summaryrefslogtreecommitdiff
path: root/databases
AgeCommit message (Collapse)AuthorFilesLines
2005-09-04Update ruby-mysql pacakge to 2.7.taca2-8/+8
Changes: 2005-08-22 version 2.7 * add constants for Mysql#options: Mysql::OPT_GUESS_CONNECTION, Mysql::OPT_USE_EMBEDDED_CONNECTION, Mysql::OPT_USE_REMOTE_CONNECTION, Mysql::SET_CLIENT_IP * test.rb: for 4.0.x, 5.0.x 2005-08-16 version 2.7-beta3 * add Mysql::Stmt#bind_result 2005-08-02 version 2.7-beta2 * BUG: mysql.c.in: fetch_hash: nil value doesn't exist in hash. (Thanks Stefan Kaes) * add constant Mysql::VERSION. * add Mysql#prepare 2005-07-24 version 2.7-beta * add Mysql#stmt_init method * add Mysql::Stmt, Mysql::Time, Mysql::RowOffset class * add Mysql::Error#sqlstate method * change offset value to Mysql::RowOffset object that is used by Mysql::Result#row_seek,row_tell 2005-07-31 version 2.6.3 * add constant Mysql::VERSION. 2005-07-26 version 2.6.2 * BUG: mysql.c.in: fetch_hash: nil value doesn't exist in hash. (Thanks Stefan Kaes) 2005-06-28 version 2.6.1 * mysql.c.in: fix to compile error on MacOSX.
2005-09-04Bump the PKGREVISION of packages that linked against the lua sharedjlam1-2/+2
library after lang/lua was libtoolized in lua-5.0.2nb4.
2005-09-03Add updated patch-aa for a missed diff on login.php for the last security fixadrianp3-5/+15
Re-do how .orig files are handled by pax as this wasn't working as expected Ride the previous package bump
2005-09-03Security fix for http://secunia.com/advisories/16617/adrianp3-4/+20
Bump to nb4
2005-09-03don't derive DISTNAME from PKGNAME, the other way is simplertonio1-3/+3
2005-09-03strips nb[0-9]* from PKGNAME when building DISTNAMEtonio1-2/+2
2005-09-03use DEPENDS+= instead of = in options.mk, to prevent forgetting the dependancytonio2-4/+5
on p5-perl-ldap bump PKGREVISION
2005-09-01Add a depends on apacheadrianp1-5/+4
Fix up previous handling of new patch as suggested by salo@ in private email. Bump PKGREVISION
2005-08-30Update databases/lbdb to 0.30tonio6-14/+85
Make it use the option framework, to enable/disable abook and gnupg plugins and dependancies fix PR 29879, applying the appended patch approved by cube@
2005-08-30use the "dynamic" version of nss_ldap_initgroups(), to get thedrochner1-15/+22
total number of groups doesn't make much of a difference for standard systems with NGROUPS==_SC_NGROUPS_MAX, but someone might change this
2005-08-30Remove .orig file in pre-install from patch-aa. Spotted by salo@.adrianp1-1/+4
2005-08-30Patch via Debian for recent security issueadrianp3-3/+19
Bump to nb2
2005-08-30-cleanup: honor PKG_SYSCONFDIR, use USE_PKGINSTALLdrochner6-10/+85
-support the "getgroupmembership" nsswitch invocation bump PKGREVISION
2005-08-29Update to 2.6.4-rc1adrianp3-7/+22
Security fix for two XSS security issues Lots of other changes, a brief summary includes: > Improvements: > Foreign-key dropdowns can be more customized > Export: configurable filename templates > Display column comments while editing data > Transformations: new hexadecimal mode > HTTP auth: support FastCGI > Themes: can now have different theme per server > OLD_PASSWORD in the list of functions > Better messages when checking numerical input > Allow adding DROP TABLE when copying databases > Better support of information_schema > Various interface CSS improvements > Tree subgroups in left panel database selector > Documentation: links and anchors to every FAQ item > Table comments move to page header > Export: configurable default charset > Removed warning about PmaAbsoluteUri not set > Fixes: > Database search in MySQL 5.0.x on fields without a charset > Invalid "normal" cursor style > Browsing state when deleting multiple rows > Support bigger queries in print view, insert row, export results > Unsaved changes to relations were lost when changing display field > Exporting under IE 6 (Windows XP SP2) > Better catching of parse errors in config file > XSS on the cookie-based login panel > Show all while browsing foreign values > Escaping of special characters in ENUM or SET > XSS on table creation page > Using mysqli extension with MySQL 4.0.x > "empty result set" message was sometimes not returned > Incorrect message "You should define a primary key" > Abide cfg['Lang'] settings even if using MySQL > 4.1.x
2005-08-28Add a patch from gnats CSV to fix the security problem noted in:recht3-13/+45
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2180 Patch by adrianp@. ChangeLog from gnats CSV: * Makefile.in (install-gnats-tools, install-gnats-bin): Removed chown and chmod entries for setting binaries suid. CAN-2005-2180 advisory. gen-index as setuid root can overwrite any system file. Bump PKGREVISION to 1.
2005-08-27Update to gnats 4.1.0.recht9-60/+257
Make a overhaul of the package and bring it closer to pkgsrc standards. Addresses PR 26174 by Hauke Fath. changes: This is GNATS 4.1.0, a release that incorporates multiple bug fixes and enhancements that have been committed to CVS since the release of GNATS 4.0. Notable enhancements include: - Upgrade to autoconf 2.59 generated configure scripts. - New PR numbers are reported to the client upon new submissions - Rewrite of install-sid. Now, rather than editing send-pr, which can be installed on a read-only partition, install-sid creates or edits user or site configuration files ~/.send-pr.conf or /etc/gnats/send-pr.conf. - Removal of libiberty, old manpages, and old build framework cruft - Performance enhancements to indexing code - Various cleanups and bugfixes. See the ChangeLog files for details.
2005-08-26update to 2.0.6drochner4-14/+90
changes: -New Narrative Web Page added to create a more complete web site. -Progress meters in plugins. -Numerous bug fixes.
2005-08-24sort.salo1-2/+2
2005-08-23The real user name in PKG_USERS does not need to be escaped with doublerillig6-12/+12
backslashes anymore. A single backslash is enough. Changed the definition in all affected packages. For those that are not caught, an additional check is placed into bsd.pkginstall.mk.
2005-08-21Don't misuse OWN_DIRS -- if the PG_SUBPREFIX is non-empty, then we dojlam2-3/+6
want to @dirrm that subdirectory, so add that line to the PLIST.
2005-08-20Use REQD_DIRS instead of MAKE_DIRS for directories under ${PREFIX} sojlam1-3/+4
that these directories will be conditionally removed (based on reference counts), regardless of the value of PKG_CONFIG. Bump the PKGREVISION for packages that were modified as a result.
2005-08-19Use -f to force removal of the default files.reed1-2/+2
My error was: /bin/rm /home/reed/pkg/share/examples/openldap/schema/corba.schema.default override r--r--r-- reed/2022 for /home/reed/pkg/share/examples/openldap/schema/corba.schema.default? (For several files it was interactive to remove.) This is when doing non-privileged builds. (An alternative to this is to make it install the *default files with NONBINMODE in the first place.)
2005-08-19This adds DragonFly support. (Before shared libraries were not built.)reed2-3/+100
This is from Joerg Sonnenberger's diff. I do not know if this support has been submitted to Sleepycat for dist/configure* yet.
2005-08-19Whitespace.schmonz1-2/+1
2005-08-17Updated to version 0.22. Changes from 0.2002:hiramatsu2-12/+11
2005-04-01 Jeff Zucker <jzuckerATcpan.org> (0.22) * removed DESTROY and disconnect - use DBD File's instead * added ignore_missing_table flag to avoid warnings with DROP TABLE IF EXISTS 2004-04-18 Jeff Zucker <jzuckerATcpan.org> (0.21) * added support for $dbh->{Active}, should now work well with Class::DBI and other caching systems * added support for DROP TABLE IF EXISTS - doesn't complain if table is already dropped * removed DBD::File from the distribution - it's now distributed with DBI 1.42 and higher
2005-08-16whitespace fixgrant1-3/+2
2005-08-16set INSTALL_DIRS so this installs correctly.grant1-2/+2
2005-08-16build in src/port, too, so libpgport is built on platforms which needgrant1-2/+3
it. fixes build on Solaris.
2005-08-16--prefix is already passed to GNU configure.grant1-2/+1
2005-08-15Add conflict with postgresql80-libs and postgresql80-docs so trying toerh1-1/+4
update this package w/o removing those issues an appropriate error.
2005-08-14Add PLIST entries removed accidentally by mechanical changes forminskim2-3/+6
LIBTOOLIZE_PLIST. Bump PKGREVISION.
2005-08-12Back the last change out after discussion with <xtraeme>.salo1-2/+3
The ABI didn't change and the vulnerability is server side-only.
2005-08-12Update mysql-{client,server} to 4.0.25, which should fixxtraeme6-41/+12
the following vulnerabilities: http://www.appsecinc.com/resources/alerts/mysql/2005-001.html http://www.appsecinc.com/resources/alerts/mysql/2005-002.html Please see changelog: http://dev.mysql.com/doc/mysql/en/news-4-0-25.html
2005-08-10Remove the abuse of buildlink that was pkg-config/buildlink3.mk. Thatjlam9-22/+18
file's sole purpose was to provide a dependency on pkg-config and set some environment variables. Instead, turn pkg-config into a "tool" in the tools framework, where the pkg-config wrapper automatically adds PKG_CONFIG_LIBDIR to the environment before invoking the real pkg-config. For all package Makefiles that included pkg-config/buildlink3.mk, remove that inclusion and replace it with USE_TOOLS+=pkg-config.
