Next | Query returned 55 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2024-11-22 18:50:00 by Leonardo Taccari | Files touched by this commit (3)
Log message:
opa: Update to 0.70.0

Changes:
v0.70.0
This release contains a mix of features, performance improvements, and
bugfixes.

- Optimized read mode for OPA's in-memory store
   2024-10-20 12:09:43 by Leonardo Taccari | Files touched by this commit (3)
Log message:
opa: Update to 0.69.0

Changes:
v0.69.0
-------
This release contains a mix of features, bugfixes and necessary tooling
and test changes required to support the upcoming OPA `1.0` release.

- Inter-Query Value Cache

v0.68.0
-------
This release contains a mix of features and bugfixes.

- Breaking Changes: `entrypoint` annotation implies `document` scope
   2024-09-06 20:49:02 by Benny Siegert | Files touched by this commit (180) | Package updated
Log message:
Revbump all Go packages after go122 update
   2024-08-11 17:57:15 by Benny Siegert | Files touched by this commit (176) | Package updated
Log message:
Revbump all Go packages after update
   2024-08-11 15:46:42 by Leonardo Taccari | Files touched by this commit (3)
Log message:
opa: Update to 0.67.1

Changes:
0.67.1
------
This is a bug fix release addressing the following issue:

- util+server: Fix bug around chunked request handling. A request
  handling caused OPA to treat all incoming chunked requests as if they
  had zero-length request bodies.
   2024-07-28 12:24:25 by Leonardo Taccari | Files touched by this commit (3)
Log message:
opa: Update to 0.67.0

Changes:
v0.67.0
This release contains a mix of features, a new builtin function
(`strings.count`), performance improvements, and bugfixes.

### Breaking Change
#### Request Body Size Limits

OPA now automatically rejects very large requests.
Requests with a `Content-Length` larger than 128 MB uncompressed, and
gzipped requests with payloads that decompress to larger than 256 MB
will be rejected, as part of hardening OPA against denial-of-service
attacks. Previously, a large enough request could cause an OPA instance
to run out of memory in low-memory sidecar deployment scenarios, just
from attempting to read the request body into memory.

These changes allow improvements in memory usage for the OPA HTTP
server, and help OPA deployments avoid some accidental out-of-memory
situations.

For most users, no changes will be needed to continue using OPA.
However, to control this behavior, two new configuration keys are
available: `server.decoding.max_length` and
`server.decoding.gzip.max_length`. These control the max size in bytes
to allow for an incoming request payload, and the maximum size in bytes
to allow for a decompressed gzip request payload, respectively.
   2024-07-07 16:02:29 by Leonardo Taccari | Files touched by this commit (3)
Log message:
opa: Update to 0.66.0

Changes:
v0.66.0
This release contains a mix of features, performance improvements, and bugfixes.

### Improved Test Reports

The `opa test` command now includes a new `--var-values` flag that
enriches reporting of failed tests with the values and locations for
variables in the failing expression.

### Reading stdin in `opa exec`

The `opa exec` command now supports reading `input` documents from
stdin with the `--stdin-input` (`-I`) flag.

v0.65.0
This release contains a mix of features and bugfixes.
   2024-07-03 08:59:36 by Benny Siegert | Files touched by this commit (169) | Package updated
Log message:
Revbump all Go packages after go122 security update
   2024-06-13 15:47:13 by Benny Siegert | Files touched by this commit (169) | Package updated
Log message:
Revbump all Go packages after go122 update
   2024-06-01 16:03:06 by Benny Siegert | Files touched by this commit (168)
Log message:
Revbump all Go packages, default Go version is now 1.22.

Next | Query returned 55 messages, browsing 1 to 10 | Previous