- 04 Feb, 2007 3 commits
-
-
Bruce Momjian authored
errhint("Consider using VACUUM FULL on this relation or increasing the configuration parameter \"max_fsm_pages\".")));
-
Bruce Momjian authored
* Allow sequential scans to take advantage of other concurrent sequential scans, also called "Synchronised Scanning"
-
Bruce Momjian authored
> > o Add \# to list command history like \s, but with line numbers > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00255.php >
-
- 03 Feb, 2007 7 commits
-
-
Bruce Momjian authored
* Allow sequential scans to take advantage of other concurrent sequential scans, also called "Synchronised Scanning" > http://archives.postgresql.org/pgsql-patches/2006-12/msg00076.php > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00408.php
-
Bruce Momjian authored
gmake -C src/bin install does install a few server-only binaries.
-
Bruce Momjian authored
> o Allow recovery.conf to allow the same syntax as > postgresql.conf, including quoting > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00497.php
-
Peter Eisentraut authored
-
Peter Eisentraut authored
observe the xmloption. Reorganize the representation of the XML option in the parse tree and the API to make it easier to manage and understand. Add regression tests for parsing back XML expressions.
-
Bruce Momjian authored
are both used. Albe Laurenz
-
Bruce Momjian authored
* Reduce checkpoint performance degredation by forcing data to disk more evenly > http://archives.postgresql.org/pgsql-patches/2006-12/msg00104.php
-
- 02 Feb, 2007 11 commits
-
-
Bruce Momjian authored
* Allow sequential scans to take advantage of other concurrent sequential scans, also called "Synchronised Scanning" > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00784.php
-
Bruce Momjian authored
> * Reduce checkpoint performance degredation by forcing data to disk > more evenly > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00337.php > http://archives.postgresql.org/pgsql-hackers/2007-01/msg00079.php
-
Bruce Momjian authored
o Fix RENAME to work on variables other than OLD/NEW > http://archives.postgresql.org/pgsql-hackers/2007-01/msg01587.php
-
Neil Conway authored
generated solution files for what to install, instead of blindly copying everything as it previously did. With the previous quick-n-dirty version, it would copy old DLLs if you reconfigured in a way that didn't include subprojects like a PL for example. Magnus Hagander.
-
Neil Conway authored
Windows. Per Magnus Hagander, this is not recommended.
-
Michael Meskes authored
-
Michael Meskes authored
-
Bruce Momjian authored
> o Allow column display reordering by recording a display, > storage, and permanent id for every column? > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00782.php >
-
Tom Lane authored
Security: CVE-2007-0555, CVE-2007-0556
-
Tom Lane authored
made query plan. Use of ALTER COLUMN TYPE creates a hazard for cached query plans: they could contain Vars that claim a column has a different type than it now has. Fix this by checking during plan startup that Vars at relation scan level match the current relation tuple descriptor. Since at that point we already have at least AccessShareLock, we can be sure the column type will not change underneath us later in the query. However, since a backend's locks do not conflict against itself, there is still a hole for an attacker to exploit: he could try to execute ALTER COLUMN TYPE while a query is in progress in the current backend. Seal that hole by rejecting ALTER TABLE whenever the target relation is already open in the current backend. This is a significant security hole: not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. Our thanks to Jeff Trout for the initial report. Security: CVE-2007-0556
-
Tom Lane authored
we should check that the function code returns the claimed result datatype every time we parse the function for execution. Formerly, for simple scalar result types we assumed the creation-time check was sufficient, but this fails if the function selects from a table that's been redefined since then, and even more obviously fails if check_function_bodies had been OFF. This is a significant security hole: not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. Our thanks to Jeff Trout for the initial report. Security: CVE-2007-0555
-
- 01 Feb, 2007 19 commits
-
-
Tom Lane authored
-
Bruce Momjian authored
"can't" -> "cannot" section.
-
Neil Conway authored
for the recent may/might cleanup.
-
Bruce Momjian authored
shared hardware section, and mention DRBD as a popular solution.
-
Tom Lane authored
-
Neil Conway authored
recent may/might cleanup, in the hopes that this will unbreak the buildfarm. Per report from Stefan Kaltenbrunner.
-
Tom Lane authored
an error will be thrown correctly if the variable is of a NOT NULL domain. Report and almost-correct fix from Sergiy Vyshnevetskiy (bug #2948).
-
Bruce Momjian authored
o Add long file support for binary pg_dump output > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00551.php
-
Bruce Momjian authored
Standard English uses "may", "can", and "might" in different ways: may - permission, "You may borrow my rake." can - ability, "I can lift that log." might - possibility, "It might rain today." Unfortunately, in conversational English, their use is often mixed, as in, "You may use this variable to do X", when in fact, "can" is a better choice. Similarly, "It may crash" is better stated, "It might crash".
-
Neil Conway authored
-
Bruce Momjian authored
behavior has changed.
-
Bruce Momjian authored
Daojing.Zhou
-
Bruce Momjian authored
> > * Tighten function permission checks > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00564.php >
-
Bruce Momjian authored
> > * Tighten trigger permission checks > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00564.php >
-
Neil Conway authored
and --password for pg_dump, pg_dumpall and pg_restore, per complaint by Michael Schmidt. Patch from Magnus Hagander.
-
Bruce Momjian authored
> > * Fix problem when multiple subtransactions of the same outer transaction > hold different types of locks, and one subtransaction aborts > > http://archives.postgresql.org/pgsql-hackers/2006-11/msg01011.php > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00001.php
-
Neil Conway authored
-
Bruce Momjian authored
created and increments. The old docs created the sequence, then showed a nextval() of 114.
-