Go to file
Luke Kysow 63df49b440
Run integration tests locally using amd64 (#14365)
Locally, always run integration tests using amd64, even if running
on an arm mac. This ensures the architecture locally always matches
the CI/CD environment.

In addition:
* Use consul:local for envoy integration and upgrade tests. Previously,
  consul:local was used for upgrade tests and consul-dev for integration
  tests. I didn't see a reason to use separate images as it's more
  confusing.
* By default, disable the requirement that aws credentials are set.
  These are only needed for the lambda tests and make it so you
  can't run any tests locally, even if you're not running the
  lambda tests. Now they'll only run if the LAMBDA_TESTS_ENABLED
  env var is set.
* Split out the building of the Docker image for integration
  tests into its own target from `dev-docker`. This allows us to always
  use an amd64 image without messing up the `dev-docker` target.
* Add support for passing GO_TEST_FLAGs to `test-envoy-integ` target.
* Add a wait_for_leader function because tests were failing locally
  without it.
2022-08-29 16:13:49 -07:00
.changelog Merge pull request #14364 from hashicorp/peering/term-delete 2022-08-29 15:33:18 -06:00
.circleci Run integration tests locally using amd64 (#14365) 2022-08-29 16:13:49 -07:00
.github ci: Disable Arm RPM verifications (#14142) 2022-08-11 10:26:21 -07:00
.release Merge pull request #13790 from hashicorp/post-publish-website 2022-08-08 10:55:11 -05:00
acl Add ACL enforcement to peering endpoints 2022-07-25 09:34:29 -06:00
agent Merge pull request #13496 from maxb/fix-kv_entries-metric 2022-08-29 15:35:11 -06:00
api Fix a breaking change to the API package introduced in #13835 (#14378) 2022-08-29 16:59:27 -04:00
bench Gets benchmarks running again and does a rough pass for 0.7.1. 2016-11-29 13:02:26 -08:00
build-support chore: add multi-arch docker build for testing 2022-08-29 12:01:31 -04:00
command Fix Consul KV CLI 'GET' flags 'keys' and 'recurse' to be set together (#13493) 2022-08-25 18:21:49 -04:00
connect Add retries and debugging to flaky test 2022-08-08 15:26:44 -04:00
contributing Move contributing to docs 2021-08-30 16:17:09 -04:00
docs peering: add config to enable/disable peering (#13867) 2022-07-22 15:20:21 -07:00
grafana add readme outlining how to edit and publish 2021-01-12 14:47:11 -08:00
internal Extract AWS auth implementation out of Consul (#13760) 2022-07-19 16:26:44 -05:00
ipaddr Ensure Consul is IPv6 compliant (#5468) 2019-06-04 10:02:38 -04:00
lib Extract AWS auth implementation out of Consul (#13760) 2022-07-19 16:26:44 -05:00
logging peering: emit exported services count metric (#13811) 2022-07-22 12:05:08 -07:00
proto Update the structs and discovery chain for service resolver redirects to cluster peers. (#14366) 2022-08-29 09:51:32 -04:00
proto-public dataplane: update envoy bootstrap params for consul-dataplane (#14017) 2022-08-24 12:03:15 +01:00
sdk Track last user of a port 2022-08-08 17:30:05 -04:00
sentinel re-run gofmt on 1.17 (#11579) 2021-11-16 12:04:01 -06:00
service_os re-run gofmt on 1.17 (#11579) 2021-11-16 12:04:01 -06:00
snapshot Vendor in rpc mono repo for net/rpc fork, go-msgpack, msgpackrpc. (#12311) 2022-02-14 09:45:45 -08:00
test Run integration tests locally using amd64 (#14365) 2022-08-29 16:13:49 -07:00
testrpc peering: initial sync (#12842) 2022-04-21 17:34:40 -05:00
tlsutil Added new auto_encrypt.grpc_server_tls config option to control AutoTLS enabling of GRPC Server's TLS usage 2022-08-24 12:31:38 -04:00
tools/internal-grpc-proxy grpc: rename public/private directories to external/internal (#13721) 2022-07-13 16:33:48 +01:00
types agent: convert listener config to TLS types (#12522) 2022-03-24 15:32:25 -04:00
ui ui: Replace file-mask with file-text icon usage on policy list (#14275) 2022-08-24 06:44:01 -06:00
version Sync changes from 1.13.0 release (#14104) 2022-08-10 12:21:21 -07:00
website Merge branch 'main' into fix-kv_entries-metric 2022-08-29 22:22:10 +01:00
.dockerignore Update the scripting 2018-06-14 21:42:47 -04:00
.gitattributes Initial commit 2013-11-04 14:15:27 -08:00
.gitignore chore: ignore vscode files 2022-07-25 12:31:58 -04:00
.golangci.yml Fix proto lint errors after version bump 2022-05-24 18:44:54 -07:00
CHANGELOG.md docs: add 1.13 upgrade considerations to changelog 2022-08-19 11:29:57 -07:00
Dockerfile Add version label to Docker image (#14204) 2022-08-18 14:41:34 -04:00
GNUmakefile Run integration tests locally using amd64 (#14365) 2022-08-29 16:13:49 -07:00
LICENSE Initial commit 2013-11-04 14:15:27 -08:00
NOTICE.md add copyright notice file 2018-07-09 10:58:26 -07:00
README.md Adjust README header to work in light and dark modes 2022-02-07 16:46:46 -08:00
Vagrantfile Adds a basic Linux Vagrant setup, stolen from Nomad. 2017-10-06 08:10:12 -07:00
fixup_acl_move.sh Fixup script 2 2022-04-05 14:52:43 -07:00
go.mod Fix: upgrade pkg imdario/merg to prevent merge config panic (#14237) 2022-08-17 21:14:04 -04:00
go.sum Fix: upgrade pkg imdario/merg to prevent merge config panic (#14237) 2022-08-17 21:14:04 -04:00
main.go Refactor some functions for better enterprise use (#13280) 2022-05-30 09:46:55 -04:00

README.md

Consul logo Consul

Docker Pulls Go Report Card

Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.

Consul provides several key features:

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Mesh/Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

Consul runs on Linux, macOS, FreeBSD, Solaris, and Windows and includes an optional browser based UI. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance. For contributions specifically to the browser based UI, please refer to the UI's README.md for guidance.