Chris S. Kim
7dd16ed4fb
Add retries and debugging to flaky test
2022-08-08 15:26:44 -04:00
Chris S. Kim
b374250d08
Add debugging logs to freeport
2022-08-08 15:25:17 -04:00
Thomas Eckert
d278b56734
Add read command examples
2022-08-08 15:16:55 -04:00
Thomas Eckert
466dce19a9
Change to <nobr>
2022-08-08 14:56:50 -04:00
Kyle Havlovitz
fe1fcea34f
Add some extra handling for destination deletes
2022-08-08 11:38:13 -07:00
Freddy
0455b5e720
Add peering ACL docs ( #13855 )
...
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-08-08 11:44:25 -06:00
Thomas Eckert
89f3b2979f
Remove "Required" column from options (they are all optional)
2022-08-08 12:57:48 -04:00
Thomas Eckert
418bc1ca04
Update the table of contents with better descriptions
2022-08-08 12:53:41 -04:00
Chris S. Kim
670531f828
Retry docker build steps
2022-08-08 12:22:16 -04:00
claire labry
7b2691ec34
Merge pull request #13790 from hashicorp/post-publish-website
...
introduces the post publish website event
2022-08-08 10:55:11 -05:00
sarahalsmiller
3bd8fbad82
Merge pull request #13675 from hashicorp/sa-restructure-documentation
...
Restructure Api Gateway Documentation
2022-08-08 10:35:23 -05:00
Freddy
d7be72c7fd
Merge pull request #14024 from hashicorp/peering/secrets-fixes
2022-08-08 09:30:09 -06:00
freddygv
d421e18172
Update snapshot test
2022-08-08 09:17:15 -06:00
Sarah Alsmiller
b9f70c0bf1
fix identation
2022-08-08 10:16:24 -05:00
freddygv
1031ffc3c7
Re-validate existing secrets at state store
...
Previously establishment and pending secrets were only checked at the
RPC layer. However, given that these are Check-and-Set transactions we
should ensure that the given secrets are still valid when persisting a
secret exchange or promotion.
Otherwise it would be possible for concurrent requests to overwrite each
other.
2022-08-08 09:06:07 -06:00
Sarah Alsmiller
4b8b1b502c
revert indent
2022-08-08 09:33:22 -05:00
Sarah Alsmiller
c8e78f1f8d
test
2022-08-08 09:32:28 -05:00
freddygv
0ea4bfae94
Test fixes
2022-08-08 08:31:47 -06:00
Sarah Alsmiller
6e80e6ab37
indentation
2022-08-08 09:21:51 -05:00
sarahalsmiller
62142aa921
Update website/content/docs/api-gateway/configuration/gateway.mdx
2022-08-08 09:16:36 -05:00
Michael Klein
b955490852
Update peerings docs links ( #14040 )
2022-08-08 16:12:17 +02:00
John Cowen
9caf430e8e
ui: Add additional generation/initiation data-sources ( #14018 )
2022-08-08 11:23:02 +01:00
John Cowen
e2eb4e620f
ui: Ensure we dispatch validation state ( #14021 )
...
* ui: Ensure we dispatch validation state
* Changelog
2022-08-08 11:12:40 +01:00
John Cowen
50b85c3189
ui: Make DataWriter also deal with more standard shaped errors ( #14025 )
...
* ui: Make DataWriter also deal with more standard shaped errors
* ui: Add error states/messages for peering establishment (#14026 )
* ui: Add error states/messages for peering establishment
* Inspect state instead of asking about existence of error
2022-08-08 10:51:02 +01:00
freddygv
c04515a844
Use proto message for each secrets write op
...
Previously there was a field indicating the operation that triggered a
secrets write. Now there is a message for each operation and it contains
the secret ID being persisted.
2022-08-08 01:41:00 -06:00
Jared Kirschner
22511ec491
Allow uppercase in proxy launch -sidecar-for arg
...
Previously, when launching a sidecar proxy with one of the following commands:
- consul connect envoy -sidecar-for=...
- consul connect proxy -sidecar-for=...
... the -sidecar-for argument could only contain lowercase letters, even if
the service was registered with some uppercase letters.
Now, the -sidecar-for argument is treated as case-insensitive.
2022-08-05 10:55:22 -07:00
Sarah Alsmiller
da38571f4b
Merge branch 'sa-restructure-documentation' of github.com:hashicorp/consul into sa-restructure-documentation
2022-08-05 10:38:31 -05:00
Sarah Alsmiller
c71bc86d2a
note rendering weird
2022-08-05 10:38:20 -05:00
Sarah Alsmiller
ea921f3818
bulleted list
2022-08-05 10:36:07 -05:00
sarahalsmiller
6f65653f32
Update website/content/docs/api-gateway/configuration/gateway.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:31:28 -05:00
sarahalsmiller
7a0817aa63
Update website/content/docs/api-gateway/configuration/gateway.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:31:19 -05:00
Sarah Alsmiller
5f98f18494
delete confusing sentence
2022-08-05 10:28:28 -05:00
Sarah Alsmiller
60108c860a
Merge branch 'sa-restructure-documentation' of github.com:hashicorp/consul into sa-restructure-documentation
2022-08-05 10:18:15 -05:00
Sarah Alsmiller
830cb60b13
remove configuration section
2022-08-05 10:18:04 -05:00
Sarah Alsmiller
cc36b3712d
render issue
2022-08-05 10:16:41 -05:00
sarahalsmiller
446957ff51
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:13:15 -05:00
sarahalsmiller
82e39e87ee
Update website/redirects.js
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:13:00 -05:00
sarahalsmiller
d677cf4c6a
Update website/content/docs/api-gateway/usage.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:11:36 -05:00
sarahalsmiller
87bf6eba49
Update website/content/docs/api-gateway/usage.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:10:55 -05:00
Sarah Alsmiller
18a7340e5a
clarify artifacts being applied
2022-08-05 10:05:58 -05:00
sarahalsmiller
05ca89c169
Update website/content/docs/api-gateway/install.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:01:29 -05:00
sarahalsmiller
ba0135808c
Update website/content/docs/api-gateway/install.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:00:45 -05:00
sarahalsmiller
62e195bbf1
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 09:59:15 -05:00
sarahalsmiller
d27037477f
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 09:59:01 -05:00
Kyle Havlovitz
6580566c3b
Update ingress/terminating wildcard logic and handle destinations
2022-08-05 07:56:10 -07:00
cskh
155c4bc2af
fix(cli): error message in service deregister subcommand ( #14028 )
2022-08-04 11:07:40 -04:00
John Cowen
ff88fcdb39
ui: Ensure CopyableCode copy icon/button is fully clickable ( #14016 )
...
* ui: Ensure CopyableCode copy icon/button is fully clickable
* Give it a 40px height also
2022-08-04 13:30:52 +01:00
freddygv
8067890787
Inherit active secret when exchanging
2022-08-03 17:32:53 -05:00
freddygv
60d6e28c97
Pass explicit signal with op for secrets write
...
Previously the updates to the peering secrets UUID table relied on
inferring what action triggered the update based on a reconciliation
against the existing secrets.
Instead we now explicitly require the operation to be given so that the
inference isn't necessary. This makes the UUID table logic easier to
reason about and fixes some related bugs.
There is also an update so that the peering secrets get handled on
snapshots/restores.
2022-08-03 17:25:12 -05:00
freddygv
9ca687bc7c
Avoid deleting peering secret UUIDs at dialers
...
Dialers do not keep track of peering secret UUIDs, so they should not
attempt to clean up data from that table when their peering is deleted.
We also now keep peer server addresses when marking peerings for
deletion. Peer server addresses are used by the ShouldDial() helper
when determining whether the peering is for a dialer or an acceptor.
We need to keep this data so that peering secrets can be cleaned up
accordingly.
2022-08-03 16:34:57 -05:00