Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: jackc/pgx
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v5.5.3
Choose a base ref
...
head repository: jackc/pgx
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v5.5.4
Choose a head ref
  • 13 commits
  • 75 files changed
  • 4 contributors

Commits on Feb 5, 2024

  1. Add link to github.com/twpayne/pgx-geos

    twpayne authored and jackc committed Feb 5, 2024
    Configuration menu
    Copy the full SHA
    5c63f64 View commit details
    Browse the repository at this point in the history

Commits on Feb 23, 2024

  1. Fix: pgtype.Bits makes copy of data from read buffer

    It was taking a reference. This would cause the data to be corrupted by
    future reads.
    
    fixes #1909
    jackc committed Feb 23, 2024
    Configuration menu
    Copy the full SHA
    654dcab View commit details
    Browse the repository at this point in the history

Commits on Feb 24, 2024

  1. Fix scan float4 into sql.Scanner

    jackc committed Feb 24, 2024
    Configuration menu
    Copy the full SHA
    85f15c4 View commit details
    Browse the repository at this point in the history
  2. Handle invalid sslkey file

    jackc committed Feb 24, 2024
    Configuration menu
    Copy the full SHA
    8896bd6 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    046f497 View commit details
    Browse the repository at this point in the history

Commits on Feb 26, 2024

  1. Fix panic in TryFindUnderlyingTypeScanPlan

    Check if CanConvert before calling reflect.Value.Convert
    kudavid authored and jackc committed Feb 26, 2024
    Configuration menu
    Copy the full SHA
    d149d3f View commit details
    Browse the repository at this point in the history

Commits on Mar 1, 2024

  1. *Pipeline.getResults should close pipeline on error

    Otherwise, it might be possible to panic when closing the pipeline if it
    tries to read a connection that should be closed but still has a fatal
    error on the wire.
    
    #1920
    jackc committed Mar 1, 2024
    Configuration menu
    Copy the full SHA
    2e84dcc View commit details
    Browse the repository at this point in the history

Commits on Mar 2, 2024

  1. Fix simple protocol encoding of json.RawMessage

    The underlying type of json.RawMessage is a []byte so to avoid it being
    considered binary data we need to handle it specifically. This is done
    by registerDefaultPgTypeVariants. In addition, handle json.RawMessage in
    the JSONCodec PlanEncode to avoid it being mutated by json.Marshal.
    
    #1763
    jackc committed Mar 2, 2024
    Configuration menu
    Copy the full SHA
    88dfc22 View commit details
    Browse the repository at this point in the history

Commits on Mar 3, 2024

  1. Configuration menu
    Copy the full SHA
    c1b0a01 View commit details
    Browse the repository at this point in the history

Commits on Mar 4, 2024

  1. Do not allow protocol messages larger than ~1GB

    The PostgreSQL server will reject messages greater than ~1 GB anyway.
    However, worse than that is that a message that is larger than 4 GB
    could wrap the 32-bit integer message size and be interpreted by the
    server as multiple messages. This could allow a malicious client to
    inject arbitrary protocol messages.
    
    GHSA-mrww-27vc-gghv
    jackc committed Mar 4, 2024
    Configuration menu
    Copy the full SHA
    adbb38f View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    20344df View commit details
    Browse the repository at this point in the history
  3. SQL sanitizer wraps arguments in parentheses

    pgx v5 was not vulnerable to CVE-2024-27289 do to how the sanitizer was
    being called. But the sanitizer itself still had the underlying issue.
    This commit ports the fix from pgx v4 to v5 to ensure that the issue
    does not emerge if pgx uses the sanitizer differently in the future.
    jackc committed Mar 4, 2024
    Configuration menu
    Copy the full SHA
    c543134 View commit details
    Browse the repository at this point in the history
  4. Update changelog

    jackc committed Mar 4, 2024
    Configuration menu
    Copy the full SHA
    da6f2c9 View commit details
    Browse the repository at this point in the history
Loading