This is the development release series of HTCondor. The details of each version are described below.
Release Notes:
Known Issues:
This release may require configuration changes to work as before. During this release series, we are making changes to make it easier to deploy secure pools. This release contains two security related configuration changes.
On most pools, the easiest way to get the previous behavior is to add the following to your configuration:
The main configuration file (/etc/condor/condor_config) already implements the above change by calling use SECURITY : HOST_BASED.
With the addition of the automatic security session for a family of HTCondor daemons and the existing match password authentication between the execute and submit daemons, most hosts in a pool may not require changes to the configuration files. On the central manager, you do need to ensure DAEMON level access for your submit nodes. Also, CCB requires DAEMON level access.
New Features:
By default, any user with access to a privileged EC2 instance has access to that instance’s privileges. If you would like to make use of this feature, please read 6.4.1 before adding privileges (an instance role) to an instance which allows access by other users, specifically including the submitting of jobs to or running jobs on that instance. (Ticket #6789).
Bugs Fixed: