Commit Graph

14468 Commits

Author SHA1 Message Date
Michael Lange
fc794efce8 Simplify options and selection names 2019-04-10 10:34:10 -05:00
Michael Lange
e1abb9f7fe Test coverage for job list facets 2019-04-10 10:34:10 -05:00
Michael Lange
49088a3d29 Model facets in the page object 2019-04-10 10:34:10 -05:00
Michael Lange
92a6809b2a Introduce encode/decode for array query params 2019-04-10 10:34:10 -05:00
Michael Lange
2808671c78 Support for the no options case 2019-04-10 10:34:10 -05:00
Michael Lange
9a6f1c9b85 Implement the job list filtering based on facet selection 2019-04-10 10:34:10 -05:00
Michael Lange
7b07d1b3da Implement the dynamic facet lists (datacenters and prefixes) 2019-04-10 10:34:10 -05:00
Michael Lange
49bd7acc5e Scaffold the facets and facet options for the jobs list page 2019-04-10 10:34:10 -05:00
Michael Lange
e1b0eb58e9 Remove the includes helper in favor of the contains helper 2019-04-10 10:34:10 -05:00
Michael Lange
ca6a6a2910 Harden dropdown styles to avoid accidental cascading 2019-04-10 10:34:10 -05:00
Michael Lange
083d7aed5c Add the right-alignment case to freestyle 2019-04-10 10:34:10 -05:00
Michael Lange
bff6039dca Always left-align the dropdown position to the trigger 2019-04-10 10:34:10 -05:00
Michael Lange
70426ad2cd Test coverage for the multi-select-dropdown component 2019-04-10 10:34:10 -05:00
Michael Lange
b4a921f511 Tab and keyboard navigation for multi-select 2019-04-10 10:34:10 -05:00
Michael Lange
32f815dc51 Round out the freestyle entry 2019-04-10 10:34:10 -05:00
Michael Lange
6909d3a8c9 Multi-select button-bar support 2019-04-10 10:34:10 -05:00
Michael Lange
a85a11dc42 Color alias for tags 2019-04-10 10:34:10 -05:00
Michael Lange
eae97d992c Persistence and onSelect handler for the multi-select-dropdown 2019-04-10 10:34:10 -05:00
Michael Lange
3cef4286ad Templating and styling the multi-select-dropdown component 2019-04-10 10:34:10 -05:00
Michael Lange
1affa098c0 Simple includes helper that works like Array#includes 2019-04-10 10:34:10 -05:00
Michael Lange
384ad49504 Freestyle entry for the new multi-select-dropdown component 2019-04-10 10:34:10 -05:00
Omar Khawaja
79132127b9 Nomad TLS with Vault (#5454)
* navigation and initial steps of guide

* generate certs with appropriate token

* configure Nomad to use TLS

* add cli keys and certs

* add server gossip encryption section

* fix mislabeled steps

* vault paths formatting

* remove bit about cert revocation

* add clarification in challenge that we will be securing an existing Nomad cluster

* add some comments to consul-template.hcl to help user walk through it

* clarifying comments for CLI certs templates

* reorganize steps, change permissions on certs, and sub pkill command with systemctl reload nomad

* correct step reference

* add rpc upgrade mode instructions

* correct typo
2019-04-09 12:13:37 -04:00
Michael Schurter
2382b48f8c website: remove RC note from download page 2019-04-09 09:12:07 -07:00
Michael Schurter
850632d873 Bump website to 0.9.0 2019-04-09 09:04:41 -07:00
Michael Schurter
8caa1c5b0d Bump to 0.9.1-dev 2019-04-09 09:01:48 -07:00
Michael Schurter
28e7687219 Release v0.9.0 2019-04-09 08:51:37 -07:00
Nomad Release bot
18dd59056e Generate files for 0.9.0 release 2019-04-09 01:56:00 +00:00
Mahmood Ali
ca9b27e9db scripts: better prerelease extractor 2019-04-08 21:42:10 -04:00
Preetha
bc98cf09e9 Merge pull request #5524 from hashicorp/docs-remove-beta-tag
Remove beta tags from 0.9 docs
2019-04-08 11:24:03 -05:00
Preetha
f812e25ac1 Merge pull request #5523 from hashicorp/upgrade_e2e
scripts for upgrade testing
2019-04-05 14:24:11 -05:00
Preetha Appan
19e1368b03 Remove beta tags from 0.9 docs 2019-04-05 14:11:56 -05:00
Nick Ethier
c65b1498b0 Merge pull request #5521 from hashicorp/b-docker-image-https
drivers/docker: fix image name handleing when prefixed with https://
2019-04-05 13:43:24 -04:00
Preetha Appan
c5dcdd3068 scripts for upgrade testing 2019-04-04 22:31:57 -05:00
Nick Ethier
a936f2575a drivers/docker: fix image name handleing when prefixed with https:// 2019-04-04 22:10:18 -04:00
Michael Schurter
010b9575db Bump download page to 0.9.0-rc2 2019-04-03 07:46:28 -07:00
Michael Schurter
b51e9e09fc Remove 0.9.0-rc2 generated files 2019-04-03 07:41:09 -07:00
Michael Schurter
865e433673 Release v0.9.0-rc2 2019-04-03 07:27:45 -07:00
Nomad Release bot
6a838b8c3b Generate files for 0.9.0-rc2 release 2019-04-03 01:54:29 +00:00
Preetha Appan
a09fb7d7bf small tweaks to load test jobs to make them work in Nomad 0.8.7 2019-04-02 20:38:56 -05:00
Mahmood Ali
39555db45f Merge pull request #5511 from hashicorp/b-executor-path-executable
This is a follow up work to https://github.com/hashicorp/nomad/pull/4813 to fix #4809 and fix a regression introduced in 0.9 in marking files in libcontainer executable.

#4809 bug is that `lookupBin` uses `exec.LookPath` when not inspecting task dir files.  `exec.LookPath` only returns a file if it's already marked as an executable path in https://github.com/golang/go/blob/go1.12.1/src/os/exec/lp_unix.go#L24-L27 .  This affects raw exec as if passed an absolute path to file, `lookupBin` returns an error if file isn't already an executable.  This explains why the error manifests when an absolute interpolated path is used (e.g. `${NOMAD_TASK_DIR}/hellov1`) but not when using a task rel dir (e.g. `local/hellov1`) in the above examples used in ticket.

PR #4813 remedied this problem for raw exec but inadvertably broke libcontainer executor, as it made `lookupBin` returns the paths to host files rather than ones found inside chroot.

This PR reorders the evaluation, so we go back to 0.8 behavior of looking up task directories first, but then check for host paths before using `exec.LookPath`.

This PR is broken into three commits to illustrate evolution and confirming hypothesis:
1. 9adab75ac8 : Adding a test illustrating how libcontainer executor fails at marking processes as executable in https://travis-ci.org/hashicorp/nomad/jobs/514942694 - note that the test doesn't depend on artifacts or interpolated paths
2. d441cdd52f: reverting PR #4809 and showing the test fail now with raw_exec case (as expected) in https://travis-ci.org/hashicorp/nomad/jobs/514944065
2. 244544b735: in where we add the check in appropriate place next to `exec.LookPath(...)` for absolute paths and have a green job in https://travis-ci.org/hashicorp/nomad/jobs/514945024

## Future work

Inspecting `lookupBin` in 0.8 and 0.9 case, we have a bug in using `exec.LookPath` for the libcontainer executor case.  We should be looking up paths based on the container chroot and container PATH rather than the host's.  However, this is not a 0.9.0 regression and was present in 0.8; so punting to fix it post 0.9.
2019-04-02 20:53:31 -04:00
Mahmood Ali
244544b735 an alternative order 2019-04-02 20:00:54 -04:00
Mahmood Ali
d441cdd52f try not without checking stat first 2019-04-02 19:55:44 -04:00
Mahmood Ali
9adab75ac8 basic test for #4809 2019-04-02 19:50:35 -04:00
Michael Schurter
800bd848c1 Merge pull request #5504 from hashicorp/b-exec-path
executor/linux: make chroot binary paths absolute
2019-04-02 14:09:50 -07:00
Michael Schurter
56048bda0a executor/linux: comment this bizarre code 2019-04-02 11:25:45 -07:00
Michael Schurter
21e895e2e7 Revert "executor/linux: add defensive checks to binary path"
This reverts commit cb36f4537e.
2019-04-02 11:17:12 -07:00
Michael Schurter
8920d56212 Merge pull request #5503 from hashicorp/docs-nomad-oss-debug
Mention nomad-oss-debug in issue template
2019-04-02 10:08:07 -07:00
Michael Schurter
c37cff61b8 Mention nomad-oss-debug in issue template
Also reordered the sections to put the logs at the end.
2019-04-02 10:07:06 -07:00
Michael Schurter
0007443db7 Merge pull request #5510 from hashicorp/b-docker-stats
docker: fix send after close panic in stats
2019-04-02 10:01:28 -07:00
Michael Schurter
cb36f4537e executor/linux: add defensive checks to binary path 2019-04-02 09:40:53 -07:00