shoenig / nomad-pledge-driver

Nomad task driver capable of blocking unwanted syscall and filesystem access. Based on the pledge utility for Linux by Justine Tunney
Mozilla Public License 2.0
22 stars 2 forks source link

build(deps): bump github.com/hashicorp/nomad from 1.6.3 to 1.7.2 #79

Closed dependabot[bot] closed 9 months ago

dependabot[bot] commented 9 months ago

⚠️ Dependabot is rebasing this PR ⚠️

Rebasing might not happen immediately, so don't worry if this takes some time.

Note: if you make any changes to this PR yourself, they will take precedence over the rebase.


Bumps github.com/hashicorp/nomad from 1.6.3 to 1.7.2.

Release notes

Sourced from github.com/hashicorp/nomad's releases.

v1.7.2

1.7.2 (December 13, 2023)

FEATURES:

  • Reschedule on Lost: Adds the ability to prevent tasks on down nodes from being rescheduled [GH-16867]

IMPROVEMENTS:

  • audit (Enterprise): Added ACL token role links to audit log auth objects [GH-19415]
  • ui: Added a new example template with Task Actions [GH-19153]
  • ui: dont allow new jobspec download until template is populated, and remove group count from jobs index [GH-19377]
  • ui: make the exec window look nicer on mobile screens [GH-19332]

BUG FIXES:

  • auth: Fixed a bug where tls.verify_server_hostname=false was not respected, leading to authentication failures between Nomad agents [GH-19425]
  • cli: Fix a bug in the var put command which prevented combining items as CLI arguments and other parameters as flags [GH-19423]
  • client: Fix a panic in building CPU topology when inaccurate CPU data is provided [GH-19383]
  • client: Fixed a bug where clients are unable to detect CPU topology in certain conditions [GH-19457]
  • consul (Enterprise): Fixed a bug where implicit Consul constraints were not specific to non-default Consul clusters [GH-19449]
  • consul: uses token namespace to fetch policies for verification [GH-18516]
  • core: Fixed a bug where linux nodes with no reservable cores would panic the scheduler [GH-19458]
  • csi: Added validation to csi_plugin blocks to prevent stage_publish_base_dir from being a subdirectory of mount_dir [GH-19441]
  • metrics: Revert upgrade of go-metrics to fix an issue where metrics from dependencies, such as raft, were no longer emitted [GH-19374]
  • ui: Fixed an issue where Accessor ID was masked by default when editing a token [GH-19432]
  • vault: Fixed a bug that caused template blocks to ignore Nomad configuration for Vault and use the default address of https://127.0.0.1:8200 when the job does not have a vault block defined [GH-19439]

v1.7.1

1.7.1 (December 08, 2023)

BUG FIXES:

  • cli: Fixed a bug that caused the nomad agent command to ignore the VAULT_TOKEN and VAULT_NAMESPACE environment variables [GH-19349]
  • client: remove incomplete allocation entries from client state database during client restarts [GH-16638]
  • connect: Fixed a bug where deployments would not wait for Connect sidecar task health checks to pass [GH-19334]
  • keyring: Fixed a bug where RSA keys were not replicated to followers [GH-19350]

v1.7.0

1.7.0 (December 07, 2023)

FEATURES:

  • Job Actions: Introduces the action concept to jobspecs, the web UI, CLI and API. Operators can now define actions that Nomad users can execute against running allocations. [GH-18794]
  • Multiple Vault and Consul Clusters: Nomad Enterprise can now use multiple Vault or Consul clusters. Each task or service can be registered with a different Consul cluster and each task can obtain secrets from a different Vault cluster. [GH-5311]
  • NUMA aware scheduling: Nomad Enterprise now supports optimized scheduling on NUMA hardware [GH-18681]
  • Workload Identity IDP: Nomad's workload identities may now be used with third parties that support JWT or OIDC IDPs such as the AWS IAM OIDC Provider. [GH-18691]
  • Workload Identity for Consul: Jobs can now use workload identity to authenticate to Consul. [GH-15618]
  • Workload Identity for Vault: Jobs can now use workload identity to authenticate to Vault. [GH-15617]

... (truncated)

Changelog

Sourced from github.com/hashicorp/nomad's changelog.

1.7.2 (December 13, 2023)

FEATURES:

  • Reschedule on Lost: Adds the ability to prevent tasks on down nodes from being rescheduled [GH-16867]

IMPROVEMENTS:

  • audit (Enterprise): Added ACL token role links to audit log auth objects [GH-19415]
  • ui: Added a new example template with Task Actions [GH-19153]
  • ui: dont allow new jobspec download until template is populated, and remove group count from jobs index [GH-19377]
  • ui: make the exec window look nicer on mobile screens [GH-19332]

BUG FIXES:

  • auth: Fixed a bug where tls.verify_server_hostname=false was not respected, leading to authentication failures between Nomad agents [GH-19425]
  • cli: Fix a bug in the var put command which prevented combining items as CLI arguments and other parameters as flags [GH-19423]
  • client: Fix a panic in building CPU topology when inaccurate CPU data is provided [GH-19383]
  • client: Fixed a bug where clients are unable to detect CPU topology in certain conditions [GH-19457]
  • consul (Enterprise): Fixed a bug where implicit Consul constraints were not specific to non-default Consul clusters [GH-19449]
  • consul: uses token namespace to fetch policies for verification [GH-18516]
  • core: Fixed a bug where linux nodes with no reservable cores would panic the scheduler [GH-19458]
  • csi: Added validation to csi_plugin blocks to prevent stage_publish_base_dir from being a subdirectory of mount_dir [GH-19441]
  • metrics: Revert upgrade of go-metrics to fix an issue where metrics from dependencies, such as raft, were no longer emitted [GH-19374]
  • ui: Fixed an issue where Accessor ID was masked by default when editing a token [GH-19432]
  • vault: Fixed a bug that caused template blocks to ignore Nomad configuration for Vault and use the default address of https://127.0.0.1:8200 when the job does not have a vault block defined [GH-19439]

1.7.1 (December 08, 2023)

BUG FIXES:

  • cli: Fixed a bug that caused the nomad agent command to ignore the VAULT_TOKEN and VAULT_NAMESPACE environment variables [GH-19349]
  • client: remove incomplete allocation entries from client state database during client restarts [GH-16638]
  • connect: Fixed a bug where deployments would not wait for Connect sidecar task health checks to pass [GH-19334]
  • keyring: Fixed a bug where RSA keys were not replicated to followers [GH-19350]

1.7.0 (December 07, 2023)

FEATURES:

  • Job Actions: Introduces the action concept to jobspecs, the web UI, CLI and API. Operators can now define actions that Nomad users can execute against running allocations. [GH-18794]
  • Multiple Vault and Consul Clusters: Nomad Enterprise can now use multiple Vault or Consul clusters. Each task or service can be registered with a different Consul cluster and each task can obtain secrets from a different Vault cluster. [GH-5311]
  • NUMA aware scheduling: Nomad Enterprise now supports optimized scheduling on NUMA hardware [GH-18681]
  • Workload Identity IDP: Nomad's workload identities may now be used with third parties that support JWT or OIDC IDPs such as the AWS IAM OIDC Provider. [GH-18691]
  • Workload Identity for Consul: Jobs can now use workload identity to authenticate to Consul. [GH-15618]
  • Workload Identity for Vault: Jobs can now use workload identity to authenticate to Vault. [GH-15617]

BREAKING CHANGES:

  • client/fingerprint: The cpu.numcores.power node attribute has been renamed to cpu.numcores.performance on Apple Silicon nodes [GH-18843]

... (truncated)

Commits
  • 64e3dca Generate files for 1.7.2 release
  • 483cf98 Backport of [CSI] Prevent stage_publish_base_dir from being subdir of mount_d...
  • fe7442a backport of commit 7e43317e3771935aad88fbdee623649faaf63e53 (#19461)
  • c58f2ea backport of commit 6e4d57b330e57680ca93c12afff69492071cfbd3 (#19460)
  • 9ba0af7 backport of commit 646445d4acf4e10ab030a1e62f6b6bb894deba4e (#19305)
  • 776bdf5 backport of commit b6dd376100cfe0b44072dcd9eb19757762632ecd (#19459)
  • df915dd backport of commit b1654016c06772d112878c2f6e1517af1db24c57 (#19433)
  • e32c10e backport of commit 0bc822db4037a8416b9e1ba8fb3f361a0f5105b2 (#19451)
  • 5f100fb Backport of consul: fix constraints for non-default clusters (ENT) into relea...
  • 27b5ed3 backport of commit cf539c405e5e0821910fad9a8bb014bebdcd3e54 (#19431)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)