Commit graph

153 commits

Author SHA1 Message Date
Edwin Groothuis
090059a210 Bump portrevision due to upgrade of devel/gettext.
The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
2008-06-06 14:17:21 +00:00
Pav Lucistnik
026e7e59d0 - Remove USE_GETOPT_LONG which is a no-op since March 200 2008-03-20 09:37:21 +00:00
Palle Girgensohn
1d25499d3d Update all PostgreSQL ports to latest versions.
This includes a bunch of security fixes: CVE-2007-6067, CVE-2007-4772,
CVE-2007-6601, CVE-2007-6600 and CVE-2007-4769.

Security: http://www.postgresql.org/about/news.905
2008-01-07 13:51:57 +00:00
Palle Girgensohn
9d6b68248f Update PostgreSQL ports to the latest patch releases.
PR: ports/104075
2007-09-17 16:45:00 +00:00
Florent Thoumie
d4f0d0048a - Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
2007-05-19 20:36:56 +00:00
Palle Girgensohn
0460921154 Update PostgreSQL to 7.3.19, 7.4.17, 8.0.13, 8.1.9 and 8.2.4 respectively:
The PostgreSQL Global Development Group has released updated versions
 for PostgreSQL 8.2 and all back versions to patch a privilege
 escalation exploit in SECURITY DEFINER functions.  All users of this
 feature are urged to update to the latest minor version and follow
 instructions on securing these functions as soon as possible.  This
 minor release also contains other fixes, so all users should plan to
 deploy it.

 Once you have updated, additional steps are required to secure your
 database against the exploit.  Please read the release notes at
 http://www.postgresql.org/docs/8.2/static/release.html and the
 TechDocs article at http://www.postgresql.org/docs/techdocs.77 on how
 to lock down your security definer functions, if you use them.

 As always, application of a minor release does not require a dump and
 reload of the database.

 The frequency of security fixes recently is a result of increased
 scrutiny of the PostgreSQL code by government agencies and
 security-conscious companies.  Rapid turnaround on security patches
 is key to keeping PostgreSQL the most secure SQL database.  Your work
 and vigilance in applying the latest security updates ensures that
 there will never be a PostgreSQL "worm".

http://www.postgresql.org/docs/8.2/static/release-8-2-4.html
http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-9
http://www.postgresql.org/docs/8.0/static/release.html#RELEASE-8-0-13
http://www.postgresql.org/docs/7.4/static/release.html#RELEASE-7-4-17

http://www.postgresql.org/docs/techdocs.77

Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138
2007-04-23 16:10:54 +00:00
Palle Girgensohn
a64769fcfc Update PostgreSQL with, amongst other things, a security fix:
A vulnerability allows suppressing the normal checks that a SQL
  function returns the data type it's declared to do. These errors can
  easily be exploited to cause a backend crash, and in principle might
  be used to read database content that the user should not be able to
  access. [CVE-2007-0555]

The release includes a set of other fixes as well. Please see the
release information at
http://www.postgresql.org/docs/7.3/static/release.html#RELEASE-7-3-18

Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555
2007-02-05 15:41:08 +00:00
Palle Girgensohn
6b11e89876 Update postgresql to 8.2.1, 8.1.6, 8.0.10, 7.4.15 and 7.3.17.
Release notes:
http://www.postgresql.org/docs/7.3/static/release.html#RELEASE-7-3-17
http://www.postgresql.org/docs/7.4/static/release.html#RELEASE-7-4-15
http://www.postgresql.org/docs/8.0/static/release.html#RELEASE-8-0-10
http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-6
http://www.postgresql.org/docs/8.2/static/release-8-2-1.html

The server-side utilities of postgresql (initdb, initlocation,
ipcclean, pg_controldata, pg_ctl, pg_id and pg_resetxlog) are now
installed by the respective postgresql*-server port (previously they
where installed with the client). If you update the client, you should
also update the server to make sure you are not left without the
server-side tools. Do something like:

    portupgrade postgresql-client postgresql-server
2007-01-09 16:29:35 +00:00
Palle Girgensohn
f79096291a Update PostgreSQL to latest versions: 8.1.5, 8.0.9, 7.4.14 and 7.3.16.
Release notes:
8.1.5  http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-5
8.0.9  http://www.postgresql.org/docs/8.0/static/release.html#RELEASE-8-0-9
7.4.14 http://www.postgresql.org/docs/7.4/static/release.html#RELEASE-7-4-14
7.3.16 http://www.postgresql.org/docs/7.3/static/release.html#RELEASE-7-3-16

Change name of the rc script from '010.pgsql.sh' to 'postgresql'

Add optional hierachy patch added for 7.4 and 8.1 ports.

Chase heimdal libs update [reported by several]

For 8.1+ the port enables autovacuum in ~pgsql/postgresql.conf when
running initdb

Cleanup the ports, moving pkg-message-* to files/pkg-message-*.in and
files/pgsql.sh.tmpl to files/postgresql.in. [ports/97767]

PR: ports/97767, submitted by delphij@FreeBSD.org
2006-11-08 17:07:53 +00:00
Maxim Sobolev
f782d82915 There is no point in setting mode of rc.d file to be 554, set it to 555.
Otherwise there could be problems with the service not starting up in the
case when owner of the file has been changed.
2006-06-26 22:24:10 +00:00
Palle Girgensohn
85e4e49806 Update all PostgreSQL to fix a security flaw
The PostgreSQL Global Development Group today released versions 8.1.4, 8.0.8,
7.4.13 and 7.3.15. This is an urgent update to close a security hole which
can permit a SQL injection attack on some applications running PostgreSQL.

Users are urged to apply the update as soon as reasonably possible. Since the
update affects client functionality, most driver projects will be updating
this week as well.

Because the security issue involved is complex, we have added a section in
Techdocs to explain it: http://www.postgresql.org/docs/techdocs.52. Please
read this first before applying the updates.

Also, fix rc_subr startup problems on FreeBSD-7.x.

Security:	http://www.postgresql.org/docs/techdocs.50
PR:		ports/95154
2006-05-23 21:18:58 +00:00
Palle Girgensohn
f56421aa5b Security patch, update to version 7.3.14.
Security:	http://www.postgresql.org/docs/8.1/static/release-7-3-14.html
2006-02-18 12:48:53 +00:00
Palle Girgensohn
1d992c44d7 Update postgresql with latest patch release.
A critical fix repairs an error in ReadBuffer that can cause data loss
due to overwriting recently-added pages.  This applies to the 8.1 and
8.0 branches on all platforms.

Note that this update might require a reindex of textual columns under
certain conditions; please see UPDATING.

Other fixes included are:
-- Character string locale comparison bug. This may require a REINDEX
    on text column indexes in some locales, such as Hungarian.
-- Prevent accidental changes of locale by plperl
-- Two fixes for Japanese encodings
-- Two fixes for COPY CSV
-- Fixes for functions returning RECORD
-- Fixes to autovacuum, dblink and pgcrypto
2006-01-09 17:30:38 +00:00
Palle Girgensohn
d6b6d44388 Handle a change in rc.subr. nowadays, "faststart" is used instead of
"start" when booting, since there's no need waste time checking for
running processes when the OS is starting up.

Bumping portrevision.

