Commit Graph

17046 Commits

Author SHA1 Message Date
Mahmood Ali
f6cf206f5a Merge pull request #7044 from hashicorp/f-use-multiplexv2
rpc: Use MultiplexV2 for connections
2020-02-13 12:07:20 -05:00
Drew Bailey
8d222b6ce8 Merge pull request #7112 from hashicorp/f-include-pro-tag
include pro tag in serveral oss.go files
2020-02-13 11:26:41 -05:00
Kyle MacDonald
e3c14bd921 website: fix 'edit this page' path 2020-02-13 10:22:49 -05:00
Jeff Escalante
36968b9e5a Merge pull request #7092 - New Website 2020-02-12 16:11:49 -05:00
Seth Hoenig
4c4dd0faac Merge pull request #7129 from hashicorp/b-consistent-ct-name
command: use consistent CONSUL_HTTP_TOKEN name
2020-02-12 12:27:46 -06:00
Seth Hoenig
0a93ddda01 Merge pull request #7127 from hashicorp/b-unset-ct
nomad: unset consul token on job register
2020-02-12 12:25:58 -06:00
Seth Hoenig
7173cb217f docs: update changelog mentioning consul token passthrough 2020-02-12 12:24:04 -06:00
Seth Hoenig
5ccc9a634a command: use consistent CONSUL_HTTP_TOKEN name
Consul CLI uses CONSUL_HTTP_TOKEN, so Nomad should use the same.
Note that consul-template uses CONSUL_TOKEN, which Nomad also uses,
so be careful to preserve any reference to that in the consul-template
context.
2020-02-12 10:42:33 -06:00
Seth Hoenig
b5b5e50010 nomad: assert consul token is unset on job register in tests 2020-02-12 10:17:42 -06:00
Seth Hoenig
a67710c9b5 nomad: unset consul token on job register 2020-02-12 09:58:51 -06:00
Jeff Escalante
fae3fbdb5b add changes from #7078 2020-02-11 16:31:14 -05:00
Jeff Escalante
f95a024778 add release candidate from #7120 2020-02-11 16:31:14 -05:00
Jeff Escalante
0f61c22f35 add changes from #7121 2020-02-11 15:39:03 -05:00
Drew Bailey
76e1785d13 Merge pull request #7122 from hashicorp/pprof/changelog
change log for remote pprof endpoints
2020-02-11 14:32:54 -05:00
Drew Bailey
1dd45d85bd change log for remote pprof endpoints 2020-02-11 14:30:55 -05:00
Mahmood Ali
ce6b8f231b Merge pull request #7108 from hashicorp/ch-windows-binaries
changelog windows binaries being signed
2020-02-10 16:57:16 -05:00
Drew Bailey
7955f2b3a6 include pro tag in serveral oss.go files 2020-02-10 15:56:14 -05:00
Jeff Escalante
5e8b34017c fix a couple more links 2020-02-10 14:20:59 -05:00
Jeff Escalante
448a3f8791 css fix 2020-02-10 14:00:38 -05:00
Jeff Escalante
9fa03d27f6 add link checker, fix a redirect, remove unused component 2020-02-10 13:56:55 -05:00
Jeff Escalante
424a241153 update deps to add minor style fixes 2020-02-10 12:46:31 -05:00
Jeff Escalante
0dba81db8b remove extra redirect file 2020-02-10 12:44:34 -05:00
Mahmood Ali
22f7844303 changelog windows binaries being signed
Note that 0.10.4, nomad windows binaries will be signed.

[ci skip]
2020-02-10 09:11:00 -05:00
Jeff Escalante
36a98acded update dependencies 2020-02-07 17:45:35 -05:00
Michael Lange
4757f87f0c Merge pull request #7099 from hashicorp/b-ui/mobile-styles-not-full-width
UI: Override the max-width on mobile to avoid losing space due to non-existent gutter menu
2020-02-07 14:27:50 -08:00
Michael Lange
6eee8d6cff Merge pull request #7098 from hashicorp/b-ui/consistent-popover-buttons
UI: Explicit transparent bg on popover actions
2020-02-07 14:27:08 -08:00
Michael Lange
17e2947475 Override the max-width on mobile to avoid losing space due to non-existent gutter menu 2020-02-07 14:22:00 -08:00
Michael Lange
b73ac893a4 Explicit transparent bg on popover actions 2020-02-07 14:17:13 -08:00
Jeff Escalante
8e14117bbd add netlify.toml 2020-02-07 11:41:37 -05:00
Mahmood Ali
cac99e1a08 Update helper/pool/pool.go
Co-Authored-By: Michael Schurter <mschurter@hashicorp.com>
2020-02-06 19:24:58 -05:00
Jeff Escalante
b55851ec14 circle config adjustments 2020-02-06 18:58:07 -05:00
Jeff Escalante
19c404ca79 new website 2020-02-06 18:45:31 -05:00
Tim Gross
8d173664cb e2e: add --quiet flag to s3 copy to reduce log spam (#7085) 2020-02-06 09:24:20 -05:00
Seth Hoenig
729e0c20a5 Merge pull request #7071 from hashicorp/b-e2e-cacls-wait-longer
e2e: wait 2m rather than 10s after disabling consul acls
2020-02-04 14:05:10 -06:00
Michael Schurter
a74917e07b Merge pull request #7074 from hashicorp/docs-changelog-6065
docs: #6065 shipped in v0.10.0, not v0.9.6
2020-02-04 11:57:46 -08:00
Michael Schurter
d55c549a31 docs: #6065 shipped in v0.10.0, not v0.9.6
PR #6065 was intended to be backported to v0.9.6 to fix issue #6223.
However it appears to have not been backported:

 * https://github.com/hashicorp/nomad/blob/v0.9.6/client/allocrunner/taskrunner/task_runner.go#L1349-L1351
 * https://github.com/hashicorp/nomad/blob/v0.9.7/client/allocrunner/taskrunner/task_runner.go#L1349-L1351

The fix was included in v0.10.0:

 * https://github.com/hashicorp/nomad/blob/v0.10.0/client/allocrunner/taskrunner/task_runner.go#L1363-L1370
2020-02-04 11:19:47 -08:00
Drew Bailey
f944959cdd Merge pull request #7072 from hashicorp/system-sched-e2e
System sched e2e
2020-02-04 14:16:21 -05:00
Drew Bailey
84cc906968 simplify job, better error 2020-02-04 13:59:39 -05:00
Drew Bailey
8bf5016880 fix check 2020-02-04 12:16:20 -05:00
Drew Bailey
39c9c20e88 rm unused field 2020-02-04 12:02:01 -05:00
Drew Bailey
3609e3adc1 clean up 2020-02-04 11:59:28 -05:00
Drew Bailey
5c2075e463 get test passing, new util func to wait for not pending 2020-02-04 11:56:37 -05:00
Drew Bailey
756f5c7d79 add e2e test for system sched ineligible nodes 2020-02-04 11:56:33 -05:00
Seth Hoenig
0f2d9ea915 e2e: wait 2m rather than 10s after disabling consul acls
Pretty sure Consul / Nomad clients are often not ready yet after
the ConsulACLs test disables ACLs, by the time the next test starts
running.

Running locally things tend to work, but in TeamCity this seems to
be a recurring problem. However, when running locally sometimes I do
see that the "show status" step after disabling ACLs, some nodes are
still initializing, suggesting we're right on the border of not waiting
long enough

    nomad node status
    ID        DC   Name              Class   Drain  Eligibility  Status
    0e4dfce2  dc1  EC2AMAZ-JB3NF9P   <none>  false  eligible     ready
    6b90aa06  dc2  ip-172-31-16-225  <none>  false  eligible     ready
    7068558a  dc2  ip-172-31-20-143  <none>  false  eligible     ready
    e0ae3c5c  dc1  ip-172-31-25-165  <none>  false  eligible     ready
    15b59ed6  dc1  ip-172-31-23-199  <none>  false  eligible     initializing

Going to try waiting a full 2 minutes after disabling ACLs, hopefully that
will help things Just Work. In the future, we should probably be parsing the
output of the status checks and actually confirming all nodes are ready.

Even better, maybe that's something shipyard will have built-in.
2020-02-04 10:51:03 -06:00
Tim Gross
ed41d7b590 e2e: rename linux runner to avoid implicit build tag (#7070)
Go implicitly treats files ending with `_linux.go` as build tagged for
Linux only. This broke the e2e provisioning framework on macOS once we
tried importing it into the `e2e/consulacls` module.
2020-02-04 10:55:38 -05:00
Tim Gross
15a2acc741 e2e: improve provisioning defaults and documentation (#7062)
This changeset improves the ergonomics of running the Nomad e2e test
provisioning process by defaulting to a blank `nomad_sha` in the
Terraform configuration. By default, a user will now need to pass in
one of the Nomad version flags. But they won't have to manually edit
the `provisioning.json` file for the common case of deploying a
released version of Nomad, and won't need to put dummy values for
`nomad_sha`.

Includes general documentation improvements.
2020-02-04 10:37:00 -05:00
Seth Hoenig
18bccb2348 Merge pull request #7060 from hashicorp/f-e2e-more-missed-debug
e2e: turn no-ACLs connect tests back on
2020-02-04 08:47:10 -06:00
Seth Hoenig
a2ee80402d e2e: turn no-ACLs connect tests back on
Also cleanup more missed debugging things >.>
2020-02-03 20:46:36 -06:00
Mahmood Ali
7144efe0c5 rpc: Use MultiplexV2 for connections
MultiplexV2 is a new connection multiplex header that supports multiplex both
RPC and streaming requests over the same Yamux connection.

MultiplexV2 was added in 0.8.0 as part of
https://github.com/hashicorp/nomad/pull/3892 .  So Nomad 0.11 can expect it to
be supported.  Though, some more rigorous testing is required before merging
this.

I want to call out some implementation details:

First, the current connection pool reuses the Yamux stream for multiple RPC calls,
and doesn't close them until an error is encountered.  This commit doesn't
change it, and sets the `RpcNomad` byte only at stream creation.

Second, the StreamingRPC session gets closed by callers and cannot be reused.
Every StreamingRPC opens a new Yamux session.
2020-02-03 19:31:39 -05:00
Michael Schurter
61d4a44b1f docs: fix typo, ordering, & style in changelog 2020-02-03 13:59:57 -08:00