Matt Keeler
b5cdbbd033
Merge pull request #3990 from hashicorp/b-gh-3854
...
Warn when node name isnt a valid DNS label
2018-03-29 09:04:47 -04:00
Preetha
d43b3c18d8
Merge pull request #3995 from hashicorp/f-update-dns-lib
...
update dns lib
2018-03-28 11:57:19 -05:00
Hannah Oppenheimer
c0bfc6d258
Merge pull request #3991 from hashicorp/community-organization
...
Alphabetizing community tools list
2018-03-28 11:36:02 -05:00
Preetha Appan
1476f3636c
Update CHANGELOG
2018-03-28 10:28:14 -05:00
Preetha Appan
c115a2d7ba
vendorfmt
2018-03-28 10:25:49 -05:00
Pierre Souchay
ab9dd18bec
Bump version of miekg/dns to 1.0.4
...
See https://github.com/hashicorp/consul/issues/3977
While trying to improve furthermore #3948 (This pull request is still valid since we are not using Compression to compute the result anyway).
I saw a strange behaviour of dns library.
Basically, msg.Len() and len(msg.Pack()) disagree on Message len.
Thus, calculation of DNS response is false consul relies on msg.Len() instead of the result of Pack()
This is linked to miekg/dns#453 and a fix has been provided with miekg/dns#454
Would it be possible to upgrade miekg/dns to a more recent function ?
Consul might for instance upgrade to a post 1.0 release such as https://github.com/miekg/dns/releases/tag/v1.0.4
2018-03-28 10:23:57 -05:00
Preetha Appan
d9d9944179
Renames agent API layer for service metadata to "meta" for consistency
2018-03-28 09:04:50 -05:00
Preetha Appan
9d3fa622fb
Update changelog
2018-03-27 16:42:50 -05:00
Preetha
8dacb12c79
Merge pull request #3881 from pierresouchay/service_metadata
...
Feature Request: Support key-value attributes for services
2018-03-27 16:33:57 -05:00
Preetha Appan
3c4a0d602a
Update CHANGELOG
2018-03-27 16:09:55 -05:00
Preetha
f91db69d6e
Merge pull request #3984 from hashicorp/f-allow-federation-disable
...
Allows disabling WAN federation by setting serf WAN port to -1
2018-03-27 16:05:53 -05:00
Matt Keeler
fd9297ad8f
Formatting update
2018-03-27 16:31:27 -04:00
Pierre Souchay
b9ae4e647f
Added validation of ServiceMeta in Catalog
...
Fixed Error Message when ServiceMeta is not valid
Added Unit test for adding a Service with badly formatted ServiceMeta
2018-03-27 22:22:42 +02:00
Preetha Appan
17a011b9bd
fix typo and remove comment
2018-03-27 14:28:05 -05:00
Matt Keeler
2d8a68cce9
GH-3854: Warn when node name isnt a valid DNS label
2018-03-27 15:00:33 -04:00
Preetha
a4d29e674f
Merge pull request #3988 from guidoiaquinti/master
...
Bumps go version to 1.10
2018-03-27 12:09:18 -05:00
Guido Iaquinti
7ca29694b6
Updates CHANGELOG.md
2018-03-27 17:30:20 +01:00
Guido Iaquinti
c1ce5ca55c
Bumps go version to 1.10
2018-03-27 17:27:51 +01:00
Preetha Appan
6d16afc65c
Remove unnecessary nil checks
2018-03-27 10:59:42 -05:00
Preetha Appan
c21c2da690
Fix test and remove unused method
2018-03-27 09:44:41 -05:00
Paul Banks
eed1ef851b
Add vendored `testify/require` subpackage; upgrade `assert` to match. ( #3986 )
2018-03-27 15:19:15 +01:00
Preetha Appan
68c296b8ce
Update CHANGELOG.md
2018-03-27 08:31:02 -05:00
Preetha
cfcc2712e9
Merge pull request #3982 from hashicorp/yamux_update
...
Update yamux to pick up performance improvements
2018-03-27 08:28:00 -05:00
Preetha Appan
512f9a50fc
Allows disabling WAN federation by setting serf WAN port to -1
2018-03-26 14:21:06 -05:00
Kyle Havlovitz
f7352182b9
Merge pull request #3979 from guidoiaquinti/master
...
Consolidate logging output
2018-03-26 10:07:20 -07:00
Preetha Appan
16962cccfa
Update yamux to pick up performance improvements
2018-03-26 08:56:40 -05:00
Jack Pearkes
9a91b4eaef
Merge pull request #3927 from hashicorp/docs-encrypt-key-note
...
Docs: Clarify encrypt key for WAN joined DCs
2018-03-22 14:16:02 -07:00
Hannah Oppenheimer
712f8cc0f1
Alphabetizing community tools list
2018-03-22 12:36:42 -05:00
Pierre Souchay
90d2f7bca1
Merge remote-tracking branch 'origin/master' into node_health_should_change_service_index
2018-03-22 13:07:11 +01:00
Pierre Souchay
9cc9dce848
More test cases
2018-03-22 12:41:06 +01:00
Pierre Souchay
7e8e4e014b
Added new test regarding checks index
2018-03-22 12:20:25 +01:00
Pierre Souchay
a8b66fb7aa
Fixed minor typo in comments
...
Might fix unstable travis build
2018-03-22 10:30:10 +01:00
Guido Iaquinti
244fc72b05
Add package name to log output
2018-03-21 15:56:14 +00:00
Jack Pearkes
bf2b3f8d88
Merge pull request #3929 from sryabkov/patch-1
...
Highlighting the dead link in documentation
2018-03-19 16:00:32 -07:00
Paul Banks
d659e034fe
Note TLS cipher suite support changes
2018-03-19 21:51:14 +00:00
Josh Soref
1dd8c378b9
Spelling ( #3958 )
...
* spelling: another
* spelling: autopilot
* spelling: beginning
* spelling: circonus
* spelling: default
* spelling: definition
* spelling: distance
* spelling: encountered
* spelling: enterprise
* spelling: expands
* spelling: exits
* spelling: formatting
* spelling: health
* spelling: hierarchy
* spelling: imposed
* spelling: independence
* spelling: inspect
* spelling: last
* spelling: latest
* spelling: client
* spelling: message
* spelling: minimum
* spelling: notify
* spelling: nonexistent
* spelling: operator
* spelling: payload
* spelling: preceded
* spelling: prepared
* spelling: programmatically
* spelling: required
* spelling: reconcile
* spelling: responses
* spelling: request
* spelling: response
* spelling: results
* spelling: retrieve
* spelling: service
* spelling: significantly
* spelling: specifies
* spelling: supported
* spelling: synchronization
* spelling: synchronous
* spelling: themselves
* spelling: unexpected
* spelling: validations
* spelling: value
2018-03-19 16:56:00 +00:00
Paul Banks
4a684ce6fb
Merge pull request #3961 from canterberry/docs/tls-cipher-suites
...
📝 Clarify the list of supported TLS cipher suites
2018-03-19 16:51:14 +00:00
Paul Banks
b86de4c2e3
Use master
2018-03-19 16:50:52 +00:00
Paul Banks
e2673c76d6
Merge pull request #3962 from canterberry/upgrade/tls-cipher-suites
...
🔒 Update supported TLS cipher suites
2018-03-19 16:44:33 +00:00
Paul Banks
4b01c1a147
Merge pull request #3966 from hashicorp/docs-ui-acls
...
website: add UI section to ACL guide
2018-03-19 16:40:50 +00:00
Pierre Souchay
3eb287f57d
Fixed typo in comments
2018-03-19 17:12:08 +01:00
Pierre Souchay
eb2a4eaea3
Refactoring to have clearer code without weird bool
2018-03-19 16:12:54 +01:00
Pierre Souchay
a5f6ac0df4
[BUGFIX] When a node level check is removed, ensure all services of node are notified
...
Bugfix for https://github.com/hashicorp/consul/pull/3899
When a node level check is removed (example: maintenance),
some watchers on services might have to recompute their state.
If those nodes are performing blocking queries, they have to be notified.
While their state was updated when node-level state did change or was added
this was not the case when the check was removed. This fixes it.
2018-03-19 14:14:03 +01:00
Preetha Appan
5b5850aac0
Update CHANGELOG
2018-03-16 09:39:00 -05:00
Preetha Appan
84bd6dc5d1
cleanup unit test code a bit
2018-03-16 09:36:57 -05:00
Preetha
164fb3f48c
Merge pull request #3885 from eddsteel/support-options-requests
...
Support OPTIONS requests
2018-03-16 09:20:16 -05:00
Devin Canterberry
8a5df6ecc3
🎨 Formatting changes only; convert leading space to tabs
2018-03-15 10:30:38 -07:00
Devin Canterberry
bd11f567c4
📝 Prefer brevity at the cost of some ambiguity
2018-03-15 10:25:27 -07:00
Devin Canterberry
2001b9f35f
✅ Match expectation of TLSCipherSuites to values of tls_cipher_suites
2018-03-15 10:19:46 -07:00
Devin Canterberry
881d20c606
🐛 Formatting changes only; add missing trailing commas
2018-03-15 10:19:46 -07:00