Commit graph

16557 commits

Author SHA1 Message Date
Blake Covarrubias f3efb4af89 Redirect old K8s uninstall URLs to new location 2022-01-20 08:52:51 -08:00
Blake Covarrubias bb2242a9a2 Consolidate /download-tools redirects 2022-01-20 08:52:51 -08:00
Blake Covarrubias 03b57c9e6c Remove duplicate redirects 2022-01-20 08:52:51 -08:00
Blake Covarrubias 54b37823bc Convert absolute URLs to relative URLs for consul.io 2022-01-20 08:52:51 -08:00
Blake Covarrubias d81889bb41 docs: Avoid redirects by pointing links to new URLs
Avoid HTTP redirects for internal site links by updating old URLs to
point to the new location for the target content.
2022-01-20 08:52:51 -08:00
R.B. Boyer 05c7373a28 bulk rewrite using this script
set -euo pipefail

    unset CDPATH

    cd "$(dirname "$0")"

    for f in $(git grep '\brequire := require\.New(' | cut -d':' -f1 | sort -u); do
        echo "=== require: $f ==="
        sed -i '/require := require.New(t)/d' $f
        # require.XXX(blah) but not require.XXX(tblah) or require.XXX(rblah)
        sed -i 's/\brequire\.\([a-zA-Z0-9_]*\)(\([^tr]\)/require.\1(t,\2/g' $f
        # require.XXX(tblah) but not require.XXX(t, blah)
        sed -i 's/\brequire\.\([a-zA-Z0-9_]*\)(\(t[^,]\)/require.\1(t,\2/g' $f
        # require.XXX(rblah) but not require.XXX(r, blah)
        sed -i 's/\brequire\.\([a-zA-Z0-9_]*\)(\(r[^,]\)/require.\1(t,\2/g' $f
        gofmt -s -w $f
    done

    for f in $(git grep '\bassert := assert\.New(' | cut -d':' -f1 | sort -u); do
        echo "=== assert: $f ==="
        sed -i '/assert := assert.New(t)/d' $f
        # assert.XXX(blah) but not assert.XXX(tblah) or assert.XXX(rblah)
        sed -i 's/\bassert\.\([a-zA-Z0-9_]*\)(\([^tr]\)/assert.\1(t,\2/g' $f
        # assert.XXX(tblah) but not assert.XXX(t, blah)
        sed -i 's/\bassert\.\([a-zA-Z0-9_]*\)(\(t[^,]\)/assert.\1(t,\2/g' $f
        # assert.XXX(rblah) but not assert.XXX(r, blah)
        sed -i 's/\bassert\.\([a-zA-Z0-9_]*\)(\(r[^,]\)/assert.\1(t,\2/g' $f
        gofmt -s -w $f
    done
2022-01-20 10:46:23 -06:00
R.B. Boyer c12b0ee3d2 test: normalize require.New and assert.New syntax 2022-01-20 10:45:56 -06:00
David Yu d8b9eb7756
docs: Add specific version install guide for consul-k8s CLI, refactor install (#12114)
* docs: Add specific version install guide for `consul-k8s` CLI

* parameterize version

* remove extra path

* Update k8s-cli.mdx

* slight formatting

* Update k8s-cli.mdx

* specific version details in overall install guide

* shell details

* Update install.mdx

* Update k8s-cli.mdx

* Update install.mdx

* broken link

* typo

* Update website/content/docs/k8s/installation/compatibility.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/installation/install.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* moving install cli commands to separate page

* add tabs, wip

* add specific distro install guides

* add upgrade tabs

* build failure

* not sure why heading is not working

* remove whitespace

* add more whitespace

* fixes on formatting

* remove package lock

* add back package lock json

* test

* latest

* remove modified file

* adding fix to yum install

* create folder for upgrade and move upgrade cli there

* revert package-lock

* adding upgrade file

* Update website/content/docs/k8s/upgrade/upgrade-cli.mdx

Co-authored-by: Thomas Eckert <teckert@hashicorp.com>

* Update website/content/docs/k8s/installation/install-cli.mdx

Co-authored-by: Thomas Eckert <teckert@hashicorp.com>

* Update website/content/docs/k8s/installation/install-cli.mdx

Co-authored-by: Thomas Eckert <teckert@hashicorp.com>

* Update install-cli.mdx

* multi-line copy

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
Co-authored-by: Thomas Eckert <teckert@hashicorp.com>
2022-01-20 08:26:31 -08:00
R.B. Boyer baf886c6f3
proxycfg: introduce explicit UpstreamID in lieu of bare string (#12125)
The gist here is that now we use a value-type struct proxycfg.UpstreamID
as the map key in ConfigSnapshot maps where we used to use "upstream
id-ish" strings. These are internal only and used just for bidirectional
trips through the agent cache keyspace (like the discovery chain target
struct).

For the few places where the upstream id needs to be projected into xDS,
that's what (proxycfg.UpstreamID).EnvoyID() is for. This lets us ALWAYS
inject the partition and namespace into these things without making
stuff like the golden testdata diverge.
2022-01-20 10:12:04 -06:00
Dan Upton 088ba2edaf
[OSS] Remove remaining references to master (#11827) 2022-01-20 12:47:50 +00:00
R.B. Boyer bc21e95909
update changelog (#12128) 2022-01-19 17:28:53 -06:00
Blake Covarrubias d571fc0fd4 docs: Link to supported config kinds in config write
Remove statement about service-defaults and proxy-defaults being the
only supported configuration entry types. Update the sentence to point
to the configuration entry documentation for a list of supported
types.
2022-01-19 15:19:05 -08:00
Blake Covarrubias 86d6d2b3ba docs: Fix typo in service resolver's RingHashConfig
Fix typo in documentation for service resolver's RingHashConfig. The
correct child parameters are `MinimumRingSize` and `MaximumRingSize`.
2022-01-19 15:17:53 -08:00
Evan Culver 6f419e65f1
Update version to use 1.11.2 as base (#12127) 2022-01-19 14:37:39 -08:00
Luke Kysow c785a5a0c5
Update k8s upgrade docs (#12123)
There is no longer the lifecycle sidecar
2022-01-19 13:41:30 -08:00
VictorBac 145703972a
Add GRPC and GRPCUseTLS to api.HealthCheckDefinition (#12108)
* Add GRPC to HealthCheckDefinition

* add GRPC and GRPCUseTLS
2022-01-19 16:09:15 -05:00
Bryce Kalow 049f3d2790
website: chore: upgrades react-content (#12120) 2022-01-19 14:36:56 -06:00
Blake Covarrubias 393584bd41
docs: Document .addr DNS domain in SRV responses (#12056)
Document `.addr` DNS subdomain that can be returned in SRV response
records.

Co-authored-by: Neena Pemmaraju <neena@hashicorp.com>
2022-01-19 09:45:30 -08:00
John Cowen 1eb93726a0
ui: Runtime Injectable Components (#11969)
- Simplifies how we 'import' our configuration files a little in order to make them more grokable.
- Starts to exclude files based on explicit configuration rather than convention.
- Adds the first instance of us being able to select an implementation (of multiple) of a component at runtime.
2022-01-19 10:14:59 +00:00
John Cowen e77becb59e
ui: Fixup KV folder creation then further creation within that folder (#12081)
The fix here is two fold:

- We shouldn't be providing the DataSource (which loads the data) with an id when we are creating from within a folder (in the buggy code we are providing the parentKey of the new KV you are creating)
- Being able to provide an empty id to the DataSource/KV repository and that repository responding with a newly created object is more towards the "new way of doing forms", therefore the corresponding code to return a newly created ember-data object. As we changed the actual bug in point 1 here, we need to make sure the repository responds with an empty object when the request id is empty.
2022-01-19 10:09:25 +00:00
Hariram Sankaran e22c4a818c
docs: Fix typo on NIA architecture page (#10797)
Fix typo under Task section. Change 'the dynamic service data' to
'that dynamic service data'.
2022-01-18 20:43:11 -08:00
Jared Kirschner 73219b6b92
Merge pull request #12100 from hashicorp/update-gateway-overview-visual
docs: clarify gateways don't connect to public internet
2022-01-18 19:03:32 -05:00
trujillo-adam 42d5c5d2a7
Merge pull request #11898 from hashicorp/docs/service-mesh-config-entries-add-partitions--1.11.0
updated configuration entry params for admin partitions 1.11
2022-01-18 15:46:15 -08:00
trujillo-adam c7331577c9 applied final feedback 2022-01-18 15:40:43 -08:00
trujillo-adam 55e9afec99
Apply suggestions from code review
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-01-18 15:31:58 -08:00
trujillo-adam c49773590f fixed formatting 2022-01-18 15:06:55 -08:00
trujillo-adam ffa7558658
Apply suggestions from code review
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2022-01-18 14:30:35 -08:00
Jared Kirschner c82e3130a0 docs: clarify gateways don't connect to internet
Consul's ingress and terminating gateways are meant to enable connectivity
within your organizational network between services outside the Consul service
mesh and those within. They are not meant to connect to the public internet.
2022-01-18 13:28:26 -08:00
trujillo-adam b2155dfa7c addressed feedback about binary - fixed bad formatting 2022-01-18 12:28:44 -08:00
trujillo-adam db32ca7be2 addressed feedback about binary 2022-01-18 12:23:17 -08:00
Evan Culver ec65890f01
connect: Upgrade Envoy 1.20 to 1.20.1 (#11895) 2022-01-18 14:35:27 -05:00
Scott Macfarlane de877038ef
Merge pull request #11860 from hashicorp/sm/rename-ecr-tag
Update ECR tag in CRT Builds
2022-01-18 11:00:41 -08:00
David Yu 0f3636a741
docs: move K8s compatability matrix and add more details for compatibility (#11936)
* adding changes to move compat matrix

* add back compat matrix

* add Vault versions

* adding details around monorepo

* add note about secrets backend

* small refactors

* Slight update with OpenShift notes

* Add note about OpenShift 4.4.x

* Update website/content/docs/k8s/installation/compatibility.mdx

Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>

* small formatting

* Removing Consul image column from Vault as secrets backend section

Since we already imply that default consul-k8s image should be used for support

* formating changes

Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-01-18 10:33:26 -08:00
Dhia Ayachi 7e57aa8d36
update serf to v0.9.7 (#12057)
* update serf to v0.9.7

* add change log

* update changelog
2022-01-18 13:03:22 -05:00
Jared Kirschner 39f00317c4
Merge pull request #12101 from hashicorp/wan-federation-with-mesh-gateways-networking-visual
docs: show WAN fed with/without mesh gateways
2022-01-18 09:22:13 -05:00
Daniel Nephin 59206e38c7 rpc: cleanup exit and blocking condition logic in blockingQuery
Remove some unnecessary comments around query_blocking metric. The only
line that needs any comments in the atomic decrement.

Cleanup the block and return comments and logic. The old comment about
AbandonCh may have been relevant before, but it is expected behaviour
now.

The logic was simplified by inverting the err condition.
2022-01-17 16:59:25 -05:00
Daniel Nephin a28d1268cb rpc: extract rpcQueryTimeout method
This helps keep the logic in blockingQuery more focused. In the future we
may have a separate struct for RPC queries which may allow us to move this
off of Server.
2022-01-17 16:59:25 -05:00
Daniel Nephin 751bc2e7d3 rpc: move the index defaulting to setQueryMeta.
This safeguard should be safe to apply in general. We are already
applying it to non-blocking queries that call blockingQuery, so it
should be fine to apply it to others.
2022-01-17 16:59:25 -05:00
Daniel Nephin 95e471052b rpc: add subtests to blockingQuery test 2022-01-17 16:59:25 -05:00
Daniel Nephin 6bf8efe607 rpc: refactor blocking query
To remove the TODO, and make it more readable.

In general this reduces the scope of variables, making them easier to reason about.
It also introduces more early returns so that we can see the flow from the structure
of the function.
2022-01-17 16:58:47 -05:00
Jared Kirschner f6f28c4952 docs: show WAN fed with/without mesh gateways 2022-01-16 16:55:12 -08:00
Jared Kirschner 9d24242b73
Merge pull request #12004 from hashicorp/consul-doc-day-changes-chip
Docs: Updating HTTP API endpoints with CLI equivalent links
2022-01-15 12:40:46 -05:00
Jared Kirschner fa6200bba3 docs: add missing link for intention list 2022-01-15 09:31:27 -08:00
Jared Kirschner 65d5836951 docs: don't treat CLI cmd cross-ref as info box 2022-01-15 09:29:35 -08:00
Thomas Kula fdd196ae1c
docs: Minor grammar change to ingress-gateway.mdx (#11365)
Use plural form of "listeners", not possessive form of "listener's"
2022-01-14 16:36:02 -08:00
Preetha 6826923f32
Add new page on multi DC ACLs (#12020)
New docs page that details the steps needed to configure ACLS and replication in federated datacenters.
2022-01-14 18:32:44 -06:00
Melissa Kam 23da971e97
Merge pull request #12087 from hashicorp/cts-tf-1.1
docs/nia: CTS Terraform v1.1 compatibility
2022-01-14 16:04:42 -06:00
Mark Anderson 40c616e8d7
Update website for latest version (#12099)
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-01-14 13:45:56 -08:00
Evan Culver 9fee197904
Add changelog from latest releases (#12095) 2022-01-14 13:35:46 -08:00
trujillo-adam 23ac796406 Merge branch 'docs/service-mesh-config-entries-add-partitions--1.11.0' of github.com:hashicorp/consul into docs/service-mesh-config-entries-add-partitions--1.11.0
pre and post docs day merge
2022-01-14 11:34:36 -08:00