Find a file
R.B. Boyer d6dce2332a
connect: intentions are now managed as a new config entry kind "service-intentions" (#8834)
- Upgrade the ConfigEntry.ListAll RPC to be kind-aware so that older
copies of consul will not see new config entries it doesn't understand
replicate down.

- Add shim conversion code so that the old API/CLI method of interacting
with intentions will continue to work so long as none of these are
edited via config entry endpoints. Almost all of the read-only APIs will
continue to function indefinitely.

- Add new APIs that operate on individual intentions without IDs so that
the UI doesn't need to implement CAS operations.

- Add a new serf feature flag indicating support for
intentions-as-config-entries.

- The old line-item intentions way of interacting with the state store
will transparently flip between the legacy memdb table and the config
entry representations so that readers will never see a hiccup during
migration where the results are incomplete. It uses a piece of system
metadata to control the flip.

- The primary datacenter will begin migrating intentions into config
entries on startup once all servers in the datacenter are on a version
of Consul with the intentions-as-config-entries feature flag. When it is
complete the old state store representations will be cleared. We also
record a piece of system metadata indicating this has occurred. We use
this metadata to skip ALL of this code the next time the leader starts
up.

- The secondary datacenters continue to run the old intentions
replicator until all servers in the secondary DC and primary DC support
intentions-as-config-entries (via serf flag). Once this condition it met
the old intentions replicator ceases.

- The secondary datacenters replicate the new config entries as they are
migrated in the primary. When they detect that the primary has zeroed
it's old state store table it waits until all config entries up to that
point are replicated and then zeroes its own copy of the old state store
table. We also record a piece of system metadata indicating this has
occurred. We use this metadata to skip ALL of this code the next time
the leader starts up.
2020-10-06 13:24:05 -05:00
.changelog connect: intentions are now managed as a new config entry kind "service-intentions" (#8834) 2020-10-06 13:24:05 -05:00
.circleci ci: fix bindata autoupdate (#8801) 2020-10-02 15:23:38 -04:00
.github Remove label trigger on edit (#8832) 2020-10-06 13:16:14 -04:00
acl Small typo in docstring (#8280) 2020-07-09 17:38:50 -06:00
agent connect: intentions are now managed as a new config entry kind "service-intentions" (#8834) 2020-10-06 13:24:05 -05:00
api connect: intentions are now managed as a new config entry kind "service-intentions" (#8834) 2020-10-06 13:24:05 -05:00
bench
build-support Update all the references in CI and makefile to the bindata file location 2020-10-01 16:19:10 +01:00
command connect: intentions are now managed as a new config entry kind "service-intentions" (#8834) 2020-10-06 13:24:05 -05:00
connect connect: intentions are now managed as a new config entry kind "service-intentions" (#8834) 2020-10-06 13:24:05 -05:00
contributing Add github actions for PR and issue labeling (#8709) 2020-10-05 10:43:21 -04:00
demo
internal/go-sso Merge pull request #8035 from hashicorp/feature/auto-config/server-rpc 2020-06-17 16:07:25 -04:00
ipaddr
lib lib/retry: Refactor to reduce the interface surface 2020-10-04 18:12:42 -04:00
logging Refactor uiserver to separate package, cleaner Reloading 2020-10-01 11:32:25 +01:00
proto Merge pull request #8799 from hashicorp/streaming/rename-framing-events 2020-10-06 12:42:58 -04:00
sdk connect: intentions are now managed as a new config entry kind "service-intentions" (#8834) 2020-10-06 13:24:05 -05:00
sentinel
service_os
snapshot testing: Remove all the defer os.Removeall 2020-08-14 19:58:53 -04:00
terraform
test Add load testing framework (#8571) 2020-10-05 20:16:09 -05:00
testrpc acl: remove the deprecated acl_enforce_version_8 option (#7991) 2020-05-29 16:16:03 -05:00
tlsutil Add support for -ca-path option in the connect envoy command (#8606) 2020-09-08 12:16:16 +02:00
types Move RPC router from Client/Server and into BaseDeps (#8559) 2020-08-27 11:23:52 -04:00
ui-v2 ui: Service instance requests and proxy requests are ranges (#8828) 2020-10-06 14:39:39 +01:00
vendor Vendor gofuzz and google/go-cmp 2020-09-28 18:28:37 -04:00
version [skip ci] bump master to 1.9.0 to track next release version (#8315) 2020-07-15 14:48:36 -04:00
website docs: Add missing helm docs and make link anchors consistent (#8808) 2020-10-05 10:02:04 -07:00
.dockerignore
.gitattributes
.gitignore
.golangci.yml Remove unused return values 2020-06-24 13:00:15 -04:00
.hashibot.hcl
CHANGELOG.md fix typo in 1.8.4 changelog line 2020-09-17 11:30:52 -05:00
codecov.yml Update all the references in CI and makefile to the bindata file location 2020-10-01 16:19:10 +01:00
GNUmakefile ci: fix bindata autoupdate (#8801) 2020-10-02 15:23:38 -04:00
go.mod Vendor gofuzz and google/go-cmp 2020-09-28 18:28:37 -04:00
go.sum Vendor gofuzz and google/go-cmp 2020-09-28 18:28:37 -04:00
INTERNALS.md
LICENSE
main.go Add Revision to version CLI output and add JSON support 2020-07-08 16:32:46 -04:00
main_test.go
NOTICE.md
package-lock.json Add Algolia indexing to CI 2020-06-29 12:14:43 -04:00
README.md Added docs link to Learn tutorial for Kind. (#8610) 2020-09-11 17:03:35 -04:00
Vagrantfile

Consul CircleCI Discuss

Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.

Consul provides several key features:

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Mesh/Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.