This project is mirrored from https://gitee.com/mirrors/nomad.git. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
  1. 12 Apr, 2022 1 commit
    • Tim Gross's avatar
      scripts: fix interpreter for bash (#12549) · 247e20e1
      Tim Gross authored
      Many of our scripts have a non-portable interpreter line for bash and
      use bash-specific variables like `BASH_SOURCE`. Update the interpreter
      line to be portable between various Linuxes and macOS without
      complaint from posix shell users.
      247e20e1
  2. 29 Mar, 2022 1 commit
  3. 25 Mar, 2022 1 commit
  4. 18 Mar, 2022 1 commit
    • Tim Gross's avatar
      E2E with HCP Consul/Vault (#12267) · 020fa6f8
      Tim Gross authored
      Use HCP Consul and HCP Vault for the Consul and Vault clusters used in E2E testing. This has the following benefits:
      
      * Without the need to support mTLS bootstrapping for Consul and Vault, we can simplify the mTLS configuration by leaning on Terraform instead of janky bash shell scripting.
      * Vault bootstrapping is no longer required, so we can eliminate even more janky shell scripting
      * Our E2E exercises HCP, which is important to us as an organization
      * With the reduction in configurability, we can simplify the Terraform configuration and drop the complicated `provision.sh`/`provision.ps1` scripts we were using previously. We can template Nomad configuration files and upload them with the `file` provisioner.
      * Packer builds for Linux and Windows become much simpler.
      
      tl;dr way less janky shell scripting!
      020fa6f8
  5. 04 Mar, 2022 1 commit
    • Tim Gross's avatar
      e2e: configure prometheus for mTLS for `Metrics` suite (#12181) · 31b7de78
      Tim Gross authored
      The `Metrics` suite uses prometheus to scrape Nomad metrics so that
      we're testing the full user experience of extracting metrics from
      Nomad. With the addition of mTLS, we need to make sure prometheus also
      has mTLS configuration because the metrics endpoint is protected.
      
      Update the Nomad client configuration and prometheus job to bind-mount
      the client's certs into the task so that the job can use these certs
      to scrape the server. This is a temporary solution that gets the job
      passing; we should give the job its own certificates (issued by
      Vault?) when we've done some of the infrastructure rework we'd like.
      31b7de78
  6. 01 Mar, 2022 1 commit
  7. 18 Jan, 2022 1 commit
  8. 02 Dec, 2021 2 commits
  9. 16 Sep, 2021 1 commit
  10. 03 Sep, 2021 1 commit
  11. 30 Aug, 2021 1 commit
    • Mahmood Ali's avatar
      Support mTLS clusters for e2e testing (#11092) · a144cb31
      Mahmood Ali authored
      This allows us to spin up e2e clusters with mTLS configured for all HashiCorp services, i.e. Nomad, Consul, and Vault. Used it for testing #11089 .
      
      mTLS is disabled by default. I have not updated Windows provisioning scripts yet - Windows also lacks ACL support from before. I intend to follow up for them in another round.
      a144cb31
  12. 27 Aug, 2021 1 commit
  13. 07 Jun, 2021 1 commit
  14. 04 Jun, 2021 4 commits
  15. 01 Jun, 2021 1 commit
  16. 25 May, 2021 1 commit
  17. 18 May, 2021 1 commit
  18. 10 May, 2021 1 commit
  19. 27 Apr, 2021 2 commits
  20. 14 Apr, 2021 1 commit
  21. 09 Apr, 2021 1 commit
  22. 08 Apr, 2021 2 commits
    • Tim Gross's avatar
      E2E: use remote-exec via TF0.14.7+ · f302d408
      Tim Gross authored
      The E2E provisioning used local-exec to call ssh in a for loop in a hacky
      workaround https://github.com/hashicorp/terraform/issues/25634, which
      prevented remote-exec from working on Windows. Move to a newer version of
      Terraform that fixes the remote-exec bug to make provisioning more reliable
      and observable.
      
      Note that Windows remote-exec needs to include the `powershell` call itself,
      unlike Unix-alike remote-exec.
      f302d408
    • Tim Gross's avatar
      E2E: extend CSI test to cover create and snapshot workflows · f133a89f
      Tim Gross authored
      Split the EBS and EFS tests out into their own test cases:
      * EBS exercises the Controller RPCs, including the create/snapshot workflow.
      * EFS exercises only the Node RPCs, and assumes we have an existing volume
      that gets registered, rather than created.
      f133a89f
  23. 25 Mar, 2021 1 commit
  24. 18 Mar, 2021 1 commit
    • Tim Gross's avatar
      CSI: unique volume per allocation · 7c756967
      Tim Gross authored
      Add a `PerAlloc` field to volume requests that directs the scheduler to test
      feasibility for volumes with a source ID that includes the allocation index
      suffix (ex. `[0]`), rather than the exact source ID.
      
      Read the `PerAlloc` field when making the volume claim at the client to
      determine if the allocation index suffix (ex. `[0]`) should be added to the
      volume source ID.
      7c756967
  25. 08 Mar, 2021 1 commit
  26. 23 Feb, 2021 1 commit
  27. 18 Feb, 2021 1 commit
    • Drew Bailey's avatar
      E2e/fix periodic (#10047) · 2f99d649
      Drew Bailey authored
      * fix periodic
      
      * update periodic to not use template
      
      nomad job inspect no longer returns an apiliststub so the required fields to query job summary are no longer there, parse cli output instead
      
      * rm tmp makefile entry
      
      * fix typo
      
      * revert makefile change
      2f99d649
  28. 09 Feb, 2021 1 commit
    • Seth Hoenig's avatar
      consul/connect: enable custom sidecars to use expose checks · af48777d
      Seth Hoenig authored
      This PR enables jobs configured with a custom sidecar_task to make
      use of the `service.expose` feature for creating checks on services
      in the service mesh. Before we would check that sidecar_task had not
      been set (indicating that something other than envoy may be in use,
      which would not support envoy's expose feature). However Consul has
      not added support for anything other than envoy and probably never
      will, so having the restriction in place seems like an unnecessary
      hindrance. If Consul ever does support something other than Envoy,
      they will likely find a way to provide the expose feature anyway.
      
      Fixes #9854
      af48777d
  29. 02 Feb, 2021 1 commit
  30. 01 Feb, 2021 1 commit
    • Mahmood Ali's avatar
      e2e: segment e2e clusters · d161c40f
      Mahmood Ali authored
      Ensure that the e2e clusters are isolated and never attempt to autojoin
      with another e2e cluster.
      
      This ensures that each cluster servers have a unique `ConsulAutoJoin`,
      to be used for discovery.
      d161c40f
  31. 26 Jan, 2021 1 commit
  32. 25 Jan, 2021 1 commit
  33. 22 Jan, 2021 1 commit
    • Drew Bailey's avatar
      prevent double job status update (#9768) · 3cb11326
      Drew Bailey authored
      * Prevent Job Statuses from being calculated twice
      
      https://github.com/hashicorp/nomad/pull/8435 introduced atomic eval
      insertion iwth job (de-)registration. This change removes a now obsolete
      guard which checked if the index was equal to the job.CreateIndex, which
      would empty the status. Now that the job regisration eval insetion is
      atomic with the registration this check is no longer necessary to set
      the job statuses correctly.
      
      * test to ensure only single job event for job register
      
      * periodic e2e
      
      * separate job update summary step
      
      * fix updatejobstability to use copy instead of modified reference of job
      
      * update envoygatewaybindaddresses copy to prevent job diff on null vs empty
      
      * set ConsulGatewayBindAddress to empty map instead of nil
      
      fix nil assertions for empty map
      
      rm unnecessary guard
      3cb11326
  34. 15 Jan, 2021 1 commit