Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump taskcluster from 80.0.0 to 81.0.2 #74

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 17, 2025

Bumps taskcluster from 80.0.0 to 81.0.2.

Release notes

Sourced from taskcluster's releases.

v81.0.2

WORKER-DEPLOYERS

▶ [patch] #7521 Generic Worker: fixes an issue introduced in v81.0.0 where TASK_USER_CREDENTIALS env var wasn't written to the task's environment if task.payload.features.runTaskAsCurrentUser was enabled.

Automated Package Updates

  • build(deps): bump elliptic from 6.6.0 to 6.6.1 in /ui (a0eb01744)
  • build(deps): bump elliptic from 6.6.0 to 6.6.1 in /clients/client-web (e17fc4ed4)

v81.0.1

WORKER-DEPLOYERS

▶ [patch] #7517 Generic Worker: fixes fork/exec issue on headless, multiuser engine introduced in v81.0.0.

v81.0.0

GENERAL

▶ [patch] Upgrades to go1.23.6 and golangci-lint 1.63.4

DEPLOYERS

▶ [minor] #7508 Removes Cloud Armor specific policy config from deployment templates as it was applied incorrectly.

WORKER-DEPLOYERS

▶ [MAJOR] Generic Worker: feature runTaskAsCurrentUser (note: Task not Tasks) has been added to replace the previous global task config setting runTasksAsCurrentUser (which is no longer supported). Worker pools can elect to enable or disable the feature with boolean config setting enableRunTaskAsCurrentUser. Tasks with the feature enabled (task.payload.features.runTaskAsCurrentUser = true) require scope generic-worker:run-task-as-current-user:<provisionerID>/<workerType>.

This change was introduced in order that access to this privileged feature are guarded not only by worker config settings, but also by task scopes, and furthermore the feature must be explicitly requested, in order that tasks do not unintentionally inherit the feature by virtue of overgenerous scopes or unintentionally running on a pool with the feature enabled.

▶ [patch] #7462 Generic Worker (D2G): prune docker images during garbage collection, if needed.

USERS

▶ [MAJOR] The interactive feature will now drop users in the task container instead of the host

▶ [minor] #7506 Generic Worker Chain Of Trust feature now allows tasks to inject additional

... (truncated)

Changelog

Sourced from taskcluster's changelog.

v81.0.2

WORKER-DEPLOYERS

▶ [patch] #7521 Generic Worker: fixes an issue introduced in v81.0.0 where TASK_USER_CREDENTIALS env var wasn't written to the task's environment if task.payload.features.runTaskAsCurrentUser was enabled.

Automated Package Updates

  • build(deps): bump elliptic from 6.6.0 to 6.6.1 in /ui (a0eb01744)
  • build(deps): bump elliptic from 6.6.0 to 6.6.1 in /clients/client-web (e17fc4ed4)

v81.0.1

WORKER-DEPLOYERS

▶ [patch] #7517 Generic Worker: fixes fork/exec issue on headless, multiuser engine introduced in v81.0.0.

v81.0.0

GENERAL

▶ [patch] Upgrades to go1.23.6 and golangci-lint 1.63.4

DEPLOYERS

▶ [minor] #7508 Removes Cloud Armor specific policy config from deployment templates as it was applied incorrectly.

WORKER-DEPLOYERS

▶ [MAJOR] Generic Worker: feature runTaskAsCurrentUser (note: Task not Tasks) has been added to replace the previous global task config setting runTasksAsCurrentUser (which is no longer supported). Worker pools can elect to enable or disable the feature with boolean config setting enableRunTaskAsCurrentUser. Tasks with the feature enabled (task.payload.features.runTaskAsCurrentUser = true) require scope generic-worker:run-task-as-current-user:<provisionerID>/<workerType>.

This change was introduced in order that access to this privileged feature are guarded not only by worker config settings, but also by task scopes, and furthermore the feature must be explicitly requested, in order that tasks do not unintentionally inherit the feature by virtue of overgenerous scopes or unintentionally running on a pool with the feature enabled.

▶ [patch] #7462 Generic Worker (D2G): prune docker images during garbage collection, if needed.

USERS

▶ [MAJOR] The interactive feature will now drop users in the task container instead of the host

... (truncated)

Commits
  • 1f9e3ff v81.0.2
  • a40ff6d Merge pull request #7522 from taskcluster/matt-boris/fixEnvVarsAsCurrentUser
  • fb12179 fix(generic-worker): properly configure env vars when running as current user
  • 530575d Merge pull request #7514 from taskcluster/matt-boris/useGuiPools
  • fef7857 chore(ci): use new *-gui pools
  • 9d57408 Merge pull request #7520 from taskcluster/dependabot/npm_and_yarn/ui/elliptic...
  • bf430eb Merge pull request #7519 from taskcluster/dependabot/npm_and_yarn/clients/cli...
  • a0eb017 build(deps): bump elliptic from 6.6.0 to 6.6.1 in /ui
  • e17fc4e build(deps): bump elliptic from 6.6.0 to 6.6.1 in /clients/client-web
  • e69c44b v81.0.1
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [taskcluster](https://github.com/taskcluster/taskcluster) from 80.0.0 to 81.0.2.
- [Release notes](https://github.com/taskcluster/taskcluster/releases)
- [Changelog](https://github.com/taskcluster/taskcluster/blob/main/CHANGELOG.md)
- [Commits](taskcluster/taskcluster@v80.0.0...v81.0.2)

---
updated-dependencies:
- dependency-name: taskcluster
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Feb 17, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants