changelog and comment
This commit is contained in:
parent
ea221cfe87
commit
bc893829bc
|
@ -18,6 +18,7 @@ BUG FIXES:
|
||||||
* cli: Make scoring column orders consistent `nomad alloc status` [[GH-6609](https://github.com/hashicorp/nomad/issues/6609)]
|
* cli: Make scoring column orders consistent `nomad alloc status` [[GH-6609](https://github.com/hashicorp/nomad/issues/6609)]
|
||||||
* cli: Fixed a bug where a cli user may fail to query FS/Allocation API endpoints if they lack `node:read` capability [[GH-6423](https://github.com/hashicorp/nomad/issues/6423)]
|
* cli: Fixed a bug where a cli user may fail to query FS/Allocation API endpoints if they lack `node:read` capability [[GH-6423](https://github.com/hashicorp/nomad/issues/6423)]
|
||||||
* client: Fixed a bug where a client may not restart dead internal processes upon client's restart on Windows [[GH-6426](https://github.com/hashicorp/nomad/issues/6426)]
|
* client: Fixed a bug where a client may not restart dead internal processes upon client's restart on Windows [[GH-6426](https://github.com/hashicorp/nomad/issues/6426)]
|
||||||
|
* driver/exec: Fixed a bug where exec tasks can spawn processes that live beyond task lifecycle [[GH-6722](https://github.com/hashicorp/nomad/issues/6722)]
|
||||||
* driver/docker: Added mechanism for detecting running unexpectedly running docker containers [[GH-6325](https://github.com/hashicorp/nomad/issues/6325)]
|
* driver/docker: Added mechanism for detecting running unexpectedly running docker containers [[GH-6325](https://github.com/hashicorp/nomad/issues/6325)]
|
||||||
* nomad: Multiple connect enabled services in the same taskgroup failed to
|
* nomad: Multiple connect enabled services in the same taskgroup failed to
|
||||||
register [[GH-6646](https://github.com/hashicorp/nomad/issues/6646)]
|
register [[GH-6646](https://github.com/hashicorp/nomad/issues/6646)]
|
||||||
|
|
|
@ -254,6 +254,8 @@ func TestExecDriver_StartWaitRecover(t *testing.T) {
|
||||||
require.NoError(harness.DestroyTask(task.ID, true))
|
require.NoError(harness.DestroyTask(task.ID, true))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TestExecDriver_DestroyKillsAll asserts that when TaskDestroy is called all
|
||||||
|
// task processes are cleaned up.
|
||||||
func TestExecDriver_DestroyKillsAll(t *testing.T) {
|
func TestExecDriver_DestroyKillsAll(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
require := require.New(t)
|
require := require.New(t)
|
||||||
|
|
|
@ -200,6 +200,8 @@ func TestRawExecDriver_StartWaitStop(t *testing.T) {
|
||||||
require.NoError(harness.DestroyTask(task.ID, true))
|
require.NoError(harness.DestroyTask(task.ID, true))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TestRawExecDriver_DestroyKillsAll asserts that when TaskDestroy is called all
|
||||||
|
// task processes are cleaned up.
|
||||||
func TestRawExecDriver_DestroyKillsAll(t *testing.T) {
|
func TestRawExecDriver_DestroyKillsAll(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue