Commit Graph

18276 Commits

Author SHA1 Message Date
Thomas Eckert f51d245621 Add read command examples 2022-08-08 15:16:55 -04:00
Thomas Eckert 3d2b382153 Change &nbsp; to <nobr> 2022-08-08 14:56:50 -04:00
Kyle Havlovitz 2a0ab31ca4 Add some extra handling for destination deletes 2022-08-08 11:38:13 -07:00
Freddy 3989a8b71c
Add peering ACL docs (#13855)
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-08-08 11:44:25 -06:00
Thomas Eckert 3bc6a375c8 Remove "Required" column from options (they are all optional) 2022-08-08 12:57:48 -04:00
Thomas Eckert 2c0cb813d4 Update the table of contents with better descriptions 2022-08-08 12:53:41 -04:00
Chris S. Kim e74db7732e Retry docker build steps 2022-08-08 12:22:16 -04:00
claire labry b939b96cc4
Merge pull request #13790 from hashicorp/post-publish-website
introduces the post publish website event
2022-08-08 10:55:11 -05:00
sarahalsmiller da5a2ce2e8
Merge pull request #13675 from hashicorp/sa-restructure-documentation
Restructure Api Gateway Documentation
2022-08-08 10:35:23 -05:00
Freddy 82bf7a2e41
Merge pull request #14024 from hashicorp/peering/secrets-fixes 2022-08-08 09:30:09 -06:00
freddygv 1e48b4f665 Update snapshot test 2022-08-08 09:17:15 -06:00
Sarah Alsmiller 858ced4173 fix identation 2022-08-08 10:16:24 -05:00
freddygv 65bcd3d84f Re-validate existing secrets at state store
Previously establishment and pending secrets were only checked at the
RPC layer. However, given that these are Check-and-Set transactions we
should ensure that the given secrets are still valid when persisting a
secret exchange or promotion.

Otherwise it would be possible for concurrent requests to overwrite each
other.
2022-08-08 09:06:07 -06:00
Sarah Alsmiller 8346650962 revert indent 2022-08-08 09:33:22 -05:00
Sarah Alsmiller 06c3ec4e0e test 2022-08-08 09:32:28 -05:00
freddygv 67aa7ed15c Test fixes 2022-08-08 08:31:47 -06:00
Sarah Alsmiller 9294dd226d indentation 2022-08-08 09:21:51 -05:00
sarahalsmiller 2d90d2db62
Update website/content/docs/api-gateway/configuration/gateway.mdx 2022-08-08 09:16:36 -05:00
Michael Klein 231cc28e0b
Update peerings docs links (#14040) 2022-08-08 16:12:17 +02:00
John Cowen b843b6bcb0
ui: Add additional generation/initiation data-sources (#14018) 2022-08-08 11:23:02 +01:00
John Cowen 6aedc41d81
ui: Ensure we dispatch validation state (#14021)
* ui: Ensure we dispatch validation state

* Changelog
2022-08-08 11:12:40 +01:00
John Cowen d7ed357b5b
ui: Make DataWriter also deal with more standard shaped errors (#14025)
* ui: Make DataWriter also deal with more standard shaped errors

* ui: Add error states/messages for peering establishment (#14026)

* ui: Add error states/messages for peering establishment

* Inspect state instead of asking about existence of error
2022-08-08 10:51:02 +01:00
freddygv 01b0cbcbd7 Use proto message for each secrets write op
Previously there was a field indicating the operation that triggered a
secrets write. Now there is a message for each operation and it contains
the secret ID being persisted.
2022-08-08 01:41:00 -06:00
Sarah Alsmiller 86fa51b64f Merge branch 'sa-restructure-documentation' of github.com:hashicorp/consul into sa-restructure-documentation 2022-08-05 10:38:31 -05:00
Sarah Alsmiller 147a8d8085 note rendering weird 2022-08-05 10:38:20 -05:00
Sarah Alsmiller f3185fcc7e bulleted list 2022-08-05 10:36:07 -05:00
sarahalsmiller df031b29d9
Update website/content/docs/api-gateway/configuration/gateway.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:31:28 -05:00
sarahalsmiller 94ce164f3e
Update website/content/docs/api-gateway/configuration/gateway.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:31:19 -05:00
Sarah Alsmiller 05dbf80daa delete confusing sentence 2022-08-05 10:28:28 -05:00
Sarah Alsmiller 7efe530b9a Merge branch 'sa-restructure-documentation' of github.com:hashicorp/consul into sa-restructure-documentation 2022-08-05 10:18:15 -05:00
Sarah Alsmiller e6073042c5 remove configuration section 2022-08-05 10:18:04 -05:00
Sarah Alsmiller 6bf3a405ee render issue 2022-08-05 10:16:41 -05:00
sarahalsmiller 482ddb8237
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:13:15 -05:00
sarahalsmiller a305fa5a62
Update website/redirects.js
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:13:00 -05:00
sarahalsmiller c5d9acd5db
Update website/content/docs/api-gateway/usage.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:11:36 -05:00
sarahalsmiller fe8ac703da
Update website/content/docs/api-gateway/usage.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:10:55 -05:00
Sarah Alsmiller f5d3ced8ae clarify artifacts being applied 2022-08-05 10:05:58 -05:00
sarahalsmiller 4e542f83cc
Update website/content/docs/api-gateway/install.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:01:29 -05:00
sarahalsmiller 402357a98e
Update website/content/docs/api-gateway/install.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:00:45 -05:00
sarahalsmiller 232430305b
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 09:59:15 -05:00
sarahalsmiller 396d4038d6
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 09:59:01 -05:00
Kyle Havlovitz 3f435f31ac Update ingress/terminating wildcard logic and handle destinations 2022-08-05 07:56:10 -07:00
cskh c5b8b60e26
fix(cli): error message in service deregister subcommand (#14028) 2022-08-04 11:07:40 -04:00
John Cowen a3f1ae2fd5
ui: Ensure CopyableCode copy icon/button is fully clickable (#14016)
* ui: Ensure CopyableCode copy icon/button is fully clickable

* Give it a 40px height also
2022-08-04 13:30:52 +01:00
freddygv 3a623f2e9d Inherit active secret when exchanging 2022-08-03 17:32:53 -05:00
freddygv b089472a12 Pass explicit signal with op for secrets write
Previously the updates to the peering secrets UUID table relied on
inferring what action triggered the update based on a reconciliation
against the existing secrets.

Instead we now explicitly require the operation to be given so that the
inference isn't necessary. This makes the UUID table logic easier to
reason about and fixes some related bugs.

There is also an update so that the peering secrets get handled on
snapshots/restores.
2022-08-03 17:25:12 -05:00
freddygv 544b3603e9 Avoid deleting peering secret UUIDs at dialers
Dialers do not keep track of peering secret UUIDs, so they should not
attempt to clean up data from that table when their peering is deleted.

We also now keep peer server addresses when marking peerings for
deletion. Peer server addresses are used by the ShouldDial() helper
when determining whether the peering is for a dialer or an acceptor.
We need to keep this data so that peering secrets can be cleaned up
accordingly.
2022-08-03 16:34:57 -05:00
Michael Klein 317709f469
ui: peering UI fixes - api contract change / wrong link in peerings list (#14007)
* Don't send `Datacenter` when establishing peer

* Don't surface link to non-existing peers.edit route anymore
2022-08-03 15:04:19 +02:00
John Cowen f386122633
ui: Re-hook up regenerate button (#14015) 2022-08-03 13:55:57 +01:00
skpratt 1ded7a7632
Merge pull request #13906 from skpratt/validate-port-agent-split
Separate port and socket path validation for local agent
2022-08-02 16:58:41 -05:00