2017-08-10 16:23:31 +02:00
# Created by: Marc G. Fournier <scrappy@FreeBSD.org>
# $FreeBSD$
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
PORTNAME ?= postgresql
2018-11-09 00:21:19 +01:00
DISTVERSION ?= 10.6
Bump PORTREVISION for ports depending on the canonical version of GCC
defined via Mk/bsd.default-versions.mk which has moved from GCC 7.4 t
GCC 8.2 under most circumstances.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, as a double check, everything INDEX-11 showed depending on lang/gcc7.
PR: 231590
2018-12-12 02:35:33 +01:00
PORTREVISION = 2
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
CATEGORIES ?= databases
MASTER_SITES = PGSQL/source/v${ DISTVERSION }
2017-08-10 16:23:31 +02:00
PKGNAMESUFFIX ?= ${ PORTVERSION : R } ${ COMPONENT }
MAINTAINER ?= pgsql@FreeBSD.org
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
COMMENT ?= PostgreSQL is the most advanced open-source database available anywhere
LICENSE = PostgreSQL
.if ${DISTVERSION : C /([0-9]*).*/\1/} == 10
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.5, 9.6.10, 9.5.14, 9.4.19,
9.3.24. This release fixes two security issues as well as bugs reported over
the last three months.
If you have untrusted users accessing your system and you are either running
PostgreSQL 9.5 or a newer version OR have installed the "dblink" or
"postgres_fdw" extensions, you must apply this update as soon as possible. All
other users can upgrade at the next convenient downtime.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.5 from any 10.x release is considered a
minor update.
The PostgreSQL Global Development Group also announces that the third beta
release of PostgreSQL 11 is now available for download. This release contains
previews of all features that will be available in the final release of
PostgreSQL 11 (though some details of the release could change before then) as
well as bug fixes that were reported during the second beta.
This release also changes the default option for the server packages to *not*
include XML support per default. If you need this, please check the XML option
knob and build the port.
Releasenotes: https://www.postgresql.org/about/news/1878/
PR: 229523, 198588
Security: 96eab874-9c79-11e8-b34b-6cc21735f730
Security: CVE-2018-10915, CVE-2018-10925
2018-08-10 11:25:20 +02:00
CONFLICTS += ${ PORTNAME } 9*
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
. e l s e
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.5, 9.6.10, 9.5.14, 9.4.19,
9.3.24. This release fixes two security issues as well as bugs reported over
the last three months.
If you have untrusted users accessing your system and you are either running
PostgreSQL 9.5 or a newer version OR have installed the "dblink" or
"postgres_fdw" extensions, you must apply this update as soon as possible. All
other users can upgrade at the next convenient downtime.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.5 from any 10.x release is considered a
minor update.
The PostgreSQL Global Development Group also announces that the third beta
release of PostgreSQL 11 is now available for download. This release contains
previews of all features that will be available in the final release of
PostgreSQL 11 (though some details of the release could change before then) as
well as bug fixes that were reported during the second beta.
This release also changes the default option for the server packages to *not*
include XML support per default. If you need this, please check the XML option
knob and build the port.
Releasenotes: https://www.postgresql.org/about/news/1878/
PR: 229523, 198588
Security: 96eab874-9c79-11e8-b34b-6cc21735f730
Security: CVE-2018-10915, CVE-2018-10925
2018-08-10 11:25:20 +02:00
CONFLICTS += ${ PORTNAME } 9[ ^${ PORTVERSION : R : E } ] * ${ PORTNAME } 10*
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
. e n d i f
WRKSRC = ${ WRKDIR } /postgresql-${ DISTVERSION }
DIST_SUBDIR = postgresql
