Next | Query returned 48 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2025-03-07 21:54:34 by Benny Siegert | Files touched by this commit (190) | Package updated
Log message:
Revbump all Go packages after go124 update

I realize I forgot to do the revbump after updating the default Go
version to 1.24, so let's do that now.
   2024-09-06 20:49:02 by Benny Siegert | Files touched by this commit (180) | Package updated
Log message:
Revbump all Go packages after go122 update
   2024-08-11 17:57:15 by Benny Siegert | Files touched by this commit (176) | Package updated
Log message:
Revbump all Go packages after update
   2024-07-03 08:59:36 by Benny Siegert | Files touched by this commit (169) | Package updated
Log message:
Revbump all Go packages after go122 security update
   2024-06-13 15:47:13 by Benny Siegert | Files touched by this commit (169) | Package updated
Log message:
Revbump all Go packages after go122 update
   2024-06-01 16:03:06 by Benny Siegert | Files touched by this commit (168)
Log message:
Revbump all Go packages, default Go version is now 1.22.
   2024-04-05 21:14:14 by Benny Siegert | Files touched by this commit (161) | Package updated
Log message:
Revbump all Go packages after go121 update
   2024-02-07 15:51:04 by Benny Siegert | Files touched by this commit (156) | Package updated
Log message:
Revbump all Go packages after go121 update
   2024-01-10 20:14:43 by Benny Siegert | Files touched by this commit (152) | Package updated
Log message:
Revbump all Go packages after go121 update
   2023-12-22 18:36:04 by Benny Siegert | Files touched by this commit (3) | Package updated
Log message:
mysqld_exporter: update to 0.15.1 (security)

This fixes the following vulnerabilities:

Vulnerability #1: GO-2023-1571
    Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net
  More info: https://pkg.go.dev/vuln/GO-2023-1571
  Module: golang.org/x/net
    Found in: golang.org/x/net@v0.0.0-20210525063256-abc453219eb5
    Fixed in: golang.org/x/net@v0.7.0

Vulnerability #2: GO-2022-1130
    Authentication bypass in github.com/prometheus/exporter-toolkit
  More info: https://pkg.go.dev/vuln/GO-2022-1130
  Module: github.com/prometheus/exporter-toolkit
    Found in: github.com/prometheus/exporter-toolkit@v0.7.1
    Fixed in: github.com/prometheus/exporter-toolkit@v0.8.2

0.15.1
------
Rebuild for dependency updates

0.15.0
------
BREAKING CHANGES:

The exporter no longer supports the monolithic DATA_SOURCE_NAME environment
variable.  To configure connections to MySQL you can either use a my.cnf style
config file or command line arguments.

For example:

export MYSQLD_EXPORTER_PASSWORD=secret
mysqld_exporter --mysqld.address=localhost:3306 --mysqld.username=exporter

We have also dropped some internal scrape metrics:

    mysql_exporter_scrapes_total
    mysql_exporter_scrape_errors_total
    mysql_last_scrape_failed

The default client configuration file is now .my.cnf in the process working
directory. Use --config.my-cnf="$HOME/.my.cnf" to retain the previous \ 
default.

Next | Query returned 48 messages, browsing 1 to 10 | Previous