges * Allow Contrib installchecks to run in their own databases * Many documentation updates * Add new timezone "FET". @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.23 2012/12/07 21:19:51 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.16.tar.bz2) = af6c3caf75d3fb895774106875de08ce61258116 RMD160 (postgresql-8.4.16.tar.bz2) = 64c114cee18ad1c9dab05e42362f72007a4d9ab4 Size (postgresql-8.4.16.tar.bz2) = 14784029 bytes @ 1.24.2.1 log @Pullup ticket #4112 - requested by fhajny databases/postgresql84: security update databases/postgresql84-client: security update databases/postgresql84-server: security update databases/postgresql90: security update databases/postgresql90-client: security update databases/postgresql90-docs: security update databases/postgresql90-server: security update databases/postgresql91: security update databases/postgresql91-client: security update databases/postgresql91-docs: security update databases/postgresql91-server: security update databases/postgresql92: security update databases/postgresql92-client: security update databases/postgresql92-docs: security update databases/postgresql92-server: security update Revisions pulled up: - databases/Makefile 1.428 - databases/postgresql84-client/PLIST 1.19 - databases/postgresql84-server/PLIST 1.15 - databases/postgresql84/Makefile.common 1.26 - databases/postgresql84/distinfo 1.25 - databases/postgresql90-docs/PLIST 1.15 - databases/postgresql90-server/PLIST 1.12 - databases/postgresql90/Makefile.common 1.24 - databases/postgresql90/distinfo 1.17 - databases/postgresql91-docs/PLIST 1.11 - databases/postgresql91-server/PLIST 1.7 - databases/postgresql91/Makefile.common 1.14 - databases/postgresql91/distinfo 1.14 - databases/postgresql92-client/PLIST 1.4 - databases/postgresql92-docs/PLIST 1.4 - databases/postgresql92-server/PLIST 1.3 - databases/postgresql92/Makefile.common 1.5 - databases/postgresql92/distinfo 1.4 - databases/postgresql92/patches/patch-contrib_dblink_dblink.c 1.2 --- Module Name: pkgsrc Committed By: adam Date: Thu Apr 4 21:08:38 UTC 2013 Modified Files: pkgsrc/databases: Makefile pkgsrc/databases/postgresql84: Makefile.common distinfo pkgsrc/databases/postgresql84-client: PLIST pkgsrc/databases/postgresql84-server: PLIST pkgsrc/databases/postgresql90: Makefile.common distinfo pkgsrc/databases/postgresql90-docs: PLIST pkgsrc/databases/postgresql90-server: PLIST pkgsrc/databases/postgresql91: Makefile.common distinfo pkgsrc/databases/postgresql91-docs: PLIST pkgsrc/databases/postgresql91-server: PLIST pkgsrc/databases/postgresql92: Makefile.common distinfo pkgsrc/databases/postgresql92-client: PLIST pkgsrc/databases/postgresql92-docs: PLIST pkgsrc/databases/postgresql92-server: PLIST pkgsrc/databases/postgresql92/patches: patch-contrib_dblink_dblink.c pkgsrc/mk: pgsql.buildlink3.mk Removed Files: pkgsrc/databases/jdbc-postgresql83: DESCR Makefile PLIST distinfo pkgsrc/databases/postgresql83: DESCR Makefile Makefile.common PLIST distinfo options.mk pkgsrc/databases/postgresql83-client: DESCR Makefile PLIST buildlink3.mk pkgsrc/databases/postgresql83-plperl: DESCR MESSAGE Makefile PLIST pkgsrc/databases/postgresql83-plpython: DESCR MESSAGE Makefile PLIST pkgsrc/databases/postgresql83-pltcl: DESCR MESSAGE Makefile PLIST pkgsrc/databases/postgresql83-server: DEINSTALL DESCR MESSAGE Makefile PLIST pkgsrc/databases/postgresql83-server/files: pgsql.sh pkgsrc/databases/postgresql83-uuid: Makefile pkgsrc/databases/postgresql83/files: GNUmakefile.libpq dynloader-ltdl.h pkgsrc/databases/postgresql83/patches: patch-aa patch-ab patch-ac patch-ad patch-af patch-ag patch-ah patch-ai patch-ba patch-src_interfaces_ecpg_ecpglib_Makefile patch-src_makefiles_Makefile.solaris patch-src_pl_plperl_plperl.h patch-src_pl_plpgsql_src_Makefile Log Message: The PostgreSQL Global Development Group has released a security update to all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update immediately. A major security issue fixed in this release, CVE-2013-1899, makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. Two lesser security fixes are also included in this release: CVE-2013-1900, wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess, and CVE-2013-1901, which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups. Finally, this release fixes two security issues with the graphical installers for Linux and Mac OS X: insecure passing of superuser passwords to a script, CVE-2013-1903 and the use of predictable filenames in /tmp CVE-2013-1902. @ text @d1 1 a1 1 $NetBSD$ d3 3 a5 3 SHA1 (postgresql-8.4.17.tar.bz2) = 1c8760ad7048f6e62ac8c822fee653117f5beb57 RMD160 (postgresql-8.4.17.tar.bz2) = 122acee594551be5e42f208dfde522a0ad1ce17d Size (postgresql-8.4.17.tar.bz2) = 14795028 bytes @ 1.23 log @This release fixes a significant page ordering issue with Hot Standby which could cause index corruption on the standby under some circumstances. In addition, this update patches timing issues with checkpoint and transaction ID wraparound which could cause data corruption in some cases. Today's update also fixes multiple issues with CREATE INDEX CONCURRENTLY and DROP INDEX CONCURRENTLY, which can cause those commands to fail or produce corrupt indexes. Users who use this feature may want to REINDEX or recreate affected indexes (see below). This update release also contains fixes for many minor issues discovered and patched by the PostgreSQL community in the last month, including several fixes which are specific to version 9.2. These include: * Prevent psql crash due to incorrectly encoded input data * Fix pg_regress gmake build issues * Make sure correct directory is created for extensions * Fix some issues with buffer locks and VACUUM * Multiple fixes and improvements for pg_upgrade * Fix bugs with end-of-recovery when failing over to a standby * Avoid bogus "out-of-sequence timeline ID" errors in standby-mode * Don't launch new child processes during shutdown * Improve the ability of JOINs to use partial indexes * Fix assorted integer overflow errors * Eliminate memory leaks in record_out() and record_send() * Skip searching for subtransaction logs at COMMIT * Fix WaitLatch() timing issues * Fix handling of inherited check constraints in ALTER COLUMN TYPE * Make ALTER EXTENSION SET SCHEMA behave as documented * Have SEQUENCE SET statements in the "data" section of sectional dumps * Prevent parser from believing that VIEWs have system columns * Fix --clean mode for pg_dump * Prevent hash table corruption on out-of-memory * Various query planner and executor fixes and improvements * Multiple documentation updates * DST updates for seven timezones @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.22 2012/10/05 22:15:35 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.15.tar.bz2) = ba422537cd877153d251498fe8090ea5cfdafe72 RMD160 (postgresql-8.4.15.tar.bz2) = 309bfc4bbb7af065de068006867b79e16189ecd2 Size (postgresql-8.4.15.tar.bz2) = 14701182 bytes @ 1.22 log @The PostgreSQL Global Development Group has released an update to all current versions of the PostgreSQL database system, including 9.2.1, 9.1.6, 9.0.10, 8.4.14 and 8.3.21. This update fixes critical issues for major versions 9.1 and 9.2, and users running those versions should apply it as soon as possible. Users of versions 8.3, 8.4 and 9.0 should plan to update at the next scheduled downtime. The update fixes two potential data corruption issues present in the PostgreSQL 9.1 and 9.2 for any server which has crashed, been shutdown with "immediate", or was failed over to a standby. First, the PostgreSQL development team has discovered a chance of corruption of BTREE and GIN indexes for databases. Second, there is a significant chance of corruption of the visibility map. This update fixes both issues. We strongly advise users of 9.1 and 9.2 to run VACUUM and/or index rebuilds after applying the update. Please see the 2012-09-24 Update wiki page for detailed instructions. This update release also contains fixes for many minor issues discovered and patched by the PostgreSQL community in the last month, including many fixes for the newly released version 9.2. These include: fix sorting issue with IN lists and indexes fix planner failure when combining GROUP BY with window