cli: add help message for `-consul-namespace` (#18081) (#18091)

Add missing help entry for the `-consul-namespace` flag in `nomad job
run`.
This commit is contained in:
hc-github-team-nomad-core 2023-07-28 09:34:44 -05:00 committed by GitHub
parent 77d1f188c6
commit 34ac0e5aad
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 29 additions and 17 deletions

3
.changelog/18081.txt Normal file
View File

@ -0,0 +1,3 @@
```release-note:bug
cli: Add missing help message for the `-consul-namespace` flag in the `nomad job run` command
```

View File

@ -121,6 +121,14 @@ Run Options:
the job file. This overrides the token found in $CONSUL_HTTP_TOKEN environment
variable and that found in the job.
-consul-namespace
(Enterprise only) If set, any services in the job will be registered into
the specified Consul namespace. Any template block reading from Consul KV
will be scoped to the specified Consul namespace. If Consul ACLs are
enabled and the "consul" block "allow_unauthenticated" is disabled in the
Nomad server configuration, then a Consul token must be supplied with
appropriate service and KV Consul ACL policy permissions.
-vault-token
Used to validate if the user submitting the job has permission to run the job
according to its Vault policies. A Vault token must be supplied if the vault
@ -156,21 +164,22 @@ func (c *JobRunCommand) Synopsis() string {
func (c *JobRunCommand) AutocompleteFlags() complete.Flags {
return mergeAutocompleteFlags(c.Meta.AutocompleteFlags(FlagSetClient),
complete.Flags{
"-check-index": complete.PredictNothing,
"-detach": complete.PredictNothing,
"-verbose": complete.PredictNothing,
"-consul-token": complete.PredictNothing,
"-vault-token": complete.PredictAnything,
"-vault-namespace": complete.PredictAnything,
"-output": complete.PredictNothing,
"-policy-override": complete.PredictNothing,
"-preserve-counts": complete.PredictNothing,
"-json": complete.PredictNothing,
"-hcl1": complete.PredictNothing,
"-hcl2-strict": complete.PredictNothing,
"-var": complete.PredictAnything,
"-var-file": complete.PredictFiles("*.var"),
"-eval-priority": complete.PredictNothing,
"-check-index": complete.PredictNothing,
"-detach": complete.PredictNothing,
"-verbose": complete.PredictNothing,
"-consul-token": complete.PredictNothing,
"-consul-namespace": complete.PredictAnything,
"-vault-token": complete.PredictAnything,
"-vault-namespace": complete.PredictAnything,
"-output": complete.PredictNothing,
"-policy-override": complete.PredictNothing,
"-preserve-counts": complete.PredictNothing,
"-json": complete.PredictNothing,
"-hcl1": complete.PredictNothing,
"-hcl2-strict": complete.PredictNothing,
"-var": complete.PredictAnything,
"-var-file": complete.PredictFiles("*.var"),
"-eval-priority": complete.PredictNothing,
})
}

View File

@ -101,9 +101,9 @@ that volume.
- `-consul-namespace`: <EnterpriseAlert inline/> If set, any services in the job will be registered into the
specified Consul namespace. Any `template` block reading from Consul KV will
scoped to the specified Consul namespace. If Consul ACLs are enabled and the
be scoped to the specified Consul namespace. If Consul ACLs are enabled and the
[`consul` block `allow_unauthenticated`] is disabled in the Nomad server configuration, then
a Consul token must be supplied with appropriate service and kv Consul ACL policy
a Consul token must be supplied with appropriate service and KV Consul ACL policy
permissions.
- `-vault-token`: Used to validate if the user submitting the job has