[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted postgresql-common 54 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 30 May 2006 00:59:57 +0200
Source: postgresql-common
Binary: postgresql-client-common postgresql-common
Architecture: source all
Version: 54
Distribution: unstable
Urgency: low
Maintainer: Martin Pitt <mpitt@debian.org>
Changed-By: Martin Pitt <mpitt@debian.org>
Description: 
 postgresql-client-common - manager for multiple PostgreSQL client versions
 postgresql-common - manager for PostgreSQL database clusters
Closes: 340162 369237 369289
Changes: 
 postgresql-common (54) unstable; urgency=low
 .
   * pg_wrapper: Support specifying remote clusters with $PGCLUSTER, --cluster,
     user_clusters, and ~/.postgresqlrc with 'host:[port]' as cluster name.
     Closes: #340162
   * t/090_multicluster.t: Add tests for above feature.
   * user_clusters.5, postgresqlrc.5: Document format for remote clusters.
   * debian/supported-versions:
     - Also recognize Ubuntu dapper version number '6.06LTS'.
     - Fix bashism: 'type -p' -> type.
   * debian/control: Have p-common always depend on the recent p-client-common,
     since the latter ships PgCommon.pm. If the library is out of date, this
     can break operations horribly. Closes: #369289
   * Add Dutch debconf translation, thanks to Vincent Zweije
     <zweije@xs4all.nl>! Closes: #369237
   * t/TestLib.pm: If the test suite is called with FAILURE=shell environment,
     spawn bash before continuing. This makes it easier to debug obscure
     failures.
   * t/TestLib.pm, check_clean(): Check that PostgreSQL TCP sockets are closed.
     Adapt number of tests in all t/*.t.
   * t/090_multicluster.t: Just before checking for cleanness, wait until all
     TIME_WAIT sockets on the server ports went away, so that the following
     tests will not stumble over them. This seems to be a 7.4 server bug which
     is fixed in 8.1 at least.
   * t/050_encodings.t: Add tests for recent SQL injection vulnerabilities
     through invalidly encoded strings and usage of \' escaping.
Files: 
 0d1acd62776dfa88493c74043eacaa7b 604 misc optional postgresql-common_54.dsc
 4c811a5325a1442ee170b5ef631047e5 79113 misc optional postgresql-common_54.tar.gz
 8e8d8f709987e381998bef61ec6ec969 84474 misc optional postgresql-common_54_all.deb
 1e3e1bdac10302208c99dd9c23860019 34738 misc optional postgresql-client-common_54_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFEe33BDecnbV4Fd/IRAux2AKDs3YQa4nR+1QdM1r46KoP+MwdgDQCgkIcI
509Cau7+dYP0fx3gMALxu+0=
=LtiZ
-----END PGP SIGNATURE-----


Accepted:
postgresql-client-common_54_all.deb
  to pool/main/p/postgresql-common/postgresql-client-common_54_all.deb
postgresql-common_54.dsc
  to pool/main/p/postgresql-common/postgresql-common_54.dsc
postgresql-common_54.tar.gz
  to pool/main/p/postgresql-common/postgresql-common_54.tar.gz
postgresql-common_54_all.deb
  to pool/main/p/postgresql-common/postgresql-common_54_all.deb



Reply to: