Commit Graph

17109 Commits

Author SHA1 Message Date
Seth Hoenig 6b9fd8d269 docs: upgrade-specific notes on CHT filtering 2020-02-13 09:44:47 -06:00
Kyle MacDonald 9fd1ae0df7 website: fix 'edit this page' path 2020-02-13 10:22:49 -05:00
Jeff Escalante edf8907eae
Merge pull request #7092 - New Website 2020-02-12 16:11:49 -05:00
Seth Hoenig 2829b4cd23
Merge pull request #7129 from hashicorp/b-consistent-ct-name
command: use consistent CONSUL_HTTP_TOKEN name
2020-02-12 12:27:46 -06:00
Seth Hoenig ab112e576f
Merge pull request #7127 from hashicorp/b-unset-ct
nomad: unset consul token on job register
2020-02-12 12:25:58 -06:00
Seth Hoenig f17bbb8cc4 docs: update changelog mentioning consul token passthrough 2020-02-12 12:24:04 -06:00
Seth Hoenig 7f33b92e0b command: use consistent CONSUL_HTTP_TOKEN name
Consul CLI uses CONSUL_HTTP_TOKEN, so Nomad should use the same.
Note that consul-template uses CONSUL_TOKEN, which Nomad also uses,
so be careful to preserve any reference to that in the consul-template
context.
2020-02-12 10:42:33 -06:00
Seth Hoenig ce50345b7a nomad: assert consul token is unset on job register in tests 2020-02-12 10:17:42 -06:00
Michael Schurter a04facf0ef docs: explicitly callout checking for prior art
Also normalize formatting.
2020-02-12 08:07:07 -08:00
Seth Hoenig 02151dee45 nomad: unset consul token on job register 2020-02-12 09:58:51 -06:00
Jeff Escalante 93c64890fb
add changes from #7078 2020-02-11 16:31:14 -05:00
Jeff Escalante 3d865efef9
add release candidate from #7120 2020-02-11 16:31:14 -05:00
Jeff Escalante 0bef886c2b
add changes from #7121 2020-02-11 15:39:03 -05:00
Drew Bailey bf397c411e
Merge pull request #7122 from hashicorp/pprof/changelog
change log for remote pprof endpoints
2020-02-11 14:32:54 -05:00
Drew Bailey 5e3f0d0e03
change log for remote pprof endpoints 2020-02-11 14:30:55 -05:00
Mahmood Ali 8a217e1102
Merge pull request #7108 from hashicorp/ch-windows-binaries
changelog windows binaries being signed
2020-02-10 16:57:16 -05:00
Drew Bailey 6bd6c6638c
include pro tag in serveral oss.go files 2020-02-10 15:56:14 -05:00
Jeff Escalante 569bead286
fix a couple more links 2020-02-10 14:20:59 -05:00
Jeff Escalante ba72fc57c2
css fix 2020-02-10 14:00:38 -05:00
Jeff Escalante 59ac380af4
add link checker, fix a redirect, remove unused component 2020-02-10 13:56:55 -05:00
Jeff Escalante db2fba3a82
update deps to add minor style fixes 2020-02-10 12:46:31 -05:00
Jeff Escalante a3fa93cea7
remove extra redirect file 2020-02-10 12:44:34 -05:00
Mahmood Ali 0e1baf0c22 changelog windows binaries being signed
Note that 0.10.4, nomad windows binaries will be signed.

[ci skip]
2020-02-10 09:11:00 -05:00
Seth Hoenig 0e44094d1a client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.

To enable this feature, the flag enable_tag_override must be configured
in the service definition.

Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.

Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.

Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.

In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).

Fixes #2057
2020-02-10 08:00:55 -06:00
Michael Schurter 65d38d9255 test: fix flaky TestHTTP_FreshClientAllocMetrics 2020-02-07 15:50:53 -08:00
Michael Schurter 9d3093fa31 test: fix missing agent shutdowns 2020-02-07 15:50:53 -08:00
Michael Schurter d96ceee8c5 testagent: fix case where agent would retry forever 2020-02-07 15:50:53 -08:00
Michael Schurter 3170dfd452 test: simplify code 2020-02-07 15:50:53 -08:00
Michael Schurter e903501e65 test: improve error messages when failing 2020-02-07 15:50:53 -08:00
Michael Schurter 63032917fc test: allow goroutine to exit even if test blocks 2020-02-07 15:50:53 -08:00
Michael Schurter c5073f61a7 test: add timeout to ease debugging 2020-02-07 15:50:53 -08:00
Michael Schurter 9905dec6a3 test: workaround limits race 2020-02-07 15:50:53 -08:00
Michael Schurter 19a1932bbb test: wait longer than timeout
The 1s timeout raced with the 1s deadline it was trying to detect.
2020-02-07 15:50:53 -08:00
Michael Schurter fd81208db7 test: fix flaky health test
Test set Agent.client=nil which prevented the client from being
shutdown. This leaked goroutines and could cause panics due to the
leaked client goroutines logging after their parent test had finished.

Removed ACLs from the server test because I couldn't get it to work with
the test agent, and it tested very little.
2020-02-07 15:50:53 -08:00
Michael Schurter 14c5ef3a8d test: fix race around reused default rpc addr
The default RPC addr was a global which is fine for normal runtime use
when it only has a single user.

However many tests modify it and cause races. Follow our convention of
returning defaults from funcs instead of using globals.
2020-02-07 15:50:53 -08:00
Michael Schurter 2896f78f77 client: fix race accessing Node.status
* Call Node.Canonicalize once when Node is created.
 * Lock when accessing fields mutated by node update goroutine
2020-02-07 15:50:47 -08:00
Jeff Escalante 0689f30384
update dependencies 2020-02-07 17:45:35 -05:00
Michael Lange ccefc46912
Merge pull request #7099 from hashicorp/b-ui/mobile-styles-not-full-width
UI: Override the max-width on mobile to avoid losing space due to non-existent gutter menu
2020-02-07 14:27:50 -08:00
Michael Lange 1f05e6dff3
Merge pull request #7098 from hashicorp/b-ui/consistent-popover-buttons
UI: Explicit transparent bg on popover actions
2020-02-07 14:27:08 -08:00
Michael Lange 1431343d18 Override the max-width on mobile to avoid losing space due to non-existent gutter menu 2020-02-07 14:22:00 -08:00
Michael Lange c7543ee020 Explicit transparent bg on popover actions 2020-02-07 14:17:13 -08:00
Jeff Escalante fdd0a59ec9
add netlify.toml 2020-02-07 11:41:37 -05:00
Mahmood Ali f9ac62bb78
Update helper/pool/pool.go
Co-Authored-By: Michael Schurter <mschurter@hashicorp.com>
2020-02-06 19:24:58 -05:00
Jeff Escalante b34c5aa187
circle config adjustments 2020-02-06 18:58:07 -05:00
Jeff Escalante 6c8f079d24
new website 2020-02-06 18:45:31 -05:00
Tim Gross 0c6e164e8f
e2e: add --quiet flag to s3 copy to reduce log spam (#7085) 2020-02-06 09:24:20 -05:00
Seth Hoenig 351d32cd81
Merge pull request #7071 from hashicorp/b-e2e-cacls-wait-longer
e2e: wait 2m rather than 10s after disabling consul acls
2020-02-04 14:05:10 -06:00
Michael Schurter 491e13bcbe
Merge pull request #7074 from hashicorp/docs-changelog-6065
docs: #6065 shipped in v0.10.0, not v0.9.6
2020-02-04 11:57:46 -08:00
Michael Schurter a83f0a4463 docs: #6065 shipped in v0.10.0, not v0.9.6
PR #6065 was intended to be backported to v0.9.6 to fix issue #6223.
However it appears to have not been backported:

 * https://github.com/hashicorp/nomad/blob/v0.9.6/client/allocrunner/taskrunner/task_runner.go#L1349-L1351
 * https://github.com/hashicorp/nomad/blob/v0.9.7/client/allocrunner/taskrunner/task_runner.go#L1349-L1351

The fix was included in v0.10.0:

 * https://github.com/hashicorp/nomad/blob/v0.10.0/client/allocrunner/taskrunner/task_runner.go#L1363-L1370
2020-02-04 11:19:47 -08:00
Drew Bailey 9beab1ac37
Merge pull request #7072 from hashicorp/system-sched-e2e
System sched e2e
2020-02-04 14:16:21 -05:00