This project is mirrored from https://gitee.com/mirrors/nomad.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 01 Apr, 2020 8 commits
-
-
Tim Gross authored
-
Tim Gross authored
-
Buck Doyle authored
This closes #7469. Trivial thanks to localStorageProperty! 🥳
-
James Rasell authored
plugin: ensure plugin loader maps correct API version to type.
-
Mahmood Ali authored
fix codegen for ugorji/go
-
Mahmood Ali authored
When generating ugorji/go package, we should use github.com/hashicorp/go-msgpack/codec instead. Also fix the reference for codegen_generated
-
Jasmine Dahilig authored
Use latest go-bindata and go-bindata-assetfs
-
Mahmood Ali authored
These dep tools aren't tagged properly so shouldn't be installed with go mod
-
- 31 Mar, 2020 31 commits
-
-
Seth Hoenig authored
merge changes for expose checks percheck
-
Mahmood Ali authored
* batch updates of changelog items [ci skip] * Update CHANGELOG.md Co-Authored-By:
Jasmine Dahilig <jasmine@dahilig.com> * add PR to changelog * update ui changelog message * docs: note connect expose paths configuration in changelog Co-authored-by:
Michael Schurter <mschurter@hashicorp.com> Co-authored-by:
Jasmine Dahilig <jasmine@dahilig.com> Co-authored-by:
Seth Hoenig <shoenig@hashicorp.com>
-
Seth Hoenig authored
connect: enable proxy.expose configuration
-
Seth Hoenig authored
-
Seth Hoenig authored
Part of #6120 Building on the support for enabling connect proxy paths in #7323, this change adds the ability to configure the 'service.check.expose' flag on group-level service check definitions for services that are connect-enabled. This is a slight deviation from the "magic" that Consul provides. With Consul, the 'expose' flag exists on the connect.proxy stanza, which will then auto-generate expose paths for every HTTP and gRPC service check associated with that connect-enabled service. A first attempt at providing similar magic for Nomad's Consul Connect integration followed that pattern exactly, as seen in #7396. However, on reviewing the PR we realized having the `expose` flag on the proxy stanza inseperably ties together the automatic path generation with every HTTP/gRPC defined on the service. This makes sense in Consul's context, because a service definition is reasonably associated with a single "task". With Nomad's group level service definitions however, there is a reasonable expectation that a service definition is more abstractly representative of multiple services within the task group. In this case, one would want to define checks of that service which concretely make HTTP or gRPC requests to different underlying tasks. Such a model is not possible with the course `proxy.expose` flag. Instead, we now have the flag made available within the check definitions themselves. By making the expose feature resolute to each check, it is possible to have some HTTP/gRPC checks which make use of the envoy exposed paths, as well as some HTTP/gRPC checks which make use of some orthongonal port-mapping to do checks on some other task (or even some other bound port of the same task) within the task group. Given this example, group "server-group" { network { mode = "bridge" port "forchecks" { to = -1 } } service { name = "myserver" port = 2000 connect { sidecar_service { } } check { name = "mycheck-myserver" type = "http" port = "forchecks" interval = "3s" timeout = "2s" method = "GET" path = "/classic/responder/health" expose = true } } } Nomad will automatically inject (via job endpoint mutator) the extrapolated expose path configuration, i.e. expose { path { path = "/classic/responder/health" protocol = "http" local_path_port = 2000 listener_port = "forchecks" } } Documentation is coming in #7440 (needs updating, doing next) Modifications to the `countdash` examples in https://github.com/hashicorp/demo-consul-101/pull/6 which will make the examples in the documentation actually runnable. Will add some e2e tests based on the above when it becomes available.
-
Seth Hoenig authored
-
Seth Hoenig authored
Enable configuration of HTTP and gRPC endpoints which should be exposed by the Connect sidecar proxy. This changeset is the first "non-magical" pass that lays the groundwork for enabling Consul service checks for tasks running in a network namespace because they are Connect-enabled. The changes here provide for full configuration of the connect { sidecar_service { proxy { expose { paths = [{ path = <exposed endpoint> protocol = <http or grpc> local_path_port = <local endpoint port> listener_port = <inbound mesh port> }, ... ] } } } stanza. Everything from `expose` and below is new, and partially implements the precedent set by Consul: https://www.consul.io/docs/connect/registration/service-registration.html#expose-paths-configuration-reference Combined with a task-group level network port-mapping in the form: port "exposeExample" { to = -1 } it is now possible to "punch a hole" through the network namespace to a specific HTTP or gRPC path, with the anticipated use case of creating Consul checks on Connect enabled services. A future PR may introduce more automagic behavior, where we can do things like 1) auto-fill the 'expose.path.local_path_port' with the default value of the 'service.port' value for task-group level connect-enabled services. 2) automatically generate a port-mapping 3) enable an 'expose.checks' flag which automatically creates exposed endpoints for every compatible consul service check (http/grpc checks on connect enabled services).
-
Seth Hoenig authored
This helps reduce the number of squiggly lines in Goland.
-
Zack Smith authored
[docs] Fix syntax error in docs
-
Zack Smith authored
Prior to this commit, the HCL syntax was invalid. This commit adds a `,` to make the example pass syntax checks.
-
Lang Martin authored
* nomad/state/state_store: CSIVolumesByNodeID ignores namespace * scheduler/scheduler: add CSIVolumesByNodeID to the state interface * scheduler/feasible: check node MaxVolumes * nomad/csi_endpoint: no namespace inn CSIVolumesByNodeID anymore * nomad/state/state_store: avoid DenormalizeAllocationSlice * nomad/state/iterator: clean up SliceIterator Next * scheduler/feasible_test: block with MaxVolumes * nomad/state/state_store_test: fix args to CSIVolumesByNodeID
-
Lang Martin authored
* nomad/structs/structs: new NodeEventSubsystemCSI * client/client: pass triggerNodeEvent in the CSIConfig * client/pluginmanager/csimanager/instance: add eventer to instanceManager * client/pluginmanager/csimanager/manager: pass triggerNodeEvent * client/pluginmanager/csimanager/volume: node event on [un]mount * nomad/structs/structs: use storage, not CSI * client/pluginmanager/csimanager/volume: use storage, not CSI * client/pluginmanager/csimanager/volume_test: eventer * client/pluginmanager/csimanager/volume: event on error * client/pluginmanager/csimanager/volume_test: check event on error * command/node_status: remove an extra space in event detail format * client/pluginmanager/csimanager/volume: use snake_case for details * client/pluginmanager/csimanager/volume_test: snake_case details
-
Buck Doyle authored
This closes #7460. Before this, there was an incongruous flash of the non-exec UI during loading.
-
Buck Doyle authored
I still want to add acceptance tests for the existence of these buttons but this change makes the exec button for jobs behave similarly to the others.
-
Mahmood Ali authored
Parse security_opts before sending them to docker daemon
-
Ben Buzbee authored
Fixes #6720 Copy the parsing function from the docker CLI. Docker daemon expects to see JSON for seccomp file not a path.
-
Mahmood Ali authored
vendor: explicit use of hashicorp/go-msgpack
-
Tim Gross authored
-
Mahmood Ali authored
This is to ease go mod migration
-
Yoan Blanc authored
Signed-off-by:
Yoan Blanc <yoan@dosimple.ch>
-
Yoan Blanc authored
Signed-off-by:
Yoan Blanc <yoan@dosimple.ch>
-
Mahmood Ali authored
Vendor fsouza/go-docker-client update
-
Mahmood Ali authored
dev: use go mod to install dev dependencies
-
James Rasell authored
The plugin loader supplies a version map to ensure the Nomad agent can support the plugins at the version they specify. The map was incorrectly mapping the driver type to the device API supported version identifier. This currently does not cause a bug as both device and driver versions are the same string. This could cause problems in the future, however, if either plugin interface were to change and require version updates.
-
Mahmood Ali authored
This allows using https download and go mod cache proxies, over using git and downloading entire dependencies git history, hopefully, resulting into a faster installation process.
-
Michael Lange authored
UI: Facet for host volumes
-
Michael Schurter authored
-
Michael Lange authored
-
Michael Lange authored
-
Michael Lange authored
-
Michael Lange authored
-
- 30 Mar, 2020 1 commit
-
-
Seth Hoenig authored
docs: mention #7540 in changelog
-