Skip to content

Tags: dresende/node-orm2

Tags

v8.0.0

Toggle v8.0.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Merge pull request #862 from dresende/has_many_join_order

Add rows to hasMany join table in order provided

v7.1.1

Toggle v7.1.1's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Merge pull request #861 from dresende/update_dependencies

Update development dependencies to resolve security

v7.1.0

Toggle v7.1.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Merge pull request #859 from dresende/add_is_dirty

Add isDirty function to model instances

v7.0.0

Toggle v7.0.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Merge pull request #858 from dresende/update_async_package

Update async package to resolve security vulnerabilities

v6.2.0

Toggle v6.2.0's commit message
Fix redshift test failure

v6.1.0

Toggle v6.1.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Merge pull request #856 from dresende/model_create_options

Accept options in 'model.create' call

v6.0.0

Toggle v6.0.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Merge pull request #855 from dresende/postgres_uuid

Set internal default property value to undefined instead of null & add PostgreSQL uuid support

v5.0.9

Toggle v5.0.9's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Merge pull request #854 from dresende/coverage

Show & verify test coverage

v5.0.8

Toggle v5.0.8's commit message
Bump version

v5.0.7

Toggle v5.0.7's commit message
Resolve security vulnerabilities