Age | Commit message (Collapse) | Author | Files | Lines |
|
Changes:
2005-08-22
version 2.7
* add constants for Mysql#options: Mysql::OPT_GUESS_CONNECTION,
Mysql::OPT_USE_EMBEDDED_CONNECTION,
Mysql::OPT_USE_REMOTE_CONNECTION, Mysql::SET_CLIENT_IP
* test.rb: for 4.0.x, 5.0.x
2005-08-16
version 2.7-beta3
* add Mysql::Stmt#bind_result
2005-08-02
version 2.7-beta2
* BUG: mysql.c.in: fetch_hash: nil value doesn't exist in
hash. (Thanks Stefan Kaes)
* add constant Mysql::VERSION.
* add Mysql#prepare
2005-07-24
version 2.7-beta
* add Mysql#stmt_init method
* add Mysql::Stmt, Mysql::Time, Mysql::RowOffset class
* add Mysql::Error#sqlstate method
* change offset value to Mysql::RowOffset object that is used
by Mysql::Result#row_seek,row_tell
2005-07-31
version 2.6.3
* add constant Mysql::VERSION.
2005-07-26
version 2.6.2
* BUG: mysql.c.in: fetch_hash: nil value doesn't exist in
hash. (Thanks Stefan Kaes)
2005-06-28
version 2.6.1
* mysql.c.in: fix to compile error on MacOSX.
|
|
library after lang/lua was libtoolized in lua-5.0.2nb4.
|
|
Re-do how .orig files are handled by pax as this wasn't working as expected
Ride the previous package bump
|
|
Bump to nb4
|
|
|
|
|
|
on p5-perl-ldap
bump PKGREVISION
|
|
Fix up previous handling of new patch as suggested by salo@ in private email.
Bump PKGREVISION
|
|
Make it use the option framework, to enable/disable abook and gnupg plugins and
dependancies
fix PR 29879, applying the appended patch
approved by cube@
|
|
total number of groups
doesn't make much of a difference for standard systems with
NGROUPS==_SC_NGROUPS_MAX, but someone might change this
|
|
|
|
Bump to nb2
|
|
-support the "getgroupmembership" nsswitch invocation
bump PKGREVISION
|
|
Security fix for two XSS security issues
Lots of other changes, a brief summary includes:
> Improvements:
> Foreign-key dropdowns can be more customized
> Export: configurable filename templates
> Display column comments while editing data
> Transformations: new hexadecimal mode
> HTTP auth: support FastCGI
> Themes: can now have different theme per server
> OLD_PASSWORD in the list of functions
> Better messages when checking numerical input
> Allow adding DROP TABLE when copying databases
> Better support of information_schema
> Various interface CSS improvements
> Tree subgroups in left panel database selector
> Documentation: links and anchors to every FAQ item
> Table comments move to page header
> Export: configurable default charset
> Removed warning about PmaAbsoluteUri not set
> Fixes:
> Database search in MySQL 5.0.x on fields without a charset
> Invalid "normal" cursor style
> Browsing state when deleting multiple rows
> Support bigger queries in print view, insert row, export results
> Unsaved changes to relations were lost when changing display field
> Exporting under IE 6 (Windows XP SP2)
> Better catching of parse errors in config file
> XSS on the cookie-based login panel
> Show all while browsing foreign values
> Escaping of special characters in ENUM or SET
> XSS on table creation page
> Using mysqli extension with MySQL 4.0.x
> "empty result set" message was sometimes not returned
> Incorrect message "You should define a primary key"
> Abide cfg['Lang'] settings even if using MySQL > 4.1.x
|
|
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2180
Patch by adrianp@.
ChangeLog from gnats CSV:
* Makefile.in (install-gnats-tools, install-gnats-bin): Removed chown
and chmod entries for setting binaries suid. CAN-2005-2180 advisory.
gen-index as setuid root can overwrite any system file.
Bump PKGREVISION to 1.
|
|
Make a overhaul of the package and bring it closer to pkgsrc standards.
Addresses PR 26174 by Hauke Fath.
changes:
This is GNATS 4.1.0, a release that incorporates multiple bug fixes
and enhancements that have been committed to CVS since the release of
GNATS 4.0. Notable enhancements include:
- Upgrade to autoconf 2.59 generated configure scripts.
- New PR numbers are reported to the client upon new submissions
- Rewrite of install-sid. Now, rather than editing send-pr, which can
be installed on a read-only partition, install-sid creates or edits
user or site configuration files ~/.send-pr.conf or
/etc/gnats/send-pr.conf.
- Removal of libiberty, old manpages, and old build framework cruft
- Performance enhancements to indexing code
- Various cleanups and bugfixes. See the ChangeLog files for details.
|
|
changes:
-New Narrative Web Page added to create a more complete web site.
-Progress meters in plugins.
-Numerous bug fixes.
|
|
|
|
backslashes anymore. A single backslash is enough. Changed the
definition in all affected packages. For those that are not caught, an
additional check is placed into bsd.pkginstall.mk.
|
|
want to @dirrm that subdirectory, so add that line to the PLIST.
|
|
that these directories will be conditionally removed (based on reference
counts), regardless of the value of PKG_CONFIG. Bump the PKGREVISION
for packages that were modified as a result.
|
|
My error was:
/bin/rm /home/reed/pkg/share/examples/openldap/schema/corba.schema.default
override r--r--r-- reed/2022 for /home/reed/pkg/share/examples/openldap/schema/corba.schema.default?
(For several files it was interactive to remove.)
