Go to file
Matt Keeler 5b83f589da
Expand the QueryOptions and QueryMeta interfaces (#6545)
In a previous PR I made it so that we had interfaces that would work enough to allow blockingQueries to work. However to complete this we need all fields to be settable and gettable.

Notes:
   • If Go ever gets contracts/generics then we could get rid of all the Getters/Setters
   • protoc / protoc-gen-gogo are going to generate all the getters for us.
   • I copied all the getters/setters from the protobuf funcs into agent/structs/protobuf_compat.go
   • Also added JSON marshaling funcs that use jsonpb for protobuf types.
2019-09-26 09:55:02 -04:00
.circleci connect: intermediate CA certs generated with the vault provider lack URI SANs (#6491) 2019-09-23 12:04:40 -05:00
.github
acl
agent Expand the QueryOptions and QueryMeta interfaces (#6545) 2019-09-26 09:55:02 -04:00
api Expose HTTP-based paths through Connect proxy (#6446) 2019-09-25 20:55:52 -06:00
bench
build-support Add support for implementing new requests with protobufs instea… (#6502) 2019-09-20 14:37:22 -04:00
command Expose HTTP-based paths through Connect proxy (#6446) 2019-09-25 20:55:52 -06:00
connect connect: don't colon-hex-encode the AuthorityKeyId and SubjectKeyId fields in connect certs (#6492) 2019-09-23 12:52:35 -05:00
demo
ipaddr
lib connect: remove managed proxies (#6220) 2019-08-09 15:19:30 -04:00
logger
sdk Nil checks in the testWriter to prevent using a bad testing.TB (#6517) 2019-09-20 17:01:08 -04:00
sentinel
service_os
snapshot
terraform
test Expose HTTP-based paths through Connect proxy (#6446) 2019-09-25 20:55:52 -06:00
testrpc
tlsutil connect: don't colon-hex-encode the AuthorityKeyId and SubjectKeyId fields in connect certs (#6492) 2019-09-23 12:52:35 -05:00
types
ui-v2 ui: [bugfix] Tag wrapping on detail pages (#6478) 2019-09-17 17:29:04 +01:00
vendor Expand the QueryOptions and QueryMeta interfaces (#6545) 2019-09-26 09:55:02 -04:00
version Release v1.6.1 2019-09-12 19:39:59 +00:00
website Expose HTTP-based paths through Connect proxy (#6446) 2019-09-25 20:55:52 -06:00
.dockerignore
.gitattributes
.gitignore connect: Support RSA keys in addition to ECDSA (#6055) 2019-07-30 17:47:39 -04:00
CHANGELOG.md update changelog 2019-09-24 10:05:49 -05:00
GNUmakefile Add support for implementing new requests with protobufs instea… (#6502) 2019-09-20 14:37:22 -04:00
INTERNALS.md
LICENSE
NOTICE.md
README.md
Vagrantfile
go.mod connect: intermediate CA certs generated with the vault provider lack URI SANs (#6491) 2019-09-23 12:04:40 -05:00
go.sum connect: intermediate CA certs generated with the vault provider lack URI SANs (#6491) 2019-09-23 12:04:40 -05:00
main.go
main_test.go

README.md

Consul Build Status Join the chat at https://gitter.im/hashicorp-consul/Lobby

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

An extensive quick start is viewable on the Consul website:

https://www.consul.io/intro/getting-started/install.html

Documentation

Full, comprehensive documentation is viewable on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.