This project is mirrored from https://gitee.com/mirrors/nomad.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 06 Apr, 2020 1 commit
-
-
Nick Ethier authored
-
- 02 Apr, 2020 3 commits
-
-
Nick Ethier authored
-
Nick Ethier authored
-
Lang Martin authored
* nomad/state/state_store: enforce that the volume namespace exists * nomad/csi_endpoint_test: a couple of broken namespaces now * nomad/csi_endpoint_test: one more test * nomad/node_endpoint_test: use structs.DefaultNamespace * nomad/state/state_store_test: use DefaultNamespace
-
- 01 Apr, 2020 25 commits
-
-
Charlie Voiselle authored
[docs] Adding link to learn track
-
Mahmood Ali authored
website: link to 0.11.0-beta2 release
-
Mahmood Ali authored
-
Chris Baker authored
finalizing scaling API work
-
Mike Wickett authored
website: update Netlify redirects syntax
-
Chris Baker authored
-
Seth Hoenig authored
connect: fix bug where absent connect.proxy stanza needs default config
-
Chris Baker authored
-
Chris Baker authored
blocking queries on the job scaling status
-
Seth Hoenig authored
In some refactoring, a bug was introduced where if the connect.proxy stanza in a submitted job was nil, the default proxy configuration would not be initialized with default values, effectively breaking Connect. connect { sidecar_service {} # should work } In contrast, by setting an empty proxy stanza, the config values would be inserted correctly. connect { sidecar_service { proxy {} # workaround } } This commit restores the original behavior, where having a proxy stanza present is not required. The unit test for this case has also been corrected.
-
Chris Baker authored
Co-Authored-By:
Drew Bailey <2614075+drewbailey@users.noreply.github.com>
-
Chris Baker authored
Co-Authored-By:
Drew Bailey <2614075+drewbailey@users.noreply.github.com>
-
Chris Baker authored
Co-Authored-By:
Drew Bailey <2614075+drewbailey@users.noreply.github.com>
-
Chris Baker authored
-
Mike Wickett authored
-
Buck Doyle authored
This surfaces test failures more clearly on CircleCI by adding testem-multi-reporter to report both via the default TAP reporter as well as an xUnit reporter whose output is stored as an artefact.
-
Chris Baker authored
updated ScalingEvent API to record "message string,error bool" instead of confusing "reason,error *string"
-
Tim Gross authored
-
Tim Gross authored
-
Buck Doyle authored
This closes #7469. Trivial thanks to localStorageProperty! 🥳
-
James Rasell authored
plugin: ensure plugin loader maps correct API version to type.
-
Mahmood Ali authored
fix codegen for ugorji/go
-
Mahmood Ali authored
When generating ugorji/go package, we should use github.com/hashicorp/go-msgpack/codec instead. Also fix the reference for codegen_generated
-
Jasmine Dahilig authored
Use latest go-bindata and go-bindata-assetfs
-
Mahmood Ali authored
These dep tools aren't tagged properly so shouldn't be installed with go mod
-
- 31 Mar, 2020 11 commits
-
-
Seth Hoenig authored
merge changes for expose checks percheck
-
Mahmood Ali authored
* batch updates of changelog items [ci skip] * Update CHANGELOG.md Co-Authored-By:
Jasmine Dahilig <jasmine@dahilig.com> * add PR to changelog * update ui changelog message * docs: note connect expose paths configuration in changelog Co-authored-by:
Michael Schurter <mschurter@hashicorp.com> Co-authored-by:
Jasmine Dahilig <jasmine@dahilig.com> Co-authored-by:
Seth Hoenig <shoenig@hashicorp.com>
-
Seth Hoenig authored
connect: enable proxy.expose configuration
-
Seth Hoenig authored
-
Seth Hoenig authored
Part of #6120 Building on the support for enabling connect proxy paths in #7323, this change adds the ability to configure the 'service.check.expose' flag on group-level service check definitions for services that are connect-enabled. This is a slight deviation from the "magic" that Consul provides. With Consul, the 'expose' flag exists on the connect.proxy stanza, which will then auto-generate expose paths for every HTTP and gRPC service check associated with that connect-enabled service. A first attempt at providing similar magic for Nomad's Consul Connect integration followed that pattern exactly, as seen in #7396. However, on reviewing the PR we realized having the `expose` flag on the proxy stanza inseperably ties together the automatic path generation with every HTTP/gRPC defined on the service. This makes sense in Consul's context, because a service definition is reasonably associated with a single "task". With Nomad's group level service definitions however, there is a reasonable expectation that a service definition is more abstractly representative of multiple services within the task group. In this case, one would want to define checks of that service which concretely make HTTP or gRPC requests to different underlying tasks. Such a model is not possible with the course `proxy.expose` flag. Instead, we now have the flag made available within the check definitions themselves. By making the expose feature resolute to each check, it is possible to have some HTTP/gRPC checks which make use of the envoy exposed paths, as well as some HTTP/gRPC checks which make use of some orthongonal port-mapping to do checks on some other task (or even some other bound port of the same task) within the task group. Given this example, group "server-group" { network { mode = "bridge" port "forchecks" { to = -1 } } service { name = "myserver" port = 2000 connect { sidecar_service { } } check { name = "mycheck-myserver" type = "http" port = "forchecks" interval = "3s" timeout = "2s" method = "GET" path = "/classic/responder/health" expose = true } } } Nomad will automatically inject (via job endpoint mutator) the extrapolated expose path configuration, i.e. expose { path { path = "/classic/responder/health" protocol = "http" local_path_port = 2000 listener_port = "forchecks" } } Documentation is coming in #7440 (needs updating, doing next) Modifications to the `countdash` examples in https://github.com/hashicorp/demo-consul-101/pull/6 which will make the examples in the documentation actually runnable. Will add some e2e tests based on the above when it becomes available.
-
Seth Hoenig authored
-
Seth Hoenig authored
Enable configuration of HTTP and gRPC endpoints which should be exposed by the Connect sidecar proxy. This changeset is the first "non-magical" pass that lays the groundwork for enabling Consul service checks for tasks running in a network namespace because they are Connect-enabled. The changes here provide for full configuration of the connect { sidecar_service { proxy { expose { paths = [{ path = <exposed endpoint> protocol = <http or grpc> local_path_port = <local endpoint port> listener_port = <inbound mesh port> }, ... ] } } } stanza. Everything from `expose` and below is new, and partially implements the precedent set by Consul: https://www.consul.io/docs/connect/registration/service-registration.html#expose-paths-configuration-reference Combined with a task-group level network port-mapping in the form: port "exposeExample" { to = -1 } it is now pos...
-
Seth Hoenig authored
This helps reduce the number of squiggly lines in Goland.
-
Zack Smith authored
[docs] Fix syntax error in docs
-
Zack Smith authored
Prior to this commit, the HCL syntax was invalid. This commit adds a `,` to make the example pass syntax checks.
-
Lang Martin authored
* nomad/state/state_store: CSIVolumesByNodeID ignores namespace * scheduler/scheduler: add CSIVolumesByNodeID to the state interface * scheduler/feasible: check node MaxVolumes * nomad/csi_endpoint: no namespace inn CSIVolumesByNodeID anymore * nomad/state/state_store: avoid DenormalizeAllocationSlice * nomad/state/iterator: clean up SliceIterator Next * scheduler/feasible_test: block with MaxVolumes * nomad/state/state_store_test: fix args to CSIVolumesByNodeID
-