functions improve selectivity of text searches using prefixes prevent rescanning of WITH clauses from giving wrong answers fix PL/Perl crashing issue reduce bloat for multi-column GiST indexes time zone data changes for Fiji disallow Extensions from circular schema assignment prevent crashes when default_transaction_isolation is set to "serializable" several minor fixes to pg_upgrade @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.21 2012/08/23 16:56:38 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.14.tar.bz2) = d82817a28c7b645e989b48e59d40a5045d37408a RMD160 (postgresql-8.4.14.tar.bz2) = 119c50a260a95a8c0798016e6615ffa084cc5a33 Size (postgresql-8.4.14.tar.bz2) = 14679559 bytes @ 1.21 log @Changes: * CVE-2012-3488: PostgreSQL insecure use of libxslt * CVE-2012-3489: PostgreSQL insecure use of libxml2 * Updates and corrections to time zone data * Multiple documentation updates and corrections * Add limit on max_wal_senders * Fix dependencies generated during ALTER TABLE ADD CONSTRAINT USING INDEX. * Correct behavior of unicode conversions for PL/Python * Fix WITH attached to a nested set operation (UNION/INTERSECT/EXCEPT). * Fix syslogger so that log_truncate_on_rotation works in the first rotation. * Only allow autovacuum to be auto-canceled by a directly blocked process. * Improve fsync request queue operation * Prevent corner-case core dump in rfree(). * Fix Walsender so that it responds correctly to timeouts and deadlocks * Several PL/Perl fixes for encoding-related issues * Make selectivity operators use the correct collation * Prevent unsuitable slaves from being selected for synchronous replication * Make REASSIGN OWNED work on extensions as well * Fix race condition with ENUM comparisons * Make NOTIFY cope with out-of-disk-space * Fix memory leak in ARRAY subselect queries * Reduce data loss at replication failover * Fix behavior of subtransactions with Hot Standby @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.20 2012/07/16 21:17:11 asau Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.13.tar.bz2) = 3134d622a23a2b157d56d6c4c4547e133569d524 RMD160 (postgresql-8.4.13.tar.bz2) = cd2bd8a0e24a0bda487afcecf4071b6a9f232b99 Size (postgresql-8.4.13.tar.bz2) = 14666613 bytes @ 1.20 log @Force common shared library version scheme on FreeBSD to avoid PLIST divergence. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.19 2012/07/12 18:57:27 marino Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.12.tar.bz2) = 04ad9650573df7723511f57ef8cdeadce8d3855d RMD160 (postgresql-8.4.12.tar.bz2) = 2aa0da64dc3220497d510bd60a1abf0b68fd51ef Size (postgresql-8.4.12.tar.bz2) = 14509007 bytes @ 1.19 log @databases/postgresql84-server: Fix rpath of plpgsql.so Due to updated PKG_DEVELOPER checks, postgresql84-server started failing with the following message: ERROR: lib/postgresql/plpgsql.so: missing libintl.so.8 The plpgsql.so library had no rpath set other than what the base compiler adds by default. On DragonFly, the libintl.so library would likely have been found anyway as /usr/pkg/lib is part of the LD_CONFIG hint file search path, but that isn't a guarantee. The new patch adds ${libdir} to the plpgsql.so rpath so it passes PKG_DEVELOPER checks now. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.18 2012/07/01 19:30:23 morr Exp $ d15 1 a15 1 SHA1 (patch-ba) = 2cc374fdf4351a4c03ecad30fb99d2aff2cf0bdf @ 1.18 log @Security update to version 8.4.12. Changes: * Fix incorrect password transformation in contrib/pgcrypto's DES crypt() function (Solar Designer) * Ignore SECURITY DEFINER and SET attributes for a procedural language's call handler (Tom Lane) * Allow numeric timezone offsets in timestamp input to be up to 16 hours away from UTC (Tom Lane) * Fix timestamp conversion to cope when the given time is exactly the last DST transition time for the the current timezone (Tom Lane) * Fix text to name and char to name casts to perform string truncation correctly in multibyte encodings (Karl Schnaitter) * Fix memory copying bug in to_tsquery() (Heikki Linnakangas) * Fix planner's handling of outer PlaceHolderVars within subqueries (Tom Lane) * Fix slow session startup when pg_attribute is very large (Tom Lane) * Ensure sequential scans check for query cancel reasonably often (Merlin Moncure) * Ensure the Windows implementation of PGSemaphoreLock() clears ImmediateInterruptOK before returning (Tom Lane) * Show whole-row variables safely when printing views or rules (Abbas Butt, Tom Lane) * Fix COPY FROM to properly handle null marker strings that correspond to invalid encoding (Tom Lane) * Ensure autovacuum worker processes perform stack depth checking properly (Heikki Linnakangas) * Fix logging collector to not lose log coherency under high load (Andrew Dunstan) * Fix logging collector to ensure it will restart file rotation after receiving SIGHUP (Tom Lane) * Fix WAL replay logic for GIN indexes to not fail if the index was subsequently dropped (Tom Lane) * Fix memory leak in PL/pgSQL's RETURN NEXT command (Joe Conway) * Fix PL/pgSQL's GET DIAGNOSTICS command when the target is the function's first variable (Tom Lane) * Fix potential access off the end of memory in psql's expanded display (\x) mode (Peter Eisentraut) * Fix several performance problems in pg_dump when the database contains many objects (Jeff Janes, Tom Lane) * Fix contrib/dblink's dblink_exec() to not leak temporary database connections upon error (Tom Lane) * Fix contrib/dblink to report the correct connection name in error messages (Kyotaro Horiguchi) * Update time zone data files to tzdata release 2012c for DST law changes in Antarctica, Armenia, Chile, Cuba, Falkland Islands, Gaza, Haiti, Hebron, Morocco, Syria, and Tokelau Islands; also historical corrections for Canada. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.17 2012/03/05 14:13:19 adam Exp $ d18 1 @ 1.17 log @Changes 8.4.11: * Require execute permission on the trigger function for CREATE TRIGGER * Convert newlines to spaces in names written in pg_dump comments * Fix btree index corruption from insertions concurrent with vacuuming * Allow non-existent values for some settings in ALTER USER/DATABASE SET * Track the OID counter correctly during WAL replay, even when it wraps around * Fix regular expression back-references with * attached * Fix recently-introduced memory leak in processing of inet/cidr values * Avoid double close of file handle in syslogger on Windows * Fix I/O-conversion-related memory leaks in plpgsql * Improve pg_dump's handling of inherited table columns * Fix pg_restore's direct-to-database mode for INSERT-style table data * Fix error in contrib/intarray's int[] & int[] operator * Fix error detection in contrib/pgcrypto's encrypt_iv() and decrypt_iv() * Fix one-byte buffer overrun in contrib/test_parser * Use __sync_lock_test_and_set() for spinlocks on ARM, if available * Use -fexcess-precision=standard option when building with gcc versions that accept it * Allow use of threaded Python on FreeBSD @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.16 2011/12/15 17:16:13 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.11.tar.bz2) = ce9581b9f03bd884417b988ec317ce2ed06bb15f RMD160 (postgresql-8.4.11.tar.bz2) = 85b4be0884ca11855eb0dbc1541403e7baf7c0aa Size (postgresql-8.4.11.tar.bz2) = 14502434 bytes @ 1.17.4.1 log @Pullup ticket #3843 - requested by morr databases/postgresql84-adminpack: security update databases/postgresql84-client: security update databases/postgresql84-dblink: security update databases/postgresql84-pgcrypto: security update databases/postgresql84-plperl: security update databases/postgresql84-plpython: security update databases/postgresql84-pltcl: security update databases/postgresql84-server: security update databases/postgresql84-uuid: security update databases/postgresql84: security update Revisions pulled up: - databases/postgresql84-adminpack/Makefile 1.8 - databases/postgresql84-client/Makefile 1.18 - databases/postgresql84-client/PLIST 1.14 - databases/postgresql84-dblink/Makefile 1.7 - databases/postgresql84-pgcrypto/Makefile 1.5 - databases/postgresql84-plperl/Makefile 1.11 - databases/postgresql84-plpython/Makefile 1.9 - databases/postgresql84-pltcl/Makefile 1.7 - databases/postgresql84-server/Makefile 1.14 - databases/postgresql84-server/PLIST 1.12 - databases/postgresql84-uuid/Makefile 1.3 - databases/postgresql84/Makefile 1.4 - databases/postgresql84/Makefile.common 1.20 - databases/postgresql84/distinfo 1.18 --- Module Name: pkgsrc Committed By: morr Date: Sun Jul 1 19:30:24 UTC 2012 Modified Files: pkgsrc/databases/postgresql84: Makefile Makefile.common distinfo pkgsrc/databases/postgresql84-adminpack: Makefile pkgsrc/databases/postgresql84-client: Makefile PLIST pkgsrc/databases/postgresql84-dblink: Makefile pkgsrc/databases/postgresql84-pgcrypto: Makefile pkgsrc/databases/postgresql84-plperl: Makefile pkgsrc/databases/postgresql84-plpython: Makefile pkgsrc/databases/postgresql84-pltcl: Makefile pkgsrc/databases/postgresql84-server: Makefile PLIST pkgsrc/databases/postgresql84-uuid: Makefile Log Message: Security update to version 8.4.12. Changes: * Fix incorrect password transformation in contrib/pgcrypto's DES crypt() function (Solar Designer) * Ignore SECURITY DEFINER and SET attributes for a procedural language's call handler (Tom Lane) * Allow numeric timezone offsets in timestamp input to be up to 16 hours away from UTC (Tom Lane) * Fix timestamp conversion to cope when the given time is exactly the last DST transition time for the the current timezone (Tom Lane) * Fix text to name and char to name casts to perform string truncation correctly in multibyte encodings (Karl Schnaitter) * Fix memory copying bug in to_tsquery() (Heikki Linnakangas) * Fix planner's handling of outer PlaceHolderVars within subqueries (Tom Lane) * Fix slow session startup when pg_attribute is very large (Tom Lane) * Ensure sequential scans check for query cancel reasonably often (Merlin Moncure) * Ensure the Windows implementation of PGSemaphoreLock() clears ImmediateInterruptOK before returning (Tom Lane) * Show whole-row variables safely when printing views or rules (Abbas Butt, Tom Lane) * Fix COPY FROM to properly handle null marker strings that correspond to invalid encoding (Tom Lane) * Ensure autovacuum worker processes perform stack depth checking properly (Heikki Linnakangas) * Fix logging collector to not lose log coherency under high load (Andrew Dunstan) * Fix logging collector to ensure it will restart file rotation after receiving SIGHUP (Tom Lane) * Fix WAL replay logic for GIN indexes to not fail if the index was subsequently dropped (Tom Lane) * Fix memory leak in PL/pgSQL's RETURN NEXT command (Joe Conway) * Fix PL/pgSQL's GET DIAGNOSTICS command when the target is the function's first variable (Tom Lane) * Fix potential access off the end of memory in psql's expanded display (\x) mode (Peter Eisentraut) * Fix several performance problems in pg_dump when the database contains many objects (Jeff Janes, Tom Lane) * Fix contrib/dblink's dblink_exec() to not leak temporary database connections upon error (Tom Lane) * Fix contrib/dblink to report the correct connection name in error messages (Kyotaro Horiguchi) * Update time zone data files to tzdata release 2012c for DST law changes in Antarctica, Armenia, Chile, Cuba, Falkland Islands, Gaza, Haiti, Hebron, Morocco, Syria, and Tokelau Islands; also historical corrections for Canada. @ text @d1 1 a1 1 $NetBSD$ d3 3 a5 3 SHA1 (postgresql-8.4.12.tar.bz2) = 04ad9650573df7723511f57ef8cdeadce8d3855d RMD160 (postgresql-8.4.12.tar.bz2) = 2aa0da64dc3220497d510bd60a1abf0b68fd51ef Size (postgresql-8.4.12.tar.bz2) = 14509007 bytes @ 1.16 log @Changes 8.4.10: * Fix bugs in information_schema.referential_constraints view * Correct collations for citext columns and indexes * Prevent possible crash when joining to a scalar function * Prevent transitory data corruption of GIN indexes after a crash * Prevent data corruption on TOAST columns when copying data * Fix failures during hot standby startup * Correct another "variable not found in subplan target list" bug * Fix bug with sorting on aggregate expressions in windowing functions * Multiple bug fixes for pg_upgrade * Change Foreign Key creation order to better support self-referential keys * Multiple bug fixes to CREATE EXTENSION * Ensure that function return type and data returned from PL/perl agree * Ensure that PL/perl strings are always UTF-8 * Assorted bug fixes for various Extensions * Updates to the time zone database, particularly to CST6 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.15 2011/10/12 19:44:51 hans Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.10.tar.bz2) = 31202e47fd2274b3a846d98c961cd7281d1798e8 RMD160 (postgresql-8.4.10.tar.bz2) = ce5961033fc05b9e862cfef3c164d8faed19ce89 Size (postgresql-8.4.10.tar.bz2) = 14481565 bytes @ 1.15 log @Fix build on SunOS. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.14 2011/09/27 11:04:30 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.9.tar.bz2) = 7b6bbd72db0f63ea55890427ab6c7a40e7c7ff1b RMD160 (postgresql-8.4.9.tar.bz2) = 469acc1d1358c48334896fb8fa84de1d287183d5 Size (postgresql-8.4.9.tar.bz2) = 14275979 bytes @ 1.14 log @Changes 8.4.9: * Fix bugs in indexing of in-doubt HOT-updated tuples * Fix multiple bugs in GiST index page split processing * Fix possible buffer overrun in tsvector_concat() * Fix crash in xml_recv when processing a "standalone" parameter * Make pg_options_to_table return NULL for an option with no value * Avoid possibly accessing off the end of memory in "ANALYZE" and in SJIS-2004 encoding conversion * Prevent intermittent hang in interactions of startup process with bgwriter process * Fix race condition in relcache init file invalidation * Fix memory leak at end of a GiST index scan * Fix incorrect memory accounting (leading to possible memory bloat) in tuplestores supporting holdable cursors and plpgsql's RETURN NEXT command * Fix performance problem when constructing a large, lossy bitmap * Fix join selectivity estimation for unique columns * Fix nested PlaceHolderVar expressions that appear only in sub-select target lists * Allow nested EXISTS queries to be optimized properly * Fix array- and path-creating functions to ensure padding bytes are zeroes * Fix "EXPLAIN" to handle gating Result nodes within inner-indexscan subplans * Work around gcc 4.6.0 bug that breaks WAL replay * Fix dump bug for VALUES in a view * Disallow SELECT FOR UPDATE/SHARE on sequences This operation doesn't work as expected and can lead to failures. * Fix "VACUUM" so that it always updates pg_class.reltuples/relpages * more... @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.13 2011/09/14 15:55:26 hans Exp $ d17 1 @ 1.13 log @Fix build on SunOS. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.12 2011/09/11 10:53:31 marino Exp $ d3 5 a7 5 SHA1 (postgresql-8.4.8.tar.bz2) = f4936de8b8a31f5579e094c928df9612fffe62b5 RMD160 (postgresql-8.4.8.tar.bz2) = ad4c81e7f22ed3018ff4f37e1e6ad54ce1a5fd4e Size (postgresql-8.4.8.tar.bz2) = 14136376 bytes SHA1 (patch-aa) = aeeeaafb38e75d8e8f6639280e997ba4c905b45f SHA1 (patch-ab) = a273a453e88e54467028c2a45e63bbbb304e227a d14 1 a14 1 SHA1 (patch-ao) = 045a25457da09aff30ac93f1c299064c9f6079a8 @ 1.12 log @PR#45150: Fix DragonFly build Add DragonFly entry to Makefile.shlib to allow client to build. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.11 2011/04/22 13:01:30 adam Exp $ d16 1 @ 1.11 log @Changes 8.4.8: * fix build issues on HP-UX and Itanium * update time zone files for recent time zone changes * change SQLSTATE for Hot Standby warnings * prevent bgwriter hang during recovery * prevent recursive composite type creation * disallow dropping tables whose triggers are still pending * allow use of "replication" as a user name * prevent a crash during GEQO planning * improve join plans for tables with missing statistics * fix error with SELECT FOR UPDATE in a subselect * close PL/python array slice memory leak * allow SSL connections for users with no home directory @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.10 2011/02/15 08:14:15 adam Exp $ d15 1 @ 1.10 log @Changes 8.4.7: * Avoid failures when "EXPLAIN" tries to display a simple-form CASE expression. * Fix assignment to an array slice that is before the existing range of subscripts. * Avoid unexpected conversion overflow in planner for very distant date values. * Fix pg_restore's text output for large objects (BLOBs) when standard_conforming_strings is on. * Fix erroneous parsing of tsquery values containing ... & !(subexpression) | ... * Fix buffer overrun in "contrib/intarray"'s input function for the query_int type. * Fix bug in "contrib/seg"'s GiST picksplit algorithm. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.9 2011/01/20 12:38:49 markd Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.7.tar.bz2) = 078c2fc6c3e7d6832012eab790de805ea6526060 RMD160 (postgresql-8.4.7.tar.bz2) = 15721cddd4ee916d44ed7e656c0570ef4cb6c102 Size (postgresql-8.4.7.tar.bz2) = 14133535 bytes @ 1.9 log @Dont assume libc has a strlcpy() if the heimdal libraries happen to have one and expose it. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.8 2010/12/19 09:53:41 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.6.tar.bz2) = 17cef72e99cea533caab28a463a082b523a423f7 RMD160 (postgresql-8.4.6.tar.bz2) = 62b21be252c532d62e6096a5e8280e3728c8f504 Size (postgresql-8.4.6.tar.bz2) = 14130201 bytes a13 1 SHA1 (patch-an) = 62fd4c0f9594381f85ce84954e88efc9048b7cb9 @ 1.8 log @Changes 8.4.6: * Force the default wal_sync_method to be fdatasync on Linux * Fix assorted bugs in WAL replay logic for GIN indexes * Fix recovery from base backup when the starting checkpoint WAL record is not in the same WAL segment as its redo point * Fix persistent slowdown of autovacuum workers when multiple workers remain active for a long time * Add support for detecting register-stack overrun on IA64 * Add a check for stack overflow in copyObject() * Fix detection of page splits in temporary GiST indexes * Fix error checking during early connection processing * Improve efficiency of window functions * Avoid memory leakage while "ANALYZE"'ing complex index expressions * Ensure an index that uses a whole-row Var still depends on its table * Do not "inline" a SQL function with multiple OUT parameters * Behave correctly if ORDER BY, LIMIT, FOR UPDATE, or WITH is attached to the VALUES part of INSERT ... VALUES * Fix constant-folding of COALESCE() expressions * Fix postmaster crash when connection acceptance (accept() or one of the calls made immediately after it) fails, and the postmaster was compiled with GSSAPI support * Fix missed unlink of temporary files when log_temp_files is active * Add print functionality for InhRelation nodes * Fix incorrect calculation of distance from a point to a horizontal line segment * Fix incorrect calculation of transaction status in ecpg * Fix PL/pgSQL's handling of "simple" expressions to not fail in recursion or error-recovery cases * Fix PL/Python's handling of set-returning functions * Fix bug in "contrib/cube"'s GiST picksplit algorithm * Don't emit "identifier will be truncated" notices in "contrib/dblink" except when creating new connections * Fix potential coredump on missing public key in "contrib/pgcrypto" * Fix memory leak in "contrib/xml2"'s XPath query functions * Update time zone data files to tzdata release 2010o for DST law changes in Fiji and Samoa; also historical corrections for Hong Kong. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.7 2010/10/07 15:53:22 adam Exp $ d7 1 a7 1 SHA1 (patch-ab) = 3cf9c7f0f812d2e41681281538c3f707cec232c3 @ 1.7 log @Changes 8.4.5: * Use a separate interpreter for each calling SQL userid in PL/Perl and PL/Tcl * Prevent possible crashes in pg_get_expr() by disallowing it from being called with an argument that is not one of the system catalog columns it's intended to be used with * Treat exit code 128 (ERROR_WAIT_NO_CHILDREN) as non-fatal on Windows * Fix incorrect placement of placeholder evaluation * Fix possible duplicate scans of UNION ALL member relations * Fix "cannot handle unplanned sub-select" error * Fix mishandling of whole-row Vars that reference a view or sub-select and appear within a nested sub-select * Fix mishandling of cross-type IN comparisons * Fix computation of "ANALYZE" statistics for tsvector columns * Improve planner's estimate of memory used by array_agg(), string_agg(), and similar aggregate functions * Fix failure to mark cached plans as transient * Reduce PANIC to ERROR in some occasionally-reported btree failure cases, and provide additional detail in the resulting error messages * Fix incorrect search logic for partial-match queries with GIN indexes * Prevent show_session_authorization() from crashing within autovacuum processes * Defend against functions returning setof record where not all the returned rows are actually of the same rowtype * Fix possible corruption of pending trigger event lists during subtransaction rollback * Fix possible failure when hashing a pass-by-reference function result * Improve merge join's handling of NULLs in the join columns * Take care to fsync the contents of lockfiles (both "postmaster.pid" and the socket lockfile) while writing them * Avoid recursion while assigning XIDs to heavily-nested subtransactions * Avoid holding open old WAL segments in the walwriter process * Fix log_line_prefix's %i escape, which could produce junk early in backend startup * Prevent misinterpretation of partially-specified relation options for TOAST tables * Fix inheritance count tracking in "ALTER TABLE ... ADD CONSTRAINT" * Fix possible data corruption in "ALTER TABLE ... SET TABLESPACE" when archiving is enabled * Allow "CREATE DATABASE" and "ALTER DATABASE ... SET TABLESPACE" to be interrupted by query-cancel * Improve "CREATE INDEX"'s checking of whether proposed index expressions are immutable * Fix "REASSIGN OWNED" to handle operator classes and families * Fix possible core dump when comparing two empty tsquery values * Fix LIKE's handling of patterns containing % followed by _ @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.6 2010/08/04 06:00:55 mbalmer Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.5.tar.bz2) = 6e6213c3a93b86c2a6eda1e76fd73881e48af09b RMD160 (postgresql-8.4.5.tar.bz2) = 5dc9b2a894c4b09af5a83a98527ebd5dff9a52b3 Size (postgresql-8.4.5.tar.bz2) = 14114152 bytes d14 2 a15 2 SHA1 (patch-an) = a1e7f421a101cf9ccddcaf3ce17aa1847cf76310 SHA1 (patch-ao) = 81e2ecb62e78e7f5103314db03b7cbb367ee9f10 @ 1.6 log @Prepare for databases/postgresql84-dblink @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.5 2010/05/20 12:36:38 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.4.tar.bz2) = 02592977a601976f8bae7bc3a5c69710d4d0344d RMD160 (postgresql-8.4.4.tar.bz2) = d2d45112c19a2f20d49ab82bd8f86b6ace7decd3 Size (postgresql-8.4.4.tar.bz2) = 13853838 bytes @ 1.5 log @Changes 8.4.4: * Enforce restrictions in plperl using an opmask applied to the whole interpreter, instead of using "Safe.pm" * Prevent PL/Tcl from executing untrustworthy code from pltcl_modules * Fix data corruption during WAL replay of ALTER ... SET TABLESPACE * Fix possible crash if a cache reset message is received during rebuild of a relcache entry * Apply per-function GUC settings while running the language validator for the function * Do constraint exclusion for inherited "UPDATE" and "DELETE" target tables when constraint_exclusion = partition * Do not allow an unprivileged user to reset superuser-only parameter settings * Avoid possible crash during backend shutdown if shutdown occurs when a CONTEXT addition would be made to log entries * Fix erroneous handling of %r parameter in recovery_end_command * Ensure the archiver process responds to changes in archive_command as soon as possible * Fix pl/pgsql's CASE statement to not fail when the case expression is a query that returns no rows * Update pl/perl's "ppport.h" for modern Perl versions * Fix assorted memory leaks in pl/python * Handle empty-string connect parameters properly in ecpg * Prevent infinite recursion in psql when expanding a variable that refers to itself * Fix psql's \copy to not add spaces around a dot within \copy (select ...) * Avoid formatting failure in psql when running in a locale context that doesn't match the client_encoding * Fix unnecessary "GIN indexes do not support whole-index scans" errors for unsatisfiable queries using "contrib/intarray" operators * Ensure that "contrib/pgstattuple" functions respond to cancel interrupts promptly * Make server startup deal properly with the case that shmget() returns EINVAL for an existing shared memory segment * Avoid possible crashes in syslogger process on Windows * Deal more robustly with incomplete time zone information in the Windows registry * Update the set of known Windows time zone names * Update time zone data files to tzdata release 2010j for DST law changes in Argentina, Australian Antarctic, Bangladesh, Mexico, Morocco, Pakistan, Palestine, Russia, Syria, Tunisia; also historical corrections for Taiwan. Also, add PKST (Pakistan Summer Time) to the default set of timezone abbreviations. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2010/04/12 09:58:38 adam Exp $ d15 1 @ 1.4 log @Changes 8.4.3: * Add new configuration parameter ssl_renegotiation_limit to control how often we do session key renegotiation for an SSL connection * Fix possible deadlock during backend startup * Fix possible crashes due to not handling errors during relcache reload cleanly * Fix possible crash due to use of dangling pointer to a cached plan * Fix possible crash due to overenthusiastic invalidation of cached plan for "ROLLBACK" * Fix possible crashes when trying to recover from a failure in subtransaction start * Fix server memory leak associated with use of savepoints and a client encoding different from server's encoding * Fix incorrect WAL data emitted during end-of-recovery cleanup of a GIST index page split * Fix bug in WAL redo cleanup method for GIN indexes * Fix incorrect comparison of scan key in GIN index search * Make substring() for bit types treat any negative length as meaning "all the rest of the string" The previous coding treated only -1 that way, and would produce an invalid result value for other negative values, possibly leading to a crash (CVE-2010-0442). * Fix integer-to-bit-string conversions to handle the first fractional byte correctly when the output bit width is wider than the given integer by something other than a multiple of 8 bits * Fix some cases of pathologically slow regular expression matching * Fix bug occurring when trying to inline a SQL function that returns a set of a composite type that contains dropped columns * Fix bug with trying to update a field of an element of a composite-type array column * Avoid failure when "EXPLAIN" has to print a FieldStore or assignment ArrayRef expression These cases can arise now that "EXPLAIN VERBOSE" tries to print plan node target lists. * Avoid an unnecessary coercion failure in some cases where an undecorated literal string appears in a subquery within "UNION"/"INTERSECT"/"EXCEPT" This fixes a regression for some cases that worked before 8.4. * Avoid undesirable rowtype compatibility check failures in some cases where a whole-row Var has a rowtype that contains dropped columns * Fix the STOP WAL LOCATION entry in backup history files to report the next WAL segment's name when the end location is exactly at a segment boundary * Always pass the catalog ID to an option validator function specified in "CREATE FOREIGN DATA WRAPPER" * Fix some more cases of temporary-file leakage * Add support for doing FULL JOIN ON FALSE * Improve constraint exclusion processing of boolean-variable cases, in particular make it possible to exclude a partition that has a "bool_column = false" constraint * Prevent treating an INOUT cast as representing binary compatibility * Include column name in the message when warning about inability to grant or revoke column-level privileges This is more useful than before and helps to prevent confusion when a "REVOKE" generates multiple messages, which formerly appeared to be duplicates. * When reading "pg_hba.conf" and related files, do not treat @@something as a file inclusion request if the @@ appears inside quote marks; also, never treat @@ by itself as a file inclusion request * Prevent infinite loop on some platforms if a directory is named as an inclusion target in "pg_hba.conf" and related files * Fix possible infinite loop if SSL_read or SSL_write fails without setting errno This is reportedly possible with some Windows versions of openssl. * Disallow GSSAPI authentication on local connections, since it requires a hostname to function correctly * Protect ecpg against applications freeing strings unexpectedly * Make ecpg report the proper SQLSTATE if the connection disappears * Fix translation of cell contents in psql \d output * Fix psql's numericlocale option to not format strings it shouldn't in latex and troff output formats * Fix a small per-query memory leak in psql * Make psql return the correct exit status (3) when ON_ERROR_STOP and --single-transaction are both specified and an error occurs during the implied "COMMIT" * Fix pg_dump's output of permissions for foreign servers * Fix possible crash in parallel pg_restore due to out-of-range dependency IDs * Fix plpgsql failure in one case where a composite column is set to NULL * Fix possible failure when calling PL/Perl functions from PL/PerlU or vice versa * Add volatile markings in PL/Python to avoid possible compiler-specific misbehavior * Ensure PL/Tcl initializes the Tcl interpreter fully The only known symptom of this oversight is that the Tcl clock command misbehaves if using Tcl 8.5 or later. * Prevent ExecutorEnd from being run on portals created within a failed transaction or subtransaction This is known to cause issues when using "contrib/auto_explain". * Prevent crash in "contrib/dblink" when too many key columns are specified to a dblink_build_sql_* function * Allow zero-dimensional arrays in "contrib/ltree" operations * Fix assorted crashes in "contrib/xml2" caused by sloppy memory management * Make building of "contrib/xml2" more robust on Windows * Fix race condition in Windows signal handling One known symptom of this bug is that rows in pg_listener could be dropped under heavy load. * Make the configure script report failure if the C compiler does not provide a working 64-bit integer datatype This case has been broken for some time, and no longer seems worth supporting, so just reject it at configure time instead. * Update time zone data files to tzdata release 2010e for DST law changes in Bangladesh, Chile, Fiji, Mexico, Paraguay, Samoa. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2009/12/16 13:30:53 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.3.tar.bz2) = 5edad69e797620c4f27520cb1986bc78c173d67a RMD160 (postgresql-8.4.3.tar.bz2) = 4f8bba582138ea8d77059851c361d6f2fb838e52 Size (postgresql-8.4.3.tar.bz2) = 13645257 bytes d9 1 @ 1.3 log @Changes 8.4.2: * Protect against indirect security threats caused by index functions changing session-local state * Reject SSL certificates containing an embedded null byte in the common name (CN) field * Fix hash index corruption * Fix possible crash during backend-startup-time cache initialization * Avoid crash on empty thesaurus dictionary * Prevent signals from interrupting VACUUM at unsafe times * Fix possible crash due to integer overflow in hash table size calculation * Fix crash if a DROP is attempted on an internally-dependent object * Fix very rare crash in inet/cidr comparisons * Ensure that shared tuple-level locks held by prepared transactions are not ignored * Fix premature drop of temporary files used for a cursor that is accessed within a subtransaction * Fix memory leak in syslogger process when rotating to a new CSV logfile * Fix memory leak in postmaster when re-parsing "pg_hba.conf" * Fix Windows permission-downgrade logic * Make FOR UPDATE/SHARE in the primary query not propagate into WITH queries * Fix bug with a WITH RECURSIVE query immediately inside another one * Fix concurrency bug in hash indexes * Fix incorrect logic for GiST index page splits, when the split depends on a non-first column of the index * Fix wrong search results for a multi-column GIN index with fastupdate enabled * More... @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2009/09/10 10:06:19 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.2.tar.bz2) = a617698ef3b41a74fe2c4af346172eb03e7f8a7f RMD160 (postgresql-8.4.2.tar.bz2) = 8d0030f185e9581bec6e2a0df903596579621bce Size (postgresql-8.4.2.tar.bz2) = 13600699 bytes a8 2 SHA1 (patch-ad) = 5612e447bbb76e81f72d39ad0153b9f77d47f653 SHA1 (patch-ae) = 8b3e47320dfe05d94b769c9b079fd7ca6d26f5d6 d12 1 a12 1 SHA1 (patch-ai) = 46e896a71d09af71d6b0c8ae5a8b0d5f35424482 @ 1.3.4.1 log @Pullup ticket #3113 - requested by spz: databases/postgresql82: security update databases/postgresql82-adminpack: security update databases/postgresql82-client: security update databases/postgresql82-plperl: security update databases/postgresql82-plpython: security update databases/postgresql82-pltcl: security update databases/postgresql82-server: security update databases/postgresql82-tsearch2: security update databases/postgresql83: security update databases/postgresql83-adminpack: security update databases/postgresql83-client: security update databases/postgresql83-plperl: security update databases/postgresql83-plpython: security update databases/postgresql83-pltcl: security update databases/postgresql83-server: security update databases/postgresql84: security update databases/postgresql84-adminpack: security update databases/postgresql84-client: security update databases/postgresql84-plperl: security update databases/postgresql84-plpython: security update databases/postgresql84-pltcl: security update databases/postgresql84-server: security update databases/postgresql82: security update databases/postgresql83: security update databases/postgresql84: security update Revisions pulled up: - databases/postgresql82-adminpack/Makefile 1.8 - databases/postgresql82-client/Makefile 1.13 - databases/postgresql82-client/PLIST 1.18 - databases/postgresql82-plperl/Makefile 1.10 - databases/postgresql82-plpython/Makefile 1.10 - databases/postgresql82-pltcl/Makefile 1.7 - databases/postgresql82-server/Makefile 1.11 - databases/postgresql82-server/PLIST 1.12 - databases/postgresql82-tsearch2/Makefile 1.8 - databases/postgresql82/Makefile.common 1.19-1.20 - databases/postgresql82/distinfo 1.19 - databases/postgresql82/patches/patch-ad delete - databases/postgresql82/patches/patch-ae delete - databases/postgresql83-adminpack/Makefile 1.4 - databases/postgresql83-client/Makefile 1.13-1.14 - databases/postgresql83-client/PLIST 1.12 - databases/postgresql83-plperl/Makefile 1.6 - databases/postgresql83-plpython/Makefile 1.7 - databases/postgresql83-pltcl/Makefile 1.4 - databases/postgresql83-server/Makefile 1.11 - databases/postgresql83-server/PLIST 1.10 - databases/postgresql83/Makefile.common 1.10-1.11 - databases/postgresql83/distinfo 1.11 - databases/postgresql83/patches/patch-ad delete - databases/postgresql83/patches/patch-ae delete - databases/postgresql84-adminpack/Makefile 1.3 - databases/postgresql84-client/Makefile 1.6-1.7 - databases/postgresql84-client/PLIST 1.5 - databases/postgresql84-plperl/Makefile 1.3 - databases/postgresql84-plpython/Makefile 1.4 - databases/postgresql84-pltcl/Makefile 1.3 - databases/postgresql84-server/Makefile 1.7 - databases/postgresql84-server/PLIST 1.4 - databases/postgresql84/Makefile.common 1.4-1.5 - databases/postgresql84/distinfo 1.4 - databases/postgresql84/patches/patch-ad delete - databases/postgresql84/patches/patch-ae delete - databases/postgresql84/patches/patch-ai 1.2 --- Module Name: pkgsrc Committed By: adam Date: Mon Apr 12 09:58:39 UTC 2010 Modified Files: pkgsrc/databases/postgresql84: Makefile.common distinfo pkgsrc/databases/postgresql84-adminpack: Makefile pkgsrc/databases/postgresql84-client: Makefile pkgsrc/databases/postgresql84-plperl: Makefile pkgsrc/databases/postgresql84-plpython: Makefile pkgsrc/databases/postgresql84-pltcl: Makefile pkgsrc/databases/postgresql84-server: Makefile PLIST pkgsrc/databases/postgresql84/patches: patch-ai Removed Files: pkgsrc/databases/postgresql84/patches: patch-ad patch-ae Log Message: Changes 8.4.3: * Add new configuration parameter ssl_renegotiation_limit to control how often we do session key renegotiation for an SSL connection * Fix possible deadlock during backend startup * Fix possible crashes due to not handling errors during relcache reload cleanly * Fix possible crash due to use of dangling pointer to a cached plan * Fix possible crash due to overenthusiastic invalidation of cached plan for "ROLLBACK" * Fix possible crashes when trying to recover from a failure in subtransaction start * Fix server memory leak associated with use of savepoints and a client encoding different from server's encoding * Fix incorrect WAL data emitted during end-of-recovery cleanup of a GIST index page split * Fix bug in WAL redo cleanup method for GIN indexes * Fix incorrect comparison of scan key in GIN index search * Make substring() for bit types treat any negative length as meaning "all the rest of the string" The previous coding treated only -1 that way, and would produce an invalid result value for other negative values, possibly leading to a crash (CVE-2010-0442). * Fix integer-to-bit-string conversions to handle the first fractional byte correctly when the output bit width is wider than the given integer by something other than a multiple of 8 bits * Fix some cases of pathologically slow regular expression matching * Fix bug occurring when trying to inline a SQL function that returns a set of a composite type that contains dropped columns * Fix bug with trying to update a field of an element of a composite-type array column * Avoid failure when "EXPLAIN" has to print a FieldStore or assignment ArrayRef expression These cases can arise now that "EXPLAIN VERBOSE" tries to print plan node target lists. * Avoid an unnecessary coercion failure in some cases where an undecorated literal string appears in a subquery within "UNION"/"INTERSECT"/"EXCEPT" This fixes a regression for some cases that worked before 8.4. * Avoid undesirable rowtype compatibility check failures in some cases where a whole-row Var has a rowtype that contains dropped columns * Fix the STOP WAL LOCATION entry in backup history files to report the next WAL segment's name when the end location is exactly at a segment boundary * Always pass the catalog ID to an option validator function specified in "CREATE FOREIGN DATA WRAPPER" * Fix some more cases of temporary-file leakage * Add support for doing FULL JOIN ON FALSE * Improve constraint exclusion processing of boolean-variable cases, in particular make it possible to exclude a partition that has a "bool_column = false" constraint * Prevent treating an INOUT cast as representing binary compatibility * Include column name in the message when warning about inability to grant or revoke column-level privileges This is more useful than before and helps to prevent confusion when a "REVOKE" generates multiple messages, which formerly appeared to be duplicates. * When reading "pg_hba.conf" and related files, do not treat @@something as a file inclusion request if the @@ appears inside quote marks; also, never treat @@ by itself as a file inclusion request * Prevent infinite loop on some platforms if a directory is named as an inclusion target in "pg_hba.conf" and related files * Fix possible infinite loop if SSL_read or SSL_write fails without setting errno This is reportedly possible with some Windows versions of openssl. * Disallow GSSAPI authentication on local connections, since it requires a hostname to function correctly * Protect ecpg against applications freeing strings unexpectedly * Make ecpg report the proper SQLSTATE if the connection disappears * Fix translation of cell contents in psql \d output * Fix psql's numericlocale option to not format strings it shouldn't in latex and troff output formats * Fix a small per-query memory leak in psql * Make psql return the correct exit status (3) when ON_ERROR_STOP and --single-transaction are both specified and an error occurs during the implied "COMMIT" * Fix pg_dump's output of permissions for foreign servers * Fix possible crash in parallel pg_restore due to out-of-range dependency IDs * Fix plpgsql failure in one case where a composite column is set to NULL * Fix possible failure when calling PL/Perl functions from PL/PerlU or vice versa * Add volatile markings in PL/Python to avoid possible compiler-specific misbehavior * Ensure PL/Tcl initializes the Tcl interpreter fully The only known symptom of this oversight is that the Tcl clock command misbehaves if using Tcl 8.5 or later. * Prevent ExecutorEnd from being run on portals created within a failed transaction or subtransaction This is known to cause issues when using "contrib/auto_explain". * Prevent crash in "contrib/dblink" when too many key columns are specified to a dblink_build_sql_* function * Allow zero-dimensional arrays in "contrib/ltree" operations * Fix assorted crashes in "contrib/xml2" caused by sloppy memory management * Make building of "contrib/xml2" more robust on Windows * Fix race condition in Windows signal handling One known symptom of this bug is that rows in pg_listener could be dropped under heavy load. * Make the configure script report failure if the C compiler does not provide a working 64-bit integer datatype This case has been broken for some time, and no longer seems worth supporting, so just reject it at configure time instead. * Update time zone data files to tzdata release 2010e for DST law changes in Bangladesh, Chile, Fiji, Mexico, Paraguay, Samoa. --- Module Name: pkgsrc Committed By: taca Date: Thu Apr 15 03:25:25 UTC 2010 Modified Files: pkgsrc/databases/postgresql84-client: Makefile PLIST Log Message: Add missing some documentation files to PLIST. Bump PKGREVISION. --- Module Name: pkgsrc Committed By: adam Date: Mon Apr 12 09:53:50 UTC 2010 Modified Files: pkgsrc/databases/postgresql83: Makefile.common distinfo pkgsrc/databases/postgresql83-adminpack: Makefile pkgsrc/databases/postgresql83-client: Makefile pkgsrc/databases/postgresql83-plperl: Makefile pkgsrc/databases/postgresql83-plpython: Makefile pkgsrc/databases/postgresql83-pltcl: Makefile pkgsrc/databases/postgresql83-server: Makefile PLIST Removed Files: pkgsrc/databases/postgresql83/patches: patch-ad patch-ae Log Message: Changes 8.3.10: * Add new configuration parameter ssl_renegotiation_limit to control how often we do session key renegotiation for an SSL connection * Fix possible deadlock during backend startup * Fix possible crashes due to not handling errors during relcache reload cleanly * Fix possible crash due to use of dangling pointer to a cached plan * Fix possible crashes when trying to recover from a failure in subtransaction start * Fix server memory leak associated with use of savepoints and a client encoding different from server's encoding * Fix incorrect WAL data emitted during end-of-recovery cleanup of a GIST index page split * Make substring() for bit types treat any negative length as meaning "all the rest of the string" The previous coding treated only -1 that way, and would produce an invalid result value for other negative values, possibly leading to a crash (CVE-2010-0442). * Fix integer-to-bit-string conversions to handle the first fractional byte correctly when the output bit width is wider than the given integer by something other than a multiple of 8 bits * Fix some cases of pathologically slow regular expression matching * Fix assorted crashes in xml processing caused by sloppy memory management * Fix bug with trying to update a field of an element of a composite-type array column * Fix the STOP WAL LOCATION entry in backup history files to report the next WAL segment's name when the end location is exactly at a segment boundary * Fix some more cases of temporary-file leakage This corrects a problem introduced in the previous minor release. One case that failed is when a plpgsql function returning set is called within another function's exception handler. * Improve constraint exclusion processing of boolean-variable cases, in particular make it possible to exclude a partition that has a "bool_column = false" constraint * When reading "pg_hba.conf" and related files, do not treat @@something as a file inclusion request if the @@ appears inside quote marks; also, never treat @@ by itself as a file inclusion request * Prevent infinite loop on some platforms if a directory is named as an inclusion target in "pg_hba.conf" and related files * Fix possible infinite loop if SSL_read or SSL_write fails without setting errno This is reportedly possible with some Windows versions of openssl. * Disallow GSSAPI authentication on local connections, since it requires a hostname to function correctly * Make ecpg report the proper SQLSTATE if the connection disappears * Fix psql's numericlocale option to not format strings it shouldn't in latex and troff output formats * Make psql return the correct exit status (3) when ON_ERROR_STOP and --single-transaction are both specified and an error occurs during the implied "COMMIT" * Fix plpgsql failure in one case where a composite column is set to NULL * Fix possible failure when calling PL/Perl functions from PL/PerlU or vice versa * Add volatile markings in PL/Python to avoid possible compiler-specific misbehavior * Ensure PL/Tcl initializes the Tcl interpreter fully The only known symptom of this oversight is that the Tcl clock command misbehaves if using Tcl 8.5 or later. * Prevent crash in "contrib/dblink" when too many key columns are specified to a dblink_build_sql_* function * Allow zero-dimensional arrays in "contrib/ltree" operations * Fix assorted crashes in "contrib/xml2" caused by sloppy memory management * Make building of "contrib/xml2" more robust on Windows * Fix race condition in Windows signal handling One known symptom of this bug is that rows in pg_listener could be dropped under heavy load. * Update time zone data files to tzdata release 2010e for DST law changes in Bangladesh, Chile, Fiji, Mexico, Paraguay, Samoa. --- Module Name: pkgsrc Committed By: taca Date: Thu Apr 15 03:25:05 UTC 2010 Modified Files: pkgsrc/databases/postgresql83-client: Makefile PLIST Log Message: Add missing some documentation files to PLIST. Bump PKGREVISION. --- Module Name: pkgsrc Committed By: adam Date: Mon Apr 12 09:48:49 UTC 2010 Modified Files: pkgsrc/databases/postgresql82: Makefile.common distinfo pkgsrc/databases/postgresql82-adminpack: Makefile pkgsrc/databases/postgresql82-client: Makefile PLIST pkgsrc/databases/postgresql82-plperl: Makefile pkgsrc/databases/postgresql82-plpython: Makefile pkgsrc/databases/postgresql82-pltcl: Makefile pkgsrc/databases/postgresql82-server: Makefile PLIST pkgsrc/databases/postgresql82-tsearch2: Makefile Removed Files: pkgsrc/databases/postgresql82/patches: patch-ad patch-ae Log Message: Changes 8.2.16: * Add new configuration parameter ssl_renegotiation_limit to control how often we do session key renegotiation for an SSL connection * Fix possible deadlock during backend startup * Fix possible crashes due to not handling errors during relcache reload cleanly * Fix possible crashes when trying to recover from a failure in subtransaction start * Fix server memory leak associated with use of savepoints and a client encoding different from server's encoding * Fix incorrect WAL data emitted during end-of-recovery cleanup of a GIST index page split * Make substring() for bit types treat any negative length as meaning "all the rest of the string" The previous coding treated only -1 that way, and would produce an invalid result value for other negative values, possibly leading to a crash (CVE-2010-0442). * Fix integer-to-bit-string conversions to handle the first fractional byte correctly when the output bit width is wider than the given integer by something other than a multiple of 8 bits * Fix some cases of pathologically slow regular expression matching * Fix the STOP WAL LOCATION entry in backup history files to report the next WAL segment's name when the end location is exactly at a segment boundary * Fix some more cases of temporary-file leakage * Improve constraint exclusion processing of boolean-variable cases, in particular make it possible to exclude a partition that has a "bool_column = false" constraint * When reading "pg_hba.conf" and related files, do not treat @@something as a file inclusion request if the @@ appears inside quote marks; also, never treat @@ by itself as a file inclusion request * Prevent infinite loop on some platforms if a directory is named as an inclusion target in "pg_hba.conf" and related files * Fix possible infinite loop if SSL_read or SSL_write fails without setting errno This is reportedly possible with some Windows versions of openssl. * Fix psql's numericlocale option to not format strings it shouldn't in latex and troff output formats * Make psql return the correct exit status (3) when ON_ERROR_STOP and --single-transaction are both specified