{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":36653430,"defaultBranch":"main","name":"nomad","ownerLogin":"hashicorp","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2015-06-01T10:21:00.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/761456?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1721314446.0","currentOid":""},"activityList":{"items":[{"before":"dcba4127b21e37299499fa23dcfee3a85168609a","after":"53397170c6f008a63a14a6e45fb4028304183b2f","ref":"refs/heads/optimize-seekprefix","pushedAt":"2024-07-18T15:56:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"absolutelightning","name":"Ashesh Vidyut","path":"/absolutelightning","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/134911583?s=80&v=4"},"commit":{"message":"fix go mod tidy","shortMessageHtmlLink":"fix go mod tidy"}},{"before":"e3d449a5a471c9ac709ce5b2428b46d14e0ae1e4","after":"c1e9132a816dc8bf74ae5d77ea8b2329284854f7","ref":"refs/heads/e2e-keyring-external-kms","pushedAt":"2024-07-18T15:39:16.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"E2E test","shortMessageHtmlLink":"E2E test"}},{"before":"53397170c6f008a63a14a6e45fb4028304183b2f","after":"dcba4127b21e37299499fa23dcfee3a85168609a","ref":"refs/heads/optimize-seekprefix","pushedAt":"2024-07-18T15:36:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"absolutelightning","name":"Ashesh Vidyut","path":"/absolutelightning","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/134911583?s=80&v=4"},"commit":{"message":"removed snapshot","shortMessageHtmlLink":"removed snapshot"}},{"before":"857f20e0ba41e616ddeaaffd5408281bae6d6e4d","after":"042ddb272ad955fd8d36b25b3be0a81ebfa1b2e1","ref":"refs/heads/23615-ui-volume-details-unescape-pathslash","pushedAt":"2024-07-18T15:32:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"philrenaud","name":"Phil Renaud","path":"/philrenaud","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/713991?s=80&v=4"},"commit":{"message":"Unescape csi/ in plugin GET requests","shortMessageHtmlLink":"Unescape csi/ in plugin GET requests"}},{"before":null,"after":"857f20e0ba41e616ddeaaffd5408281bae6d6e4d","ref":"refs/heads/23615-ui-volume-details-unescape-pathslash","pushedAt":"2024-07-18T14:54:06.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philrenaud","name":"Phil Renaud","path":"/philrenaud","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/713991?s=80&v=4"},"commit":{"message":"deps: update go-kms-wrapping and Azure SDK (#23622)\n\nI'm pulling this out to a shared PR between the two, because it'll make\r\nbackporting easier.\r\n\r\nCloses: #23621\r\nCloses: #23589","shortMessageHtmlLink":"deps: update go-kms-wrapping and Azure SDK (#23622)"}},{"before":null,"after":"74bb9ea355180808f626db0c02f2948acd269950","ref":"refs/heads/b-fixup-acl-login-api-doc-url-path","pushedAt":"2024-07-18T14:25:00.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jrasell","name":"James Rasell","path":"/jrasell","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/2980562?s=80&v=4"},"commit":{"message":"docs: Fix ACL login API path documentation.","shortMessageHtmlLink":"docs: Fix ACL login API path documentation."}},{"before":"639701341bb36d29f5c759c96641cdc0052e7a3f","after":null,"ref":"refs/heads/dependabot/go_modules/github.com/Azure/azure-sdk-for-go/sdk/azidentity-1.6.0","pushedAt":"2024-07-18T14:18:52.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"0f275c496a8570a1b1f63109f4bb58ffa13ab4e2","after":null,"ref":"refs/heads/dependabot/go_modules/github.com/hashicorp/go-kms-wrapping/v2-2.0.16","pushedAt":"2024-07-18T14:18:52.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"620c24fcd786e8858c07d15e30f741b01b3eb12f","after":null,"ref":"refs/heads/kms-deps","pushedAt":"2024-07-18T14:18:45.