OPTIONS_SUB = yes
PKGINSTALL ?= ${ PKGDIR } /pkg-install${ COMPONENT }
USES += tar:bzip2 cpe
. i f ! d e f i n e d ( N O _ B U I L D )
USES += gmake
GNU_CONFIGURE = yes
. e n d i f
PG_USER ?= postgres
PG_GROUP ?= postgres
PG_UID ?= 770
LDFLAGS += -L${ LOCALBASE } /lib
INCLUDES += -I${ LOCALBASE } /include
CONFIGURE_ARGS += --with-libraries= ${ PREFIX } /lib \
--with-includes= ${ PREFIX } /include \
--enable-thread-safety
CONFIGURE_ENV += INCLUDES = " ${ INCLUDES } " \
PTHREAD_LIBS = "-lpthread" \
LDFLAGS_SL = " ${ LDFLAGS_SL } "
LDFLAGS += -lpthread
PLIST = ${ PKGDIR } /pkg-plist${ COMPONENT }
2017-08-10 16:23:31 +02:00
INSTALL_DIRS ?= src/common src/timezone src/backend \
src/backend/utils/mb/conversion_procs \
src/backend/snowball src/backend/replication/libpqwalreceiver \
2017-12-20 23:09:08 +01:00
src/backend/replication/pgoutput \
2017-08-10 16:23:31 +02:00
src/bin/initdb src/bin/pg_ctl \
2017-10-08 18:39:59 +02:00
src/bin/pg_controldata src/bin/pg_resetwal src/pl \
2017-08-10 16:23:31 +02:00
src/bin/pg_basebackup src/bin/pg_archivecleanup \
src/bin/pg_rewind \
src/bin/pg_test_fsync src/bin/pg_test_timing \
2017-10-08 18:39:59 +02:00
src/bin/pg_waldump src/bin/pg_upgrade
2017-08-10 16:23:31 +02:00
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
BUILD_DIRS ?= src/port ${ INSTALL_DIRS }
INSTALL_TARGET ?= install-strip
. i f ! d e f i n e d ( C L I E N T _ O N L Y ) & & ! d e f i n e d ( S L A V E _ O N L Y )
SERVER_ONLY = yes
COMPONENT = -server
USE_RC_SUBR = postgresql
USES += pgsql:${ DISTVERSION : C /([0-9] \. ?[0-9]).*/ \1 /g }
USERS = ${ PG_USER }
GROUPS = ${ PG_GROUP }
SUB_FILES += 502.pgsql
. e n d i f
. i f d e f i n e d ( C L I E N T _ O N L Y )
2018-09-10 15:14:50 +02:00
OPTIONS_DEFINE += LIBEDIT DOCS
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
LIBEDIT_DESC = Use non-GPL libedit instead of readline
USES += perl5
. e l s e
MAKE_ENV = PATH = ${ PREFIX } /bin:${ PATH }
CONFIGURE_ENV += PATH = ${ PREFIX } /bin:${ PATH }
. e n d i f
. i f d e f i n e d ( S E R V E R _ O N L Y )
2018-09-10 15:14:50 +02:00
OPTIONS_DEFINE = DTRACE LDAP INTDATE TZDATA XML DOCS
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
LDAP_DESC = Build with LDAP authentication support
DTRACE_DESC = Build with DTrace probes
TZDATA_DESC = Use internal timezone database
XML_DESC = Build with XML data type
.if ${DISTVERSION : C /([0-9]*).*/\1/} != 10
# See http://people.freebsd.org/~girgen/postgresql-icu/README.html for more info
OPTIONS_DEFINE += ICU
ICU_DESC = Use ICU for unicode collation
. e l s e
CONFIGURE_ARGS += --with-icu
LIB_DEPENDS += libicudata.so:devel/icu
USES += pkgconfig
. e n d i f
# See http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/76999 for more info
# (requires dump/restore if modified.)
OPTIONS_DEFINE += INTDATE
INTDATE_DESC = Builds with 64-bit date/time type
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.5, 9.6.10, 9.5.14, 9.4.19,
9.3.24. This release fixes two security issues as well as bugs reported over
the last three months.
If you have untrusted users accessing your system and you are either running
PostgreSQL 9.5 or a newer version OR have installed the "dblink" or
"postgres_fdw" extensions, you must apply this update as soon as possible. All
other users can upgrade at the next convenient downtime.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.5 from any 10.x release is considered a
minor update.
The PostgreSQL Global Development Group also announces that the third beta
release of PostgreSQL 11 is now available for download. This release contains
previews of all features that will be available in the final release of
PostgreSQL 11 (though some details of the release could change before then) as
well as bug fixes that were reported during the second beta.
This release also changes the default option for the server packages to *not*
include XML support per default. If you need this, please check the XML option
knob and build the port.