2005-08-10Change my email address to @NetBSD.org.gdt1-2/+2
2005-08-08Expose a new variable PGSQL_BLCKSZ for package builders to tweak sojlam1-1/+19
as to optimize PostgreSQL performance. This is a fairly expert option and represents the size in bytes of a PostgreSQL disk page, defaulting to 8K.
2005-08-08Append to, don't override, BUILD_DEFS.jlam1-2/+2
2005-08-08Rename the POSTGRESQL_* variables to PGSQL_* to match the namingjlam2-8/+8
convention for other PostgreSQL variables in pkgsrc.
2005-08-08Fix the package configuration of the following packages so that theyjlam1-3/+4
will install Perl modules into the "vendor" directories: chat/vicq math/udunits databases/rrdtool mbone/beacon devel/p5-subversion Bump their PKGREVISIONs.
2005-08-08oops - this needs pyqt-modulesdrochner1-1/+2
2005-08-08+nss_ldapdrochner1-1/+2
2005-08-08import nss_ldap-239, an nsswitch plugin for LDAP lookupdrochner9-0/+553
(passwd and group for now)
2005-08-07Update to 7.3.10adrianp7-77/+16
Posted on 2005-05-12: In order to address several security issues identified over the past two weeks, as well as one "low probability" race condition, we are releasing new version of PostgreSQL as far back as the 7.2.x branch. Please note that the security issues were those already reported by Tom Lane, as well as a manual fix for them. These releases are mainly to ensure that those installing and/or upgrading existing installations have those fixes automatically. For details on the fixes, please see the HISTORY file included in the Release, but a summary consists of: * Change encoding function signature to prevent misuse * Change "contrib/tsearch2" to avoid unsafe use of INTERNAL function results * Repair race condition between relation extension and VACUUM This could theoretically have caused loss of a page's worth of freshly-inserted data, although the scenario seems of very low probability. There are no known cases of it having caused more than an Assert failure.
2005-08-06Update to 3.5.4adrianp4-28/+43
From the HISTORY: > Version 3.5.4 > ------------- > > Bugs > * Fix security hole in include() of language file: > http://secunia.com/advisories/15941/ > Check now requires that the language filename be in the list > of known allowed filenames. > * Fix that functions returning cstring were not being listed > * Make parsing of PostgreSQL 1-dimensional arrays correct. Makes > named function parameter use more reliable. > * Fix downloading of the results of multiline queries. > > > Version 3.5.3 > ------------- > > Bugs > * Fix using schema enabled dump on non-schema enabled backend > * Don't try setting no timeout when in safe mode > * Reload browser after executing arbitrary SQL > * Fix browser in RTL languages > * Fix inability to drop database using the drop link > * Fix last internal oid for PostgreSQL 8.0 > * Fix (again) dumping on v8 for windows, exclude dumping some objects. > > Translations > * Portuguese from Francisco > > > Version 3.5.2 > ------------- > > Bugs > * Fix export to work with release candidates and beta releases as well as finals > (Russell Smith) > * Fix port selection for local connections (Russell Smith) > * Fix timeouts on long running operations (Adrian Nida) > * Allow Multiline character and character varying editing and inserting > * Do browser language detection for all languages > > Translations > * Japanese from Tadashi > * Danish from Arne
2005-08-06Add an explict requirement for readline on 1.6.x which should resolveadrianp1-1/+7
PR#30678 and PR#30364.
2005-08-06Add and enable postgresql80-{plperl,plpython,pltcl}.jlam1-1/+4
2005-08-06Import databases/postgresql80-pltcl-8.0.3.jlam4-0/+40
PL/Tcl is a dynamic loadable extension for the PostgreSQL database system that enables the Tcl language to be used to create functions and trigger-procedures. It offers most of the capabilities a function writer has in the C language.
2005-08-06Import databases/postgresql80-plpython-8.0.3.jlam4-0/+49
PL/Python allows you to write functions in the Python programming language that may be used in SQL queries as if they were built into Postgres. The PL/Python intepreter is a full Python interpreter. PL/Python is currently only available as an "untrusted" language (meaning it does not offer any way of restricting what users can do in it). It has therefore been named "plpythonu". The trusted variant plpython may become available again in future, if a new secure execution mechanism is developed in Python.
2005-08-06Import lang/postgresql80-plperl-8.0.3.jlam4-0/+36
PL/Perl allows you to write functions in the Perl programming language that may be used in SQL queries as if they were built into Postgres. The PL/Perl intepreter is a full Perl interpreter. However, certain operations have been disabled in order to maintain the security of the system.
2005-08-06Bump the PKGREVISIONs of all (638) packages that hardcode the locationsjlam36-72/+76
of Perl files to deal with the perl-5.8.7 update that moved all pkgsrc-installed Perl files into the "vendor" directories.