Commit Graph

19286 Commits

Author SHA1 Message Date
Nathan Coleman b370e2c3c2
Fix broken link in Consul API Gateway docs 2022-10-28 15:01:38 -04:00
R.B. Boyer fb1d62f96c
build: ensure 'make dev-docker' updates consul-dev:latest too (#15176)
Fixes a minor regression from #14222
2022-10-28 10:27:24 -05:00
Eric Haberkorn 57fb729547
Fix peering metrics bug (#15178)
This bug was caused by the peering health metric being set to NaN.
2022-10-28 10:51:12 -04:00
Tyler Wendlandt 571fd7b6db
Merge pull request #15153 from hashicorp/ui/chore/update-icons-to-use-flight-icons-component
ui: update icons to use flight icons component
2022-10-27 15:21:56 -06:00
wenincode 9251801c68 Replace main consul logo with FlightIcon 2022-10-27 14:28:10 -06:00
wenincode 2c7fabe447 Format index template 2022-10-27 14:23:41 -06:00
Michael Klein 3389d3883b
Merge pull request #15159 from hashicorp/ui/fix-peered-service-not-unique-based-on-peer
ui: Fix PeerName is part of service uniqueness
2022-10-27 20:26:50 +02:00
Michael Klein fc74c0c7fb
Merge pull request #15158 from hashicorp/ui/improve-layout-address-list-peer-detail
ui: Improve layout address list peer detail
2022-10-27 20:26:30 +02:00
Chris S. Kim a0ac76ecf5
Allow consul debug on non-ACL consul servers (#15155) 2022-10-27 09:25:18 -04:00
wenincode 3ed964864b Format intentions table hbs template 2022-10-26 11:46:35 -06:00
wenincode c72fec5433 Replace k8s informed action with flight icon 2022-10-26 11:07:42 -06:00
cskh 57380ea752
fix(peering): nil pointer in calling handleUpdateService (#15160)
* fix(peering): nil pointer in calling handleUpdateService

* changelog
2022-10-26 11:50:34 -04:00
Michael Klein 9c965f98fd Fix PeerName is part of service uniqueness
We need to make a PeerName part of a the service id when present.

This makes sure that peers can export services named
the same as other peers but have the UI still treat them
as separate services.
2022-10-26 17:34:45 +02:00
Michael Klein 9d36db3a2a
Merge pull request #15156 from hashicorp/ui/peer-create-redirect-to-show
ui: peer create redirect to show
2022-10-26 17:16:28 +02:00
wenincode 5f5d438724 Remove consul logo icons 2022-10-26 08:57:43 -06:00
wenincode 5e5598ff79 Update iconography documentation 2022-10-26 08:57:31 -06:00
Michael Klein b7c5229e79 Improve layout address list peer detail 2022-10-26 16:17:05 +02:00
Michael Klein 676e8afaf9
Merge pull request #15148 from hashicorp/ui/update-hds-usage-best-practices
UI: update hds usage to hds best practices
2022-10-26 16:10:05 +02:00
wenincode cb8f72490f Remove shadow-template/host and related components 2022-10-26 08:07:35 -06:00
wenincode 3dc9b27a0e Remove template log 2022-10-26 06:43:57 -06:00
Michael Klein be97a2a4a8 Redirect to peers.show after establishing peering 2022-10-26 11:15:57 +02:00
Michael Klein 6eaa9d94da Prettify peers.index template 2022-10-26 11:15:06 +02:00
Michael Klein ac41499d9b prettify peer/initiate form 2022-10-26 10:11:41 +02:00
wenincode 3c48128fe2 Add back logo-consul-color 2022-10-25 14:13:12 -06:00
wenincode 913873f520 Remove some icons 2022-10-25 14:02:38 -06:00
Eric Haberkorn 74baaf910c
fix bug that resulted in generating Envoy configs that use CDS with an EDS configuration (#15140) 2022-10-25 14:49:57 -04:00
wenincode ea247c5f63 Use FlightIcon component for k8s type select in authmethods 2022-10-25 12:01:09 -06:00
Luke Kysow 4956b81333
ingress-gateways: don't log error when registering gateway (#15001)
* ingress-gateways: don't log error when registering gateway

Previously, when an ingress gateway was registered without a
corresponding ingress gateway config entry, an error was logged
because the watch on the config entry returned a nil result.
This is expected so don't log an error.
2022-10-25 10:55:44 -07:00
Luke Kysow 1be7b5bf35
config entry: hardcode proxy-defaults name as global (#14833)
* config entry: hardcode proxy-defaults name as global

proxy-defaults can only have the name global. Because of this,
we support not even setting the name in the config file:

```
kind = "proxy-defaults"
```

Previously, writing this would result in the output:

```
Config entry written: proxy-defaults/
```

