Jeff Escalante
ee102ac06c
remove export trailing slash
2020-04-28 12:53:19 -04:00
Jeff Escalante
8438c2a6a2
redirects port
2020-04-28 12:53:18 -04:00
Jeff Escalante
0fa88294e0
correct favicon
2020-04-28 12:53:18 -04:00
Jeff Escalante
bad492ad9e
anchor link fixes across a lot of pages
2020-04-28 12:53:18 -04:00
Jeff Escalante
086073d6fb
docs rendering
2020-04-28 12:53:18 -04:00
Jeff Escalante
957c04eb20
intro and api navigation converted
2020-04-28 12:52:44 -04:00
Jeff Escalante
0d9e72f1dc
initial
2020-04-28 12:52:43 -04:00
Brandon Romano
e53b5d2d10
Merge pull request #7716 from hashicorp/mw.add-alert-banner
...
website: add alert banner
2020-04-28 09:45:20 -07:00
Brandon Romano
86490107c9
Update with proper notification
2020-04-28 09:44:37 -07:00
Matt Keeler
fbb5c28c80
Updates to allow for using an enterprise specific token as the agents token
...
This is needed to allow for managed Consul instances to register themselves in the catalog with one of the managed service provider tokens.
2020-04-28 09:44:26 -04:00
Matt Keeler
901d6739ad
Some boilerplate to allow for ACL Bootstrap disabling configurability
2020-04-28 09:42:46 -04:00
Matt Keeler
49c90833ff
Update mapstructure to v1.2.3
...
This release contains a fix to prevent duplicate keys in the Metadata after decoding where the output value contains pointer fields.
2020-04-28 09:33:16 -04:00
Mike Wickett
df0a90039f
website: add alert banner
2020-04-28 08:56:21 -04:00
Freddy
f5c1e5268b
TLS Origination for Terminating Gateways ( #7671 )
2020-04-27 16:25:37 -06:00
Freddy
69266b720e
Terminating Gateways Proxy Configuration ( #7631 )
2020-04-27 14:41:33 -06:00
R.B. Boyer
462d90b5a0
update changelog
2020-04-27 14:30:27 -05:00
R.B. Boyer
2543a4d475
update changelog
2020-04-27 13:17:03 -05:00
freddygv
0ad47bdda5
Remove fallthrough
2020-04-27 12:00:14 -06:00
freddygv
ac809ec635
Add authz filter when creating filterchain
2020-04-27 11:08:41 -06:00
freddygv
3a44359d7b
Fix snapshot IsEmpty
2020-04-27 11:08:41 -06:00
freddygv
e751b83a3f
Clean up dead code, issue addressed by passing ws to serviceGatewayNodes
2020-04-27 11:08:41 -06:00
Freddy
a54f2fd055
Update agent/proxycfg/state_test.go
2020-04-27 11:08:41 -06:00
freddygv
e30d64289d
PR comments
2020-04-27 11:08:41 -06:00
freddygv
75e737b0f2
Fix internal endpoint test
2020-04-27 11:08:41 -06:00
freddygv
8697ab71e4
Fix listener error handling
2020-04-27 11:08:41 -06:00
freddygv
6ecb3b7a42
Skip filter chain creation if no client cert
2020-04-27 11:08:41 -06:00
freddygv
7667567688
Avoid deleting mappings for services linked to other gateways on dereg
2020-04-27 11:08:41 -06:00
freddygv
28fe6920fe
Re-fix bug in CheckConnectServiceNodes
2020-04-27 11:08:41 -06:00
freddygv
5e260b2913
Use golden files for gateway certs and fix listener test flakiness
2020-04-27 11:08:41 -06:00
freddygv
b2b5942f4b
Un-nest switch in gateway update handler
2020-04-27 11:08:40 -06:00
freddygv
7d5a02ad61
Add envoy integration tests
2020-04-27 11:08:40 -06:00
freddygv
3849b066a6
Allow terminating-gateway to setup listener before servicegroups are known
2020-04-27 11:08:40 -06:00
freddygv
929491c979
Add subset support
2020-04-27 11:08:40 -06:00
freddygv
bab101107c
Fix ConnectQueryBlocking test
2020-04-27 11:08:40 -06:00
freddygv
65e60d02f1
Fix bug in CheckConnectServiceNodes
...
Previously, if a blocking query called CheckConnectServiceNodes
before the gateway-services memdb table had any entries,
a nil watchCh would be returned when calling serviceTerminatingGatewayNodes.
This means that the blocking query would not fire if a gateway config entry
was added after the watch started.
In cases where the blocking query started on proxy registration,
the proxy could potentially never become aware of an upstream endpoint
if that upstream was going to be represented by a gateway.
2020-04-27 11:08:40 -06:00
freddygv
2e35a9bb18
Add xds cluster/listener/endpoint management
2020-04-27 11:08:40 -06:00
freddygv
c80f89b92f
Add proxycfg state management for terminating-gateways
2020-04-27 11:07:06 -06:00
freddygv
243c015c52
Require service:read to read terminating-gateway config
2020-04-27 11:07:06 -06:00
Matt Keeler
4b1b42cef5
A couple testing helper updates ( #7694 )
2020-04-27 12:17:38 -04:00
R.B. Boyer
04a98f66e9
update changelog
2020-04-24 17:36:06 -05:00
R.B. Boyer
f1d8ea7018
cli: ensure that 'snapshot save' is fsync safe and also only writes to the requested file on success ( #7698 )
2020-04-24 17:34:47 -05:00
R.B. Boyer
12a2cff517
update changelog
2020-04-24 17:19:59 -05:00
R.B. Boyer
032e0ae901
cli: fix usage of gzip.Reader to better detect corrupt snapshots during save/restore ( #7697 )
2020-04-24 17:18:56 -05:00
Kit Patella
82b0fbd975
Merge pull request #7699 from pierresouchay/fix_comment_misplaced
...
Fixed comment on wrong line
2020-04-24 10:09:58 -07:00
Chris Piraino
966af7f89f
Merge pull request #7677 from hashicorp/ingress/http-routing
...
Ingress gateways support discovery chain features and routing via mesh gateways
Signed-off-by: Kyle Havlovitz <kylehav@gmail.com>
2020-04-24 10:18:55 -05:00
Chris Piraino
b8a5fbf1bf
Allow ingress gateways to route through mesh gateways
...
- Adds integration test for mesh gateways local + remote modes with ingress
- ingress golden files updated for mesh gateway endpoints
2020-04-24 09:31:32 -05:00
Chris Piraino
af5cc8fd92
Add all the xds ingress tests
...
This commit copies many of the connect-proxy xds testcases and reuses
for ingress gateways. This allows us to more easily see changes to the
envoy configuration when make updates to ingress gateways.
2020-04-24 09:31:32 -05:00
Chris Piraino
b131b857da
Pull out setupTestVariationConfigEntriesAndSnapshot in proxycfg
...
This allows us to reuse the same variations for ingress gateway testing
2020-04-24 09:31:32 -05:00
Kyle Havlovitz
d433679bd8
Add http routing support and integration test to ingress gateways
2020-04-24 09:31:32 -05:00
Hans Hasselberg
ef88089924
auto_encrypt: add validations for auto_encrypt.{tls,allow_tls} ( #7704 )
...
Fixes https://github.com/hashicorp/consul/issues/7407 .
2020-04-24 15:51:38 +02:00