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"}},{"before":"c970d22164626bb674396031c83c1a495975894e","after":"857f20e0ba41e616ddeaaffd5408281bae6d6e4d","ref":"refs/heads/main","pushedAt":"2024-07-18T14:18:42.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"deps: update go-kms-wrapping and Azure SDK (#23622)\n\nI'm pulling this out to a shared PR between the two, because it'll make\r\nbackporting easier.\r\n\r\nCloses: #23621\r\nCloses: #23589","shortMessageHtmlLink":"deps: update go-kms-wrapping and Azure SDK (#23622)"}},{"before":"003c19862cd8c2f145bf7eae20bc3136c2e81d63","after":null,"ref":"refs/heads/backport/keyring-external-kms/presently-rapid-salmon","pushedAt":"2024-07-18T14:18:34.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"}},{"before":"22b93a8006c441127c4b12225c0e8214b6676a30","after":"7785e45796c8f540463a65e49f549e85522268c5","ref":"refs/heads/release/1.8.x","pushedAt":"2024-07-18T14:18:32.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"Backport of keyring: support external KMS for key encryption key (KEK) into release/1.8.x (#23620)\n\nIn Nomad 1.4.0, we shipped support for encrypted Variables and signed Workload\r\nIdentities, but the key material is protected only by a AEAD encrypting the\r\nKEK. Add support for Vault transit encryption and external KMS from major cloud\r\nproviders. The servers call out to the external service to decrypt each key in\r\nthe on-disk keystore.\r\n\r\nRef: https://hashicorp.atlassian.net/browse/NET-10334\r\nFixes: https://github.com/hashicorp/nomad/issues/14852\r\n\r\nCo-authored-by: Tim Gross ","shortMessageHtmlLink":"Backport of keyring: support external KMS for key encryption key (KEK…"}},{"before":"a118ce1972db76451ff49d6d1a9d2c2ca1c64613","after":"53397170c6f008a63a14a6e45fb4028304183b2f","ref":"refs/heads/optimize-seekprefix","pushedAt":"2024-07-18T14:04:08.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"absolutelightning","name":"Ashesh Vidyut","path":"/absolutelightning","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/134911583?s=80&v=4"},"commit":{"message":"fix go mod tidy","shortMessageHtmlLink":"fix go mod tidy"}},{"before":"e6d2fe58e5dbf2e6ba60c3f7284e78178857cf75","after":"719b42eff62dfb17e2444d41e5a3c6b2085ec3f6","ref":"refs/heads/keyring-rotation-and-prepublish","pushedAt":"2024-07-18T14:00:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"keyring: support prepublishing keys\n\nWhen a root key is rotated, the servers immediately start signing Workload\nIdentities with the new active key. But workloads may be using those WI tokens\nto sign into external services, which may not have had time to fetch the new\npublic key and which might try to fetch new keys as needed.\n\nAdd support for prepublishing keys. Prepublished keys will be visible in the\nJWKS endpoint but will not be used for signing or encryption until their\n`PublishTime`. Update the periodic key rotation to prepublish keys at half the\n`root_key_rotation_threshold` window, and promote prepublished keys to active\nafter the `PublishTime`.\n\nThis changeset also fixes two bugs in periodic root key rotation and garbage\ncollection, both of which can't be safely fixed without implementing\nprepublishing:\n\n* Periodic root key rotation would never happen because the default\n `root_key_rotation_threshold` of 720h exceeds the 72h maximum window of the FSM\n time table. We now compare the `CreateTime` against the wall clock time instead\n of the time table. (We expect to remove the time table in future work, ref\n https://github.com/hashicorp/nomad/issues/16359)\n* Root key garbage collection could GC keys that were used to sign\n identities. We now wait until `root_key_rotation_threshold` +\n `root_key_gc_threshold` before GC'ing a key.\n* When rekeying a root key, the core job did not mark the key as inactive after\n the rekey was complete.\n\nRef: https://hashicorp.atlassian.net/browse/NET-10398\nRef: https://hashicorp.atlassian.net/browse/NET-10280\nFixes: https://github.com/hashicorp/nomad/issues/19669\nFixes: https://github.com/hashicorp/nomad/issues/23528\nFixes: https://github.com/hashicorp/nomad/issues/19368","shortMessageHtmlLink":"keyring: support prepublishing keys"}},{"before":"6ede3ddc500be361b7a65e64300f2f81465f1325","after":"e6d2fe58e5dbf2e6ba60c3f7284e78178857cf75","ref":"refs/heads/keyring-rotation-and-prepublish","pushedAt":"2024-07-18T13:59:31.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"keyring: support prepublishing keys\n\nWhen a root key is rotated, the servers immediately start signing Workload\nIdentities with the new active key. But workloads may be using those WI tokens\nto sign into external services, which may not have had time to fetch the new\npublic key and which might try to fetch new keys as needed.\n\nAdd support for prepublishing keys. Prepublished keys will be visible in the\nJWKS endpoint but will not be used for signing or encryption until their\n`PublishTime`. Update the periodic key rotation to prepublish keys at half the\n`root_key_rotation_threshold` window, and promote prepublished keys to active\nafter the `PublishTime`.\n\nThis changeset also fixes two bugs in periodic root key rotation and garbage\ncollection, both of which can't be safely fixed without implementing\nprepublishing:\n\n* Periodic root key rotation would never happen because the default\n `root_key_rotation_threshold` of 720h exceeds the 72h maximum window of the FSM\n time table. We now compare the `CreateTime` against the wall clock time instead\n of the time table. (We expect to remove the time table in future work, ref\n https://github.com/hashicorp/nomad/issues/16359)\n* Root key garbage collection could GC keys that were used to sign\n identities. We now wait until `root_key_rotation_threshold` +\n `root_key_gc_threshold` before GC'ing a key.\n* When rekeying a root key, the core job did not mark the key as inactive after\n the rekey was complete.\n\nRef: https://hashicorp.atlassian.net/browse/NET-10398\nRef: https://hashicorp.atlassian.net/browse/NET-10280\nFixes: https://github.com/hashicorp/nomad/issues/19669\nFixes: https://github.com/hashicorp/nomad/issues/23528\nFixes: https://github.com/hashicorp/nomad/issues/19368","shortMessageHtmlLink":"keyring: support prepublishing keys"}},{"before":"fa0919db2b11ba7322c87de1761eea0b775b6d83","after":"a118ce1972db76451ff49d6d1a9d2c2ca1c64613","ref":"refs/heads/optimize-seekprefix","pushedAt":"2024-07-18T13:58:11.000Z","pushType":"push","commitsCount":152,"pusher":{"login":"absolutelightning","name":"Ashesh Vidyut","path":"/absolutelightning","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/134911583?s=80&v=4"},"commit":{"message":"merge main","shortMessageHtmlLink":"merge main"}},{"before":null,"after":"fa0919db2b11ba7322c87de1761eea0b775b6d83","ref":"refs/heads/optimize-seekprefix","pushedAt":"2024-07-18T13:56:22.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"absolutelightning","name":"Ashesh Vidyut","path":"/absolutelightning","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/134911583?s=80&v=4"},"commit":{"message":"opt seekprefix","shortMessageHtmlLink":"opt seekprefix"}},{"before":"8a62a3e0196966196dfb6a4d78fcef273c28879a","after":"003c19862cd8c2f145bf7eae20bc3136c2e81d63","ref":"refs/heads/backport/keyring-external-kms/presently-rapid-salmon","pushedAt":"2024-07-18T13:55:03.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"deps: update go-kms-wrapping and Azure SDK\n\nI'm pulling this out to a shared PR between the two, because it'll make\nbackporting easier.\n\nCloses: #23621\nCloses: #23589","shortMessageHtmlLink":"deps: update go-kms-wrapping and Azure SDK"}},{"before":null,"after":"620c24fcd786e8858c07d15e30f741b01b3eb12f","ref":"refs/heads/kms-deps","pushedAt":"2024-07-18T13:54:24.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"deps: update go-kms-wrapping and Azure SDK\n\nI'm pulling this out to a shared PR between the two, because it'll make\nbackporting easier.\n\nCloses: #23621\nCloses: #23589","shortMessageHtmlLink":"deps: update go-kms-wrapping and Azure SDK"}},{"before":"3a5b9252cedca03ec2ae0b1ecc94f754aa303a78","after":"8a62a3e0196966196dfb6a4d78fcef273c28879a","ref":"refs/heads/backport/keyring-external-kms/presently-rapid-salmon","pushedAt":"2024-07-18T13:46:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"keyring: support external KMS for key encryption key (KEK) (#23580)\n\nIn Nomad 1.4.0, we shipped support for encrypted Variables and signed Workload\nIdentities, but the key material is protected only by a AEAD encrypting the\nKEK. Add support for Vault transit encryption and external KMS from major cloud\nproviders. The servers call out to the external service to decrypt each key in\nthe on-disk keystore.\n\nRef: https://hashicorp.atlassian.net/browse/NET-10334\nFixes: https://github.com/hashicorp/nomad/issues/14852","shortMessageHtmlLink":"keyring: support external KMS for key encryption key (KEK) (#23580)"}},{"before":"4e1ae78a59fa4f484ff0c7ded855014116efb6b6","after":"0f275c496a8570a1b1f63109f4bb58ffa13ab4e2","ref":"refs/heads/dependabot/go_modules/github.com/hashicorp/go-kms-wrapping/v2-2.0.16","pushedAt":"2024-07-18T13:44:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"chore(deps): bump github.com/hashicorp/go-kms-wrapping/v2\n\nBumps [github.com/hashicorp/go-kms-wrapping/v2](https://github.com/hashicorp/go-kms-wrapping) from 2.0.15 to 2.0.16.\n- [Commits](https://github.com/hashicorp/go-kms-wrapping/compare/v2.0.15...v2.0.16)\n\n---\nupdated-dependencies:\n- dependency-name: github.com/hashicorp/go-kms-wrapping/v2\n dependency-type: direct:production\n update-type: version-update:semver-patch\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"chore(deps): bump github.com/hashicorp/go-kms-wrapping/v2"}},{"before":null,"after":"639701341bb36d29f5c759c96641cdc0052e7a3f","ref":"refs/heads/dependabot/go_modules/github.com/Azure/azure-sdk-for-go/sdk/azidentity-1.6.0","pushedAt":"2024-07-18T13:43:49.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"chore(deps): bump github.com/Azure/azure-sdk-for-go/sdk/azidentity\n\nBumps [github.com/Azure/azure-sdk-for-go/sdk/azidentity](https://github.com/Azure/azure-sdk-for-go) from 1.4.0 to 1.6.0.\n- [Release notes](https://github.com/Azure/azure-sdk-for-go/releases)\n- [Changelog](https://github.com/Azure/azure-sdk-for-go/blob/main/documentation/release.md)\n- [Commits](https://github.com/Azure/azure-sdk-for-go/compare/sdk/azcore/v1.4.0...sdk/azcore/v1.6.0)\n\n---\nupdated-dependencies:\n- dependency-name: github.com/Azure/azure-sdk-for-go/sdk/azidentity\n dependency-type: indirect\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"chore(deps): bump github.com/Azure/azure-sdk-for-go/sdk/azidentity"}},{"before":"22b93a8006c441127c4b12225c0e8214b6676a30","after":"3a5b9252cedca03ec2ae0b1ecc94f754aa303a78","ref":"refs/heads/backport/keyring-external-kms/presently-rapid-salmon","pushedAt":"2024-07-18T13:42:51.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"hc-github-team-nomad-core","name":null,"path":"/hc-github-team-nomad-core","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82989552?s=80&v=4"},"commit":{"message":"no-op commit due to failed cherry-picking","shortMessageHtmlLink":"no-op commit due to failed cherry-picking"}},{"before":"a51febb4400b2cc3b6ccaf6efa257da7b95067c2","after":"22b93a8006c441127c4b12225c0e8214b6676a30","ref":"refs/heads/backport/keyring-external-kms/presently-rapid-salmon","pushedAt":"2024-07-18T13:42:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"hc-github-team-nomad-core","name":null,"path":"/hc-github-team-nomad-core","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82989552?s=80&v=4"},"commit":{"message":"backport of commit 8cbd857ac955a156914eb8ac350fc3e46f10985a (#23611)\n\nCo-authored-by: Martina Santangelo <133785117+martisah@users.noreply.github.com>","shortMessageHtmlLink":"backport of commit 8cbd857 (#23611)"}},{"before":"22b93a8006c441127c4b12225c0e8214b6676a30","after":"a51febb4400b2cc3b6ccaf6efa257da7b95067c2","ref":"refs/heads/backport/keyring-external-kms/presently-rapid-salmon","pushedAt":"2024-07-18T13:42:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"hc-github-team-nomad-core","name":null,"path":"/hc-github-team-nomad-core","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82989552?s=80&v=4"},"commit":{"message":"backport of commit c970d22164626bb674396031c83c1a495975894e","shortMessageHtmlLink":"backport of commit c970d22"}},{"before":null,"after":"22b93a8006c441127c4b12225c0e8214b6676a30","ref":"refs/heads/backport/keyring-external-kms/presently-rapid-salmon","pushedAt":"2024-07-18T13:42:43.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"hc-github-team-nomad-core","name":null,"path":"/hc-github-team-nomad-core","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82989552?s=80&v=4"},"commit":{"message":"backport of commit 8cbd857ac955a156914eb8ac350fc3e46f10985a (#23611)\n\nCo-authored-by: Martina Santangelo <133785117+martisah@users.noreply.github.com>","shortMessageHtmlLink":"backport of commit 8cbd857 (#23611)"}},{"before":"0f2ca0813e82059df7e6b135d0602941feb8694d","after":null,"ref":"refs/heads/keyring-external-kms","pushedAt":"2024-07-18T13:42:31.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"}},{"before":"de10efa3fa3b72ccf0cde9a9b0eb1c9ed0cd309d","after":"c970d22164626bb674396031c83c1a495975894e","ref":"refs/heads/main","pushedAt":"2024-07-18T13:42:28.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"keyring: support external KMS for key encryption key (KEK) (#23580)\n\nIn Nomad 1.4.0, we shipped support for encrypted Variables and signed Workload\r\nIdentities, but the key material is protected only by a AEAD encrypting the\r\nKEK. Add support for Vault transit encryption and external KMS from major cloud\r\nproviders. The servers call out to the external service to decrypt each key in\r\nthe on-disk keystore.\r\n\r\nRef: https://hashicorp.atlassian.net/browse/NET-10334\r\nFixes: https://github.com/hashicorp/nomad/issues/14852","shortMessageHtmlLink":"keyring: support external KMS for key encryption key (KEK) (#23580)"}},{"before":"32f9274e8995e48bafafd90a8141634c0a8c912e","after":"9b3f186f64f6626bd50634e8e47c309eb94f47e7","ref":"refs/heads/docs-keyring-external-kms","pushedAt":"2024-07-18T13:37:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"reflow markdown, replace seal with keyring","shortMessageHtmlLink":"reflow markdown, replace seal with keyring"}},{"before":"512e150e48c8a21e6b94936a5eec87eca3ceb85c","after":"32f9274e8995e48bafafd90a8141634c0a8c912e","ref":"refs/heads/docs-keyring-external-kms","pushedAt":"2024-07-18T13:29:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"tgross","name":"Tim Gross","path":"/tgross","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1409219?s=80&v=4"},"commit":{"message":"Apply suggestions from code review\n\nCo-authored-by: Aimee Ukasick ","shortMessageHtmlLink":"Apply suggestions from code review"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEgxrEIgA","startCursor":null,"endCursor":null}},"title":"Activity · hashicorp/nomad"}