PR:		90884
Submitted by:	Victor Snezhko <snezhko@indorsoft.ru>
2005-12-25 20:06:23 +00:00
Palle Girgensohn
896fa7a5b4 Update postgresql to 7.3.12
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp>
PR:		90446
2005-12-22 20:48:36 +00:00
Palle Girgensohn
170eff296f Let postgresql (libpq.so) only link with the Kerberos implementations
installed from ports. The base heimdal distribution installs libraries
that have no depenency information. While this is quite correct, it
means that each library that links with libpq.so must also know if
libpq.so is linked with libkrb.so et al. Problem is, there's no good
way to get this information (pg_config has a --libs option starting at
version 8.1) and all ports using postgresql must be changed to make it
possible to link with a libpq.so that was configured to use the
Kerberos implementation installed in /usr by default. Hence, we
require one of the ports (heimdal or krb5) if postgresql is to be
linked with Kerberos. At least for now, until we can fix this in some
better way.

Also, if MIT Kerberos (security/krb5) is installed, users should
ideally remove the base heimdal installation so linkers will not pick
it up in preference to the krb5 libs (base heimdal has higher version
numbers than krb5 port).

PR: 80869, 88098, 85178
2005-11-14 23:59:26 +00:00
Palle Girgensohn
f55ea704d4 Update to version 7.3.11
Migration to version 7.3.11

   A dump/restore is not required for those running 7.3.X. However, if you
   are upgrading from a version earlier than 7.3.10, see the release notes
   for 7.3.10.
     __________________________________________________________________

Changes

     * Fix error that allowed "VACUUM" to remove ctid chains too soon, and
       add more checking in code that follows ctid links
       This fixes a long-standing problem that could cause crashes in very
       rare circumstances.
     * Fix CHAR() to properly pad spaces to the specified length when
       using a multiple-byte character set (Yoshiyuki Asaba)
       In prior releases, the padding of CHAR() was incorrect because it
       only padded to the specified number of bytes without considering
       how many characters were stored.
     * Fix missing rows in queries like UPDATE a=... WHERE a... with GiST
       index on column a
     * Improve checking for partially-written WAL pages
     * Improve robustness of signal handling when SSL is enabled
     * Various memory leakage fixes
     * Various portability improvements
     * Fix PL/PgSQL to handle var := var correctly when the variable is of
       pass-by-reference type
2005-10-04 23:31:34 +00:00
Palle Girgensohn
30f96e3f96 Update PostgreSQL to latest versions. For details on the fixes,
please see the HISTORY file included in the Release, but a summary
consists of:

      * Change encoding function signature to prevent misuse
      * Change "contrib/tsearch2" to avoid unsafe use of INTERNAL function
        results
      * Repair race condition between relation extension and VACUUM
        This could theoretically have caused loss of a page's worth of
        freshly-inserted data, although the scenario seems of very low
        probability. There are no known cases of it having caused more than
        an Assert failure.

Security:	http://www.postgresql.org/about/news.315
2005-05-10 23:42:54 +00:00
Palle Girgensohn
7506374126 Modify 8.0's startup script to simulate a full login (su -l) [1]. Also
add support to select login class for running postgresql [2].

The new startup script, using rc.subr, is now installed for all
versions of postgresql. Bump portrevisions, since startup script is
modified.

PR:		78630 [1]
Submitted by:	Vivek Khera [1]
Submitted by:	Brian B. [2]
Approved by:	seanc (implicit)
2005-03-19 03:51:45 +00:00
Palle Girgensohn
11c6621cb5 Fixing problems with the recent security patch: When bison was not
installed, the patched gram.y file would not be used and the security
patch would be a no-op. Also, I've had reports of compilation errors
related to bison.

Since checking for the correct version of bison is hard and error
prone, I'm doing what the postgresql distribution does - patching the
yacc:ed .c file to get rid of the building dependency.

Bumping portrevision of -server.

Pointy hat to:	me
Noticed by:	Mike Harding and others
Security:	http://www.vuxml.org/freebsd/6b4b0b3f-8127-11d9-a9e7-0001020eed82.html
Approved by:	seanc (implicit)
2005-02-20 05:38:24 +00:00
Palle Girgensohn
9c89540227 Fix security alert using a patch from PostgreSQL's CVS repository:
Prevent overrunning a heap-allocated buffer if more than 1024
  parameters to a refcursor declaration are specified. This is a
  minimally-invasive fix for the buffer overrun.

Define LATEST_LINK to avoid package name clashes between the different
branches of PostgreSQL. [1] (Since postgresql-tcltk is hardwired to
branch 7.4, keep its LATEST_LINK to a generic value.)

Set UNIQUENAME and let it be the same for server & client, so each
branch's ports will share the same options file. This adds some no-op
knobs to the -client port, but IMO it is better this way.

Add space inside paranthesis in OSVERSION conditional to work around
(ancient) make bug. [2]

Remove the Rendez-Vouz knob for 8.0 since I can't find the software
needed to even compile it on FreeBSD.

Bump portrevision (for -server only).

Noted by:	kris [1]
PR:		ports/77530 [2]
Security:	http://www.vuxml.org/freebsd/6b4b0b3f-8127-11d9-a9e7-0001020eed82.html
Approved by:	seanc (mentor)
2005-02-19 12:07:46 +00:00
Palle Girgensohn
88413af3b8 In order to address a potential security hole recently identified with
the "LOAD" option, the PostgreSQL Global Development Group is
announcing the release of new versions of PostgreSQL.

Update to 7.3.9, 7.4.7 & 8.0.1.

Take the opportunity to reset PORTREVISION of slave ports.

Back out name change of startup script. The new script uses rc.subr(8),
and as such also uses rcorder(8). But, rcorder does not exist in FreeBSD
4.x. Hence rename the script it back to the top of the directory
list. [1]

The periodic script should of course be executable. [2]

[1] Noted by Niels Chr. Bank-Pedersen <ncbp at bank-pedersen dot dk>
[2] Noted by Fritz Heinrichmeyer <fritz.heinrichmeyer at fernuni-hagen dot de>
2005-02-03 09:30:27 +00:00
Palle Girgensohn
e2eee41076 Split the postgresql ports into a server and a client part. The
following knobs can be used by ports depending on PostgreSQL:

# USE_PGSQL     - Add PostgreSQL client dependency.
#                 If no version is given (by the maintainer via the port or
#                 by the user via defined variable), try to find the
#                 currently installed version.  Fall back to default if
#                 necessary (PostgreSQL-7.4 = 74).
# DEFAULT_PGSQL_VER
#               - PostgreSQL default version. Can be overridden within a port.
#                 Default: 74.
# WANT_PGSQL_VER
#               - Maintainer can set an arbitrary version of PostgreSQL by
#                 using it.
# BROKEN_WITH_PGSQL
#               - This variable can be defined if the ports doesn't support
#                 one or more versions of PostgreSQL.

Note that a periodic script is installed that will, by default, vacuum
all databases nightly. You may want to tweak the settings, see the
script at ${LOCALBASE}/etc/periodic/daily/502.pgsql

To run PostgreSQL at boot time, set postgresql_enable=yes in /etc/rc.conf.

Note
PR:		75344
Approved by:	portmgr@ (kris), ade & sean (mentors)
2005-01-31 00:19:47 +00:00
Palle Girgensohn
80dd9ee47d PR ports/75344 - This needs testing and an probably experimental
build, so it will not be out the door before the ports freeze.
Meanwhile, modify BROKEN text to something more informative.

Approved by: ade (mentor)
2004-12-21 20:16:16 +00:00
Palle Girgensohn
ae413f56b6 Add myself as committer, and use my @FreeBSD.org address.
Approved by: ade (mentor)
2004-12-06 03:59:56 +00:00
Ade Lovett
03e63e3bdb Another step along the road to the postgresql new world order.
Note that none of these ports are (yet) hooked into the tree,
and will not compile unless you set a specific environmental
variable.  This should be warning enough to leave well alone
for now :)

Submitted by:	maintainer
2004-11-23 19:15:12 +00:00
Ade Lovett
6fde77975b Update postgresql 7.3.7 -> 7.3.8 and 7.4.5 -> 7.4.6 due to security
advisories in http://www.postgresql.org/news/234.html

Note that postgresql 7.2.x is NOT being updated here since it is
due for termination real soon now.

Submitted by:	maintainer, also referenced in ports/73142 (no patch)
2004-11-05 19:23:27 +00:00
Oliver Eikemeier
ce3890ed88 - update to version 7.3.7:
* Prevent possible loss of committed transactions during crash.

PR:		71179
Submitted by:	SUGIMURA Takashi <sugimura@jp.FreeBSD.org>
Reviewed by:	Palle Girgensohn <girgen@pingpong.net> (maintainer)
2004-08-31 13:44:36 +00:00
Edwin Groothuis
f4b43c46c3 Fix CONFLICTS variable. 2004-05-14 13:16:02 +00:00
Edwin Groothuis
71161d6337 [PATCH] databases/postgresql73: update to 7.3.6
* Revert erroneous changes in rule permissions checking
     * Repair incorrect order of operations in GetNewTransactionId()
     * Ensure configure selects -fno-strict-aliasing even when an
       external value for CFLAGS is supplied
     * Make pg_restore handle 64-bit off_t correctly
     * Make contrib/dblink not assume that local and remote type OIDs
       match (Joe)
     * Quote connectby()'s start_with argument properly (Joe)
     * Don't crash when a rowtype argument to a plpgsql function is NULL
     * Avoid generating invalid character encoding sequences in corner
       cases when planning LIKE operations
     * Ensure text_position() cannot scan past end of source string in
       multibyte cases (Korea PostgreSQL Users' Group)
     * Fix index optimization and selectivity estimates for LIKE
       operations on bytea columns (Joe)

	This version, as with most minor versions, does not require
	a dump/reload to put into place.

PR:		ports/63698
Submitted by:	Palle Girgensohn <girgen@pingpong.net>
2004-05-14 13:13:10 +00:00
Trevor Johnson
88c894c573 Add WITHOUT_NLS knob.
PR:	61836
Submitted by:	Palle Girgensohn (maintainer)
2004-02-05 12:59:14 +00:00
Joe Marcus Clarke
186b8ba82f Add USE_GETTEXT and bump PORTREVISION.
Submitted by:	trevor
Tested by:	bento
2004-02-04 04:36:30 +00:00
Kris Kennaway
b71d153ae3 Use a unique LATEST_LINK 2004-01-29 11:56:43 +00:00
Trevor Johnson
78da40aa98 Now gettext 0.12.1 is gettext-old. 2004-01-23 18:12:26 +00:00
Sean Chittenden
9985ef677d Update the PostgreSQL ports to use the KRB5_HOME variable instead of
LOCALBASE to find krb5-config in the MIT case.

Prodded by: Our friendly folks at the ISC who want to use FreeBSD's
	    PostgreSQL ports instead of an unmanaged build from a tarball.
2004-01-18 05:46:54 +00:00
Edwin Groothuis
7fe9e75768 [MAINTAINER] databases/postgresql73: wrong MD5_FILE for subports
Just realized that after the repo-copy, the MD5_FILE pointer for
	subports was never updated.

PR:		ports/61193
Submitted by:	Palle Girgensohn <girgen@pingpong.net>
2004-01-11 10:32:54 +00:00
Sean Chittenden
7806839dc8 Preemptive strike against future bogons for PORTREVSION bumps. 2003-12-04 10:08:07 +00:00
Sean Chittenden
9593c3ea32 Update to PostgreSQL 7.3.5. See the release notes for details. A
dump is *not* required when upgrading from any 7.3 release to 7.3.5.
Release notes:

