You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,10 @@
1
1
# CHANGELOG
2
2
3
+
## 0.11.0
4
+
5
+
- Key changes:
6
+
- Automatically set `GOMAXPROCS` to match Linux container CPU quota via [uber-go/automaxprocs](https://github.com/uber-go/automaxprocs). Enabled by default, can be turned off via `SET_GOMAXPROCS: false`.
Copy file name to clipboardExpand all lines: README.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,6 +40,7 @@ Docker images are published on [ghcr.io/weisdd/lfgw](https://github.com/weisdd/l
40
40
||`ASSUMED_ROLES`|`false`| In environments, where OIDC-role names match names of namespaces, ACLs can be constructed on the fly (e.g. `["role1", "role2"]` will give access to metrics from namespaces `role1` and `role2`). The roles specified in `acl.yaml` are still considered and get merged with assumed roles. Role names may contain regular expressions, including the admin definition `.*`. |
41
41
||`ENABLE_DEDUPLICATION`|`true`| Whether to enable deduplication, which leaves some of the requests unmodified if they match the target policy. Examples can be found in the "acl.yaml syntax" section. |
42
42
||`OPTIMIZE_EXPRESSIONS`|`true`| Whether to automatically optimize expressions for non-full access requests. [More details](https://pkg.go.dev/github.com/VictoriaMetrics/metricsql#Optimize)|
43
+
||`SET_GOMAXPROCS`|`true`| Automatically set `GOMAXPROCS` to match Linux container CPU quota. |
43
44
|||||
44
45
|**Logging**||||
45
46
||`DEBUG`|`false`| Whether to print out debug log messages. |
// NOTE: Strictly speaking, it's getACL who is expected to pass a filtered list of roles in case Assumed roles are disabled. The error check below is not necessary, is left as an additional safeguard for now and might get removed in the future.
165
165
if!app.AssumedRoles {
166
-
return"", fmt.Errorf("Some of the roles are unknown and assumed roles are not enabled")
166
+
return"", fmt.Errorf("some of the roles are unknown and assumed roles are not enabled")
167
167
}
168
168
// NOTE: Role names are not linted, so they may contain regular expressions, including the admin definition: .*
0 commit comments