aboutsummaryrefslogtreecommitdiff
path: root/databases/postgresql90-client
Commit message (Collapse)AuthorAgeFilesLines
* Some binaries where moved from contrib to base in 9.5, like pgbench andPalle Girgensohn2016-01-131-0/+1
| | | | | | | | | | | | | | | | | | | | | | pg_upgrade. Other where added in 9.5, but the port failed to install them. Make sure they are properly installed by the correct port (-client or -server) [1] Remove unused and hence confusing OSSP_UUID parameters from Makefile [2] Add options to allow user to be set for the backup script in periodic. Add this option only to 9.5 for now. It will be updated to other servers at next regular patch release. [3] The path to perl in hard coded into pgxs/src/Makefile.global which is then installed. Hence, we must depend on perl when that file is installed. Noticed by: Paul Guyot [1] PR: 192387 [2] PR: 172110 [3] PR: 206046 [4] Notes: svn path=/head/; revision=406034
* Update PostgreSQL port to latest version.Palle Girgensohn2015-10-081-1/+0
| | | | | | | | | | | | | | | | | | | | | | | Two security issues have been fixed in this release which affect users of specific PostgreSQL features: CVE-2015-5289: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. CVE-2015-5288: The crypt( function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. This update will also disable SSL renegotiation by default; previously, it was enabled by default. SSL renegotiation will be removed entirely in PostgreSQL versions 9.5 and later. URL: http://www.postgresql.org/about/news/1615/ Security: CVE-2015-5288 CVE-2015-5289 Notes: svn path=/head/; revision=398895
* Update PostgreSQL ports to latest version.Palle Girgensohn2015-05-221-1/+1
| | | | | | | | | | | | | | | | | | Data Corruption Fix For users of PostgreSQL versions 9.3 or 9.4, this release fixes a problem where the database will fail to protect against "multixact wraparound", resulting in data corruption or loss. Users with a high transaction rate (1 million or more per hour) in a database with many foreign keys are especially vulnerable. We strongly urge all users of 9.4 and 9.3 to update their installations in the next few days. Users of versions 9.2 and earlier are not affected by this issue. Security: fc38cd83-00b3-11e5-8ebd-0026551a22dc Notes: svn path=/head/; revision=387089
* Revert the change from readline to libedit, and instead make libedit optional.Palle Girgensohn2015-02-071-4/+1
| | | | | | | PR: ports/197362 Notes: svn path=/head/; revision=378604
* Update PostgreSQL-9.x to latests versions.Palle Girgensohn2015-02-051-1/+2
| | | | | | | | | | | | | | This update fixes multiple security issues reported in PostgreSQL over the past few months. All of these issues require prior authentication, and some require additional conditions, and as such are not considered generally urgent. However, users should examine the list of security holes patched below in case they are particularly vulnerable. Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243, CVE-2015-0244,CVE-2014-8161 Notes: svn path=/head/; revision=378500
* Revert r247147.Palle Girgensohn2014-11-121-1/+0
| | | | | | | | | | We need -pthread in LDFLAGS for threaded extensions like plv8js to work. PR: 175783 Submitted by: Li-Wen Hsu <lwhsu@FreeBSD.org> Notes: svn path=/head/; revision=372487
* Convert pgsql ports to use USES+=pgsqlChris Rees2014-08-251-1/+1
| | | | | | | Reviewed by: bapt Notes: svn path=/head/; revision=366114
* Fixes build with readline from portsBaptiste Daroussin2014-06-301-0/+1
| | | | Notes: svn path=/head/; revision=359941
* Stage supportAntoine Brodin2014-02-261-1/+0
| | | | | | | | Reviewed by: postgresql@ Tested by: miwi and me Notes: svn path=/head/; revision=346217
* - Remove DISTV: only used in PKGNAMESUFFIX and complained by portlintSunpoet Po-Chuan Hsieh2013-10-151-2/+1
| | | | | | | | | | | - Convert to new LIB_DEPENDS format for postgresql*-contrib Submitted by: sunpoet (myself) Reviewed by: crees (pgsql) Approved by: jgh (pgsql) Notes: svn path=/head/; revision=330414
* - Fix pkg name collisionJason Helfman2013-10-101-1/+3
| | | | | | | | Reviewed by: pgsql@ With hat: pgsql@ Notes: svn path=/head/; revision=329946
* - revert r329725Jason Helfman2013-10-071-2/+1
| | | | | | | | Reported by: qat@ With hat: pgsql@ Notes: svn path=/head/; revision=329729
* - Fix pkg name collisionJason Helfman2013-10-071-1/+2
| | | | | | | | Reviewed by: crees@ With hat: pgsql@ Notes: svn path=/head/; revision=329725
* Add NO_STAGE all over the place in preparation for the staging support (cat: ↵Baptiste Daroussin2013-09-201-7/+2
| | | | | | | databases) Notes: svn path=/head/; revision=327717
* The PostgreSQL Global Development Group today released security updates for allPalle Girgensohn2012-06-041-1/+1
| | | | | | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL database system, including versions 9.1.4, 9.0.8, 8.4.12 and 8.3.19. Users of the crypt(text, text) function with DES encryption in the optional pg_crypto module should upgrade their installations immediately, if you have'nt already updated since the port was patched on May 30. All other database administrators are urged to upgrade your version of PostgreSQL at the next scheduled downtime. URL: http://www.postgresql.org/about/news/1398/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143 Fix incorrect password transformation in contrib/pgcrypto’s DES crypt() function This was fixed in a patch release for the FreeBSD ports on May 30. Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655 Ignore SECURITY DEFINER and SET attributes for a procedural language’s call handle Notes: svn path=/head/; revision=298347
* Fix pkg-plistPalle Girgensohn2012-02-281-1/+1
| | | | Notes: svn path=/head/; revision=292397
* - To preserve my sanity, slave 82 and 83 to 84, and 90 to 91, resulting inChris Rees2012-01-251-0/+1
| | | | | | | | | | | three fewer Makefiles to maintain - Switch patch master site - Various cleanups Notes: svn path=/head/; revision=289804
* The PostgreSQL Global Development Group today released minor version updatesPalle Girgensohn2011-10-181-1/+1
| | | | | | | | | | | | | | | | for all active branches of the PostgreSQL object-relational database system, including versions 9.1.1, 9.0.5, 8.4.9, 8.3.16 and 8.2.22. All users are strongly urged to update their installations at the next scheduled downtime. URL: http://www.postgresql.org/about/news.1355 Cleanup ports. Better handling of the knob PG_USER. Also add uuid to 9.0 and 9.1 contrib ports. Notes: svn path=/head/; revision=283757
* Fix a problem with creating the postgresql user when using a package.Palle Girgensohn2011-05-021-0/+1
| | | | Notes: svn path=/head/; revision=273491
* - Update to 9.0.2Martin Matuska2010-12-311-1/+0
| | | | | | | | | | - Unify ICU handling PR: ports/153245 Approved by: maintainer (timeout) Notes: svn path=/head/; revision=267208
* Make postgresql90-client depend on libxml. Technically it does not depend on ↵Palle Girgensohn2010-10-261-0/+1
| | | | | | | | | | | libxml, only postgresql90-server does, but since we don't want two different pg_config setups, one for client and one for server, I'm bringing the libxml dependency on board until I can find out a better way to solve this. Notes: svn path=/head/; revision=263611
* Update all PostgreSQL ports to latest versions.Palle Girgensohn2010-10-071-1/+1
| | | | | | | | | | | Also, try to break the previous 1:1 relation between FreeBSD system and PostgreSQL versions installed. Use different PREFIX:es to install different versions on the same system. PR: ports/132402, ports/145002, ports/146657 Notes: svn path=/head/; revision=262548
* PostgreSQL 9.0 is here! The PostgreSQL Global Development GroupPalle Girgensohn2010-09-201-0/+23
announces the availability of our most eagerly awaited release. PostgreSQL 9.0 includes built-in, binary replication, and over a dozen other major features which will appeal to everyone from web developers to database hackers. 9.0 includes more major features than any release before it, including: * Hot standby * Streaming replication * In-place upgrades * 64-bit Windows builds * Easy mass permissions management * Anonymous blocks and named parameter calls for stored procedures * New windowing functions and ordered aggregates ... and many more. For details on the over 200 additions and improvements in this version, developed by over a hundred contributors, please see the release notes. "These kinds of feature additions continue to make a strong case for why mission-critical technology tasks can continue to depend on the power, flexibility and robustness of PostgreSQL,” said Afilias CTO Ram Mohan. More information on PostgreSQL 9.0: * Release notes http://www.postgresql.org/docs/9.0/static/release-9-0 * Presskit http://www.postgresql.org/about/press/presskit90 * Guide to 9.0: http://wiki.postgresql.org/wiki/What's_new_in_PostgreSQL_9.0 --- PR: 150430, Add dtrace Notes: svn path=/head/; revision=261485