Skip to content

Update module github.com/lib/pq to v1.12.3#227

Open
red-hat-konflux-kflux-prd-rh03[bot] wants to merge 1 commit intomasterfrom
konflux/mintmaker/master/github.com-lib-pq-1.x
Open

Update module github.com/lib/pq to v1.12.3#227
red-hat-konflux-kflux-prd-rh03[bot] wants to merge 1 commit intomasterfrom
konflux/mintmaker/master/github.com-lib-pq-1.x

Conversation

@red-hat-konflux-kflux-prd-rh03
Copy link
Copy Markdown
Contributor

This PR contains the following updates:

Package Change Age Confidence
github.com/lib/pq v1.10.5v1.12.3 age confidence

Release Notes

lib/pq (github.com/lib/pq)

v1.12.3

Compare Source

  • Send datestyle startup parameter, improving compatbility with database engines
    that use a different default datestyle such as EnterpriseDB (#​1312).

v1.12.2

Compare Source

  • Treat io.ErrUnexpectedEOF as driver.ErrBadConn so database/sql discards the
    connection. Since v1.12.0 this could result in permanently broken connections,
    especially with CockroachDB which frequently sends partial messages (#​1299).

v1.12.1

Compare Source

  • Look for pgpass file in ~/.pgpass instead of ~/.postgresql/pgpass (#​1300).

  • Don't clear password if directly set on pq.Config (#​1302).

v1.12.0

Compare Source

  • The next release may change the default sslmode from require to prefer.
    See #​1271 for details.

  • CopyIn() and CopyInToSchema() have been marked as deprecated. These are
    simple query builders and not needed for COPY [..] FROM STDIN support (which
    is not deprecated). (#​1279)

    // Old
    tx.Prepare(CopyIn("temp", "num", "text", "blob", "nothing"))
    
    // Replacement
    tx.Prepare(`copy temp (num, text, blob, nothing) from stdin`)
    
Features
  • Support protocol 3.2, and the min_protocol_version and
    max_protocol_version DSN parameters (#​1258).

  • Support sslmode=prefer and sslmode=allow (#​1270).

  • Support ssl_min_protocol_version and ssl_max_protocol_version (#​1277).

  • Support connection service file to load connection details (#​1285).

  • Support sslrootcert=system and use ~/.postgresql/root.crt as the default
    value of sslrootcert (#​1280, #​1281).

  • Add a new pqerror package with PostgreSQL error codes (#​1275).

    For example, to test if an error is a UNIQUE constraint violation:

    if pqErr, ok := errors.AsType[*pq.Error](err); ok && pqErr.Code == pqerror.UniqueViolation {
        log.Fatalf("email %q already exsts", email)
    }
    

    To make this a bit more convenient, it also adds a pq.As() function:

    pqErr := pq.As(err, pqerror.UniqueViolation)
    if pqErr != nil {
        log.Fatalf("email %q already exsts", email)
    }
    
Fixes
  • Fix SSL key permission check to allow modes stricter than 0600/0640#1265 (#​1265).

  • Fix Hstore to work with binary parameters (#​1278).

  • Clearer error when starting a new query while pq is still processing another
    query (#​1272).

  • Send intermediate CAs with client certificates, so they can be signed by an
    intermediate CA (#​1267).

  • Use time.UTC for UTC aliases such as Etc/UTC (#​1282).

v1.11.2

Compare Source

This fixes two regressions:

  • Don't send startup parameters if there is no value, improving compatibility
    with Supavisor (#​1260).

  • Don't send dbname as a startup parameter if database=[..] is used in the
    connection string. It's recommended to use dbname=, as database= is not a
    libpq option, and only worked by accident previously. (#​1261)

v1.11.1

Compare Source

This fixes two regressions present in the v1.11.0 release:

  • Fix build on 32bit systems, Windows, and Plan 9 (#​1253).

  • Named []byte types and pointers to []byte (e.g. *[]byte, json.RawMessage)
    would be treated as an array instead of bytea (#​1252).

v1.11.0

Compare Source

This version of pq requires Go 1.21 or newer.

pq now supports only maintained PostgreSQL releases, which is PostgreSQL 14 and
newer. Previously PostgreSQL 8.4 and newer were supported.

