Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 29, 2025

Bumps github.com/jackc/pgx/v5 from 5.7.5 to 5.8.0.

Changelog

Sourced from github.com/jackc/pgx/v5's changelog.

5.8.0 (December 26, 2025)

  • Require Go 1.24+
  • Remove golang.org/x/crypto dependency
  • Add OptionShouldPing to control ResetSession ping behavior (ilyam8)
  • Fix: Avoid overflow when MaxConns is set to MaxInt32
  • Fix: Close batch pipeline after a query error (Anthonin Bonnefoy)
  • Faster shutdown of pgxpool.Pool background goroutines (Blake Gentry)
  • Add pgxpool ping timeout (Amirsalar Safaei)
  • Fix: Rows.FieldDescriptions for empty query
  • Scan unknown types into *any as string or []byte based on format code
  • Optimize pgtype.Numeric (Philip Dubé)
  • Add AfterNetConnect hook to pgconn.Config
  • Fix: Handle for preparing statements that fail during the Describe phase
  • Fix overflow in numeric scanning (Ilia Demianenko)
  • Fix: json/jsonb sql.Scanner source type is []byte
  • Migrate from math/rand to math/rand/v2 (Mathias Bogaert)
  • Optimize internal iobufpool (Mathias Bogaert)
  • Optimize stmtcache invalidation (Mathias Bogaert)
  • Fix: missing error case in interval parsing (Maxime Soulé)
  • Fix: invalidate statement/description cache in Exec (James Hartig)
  • ColumnTypeLength method return the type length for varbit type (DengChan)
  • Array and Composite codecs handle typed nils

5.7.6 (September 8, 2025)

  • Use ParseConfigError in pgx.ParseConfig and pgxpool.ParseConfig (Yurasov Ilia)
  • Add PrepareConn hook to pgxpool (Jonathan Hall)
  • Reduce allocations in QueryContext (Dominique Lefevre)
  • Add MarshalJSON and UnmarshalJSON for pgtype.Uint32 (Panos Koutsovasilis)
  • Configure ping behavior on pgxpool with ShouldPing (Christian Kiely)
  • zeronull int types implement Int64Valuer and Int64Scanner (Li Zeghong)
  • Fix panic when receiving terminate connection message during CopyFrom (Michal Drausowski)
  • Fix statement cache not being invalidated on error during batch (Muhammadali Nazarov)
Commits
  • fe8740a Release v5.8.0
  • e5dde5a Skip test on CockroachDB
  • 06f2d82 Remove trailing space
  • 2cf78dd Merge pull request #2448 from DengChan/column_type_lenth_varbit
  • 2d1c4ef Skip tests on CockroachDB
  • 1a5fa7f Array and Composite codecs handle typed nils
  • 5736d09 ColumnTypeLength method return the type length for varbit type.
  • 4c1308c Revert "stdlib matches native pgx scanning support"
  • 14ce2b7 Skip test on CockroachDB
  • 65b2724 Merge pull request #2443 from jameshartig/x-invalidate-cache-in-exec
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/jackc/pgx/v5](https://github.com/jackc/pgx) from 5.7.5 to 5.8.0.
- [Changelog](https://github.com/jackc/pgx/blob/master/CHANGELOG.md)
- [Commits](jackc/pgx@v5.7.5...v5.8.0)

---
updated-dependencies:
- dependency-name: github.com/jackc/pgx/v5
  dependency-version: 5.8.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Dec 29, 2025
richardwooding and others added 3 commits January 8, 2026 11:25
The --lockfile parameter doesn't exist in OSV Scanner's API.
Changed to use the correct 'scan source -r' subcommand which
will properly scan the directory for go.mod and other package files.

This fixes the security scan failures in CI/CD that have been
masked by continue-on-error: true since July 2025.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <[email protected]>
The security scanning tools (govulncheck, osv-scanner, gosec) were
failing with exit code 127 (command not found) because binaries
installed via 'go install' are placed in $(go env GOPATH)/bin,
which is not automatically added to PATH in GitHub Actions.

Changes:
- govulncheck: Added full path $(go env GOPATH)/bin/govulncheck
- osv-scanner: Added full path $(go env GOPATH)/bin/osv-scanner
- gosec: Added full path $(go env GOPATH)/bin/gosec

This fixes the security scan failures that have been occurring since
July 2025 when these tools were added to the workflow.

References:
- google/osv-scanner#620
- Exit code 127 indicates "command not found" in Unix/Linux

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <[email protected]>
The osv-scanner was failing with "lstat source: no such file or directory"
because it was interpreting "source" as a directory name to scan.

The correct syntax is:
  osv-scanner scan -r .

NOT:
  osv-scanner scan source -r .

The word "source" is not part of the osv-scanner CLI syntax for
direct invocation. It only appears in pre-commit hook configurations
with the --recursive flag.

This fix completes the resolution of the security scanning issues:
- govulncheck: ✅ Working (PATH fix)
- gosec: ✅ Working (PATH fix)
- osv-scanner: ✅ Should now work (PATH + syntax fix)

References:
- https://google.github.io/osv-scanner/usage/

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <[email protected]>
@richardwooding richardwooding merged commit beab19b into main Jan 8, 2026
9 of 10 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/jackc/pgx/v5-5.8.0 branch January 8, 2026 09:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant