freddygv
2adf1df079
Remove stray instruction
2020-06-24 16:12:08 -06:00
freddygv
5f34f9954c
Add docs for upstream destination's namespace
2020-06-24 16:11:44 -06:00
freddygv
1ac7e9a07d
Add tabs to config entry examples
2020-06-24 16:10:46 -06:00
John Cowen
f133abe4f1
ui: Ensure the tooltip panel chevron isn't hidden by overflow ( #8183 )
2020-06-24 18:07:19 +01:00
Matt Keeler
934f92f83b
Don’t leak metrics go routines in tests ( #8182 )
2020-06-24 10:15:25 -04:00
Kenia
6a581de3cb
ui: Refactor composite rows to use description lists and add Tooltips ( #8175 )
...
* Update Consul Service List composite rows with Tooltips and description lists
* Update Consul Service Instance List composite rows with Tooltips and description lists
* Removed line height in reduced pill to match the description lists in the composite rows
2020-06-24 09:54:16 -04:00
gitforbit
aebb8e09a7
agent-http: cleanup: return nil instead of err ( #8043 )
...
Since err is already checked, it should return `nil`
2020-06-24 14:29:21 +02:00
Mike Morris
8a496af085
Update dev.mdx ( #8090 )
...
Remove ref to "virtual service" to avoid confusion with L7 routing virtual services, replace with "debug service".
2020-06-24 14:26:01 +02:00
Valery V. Vorotyntsev
0e50884525
Fix quorum formula in consensus.mdx ( #8166 )
...
[Add & Remove Servers](https://learn.hashicorp.com/consul/day-2-operations/servers )
guide uses `(N/2)+1` quorum formula. So does the
[Raft implementation](5927dcda05/raft.go (L909)
).
Consensus Protocol document uses `(n+1)/2` formula.
This formula is not only different, it conflicts with the
[Deployment Table](https://www.consul.io/docs/internals/consensus.html#deployment_table )
in the same document; e.g., (6+1)/2 = 3, not 4.
Replace `(n+1)/2` with `(N/2)+1` in Consensus Protocol document.
2020-06-24 14:23:36 +02:00
Alvin Huang
6cf07d1b2b
remove set -e for cherry-pick script since we collect errors ( #8177 )
2020-06-23 18:37:20 -04:00
R.B. Boyer
ba83b52b32
connect: upgrade github.com/envoyproxy/go-control-plane to v0.9.5 ( #8165 )
2020-06-23 15:19:56 -05:00
Chris Piraino
c1f485c516
docs: Specify port in host for example ( #8167 )
...
This example shows a TLS enabled ingress config on a non-https port.
Currently, that means we require the port to be specified in one of the
host entries to route traffic.
2020-06-23 14:41:51 -05:00
John Cowen
aa938190c4
ui: Make sure right trim doesn't try to overtrim ( #8171 )
2020-06-23 18:34:21 +01:00
Freddy
90758e8100
Merge pull request #8169 from hashicorp/config-entry-ns
2020-06-23 11:15:23 -06:00
John Cowen
8eb1133cac
ui: Add namespaced versions of templated policies ( #8173 )
2020-06-23 17:58:43 +01:00
freddygv
224f486aef
Update namespaces subject-verb agreement
2020-06-23 10:57:30 -06:00
Kenia
6bc1b2be44
ui: Update helper to return Proxy and Service Health if the Service has a Proxy ( #8168 )
2020-06-23 10:28:29 -04:00
John Cowen
ed8d148502
ui: Redesigns for the token/policy/roles listings pages ( #8144 )
2020-06-23 10:12:04 +01:00
John Cowen
c5d0216939
ui: Support for Node Identities ( #8137 )
...
* Add all the new data required for NodeIdentities
* Add potential NodeIdentity to the token list component
* Amend the policy-form/selector to allow node identity creation
* Fix up CSS for radio buttons and select label
* Add node-identity policy template component
* Fix up and add acceptance tests for NodeIndentities
* Make sure policy previews take node identities into account
* Only show certain policy markup if those we have those policies
* Potentially temporarily hide dt's that don't have icons yet
2020-06-23 09:59:43 +01:00
freddygv
c631e7496a
Remove break
2020-06-22 19:59:04 -06:00
freddygv
e81b6d25ad
Let users know namespaces are ent only in config entry decode
2020-06-22 19:59:04 -06:00
Freddy
146afbe9a2
Merge http2 integration test case into grpc case ( #8164 )
...
http2 is covered by grpc since grpc uses http2
2020-06-22 13:09:04 -06:00
s-christoff
dd19cfe729
Add AgentMemberStatus const ( #8110 )
...
* Add AgentMemberStatus const
2020-06-22 12:18:45 -05:00
Matt Keeler
49cdc631d6
Update CHANGELOG.md
2020-06-22 09:03:02 -04:00
Pierre Souchay
667b36cdba
Returns DNS Error NSDOMAIN when DC does not exists ( #8103 )
...
This will allow to increase cache value when DC is not valid (aka
return SOA to avoid too many consecutive requests) and will
distinguish DC being temporarily not available from DC not existing.
Implements https://github.com/hashicorp/consul/issues/8102
2020-06-22 09:01:48 -04:00
Brandon Romano
84100ac893
Merge pull request #8162 from hashicorp/nav-update
...
Update Nav
2020-06-22 04:15:18 -07:00
Brandon Romano
8c1ccf96e9
Update Nav
2020-06-21 19:35:34 -07:00
Matt Keeler
7b49fc1529
Require enabling TLS to enable Auto Config ( #8159 )
...
On the servers they must have a certificate.
On the clients they just have to set verify_outgoing to true to attempt TLS connections for RPCs.
Eventually we may relax these restrictions but right now all of the settings we push down (acl tokens, acl related settings, certificates, gossip key) are sensitive and shouldn’t be transmitted over an unencrypted connection. Our guides and docs should recoommend verify_server_hostname on the clients as well.
Another reason to do this is weird things happen when making an insecure RPC when TLS is not enabled. Basically it tries TLS anyways. We should probably fix that to make it clearer what is going on.
2020-06-19 16:38:14 -04:00
Freddy
c908f4f1d3
Update CHANGELOG.md
2020-06-19 13:36:37 -06:00
Freddy
3089b0e57a
Update CHANGELOG.md
2020-06-19 13:35:22 -06:00
Freddy
7e7c783c8f
Always return a gateway cluster ( #8158 )
2020-06-19 13:31:39 -06:00
Matt Keeler
9dc9f7df15
Allow cancelling startup when performing auto-config ( #8157 )
...
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2020-06-19 15:16:00 -04:00
Preetha
c229af80ce
Merge pull request #8156 from hashicorp/docs-update-version
...
update version to 1.8.0
2020-06-18 20:05:53 -05:00
Preetha
0d4d807cb0
remove prerelease tag
2020-06-18 20:02:21 -05:00
Preetha
83241ec09e
update alert banner
2020-06-18 19:36:42 -05:00
Preetha
52dc72c24a
update version to 1.8.0
2020-06-18 19:32:11 -05:00
Freddy
4948cd403f
Finalize gateway documentation for 1.8.0 GA ( #8121 )
...
Co-authored-by: Derek Strickland <1111455+DerekStrickland@users.noreply.github.com>
2020-06-18 15:27:06 -06:00
Chris Piraino
e7c0f3e79b
Remove ingress line items from UNRELEASED header
...
These all got squashed into the Ingress Gateway feature item in 1.8.0.
2020-06-18 15:54:36 -05:00
Chris Piraino
850f7b93d4
Update master CHANGELOG to release 1.8.0 ( #8152 )
2020-06-18 15:28:18 -05:00
Luke Kysow
61cd88d475
Merge pull request #8150 from hashicorp/18-wan-fed-docs
...
Remove consul:beta now that 1.8 is out.
2020-06-18 12:54:31 -07:00
Daniel Nephin
896b057a9f
Merge pull request #8147 from hashicorp/dnephin/remove-private-ip-2
...
Remove some dead code from agent/consul/util.go
2020-06-18 15:51:09 -04:00
Matt Keeler
7086a50353
Change auto config authorizer to allow for future extension
...
The envisioned changes would allow extra settings to enable dynamically defined auth methods to be used instead of or in addition to the statically defined one in the configuration.
2020-06-18 15:22:24 -04:00
Luke Kysow
c937cbd0cf
Remove consul:beta now that 1.8 is out.
2020-06-18 11:50:25 -07:00
Rebecca Zanzig
b9ec0d310f
Merge pull request #8126 from hashicorp/k8s/gateway-docs
...
Add helm chart options for ingress and terminating gateways
2020-06-18 11:30:59 -07:00
Jono Sosulska
1f1eb0cb33
Fixing multiple document updates ( #8135 )
...
* Fixes #7663-ACL Token Reloadable#7432-Cipher Suites,#7385-KV Delete DC, raft list-peers docs
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2020-06-18 14:10:45 -04:00
Rebecca Zanzig
c1d37ddd6b
Add helm chart options for ingress and terminating gateways
2020-06-18 11:04:19 -07:00
Dexter Lowe
a27694d110
#8059 Improve Clarity on TTL docs ( #8141 )
2020-06-18 13:53:43 -04:00
Daniel Nephin
b5ef9b7ea9
Remove bytesToUint64 from agent/consul
2020-06-18 12:45:43 -04:00
Daniel Nephin
81bc082b63
Remove unused private IP code from agent/consul
2020-06-18 12:40:38 -04:00
Chris Piraino
d62cead958
Bump golang to 1.14.4 to avoid known runtime issue ( #8146 )
...
An issue where the golang runtime would hang and loop forever
2020-06-18 11:38:33 -05:00