Features
  • The pq.Error.Error() text includes the position of the error (if reported
    by PostgreSQL) and SQLSTATE code (#​1219, #​1224):

    pq: column "columndoesntexist" does not exist at column 8 (42703)
    pq: syntax error at or near ")" at position 2:71 (42601)
    
  • The pq.Error.ErrorWithDetail() method prints a more detailed multiline
    message, with the Detail, Hint, and error position (if any) (#​1219):

    ERROR:   syntax error at or near ")" (42601)
    CONTEXT: line 12, column 1:
    
         10 |     name           varchar,
         11 |     version        varchar,
         12 | );
              ^
    
  • Add Config, NewConfig(), and NewConnectorConfig() to supply connection
    details in a more structured way (#​1240).

  • Support hostaddr and $PGHOSTADDR (#​1243).

  • Support multiple values in host, port, and hostaddr, which are each
    tried in order, or randomly if load_balance_hosts=random is set (#​1246).

  • Support target_session_attrs connection parameter (#​1246).

  • Support sslnegotiation to use SSL without negotiation (#​1180).

  • Allow using a custom tls.Config, for example for encrypted keys (#​1228).

  • Add PQGO_DEBUG=1 print the communication with PostgreSQL to stderr, to aid
    in debugging, testing, and bug reports (#​1223).

  • Add support for NamedValueChecker interface (#​1125, #​1238).

Fixes
  • Match HOME directory lookup logic with libpq: prefer $HOME over /etc/passwd,
    ignore ENOTDIR errors, and use APPDATA on Windows (#​1214).

  • Fix sslmode=verify-ca verifying the hostname anyway when connecting to a DNS
    name (rather than IP) (#​1226).

  • Correctly detect pre-protocol errors such as the server not being able to fork
    or running out of memory (#​1248).

  • Fix build with wasm (#​1184), appengine (#​745), and Plan 9 (#​1133).

  • Deprecate and type alias pq.NullTime to sql.NullTime (#​1211).

  • Enforce integer limits of the Postgres wire protocol (#​1161).

  • Accept the passfile connection parameter to override PGPASSFILE (#​1129).

  • Fix connecting to socket on Windows systems (#​1179).

  • Don't perform a permission check on the .pgpass file on Windows (#​595).

  • Warn about incorrect .pgpass permissions (#​595).

  • Don't set extra_float_digits (#​1212).

  • Decode bpchar into a string (#​949).

  • Fix panic in Ping() by not requiring CommandComplete or EmptyQueryResponse in
    simpleQuery() (#​1234)

  • Recognize bit/varbit (#​743) and float types (#​1166) in ColumnTypeScanType().

  • Accept PGGSSLIB and PGKRBSRVNAME environment variables (#​1143).

  • Handle ErrorResponse in readReadyForQuery and return proper error (#​1136).

  • Detect COPY even if the query starts with whitespace or comments (#​1198).

  • CopyIn() and CopyInSchema() now work if the list of columns is empty, in which
    case it will copy all columns (#​1239).

  • Treat nil []byte in query parameters as nil/NULL rather than "" (#​838).

  • Accept multiple authentication methods before checking AuthOk, which improves
    compatibility with PgPool-II (#​1188).

v1.10.9

Compare Source

  • Fixes backwards incompat bug with 1.13.

  • Fixes pgpass issue

v1.10.8

Compare Source

v1.10.7

Compare Source

v1.10.6

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

Signed-off-by: red-hat-konflux-kflux-prd-rh03 <206760901+red-hat-konflux-kflux-prd-rh03[bot]@users.noreply.github.com>
@openshift-ci openshift-ci Bot requested review from ravitri and xiaoyu74 April 9, 2026 16:08
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 9, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: red-hat-konflux-kflux-prd-rh03[bot]
Once this PR has been reviewed and has the lgtm label, please assign abyrne55 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci Bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Apr 9, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 9, 2026

Hi @red-hat-konflux-kflux-prd-rh03[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work.

Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@tkong-redhat
Copy link
Copy Markdown
Contributor

/ok-to-test

🤖 Claude claude@anthropic.com commenting on behalf of @tkong-redhat

@openshift-ci openshift-ci Bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Apr 22, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 22, 2026

@red-hat-konflux-kflux-prd-rh03[bot]: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@codecov-commenter
Copy link
Copy Markdown

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 55.67%. Comparing base (119aefc) to head (d2da08f).
⚠️ Report is 2 commits behind head on master.

Additional details and impacted files

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #227   +/-   ##
=======================================
  Coverage   55.67%   55.67%           
=======================================
  Files          23       23           
  Lines        1895     1895           
=======================================
  Hits         1055     1055           
  Misses        785      785           
  Partials       55       55           
🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

ok-to-test Indicates a non-member PR verified by an org member that is safe to test.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants