NOTICE: This package has been removed from pkgsrc

./databases/postgresql84-plpython, PL/Python procedural language for the PostgreSQL backend

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ]


Branch: CURRENT, Version: 8.4.22, Package name: postgresql84-plpython-8.4.22, Maintainer: adam

PL/Python allows you to write functions in the Python programming
language that may be used in SQL queries as if they were built into
Postgres. The PL/Python intepreter is a full Python interpreter.

PL/Python is currently only available as an "untrusted" language
(meaning it does not offer any way of restricting what users can do
in it). It has therefore been named "plpythonu". The trusted variant
plpython may become available again in future, if a new secure execution
mechanism is developed in Python.


Required to run:
[databases/postgresql84-client] [databases/postgresql84-server] [lang/python27]

Master sites:

SHA1: 66a1286c4983121af35b76c97b97288013edc151
RMD160: c46d1fd3405150f0ed25012dad1ef8110d2c2d64
Filesize: 14308.332 KB

Version history: (Expand)


CVS history: (Expand)


   2014-07-26 00:14:57 by Adam Ciarcinski | Files touched by this commit (44) | Package updated
Log message:
The PostgreSQL Global Development Group has released an update to all supported \ 
version of the database system, including versions 9.3.5, 9.2.9, 9.1.14, 9.0.18, \ 
and 8.4.22. This minor release fixes a number of issues discovered and reported \ 
by users over the last four months, including some data corruption issues, and \ 
is the last update of version 8.4. Users of version 9.3 will want to update at \ 
the earliest opportunity; users of version 8.4 will want to schedule an upgrade \ 
to a supported PostgreSQL version.
   2014-05-17 18:10:50 by Thomas Klausner | Files touched by this commit (152)
Log message:
Bump applications PKGREVISIONs for python users that might be using
python3, since the default changed from python33 to python34.

I probably bumped too many. I hope I got them all.
   2014-02-23 12:25:54 by Adam Ciarcinski | Files touched by this commit (89) | Package updated
Log message:
Changes:
This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce \ 
the WITH ADMIN OPTION permission for ROLE management.
This update also fixes some issues which affect binary replication and row \ 
locking, and can cause recoverable data corruption in some cases.
In addition to the above, the following issues are fixed in this release:

Fix WAL logging of visibility map change
Make sure that GIN indexes log all insertions
Get pause_at_recovery_target to pause at correct time
Ensure walreceiver sends hot-standby feedback messages on time
Prevent timeout interrupts from taking control away from mainline code
Eliminate several race conditions
Fix some broken HINTs in error messages
Prevent server lockup on SSL connection loss
Fix two Unicode handling issues
Prevent crash on certain subselect syntax
Prevent crash on select from zero column table
Fix two bugs with LATERAL
Fix issue with UNION ALL, partitioning, and updates
Ensure that ANALYZE understands domains over ranges
Eliminate permissions check when using default tablespace
Fix memory leakage in JSON functions
Allow extensions with event triggers
Distinguish numbers correctly in JSON output
Fix permissions for pg_start_backup() and pg_stop_backup()
Accept SHIFT_JIS as locale name
Fix .* expansion for SQL function variables
Prevent infinite loop on some COPY connection failures
Several fixes for client issues on Windows
Enable building PostgreSQL with Visual Studio 2013
Update time zone files for recent changes
   2014-02-13 00:18:57 by Matthias Scheler | Files touched by this commit (1568)
Log message:
Recursive PKGREVISION bump for OpenSSL API version bump.
   2013-02-09 12:19:19 by Adam Ciarcinski | Files touched by this commit (86) | Package updated
Log message:
The PostgreSQL Global Development Group has released a security update to all \ 
current versions of the PostgreSQL database system, including versions 9.2.3, \ 
9.1.8, 9.0.12, 8.4.16, and 8.3.23. This update fixes a denial-of-service (DOS) \ 
vulnerability. All users should update their PostgreSQL installations as soon as \ 
possible.

The security issue fixed in this release, CVE-2013-0255, allows a previously \ 
authenticated user to crash the server by calling an internal function with \ 
invalid arguments. This issue was discovered by independent security researcher \ 
Sumit Soni this week and reported via Secunia SVCRP, and we are grateful for \ 
their efforts in making PostgreSQL more secure.

Today's update also fixes a performance regression which caused a decrease in \ 
throughput when using dynamic queries in stored procedures in version 9.2. \ 
Applications which use PL/pgSQL's EXECUTE are strongly affected by this \ 
regression and should be updated. Additionally, we have fixed intermittent \ 
crashes caused by CREATE/DROP INDEX CONCURRENTLY, and multiple minor issues with \ 
replication.

This release is expected to be the final update for version 8.3, which is now \ 
End-of-Life (EOL). Users of version 8.3 should plan to upgrade to a later \ 
version of PostgreSQL immediately. For more information, see our Versioning \ 
Policy.

This update release also contains fixes for many minor issues discovered and \ 
patched by the PostgreSQL community in the last two months, including:

* Prevent unnecessary table scans during vacuuming
* Prevent spurious cached plan error in PL/pgSQL
* Allow sub-SELECTs to be subscripted
* Prevent DROP OWNED from dropping databases or tablespaces
* Make ECPG use translated messages
* Allow PL/Python to use multi-table trigger functions (again) in 9.1 and 9.2
* Fix several activity log management issues on Windows
* Prevent autovacuum file truncation from being cancelled by deadlock_timeout
* Make extensions build with the .exe suffix automatically on Windows
* Fix concurrency issues with CREATE/DROP DATABASE
* Reject out-of-range values in to_date() conversion function
* Revert cost estimation for large indexes back to pre-9.2 behavior
* Make pg_basebackup tolerate timeline switches
* Cleanup leftover temp table entries during crash recovery
* Prevent infinite loop when COPY inserts a large tuple into a table with a \ 
large fillfactor
* Prevent integer overflow in dynahash creation
* Make pg_upgrade work with INVALID indexes
* Fix bugs in TYPE privileges
* Allow Contrib installchecks to run in their own databases
* Many documentation updates
* Add new timezone "FET".
   2013-02-07 00:24:19 by Jonathan Perkin | Files touched by this commit (1351) | Package updated
Log message:
PKGREVISION bumps for the security/openssl 1.0.1d update.
   2012-10-06 00:15:37 by Adam Ciarcinski | Files touched by this commit (15) | Package updated
Log message:
The PostgreSQL Global Development Group has released an update to all current \ 
versions of the PostgreSQL database system, including 9.2.1, 9.1.6, 9.0.10, \ 
8.4.14 and 8.3.21. This update fixes critical issues for major versions 9.1 and \ 
9.2, and users running those versions should apply it as soon as possible. Users \ 
of versions 8.3, 8.4 and 9.0 should plan to update at the next scheduled \ 
downtime.

The update fixes two potential data corruption issues present in the PostgreSQL \ 
9.1 and 9.2 for any server which has crashed, been shutdown with \ 
"immediate", or was failed over to a standby. First, the PostgreSQL \ 
development team has discovered a chance of corruption of BTREE and GIN indexes \ 
for databases. Second, there is a significant chance of corruption of the \ 
visibility map. This update fixes both issues.

We strongly advise users of 9.1 and 9.2 to run VACUUM and/or index rebuilds \ 
after applying the update. Please see the 2012-09-24 Update wiki page for \ 
detailed instructions.

This update release also contains fixes for many minor issues discovered and \ 
patched by the PostgreSQL community in the last month, including many fixes for \ 
the newly released version 9.2. These include:

fix sorting issue with IN lists and indexes
fix planner failure when combining GROUP BY with window functions
improve selectivity of text searches using prefixes
prevent rescanning of WITH clauses from giving wrong answers
fix PL/Perl crashing issue
reduce bloat for multi-column GiST indexes
time zone data changes for Fiji
disallow Extensions from circular schema assignment
prevent crashes when default_transaction_isolation is set to "serializable"
several minor fixes to pg_upgrade
   2012-10-02 23:25:56 by Aleksej Saushev | Files touched by this commit (323)
Log message:
Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.