This project is mirrored from https://gitee.com/mirrors/nomad.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 12 Apr, 2022 1 commit
-
-
Tim Gross authored
Many of our scripts have a non-portable interpreter line for bash and use bash-specific variables like `BASH_SOURCE`. Update the interpreter line to be portable between various Linuxes and macOS without complaint from posix shell users.
-
- 29 Mar, 2022 1 commit
-
-
Tim Gross authored
-
- 25 Mar, 2022 1 commit
-
-
Tim Gross authored
Concurrent E2E runs can collide when provisioning policies on HCP Consul and HCP Vault. Namespace these by the test run name, as we do for most everything else.
-
- 18 Mar, 2022 1 commit
-
-
Tim Gross authored
Use HCP Consul and HCP Vault for the Consul and Vault clusters used in E2E testing. This has the following benefits: * Without the need to support mTLS bootstrapping for Consul and Vault, we can simplify the mTLS configuration by leaning on Terraform instead of janky bash shell scripting. * Vault bootstrapping is no longer required, so we can eliminate even more janky shell scripting * Our E2E exercises HCP, which is important to us as an organization * With the reduction in configurability, we can simplify the Terraform configuration and drop the complicated `provision.sh`/`provision.ps1` scripts we were using previously. We can template Nomad configuration files and upload them with the `file` provisioner. * Packer builds for Linux and Windows become much simpler. tl;dr way less janky shell scripting!
-
- 04 Mar, 2022 1 commit
-
-
Tim Gross authored
The `Metrics` suite uses prometheus to scrape Nomad metrics so that we're testing the full user experience of extracting metrics from Nomad. With the addition of mTLS, we need to make sure prometheus also has mTLS configuration because the metrics endpoint is protected. Update the Nomad client configuration and prometheus job to bind-mount the client's certs into the task so that the job can use these certs to scrape the server. This is a temporary solution that gets the job passing; we should give the job its own certificates (issued by Vault?) when we've done some of the infrastructure rework we'd like.
-
- 01 Mar, 2022 1 commit
-
-
Tim Gross authored
-
- 18 Jan, 2022 1 commit
-
-
Luiz Aoqui authored
-
- 02 Dec, 2021 2 commits
-
-
Tim Gross authored
-
Derek Strickland authored
* Update e2e/terraform configuration for Vault and default to mtls=true
-
- 16 Sep, 2021 1 commit
-
-
James Rasell authored
-
- 03 Sep, 2021 1 commit
-
-
Luiz Aoqui authored
-
- 30 Aug, 2021 1 commit
-
-
Mahmood Ali authored
This allows us to spin up e2e clusters with mTLS configured for all HashiCorp services, i.e. Nomad, Consul, and Vault. Used it for testing #11089 . mTLS is disabled by default. I have not updated Windows provisioning scripts yet - Windows also lacks ACL support from before. I intend to follow up for them in another round.
-
- 27 Aug, 2021 1 commit
-
-
James Rasell authored
-
- 07 Jun, 2021 1 commit
-
-
Michael Schurter authored
ipv4.icanhazip.com returns ipv6 addresses
-
- 04 Jun, 2021 4 commits
-
-
Mahmood Ali authored
-
Mahmood Ali authored
-
Mahmood Ali authored
-
Mahmood Ali authored
-
- 01 Jun, 2021 1 commit
-
-
Luiz Aoqui authored
-
- 25 May, 2021 1 commit
-
-
Mahmood Ali authored
Ease spinning up a cluster, where binaries are fetched from arbitrary urls. These could be CircleCI `build-binaries` job artifacts, or presigned S3 urls. Co-authored-by:
Tim Gross <tgross@hashicorp.com>
-
- 18 May, 2021 1 commit
-
-
Tim Gross authored
-
- 10 May, 2021 1 commit
-
-
Tim Gross authored
-
- 27 Apr, 2021 2 commits
-
-
Michael Schurter authored
-
Michael Schurter authored
Add a new driver capability: RemoteTasks. When a task is run by a driver with RemoteTasks set, its TaskHandle will be propagated to the server in its allocation's TaskState. If the task is replaced due to a down node or draining, its TaskHandle will be propagated to its replacement allocation. This allows tasks to be scheduled in remote systems whose lifecycles are disconnected from the Nomad node's lifecycle. See https://github.com/hashicorp/nomad-driver-ecs for an example ECS remote task driver.
-
- 14 Apr, 2021 1 commit
-
-
Seth Hoenig authored
Using Consul Enterprise is going to be necessary for testing Nomad's Consul Namespace integration in Nomad v1.1 in e2e.
-
- 09 Apr, 2021 1 commit
-
-
Tim Gross authored
The archive does not include the `pkg/windows_amd64` path and unpacking the archive happens in the installation directory.
-
- 08 Apr, 2021 2 commits
-
-
Tim Gross authored
The E2E provisioning used local-exec to call ssh in a for loop in a hacky workaround https://github.com/hashicorp/terraform/issues/25634, which prevented remote-exec from working on Windows. Move to a newer version of Terraform that fixes the remote-exec bug to make provisioning more reliable and observable. Note that Windows remote-exec needs to include the `powershell` call itself, unlike Unix-alike remote-exec.
-
Tim Gross authored
Split the EBS and EFS tests out into their own test cases: * EBS exercises the Controller RPCs, including the create/snapshot workflow. * EFS exercises only the Node RPCs, and assumes we have an existing volume that gets registered, rather than created.
-
- 25 Mar, 2021 1 commit
-
-
Drew Bailey authored
* allow setting an enterprise license environment variable * update comment * address pr comments
-
- 18 Mar, 2021 1 commit
-
-
Tim Gross authored
Add a `PerAlloc` field to volume requests that directs the scheduler to test feasibility for volumes with a source ID that includes the allocation index suffix (ex. `[0]`), rather than the exact source ID. Read the `PerAlloc` field when making the volume claim at the client to determine if the allocation index suffix (ex. `[0]`) should be added to the volume source ID.
-
- 08 Mar, 2021 1 commit
-
-
Tim Gross authored
-
- 23 Feb, 2021 1 commit
-
-
Seth Hoenig authored
This PR places StartLimitIntervalSec and StartLimitBurst in the Unit section of systemd unit files, rather than the Service section. https://www.freedesktop.org/software/systemd/man/systemd.unit.html Fixes #10065
-
- 18 Feb, 2021 1 commit
-
-
Drew Bailey authored
* fix periodic * update periodic to not use template nomad job inspect no longer returns an apiliststub so the required fields to query job summary are no longer there, parse cli output instead * rm tmp makefile entry * fix typo * revert makefile change
-
- 09 Feb, 2021 1 commit
-
-
Seth Hoenig authored
This PR enables jobs configured with a custom sidecar_task to make use of the `service.expose` feature for creating checks on services in the service mesh. Before we would check that sidecar_task had not been set (indicating that something other than envoy may be in use, which would not support envoy's expose feature). However Consul has not added support for anything other than envoy and probably never will, so having the restriction in place seems like an unnecessary hindrance. If Consul ever does support something other than Envoy, they will likely find a way to provide the expose feature anyway. Fixes #9854
-
- 02 Feb, 2021 1 commit
-
-
Chris Baker authored
-
- 01 Feb, 2021 1 commit
-
-
Mahmood Ali authored
Ensure that the e2e clusters are isolated and never attempt to autojoin with another e2e cluster. This ensures that each cluster servers have a unique `ConsulAutoJoin`, to be used for discovery.
-
- 26 Jan, 2021 1 commit
-
-
Mahmood Ali authored
-
- 25 Jan, 2021 1 commit
-
-
Mahmood Ali authored
-
- 22 Jan, 2021 1 commit
-
-
Drew Bailey authored
* Prevent Job Statuses from being calculated twice https://github.com/hashicorp/nomad/pull/8435 introduced atomic eval insertion iwth job (de-)registration. This change removes a now obsolete guard which checked if the index was equal to the job.CreateIndex, which would empty the status. Now that the job regisration eval insetion is atomic with the registration this check is no longer necessary to set the job statuses correctly. * test to ensure only single job event for job register * periodic e2e * separate job update summary step * fix updatejobstability to use copy instead of modified reference of job * update envoygatewaybindaddresses copy to prevent job diff on null vs empty * set ConsulGatewayBindAddress to empty map instead of nil fix nil assertions for empty map rm unnecessary guard
-
- 15 Jan, 2021 1 commit
-
-
Mahmood Ali authored
-