June 11, 2020

The Arvados team is pleased to announce Arvados 2.0.3. We recommend that new and existing installations of 2.0.2 or earlier upgrade to 2.0.3. See Upgrading Arvados for upgrade instructions.

New features

#16435

The arvados-sync-groups tool now supports specifying the level of access (can_read, can_write, can_manage) that will be granted to each member of the group.

#16419

The Arvados Python SDK now honors the environment variable SSL_CERT_FILE as a user-supplied path to a certificate bundle file.

#16328

Keepproxy will use config.yml to discover upstream keepstores, if Services/Keepstore/InternalURLs is defined. Please make sure there are no trailing slashes in the Services/Keepstore/InternalURLs entries.

Bugs fixed

#16349

Database connections are now explicitly set to UTC time zone. This avoids timestamp comparison bugs when the Arvados API server and Postgres database are configured for different time zones.

#16439

Workbench 2: The “New” button will now create items in the expected location when the current selection is a project in “Shared with me” or “Favorites”.

#16373

arvados-docker-cleaner now installs a systemd service file.

#16391

When sbatch returns an error, crunch-dispatch-slurm reports the error instead of printing “PANIC”.

#16387

Fix cached user update error when using LoginCluster and a previously active user is deactivated.

#16343

Fix handling of create container request when LoginCluster is set.

#16434

python3-distutils dependency added to python3-arvados-cwl-runner package.

#16366

Documentation uses consistent values for InternalURLs in examples.

#16393

Keepproxy uses a longer timeout when forwarding uploaded data to keepstore. Avoids upload failures when external clients are slow and take longer than 45 seconds to upload a block.

#16340

No longer ignores the flag to request preemptible instances on AWS in arvados-dispatch-cloud.

#16339

Bugfix for packing CWL files with a $schemas section.

#16492 #16341

Version updates to 3rd party dependencies to address reported vulnerabilities.