{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":19638422,"defaultBranch":"master","name":"cloudbreak","ownerLogin":"hortonworks","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2014-05-10T10:03:07.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/898785?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1717223633.0","currentOid":""},"activityList":{"items":[{"before":"36ed68ec835f7bf76201ebaba780c6f1e8ae51ec","after":"77564d9bf2b1e6bcf1b20dc5ea03df88feb9a6b1","ref":"refs/heads/master","pushedAt":"2024-06-05T16:08:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25885 Need to fix discrepancy from show CLI command. FreeIPA upscale now updates environment configurations.","shortMessageHtmlLink":"CB-25885 Need to fix discrepancy from show CLI command. FreeIPA upsca…"}},{"before":"706b79267feb95b351bb30d9793195d9d111c387","after":"36ed68ec835f7bf76201ebaba780c6f1e8ae51ec","ref":"refs/heads/master","pushedAt":"2024-06-05T12:58:19.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"Merge pull request #1935 from cloudbreak/merge-285-dr-1\n\nMerge 285","shortMessageHtmlLink":"Merge pull request #1935 from cloudbreak/merge-285-dr-1"}},{"before":"27b49444fc9edc8471cdbbcf97d6a2cf4e6230b9","after":"706b79267feb95b351bb30d9793195d9d111c387","ref":"refs/heads/master","pushedAt":"2024-06-05T11:30:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25794 StackV4 API endpoint for Rotate RDS Certificate\n\nRefactored the DistroX endpoint related calls to unify them into the\nStack endpoint.\nIt will be called from Datalake service as well.","shortMessageHtmlLink":"CB-25794 StackV4 API endpoint for Rotate RDS Certificate"}},{"before":"d100a50b2c435b4ac022a384f3f4882702feab83","after":"27b49444fc9edc8471cdbbcf97d6a2cf4e6230b9","ref":"refs/heads/master","pushedAt":"2024-06-05T11:18:30.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25855 adding n2-highmem-2,n2-highmem-4,n2-highmem-8,n2-highmem-16,n2-highmem-32,n2-highmem-48,n2-highmem-64,n2-highmem-80,n2-highmem-96,n2-highmem-128, ,n4-standard-2,n4-standard-4,n4-standard-8,n4-standard-16,n4-standard-32,n4-standard-48,n4-standard-64,n4-standard-80, ,n4-highmem-2,n4-highmem-4,n4-highmem-8,n4-highmem-16,n4-highmem-32,n4-highmem-48,n4-highmem-64,n4-highmem-80 to google cloud","shortMessageHtmlLink":"CB-25855 adding n2-highmem-2,n2-highmem-4,n2-highmem-8,n2-highmem-16,…"}},{"before":"e89fb45eb9c69a68da86463cdaa36abca1983baf","after":"d100a50b2c435b4ac022a384f3f4882702feab83","ref":"refs/heads/master","pushedAt":"2024-06-05T11:12:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25967 adding 30 seconds as timeout to remote env requests","shortMessageHtmlLink":"CB-25967 adding 30 seconds as timeout to remote env requests"}},{"before":"d278ffdbe5d00b8462d15f16878771828569a7fe","after":"e89fb45eb9c69a68da86463cdaa36abca1983baf","ref":"refs/heads/master","pushedAt":"2024-06-05T07:42:54.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25823 Gather test suites for image validation tests\n\nNew integration-test command was introduced: imagevalidation. This will gather the tests to run based on image validation type. A basic test will be run as a gatekeeper first, and in case of success all the additional tests will run.","shortMessageHtmlLink":"CB-25823 Gather test suites for image validation tests"}},{"before":"359aa5bf96fb05ce75f78b41626178b5d7b772d4","after":"d278ffdbe5d00b8462d15f16878771828569a7fe","ref":"refs/heads/master","pushedAt":"2024-06-04T14:23:07.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"Merge pull request #1920 from cloudbreak/mrg285\n\n Merge remote-tracking branch 'origin/CB-2.85.0' into master","shortMessageHtmlLink":"Merge pull request #1920 from cloudbreak/mrg285"}},{"before":"b6857ebed62f87710530fb74a1cf728e04923fb9","after":"359aa5bf96fb05ce75f78b41626178b5d7b772d4","ref":"refs/heads/master","pushedAt":"2024-06-04T13:47:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-23828 Implement restore backup step for FreeIPA rebuild\n\nBased on the restore doc:\n- restore full backup which would fail, it's expected (caused by `/etc/hosts` restored from backup too)\n- fix `/etc/hosts`\n- restart FreeIPA services\n- restore data backup\n- fix DNS records for the restored server as the IP is different. Both reverse and A record is updated\n- cleanup SSSD cache","shortMessageHtmlLink":"CB-23828 Implement restore backup step for FreeIPA rebuild"}},{"before":"75f0c036eaa078ad069311f98d9ddbb9e85a0cee","after":"b6857ebed62f87710530fb74a1cf728e04923fb9","ref":"refs/heads/master","pushedAt":"2024-06-04T11:58:00.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"Merge pull request #1916 from cloudbreak/merge-285-to-master\n\nMerge 285 to master","shortMessageHtmlLink":"Merge pull request #1916 from cloudbreak/merge-285-to-master"}},{"before":"1f87cafea1a2533fbfdc70857dcf349e978c6ec2","after":"75f0c036eaa078ad069311f98d9ddbb9e85a0cee","ref":"refs/heads/master","pushedAt":"2024-06-04T11:07:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25977 Adding new instance types for Azure","shortMessageHtmlLink":"CB-25977 Adding new instance types for Azure"}},{"before":"ddbf6487931610a795ae0077b5eb6ec70a292766","after":"1f87cafea1a2533fbfdc70857dcf349e978c6ec2","ref":"refs/heads/master","pushedAt":"2024-06-04T09:37:23.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"Merge pull request #1913 from cloudbreak/merge-285-to-master\n\nMerge 285 to master","shortMessageHtmlLink":"Merge pull request #1913 from cloudbreak/merge-285-to-master"}},{"before":"0e6b3b5da1328e88c26673ab0e059f6659028b10","after":"ddbf6487931610a795ae0077b5eb6ec70a292766","ref":"refs/heads/master","pushedAt":"2024-06-04T07:52:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25939 - Fix verify-full issue on GCP embedded DB\n1. Hive metastore service in datahub connects to datalake external db, hence there is a connection error with verify-full ssl mode.\n2. if the service is hive metastore set the ssl mode as verify-ca for gcp cloud in HiveMetastoreConfigProvider\n3. for all other datahub services with embedded db set ssl mode to verify-full for gcp cloud.","shortMessageHtmlLink":"CB-25939 - Fix verify-full issue on GCP embedded DB"}},{"before":"8ff57432513824d9904a4f2fe855b9d4e80fad22","after":"0e6b3b5da1328e88c26673ab0e059f6659028b10","ref":"refs/heads/master","pushedAt":"2024-06-03T13:28:03.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25126 Remove CDP_FMS_DELAYED_STOP_START entitlement","shortMessageHtmlLink":"CB-25126 Remove CDP_FMS_DELAYED_STOP_START entitlement"}},{"before":"3ce02599c1388a19c2a8d9d79858e79482ee7a11","after":"8ff57432513824d9904a4f2fe855b9d4e80fad22","ref":"refs/heads/master","pushedAt":"2024-06-03T12:42:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25830 Remove CDP_POSTGRES_UPGRADE_EMBEDDED entitlement","shortMessageHtmlLink":"CB-25830 Remove CDP_POSTGRES_UPGRADE_EMBEDDED entitlement"}},{"before":"1d49080173b3bed93de7b4c6caf4ebd4e7065ab2","after":"3ce02599c1388a19c2a8d9d79858e79482ee7a11","ref":"refs/heads/master","pushedAt":"2024-06-03T12:36:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25126 Remove CDP_FMS_USERSYNC_THREAD_TIMEOUT entitlement","shortMessageHtmlLink":"CB-25126 Remove CDP_FMS_USERSYNC_THREAD_TIMEOUT entitlement"}},{"before":"fd1cd751d9ef8decfb1c84fc332621ac7a294717","after":"1d49080173b3bed93de7b4c6caf4ebd4e7065ab2","ref":"refs/heads/master","pushedAt":"2024-06-03T11:18:54.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25979 - Validation of custom instance type for resize\nIf a instance type is not supported it should fail in the request","shortMessageHtmlLink":"CB-25979 - Validation of custom instance type for resize"}},{"before":"0af812505cff7b491bb541b825d2bb239b18a57d","after":"fd1cd751d9ef8decfb1c84fc332621ac7a294717","ref":"refs/heads/master","pushedAt":"2024-06-03T11:10:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25538 Cloud module: Update AWS KMS key policy\n\n* EncryptionResources:\n * Rename the method argument holding the input details to simply\n \"request\".