Now it will output:

```
Config entry written: proxy-defaults/global
```

This change follows what was done for the new Mesh config entry.
2022-10-25 10:55:15 -07:00
wenincode 1825580f5a Format auth method search bar template 2022-10-25 11:55:09 -06:00
wenincode f665912d05 Set the color to black for vault 2022-10-25 11:44:27 -06:00
Luke Kysow 6b1ec05470
autoencrypt: helpful error for clients with wrong dc (#14832)
* autoencrypt: helpful error for clients with wrong dc

If clients have set a different datacenter than the servers they're
connecting with for autoencrypt, give a helpful error message.
2022-10-25 10:13:41 -07:00
wenincode 596bb59707 Share code with new icons for sources select 2022-10-25 11:12:15 -06:00
Michael Klein 2f336f6a7a Update hds-docs with custom utility class 2022-10-25 18:40:36 +02:00
R.B. Boyer a01936442c
cache: refactor agent cache fetching to prevent unnecessary fetches on error (#14956)
This continues the work done in #14908 where a crude solution to prevent a
goroutine leak was implemented. The former code would launch a perpetual
goroutine family every iteration (+1 +1) and the fixed code simply caused a
new goroutine family to first cancel the prior one to prevent the
leak (-1 +1 == 0).

This PR refactors this code completely to:

- make it more understandable
- remove the recursion-via-goroutine strangeness
- prevent unnecessary RPC fetches when the prior one has errored.

The core issue arose from a conflation of the entry.Fetching field to mean:

- there is an RPC (blocking query) in flight right now
- there is a goroutine running to manage the RPC fetch retry loop

The problem is that the goroutine-leak-avoidance check would treat
Fetching like (2), but within the body of a goroutine it would flip that
boolean back to false before the retry sleep. This would cause a new
chain of goroutines to launch which #14908 would correct crudely.

The refactored code uses a plain for-loop and changes the semantics
to track state for "is there a goroutine associated with this cache entry"
instead of the former.

We use a uint64 unique identity per goroutine instead of a boolean so
that any orphaned goroutines can tell when they've been replaced when
the expiry loop deletes a cache entry while the goroutine is still running
and is later replaced.
2022-10-25 10:27:26 -05:00
wenincode c91e604591 Update icon-map to work for auth methods 2022-10-25 07:14:55 -06:00
Michael Klein 89cf54d730 Use HDS utilities instead of tailwind peer details 2022-10-25 14:17:40 +02:00
Michael Klein cb5bd5c9a5 Update HDS docs 2022-10-25 14:03:31 +02:00
Michael Klein a3991a60f1 Disable custom color utilities based on hds colors
We want to use the utility classes that HDS provides instead.
2022-10-25 14:03:11 +02:00
Michael Klein d61aaaf95a
Merge pull request #15113 from hashicorp/ui/fix-auto-import-public-url
ui: fix - customize ember-auto-import publicAssetURL in production
2022-10-25 13:46:11 +02:00
R.B. Boyer bcbe7b225f
test: ensure that all dependencies in a test agent use the test logger (#14996) 2022-10-24 17:02:38 -05:00
Jared Kirschner 781e0ceb1e
Merge pull request #15142 from hashicorp/docs/update-changelog-vault-ca-provider-improvement
changelog: update Vault CA provider policy guidance
2022-10-24 17:35:01 -04:00
Jared Kirschner 59ba53b615
Merge pull request #15141 from hashicorp/docs/upgrade-vault-ca-provider-policy-guidance
docs: update Vault CA provider policy guidance
2022-10-24 17:34:43 -04:00
Jared Kirschner f5904cdf4c changelog: update Vault CA provider policy guidance 2022-10-24 14:26:14 -07:00
Jared Kirschner ede2eb26ea docs: update Vault CA provider policy guidance 2022-10-24 14:16:51 -07:00
Chris S. Kim 739fe6be89 Ignore ioutil linter messages 2022-10-24 16:12:08 -04:00
Chris S. Kim 7db1d0edaa Remove rsyslog from CI steps
The service was never successfully running and did not fail any tests
2022-10-24 16:12:08 -04:00
Chris S. Kim 0e94a75493 Fix build-date.sh reference
https://discuss.circleci.com/t/circle-working-directory-doesnt-expand/17007
2022-10-24 16:12:08 -04:00
Chris S. Kim 5e901bfa01 Remove invalid 1xx HTTP codes
These tests started failing in go1.19, presumably due to
support for valid 1xx responses being added.

https://github.com/golang/go/issues/56346
2022-10-24 16:12:08 -04:00
Chris S. Kim ae1646706f Regenerate files according to 1.19.2 formatter 2022-10-24 16:12:08 -04:00