Releasenotes: https://www.postgresql.org/about/news/1878/
PR: 229523, 198588
Security: 96eab874-9c79-11e8-b34b-6cc21735f730
Security: CVE-2018-10915, CVE-2018-10925
2018-08-10 11:25:20 +02:00
OPTIONS_DEFAULT += TZDATA INTDATE
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
. e n d i f
. i f ! d e f i n e d ( S L A V E _ O N L Y )
2018-09-10 15:14:50 +02:00
OPTIONS_DEFINE += NLS PAM GSSAPI OPTIMIZED_CFLAGS DEBUG DOCS
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
. if ${DISTVERSION : R } == 9.2 | | ${DISTVERSION :R } == 9.3
OPTIONS_RADIO = KRB5
OPTIONS_RADIO_KRB5 = MIT_KRB5 HEIMDAL_KRB5
. e n d i f
KRB5_DESC = Build with kerberos provider support
NLS_DESC = Use internationalized messages
PAM_DESC = Build with PAM Support
MIT_KRB5_DESC = Build with MIT kerberos support
HEIMDAL_KRB5_DESC = Builds with Heimdal kerberos
GSSAPI_DESC = Build with GSSAPI support
OPTIMIZED_CFLAGS_DESC = Builds with compiler optimizations ( -O3)
OPTIONS_DEFINE += SSL
SSL_DESC = Build with OpenSSL support
OPTIONS_DEFAULT += SSL
. e n d i f # !SLAVE_ONLY
. i f d e f i n e d ( C L I E N T _ O N L Y )
LIBEDIT_CONFIGURE_ON += --with-libedit-preferred
LIBEDIT_USES = libedit
LIBEDIT_USES_OFF = readline
. e n d i f # CLIENT_ONLY
SSL_USES = ssl
SSL_CONFIGURE_WITH = openssl
PAM_CONFIGURE_WITH = pam
XML_CONFIGURE_WITH = libxml
XML_LIB_DEPENDS = libxml2.so:textproc/libxml2
TZDATA_CONFIGURE_OFF = --with-system-tzdata= /usr/share/zoneinfo
INTDATE_CONFIGURE_OFF = --disable-integer-datetimes
NLS_CONFIGURE_ENABLE = nls
NLS_USES = gettext
LDAP_CONFIGURE_WITH = ldap
LDAP_USE = OPENLDAP = yes
OPTIMIZED_CFLAGS_CFLAGS = -O3 -funroll-loops
DEBUG_CONFIGURE_ENABLE = debug
PLIST_SUB += PG_USER = ${ PG_USER } \
PG_GROUP = ${ PG_GROUP }
SUB_LIST += PG_GROUP = ${ PG_GROUP } \
PG_USER = ${ PG_USER } \
PG_UID = ${ PG_UID }
. i n c l u d e < b s d . p o r t . o p t i o n s . m k >
2018-11-12 16:54:19 +01:00
. i f ${ARCH} = = "i386"
USES += compiler:gcc-c++11-lib
. e n d i f
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
. i f ! d e f i n e d ( S L A V E _ O N L Y )
.if ${DISTVERSION : C /([0-9]*).*/\1/} != 10
. if ( defined(SERVER_ONLY) && ${PORT_OPTIONS : MICU } ) | | make (makesum )
USES += autoreconf
CONFIGURE_ARGS += --with-icu
PATCH_SITES += http://people.freebsd.org/~girgen/postgresql-icu/:icu
PATCHFILES += ${ ICU_PATCHFILE } :icu
LIB_DEPENDS += libicudata.so:devel/icu
. e n d i f
. e n d i f # not version 10
. e n d i f # !SLAVE_ONLY
. i f ! d e f i n e d ( S L A V E _ O N L Y )
PATCH_DIST_STRIP = -p1
. if ${PORT_OPTIONS : MDTRACE }
CONFIGURE_ARGS += --enable-dtrace
LDFLAGS += -lelf
INSTALL_TARGET = install
. e n d i f
.if ${PORT_OPTIONS : MGSSAPI }
CONFIGURE_ARGS += --with-gssapi
.if empty(PORT_OPTIONS : MMIT_KRB 5) && empty (PORT_OPTIONS :MHEIMDAL_KRB 5)
# Kerberos libraries will pull the proper GSSAPI library
# via linker dependencies, but otherwise we must specify
# it explicitely: ld --as-needed is used for compilation,
# so configure's -lgssapi_krb5 won't go.
LDFLAGS += -lgssapi
LDFLAGS_SL += -lgssapi
. e n d i f
. e l s e
CONFIGURE_ARGS += --without-gssapi
. e n d i f
. if ${PORT_OPTIONS : MMIT_KRB 5}
. i f d e f i n e d ( I G N O R E _ W I T H _ S R C _ K R B 5 ) & & ( e x i s t s ( / u s r / l i b / l i b k r b 5 . s o ) | | e x i s t s ( / u s r / b i n / k r b 5 - c o n f i g ) )
IGNORE = requires that you remove heimdal\' s /usr/bin/krb5-config and /usr/lib/libkrb5.so*, and set NO_KERBEROS = true in /etc/src.conf to build successfully with MIT-KRB
. e l s e
CONFIGURE_ARGS += --with-krb5
# Allow defining a home built MIT Kerberos by setting KRB5_HOME
. i f d e f i n e d ( K R B 5 _ H O M E ) & & e x i s t s ( $ { K R B 5 _ H O M E } / l i b / l i b g s s a p i _ k r b 5 . a ) & & e x i s t s ( $ { K R B 5 _ H O M E } / b i n / k r b 5 - c o n f i g )
LIB_DEPENDS += libkrb5.so.3:security/krb5
. e n d i f
. e n d i f
. e n d i f
. if ${PORT_OPTIONS : MHEIMDAL_KRB 5}
CONFIGURE_ARGS += --with-krb5
. e n d i f
. e n d i f # !SLAVE_ONLY
# For testing files in FILESDIR
. i n c l u d e < b s d . p o r t . p r e . m k >
. i f d e f i n e d ( S E R V E R _ O N L Y )
pre-build :
@${ SH } ${ PKGINSTALL } ${ PORTNAME } PRE-INSTALL
. e n d i f
. i f ! d e f i n e d ( N O _ B U I L D ) & & ! t a r g e t ( d o - b u i l d )
do-build :
@ cd ${ WRKSRC } /src/backend && ${ SETENV } ${ MAKE_ENV } ${ MAKE_CMD } symlinks
@ for dir in ${ BUILD_DIRS } ; do \
cd ${ WRKSRC } /$$ { dir} && ${ SETENV } ${ MAKE_ENV } ${ MAKE_CMD } ; \
done
. i f e x i s t s ( $ { F I L E S D I R } / p k g - m e s s a g e $ { C O M P O N E N T } . i n )
SUB_FILES += pkg-message${ COMPONENT }
PKGMESSAGE = ${ WRKSRC } /pkg-message${ COMPONENT }
. e n d i f
. i f e x i s t s ( $ { F I L E S D I R } / p k g - i n s t a l l $ { C O M P O N E N T } . i n )
SUB_FILES += pkg-install${ COMPONENT }
PLIST_SUB += PG_USER = ${ PG_USER }
. e n d i f
post-patch :
. if defined(SERVER_ONLY) && ${PORT_OPTIONS : MICU }
@${ REINPLACE_CMD } \
-e '/m4_PACKAGE_VERSION/s/\[2\.6[0-9]\]/m4_defn([m4_PACKAGE_VERSION])/' \
-e '/icu/s/_57//' \
${ WRKSRC } /configure.in
. e n d i f
do-install :
@for dir in ${ INSTALL_DIRS } ; do \
cd ${ WRKSRC } /$$ { dir} && \
${ SETENV } ${ MAKE_ENV } ${ MAKE_CMD } ${ MAKE_ARGS } ${ INSTALL_TARGET } ; \
done
. i f d e f i n e d ( S E R V E R _ O N L Y )
@ ${ MKDIR } ${ STAGEDIR } ${ PREFIX } /share/postgresql ; \
${ MKDIR } ${ STAGEDIR } ${ PREFIX } /etc/periodic/daily ; \
${ INSTALL_SCRIPT } ${ WRKDIR } /502.pgsql \
${ STAGEDIR } ${ PREFIX } /etc/periodic/daily
. e n d i f # SERVER_ONLY
. i f d e f i n e d ( C L I E N T _ O N L Y )
@ cd ${ WRKSRC } /src && ${ SETENV } ${ MAKE_ENV } ${ MAKE_CMD } ${ MAKE_ARGS } install-local
. e n d i f
@ if [ -r ${ PKGMESSAGE } ] ; then \
${ MKDIR } ${ STAGEDIR } ${ DOCSDIR } ; \
${ INSTALL_DATA } ${ PKGMESSAGE } ${ STAGEDIR } ${ DOCSDIR } /README${ COMPONENT } ; \
fi
. e n d i f # !NO_BUILD
. i f d e f i n e d ( S E R V E R _ O N L Y )
check :
@if [ ` id -u` != 0 ] ; then \
${ ECHO } "Running postgresql regressions tests" ; \
cd ${ WRKSRC } ; ${ MAKE_CMD } check ; \
else \
${ ECHO } "You cannot run regression tests when postgresql is built as user root." ; \
${ ECHO } "Clean and rebuild the port as a regular user to run the tests." ; \
fi
. e n d i f
2017-08-10 16:23:31 +02:00
Update to latest versions of PostgreSQL
2018-02-08 Security Update Release
==================================
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.
All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.
Security Issues
---------------
Two security vulnerabilities have been fixed by this release:
* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable
Local fixes to the FreeBSD ports
--------------------------------
Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].
PR: 214671 [1], 223157 [2], 215028 [3]
Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
2018-02-08 18:38:36 +01:00
. i n c l u d e < b s d . p o r t . p o s t . m k >