and an error occurs during the implied "COMMIT" * Fix plpgsql failure in one case where a composite column is set to NULL * Fix possible failure when calling PL/Perl functions from PL/PerlU or vice versa * Add volatile markings in PL/Python to avoid possible compiler-specific misbehavior * Ensure PL/Tcl initializes the Tcl interpreter fully The only known symptom of this oversight is that the Tcl clock command misbehaves if using Tcl 8.5 or later. * Prevent crash in "contrib/dblink" when too many key columns are specified to a dblink_build_sql_* function * Fix assorted crashes in "contrib/xml2" caused by sloppy memory management * Make building of "contrib/xml2" more robust on Windows * Fix race condition in Windows signal handling One known symptom of this bug is that rows in pg_listener could be dropped under heavy load. * Update time zone data files to tzdata release 2010e for DST law changes in Bangladesh, Chile, Fiji, Mexico, Paraguay, Samoa. --- Module Name: pkgsrc Committed By: adam Date: Fri Apr 23 16:03:24 UTC 2010 Modified Files: pkgsrc/databases/postgresql82: Makefile.common pkgsrc/databases/postgresql83: Makefile.common pkgsrc/databases/postgresql84: Makefile.common Log Message: Fixed meta package building @ text @d1 1 a1 1 $NetBSD$ d3 3 a5 3 SHA1 (postgresql-8.4.3.tar.bz2) = 5edad69e797620c4f27520cb1986bc78c173d67a RMD160 (postgresql-8.4.3.tar.bz2) = 4f8bba582138ea8d77059851c361d6f2fb838e52 Size (postgresql-8.4.3.tar.bz2) = 13645257 bytes d9 2 d14 1 a14 1 SHA1 (patch-ai) = 0d6f536f7593e362ec216eafa73c718ad6bed8fc @ 1.3.4.2 log @Pullup ticket #3182 - requested by adam databases/postgresql84-client: security update databases/postgresql84-plperl: security update databases/postgresql84-plpython: security update databases/postgresql84-pltcl: security update databases/postgresql84-server: security update databases/postgresql84: security update Revisions pulled up: - databases/postgresql84-client/Makefile 1.8 - databases/postgresql84-client/PLIST 1.6 - databases/postgresql84-client/buildlink3.mk 1.3 - databases/postgresql84-plperl/PLIST 1.3 - databases/postgresql84-plpython/PLIST 1.3 - databases/postgresql84-pltcl/PLIST 1.3 - databases/postgresql84-server/PLIST 1.5 - databases/postgresql84/Makefile.common 1.6 - databases/postgresql84/distinfo 1.5 - databases/postgresql84/patches/patch-ad 1.3 --- Module Name: pkgsrc Committed By: adam Date: Thu May 20 12:36:39 UTC 2010 Modified Files: pkgsrc/databases/postgresql84: Makefile.common distinfo pkgsrc/databases/postgresql84-client: Makefile PLIST buildlink3.mk pkgsrc/databases/postgresql84-plperl: PLIST pkgsrc/databases/postgresql84-plpython: PLIST pkgsrc/databases/postgresql84-pltcl: PLIST pkgsrc/databases/postgresql84-server: PLIST Added Files: pkgsrc/databases/postgresql84/patches: patch-ad Log Message: Changes 8.4.4: * Enforce restrictions in plperl using an opmask applied to the whole interpreter, instead of using "Safe.pm" * Prevent PL/Tcl from executing untrustworthy code from pltcl_modules * Fix data corruption during WAL replay of ALTER ... SET TABLESPACE * Fix possible crash if a cache reset message is received during rebuild of a relcache entry * Apply per-function GUC settings while running the language validator for the function * Do constraint exclusion for inherited "UPDATE" and "DELETE" target tables when constraint_exclusion = partition * Do not allow an unprivileged user to reset superuser-only parameter settings * Avoid possible crash during backend shutdown if shutdown occurs when a CONTEXT addition would be made to log entries * Fix erroneous handling of %r parameter in recovery_end_command * Ensure the archiver process responds to changes in archive_command as soon as possible * Fix pl/pgsql's CASE statement to not fail when the case expression is a query that returns no rows * Update pl/perl's "ppport.h" for modern Perl versions * Fix assorted memory leaks in pl/python * Handle empty-string connect parameters properly in ecpg * Prevent infinite recursion in psql when expanding a variable that refers to itself * Fix psql's \copy to not add spaces around a dot within \copy (select ...) * Avoid formatting failure in psql when running in a locale context that doesn't match the client_encoding * Fix unnecessary "GIN indexes do not support whole-index scans" errors for unsatisfiable queries using "contrib/intarray" operators * Ensure that "contrib/pgstattuple" functions respond to cancel interrupts promptly * Make server startup deal properly with the case that shmget() returns EINVAL for an existing shared memory segment * Avoid possible crashes in syslogger process on Windows * Deal more robustly with incomplete time zone information in the Windows registry * Update the set of known Windows time zone names * Update time zone data files to tzdata release 2010j for DST law changes in Argentina, Australian Antarctic, Bangladesh, Mexico, Morocco, Pakistan, Palestine, Russia, Syria, Tunisia; also historical corrections for Taiwan. Also, add PKST (Pakistan Summer Time) to the default set of timezone abbreviations. @ text @d3 3 a5 3 SHA1 (postgresql-8.4.4.tar.bz2) = 02592977a601976f8bae7bc3a5c69710d4d0344d RMD160 (postgresql-8.4.4.tar.bz2) = d2d45112c19a2f20d49ab82bd8f86b6ace7decd3 Size (postgresql-8.4.4.tar.bz2) = 13853838 bytes a8 1 SHA1 (patch-ad) = fb75df841bbcc25e840ed9c2fed59232d7189200 @ 1.2 log @Changes 8.4.1: * Fix WAL page header initialization at the end of archive recovery * Fix "cannot make new WAL entries during recovery" error * Fix problem that could make expired rows visible after a crash * Disallow "RESET ROLE" and "RESET SESSION AUTHORIZATION" inside security-definer functions * Make "LOAD" of an already-loaded loadable module into a no-op * Make window function PARTITION BY and ORDER BY items always be interpreted as simple expressions * Fix several errors in planning of semi-joins * Fix handling of whole-row references to subqueries that are within an outer join * Fix Windows shared-memory allocation code * Fix locale handling with plperl * Fix handling of reloptions to ensure setting one option doesn't force default values for others * Ensure that a "fast shutdown" request will forcibly terminate open sessions, even if a "smart shutdown" was already in progress * Avoid memory leak for array_agg() in GROUP BY queries * Treat to_char(..., 'TH') as an uppercase ordinal suffix with 'HH'/'HH12' @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1.1.1 2009/07/29 06:26:17 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.1.tar.bz2) = e6903f0029402ef8fb12645a177204499ea5b2b7 RMD160 (postgresql-8.4.1.tar.bz2) = ad03c250afd71091294a2a3e67d96b661883db87 Size (postgresql-8.4.1.tar.bz2) = 13579302 bytes @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.7 2009/03/20 16:02:41 adam Exp $ d3 3 a5 3 SHA1 (postgresql-8.4.0.tar.bz2) = 7a4776155049b8343f3b3b2e071002bb9db47f44 RMD160 (postgresql-8.4.0.tar.bz2) = 7b0a3b6d6c6c67479a1de2d8a3efb3a27e50fe2e Size (postgresql-8.4.0.tar.bz2) = 13839282 bytes @ 1.1.1.1 log @Many of the changes in PostgreSQL 8.4 are new or improved administration and monitoring tools and commands. Each user has their own favorite features which will make day-to-day work with PostgreSQL easier and more productive for them. Among the most popular enhancements are: * Parallel Database Restore, speeding up recovery from backup up to 8 times * Per-Column Permissions, allowing more granular control of sensitive data * Per-database Collation Support, making PostgreSQL more useful in multi-lingual environments * In-place Upgrades through pg_migrator (beta), enabling upgrades from 8.3 to 8.4 without extensive downtime * New Query Monitoring Tools, giving administrators more insight into query activity * Greatly Reduced VACUUM Overhead through the Visibility Map * New Monitoring Tools for current queries, query load and deadlocks Version 8.4 also makes data analysis easier through the advanced ANSI SQL2003 features of windowing functions, common table expressions and recursive queries. Enhancements to stored procedures, such as default parameters and variadic parameters, make database server programming simpler and more compact. Of course, there are also performance improvements included in this version. @ text @@