8000 feat: add provisioner daemon and jobs endpoints and commands by mafredri · Pull Request #15940 · coder/coder · GitHub
[go: up one dir, main page]

Skip to content

feat: add provisioner daemon and jobs endpoints and commands #15940

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 21 commits into from
Closed
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
lint
  • Loading branch information
mafredri committed Jan 2, 2025
commit b57bc8c9108c95d785879ae8d4dbd5440ff386d8
2 changes: 1 addition & 1 deletion coderd/database/dbmem/dbmem.go
Original file line number Diff line number Diff line change
Expand Up @@ -3749,7 +3749,7 @@ func (q *FakeQuerier) GetProvisionerDaemonsByOrganization(_ context.Context, arg
return daemons, nil
}

func (q *FakeQuerier) GetProvisionerDaemonsWithStatusByOrganization(ctx context.Context, arg database.GetProvisionerDaemonsWithStatusByOrganizationParams) ([]database.GetProvisionerDaemonsWithStatusByOrganizationRow, error) {
func (q *FakeQuerier) GetProvisionerDaemonsWithStatusByOrganization(_ context.Context, arg database.GetProvisionerDaemonsWithStatusByOrganizationParams) ([]database.GetProvisionerDaemonsWithStatusByOrganizationRow, error) {
err := validateDatabaseType(arg)
if err != nil {
return nil, err
Expand Down
2 changes: 1 addition & 1 deletion docs/admin/monitoring/logs.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Connect logs are all captured in the `coderd` logs.
## `provisionerd` Logs

Logs for [external provisioners](../provisioners.md) are structured
[and configured](../../reference/cli/provisioner_start.md#--log-human) similarly
[and configured](../../reference/cli/provisioners_start.md#--log-human) similarly
to `coderd` logs. Use these logs to troubleshoot and monitor the Terraform
operations behind workspaces and templates.

Expand Down
6 changes: 3 additions & 3 deletions docs/admin/provisioners.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ For example, running 30 provisioner containers will allow 30 users to start
workspaces at the same time.

Provisioners are started with the
[`coder provisioner start`](../reference/cli/provisioner_start.md) command in
[`coder provisioner start`](../reference/cli/provisioners_start.md) command in
the [full Coder binary](https://github.com/coder/coder/releases). Keep reading
to learn how to start provisioners via Docker, Kubernetes, Systemd, etc.

Expand Down Expand Up @@ -235,7 +235,7 @@ This is illustrated in the below table:

Provisioners can broadly be categorized by scope: `organization` or `user`. The
scope of a provisioner can be specified with
[`-tag=scope=<scope>`](../reference/cli/provisioner_start.md#-t---tag) when
[`-tag=scope=<scope>`](../reference/cli/provisioners_start.md#-t---tag) when
starting the provisioner daemon. Only users with at least the
[Template Admin](./users/index.md#roles) role or higher may create
organization-scoped provisioner daemons.
Expand All @@ -245,7 +245,7 @@ There are two exceptions:
- [Built-in provisioners](../reference/cli/server.md#--provisioner-daemons) are
always organization-scoped.
- External provisioners started using a
[pre-shared key (PSK)](../reference/cli/provisioner_start.md#--psk) are always
[pre-shared key (PSK)](../reference/cli/provisioners_start.md#--psk) are always
organization-scoped.

### Organization-Scoped Provisioners
Expand Down
0