aboutsummaryrefslogtreecommitdiff
path: root/databases/postgresql90-server/distinfo
Commit message (Collapse)AuthorAgeFilesLines
* Delete the now expired postgresql90 ports. Upstream support forMatthew Seaman2016-07-011-4/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | postgresql-9.0.x was declared EoL in September 2015. Summary: Remove 9.0 from the list of postgresql versions available in ports Disconnect postgresql90 ports from the build Remove postgresql90-pgtcl port Remove postgresql90-client port Move the master postgreslXY-plperl makefile to postgresql95-plperl/Makefile. Adjust include lines in other postgresqlXY-plperl ports Delete postgresql90-plperl Move the master postgreslXY-plpython/{Makefile,pkg-descr} to postgresl95-plpython/{Makefile,pkg-descr} Adjust all other postgresqlXY-plpython/Makefile to include the new master Remove postgresql90-server Reviewers: jgh, girgen, #portmgr, O5 Ports Framework, bapt, crees Reviewed By: #portmgr, O5 Ports Framework, bapt, crees Subscribers: mat Differential Revision: https://reviews.freebsd.org/D6898 Notes: svn path=/head/; revision=417899
* Re-add databases/postgresql90-server, for nowRene Ladan2016-05-161-0/+4
| | | | | | | databases/postgresql9*-pl{perl|python} need it. Notes: svn path=/head/; revision=415347
* Remove expired ports:Rene Ladan2016-05-161-4/+0
| | | | | | | | | | | 2016-04-13 databases/postgresql90-contrib: "EOL was reached in September 2015" 2016-04-13 databases/postgresql90-pltcl: "EOL was reached in September 2015" 2016-04-13 databases/postgresql90-client: "EOL was reached in September 2015" 2016-04-13 databases/postgresql90-docs: "EOL was reached in September 2015" 2016-04-13 databases/postgresql90-server: "EOL was reached in September 2015" Notes: svn path=/head/; revision=415344
* Update PostgreSQL port to latest version.Palle Girgensohn2015-10-081-2/+2
| | | | | | | | | | | | | | | | | | | | | | | Two security issues have been fixed in this release which affect users of specific PostgreSQL features: CVE-2015-5289: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. CVE-2015-5288: The crypt( function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. This update will also disable SSL renegotiation by default; previously, it was enabled by default. SSL renegotiation will be removed entirely in PostgreSQL versions 9.5 and later. URL: http://www.postgresql.org/about/news/1615/ Security: CVE-2015-5288 CVE-2015-5289 Notes: svn path=/head/; revision=398895
* Update PostgreSQL to latest versions.Palle Girgensohn2015-06-121-2/+2
| | | | | | | | | | | | | Earlier update releases attempted to fix an issue in PostgreSQL 9.3 and 9.4 with "multixact wraparound", but failed to account for issues doing multixact cleanup during crash recovery. This could cause servers to be unable to restart after a crash. As such, all users of 9.3 and 9.4 should apply this update as soon as possible. URL: http://www.postgresql.org/about/news/1592/ Notes: svn path=/head/; revision=389267
* Update PostgreSQL to latest versions.Palle Girgensohn2015-06-051-2/+2
| | | | | | | | | | The update is mostly to fix the file persmission problem described in the URL below. You might want to wait until next upgrade, depending on you local configuration. URL: http://www.postgresql.org/about/news/1590/ Notes: svn path=/head/; revision=388585
* Update PostgreSQL ports to latest version.Palle Girgensohn2015-05-221-2/+2
| | | | | | | | | | | | | | | | | | Data Corruption Fix For users of PostgreSQL versions 9.3 or 9.4, this release fixes a problem where the database will fail to protect against "multixact wraparound", resulting in data corruption or loss. Users with a high transaction rate (1 million or more per hour) in a database with many foreign keys are especially vulnerable. We strongly urge all users of 9.4 and 9.3 to update their installations in the next few days. Users of versions 9.2 and earlier are not affected by this issue. Security: fc38cd83-00b3-11e5-8ebd-0026551a22dc Notes: svn path=/head/; revision=387089
* Chase upcoming update of ICU to 5.5.Palle Girgensohn2015-04-181-2/+2
| | | | Notes: svn path=/head/; revision=384223
* Update PostgreSQL-9.x to latests versions.Palle Girgensohn2015-02-051-2/+2
| | | | | | | | | | | | | | This update fixes multiple security issues reported in PostgreSQL over the past few months. All of these issues require prior authentication, and some require additional conditions, and as such are not considered generally urgent. However, users should examine the list of security holes patched below in case they are particularly vulnerable. Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243, CVE-2015-0244,CVE-2014-8161 Notes: svn path=/head/; revision=378500
* Update to the latest snapshots.Chris Rees2014-07-301-2/+2
| | | | | | | | | | | uuid-ossp patch has been outdated with irrelevant changes (for us), so massage back in. In head of postgresql, this is handled properly, so eventually the ossp patches can go. Notes: svn path=/head/; revision=363500
* Prepare for upcoming ICU-5.3 upgrade.Palle Girgensohn2014-06-091-2/+2
| | | | Notes: svn path=/head/; revision=357209
* The PostgreSQL Global Development Group has released an update to all supportedPalle Girgensohn2014-03-201-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | version of the database system, including versions 9.3.4, 9.2.8, 9.1.13, 9.0.17, and 8.4.21. This minor release fixes a data corruption issue with replication and crash recovery in version 9.3, as well as several other minor issues in all versions. All users of version 9.3 are urged to update their installations at the next possible downtime. Users of older versions should update at their convenience. The data corruption issue in PostgreSQL 9.3 affects binary replication standbys, servers being recovered from point-in-time-recovery backup, and standalone servers which recover from a system crash. The bug causes unrecoverable index corruption during recovery due to incorrect replay of row locking operations. This can then cause query results to be inconsistent depending on whether or not an index is used, and eventually lead to primary key violations and similar issues. For this reason, users are encouraged to replace each of their standby databases with a new base backup after applying the update. See release notes for more changes. URL: http://www.postgresql.org/docs/current/static/release.html URL: https://wiki.postgresql.org/wiki/20140320UpdateIssues A change specific to the FreeBSD port: Modify the contrib/uuid-ossp to actually work (not crashing the backend) by using the libc implementation of uuid instead of the ossp port. Schemas and queries will just work. Based on the work of Andrew Gierth. 9.1+ EXTENSION support added by girgen@. URL: http://pgfoundry.org/projects/uuid-freebsd PR: ports/121745, ports/182846 Notes: svn path=/head/; revision=348685
* The PostgreSQL Global Development Group has released an importantPalle Girgensohn2014-02-201-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | update to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.3, 9.2.7, 9.1.12, 9.0.16, and 8.4.20. This update contains fixes for multiple security issues, as well as several fixes for replication and data integrity issues. All users are urged to update their installations at the earliest opportunity, especially those using binary replication or running a high-security application. This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. Before this fix, any member of a ROLE was able to grant others access to the same ROLE regardless if the member was given the WITH ADMIN OPTION permission. It also fixes multiple privilege escalation issues, including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, and CVE-2014-0066. More information on these issues can be found on our security page and the security issue detail wiki page. Security: CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063 CVE-2014-0064,CVE-2014-0065,CVE-2014-0066,CVE-2014-0067 Notes: svn path=/head/; revision=345257
* Chase ICU updatePalle Girgensohn2014-02-101-2/+2
| | | | Notes: svn path=/head/; revision=343650
* The PostgreSQL Global Development Group has released a critical updatePalle Girgensohn2013-12-051-2/+2
| | | | | | | | | | | | | to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.2, 9.2.6, 9.1.11, 9.0.15, and 8.4.19. This update fixes three serious data-loss bugs affecting replication and database maintenance. All users are urged to update their installations at the earliest opportunity. URL: http://www.postgresql.org/about/news/1492/ Notes: svn path=/head/; revision=335673
* Update PostgreSQL ports to 9.3.1, 9.2.5, 9.1.10, 9.0.14, and 8.4.18.Palle Girgensohn2013-10-121-2/+2
| | | | | | | | | | | Note that users of the hstore extension on version 9.3 must take an additional, post upgrade step of running "ALTER EXTENSION hstore UPDATE" in each database after update. URL: http://www.postgresql.org/about/news/1487/ Notes: svn path=/head/; revision=330109
* The PostgreSQL Global Development Group has released a securityPalle Girgensohn2013-04-041-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | update to all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update *immediately*. A major security issue (for versions 9.x only) fixed in this release, [CVE-2013-1899](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899), makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. This issue was discovered by Mitsumasa Kondo and Kyotaro Horiguchi of NTT Open Source Software Center. Two lesser security fixes are also included in this release: [CVE-2013-1900](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900), wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess (all versions), and [CVE-2013-1901](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901), which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups (for versions 9.x only). Approved by: portmgr (bdrewery) URL: http://www.postgresql.org/about/news/1456/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901 Notes: svn path=/head/; revision=315718
* PostgreSQL 9.2.3, 9.1.8, 9.0.12, 8.4.16 and 8.3.23 releasedPalle Girgensohn2013-02-081-2/+2
| | | | | | | | | | | | | | | This update fixes a denial-of-service (DOS) vulnerability. All users should update their PostgreSQL installations as soon as possible. The security issue fixed in this release, CVE-2013-0255, allows a previously authenticated user to crash the server by calling an internal function with invalid arguments. URL: http://www.postgresql.org/about/news/1446/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255 Notes: svn path=/head/; revision=311915
* The PostgreSQL Global Development Group has released an update to all currentPalle Girgensohn2012-12-061-2/+2
| | | | | | | | | | | | | | | | versions of the PostgreSQL database system, including versions 9.2.2, 9.1.7, 9.0.11, 8.4.15, and 8.3.22. Users of PostgreSQL Hot Standby replication should update at the next possible opportunity. Other users should update at their next maintenance window. Deprecate the 8.3.22 version, since it is near end-of-life. URL: http://www.postgresql.org/about/news/1430/ Feature safe: yes Notes: svn path=/head/; revision=308391
* Update PostgreSQL to 9.2.1, 9.1.6, 9.0.10, 8.4.14 and 8.3.21 respectively.Palle Girgensohn2012-09-241-2/+2
| | | | | | | | | | This update fixes critical issues for major versions 9.1 and 9.2, and users running those versions should apply it as soon as possible. URL: http://www.postgresql.org/about/news/1416/ Notes: svn path=/head/; revision=304804
* The PostgreSQL Global Development Group today released security updates for ↵Jason Helfman2012-08-171-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | all active branches of the PostgreSQL database system, including versions 9.1.5, 9.0.9, 8.4.13 and 8.3.20. This update patches security holes associated with libxml2 and libxslt, similar to those affecting other open source projects. All users are urged to update their installations at the first available opportunity. This security release fixes a vulnerability in the built-in XML functionality, and a vulnerability in the XSLT functionality supplied by the optional XML2 extension. Both vulnerabilities allow reading of arbitrary files by any authenticated database user, and the XSLT vulnerability allows writing files as well. The fixes cause limited backwards compatibility issues. These issues correspond to the following two vulnerabilities: CVE-2012-3488: PostgreSQL insecure use of libxslt CVE-2012-3489: PostgreSQL insecure use of libxml2 This release also contains several fixes to version 9.1, and a smaller number of fixes to older versions, including: Updates and corrections to time zone data Multiple documentation updates and corrections Add limit on max_wal_senders Fix dependencies generated during ALTER TABLE ADD CONSTRAINT USING INDEX. Correct behavior of unicode conversions for PL/Python Fix WITH attached to a nested set operation (UNION/INTERSECT/EXCEPT). Fix syslogger so that log_truncate_on_rotation works in the first rotation. Only allow autovacuum to be auto-canceled by a directly blocked process. Improve fsync request queue operation Prevent corner-case core dump in rfree(). Fix Walsender so that it responds correctly to timeouts and deadlocks Several PL/Perl fixes for encoding-related issues Make selectivity operators use the correct collation Prevent unsuitable slaves from being selected for synchronous replication Make REASSIGN OWNED work on extensions as well Fix race condition with ENUM comparisons Make NOTIFY cope with out-of-disk-space Fix memory leak in ARRAY subselect queries Reduce data loss at replication failover Fix behavior of subtransactions with Hot Standby Notes: svn path=/head/; revision=302694
* The PostgreSQL Global Development Group today released security updates for allPalle Girgensohn2012-06-041-2/+2
| | | | | | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL database system, including versions 9.1.4, 9.0.8, 8.4.12 and 8.3.19. Users of the crypt(text, text) function with DES encryption in the optional pg_crypto module should upgrade their installations immediately, if you have'nt already updated since the port was patched on May 30. All other database administrators are urged to upgrade your version of PostgreSQL at the next scheduled downtime. URL: http://www.postgresql.org/about/news/1398/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143 Fix incorrect password transformation in contrib/pgcrypto’s DES crypt() function This was fixed in a patch release for the FreeBSD ports on May 30. Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655 Ignore SECURITY DEFINER and SET attributes for a procedural language’s call handle Notes: svn path=/head/; revision=298347
* The PostgreSQL Global Development Group today released security updates for allPalle Girgensohn2012-02-271-2/+2
| | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL object-relational database system, including versions 9.1.3, 9.0.7, 8.4.11 and 8.3.18. Users of pg_dump, users of SSL certificates for validation or users of triggers using SECURITY DEFINER should upgrade their installations immediately. All other database administrators are urged to upgrade your version of PostgreSQL at the next scheduled downtime. More details on the security fixes here: URL: http://www.postgresql.org/about/news/1377/ Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868 Notes: svn path=/head/; revision=292310
* The PostgreSQL Global Development Group today released updates for allPalle Girgensohn2011-12-051-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | active branches of the PostgreSQL object-relational database system, including versions 9.1.2, 9.0.6, 8.4.10, 8.3.17 and 8.2.23. This release contains 52 fixes to version 9.1, and a smaller number of fixes to older versions, including: - Fix bugs in information_schema.referential_constraints view** - Correct collations for citext columns and indexes** - Prevent possible crash when joining to a scalar function - Prevent transitory data corruption of GIN indexes after a crash - Prevent data corruption on TOAST columns when copying data - Fix failures during hot standby startup - Correct another "variable not found in subplan target list" bug - Fix bug with sorting on aggregate expressions in windowing functions - Multiple bug fixes for pg_upgrade - Change Foreign Key creation order to better support self-referential keys** - Multiple bug fixes to CREATE EXTENSION - Ensure that function return type and data returned from PL/perl agree - Ensure that PL/perl strings are always UTF-8 - Assorted bug fixes for various Extensions - Updates to the time zone database, particularly to CST6 Changes marked with ** above require additional, post-update steps in order to fix all described issues. URL: http://www.postgresql.org/docs/current/static/release.html Also, fix a pthread problem in the FreeBSD port. [1] PR: 160580 [1] Feature safe: yes Notes: svn path=/head/; revision=286930
* The PostgreSQL Global Development Group today released minor version updatesPalle Girgensohn2011-10-181-2/+2
| | | | | | | | | | | | | | | | for all active branches of the PostgreSQL object-relational database system, including versions 9.1.1, 9.0.5, 8.4.9, 8.3.16 and 8.2.22. All users are strongly urged to update their installations at the next scheduled downtime. URL: http://www.postgresql.org/about/news.1355 Cleanup ports. Better handling of the knob PG_USER. Also add uuid to 9.0 and 9.1 contrib ports. Notes: svn path=/head/; revision=283757
* Update PostgreSQL to 9.0.4, 8.4.8, 8.3.15 and 8.2.21.Palle Girgensohn2011-04-181-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | This update contains a critical fix to the pg_upgrade utility which prevents significant downtime issues. Do not use pg_upgrade without installing this update first. The issue with pg_upgrade and the fix are detailed on the PostgreSQL wiki: http://wiki.postgresql.org/wiki/20110408pg_upgrade_fix Users who have already used pg_upgrade should run the database repair script given on that page on their databases as soon as possible. See the release notes for each version at http://www.postgresql.org/docs/current/static/release.html for a full list of changes with details. Allow the username of the postgresql user to configurable for 8.4 and 9.0. Largely inspired by the work of Jason Helfman [153668, 153136]. Change PGUSER knob to PG_USER not to clash with PGUSER environment. PR: 153668, 153136, 155493, 155137 Notes: svn path=/head/; revision=272900
* Update to versions 9.0.3, 8.4.7, 8.3.14 and 8.2.20.Palle Girgensohn2011-02-011-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This update includes a security fix which prevents a buffer overrun in the contrib module intarray's input function for the query_int type. This bug is a security risk since the function's return address could be overwritten by malicious code. All supported versions of PostgreSQL are impacted. However, the affected contrib module is optional. Only users who have installed the intarray module in their database are affected. See the CVE Advisory at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4015 This release includes 63 bugfixes, including: - Avoid unexpected conversion overflow in planner for distant date values - Fix assignment to an array slice that is before the existing range of subscripts - Fix pg_restore to do the right thing when escaping large objects - Avoid failures when EXPLAIN tries to display a simple-form CASE expression - Improved build support for Windows version - Fix bug in contrib/seg's GiST picksplit algorithm which caused performance degredation The 9.0.3 update also contains several fixes for issues with features introduced or changed in version 9.0: - Ensure all the received WAL is fsync'd to disk before exiting walreceiver - Improve performance of walreceiver by avoiding excess fsync activity - Make ALTER TABLE revalidate uniqueness and exclusion constraints when needed - Fix EvalPlanQual for UPDATE of an inheritance tree when the tables are not all alike PR: ports/154436 Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4015 Feature safe: yes Approved by: portmgr Notes: svn path=/head/; revision=268521
* - Update to 9.0.2Martin Matuska2010-12-311-4/+2
| | | | | | | | | | - Unify ICU handling PR: ports/153245 Approved by: maintainer (timeout) Notes: svn path=/head/; revision=267208
* Update all PostgreSQL ports to latest versions.Palle Girgensohn2010-10-071-3/+3
| | | | | | | | | | | Also, try to break the previous 1:1 relation between FreeBSD system and PostgreSQL versions installed. Use different PREFIX:es to install different versions on the same system. PR: ports/132402, ports/145002, ports/146657 Notes: svn path=/head/; revision=262548
* PostgreSQL 9.0 is here! The PostgreSQL Global Development GroupPalle Girgensohn2010-09-201-6/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | announces the availability of our most eagerly awaited release. PostgreSQL 9.0 includes built-in, binary replication, and over a dozen other major features which will appeal to everyone from web developers to database hackers. 9.0 includes more major features than any release before it, including: * Hot standby * Streaming replication * In-place upgrades * 64-bit Windows builds * Easy mass permissions management * Anonymous blocks and named parameter calls for stored procedures * New windowing functions and ordered aggregates ... and many more. For details on the over 200 additions and improvements in this version, developed by over a hundred contributors, please see the release notes. "These kinds of feature additions continue to make a strong case for why mission-critical technology tasks can continue to depend on the power, flexibility and robustness of PostgreSQL,” said Afilias CTO Ram Mohan. More information on PostgreSQL 9.0: * Release notes http://www.postgresql.org/docs/9.0/static/release-9-0 * Presskit http://www.postgresql.org/about/press/presskit90 * Guide to 9.0: http://wiki.postgresql.org/wiki/What's_new_in_PostgreSQL_9.0 --- PR: 150430, Add dtrace Notes: svn path=/head/; revision=261485
* Update to 8.4.3.Xin LI2010-03-251-3/+3
| | | | | | | | | | PR: ports/144863 Submitted by: Alexander <alp rsu ru> Security: e050119b-3856-11df-b2b2-002170daae37 With hat: ports-security@ Notes: svn path=/head/; revision=251509
* Reintegrate the patch for ICU (unicode support).Palle Girgensohn2010-02-031-0/+3
| | | | Notes: svn path=/head/; revision=249180
* - Update to 8.4.2Martin Matuska2009-12-171-3/+3
| | | | | | | | | | | | Security: CVE-2009-4034 Security: CVE-2009-4136 Security: http://portaudit.freebsd.org/e7bc5600-eaa0-11de-bd9c-00215c6a37bb.html PR: ports/141639 Submitted by: Alexander Pyhalov <alp@rsu.ru> Approved by: ports-security (delphij) Notes: svn path=/head/; revision=246051
* - Update to 8.4.1Martin Matuska2009-12-021-3/+3
| | | | | | | | | | | - Set INTDATE on as default (this is default by PostgreSQL) PR: ports/139277 Submitted by: Olli Hauer <ohauer@gmx.de> Approved by: maintainer timeout (2 months) Notes: svn path=/head/; revision=245131
* Welcome PostgreSQL 8.4Palle Girgensohn2009-07-071-6/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | After many years of development, PostgreSQL has become feature-complete in many areas. This release shows a targeted approach to adding features (e.g., authentication, monitoring, space reuse), and adds capabilities defined in the later SQL standards. The major areas of enhancement are: Windowing Functions Common Table Expressions and Recursive Queries Default and variadic parameters for functions Parallel Restore Column Permissions Per-database locale settings Improved hash indexes Improved join performance for EXISTS and NOT EXISTS queries Easier-to-use Warm Standby Automatic sizing of the Free Space Map Visibility Map (greatly reduces vacuum overhead for slowly-changing tables) Version-aware psql (backslash commands work against older servers) Support SSL certificates for user authentication Per-function runtime statistics Easy editing of functions in psql New contrib modules: pg_stat_statements, auto_explain, citext, btree_gin URL: http://www.postgresql.org/docs/8.4/interactive/release-8-4.html Notes: svn path=/head/; revision=237379
* Update PostgreSQL to latest versions.Palle Girgensohn2009-03-181-3/+3
| | | | | | | | | | | | | | | | | | | | | The PostgreSQL Project today released minor versions updating all active branches of the PostgreSQL object-relational database system, including versions 8.3.7, 8.2.13, 8.1.17, 8.0.21 and 7.4.25. This release fixes a denial of service issue with encoding conversion, and all users should update their installations at the next reasonable opportunity. There are 12 other minor fixes contained in these update releases, including fixes for xpath() functions in version 8.3. See the release notes for full details. URL: http://www.postgresql.org/docs/8.3/static/release-8-3-7.html URL: http://www.postgresql.org/docs/8.2/static/release-8-2-13.html URL: http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-17 URL: http://www.postgresql.org/docs/8.0/static/release.html#RELEASE-8-0-21 URL: http://www.postgresql.org/docs/7.4/static/release.html#RELEASE-7-4-24 Notes: svn path=/head/; revision=230359
* Update PostgreSQL to latest versions.Palle Girgensohn2009-02-101-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | URL: http://www.postgresql.org/about/news.1055 The PostgreSQL Project today released updates to all active branches of the PostgreSQL object-relational database system, including versions 8.3.6, 8.2.12, 8.1.16, 8.0.20 and 7.4.24. These updates include two serious fixes, for autovacuum crashes in version 8.1 and GiST indexing data loss in 8.3, and those two versions should be updated as soon as possible. These update releases also include patches for several low-risk security holes, as well as up to 17 other minor fixes, depending on your major version of PostgreSQL. Included as well are Daylight Savings Time changes for Nepal, Switzerland and Cuba. See the release notes for full details. The first serious issue affects users who are using version 8.1 with Autovacuum, which will fail when XID rollover is required. The second serious issue can cause data loss when CLUSTER is used with GiST indexes (such as full text indexes) on version 8.3. Both issues are fixed in these releases. Notes: svn path=/head/; revision=227984
* This time, *really* update to *latest* version of PostgreSQL, 8.3.5.Palle Girgensohn2008-11-071-3/+3
| | | | Notes: svn path=/head/; revision=222511
* Update PostgreSQL to latest versions.Palle Girgensohn2008-11-071-3/+3
| | | | | | | | | | | | | | | | | | http://www.postgresql.org/docs/current/static/release-8-3-5.html http://www.postgresql.org/docs/current/static/release-8-2-11.html http://www.postgresql.org/docs/current/static/release-8-1-15.html http://www.postgresql.org/docs/current/static/release-8-0-19.html http://www.postgresql.org/docs/current/static/release-7-4-23.html Note that the GiST problem mentioned does not apply to users of the FreeBSD port, since the previous version of PostgreSQL never reached the ports tree, due to the freeze of the tree pending the FreeBSD 7.1 update. PR: 121848, 124713 Notes: svn path=/head/; revision=222485
* Update ICU patch to chase update of autoconf 2.61 -> 2.62Palle Girgensohn2008-08-281-3/+3
| | | | | | | | PR: ports/126773 Submitted by: Robert Schulze Notes: svn path=/head/; revision=219377
* Updates of the PostgreSQL portsPalle Girgensohn2008-06-121-6/+6
| | | | | | | | | | | | | | | | | | | | Updates for all maintained versions of PostgreSQL are available today: 8.3.3, 8.2.9, 8.1.13, 8.0.17 and 7.4.21. These releases fix more than two dozen minor issues reported and patched over the last few months. All PostgreSQL users should plan to update at their earliest convenience. People in affected time zones, in particular, should upgrade as soon as possible. Release Notes: http://www.postgresql.org/docs/8.3/static/release.html Also, fix umask error in periodic script [1]. PR: ports/124457 [1] Submitted by: Alexandre Perrin Notes: svn path=/head/; revision=214728
* Update to 8.3.1Palle Girgensohn2008-03-181-6/+6
| | | | | | | | Release notes: http://developer.postgresql.org/pgdocs/postgres/release-8-3-1.html Notes: svn path=/head/; revision=209325
* The ICU patch <http://people.freebsd.org/~girgen/postgresql-icu/README.html>Palle Girgensohn2008-03-091-0/+3
| | | | | | | is finally ported to postgresql-8.3, thanks to Petr Jelinek and yours truly. Notes: svn path=/head/; revision=208681
* Today the PostgreSQL Global Development Group releases thePalle Girgensohn2008-02-041-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | long-awaited version 8.3 of the most advanced open source database, which cements our place as the best performing open source database. Among the performance features you'll be excited about in 8.3 are: * Heap Only Tuples * BGWriter Autotuning * Asynchronous Commit * Spread Checkpoints * Synchronous Scan * "Var-Varlena" * L2 Cache Protection * Lazy XID 8.3 also has a lot of cool features for PostgreSQL DBAs and developers, including: * CSV Logging * SQL/XML * MS Visual C++ support * ENUMs * Integrated Tsearch * SSPI & GSSAPI * Composite Type Arrays * pg_standby Notes: svn path=/head/; revision=206719
* Update to RC2.Palle Girgensohn2008-01-221-3/+3
| | | | | | | | | | | | | | | | | [1] Fix problem installing from package. [2] Use DISTVERSION instead of PORTVERSION. (the port reports now correct version 8.3.r2) [2] Enable more 8.3 features: - Add OPTION for the new XML data type (default: enabled) - Add OPTION for usage of system timezone data (default: included tzdata) PR: ports/119770 [1], ports/119561 [2] Submitted by: Artis Caune [1], Martin Matuska [2] Notes: svn path=/head/; revision=206026
* Revert bad commit. The size was OK for *this* version.Palle Girgensohn2008-01-071-1/+1
| | | | Notes: svn path=/head/; revision=205187
* Fix bad distinfo sizesPalle Girgensohn2008-01-071-1/+1
| | | | Notes: svn path=/head/; revision=205186
* Update all PostgreSQL ports to latest versions.Palle Girgensohn2008-01-071-12/+3
| | | | | | | | | | This includes a bunch of security fixes: CVE-2007-6067, CVE-2007-4772, CVE-2007-6601, CVE-2007-6600 and CVE-2007-4769. Security: http://www.postgresql.org/about/news.905 Notes: svn path=/head/; revision=205167
* Update to PostgreSQL 8.3 beta2.Palle Girgensohn2007-11-011-9/+12
| | | | | | | | | | | http://www.postgresql.org/developer/beta This is beta quality, don't use in production. Approved by: portmgr (erwin) Notes: svn path=/head/; revision=202471
* Introducing the first beta of PostgreSQL 8.3Palle Girgensohn2007-10-151-12/+9
| | | | | | | | Note that this is a BETA VERSION of the PostgreSQL server. Use it only for testing. Notes: svn path=/head/; revision=201504