This is when doing non-privileged builds.
(An alternative to this is to make it install the *default files with
NONBINMODE in the first place.)
|
|
This is from Joerg Sonnenberger's diff.
I do not know if this support has been submitted to Sleepycat
for dist/configure* yet.
|
|
|
|
2005-04-01 Jeff Zucker <jzuckerATcpan.org> (0.22)
* removed DESTROY and disconnect - use DBD File's instead
* added ignore_missing_table flag to avoid warnings with
DROP TABLE IF EXISTS
2004-04-18 Jeff Zucker <jzuckerATcpan.org> (0.21)
* added support for $dbh->{Active}, should now work
well with Class::DBI and other caching systems
* added support for DROP TABLE IF EXISTS - doesn't
complain if table is already dropped
* removed DBD::File from the distribution - it's now
distributed with DBI 1.42 and higher
|
|
|
|
|
|
it. fixes build on Solaris.
|
|
|
|
update this package w/o removing those issues an appropriate error.
|
|
LIBTOOLIZE_PLIST.
Bump PKGREVISION.
|
|
The ABI didn't change and the vulnerability is server side-only.
|
|
the following vulnerabilities:
http://www.appsecinc.com/resources/alerts/mysql/2005-001.html
http://www.appsecinc.com/resources/alerts/mysql/2005-002.html
Please see changelog: http://dev.mysql.com/doc/mysql/en/news-4-0-25.html
|
|
file's sole purpose was to provide a dependency on pkg-config and set
some environment variables. Instead, turn pkg-config into a "tool"
in the tools framework, where the pkg-config wrapper automatically
adds PKG_CONFIG_LIBDIR to the environment before invoking the real
pkg-config.
For all package Makefiles that included pkg-config/buildlink3.mk, remove
that inclusion and replace it with USE_TOOLS+=pkg-config.
|
|
|
|
as to optimize PostgreSQL performance. This is a fairly expert option
and represents the size in bytes of a PostgreSQL disk page, defaulting
to 8K.
|
|
|
|
convention for other PostgreSQL variables in pkgsrc.
|
|
will install Perl modules into the "vendor" directories:
chat/vicq math/udunits
databases/rrdtool mbone/beacon
devel/p5-subversion
Bump their PKGREVISIONs.
|
|
|
|
|
|
(passwd and group for now)
|
|
Posted on 2005-05-12:
In order to address several security issues identified over the past two
weeks, as well as one "low probability" race condition, we are releasing new
version of PostgreSQL as far back as the 7.2.x branch.
Please note that the security issues were those already reported by Tom Lane,
as well as a manual fix for them. These releases are mainly to ensure that
those installing and/or upgrading existing installations have those fixes
automatically.
For details on the fixes, please see the HISTORY file included in the Release,
but a summary consists of:
* Change encoding function signature to prevent misuse
* Change "contrib/tsearch2" to avoid unsafe use of INTERNAL function results
* Repair race condition between relation extension and VACUUM This could
theoretically have caused loss of a page's worth of freshly-inserted data,
although the scenario seems of very low probability. There are no known
cases of it having caused more than an Assert failure.
|
|
From the HISTORY:
> Version 3.5.4
> -------------
>
> Bugs
> * Fix security hole in include() of language file:
> http://secunia.com/advisories/15941/
> Check now requires that the language filename be in the list
> of known allowed filenames.
> * Fix that functions returning cstring were not being listed
> * Make parsing of PostgreSQL 1-dimensional arrays correct. Makes
> named function parameter use more reliable.
> * Fix downloading of the results of multiline queries.
>
>
> Version 3.5.3
> -------------
>
> Bugs
> * Fix using schema enabled dump on non-schema enabled backend
> * Don't try setting no timeout when in safe mode
> * Reload browser after executing arbitrary SQL
> * Fix browser in RTL languages
> * Fix inability to drop database using the drop link
> * Fix last internal oid for PostgreSQL 8.0
> * Fix (again) dumping on v8 for windows, exclude dumping some objects.
>
> Translations
> * Portuguese from Francisco
>
>
> Version 3.5.2
> -------------
>
> Bugs
> * Fix export to work with release candidates and beta releases as well as finals
> (Russell Smith)
> * Fix port selection for local connections (Russell Smith)
> * Fix timeouts on long running operations (Adrian Nida)
> * Allow Multiline character and character varying editing and inserting
> * Do browser language detection for all languages
>
> Translations
> * Japanese from Tadashi
> * Danish from Arne
|
|
PR#30678 and PR#30364.
|
|
|
|
PL/Tcl is a dynamic loadable extension for the PostgreSQL database system
that enables the Tcl language to be used to create functions and
trigger-procedures. It offers most of the capabilities a function
writer has in the C language.
|
|
PL/Python allows you to write functions in the Python programming
language that may be used in SQL queries as if they were built into
Postgres. The PL/Python intepreter is a full Python interpreter.
PL/Python is currently only available as an "untrusted" language
(meaning it does not offer any way of restricting what users can do
in it). It has therefore been named "plpythonu". The trusted variant
plpython may become available again in future, if a new secure execution
mechanism is developed in Python.
|
|
PL/Perl allows you to write functions in the Perl programming language
that may be used in SQL queries as if they were built into Postgres.
The PL/Perl intepreter is a full Perl interpreter. However, certain
operations have been disabled in order to maintain the security of the
system.
|
|
of Perl files to deal with the perl-5.8.7 update that moved all
pkgsrc-installed Perl files into the "vendor" directories.
|