Find a file
freddygv 19f25fc3a5 Allow terminated peerings to be deleted
Peerings are terminated when a peer decides to delete the peering from
their end. Deleting a peering sends a termination message to the peer
and triggers them to mark the peering as terminated but does NOT delete
the peering itself. This is to prevent peerings from disappearing from
both sides just because one side deleted them.

Previously the Delete endpoint was skipping the deletion if the peering
was not marked as active. However, terminated peerings are also
inactive.

This PR makes some updates so that peerings marked as terminated can be
deleted by users.
2022-08-26 10:52:47 -06:00
.changelog Merge branch 'main' into catalog-service-list-filter 2022-08-26 11:16:06 -04:00
.circleci Skip Lambda integration tests for fork PRs (#14257) 2022-08-18 16:06:20 -07:00
.github ci: Disable Arm RPM verifications (#14142) 2022-08-11 10:26:21 -07:00
.release Merge pull request #13790 from hashicorp/post-publish-website 2022-08-08 10:55:11 -05:00
acl Add ACL enforcement to peering endpoints 2022-07-25 09:34:29 -06:00
agent Allow terminated peerings to be deleted 2022-08-26 10:52:47 -06:00
api fix: missing MaxInboundConnections field in service-defaults config entry (#14072) 2022-08-19 14:11:21 -04:00
bench
build-support
command Fix Consul KV CLI 'GET' flags 'keys' and 'recurse' to be set together (#13493) 2022-08-25 18:21:49 -04:00
connect Add retries and debugging to flaky test 2022-08-08 15:26:44 -04:00
contributing
docs peering: add config to enable/disable peering (#13867) 2022-07-22 15:20:21 -07:00
grafana
internal
ipaddr
lib
logging
proto Replace ring buffer with async version (#14314) 2022-08-26 10:27:13 -04:00
proto-public dataplane: update envoy bootstrap params for consul-dataplane (#14017) 2022-08-24 12:03:15 +01:00
sdk Track last user of a port 2022-08-08 17:30:05 -04:00
sentinel
service_os
snapshot
test Refactor failover code to use Envoy's aggregate clusters (#14178) 2022-08-12 14:30:46 -04:00
testrpc
tlsutil Added new auto_encrypt.grpc_server_tls config option to control AutoTLS enabling of GRPC Server's TLS usage 2022-08-24 12:31:38 -04:00
tools/internal-grpc-proxy
types
ui ui: Replace file-mask with file-text icon usage on policy list (#14275) 2022-08-24 06:44:01 -06:00
version Sync changes from 1.13.0 release (#14104) 2022-08-10 12:21:21 -07:00
website Updated consul monitoring with Newrelic APM (#14360) 2022-08-26 09:13:46 -07:00
.dockerignore
.gitattributes
.gitignore chore: ignore vscode files 2022-07-25 12:31:58 -04:00
.golangci.yml
CHANGELOG.md docs: add 1.13 upgrade considerations to changelog 2022-08-19 11:29:57 -07:00
Dockerfile Add version label to Docker image (#14204) 2022-08-18 14:41:34 -04:00
fixup_acl_move.sh
GNUmakefile
go.mod Fix: upgrade pkg imdario/merg to prevent merge config panic (#14237) 2022-08-17 21:14:04 -04:00
go.sum Fix: upgrade pkg imdario/merg to prevent merge config panic (#14237) 2022-08-17 21:14:04 -04:00
LICENSE
main.go
NOTICE.md
README.md
Vagrantfile

Consul logo Consul

Docker Pulls Go Report Card

Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.

Consul provides several key features:

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Mesh/Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

Consul runs on Linux, macOS, FreeBSD, Solaris, and Windows and includes an optional browser based UI. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance. For contributions specifically to the browser based UI, please refer to the UI's README.md for guidance.