Commit Graph

19161 Commits

Author SHA1 Message Date
cskh 57380ea752
fix(peering): nil pointer in calling handleUpdateService (#15160)
* fix(peering): nil pointer in calling handleUpdateService

* changelog
2022-10-26 11:50:34 -04:00
Michael Klein 9d36db3a2a
Merge pull request #15156 from hashicorp/ui/peer-create-redirect-to-show
ui: peer create redirect to show
2022-10-26 17:16:28 +02:00
Michael Klein 676e8afaf9
Merge pull request #15148 from hashicorp/ui/update-hds-usage-best-practices
UI: update hds usage to hds best practices
2022-10-26 16:10:05 +02:00
Michael Klein be97a2a4a8 Redirect to peers.show after establishing peering 2022-10-26 11:15:57 +02:00
Michael Klein 6eaa9d94da Prettify peers.index template 2022-10-26 11:15:06 +02:00
Michael Klein ac41499d9b prettify peer/initiate form 2022-10-26 10:11:41 +02:00
Eric Haberkorn 74baaf910c
fix bug that resulted in generating Envoy configs that use CDS with an EDS configuration (#15140) 2022-10-25 14:49:57 -04:00
Luke Kysow 4956b81333
ingress-gateways: don't log error when registering gateway (#15001)
* ingress-gateways: don't log error when registering gateway

Previously, when an ingress gateway was registered without a
corresponding ingress gateway config entry, an error was logged
because the watch on the config entry returned a nil result.
This is expected so don't log an error.
2022-10-25 10:55:44 -07:00
Luke Kysow 1be7b5bf35
config entry: hardcode proxy-defaults name as global (#14833)
* config entry: hardcode proxy-defaults name as global

proxy-defaults can only have the name global. Because of this,
we support not even setting the name in the config file:

```
kind = "proxy-defaults"
```

Previously, writing this would result in the output:

```
Config entry written: proxy-defaults/
```

Now it will output:

```
Config entry written: proxy-defaults/global
```

This change follows what was done for the new Mesh config entry.
2022-10-25 10:55:15 -07:00
Luke Kysow 6b1ec05470
autoencrypt: helpful error for clients with wrong dc (#14832)
* autoencrypt: helpful error for clients with wrong dc

If clients have set a different datacenter than the servers they're
connecting with for autoencrypt, give a helpful error message.
2022-10-25 10:13:41 -07:00
Michael Klein 2f336f6a7a Update hds-docs with custom utility class 2022-10-25 18:40:36 +02:00
R.B. Boyer a01936442c
cache: refactor agent cache fetching to prevent unnecessary fetches on error (#14956)
This continues the work done in #14908 where a crude solution to prevent a
goroutine leak was implemented. The former code would launch a perpetual
goroutine family every iteration (+1 +1) and the fixed code simply caused a
new goroutine family to first cancel the prior one to prevent the
leak (-1 +1 == 0).

This PR refactors this code completely to:

- make it more understandable
- remove the recursion-via-goroutine strangeness
- prevent unnecessary RPC fetches when the prior one has errored.

The core issue arose from a conflation of the entry.Fetching field to mean:

- there is an RPC (blocking query) in flight right now
- there is a goroutine running to manage the RPC fetch retry loop

The problem is that the goroutine-leak-avoidance check would treat
Fetching like (2), but within the body of a goroutine it would flip that
boolean back to false before the retry sleep. This would cause a new
chain of goroutines to launch which #14908 would correct crudely.

The refactored code uses a plain for-loop and changes the semantics
to track state for "is there a goroutine associated with this cache entry"
instead of the former.

We use a uint64 unique identity per goroutine instead of a boolean so
that any orphaned goroutines can tell when they've been replaced when
the expiry loop deletes a cache entry while the goroutine is still running
and is later replaced.
2022-10-25 10:27:26 -05:00
Michael Klein 89cf54d730 Use HDS utilities instead of tailwind peer details 2022-10-25 14:17:40 +02:00
Michael Klein cb5bd5c9a5 Update HDS docs 2022-10-25 14:03:31 +02:00
Michael Klein a3991a60f1 Disable custom color utilities based on hds colors
We want to use the utility classes that HDS provides instead.
2022-10-25 14:03:11 +02:00
Michael Klein d61aaaf95a
Merge pull request #15113 from hashicorp/ui/fix-auto-import-public-url
ui: fix - customize ember-auto-import publicAssetURL in production
2022-10-25 13:46:11 +02:00
R.B. Boyer bcbe7b225f
test: ensure that all dependencies in a test agent use the test logger (#14996) 2022-10-24 17:02:38 -05:00
Jared Kirschner 781e0ceb1e
Merge pull request #15142 from hashicorp/docs/update-changelog-vault-ca-provider-improvement
changelog: update Vault CA provider policy guidance
2022-10-24 17:35:01 -04:00
Jared Kirschner 59ba53b615
Merge pull request #15141 from hashicorp/docs/upgrade-vault-ca-provider-policy-guidance
docs: update Vault CA provider policy guidance
2022-10-24 17:34:43 -04:00
Jared Kirschner f5904cdf4c changelog: update Vault CA provider policy guidance 2022-10-24 14:26:14 -07:00
Jared Kirschner ede2eb26ea docs: update Vault CA provider policy guidance 2022-10-24 14:16:51 -07:00
Chris S. Kim 739fe6be89 Ignore ioutil linter messages 2022-10-24 16:12:08 -04:00
Chris S. Kim 7db1d0edaa Remove rsyslog from CI steps
The service was never successfully running and did not fail any tests
2022-10-24 16:12:08 -04:00
Chris S. Kim 0e94a75493 Fix build-date.sh reference
https://discuss.circleci.com/t/circle-working-directory-doesnt-expand/17007
2022-10-24 16:12:08 -04:00
Chris S. Kim 5e901bfa01 Remove invalid 1xx HTTP codes
These tests started failing in go1.19, presumably due to
support for valid 1xx responses being added.

https://github.com/golang/go/issues/56346
2022-10-24 16:12:08 -04:00
Chris S. Kim ae1646706f Regenerate files according to 1.19.2 formatter 2022-10-24 16:12:08 -04:00
Chris S. Kim 89f92b3cce Add changelog 2022-10-24 16:12:08 -04:00
Chris S. Kim 05b2e290b8 Update go version to 1.19 2022-10-24 16:12:08 -04:00
cskh a5acb987fa
fix(peering): replicating wan address (#15108)
* fix(peering): replicating wan address

* add changelog

* unit test
2022-10-24 15:44:57 -04:00
Iryna Shustava a3a6743e0a
proxycfg: watch service-defaults config entries (#15025)
To support Destinations on the service-defaults (for tproxy with terminating gateway), we need to now also make servers watch service-defaults config entries.
2022-10-24 12:50:28 -06:00
Chris S. Kim 06f583a7c2 Move oss-only test to its own file 2022-10-24 14:17:43 -04:00
R.B. Boyer bf05547080
test: fix flaky TestHealthServiceNodes_NodeMetaFilter by waiting until the streaming subsystem has a valid grpc connection (#15019)
Also potentially unflakes TestHealthIngressServiceNodes for similar
reasons.
2022-10-24 13:09:53 -05:00
R.B. Boyer 87432a8dd4
chore: update golangci-lint to v1.50.1 (#15022) 2022-10-24 11:48:02 -05:00
Venu Yanamandra 3dd12a2960
Update error message when restoring ENT snapshot in OSS (#15066) 2022-10-24 11:40:26 -04:00
Jared Kirschner 4c53fdc05a
Merge pull request #15028 from hashicorp/docs/auto-cert-1-13-2
Update upgrade docs for 1.13.2.
2022-10-24 11:39:29 -04:00
Michael Klein 7636d191b1 fix: customize eai publicAssetURL in production
The `lib/startup`-addon is used to create a custom
index.html page to boot up the app. Because this is
a custom approach and we aren't relying on setting
rootURL to a different value when running the app
in `production` we need to set `publicAssetURL`
in the configuration we pass to `ember-auto-import`.

Reference:
9a2887f1d0/docs/upgrade-guide-2.0.md (quick-summary)
2022-10-24 14:28:58 +02:00
Freddy 9bd0d77a10
Update website/content/docs/upgrading/upgrade-specific.mdx 2022-10-22 15:49:57 -06:00
Freddy a9fd0606e6
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 18:12:25 -06:00
Freddy b7890f10cf
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 18:12:13 -06:00
David Yu 7d3186d7c5
docs: update versions to include .x in release notes (#15104) 2022-10-21 16:20:24 -07:00
Freddy 03d0be5b40
Merge pull request #15032 from hashicorp/docs/mgw-primary-upgrade 2022-10-21 16:52:27 -06:00
Freddy d48385a589
Update website/content/docs/connect/gateways/mesh-gateway/wan-federation-via-mesh-gateways.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-10-21 16:43:40 -06:00
freddygv f08e8fafa8 Clarify how addresses are propagated 2022-10-21 15:50:49 -06:00
freddygv 48a552349b Relax start version requirement 2022-10-21 15:27:39 -06:00
Freddy a706346817
Update website/content/docs/connect/gateways/mesh-gateway/wan-federation-via-mesh-gateways.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-10-21 15:17:00 -06:00
Freddy 0507d57e93
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:35 -06:00
Freddy 19ba9c6b60
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:29 -06:00
Freddy 6127421eab
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:22 -06:00
Jared Kirschner 846788fa73
Merge pull request #14813 from hashicorp/docs/1-10-upgrade-compatibility-clarification
docs: clarify 1.10 upgrade compatibility
2022-10-21 16:57:23 -04:00
DanStough c67588926a chore: update main for release/1.14.x branch 2022-10-21 15:50:51 -04:00