275 Commits

Author SHA1 Message Date
pea
1a4d554e97 Update to 9.6.2
ok jeremy@
2017-02-10 14:07:28 +00:00
sthen
a896ba3015 Adjust pg_upgrade docs. Written by jeremy@ based on my notes, with small
tweaks by me to avoid hardcoding versions (both in this README and in the
@ask-update in PLIST).  OK jeremy@ pea@
2017-02-09 15:14:11 +00:00
jsg
4cd880e982 Base gcc does not have atomic builtins on arm. Instead of disabling
spinlocks build with ports gcc for now to get the atomic builtins.

ok sthen@
2016-12-26 13:56:04 +00:00
phessler
382a9341a1 disable spinlocks on arm, so we can have a postgresql package 2016-12-21 07:43:57 +00:00
jeremy
55e0b1aa19 Update to PostgreSQL 9.6.1
This moves pg_upgrade to a subpackage, and has that
subpackage depend on postgresql-previous.

pthread is removed from WANTLIB, as it is no longer
needed for suppoting threaded extensions.

This adds support for PostgreSQL 9.6's new BSD
authentication.

OK pea@ landry@
2016-12-18 18:18:27 +00:00
ajacoutot
5558c792d3 First pass at pre-entively fixing ports that would break once guenther's header
pollution diff is in.

lang/squeak/vm does not build but it's due to the recent audio changes
games/xbattle: also fixes some conflicting implicit decl
print/hplip: also fixes some conflicting implicit decl
2016-09-10 13:03:40 +00:00
jasper
003e889c0a retire sparc 2016-09-01 10:53:26 +00:00
pea
8e1d376a4d Security update to 9.5.4
ok robert@
2016-08-17 09:43:46 +00:00
sthen
7d33c379f6 remove obsolete README, pthread preload no longer needed, and it didn't even
make it into the PLIST anyway
2016-07-01 11:37:38 +00:00
landry
2e44ee3f41 Add alpha to the 'need --disable-spinlocks' boat
http://build-failures.rhaalovely.net/alpha/2016-05-26/databases/postgresql.log

error: #error PostgreSQL does not have native spinlock support on this
platform. To continue the compilation, rerun configure using
--disable-spinlocks. However, performance will be poor. Please report
this to pgsql-bugs@postgresql.org.
2016-06-03 07:28:07 +00:00
pea
c2514ee0ae Update ton 9.5.3
ok jeremy@
2016-05-13 17:15:55 +00:00
pea
cbf363bf45 Update to 9.5.2
Tested in a bulk by ajacoutot@
ok jeremy@
2016-05-13 14:27:48 +00:00
sthen
99b8a81a23 garbage-collect comment that was associated with the (removed) SHARED_ONLY
line. ok pea@
2016-04-01 14:41:07 +00:00
pea
85c385b606 Security update to 9.4.7
ok sthen@
2016-04-01 13:00:18 +00:00
naddy
deea7ed07b drop SHARED_ONLY from python and ruby ports 2016-03-20 16:12:22 +00:00
sthen
728a484e69 SECURITY update to PostgreSQL 9.4.6: various fixes including one for
CVE-2016-0773, an issue with regular expression parsing. Various other fixes.

Note: ..."if you are upgrading an installation that contains any GIN
indexes that use the (non-default) jsonb_path_ops operator class, see
the first changelog entry"...
http://www.postgresql.org/docs/current/static/release-9-4-6.html

OK pea@
2016-02-13 21:54:28 +00:00
pea
f4acf80106 Security update to 9.4.5 2015-11-03 09:35:31 +00:00
zhuk
eb5df17d69 Initialize test database clusters with UTF-8 encoding.
Initial idea from Patrick Keshishian on ports@, okay landry@.
2015-09-24 20:35:31 +00:00
kirby
73de9b2a88 - remove trailing white spaces
- add RSC id and header to README-plpython
OK jasper@
2015-08-03 07:42:30 +00:00
zhuk
963a1d0ef8 Run test commands in a subshell to avoid potential clutter of variables
coming from those modules.
2015-07-19 12:42:20 +00:00
zhuk
1e4bb553c3 Don't use same directory for both mariadb.port.mk and postgresql.port.mk:
they could be used at the same time, and each of them wipes the database
directory before running server.
2015-07-19 12:34:41 +00:00
ajacoutot
4220ee24ac sudo(8) -> su(1) 2015-07-18 15:32:47 +00:00
bentley
79430bf078 Kill dead mirrors, and add a http mirror.
ok pea@ (maintainer)
2015-06-23 07:26:21 +00:00
pea
87aca8a921 Upgrade to 9.4.4
ok ajacoutot@
2015-06-22 07:29:42 +00:00
pea
24676274b4 Security / reliability update to 9.4.2
go ahead ajacoutot@
2015-06-01 08:23:47 +00:00
ajacoutot
a183b75553 "/usr/local/lib/pkgconfig/" is part of mtree(8).
Packages should not own this dir to prevent its deletion or a warning that it
cannot be removed because it's not empty at pkg_delete(1) time.
2015-05-22 11:31:10 +00:00
phessler
567dc192e3 these expect that "sparc" is sparc64, not 32bit. 2015-04-17 07:59:19 +00:00
jca
39b50d922e Fix hba "samehost"/"samenet" support.
On OpenBSD, the sa_family field in netmask sockaddrs can be zero and
thus different from the sa_family of the address sockaddr.
Until this glitch gets corrected, fix postgresql.

ok sthen@ pea@ (MAINTAINER)
2015-02-18 17:49:56 +00:00
jca
eacaf6c8d1 Fix hba with IPv6 connections.
The incorrect code was generating memcpy calls with src and dest
overlapping, which raises SIGABRT, making the server unreachable
using IPv6.  The fix consists in passing the right parameters to
memcpy, including sizeof(struct sockaddr_in) as len, since
sizeof(struct sockaddr_storage) would be too much, and sa_len
is unusable in netmask sockaddrs.  Debugged with sthen@ and lteo@

Problem reported by Hugo Osvaldo Barrera.

ok sthen@
2015-02-17 12:43:08 +00:00
sthen
ad43ce3371 regen 2015-02-16 21:40:38 +00:00
pea
42dbddc262 Security / bugfixes update to 9.4.1 (5 CVE)
ok sthen@
2015-02-06 09:01:21 +00:00
zhuk
5cc84cfc6e Add --nosync to initdb(1) invocation to speed up test framework startup,
as suggested in private mail.
2015-01-21 21:12:28 +00:00
landry
bf9ed5ed4d Unbreak on alpha by using the correct memory barrier instruction, courtesy of miod@ 2015-01-16 23:24:15 +00:00
landry
d28ba6a369 regen patches 2015-01-16 20:43:48 +00:00
landry
954b3f16ed That had to happen... postgresql fails to build on alpha:
{standard input}:1354: Error: unknown opcode `rmb'
Mark as BROKEN accordingly, until a proper fix is devised.
2015-01-16 18:24:57 +00:00
zhuk
2ae5b98b96 Add infrastructure for testing PostgreSQL-based apps. It sets up database
cluster, creates a database (optionally), starts server and then starts
actual test code. The server gets correctly shut down after testing.
Also, only Unix sockets are used for connections, minimizing side effects
on running system.

Man page to follow.

okay espie@
2015-01-12 20:54:09 +00:00
pea
dc69be6808 Update to 9.4.0
Tested in a bulk build by landry@

help and ok jeremy@, sthen@
2015-01-08 15:01:11 +00:00
jeremy
dfa6a753d2 Allow installation of PostgreSQL extensions outside of the ports system.
Remove FAKE_AS_ROOT = always-wrap, since it is no longer necessary.

espie@ in favor
OK pea@
2014-10-16 00:08:54 +00:00
sthen
b85142c784 use -w when starting postgresql, to wait for startup to complete before
continuing. suggested by frantisek holop, ok ajacoutot@

while there, s/an another/another/ in README
2014-09-23 08:41:10 +00:00
espie
73a10c0733 turn on "always-wrap" for the 3 ports known to embed their install program
in installed files.
2014-09-16 09:09:46 +00:00
pea
24f9ceb47f Update to 9.3.5
ok sthen@
2014-09-02 13:39:39 +00:00
espie
fd2577db50 not yet on by default, still some love needed for umasks 2014-09-02 12:56:35 +00:00
naddy
ce2be36268 Add the remaining pieces to allow fake as non-root.
Not enabled as a general default yet.

Committing for espie@
2014-08-14 17:04:12 +00:00
miod
e6efdea788 Add the missing m88k bits for proper build. No version bump, since it did not
build previously.
2014-06-04 21:35:58 +00:00
ajacoutot
31ef7b1780 Drop commented line. 2014-04-21 22:15:09 +00:00
sthen
80ada6da73 blech, revert previous 2014-04-21 13:32:08 +00:00
sthen
b350e68921 restore PLIST-plpython, update-plist likes overwriting pkg-readmes lines 2014-04-21 13:29:19 +00:00
ajacoutot
d49ac942a3 Drop kerberos support. 2014-04-21 13:13:29 +00:00
pea
50209740a9 Critical update to 9.3.4
"The data corruption issue in PostgreSQL 9.3 affects binary replication
standbys, servers being recovered from point-in-time-recovery backup,
and standalone servers which recover from a system crash. The bug
causes unrecoverable index corruption during recovery due to incorrect
replay of row locking operations. This can then cause query results to be
inconsistent depending on whether or not an index is used, and eventually
lead to primary key violations and similar issues."

ok sthen@, jasper@
2014-03-28 11:50:51 +00:00
pea
e2e9f2ccc5 Update to 9.3.3.
This update fixes 8 CVE (CVE-2014-0060, CVE-2014-0061, CVE-2014-0062,
CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, CVE-2014-0066 and CVE-2014-0067).
This update also fixes some issues which affect binary replication and row
locking, and can cause recoverable data corruption in some cases.

ok sthen@
2014-03-11 10:42:34 +00:00