Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Feb 17, 2025

Bumps taskcluster from 68.0.4 to 81.0.2.

Release notes

Sourced from taskcluster's releases.

v81.0.2

WORKER-DEPLOYERS

▶ [patch] #7521 Generic Worker: fixes an issue introduced in v81.0.0 where TASK_USER_CREDENTIALS env var wasn't written to the task's environment if task.payload.features.runTaskAsCurrentUser was enabled.

Automated Package Updates

  • build(deps): bump elliptic from 6.6.0 to 6.6.1 in /ui (a0eb01744)
  • build(deps): bump elliptic from 6.6.0 to 6.6.1 in /clients/client-web (e17fc4ed4)

v81.0.1

WORKER-DEPLOYERS

▶ [patch] #7517 Generic Worker: fixes fork/exec issue on headless, multiuser engine introduced in v81.0.0.

v81.0.0

GENERAL

▶ [patch] Upgrades to go1.23.6 and golangci-lint 1.63.4

DEPLOYERS

▶ [minor] #7508 Removes Cloud Armor specific policy config from deployment templates as it was applied incorrectly.

WORKER-DEPLOYERS

▶ [MAJOR] Generic Worker: feature runTaskAsCurrentUser (note: Task not Tasks) has been added to replace the previous global task config setting runTasksAsCurrentUser (which is no longer supported). Worker pools can elect to enable or disable the feature with boolean config setting enableRunTaskAsCurrentUser. Tasks with the feature enabled (task.payload.features.runTaskAsCurrentUser = true) require scope generic-worker:run-task-as-current-user:<provisionerID>/<workerType>.

This change was introduced in order that access to this privileged feature are guarded not only by worker config settings, but also by task scopes, and furthermore the feature must be explicitly requested, in order that tasks do not unintentionally inherit the feature by virtue of overgenerous scopes or unintentionally running on a pool with the feature enabled.

▶ [patch] #7462 Generic Worker (D2G): prune docker images during garbage collection, if needed.

USERS

▶ [MAJOR] The interactive feature will now drop users in the task container instead of the host

▶ [minor] #7506 Generic Worker Chain Of Trust feature now allows tasks to inject additional

... (truncated)

Changelog

Sourced from taskcluster's changelog.

v81.0.2

WORKER-DEPLOYERS

▶ [patch] #7521 Generic Worker: fixes an issue introduced in v81.0.0 where TASK_USER_CREDENTIALS env var wasn't written to the task's environment if task.payload.features.runTaskAsCurrentUser was enabled.

Automated Package Updates

  • build(deps): bump elliptic from 6.6.0 to 6.6.1 in /ui (a0eb01744)
  • build(deps): bump elliptic from 6.6.0 to 6.6.1 in /clients/client-web (e17fc4ed4)

v81.0.1

WORKER-DEPLOYERS

▶ [patch] #7517 Generic Worker: fixes fork/exec issue on headless, multiuser engine introduced in v81.0.0.

v81.0.0

GENERAL

▶ [patch] Upgrades to go1.23.6 and golangci-lint 1.63.4

DEPLOYERS

▶ [minor] #7508 Removes Cloud Armor specific policy config from deployment templates as it was applied incorrectly.

WORKER-DEPLOYERS

▶ [MAJOR] Generic Worker: feature runTaskAsCurrentUser (note: Task not Tasks) has been added to replace the previous global task config setting runTasksAsCurrentUser (which is no longer supported). Worker pools can elect to enable or disable the feature with boolean config setting enableRunTaskAsCurrentUser. Tasks with the feature enabled (task.payload.features.runTaskAsCurrentUser = true) require scope generic-worker:run-task-as-current-user:<provisionerID>/<workerType>.

This change was introduced in order that access to this privileged feature are guarded not only by worker config settings, but also by task scopes, and furthermore the feature must be explicitly requested, in order that tasks do not unintentionally inherit the feature by virtue of overgenerous scopes or unintentionally running on a pool with the feature enabled.

▶ [patch] #7462 Generic Worker (D2G): prune docker images during garbage collection, if needed.

USERS

▶ [MAJOR] The interactive feature will now drop users in the task container instead of the host

... (truncated)

Commits
  • 1f9e3ff v81.0.2
  • a40ff6d Merge pull request #7522 from taskcluster/matt-boris/fixEnvVarsAsCurrentUser
  • fb12179 fix(generic-worker): properly configure env vars when running as current user
  • 530575d Merge pull request #7514 from taskcluster/matt-boris/useGuiPools
  • fef7857 chore(ci): use new *-gui pools
  • 9d57408 Merge pull request #7520 from taskcluster/dependabot/npm_and_yarn/ui/elliptic...
  • bf430eb Merge pull request #7519 from taskcluster/dependabot/npm_and_yarn/clients/cli...
  • a0eb017 build(deps): bump elliptic from 6.6.0 to 6.6.1 in /ui
  • e17fc4e build(deps): bump elliptic from 6.6.0 to 6.6.1 in /clients/client-web
  • e69c44b v81.0.1
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [taskcluster](https://github.com/taskcluster/taskcluster) from 68.0.4 to 81.0.2.
- [Release notes](https://github.com/taskcluster/taskcluster/releases)
- [Changelog](https://github.com/taskcluster/taskcluster/blob/main/CHANGELOG.md)
- [Commits](taskcluster/taskcluster@v68.0.4...v81.0.2)

---
updated-dependencies:
- dependency-name: taskcluster
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Feb 17, 2025
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Feb 21, 2025

Superseded by #645.

@dependabot dependabot bot closed this Feb 21, 2025
@dependabot dependabot bot deleted the dependabot/pip/tools/taskcluster-81.0.2 branch February 21, 2025 03:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file python Pull requests that update Python code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants