open-nomad/nomad/state
Seth Hoenig 9df33f622f nomad: proxy requests for Service Identity tokens between Clients and Consul
Nomad jobs may be configured with a TaskGroup which contains a Service
definition that is Consul Connect enabled. These service definitions end
up establishing a Consul Connect Proxy Task (e.g. envoy, by default). In
the case where Consul ACLs are enabled, a Service Identity token is required
for these tasks to run & connect, etc. This changeset enables the Nomad Server
to recieve RPC requests for the derivation of SI tokens on behalf of instances
of Consul Connect using Tasks. Those tokens are then relayed back to the
requesting Client, which then injects the tokens in the secrets directory of
the Task.
2020-01-31 19:03:53 -06:00
..
autopilot.go goimports 2019-01-22 15:44:31 -08:00
autopilot_test.go Refactor redundancy_zone/upgrade_version out of client meta 2018-01-29 20:03:38 -08:00
schema.go nomad: proxy requests for Service Identity tokens between Clients and Consul 2020-01-31 19:03:53 -06:00
schema_test.go nomad: ensure a unique ClusterID exists when leader (gh-6702) 2020-01-31 19:03:26 -06:00
state_store.go nomad: proxy requests for Service Identity tokens between Clients and Consul 2020-01-31 19:03:53 -06:00
state_store_oss.go sync 2017-10-13 14:36:02 -07:00
state_store_test.go nomad: proxy requests for Service Identity tokens between Clients and Consul 2020-01-31 19:03:53 -06:00
testing.go goimports 2019-01-22 15:44:31 -08:00
testing_oss.go goimports 2019-01-22 15:44:31 -08:00