This project is mirrored from https://gitee.com/mirrors/nomad.git. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
  1. 13 Jan, 2022 5 commits
  2. 12 Jan, 2022 6 commits
  3. 11 Jan, 2022 1 commit
  4. 10 Jan, 2022 5 commits
    • Tim Gross's avatar
      docs: changelog for PR #11783 (#11812) · ef93ab2d
      Tim Gross authored
      ef93ab2d
    • Alessandro De Blasis's avatar
    • grembo's avatar
      Un-break templates when using vault stanza change_mode noop (#11783) · e9032c10
      grembo authored
      Templates in nomad jobs make use of the vault token defined in
      the vault stanza when issuing credentials like client certificates.
      
      When using change_mode "noop" in the vault stanza, consul-template
      is not informed in case a vault token is re-issued (which can
      happen from time to time for various reasons, as described
      in https://www.nomadproject.io/docs/job-specification/vault).
      
      As a result, consul-template will keep using the old vault token
      to renew credentials and - once the token expired - stop renewing
      credentials. The symptom of this problem is a vault_token
      file that is newer than the issued credential (e.g., TLS certificate)
      in a job's /secrets directory.
      
      This change corrects this, so that h.updater.updatedVaultToken(token)
      is called, which will inform stakeholders about the new
      token and make sure, the new token is used by consul-template.
      
      Example job template fragment:
      
          vault {
              policies = ["nomad-job-policy"]
              change_mode = "noop"
          }
      
          template {
            data = <<-EOH
              {{ with secret "pki_int/issue/nomad-job"
              "common_name=myjob.service.consul" "ttl=90m"
              "alt_names=localhost" "ip_sans=127.0.0.1"}}
              {{ .Data.certificate }}
              {{ .Data.private_key }}
              {{ .Data.issuing_ca }}
              {{ end }}
            EOH
            destination = "${NOMAD_SECRETS_DIR}/myjob.crt"
            change_mode = "noop"
          }
      
      This fix does not alter the meaning of the three change modes of vault
      
      - "noop" - Take no action
      - "restart" - Restart the job
      - "signal" - send a signal to the task
      
      as the switch statement following line 232 contains the necessary
      logic.
      
      It is assumed that "take no action" was never meant to mean "don't tell
      consul-template about the new vault token".
      
      Successfully tested in a staging cluster consisting of multiple
      nomad client nodes.
      e9032c10
    • Conor Evans's avatar
    • Derek Strickland's avatar
      Expose Consul template configuration parameters (#11606) · 43edd0e7
      Derek Strickland authored
      
      This PR exposes the following existing`consul-template` configuration options to Nomad jobspec authors in the `{job.group.task.template}` stanza.
      
      - `wait`
      
      It also exposes the following`consul-template` configuration to Nomad operators in the `{client.template}` stanza.
      
      - `max_stale`
      - `block_query_wait`
      - `consul_retry`
      - `vault_retry` 
      - `wait` 
      
      Finally, it adds the following new Nomad-specific configuration to the `{client.template}` stanza that allows Operators to set bounds on what `jobspec` authors configure.
      
      - `wait_bounds`
      Co-authored-by: default avatarTim Gross <tgross@hashicorp.com>
      Co-authored-by: default avatarMichael Schurter <mschurter@hashicorp.com>
      43edd0e7
  5. 07 Jan, 2022 3 commits
    • Tim Gross's avatar
      docs: note that clients need to have ACLs enabled (#11799) · 04095bde
      Tim Gross authored
      Client endpoints such as `alloc exec` are enforced on the client if
      the API client or CLI has "line of sight" to the client. This is
      already in the Learn guide but having it in the ACL configuration docs
      would be helpful.
      04095bde
    • Tim Gross's avatar
      CSI: tests to exercise csi_hook (#11788) · d27b1370
      Tim Gross authored
      Small refactoring of the allocrunner hook for CSI to make it more
      testable, and a unit test that covers most of its logic.
      d27b1370
    • Tim Gross's avatar
      docs: new scheduler metrics (#11790) · 7fad4b91
      Tim Gross authored
      * Fixed name of `nomad.scheduler.allocs.reschedule` metric
      * Added new metrics to metrics reference documentation
      * Expanded definitions of "waiting" metrics
      * Changelog entry for #10236 and #10237
      7fad4b91
  6. 06 Jan, 2022 5 commits
  7. 05 Jan, 2022 2 commits
  8. 04 Jan, 2022 2 commits
  9. 03 Jan, 2022 5 commits
  10. 25 Dec, 2021 1 commit
  11. 24 Dec, 2021 1 commit
  12. 23 Dec, 2021 4 commits