Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 3.6.0 #9067

Merged
merged 237 commits into from
Apr 26, 2022
Merged

Release 3.6.0 #9067

merged 237 commits into from
Apr 26, 2022

Conversation

hwillson
Copy link
Member

@hwillson hwillson commented Nov 16, 2021

Like the Release 3.5.0 PR, this PR will serve to collect significant new features, deprecation warnings, and minor breaking changes that we intend to release in @apollo/[email protected].

If you want to test these changes, run

npm i @apollo/[email protected]

in your application, where the n in -beta.n comes from the most recent commit message like

Bump @apollo/client npm version to 3.6.0-beta.n.

Until v3.6.0 is released, we can continue merging smaller changes into main and releasing them, without worrying about larger changes on the release-3.6 branch.

TODO for the 3.6 release

benjamn and others added 13 commits November 16, 2021 17:23
…e-3.6.

Merging into `release-3.6` before merging into `main` so we can do some
additional testing with beta releases.
* add use-sync-external-store

* Initial work on using useSyncExternalStore

* fix useLazyQuery tests

* update use-sync-external-store version

* update timings to useMutation tests

* change the timing in a Mutation component test which changed for no ostensible reason

* fix the hoc tests agane

* bring back the bad boy code block by popular demand

* update useSyncExternalStore to handle ssr

* use published useSyncExternalStore types

* update dependencies and add beta to react peer range
The specific failure is an integrity hash mismatch:

  5:44:05 PM: npm ERR! code EINTEGRITY
  5:44:05 PM: npm ERR! sha512-yXbYeFy+jUuYd3/CDcg2NkIYE991XYX/bje7LmjJigUciaeO1JR4XxXgCIV1/Zc/dRuFEyw1L0pbA+qynJkW5Q==
                       integrity checksum failed when using sha512: wanted sha512-yXbYeFy+jUuYd3/CDcg2NkIYE991XYX/bje7LmjJigUciaeO1JR4XxXgCIV1/Zc/dRuFEyw1L0pbA+qynJkW5Q==
                       but got sha512-U1riIR+lBSNi3IbxtaHOIKdH8sLFv3NYfNv8sg7ZsNhcfl4HF2++BfqqrNAxoCLQW1iiylOj76ecnaUxz+z9yw==

Example failed deployment (or see any of the recent failures in #9067):
https://app.netlify.com/sites/apollo-client-docs/deploys/619d6dc222deda1694aa37a6

Although the error doesn't mention the package name, I was able to grep
for the expected hash in package-lock.json, which pointed to the `acorn`
package. As you can tell from this commit's changes, the actual hash
displayed above (ending in +z9yw==) happens to be the hash for
[email protected], whereas the expected hash was that of [email protected].
@benjamn
Copy link
Member

benjamn commented Apr 18, 2022

Now that we've released the first release candidate (RC), @apollo/[email protected], we will only be fixing bugs and improving stability before the final v3.6 release (no new features), which we anticipate by the end of this week (Friday, April 22, 2022).

This release includes support for React 18 and many other improvements. See the CHANGELOG.md for more details.

I noticed while updating an internal application that sometimes the
observableQuery.options.query document could be !== watch.query, so
there were cases where the watched query had already been updated and
was even included in updatedQuerySet, but we (harmlessly/needlessly)
call reobserveCacheFirst again in the finally block, just because
options.query !== watch.query.

This commit reinforces observableQuery.options.query as the source of
truth for the transformed query document, while also providing the same
object as observableQuery.query, a TypedDocumentNode<TData, TVariables>
which should always be === observableQuery.queryInfo.document.
@benjamn benjamn merged commit 2b85ca7 into main Apr 26, 2022
@benjamn benjamn mentioned this pull request Apr 27, 2022
@apollographql apollographql locked as resolved and limited conversation to collaborators Feb 3, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.