329 Commits

Author SHA1 Message Date
Eno Compton
0135721378 Add support for Unix sockets on Windows
Fixes #1199.
2022-05-07 06:59:53 -05:00
sireax
84e8238fa0 Fix: setting krbspn and krbsrvname did'n work 2022-04-26 08:54:24 -05:00
Jack Christensen
9bb49f990f Release v1.12.0 2022-04-21 19:49:01 -05:00
Jack Christensen
1b244eec5d Upgrade to pgproto3 v2.3.0 2022-04-21 19:48:43 -05:00
Jack Christensen
beb4e2cfbc SQLCODE 42501 is fatal connect error
Don't try fallback configs. Match libpq behavior.

fixes https://github.com/jackc/pgconn/issues/108
2022-04-16 07:26:56 -05:00
Oliver Tan
90ef5bba3f add GSSAPI authentication
This commit adds the GSSAPI authentication to pgx. This roughly follows
the lib/pq implementation:
* We require registering a provider to avoid mass dependency inclusions
  that may not be desired (https://github.com/lib/pq/issues/971).
* Requires the pgproto3 package be updated. I've included my custom fork
  for now.
2022-04-15 08:17:48 -05:00
Matthew Gabeler-Lee
5982e4b4f8 fix detection of database does not exist error during connect 2022-04-09 07:47:59 -05:00
Jack Christensen
b7a85d1a6f Consider any "0A000" error a possible cached plan changed error
https://github.com/jackc/pgx/issues/1162
2022-03-05 08:23:58 -06:00
William Storey
ded272b1f2 Remove documentation line stating only one IP is used
With `expandWithIPs()` (added in #14), we try all IPs.
2022-02-19 08:10:07 -06:00
William Storey
ccb96b8aca Fix typos in comments 2022-02-19 08:10:07 -06:00
Jack Christensen
34bf0a5df9 Upgrade golang.org/x/text to v0.3.7
https://github.com/jackc/pgconn/issues/103
2022-02-19 08:00:51 -06:00
Jack Christensen
3e5de44314 Release v1.11.0 2022-02-07 10:54:39 -06:00
Jack Christensen
05d532b5df Fix connect when receiving NoticeResponse
refs #102
2022-01-20 16:41:47 -06:00
Oscar
109c4c2d95 fix standby mode validation 2021-12-28 09:31:38 -06:00
Oscar
3aaf3409ce remove redundant map value type 2021-12-28 09:31:38 -06:00
Oscar
3ce8a835e1 add support for read-only, primary, standby, prefer-standby target_session_attributes 2021-12-28 09:31:38 -06:00
Blake Embrey
a1852214fe Keep status connecting after tls 2021-12-27 14:28:33 -06:00
Blake Embrey
b148a14bbe Fix defer usage 2021-12-27 14:28:33 -06:00
Blake Embrey
01a6923376 Rename fn to new 2021-12-27 14:28:33 -06:00
Blake Embrey
024de4c8f3 Unwatch and re-watch tls 2021-12-27 14:28:33 -06:00
Blake Embrey
c0a0be876d Fix TLS connection timeout 2021-12-27 14:28:33 -06:00
James Hartig
5a5260b73d feat: support port in ip from LookupFunc to override config
Fixes #97
2021-12-18 08:16:31 -06:00
Jack Christensen
662ecb496f Release v1.10.1 2021-11-20 09:56:46 -06:00
Jack Christensen
146268e829 Move context test above bad statement cleanup 2021-11-13 04:12:35 -06:00
Georges Varouchas
cd7dcd5802 have lru.Get() always check if context is already expired 2021-11-13 04:10:45 -06:00
Georges Varouchas
141f132ae7 add a unit test on LRU context check
TestLRUContext highlights the lack of context check when querying for a cached value
2021-11-13 04:10:45 -06:00
Jack Christensen
162dc65eff Make ContextWatcher concurrency safe
fixes #94
2021-11-06 08:57:49 -05:00
Rueian
290ee79d1e feat: remove unnecessary pending for CopyInResponse 2021-10-02 07:36:21 -05:00
Kei Kamikawa
3bee0c6398 removed lines to read conn 2021-08-28 08:52:37 -05:00
Jack Christensen
53f5fed36c Release v1.10.0 2021-07-24 10:52:26 -05:00
Jack Christensen
d89c8390a5 Update dependencies and go mod tidy 2021-07-24 10:25:38 -05:00
Jack Christensen
6996e8d6c5 Context errors returned instead of net.Error
The net.Error caused by using SetDeadline to implement context
cancellation shouldn't leak.

fixes #80
2021-07-24 09:09:22 -05:00
Jack Christensen
13d454882b Release v1.9.0 2021-07-10 09:54:39 -05:00
Jack Christensen
5b7c6a3c8e Upgrade to pgproto3 v2.1.1 2021-07-10 09:54:24 -05:00
Michael Darr
a50d96d491 Make timeout error private
Signed-off-by: Michael Darr <michael.e.darr@gmail.com>
2021-07-07 18:14:36 -05:00
Michael Darr
9a9830c00d Always double-wrap contextAlreadyDoneError
Signed-off-by: Michael Darr <michael.e.darr@gmail.com>
2021-07-07 18:14:36 -05:00
Michael Darr
b3e64d3cdb Simplify SafeToRetry for ErrTimeout
Signed-off-by: Michael Darr <michael.e.darr@gmail.com>
2021-07-07 18:14:36 -05:00
Michael Darr
c0b4d3bc05 Implement timeout error
Signed-off-by: Michael Darr <michael.e.darr@gmail.com>
2021-07-07 18:14:36 -05:00
Joshua Brindle
a123e5b4e5 Add defaults for sslcert, sslkey, and sslrootcert
per https://www.postgresql.org/docs/current/libpq-ssl.html
psql will use client certs located in ~/.postgresql on posix systems
or %APPDATA%\postgresql on Windows systems.
2021-06-26 11:25:41 -05:00
mgoddard
bf76d1ed51 Solve issue with 'sslmode=verify-full' when there are multiple hosts 2021-06-19 10:14:17 -05:00
Sivabalan Thirunavukkarasu
bacf81fb4e Bumping versions for other dependencies 2021-06-19 10:06:47 -05:00
Sivabalan Thirunavukkarasu
cfcd61d0cb Updating dependency versions 2021-06-19 10:06:47 -05:00
Jack Christensen
fb42201c18 Fix default host when parsing URL without host but with port
fixes https://github.com/jackc/pgconn/issues/72
2021-05-14 18:39:31 -05:00
Jack Christensen
3f76b98073 Allow dbname query parameter in URL conn string
fixes #69
2021-04-09 18:20:06 -05:00
Jack Christensen
464a7d88d9 Release v1.8.1 2021-03-25 09:15:45 -04:00
Jack Christensen
cdb667b5b0 Update copyright date 2021-03-25 09:15:45 -04:00
Ethan Pailes
e8f75629d0 upgrade x/crypto to avoid CVE-2020-9283
I found this when scanning for security issues in some
dependencies. I doubt that this CVE will impact pgconn
since I don't think it uses the ssh cropto module, but
I think it is worth being fairly agressive about upgrading
security sensative libraries and this doesn't seem to be
a breaking change.
2021-03-23 07:44:35 -05:00
Andrey Borodin
8990c125cf Stop fallback on ERRCODE_INVALID_AUTHORIZATION_SPECIFICATION 2021-03-12 08:31:29 -06:00
Andrey Borodin
b6027e37f4 Stop fallback in case of invalid password 2021-03-12 08:31:29 -06:00
Andrey Borodin
70be4b4a02 Fix incoherent type assignment 2021-03-12 08:31:29 -06:00