trujillo-adam
4d9f7c5f53
fixed bad links
2021-11-16 12:05:18 -08:00
Konstantine
ea91f60827
Update website/content/docs/discovery/dns.mdx
...
Co-authored-by: Evan Culver <eculver@users.noreply.github.com>
2021-11-16 21:55:15 +02:00
Will Jordan
2e66b7a5e6
Update node info sync comment ( #11465 )
2021-11-16 11:16:11 -08:00
trujillo-adam
7fbb8dd08b
added link to agent configuration from partition exports in usage section
2021-11-16 10:53:07 -08:00
trujillo-adam
3d2222cd8a
applied freddy's feedback
2021-11-16 10:44:21 -08:00
R.B. Boyer
9793e1c1cd
api: ensure new partition fields are omit empty for back compat ( #11585 )
2021-11-16 12:28:34 -06:00
R.B. Boyer
573670e8f7
build: switch to 'go install' over 'go get' ( #11582 )
...
Also add lint-consul-retry to the 'make tools' set.
2021-11-16 12:04:49 -06:00
R.B. Boyer
83bf7ab3ff
re-run gofmt on 1.17 ( #11579 )
...
This should let freshly recompiled golangci-lint binaries using Go 1.17
pass 'make lint'
2021-11-16 12:04:01 -06:00
Paul Glass
61e38b2b30
docs: correct some capitalization
2021-11-16 11:06:08 -06:00
Paul Glass
5f5c5d1d7a
docs: ECS docs for GA
2021-11-16 10:55:23 -06:00
Eric
6180729072
Update Consul ECS documentation with health sync changes
...
This also switches the task startup image to an svg so it isn't pixelated
anymore
2021-11-16 11:51:32 -05:00
Paul Glass
f901bd2d6b
docs: Suggestions for ECS architecture from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-16 11:51:31 -05:00
Paul Glass
eb4a2cce4b
docs: ECS graceful shutdown refinements
2021-11-16 11:51:31 -05:00
Paul Glass
0904d6af3a
docs: Apply suggestions to ecs docs from code review
...
Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-16 11:51:31 -05:00
Paul Glass
444f31f7ef
docs: ECS graceful shutdown docs for GA
2021-11-16 11:51:31 -05:00
John Cowen
5a67cccd2c
ui: Upstream CSS Tweaks ( #11554 )
...
Various CSS tweaks/HTML cleanup around upstreams (but impacts other 'rows')
- Prefer {{tooltip}} to <Tooltip>
- Removed some now unnecessary spans
- Stop using an empty class="" for styling purposes.
- Renamed any classes used to identify response properties to follow the exact property name but kebab-cased.
- Fixed up the alignment of things in the rows when used with a 'tiny copy button' (see screengrab) which was minus positioning and knocking things out (pending a proper refactor of our copy button CSS which is from the very very start of things)
2021-11-16 15:36:54 +00:00
John Cowen
0027042ad9
ui: Fixup partiton > partition typo ( #11572 )
2021-11-16 15:33:18 +00:00
Daniel Nephin
4804a47e32
Merge pull request #11574 from hashicorp/dnephin/update-changelog
...
add changelog for 1.10.4, 1.9.11, 1.8.17
2021-11-15 17:40:17 -05:00
Dhia Ayachi
afe9505fcd
add changelog for 1.10.4, 1.9.11, 1.8.17
2021-11-15 16:59:18 -05:00
R.B. Boyer
086ff42b56
partitions: various refactors to support partitioning the serf LAN pool ( #11568 )
2021-11-15 09:51:14 -06:00
trujillo-adam
c06675fb3a
Adding partition exports configuraiton entry details, upstream config, acl impact
2021-11-13 18:52:58 -08:00
Freddy
f4cbde4086
Merge pull request #11566 from hashicorp/ap/ingress
...
OSS Backport: Allow ingress gateways to target other partitions
2021-11-12 15:17:08 -07:00
R.B. Boyer
01b6103e47
changelog sync ( #11565 )
2021-11-12 16:10:36 -06:00
freddygv
e9d9814360
Fix test
2021-11-12 14:59:29 -07:00
freddygv
20873f048d
Add changelog entry
2021-11-12 14:45:58 -07:00
freddygv
42d9542ac3
Add cross-partition integration test
2021-11-12 14:45:50 -07:00
freddygv
29cfc23a27
Support partitions in connect expose cmd
2021-11-12 14:45:32 -07:00
freddygv
e71e5efa5c
Fixup shared oss/ent tests
2021-11-12 14:34:31 -07:00
freddygv
f33eae6fe1
Update proxycfg for ingress service partitions
2021-11-12 14:33:31 -07:00
freddygv
dc7ea2ef1e
Accept partition for ingress services
2021-11-12 14:33:14 -07:00
Daniel Nephin
c05df587e5
Merge pull request #11557 from hashicorp/dnephin/changelog-namespace-default
...
Add changelog entry for namespace default policy/role fix
2021-11-12 12:19:42 -05:00
Alessandro De Blasis
e0b46721c4
ui: Fix code editor resizing and restyle ( #11474 )
...
Fixes an issue where the code editor would not resizing to the full extent of the browser window plus CodeEditor restyling/refactoring
- :label named block
- :tools named block
- :content named block
- code and CSS cleanup
- CodeEditor.mdx
Signed-off-by: Alessandro De Blasis <alex@deblasis.net>
Co-authored-by: John Cowen <johncowen@users.noreply.github.com>
2021-11-12 15:28:06 +00:00
trujillo-adam
b937934b35
first commit for cross-partition support - partition exports section
2021-11-11 18:43:57 -08:00
Daniel Nephin
5b84e92656
Add changelog entry
2021-11-11 16:09:00 -05:00
mrspanishviking
dadb7a7c33
Merge pull request #11543 from hashicorp/envoy-token
...
docs: added more information to help endusers with proxies and ACL
2021-11-11 08:37:12 -08:00
mrspanishviking
a7bda35a3f
Update website/content/docs/connect/proxies/integrate.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-11 08:05:45 -08:00
Dan Upton
e57fc8c38f
changelog: entry for enterprise licensing bug fix ( #11551 )
2021-11-11 13:39:05 +00:00
John Cowen
57f32ecb01
ui: Bump our browser support ( #11505 )
...
Bumps our browser support to a "rough ~2 years back" approach.
2021-11-11 13:37:49 +00:00
John Cowen
10c1f5d089
ui: [Port] Ensure the tokens default nspace (and partition) is passed thru to the auth endpoint ( #11490 )
...
Most HTTP API calls will use the default namespace of the calling token to additionally filter/select the data used for the response if one is not specified by the frontend.
The internal permissions/authorize endpoint does not do this (you can ask for permissions from different namespaces in on request).
Therefore this PR adds the tokens default namespace in the frontend only to our calls to the authorize endpoint. I tried to do it in a place that made it feel like it's getting added in the backend, i.e. in a place which was least likely to ever require changing or thinking about.
Note: We are probably going to change this internal endpoint to also inspect the tokens default namespace on the backend. At which point we can revert this commit/PR.
* Add the same support for the tokens default partition
2021-11-11 12:02:29 +00:00
Kenia
2bdc98552a
ui: Add Consul API Gateway as an external source ( #11371 )
2021-11-10 16:54:12 -05:00
Freddy
317c875de9
Merge pull request #11546 from hashicorp/ui/bug/revert-11328
...
ui: Revert #11328 allow-${}-style-interpolation due, to browser support
2021-11-10 14:53:23 -07:00
mrspanishviking
890f3a6757
Merge pull request #11542 from hashicorp/vault-ca
...
docs: added link to the Learn tutorial in Vault CA integration page
2021-11-10 13:10:01 -08:00
mrspanishviking
0ae860df38
Update website/content/docs/connect/ca/vault.mdx
...
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-11-10 13:03:28 -08:00
David Yu
c1f3f77261
docs: provide more example CLI commands and reference Vault ( #11528 )
...
* docs: provide more example CLI commands and reference Vault
* Extra formatting
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* adding more detail around gossip encryption rotation precautions
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
2021-11-10 12:05:20 -08:00
99
7b05d4598e
Add changelog entry ( #11549 )
2021-11-10 14:53:52 -05:00
Freddy
f587c04008
Merge pull request #11545 from hashicorp/spiffe-assertion
...
Use ClusterID to check for readiness
2021-11-10 12:16:41 -07:00
freddygv
2d2ff0ae39
Bump retry time for cross-DC RPC
...
The secondary DC now takes longer to populate the MGW snapshot because
it needs to wait for the secondary CA to be initialized before it can
receive roots and generate xDS config.
Previously MGWs could receive empty roots before the CA was
initialized. This wasn't necessarily a problem since the cluster ID in
the trust domain isn't verified.
2021-11-10 12:00:00 -07:00
John Cowen
ecd296eaf7
Revert "Merge pull request #11328 from radiantly/ui/feature/allow-${}-style-interpolation"
...
This reverts commit cd55c0cda3310c06abe989b8d145d9946945ae8d, reversing
changes made to 14af8cb7a9e7fc0a65178e6ca7708b3f395f0d70.
2021-11-10 17:54:33 +00:00
freddygv
5ac1ab359b
Move assertion to after config fetch
2021-11-10 10:50:08 -07:00
freddygv
2261d51515
Use ClusterID to check for readiness
...
The TrustDomain is populated from the Host() method which includes the
hard-coded "consul" domain. This means that despite having an empty
cluster ID, the TrustDomain won't be empty.
2021-11-10 10:45:22 -07:00