This project is mirrored from https://gitee.com/mirrors/nomad.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 05 Apr, 2022 22 commits
-
-
Derek Strickland authored
* comments: update some stale comments referencing deprecated config name
-
Derek Strickland authored
-
Derek Strickland authored
-
Derek Strickland authored
* planner: expose ServerMeetsMinimumVersion via Planner interface * filterByTainted: add flag indicating disconnect support * allocReconciler: accept and pass disconnect support flag * tests: update dependent tests
-
Derek Strickland authored
* api: Add struct, conversion function, and tests * TaskGroup: Add field, validation, and tests * diff: Add diff handler and test * docs: Update docs
-
Derek Strickland authored
* Add disconnects/reconnect to log output and emit reschedule metrics * TaskGroupSummary: Add Unknown, update StateStore logic, add to metrics
-
Derek Strickland authored
* Update reconnect test to new algorithm and interface; remove guard test
-
Derek Strickland authored
* Add TaskClientReconnectedEvent constant * Add allocRunner.Reconnect function to manage task state manually * Removes server-side push
-
DerekStrickland authored
-
DerekStrickland authored
-
DerekStrickland authored
-
DerekStrickland authored
-
Derek Strickland authored
* Add merge helper for string maps * structs: add statuses, MaxClientDisconnect, and helper funcs * taintedNodes: Include disconnected nodes * upsertAllocsImpl: don't use existing ClientStatus when upserting unknown * allocSet: update filterByTainted and add delayByMaxClientDisconnect * allocReconciler: support disconnecting and reconnecting allocs * GenericScheduler: upsert unknown and queue reconnecting Co-authored-by:
Tim Gross <tgross@hashicorp.com>
-
Shishir authored
-
Jai authored
* ui: add triggeredBy filter * add namespace filter * fix: namespace is a reserved keyword * ui: filter by type and search * fix: rename closure action to * chore: fix data-test-attr
-
Jai authored
* chore: prettify gutter-menu * chore: add portal packages * styling: add styles sidebar and portal behavior * ui: sidebar component * ui: create and implement statechart for evals * ui: actor-relationship service and provider component * ui: d3 hierarchy computation * chore: add render-modifiers and curved arrows * ui: create evaluation actor div * fix related evaluations schema * ui: register/deregister evaluation divs * ui: handle resize behavior * bug: infinite re-render cycle * fix: conditional logic to prevent infinite render of flex resizing * ui: related evaluations schema and request param * ui: fix testing for evaluations * refact: make related-evals a proper has-many * chore: don't pauseTest * temp: debug d3 hierarchy * ui: move derived state logic into backing component class for detail * ui: deprecated related evaluations logic in statechart * ui: update evaluation models ...
-
Luiz Aoqui authored
Move some common Vault API data struct decoding out of the Vault client so it can be reused in other situations. Make Vault job validation its own function so it's easier to expand it. Rename the `Job.VaultPolicies` method to just `Job.Vault` since it returns the full Vault block, not just their policies. Set `ChangeMode` on `Vault.Canonicalize`. Add some missing tests. Allows specifying an entity alias that will be used by Nomad when deriving the task Vault token. An entity alias assigns an indentity to a token, allowing better control and management of Vault clients since all tokens with the same indentity alias will now be considered the same client. This helps track Nomad activity in Vault's audit logs and better control over Vault billing. Add support for a new Nomad server configuration to define a default entity alias to be used when deriving Vault tokens. This default value will be used if the task doesn't have an entity alias defined.
-
Tim Gross authored
When we unmount a volume we need to be able to recover from cases where the plugin has been shutdown before the allocation that needs it, so in #11892 we blocked shutting down the alloc runner hook. But this blocks client shutdown if we're in the middle of unmounting. The client won't be able to communicate with the plugin or send the unpublish RPC anyways, so we should cancel the context and assume that we'll resume the unmounting process when the client restarts. For `-dev` mode we don't send the graceful `Shutdown()` method and instead destroy all the allocations. In this case, we'll never be able to communicate with the plugin but also never close the context we need to prevent the hook from blocking. To fix this, move the retries into their own goroutine that doesn't block the main `Postrun`.
-
James Rasell authored
events: add service API logic and rename topic to service from serviceregistration
-
Grant Griffiths authored
-
James Rasell authored
-
James Rasell authored
-
- 04 Apr, 2022 9 commits
-
-
Danish Prakash authored
-
Michael Schurter authored
service-disco: add mixed auth to list and read RPC endpoints.
-
Tim Gross authored
The volume watcher design was based on deploymentwatcher and drainer, but has an important difference: we don't want to maintain a goroutine for the lifetime of the volume. So we stop the volumewatcher goroutine for a volume when that volume has no more claims to free. But the shutdown races with updates on the parent goroutine, and it's possible to drop updates. Fortunately these updates are picked up on the next core GC job, but we're most likely to hit this race when we're replacing an allocation and that's the time we least want to wait. Wait until the volume has "settled" before stopping this goroutine so that the race between shutdown and the parent goroutine sending on `<-updateCh` is pushed to after the window we most care about quick freeing of claims. * Fixes a resource leak when volumewatchers are no longer needed. The volume is nil and can't ever be started again, so the volume's `watcher` should be removed from the top-level `Watcher`. * De-flakes the GC job test: the test throws an error because the claimed node doesn't exist and is unreachable. This flaked instead of failed because we didn't correctly wait for the first pass through the volumewatcher. Make the GC job wait for the volumewatcher to reach the quiescent timeout window state before running the GC eval under test, so that we're sure the GC job's work isn't being picked up by processing one of the earlier claims. Update the claims used so that we're sure the GC pass won't hit a node unpublish error. * Adds trace logging to unpublish operations
-
Seth Hoenig authored
build(deps): bump github.com/creack/pty from 1.1.17 to 1.1.18
-
dependabot[bot] authored
Bumps [github.com/creack/pty](https://github.com/creack/pty) from 1.1.17 to 1.1.18. - [Release notes](https://github.com/creack/pty/releases) - [Commits](https://github.com/creack/pty/compare/v1.1.17...v1.1.18 ) --- updated-dependencies: - dependency-name: github.com/creack/pty dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by:
dependabot[bot] <support@github.com>
-
Seth Hoenig authored
cleanup: purge github.com/pkg/errors
-
Tim Gross authored
Tear down the volume-consuming job between subtests, rather than after all the tests are complete. For good measure, use a different ID for the volume-consuming job as well.
-
James Rasell authored
In the same manner as the delete RPC, the list and read service registration endpoints can be called either by external operators or Nomad nodes. The latter occurs when a template is being rendered which includes Nomad API template funcs. In this case, the auth token is looked up as the node secret ID for auth.
-
James Rasell authored
fix: update incorrect DriverNetworkManager interface implementation
-
- 02 Apr, 2022 1 commit
-
-
Seth Hoenig authored
-
- 01 Apr, 2022 5 commits
-
-
Tim Gross authored
* lint: require should not be aliased in core_sched_test * lint: require should not be aliased in volumes_watcher_test * testing: don't alias state package in core_sched_test
-
Seth Hoenig authored
ci: correctly ignore subpaths in gha
-
Seth Hoenig authored
docs: fix typo in system batch description
-
Seth Hoenig authored
-
Seth Hoenig authored
-
- 31 Mar, 2022 3 commits
-
-
Bryce Kalow authored
-
Tim Gross authored
The client configuration options for drivers have been deprecated since 0.9. We haven't torn them out completely but because they're deprecated it's been hard to guarantee correct behavior. Remove the documentation so that users aren't misled about their viability.
-
Seth Hoenig authored
tests: remove update 08 groups services test
-