Skip to content
This repository was archived by the owner on May 27, 2025. It is now read-only.
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
26 commits
Select commit Hold shift + click to select a range
3d42ddb
Give MySQL sql_log_bin at DSN level to take parameter into account (#…
fgaillot-qosenergy Jun 24, 2024
883b9fb
change the host with endpoint to make it worked
developer-guy Oct 15, 2024
f94c829
Merge pull request #198 from developer-guy/master
turkenh Oct 17, 2024
3d25f26
ci: fix upload-artifact ref
Duologic Nov 28, 2024
414c206
allow to define login db (#192)
bakito Nov 28, 2024
fc01ede
add support for mssql schema in grants (#193)
bakito Nov 28, 2024
0890de0
optional binlog parameters in mysql connection string to allow the us…
mleahu Nov 28, 2024
49c9535
fix: remove unneeded flush privileges call for mysql (#202)
Duologic Nov 28, 2024
9189b59
feat: add custom tls config support to mysql (#184)
silphid Nov 28, 2024
9f1195b
refactor(mysql): consistent username/host parameters (#205)
Duologic Dec 13, 2024
cee2aea
chore: update build/, Makefile and integration test script (#204)
Duologic Dec 13, 2024
fcd50ac
feat(postgresql): add revoke public logic to grant and schema resourc…
Jan 13, 2025
d0c080b
test(postgresql): implement postgresdb integration tests (#208)
Jan 13, 2025
33fb91c
update helm repo before intalling mariadb (#209)
Jan 14, 2025
4cf415f
chore: add chlunde to maintainers list (#225)
Duologic Apr 23, 2025
8d48ca9
bump github actions upload-action to latest release due to deprecation
larhauga May 2, 2025
9f8d2f5
Merge pull request #228 from larhauga/bump-gh-upload-action
chlunde May 2, 2025
cdf9f3d
chore: bump golangci version (#216)
fernandezcuesta May 2, 2025
141e7c8
chore: Update Go to 1.23.9 (#230)
chlunde May 7, 2025
81159bd
Bump golang.org/x/crypto from 0.21.0 to 0.35.0 (#229)
dependabot[bot] May 7, 2025
ee8f3ac
Bump golang.org/x/net from 0.25.0 to 0.38.0 (#231)
dependabot[bot] May 7, 2025
e3cb31c
Bump google.golang.org/protobuf from 1.31.0 to 1.33.0 (#232)
dependabot[bot] May 7, 2025
598c9cc
fix: enable management policies (#215)
fernandezcuesta May 8, 2025
890b619
Move negz to emeritus status (#226)
chlunde May 12, 2025
71c4b3a
test: add coverage of managementPolicies to e2e (#233)
chlunde May 12, 2025
c742efe
chore: remove duplicate entry of golangci version (#236)
fernandezcuesta May 22, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 28 additions & 0 deletions .github/workflows/backport.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
name: Backport

on:
# NOTE(negz): This is a risky target, but we run this action only when and if
# a PR is closed, then filter down to specifically merged PRs. We also don't
# invoke any scripts, etc from within the repo. I believe the fact that we'll
# be able to review PRs before this runs makes this fairly safe.
# https://securitylab.github.com/research/github-actions-preventing-pwn-requests/
pull_request_target:
types: [closed]
# See also commands.yml for the /backport triggered variant of this workflow.

jobs:
# NOTE(negz): I tested many backport GitHub actions before landing on this
# one. Many do not support merge commits, or do not support pull requests with
# more than one commit. This one does. It also handily links backport PRs with
# new PRs, and provides commentary and instructions when it can't backport.
# The main gotcha with this action is that PRs _must_ be labelled before they're
# merged to trigger a backport.
open-pr:
runs-on: ubuntu-24.04
if: github.event.pull_request.merged
steps:
- name: Checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4

- name: Open Backport PR
uses: korthout/backport-action@bd68141f079bd036e45ea8149bc9d174d5a04703 # v1
Loading