Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency hashicorp/nomad to v1.8.4 #29

Merged
merged 1 commit into from
Sep 22, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Aug 13, 2024

This PR contains the following updates:

Package Update Change
hashicorp/nomad patch 1.8.2 -> 1.8.4

Release Notes

hashicorp/nomad (hashicorp/nomad)

v1.8.4

Compare Source

1.8.4 (September 17, 2024)

BREAKING CHANGES:

  • docker: The default infra_image for pause containers is now registry.k8s.io/pause [GH-23927]

IMPROVEMENTS:

  • build: update to go1.22.6 [GH-23805]
  • cgroups: Allow clients with delegated cgroups check that required cgroup v2 controllers exist [GH-23803]
  • docker: Disable cpuset management for non-root clients [GH-23804]
  • identity: Added support for server-configured additional claims on the Vault default_identity block [GH-23675]
  • namespaces: Allow enabling/disabling allowed network modes per namespace [GH-23813]
  • ui: Badge added for Scaled Down jobs [GH-23829]

DEPRECATIONS:

  • api: the JobParseRequest.HCLv1 field will be removed in Nomad 1.9.0 [GH-23913]
  • jobspec: using the -hcl1 flag for HCLv1 job specifications will now emit a warning at the command line. This feature will be removed in Nomad 1.9.0 [GH-23913]

BUG FIXES:

  • identity: Fixed a bug where dispatch and periodic jobs would have their job ID and not parent job ID used when creating the subject claim [GH-23902]
  • identity: Fixed a bug where dispatch and periodic jobs would have their job ID and not parent job ID used when interpolating vault.default_identity.extra_claims [GH-23817]
  • node: Fixed bug where sysbatch allocations were started prematurely [GH-23858]
  • ui: Fix an issue where cmd+click or ctrl+click would double-open a job [GH-23832]

v1.8.3

Compare Source

SECURITY:

  • security: Fix symlink escape during unarchiving by removing existing paths within the same allocdir. Compromising the Nomad client agent at the source allocation first is a prerequisite for leveraging this issue. [GH-23738]

IMPROVEMENTS:

  • acl: Submitting a policy with a leading / in a variable path will now return an error to prevent improperly working policies. [GH-23757]
  • cli: Added option to return original HCL in job inspect command [GH-23699]
  • cli: Added support for updating the roles for an ACL token [GH-18532]
  • cli: acl token create will now emit a warning if the token has a policy that does not yet exist [GH-16437]
  • keyring: Added support for encrypting the keyring via Vault transit or external KMS [GH-23580]
  • keyring: Added support for prepublishing keys [GH-23577]
  • identity: Added support for server-configured additional claims on the Vault default_identity block [GH-23675]
  • metrics: Added client.tasks metrics to track task states [GH-23773]
  • resources: Added resources.secrets field to configure size of secrets directory on Linux [GH-23696]
  • tls: Allow setting the tls_min_version field to "tls13" [GH-23713]
  • ui: added a Pack badge to the jobs index page for jobs run via Nomad Pack [GH-23404]

BUG FIXES:

  • api: Fixed a bug where an api.Config targeting a unix domain socket could not be reused between clients [GH-23785]
  • cni: .conf and .json config files are now parsed properly [GH-23629]
  • cni: network.cni jobspec updates now replace allocs to apply the new network config [GH-23764]
  • docker: Fixed a bug where plugin SELinux labels would conflict with read-only volume options [GH-23750]
  • identity: Fixed a bug where a missing default task identity could panic the leader [GH-23763]
  • keyring: Fixed a bug where keys could be garbage collected before workload identities expire [GH-23577]
  • keyring: Fixed a bug where keys would never exit the "rekeying" state after a rotation with the -full flag [GH-23577]
  • keyring: Fixed a bug where periodic key rotation would not occur [GH-23577]
  • networking: The same static port can now be used more than once on host networks with multiple IPs [GH-23693]
  • scaling: Fixed a bug where state store corruption could occur when writing scaling events [GH-23673]
  • template: Fixed a bug where change_mode = "script" would not execute after a client restart [GH-23663]
  • ui: Fixed storage/plugin 404s by unescaping a slash character in the request URL [GH-23625]
  • windows: Fix bug with containers capabilities on Docker CE [GH-23599]

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/hashicorp-nomad-1.x branch from b8b8b32 to 39bfcb2 Compare September 18, 2024 00:18
@renovate renovate bot changed the title chore(deps): update dependency hashicorp/nomad to v1.8.3 chore(deps): update dependency hashicorp/nomad to v1.8.4 Sep 18, 2024
@prabirshrestha prabirshrestha merged commit 9d155b0 into main Sep 22, 2024
2 checks passed
@prabirshrestha prabirshrestha deleted the renovate/hashicorp-nomad-1.x branch September 22, 2024 23:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant