Pg-query

Latest version: v0.29

Safety actively analyzes 682404 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 4

9.51.6.2

* Fingerprinting Version 1.3
* Attributes to be ignored:
* RangeVar.relname (if node also has RangeVar.relpersistence = "t")
* Special cases: List nodes where parent field name is valuesLists
* Follow same logic described for fromClause/targetList/cols/rexpr

9.51.6.1

* Fingerprinting Version 1.2
* Ignore portal_name in DeclareCursorStmt, FetchStmt and ClosePortalStmt

9.51.6.0

* Change normalization methods to output $1/$2 .. $N instead of ? characters
* BREAKING CHANGE in pg_query_normalize(..) output
* This matches the change in the upcoming Postgres 10, and makes it easier
to migrate applications to the new normalization format

9.51.5.0

* Update to Postgres 9.5.7
* Disable 128-bit integer support (they are not used), to support 32-bit archs [herwinw](https://github.com/herwinw)
* Cleanup efforts [herwinw](https://github.com/herwinw)
* Improve concurrency tests
* Make sure we have a valid proc_source
* Normalized whitespace in pg_query_parse_plpgsql
* Move inclusion of stdio.h in plpgsql parser

9.51.4.2

* Cut off fingerprints at 100 nodes deep to avoid excessive runtimes/memory
* Fix warning on Linux due to missing asprintf include

9.51.4.1

* Automatically call pg_query_init as needed to ease threaded usage

Page 2 of 4

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.