You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@calcite.apache.org by GitBox <gi...@apache.org> on 2022/03/10 11:37:17 UTC

[GitHub] [calcite] liyafan82 commented on a change in pull request #2741: [CALCITE-4976] Release Calcite 1.30.0

liyafan82 commented on a change in pull request #2741:
URL: https://github.com/apache/calcite/pull/2741#discussion_r823627491



##########
File path: site/_docs/history.md
##########
@@ -29,6 +29,162 @@ Downloads are available on the
 [downloads page]({{ site.baseurl }}/downloads/).
 
 
+## <a href="https://github.com/apache/calcite/releases/tag/calcite-1.30.0">1.30.0</a> / 2022-03-04
+{: #v1-30-0}
+
+This release comes two months after [1.29.0](#v1-29-0),
+contains contributions from 29 authors,
+and resolves 37 issues.
+
+Among others, it is worth highlighting the following.
+
+* [Babel parser support MySQL NULL-safe equal operator '<=>'](https://issues.apache.org/jira/browse/CALCITE-4980)
+* [Support SQL hints for temporal table join](https://issues.apache.org/jira/browse/CALCITE-4967)
+* [Fluent test fixtures so that dependent projects can write parser, validator and rules tests](https://issues.apache.org/jira/browse/CALCITE-4885">CALCITE-4885)
+* [Add functions `ARRAY_CONCAT`, `ARRAY_REVERSE`, `ARRAY_LENGTH` for BigQuery dialect](https://issues.apache.org/jira/browse/CALCITE-4822">CALCITE-4822)
+* [Vulnerability issues CVE-2021-27568 fixed](https://nvd.nist.gov/vuln/detail/CVE-2021-27568)

Review comment:
       Revised. Thanks for your careful review. 




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscribe@calcite.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org