\n * Add new method updateEncryptionKeyResourceAccess() for making\n changes to the access settings associated with a cloud encryption\n key.\n * Currently only implemented for AWS (both commercial & GovCloud); see\n below. This is not yet integrated into the cluster lifecycle,\n though. Respective changes to freeipa and core will follow in later\n commits.\n * The input is wrapped in an UpdateEncryptionKeyResourceAccessRequest\n instance:\n * cloudContext: Only the location is of interest.\n * cloudCredential: Cloud provider specific details from the CDP\n credential.\n * cloudResource: Target cloud encryption key to be updated. Must\n represent an AWS KMS customer-managed key.\n * administratorPrincipalsToAdd: List of principals to add to the\n \"key administrators\" statement of the KMS resource policy.\n * administratorPrincipalsToRemove: List of principals to remove from\n the \"key administrators\" statement of the KMS resource policy.\n * cryptographicPrincipalsToAdd: List of principals to add to the\n \"key users for cryptographic operations\" statement of the KMS\n resource policy.\n * cryptographicPrincipalsToRemove: List of principals to remove from\n the \"key users for cryptographic operations\" statement of the KMS\n resource policy.\n * cryptographicAuthorizedClientsToAdd: List of client IDs to add to\n the conditions of the \"key users for cryptographic operations\"\n statement of the KMS resource policy.\n * cryptographicAuthorizedClientsToRemove: List of client IDs to\n remove from the conditions of the \"key users for cryptographic\n operations\" statement of the KMS resource policy.\n* AwsEncryptionResources.updateEncryptionKeyResourceAccess():\n * Every principal must be an IAM role or instance profile resource\n ARN.\n * Authorized clients are AWS Secrets Managers secret or Amazon EC2\n instance resource ARNs.\n * Every principal or authorized client list is optional and may be\n empty.\n * Arbitrary number of principals or authorized clients may be\n provided.\n * Since the underlying KMS operations are very costly (in terms of API\n throttling limits), it is advisable to perform a single invocation\n of updateEncryptionKeyResourceAccess() for multiple principals and /\n or authorized clients (as a batch operation) instead of multiple\n calls for individual principals etc. A single\n updateEncryptionKeyResourceAccess() invocation corresponds to a\n single call of kms:GetKeyPolicy followed by another single call of\n kms:PutKeyPolicy. (Yes, this is not an atomic operation.)\n * The logic assumes that the KMS key policy is not manipulated by some\n other means. In particular, no concurrent key policy updates may be\n made by other tools (e.g. customer tooling or organization policy\n enforcement). Even if the customer has to make changes to the key\n policy, they must not modify the statements added & managed by CDP.\n (See the relevant statement IDs\n POLICY_STATEMENT_ID_KEY_ADMINISTRATOR and\n POLICY_STATEMENT_ID_KEY_CRYPTOGRAPHIC_USER).\n* AwsEncryptionResources.createEncryptionKey(): Add logic for validating\n the EncryptionKeyCreationRequest instance.\n* AwsSecretsManagerConnector:\n * Extract validateRequestCloudResource() into CloudResourceHelper.\n * updateCloudSecretResourceAccess():\n * Add logic for validating the\n UpdateCloudSecretResourceAccessRequest instance.\n * Add logic for mapping EC2 instance profile ARNs to their\n associated IAM roles. This is based on\n AwsIamService.getEffectivePrincipals().\n * Update naming convention for variables & arguments\n cryptographicPrincipals and cryptographicAuthorizedClients.\n* CloudResourceHelper.validateRequestCloudResource():\n * Extracted from AwsSecretsManagerConnector to be usable across\n multiple classes.\n * Add validation for the ResourceType.\n* CloudSecret: Update naming convention for properties\n cryptographicPrincipals and cryptographicAuthorizedClients.\n* EncryptionKeyCreationRequest:\n * Does not implement CloudPlatformAware anymore.\n * Update naming convention for property cryptographicPrincipals.\n* UpdateCloudSecretResourceAccessRequest: Update naming convention for\n properties cryptographicPrincipals and cryptographicAuthorizedClients.\n* Some code cleanup.\n* Testing:\n * Manual test with new environment, using cloud platform AWS GovCloud.\n CreateUserDataHandler (freeipa) has temporarily been tweaked to call\n EncryptionResources.updateEncryptionKeyResourceAccess() for a\n pre-created KMS key.\n * Added new UT & adapted existing ones.","shortMessageHtmlLink":"CB-25538 Cloud module: Update AWS KMS key policy"}},{"before":"295bed02ad2c09e54313fab156d546e17b8f916b","after":"0af812505cff7b491bb541b825d2bb239b18a57d","ref":"refs/heads/master","pushedAt":"2024-06-02T19:42:14.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-24912 Create EDH tracking on enablement/disablement of prometheus agent","shortMessageHtmlLink":"CB-24912 Create EDH tracking on enablement/disablement of prometheus …"}},{"before":"73792d014e2040cb6134d070d9fb3cda8308cdd8","after":"a1704a0b0f00af5efa7817c254c526328af83ead","ref":"refs/heads/dependabot/gradle/com.google.cloud-google-cloud-storage-2.39.0","pushedAt":"2024-06-01T06:44:19.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump com.google.cloud:google-cloud-storage from 2.23.0 to 2.39.0\n\nBumps [com.google.cloud:google-cloud-storage](https://github.com/googleapis/java-storage) from 2.23.0 to 2.39.0.\n- [Release notes](https://github.com/googleapis/java-storage/releases)\n- [Changelog](https://github.com/googleapis/java-storage/blob/main/CHANGELOG.md)\n- [Commits](https://github.com/googleapis/java-storage/compare/v2.23.0...v2.39.0)\n\n---\nupdated-dependencies:\n- dependency-name: com.google.cloud:google-cloud-storage\n dependency-type: direct:production\n update-type: version-update:semver-minor\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump com.google.cloud:google-cloud-storage from 2.23.0 to 2.39.0"}},{"before":"cc231e42dac3aae524b0a4ac7f69ebc02c24a443","after":"295bed02ad2c09e54313fab156d546e17b8f916b","ref":"refs/heads/master","pushedAt":"2024-06-01T06:42:55.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"Bump com.google.http-client:google-http-client-jackson2\n\nBumps [com.google.http-client:google-http-client-jackson2](https://github.com/googleapis/google-http-java-client) from 1.43.3 to 1.44.2.\n- [Release notes](https://github.com/googleapis/google-http-java-client/releases)\n- [Changelog](https://github.com/googleapis/google-http-java-client/blob/main/CHANGELOG.md)\n- [Commits](https://github.com/googleapis/google-http-java-client/compare/v1.43.3...v1.44.2)\n\n---\nupdated-dependencies:\n- dependency-name: com.google.http-client:google-http-client-jackson2\n dependency-type: direct:production\n update-type: version-update:semver-minor\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump com.google.http-client:google-http-client-jackson2"}},{"before":"d972d0167f1242ae6c88fedcf2e5cb0153cdc1cb","after":null,"ref":"refs/heads/dependabot/gradle/com.nimbusds-nimbus-jose-jwt-9.39.3","pushedAt":"2024-06-01T06:33:53.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"fd623425715cef11cbce6ea262a7e348c06abc05","after":"cc231e42dac3aae524b0a4ac7f69ebc02c24a443","ref":"refs/heads/master","pushedAt":"2024-06-01T06:32:40.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"Bump com.nimbusds:nimbus-jose-jwt from 9.39.2 to 9.39.3\n\nBumps [com.nimbusds:nimbus-jose-jwt](https://bitbucket.org/connect2id/nimbus-jose-jwt) from 9.39.2 to 9.39.3.\n- [Changelog](https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt)\n- [Commits](https://bitbucket.org/connect2id/nimbus-jose-jwt/branches/compare/9.39.3..9.39.2)\n\n---\nupdated-dependencies:\n- dependency-name: com.nimbusds:nimbus-jose-jwt\n dependency-type: direct:production\n update-type: version-update:semver-patch\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump com.nimbusds:nimbus-jose-jwt from 9.39.2 to 9.39.3"}},{"before":"ad279697c0cf9489ecc00eb52c516b8016ddb2a9","after":"fd623425715cef11cbce6ea262a7e348c06abc05","ref":"refs/heads/master","pushedAt":"2024-06-01T06:22:30.