This project is mirrored from https://gitee.com/mirrors/nomad.git. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
  1. 27 Aug, 2021 2 commits
  2. 26 Aug, 2021 1 commit
  3. 25 Aug, 2021 5 commits
  4. 23 Aug, 2021 1 commit
    • Luiz Aoqui's avatar
      Don't timestamp active log file (#11070) · d74ab11d
      Luiz Aoqui authored
      * don't timestamp active log file
      
      * website: update log_file default value
      
      * changelog: add entry for #11070
      
      * website: add upgrade instructions for log_file in v1.14 and v1.2.0
      d74ab11d
  5. 21 Aug, 2021 1 commit
  6. 20 Aug, 2021 1 commit
    • Zachary Shilton's avatar
      Upgrade global styles (#10936) · 26e381f1
      Zachary Shilton authored
      * website: upgrade global-styles packages
      
      * website: upgrade community page
      
      * website: hide alert-banner on mobile
      
      * website: upgrade g-container to g-grid-container
      
      * website: update /security to use markdown-page
      
      * website: fix unsupported prop
      
      * website: fix incorrect github link in security page
      
      * website: bump to latest patched dependencies
      26e381f1
  7. 19 Aug, 2021 1 commit
  8. 18 Aug, 2021 3 commits
    • Mahmood Ali's avatar
      tests: attempt deflaking TestAutopilot_CleanupDeadServer · c66d2a41
      Mahmood Ali authored
      Attempt to deflake the test by avoiding shutting down the leaders, as leadership
      recovery takes more time, and consequently longer to process raft configuration
      changes and potentially failing the test.
      c66d2a41
    • Mahmood Ali's avatar
      tests: deflake TestLeader_LeftLeader · 794a08cc
      Mahmood Ali authored
      Wait for leadership to be established before killing leader.
      794a08cc
    • Mahmood Ali's avatar
      Consider all system jobs for a new node (#11054) · 327d461b
      Mahmood Ali authored
      When a node becomes ready, create an eval for all system jobs across
      namespaces.
      
      The previous code uses `job.ID` to deduplicate evals, but that ignores
      the job namespace. Thus if there are multiple jobs in different
      namespaces sharing the same ID/Name, only one will be considered for
      running in the new node. Thus, Nomad may skip running some system jobs
      in that node.
      327d461b
  9. 17 Aug, 2021 1 commit
    • Mahmood Ali's avatar
      e2e: Run system jobs on all datacenters (#11060) · 2bb03170
      Mahmood Ali authored
      Target all e2e datacenters for system and sysbatch e2e tests.  They
      require that the system jobs run on all linux clients.
      
      However, the jobs currenly only target `dc1` datacenter, but the nightly
      e2e cluster has 4 clients spread in `dc1` and `dc2` datacenters, causing
      the tests to fail.
      
      I missed this problem in e2e dev cluster because it only used a single
      dc1 datacenter.
      2bb03170
  10. 16 Aug, 2021 2 commits
  11. 13 Aug, 2021 1 commit
  12. 11 Aug, 2021 4 commits
    • Blake Covarrubias's avatar
      docs: Remove note on ingress gateway hosts field needing a port number · 291bbd7b
      Blake Covarrubias authored
      Update the ingress gateway documentation to remove the note stating
      that a port must be specified for values in the `hosts` field when
      the ingress gateway is listening on a non-standard HTTP port.
      
      Specifying a port was required in Consul 1.8.0, but that requirement
      was removed in 1.8.1 with hashicorp/consul#8190 which made Consul
      include the port number when constructing the Envoy configuration.
      
      Related Consul docs PR: hashicorp/consul#10827
      291bbd7b
    • Mahmood Ali's avatar
      docs: Consul Connect tweaks (#11040) · 499fcebc
      Mahmood Ali authored
      Tweaks to the commands in Consul Connect page.
      
      For multi-command scripts, having the leading `$` is a bit annoying, as it makes copying the text harder. Also, the `copy` button would only copy the first command and ignore the rest.
      
      Also, the `echo 1 > ...` commands are required to run as root, unlike the rest! I made them use `| sudo tee` pattern to ease copy & paste as well.
      
      Lastly, update the CNI plugin links to 1.0.0. It's fresh off the oven - just got released less than an hour ago: https://github.com/containernetworking/plugins/releases/tag/v1.0.0 .
      499fcebc
    • Mahmood Ali's avatar
      Merge pull request #11034 from tgross/docs-cni-install · eedfa0b3
      Mahmood Ali authored
      docs: note CNI requirement for bridge networking
      eedfa0b3
    • Tim Gross's avatar
      docs: note CNI requirement for bridge networking · d6a37a68
      Tim Gross authored
      Using `bridge` networking requires that you have CNI plugins installed
      on the client, but this isn't in the jobspec `network` docs which are
      the first place someone will look when trying to configure task
      networking.
      d6a37a68
  13. 10 Aug, 2021 9 commits
  14. 09 Aug, 2021 3 commits
  15. 06 Aug, 2021 2 commits
  16. 05 Aug, 2021 3 commits
    • Michael Schurter's avatar
      docs: add backward incompat note about #10875 · 2ffb7e13
      Michael Schurter authored
      Fixes #11002
      2ffb7e13
    • James Rasell's avatar
      Merge pull request #11006 from hashicorp/f-gh-10929-changelog · 892a476f
      James Rasell authored
      changelog: add entry for #10929
      892a476f
    • James Rasell's avatar
      consul/connect: avoid warn messages on connect proxy errors · a946419a
      James Rasell authored
      When creating a TCP proxy bridge for Connect tasks, we are at the
      mercy of either end for managing the connection state. For long
      lived gRPC connections the proxy could reasonably expect to stay
      open until the context was cancelled. For the HTTP connections used
      by connect native tasks, we experience connection disconnects.
      The proxy gets recreated as needed on follow up requests, however
      we also emit a WARN log when the connection is broken. This PR
      lowers the WARN to a TRACE, because these disconnects are to be
      expected.
      
      Ideally we would be able to proxy at the HTTP layer, however Consul
      or the connect native task could be configured to expect mTLS, preventing
      Nomad from MiTM the requests.
      
      We also can't mange the proxy lifecycle more intelligently, because
      we have no control over the HTTP client or server and how they wish
      to manage connection state.
      
      What we have now works, it's just noisy.
      
      Fixes #10933
      a946419a