-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency pg to v8 #290
base: master
Are you sure you want to change the base?
Conversation
63d54e0
to
4da0360
Compare
15b3f2c
to
d1e1edf
Compare
d1e1edf
to
c34b3f0
Compare
c34b3f0
to
59133ef
Compare
8fe0d52
to
07677c3
Compare
07677c3
to
b025e8c
Compare
b025e8c
to
16158a4
Compare
16158a4
to
9fec0ce
Compare
9fec0ce
to
28dd120
Compare
28dd120
to
de3c58b
Compare
de3c58b
to
ca03c1b
Compare
addfe6f
to
35174bb
Compare
35174bb
to
d883de3
Compare
d883de3
to
7144505
Compare
7144505
to
d225b8e
Compare
d225b8e
to
fc23d82
Compare
fc23d82
to
18fd80e
Compare
18fd80e
to
dc2885d
Compare
⚠ Artifact update problemRenovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is. ♻ Renovate will retry this branch, including artifacts, only when one of the following happens:
The artifact failure details are included below: File name: yarn.lock
|
dc2885d
to
15bdb8a
Compare
15bdb8a
to
5ec220d
Compare
5ec220d
to
71f3740
Compare
9f2c418
to
2528e9c
Compare
e5ffc06
to
6379509
Compare
98936cc
to
bcf7154
Compare
bcf7154
to
4a18153
Compare
1ce663c
to
3f5737f
Compare
5703c14
to
eab2427
Compare
002e07c
to
55c9b97
Compare
55c9b97
to
837fb7f
Compare
837fb7f
to
766fb34
Compare
766fb34
to
2c204d2
Compare
|
e52dbe7
to
5041535
Compare
f47769d
to
1f9434c
Compare
1f9434c
to
6925264
Compare
6925264
to
1320797
Compare
1320797
to
641a3d4
Compare
641a3d4
to
a57e67b
Compare
This PR contains the following updates:
7.18.2
->8.13.3
7.14.11
->8.11.11
Release Notes
brianc/node-postgres (pg)
v8.13.3
Compare Source
v8.13.2
Compare Source
v8.13.1
Compare Source
v8.13.0
Compare Source
v8.12.0
Compare Source
queryMode
config option to force use of the extended query protocol on queries without any parameters.v8.11.6
Compare Source
v8.11.5
Compare Source
v8.11.4
Compare Source
v8.11.3
Compare Source
v8.11.2
Compare Source
v8.11.1
Compare Source
v8.11.0
Compare Source
v8.10.0
Compare Source
release
event when client is returned to the pool.v8.9.0
Compare Source
v8.8.0
Compare Source
pool.query
.allowExitOnIdle
is enabled).lock_timeout
in client config.[email protected]
[email protected]
[email protected]
[email protected]
--isolatedModules
.[email protected]
[email protected]
[email protected]
DatabaseError
from pg-protocol.sslmode
in the connection string.[email protected]
{ options: string }
field on client/pool config.[email protected]
[email protected]
[email protected]
[email protected]
pg-connection-string
. This includes better support for SSL argument parsing from connection strings and ensures continuity of support.&ssl=no-verify
option to connection string andPGSSLMODE=no-verify
environment variable support for the pure JS driver. This is equivalent of passing{ ssl: { rejectUnauthorized: false } }
to the client/pool constructor. The advantage of having support in connection strings and environment variables is it can be "externally" configured via environment variables and CLI arguments much more easily, and should remove the need to directly edit any application code for the SSL default changes in 8.0. This should make using[email protected]
significantly less difficult on environments like Heroku for example.[email protected]
pg
impactpg-pool
as they both use the same connection parameter and connection string parsing code for configuring SSL.[email protected]
[email protected]
note: for detailed release notes please check here
6 lts
from the test matrix.pg>=8.0
may still work on older versions but it is no longer officially supported.rejectUnauthorized
with the SSL connection parameters. Previously we defaulted torejectUnauthorized: false
when it was not specifically included. We now default torejectUnauthorized: true.
Manually specify{ ssl: { rejectUnauthorized: false } }
for old behavior.user
config option if available. Previouslyprocess.env.USER
was used.pg.Pool
andpg.Query
to be an es6 class.pg.native
non enumerable.notice
messages are no longer instances ofError
.[email protected]
rejectUnauthorized
fromfalse
totrue
making things more secure in the general use case.[email protected]
stream.close
tostream.destroy
which is the official way to terminate a readable stream. This is a breaking change if you rely on thestream.close
method on pg-query-stream...though should be just a find/replace type operation to upgrade as the semantics remain very similar (not exactly the same, since internals are rewritten, but more in line with how streams are "supposed" to behave).config.batchSize
andconfig.highWaterMark
to both do the same thing: control how many rows are buffered in memory. TheReadableStream
will manage exactly how many rows are requested from the cursor at a time. This should give better out of the box performance and help with efficient async iteration.[email protected]
idle_in_transaction_session_timeout
option.7.16.0
7.15.0
new
.7.14.0
7.13.0
7.12.0
7.11.0
7.10.0
7.9.0
7.8.0
7.7.0
7.6.0
7.5.0
null
orundefined
toclient.query
.7.4.0
7.3.0
7.2.0
7.1.0
Enhancements
7.0.0
Breaking Changes
4.x
.pg.connect
pg.end
andpg.cancel
singleton methods.Client#connect(callback)
now returnsundefined
. It used to return an event emitter.2.x
.2.x
.SELECT 1; SELECT 2;
are now returned as an array of results instead of a single result with 1 array containing rows from both queries.Please see here for a migration guide
Enhancements
Client#connect() => Promise<void>
andClient#end() => Promise<void>
calls. Promises are now returned from all async methods on clients if and only if no callback was supplied to the method.connectionTimeoutMillis
to pg-pool.v6.2.0
replicationStart
messages.v6.1.0
client.end
method. The native client already supported this.v6.0.0
Breaking Changes
pg.pools
. There is still a reference kept to the pools created & tracked bypg.connect
but it has been renamed, is considered private, and should not be used. Accessing this API directly was uncommon and was supposed to be private but was incorrectly documented on the wiki. Therefore, it is a breaking change of an (unintentionally) public interface to remove it by renaming it & making it private. Eventuallypg.connect
itself will be deprecated in favor of instantiating pools directly vianew pg.Pool()
so this property should become completely moot at some point. In the mean time...check out the new features...New features
pg.connect
. The pg-pool constructor is exported from node-postgres atrequire('pg').Pool
. It provides a backwards compatible interface withpg.connect
as well as a promise based interface & additional niceties.You can now create an instance of a pool and don't have to rely on the
pg
singleton for anything:Promise support & other goodness lives now in pg-pool.
Please read the readme at pg-pool for the full api.
This should help with backends incorrectly considering idle clients to be dead and prematurely disconnecting them.
v5.1.0
client.query
implement the promise interface. This is the first step towards promisifying more of the node-postgres api.Example:
v5.0.0
Breaking Changes
require('pg').native
now returns null if the native bindings cannot be found; previously, this threw an exception.New Features
undefined
as a query parameterdefaults.connectionString
returnToHead
being passed to generic poolv4.5.0
v4.4.0
stderr
if a named query exceeds 63 characters which is the max length supported by postgres.v4.3.0
pg-types
semver. Allow it to float against[email protected]
.v4.2.0
v4.1.0
v4.0.0
npm install pg-native
try/catch
block.v3.6.0
v3.5.0
v3.4.0
v3.2.0
v3.1.0
end
frompg
object when a pool is drainedv3.0.0
Breaking changes
After some discussion it was decided node-postgres was non-compliant in how it was handling DATE results. They were being converted to UTC, but the PostgreSQL documentation specifies they should be returned in the client timezone. This is a breaking change, and if you use the
date
type you might want to examine your code and make sure nothing is impacted.[email protected] included changes to not convert large integers into their JavaScript number representation because of possibility for numeric precision loss. The same types in arrays were not taken into account. This fix applies the same type of type-coercion rules to arrays of those types, so there will be no more possible numeric loss on an array of very large int8s for example. This is a breaking change because now a return type from a query of
int8[]
will contain string representationsof the integers. Use your favorite JavaScript bignum module to represent them without precision loss, or punch over the type converter to return the old style arrays again.
Single
date
parameters were properly sent to the PostgreSQL server properly in local time, but an input array of dates was being changed into utc dates. This is a violation of what PostgreSQL expects. Small breaking change, but none-the-less something you should check out if you are inserting an array of dates.end
event if it ends due to an errorThis is a small change to bring the semantics of query more in line with other EventEmitters. The tests all passed after this change, but I suppose it could still be a breaking change in certain use cases. If you are doing clever things with the
end
anderror
events of a query object you might want to check to make sure its still behaving normally, though it is most likely not an issue.New features
prepareValue
The long & short of it is now any object you supply in the list of query values will be inspected for a
.toPostgres
method. If the method is present it will be called and its result used as the raw text value sent to PostgreSQL for that value. This allows the same type of custom type coercion on query parameters as was previously afforded to query result values.If domains are active node-postgres will honor them and do everything it can to ensure all callbacks are properly fired in the active domain. If you have tried to use domains with node-postgres (or many other modules which pool long lived event emitters) you may have run into an issue where the active domain changes before and after a callback. This has been a longstanding footgun within node-postgres and I am happy to get it fixed.
Avoids a scenario where your pool could fill up with disconnected & unusable clients.
To provide better documentation and a clearer explanation of how to override the query result parsing system we broke the type converters into their own module. There is still work around removing the 'global-ness' of the type converters so each query or connection can return types differently, but this is a good first step and allow a lot more obvious way to return int8 results as JavaScript numbers, for example
v2.11.0
v2.10.0
v2.9.0
v2.8.0
v2.7.0
v2.6.0
v2.5.0
pg.defaults.parseInt8 = true
v2.4.0
v2.3.0
Due to the low usage & required compiled dependency this will be pushed into a 3rd party add-on
v2.2.0
v2.1.0
v2.0.0
For more information see https://github.com/brianc/node-postgres/pull/353
If you are unhappy with these changes you can always override the built in type parsing fairly easily.
v1.3.0
v1.2.0
v1.1.0
JSON
data type for PostgreSQL Server @ v9.2.0 or greaterv1.0.0
pg.connect
now requires 3 argumentsString
v0.15.0
end
when disconnected from back-end serverv0.14.0
v8.7.3
Compare Source
v8.7.1
Compare Source
v8.7.0
Compare Source
v8.6.0
Compare Source
--isolatedModules
.v8.5.1
Compare Source
v8.5.0
Compare Source
v8.4.2
Compare Source
v8.4.1
Compare Source
v8.4.0
Compare Source
DatabaseError
from pg-protocol.sslmode
in the connection string.v8.3.3
Compare Source
v8.3.2
Compare Source
v8.3.0
Compare Source
{ options: string }
field on client/pool config.v8.2.2
Compare Source
v8.2.1
Compare Source
v8.2.0
Compare Source
v8.1.0
Compare Source
pg-connection-string
. This includes better support for SSL argument parsing from connection strings and ensures continuity of support.&ssl=no-verify
option to connection string andPGSSLMODE=no-verify
environment variable support for the pure JS driver. This is equivalent of passing{ ssl: { rejectUnauthorized: false } }
to the client/pool constructor. The advantage of having support in connection strings and environment variables is it can be "externally" configured via environment variables and CLI arguments much more easily, and should remove the need to directly edit any application code for the SSL default changes in 8.0. This should make using[email protected]
significantly less difficult on environments like Heroku for example.v8.0.3
Compare Source
v8.0.2
Compare Source
v8.0.1
Compare Source
v8.0.0
Compare Source
note: for detailed release notes please check here
6 lts
from the test matrix.pg>=8.0
may still work on older versions but it is no longer officially supported.rejectUnauthorized
with the SSL connection parameters. Previously we defaulted torejectUnauthorized: false
when it was not specifically included. We now default torejectUnauthorized: true.
Manually specify{ ssl: { rejectUnauthorized: false } }
for old behavior.user
config option if available. Previouslyprocess.env.USER
was used.pg.Pool
andpg.Query
to be an es6 class.pg.native
non enumerable.notice
messages are no longer instances ofError
.Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.