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"Bump com.google.apis:google-api-services-compute\n\nBumps com.google.apis:google-api-services-compute from v1-rev20240519-2.0.0 to v1-rev20240521-2.0.0.\n\n---\nupdated-dependencies:\n- dependency-name: com.google.apis:google-api-services-compute\n dependency-type: direct:production\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump com.google.apis:google-api-services-compute"}},{"before":null,"after":"ee9c4a4ba75fffb7e54046f1d0ae71d7c51ec123","ref":"refs/heads/dependabot/gradle/com.google.guava-guava-33.2.1-jre","pushedAt":"2024-05-31T20:55:42.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump com.google.guava:guava from 33.2.0-jre to 33.2.1-jre\n\nBumps [com.google.guava:guava](https://github.com/google/guava) from 33.2.0-jre to 33.2.1-jre.\n- [Release notes](https://github.com/google/guava/releases)\n- [Commits](https://github.com/google/guava/commits)\n\n---\nupdated-dependencies:\n- dependency-name: com.google.guava:guava\n dependency-type: direct:production\n update-type: version-update:semver-patch\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump com.google.guava:guava from 33.2.0-jre to 33.2.1-jre"}},{"before":"0d9c7337e61ea75649dacc1a305c1ca03af4cdcd","after":null,"ref":"refs/heads/dependabot/gradle/commons-net-commons-net-3.10.0","pushedAt":"2024-05-31T20:55:01.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":null,"after":"6df89b8ad7c52c6bc168cda6f1f1c666c715fab4","ref":"refs/heads/dependabot/gradle/commons-net-commons-net-3.11.0","pushedAt":"2024-05-31T20:54:57.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump commons-net:commons-net from 3.10.0 to 3.11.0\n\nBumps commons-net:commons-net from 3.10.0 to 3.11.0.\n\n---\nupdated-dependencies:\n- dependency-name: commons-net:commons-net\n dependency-type: direct:production\n update-type: version-update:semver-minor\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump commons-net:commons-net from 3.10.0 to 3.11.0"}},{"before":"1446fc2ef01cb6ab20eb9f8dea7570e08f161dfa","after":"ad279697c0cf9489ecc00eb52c516b8016ddb2a9","ref":"refs/heads/master","pushedAt":"2024-05-31T20:13:32.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25810 personalresourceviewclient should throw 401 instead of 500 if user not found","shortMessageHtmlLink":"CB-25810 personalresourceviewclient should throw 401 instead of 500 i…"}},{"before":"202ea51ad52841deaeec6b596e4f499f68e8d5c0","after":"1446fc2ef01cb6ab20eb9f8dea7570e08f161dfa","ref":"refs/heads/master","pushedAt":"2024-05-31T08:30:59.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25954 Default RDS instance size db.m5.large is not available in AWS Calgary (ca-west-1)","shortMessageHtmlLink":"CB-25954 Default RDS instance size db.m5.large is not available in AW…"}},{"before":"5dca67cb30cb73d5f35827c9723c9fd0f24f372a","after":"202ea51ad52841deaeec6b596e4f499f68e8d5c0","ref":"refs/heads/master","pushedAt":"2024-05-31T04:54:08.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"CB-25914 DL should be queried using sdxconnector for basic informations (crn, name, runtime, shape, db crn, etc.)","shortMessageHtmlLink":"CB-25914 DL should be queried using sdxconnector for basic informatio…"}},{"before":"dc65ec545966767af699698a5f865782f1217d08","after":"5dca67cb30cb73d5f35827c9723c9fd0f24f372a","ref":"refs/heads/master","pushedAt":"2024-05-31T01:29:32.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"jenkins-daemon","name":"Cloudera","path":"/jenkins-daemon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5150045?s=80&v=4"},"commit":{"message":"Merge pull request #1881 from cloudbreak/CB-25943\n\nCB-25943 Add Service Config for ICEBERG_REPLICATION service","shortMessageHtmlLink":"Merge pull request #1881 from cloudbreak/CB-25943"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEXVN91gA","startCursor":null,"endCursor":null}},"title":"Activity · hortonworks/cloudbreak"}