plpgsql-check 2.7.7-1 source package in Ubuntu

Changelog

plpgsql-check (2.7.7-1) unstable; urgency=medium

  * New upstream version 2.7.7.

 -- Christoph Berg <email address hidden>  Sun, 07 Jul 2024 18:02:34 +0200

Upload details

Uploaded by:
Debian PostgreSQL Maintainers
Uploaded to:
Sid
Original maintainer:
Debian PostgreSQL Maintainers
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
plpgsql-check_2.7.7-1.dsc 2.1 KiB 3be58061fb81926e5ed665fa46f0816e8a9579d19e58c3e869615a5d90a4b5e7
plpgsql-check_2.7.7.orig.tar.gz 248.7 KiB 4086852422ced1a53ca79118e355e9df1fa79a080d9d482a3156f0e21fc9b011
plpgsql-check_2.7.7-1.debian.tar.xz 3.4 KiB 5518e413a1e96e346bda8322c5a28b6fd7fb48b4e765affa53e052c9e7b655ae

Available diffs

No changes file available.

Binary packages built by this source

postgresql-16-plpgsql-check: plpgsql_check extension for PostgreSQL

 plpgsql_check is the next generation of plpgsql_lint for PL/pgsql source code.
 The SQL statements inside PL/pgSQL functions are checked for semantic errors.
 .
 Features:
  * check fields of referenced database objects and types inside embedded SQL
  * using correct types of function parameters
  * unused variables and function argumens, unmodified OUT argumens
  * partially detection of dead code (due RETURN command)
  * detection of missing RETURN command in function
  * try to identify unwanted hidden casts, that can be performance issue like
    unused indexes
  * possibility to collect relations and functions used by function
  * possibility to check EXECUTE stmt against SQL injection vulnerability

postgresql-16-plpgsql-check-dbgsym: debug symbols for postgresql-16-plpgsql-check