Skip to content

Tags: dwtcourses/encore

Tags

v1.26.0

Toggle v1.26.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Expose app root path to front-end (encoredev#882)

So that we can open the files in the users editor

v1.25.2

Toggle v1.25.2's commit message
Open the dev dash on 'encore run' startup

To make the dev dashboard more discoverable
for new users, and to make it more convenient
for more experienced Encore users, open the
dev dashboard on `encore run` startup.

This behavior can be controlled with the new
`--browser` flag to `encore run`. To revert to
the previous behavior, use `--browser=never`.

v1.25.1

Toggle v1.25.1's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
sqldb: add RegisterStdlibDriver (encoredev#863)

v1.24.1

Toggle v1.24.1's commit message
Fix lint, add word test

v1.24.0

Toggle v1.24.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Enable the external call path by default. (encoredev#836)

This is required for the process layout configuration we're adding this
week.

v1.23.3

Toggle v1.23.3's commit message
cli: refactor sqldb ns to use docker volumes

We've observed permission-related issues when using `colima`
with volume mounts. See if it works better with docker volumes.

v1.23.2

Toggle v1.23.2's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Add error stacks to daemon sqldb package (encoredev#825)

v1.23.1

Toggle v1.23.1's commit message
docker: fix permission issue

The new encoredotdev/postgres:15 image must be run with root
in order to be able to change the filesystem permissions of the
mounted volume during startup.

v1.23.0

Toggle v1.23.0's commit message
v2/app: allow dbs to be defined outside svcs

Since we now accurately track database usages, we can
relax where they are defined. They can still only be *used*
from within services, to ensure permissions are mapped correctly.