http://developer.postgresql.org/docs/postgres/release-7-3-5.html

Notified:	maintainer
Repo-copy by:	joe
2003-12-04 09:19:11 +00:00
Edwin Groothuis
7f0aef52d7 Set pkg-comment only when there isn't one set yet (make port
master/slave clean)
2003-10-13 09:54:16 +00:00
Joe Marcus Clarke
a3108b1e51 Bump the PORTREVISION for the ports directly affected by the gettext upgrade.
Prodded by:	kris
2003-08-26 20:25:58 +00:00
Joe Marcus Clarke
adccc29aad Chase the libintl.so shared lib version. 2003-08-25 05:41:38 +00:00
Sergey A. Osokin
661fe60c66 Update to 7.3.4
"In order to address a potentially serious (although rare)
 server startup failure that was recently reported, we have
 released PostgreSQL version 7.3.4. This release is critical
 for users of PostgreSQL version 7.3.3, and highly recommended
 for all other PostgreSQL users."

Submitted by:	Palle Girgensohn <girgen@pingpong.net> (maintainer)
PR:		55354
2003-08-12 09:58:13 +00:00
FUJISHIMA Satsuki
b185046be2 get rid of libgnugetopt dependency for -CURRENT,
use USE_GETOPT_LONG instead.
2003-07-14 02:53:03 +00:00
Daichi GOTO
9594eef7a2 postgresql slave ports, reduce unnecessary portrevision bumps
PR:		52867
Submitted by:	Palle Girgensohn <girgen@pingpong.net> (maintainer)
2003-06-19 09:12:56 +00:00
Sergey A. Osokin
22b9703b35 Use ${MASTER_SITE_PGSQL} instead of multiple sites
Submitted by:	osa
Approved by:	maintainer
PR:		50397
Approved by:	fjoe (implicit)
2003-06-11 09:23:15 +00:00
Norikatsu Shigemura
21b5e839a3 Update to 7.3.3.
1. Optionally link with libc_r to get plpython working. [1]
2. Fix kerberos build. [2]
3. There was a duplication of some declarations. [3]

PR:		ports/52851
PR:		ports/51080 [2]
Submitted by:	Mike Meyer <mwm@mired.org> [1]
Submitted by:	Gerweck <andy@tacnode.com> [2]
Pointed out by:	Mike Harding <mvh@ix.netcom.com> [3]
Submitted by:	Palle Girgensohn <girgen@pingpong.net> (maintainer)
2003-06-02 01:44:03 +00:00
Sean Chittenden
42b61aee6e Add patch for a fix for braindead applications that were depending on
atoi('') (ex: RT and Horde).  While I'm here, de-"pkg-comment"-ify.  Port
revision bump.

Submitted by:	Larry Rosenman <ler@lerctr.org>
Approved by:	maintainer
2003-02-20 01:14:12 +00:00
Sean Chittenden
4153e1deae Update PostgreSQL to the maintenance release 7.3.2.
Fixes numerous bugs especially with various interface libraries and
pg_dump.  All users are advised to upgrade. This update fixes all known
problems with the postgresql7 port.  See release notes for details:

http://developer.postgresql.org/docs/postgres/release-7-3-2.html

A dump/restore is *not* required when upgrading to this version.

PR:		ports/47983 [1], ports/47284 [2], ports/47808 [3]
Submitted by:	maintainer [1]
		Jason C. Wells [2]
		Michel Oosterhof <m.oosterhof@xs4all.nl> [3]
2003-02-06 20:46:51 +00:00
Jimmy Olgeni
c4acdc239f Add new man pages.
PR:		47054
Submitted by:	Palle Girgensohn <girgen@rambutan.pingpong.net>
2003-01-14 17:00:24 +00:00
Edwin Groothuis
d2087c2111 Fix DISTFILES typo in databases/postgresql7/Makefile
PR:		ports/46749, ports/46748
Submitted by:	"Sergey A.Osokin" <osa@FreeBSD.org.ru>,Rong-en Fan <rafan@infor.org>
2003-01-04 12:18:54 +00:00