Paul Banks
1a611f0c1b
Apply suggestions from code review
...
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2021-09-28 17:19:13 +01:00
Paul Banks
fe92cf7cb6
Document HTTP Header manipulation options added in #10613
2021-09-27 14:46:15 +01:00
John Cowen
581357c32a
ui: Remove info panel from the nspace menu when editing nspaces ( #11130 )
...
* ui: Remove info panel form the nspace menu when editing nspaces
2021-09-24 18:05:22 +01:00
John Cowen
01c9dc5728
ui: Add initial partition support to intentions ( #11129 )
...
* ui: Add initial partition support to intentions
2021-09-24 17:31:58 +01:00
Blake Covarrubias
94d3849472
docs: Decode K8s secrets with base64decode function
...
Use kubectl's base64decode template function (added in K8s 1.11) to
decode values in Secrets. Removes external call to `base64` utility on
the host system.
2021-09-24 08:59:34 -07:00
John Cowen
eb00b45ef4
ui: Use last-child for selecting the desired nspace instead of nth-child ( #11127 )
2021-09-24 13:04:41 +01:00
John Cowen
e59b8ffc17
ui: Remove refresh-route action for session invalidation ( #11105 )
...
* ui: Move action to the correct button for session invalidation
* Remove refresh-route completely, its not needed
2021-09-24 12:10:10 +01:00
trujillo-adam
b22684540e
Merge pull request #11028 from hashicorp/docs-k8s-cli-alpha
...
adding k8s-cli alpha docs
2021-09-23 16:35:56 -07:00
trujillo-adam
52f82f2831
adding timeout flags, wait flag, and updated build procedure
2021-09-23 16:07:56 -07:00
Dhia Ayachi
e664dbc352
Refactor table index acl phase 2 ( #11133 )
...
* extract common methods from oss and ent
* remove unreachable code
* add missing normalize for binding rules
* fix oss to use Query
2021-09-23 15:26:09 -04:00
CJ
978699943f
docs: Fix grammatical errors in glossary ( #10751 )
2021-09-23 08:36:52 -07:00
Paul Banks
1ecec84fd7
Merge pull request #10903 from hashicorp/feature/ingress-sds
...
Add Support to for providing TLS certificates for Ingress listeners from an SDS source
2021-09-23 16:19:05 +01:00
Dhia Ayachi
5904e4ac79
Refactor table index ( #11131 )
...
* convert tableIndex to use the new pattern
* make `indexFromString` available for oss as well
* refactor `indexUpdateMaxTxn`
2021-09-23 11:06:23 -04:00
Paul Banks
7b4cbe3143
Final readability tweaks from review
2021-09-23 10:17:12 +01:00
Paul Banks
e0efb420f7
Add Envoy integration test for split-route SDS case
2021-09-23 10:17:03 +01:00
Paul Banks
ab27214a10
Minor improvements to SDS server from review
2021-09-23 10:13:41 +01:00
Paul Banks
70bc89b7f4
Fix subtle loop bug and add test
2021-09-23 10:13:41 +01:00
Paul Banks
07f81991df
Refactor SDS validation to make it more contained and readable
2021-09-23 10:13:19 +01:00
Paul Banks
5cfd030d03
Refactor Ingress-specific lister code to separate file
2021-09-23 10:13:19 +01:00
Paul Banks
136928a90f
Minor PR typo and cleanup fixes
2021-09-23 10:13:19 +01:00
Paul Banks
20d0bf81f7
Revert abandonned changes to proxycfg for Ent test consistency
2021-09-23 10:13:19 +01:00
Paul Banks
a9119e36a5
Fix merge conflict in xds tests
2021-09-23 10:12:37 +01:00
Paul Banks
2b755d7b3f
Allow skipping v2 compat tests for SDS as it's only the SDS server integration that doesn't support v2
2021-09-23 10:12:37 +01:00
Paul Banks
e01c3585a5
Fix integration tests in CI - serve SDS certs from the Docker image not a mounted path
2021-09-23 10:12:37 +01:00
Paul Banks
843079f33a
Fix integration test for older Envoy versions
2021-09-23 10:12:37 +01:00
Paul Banks
2281d883b9
Fix some more Enterprise Normalization issues affecting tests
2021-09-23 10:12:37 +01:00
Paul Banks
b5345ea878
Add changelog; Add API package support for new fields.
2021-09-23 10:12:37 +01:00
Paul Banks
9fa60c7472
Remove unused argument to fix lint error
2021-09-23 10:09:11 +01:00
Paul Banks
659321d008
Handle namespaces in route names correctly; add tests for enterprise
2021-09-23 10:09:11 +01:00
Paul Banks
cd8ad007fe
Add basic integration test for Envoy ingress with SDS
2021-09-23 10:08:02 +01:00
Paul Banks
2a3d3d3c23
Update xDS routes to support ingress services with different TLS config
2021-09-23 10:08:02 +01:00
Paul Banks
16b3b1c737
Update xDS Listeners with SDS support
2021-09-23 10:08:02 +01:00
Paul Banks
ccbda0c285
Update proxycfg to hold more ingress config state
2021-09-23 10:08:02 +01:00
Paul Banks
4e39f03d5b
Add ingress-gateway config for SDS
2021-09-23 10:08:02 +01:00
Mark Anderson
d88d9e71c2
partitions/authmethod-index work from enterprise ( #11056 )
...
* partitions/authmethod-index work from enterprise
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2021-09-22 13:19:20 -07:00
Chris S. Kim
f972048ebc
connect: Allow upstream listener escape hatch for prepared queries ( #11109 )
2021-09-22 15:27:10 -04:00
R.B. Boyer
706fc8bcd0
grpc: strip local ACL tokens from RPCs during forwarding if crossing datacenters ( #11099 )
...
Fixes #11086
2021-09-22 13:14:26 -05:00
John Cowen
6bc8af364f
ui: Add initial i18n docs page ( #10888 )
2021-09-22 18:51:39 +01:00
John Cowen
61e69a9fe5
ui: Add partition parameter when clearing child-selector forms in ACLs ( #11106 )
2021-09-22 18:36:09 +01:00
John Cowen
ececa7da45
ui: Add an isDestroyed check for the MenuPanel component ( #11104 )
...
This solves an occasionally flakey tests I see every so often
2021-09-22 18:33:31 +01:00
John Cowen
e088d8674c
ui: Remove legacy ACLs ( #11096 )
2021-09-22 18:32:51 +01:00
John Cowen
6e396e4456
ui: Gracefully recover from non-existent DC errors ( #11077 )
...
* ui: Gracefully recover from non-existent DC errors
This PR fixes what happens in the UI if you try to navigate to a non-existing DC.
When we received a 500 error from an API response due to a non-existent DC, previously we would show a 404 error, which is what we were trying to convey. But in the spirit of the UI being a 'thin client', its probably best to just show the 500 error from the API response, which may help folks to debug any issues better.
* Automatically set the CONSUL_DATACENTER_LOCAL env var for testing
2021-09-22 18:26:36 +01:00
John Cowen
cf638ee551
ui: Always show main navigation Key/Value link ( #10916 )
...
* ui: Ignore response from API for KV permissions
Currently there is no way for us to use our HTTP authorization API
endpoint to tell us whether a user has access to any KVs (including the
case where a user may not have access to the root KV store, but do have
access to a sub item)
This is a little weird still as in the above case the user would click
on this link and still get a 403 for the root, and then have to manually
type in the URL for the KV they do have access to.
Despite this we think this change makes sense as at least something about KV is
visible in the main navigation.
Once we have the ability to know if any KVs are accessible, we can add
this guard back in.
We'd initially just removed the logic around the button, but then
noticed there may be further related KV issues due to the nested nature
of KVs so we finally decided on simply ignoring the responses from the
HTTP API, essentially reverting the KV area back to being a thin client.
This means when things are revisited in the backend we can undo this
easily change in one place.
* Move acceptance tests to use ACLs perms instead of KV ones
2021-09-22 18:23:59 +01:00
Connor
1e3ba26223
Merge pull request #11090 from hashicorp/clly/kv-usage-metrics
...
Add KVUsage to consul state usage metrics
2021-09-22 11:26:56 -05:00
Ashwin Venkatesh
fd7f670f12
Update docs ( #11111 )
2021-09-22 12:26:08 -04:00
Connor Kelly
ba706501e1
Strip out go 1.17 bits
2021-09-22 11:04:48 -05:00
R.B. Boyer
5253c78be7
Merge pull request #11108 from hashicorp/sync-1.11.0-alpha-tag
...
Sync 1.11.0 alpha tag
2021-09-22 10:57:12 -05:00
hc-github-team-consul-core
9cbd27dbbd
Putting source back into Dev Mode
2021-09-22 10:09:18 -05:00
R.B. Boyer
a1e8564b92
Version 1.11.0-alpha
...
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEs2y6kaLAcwxDX8KAsLRBCXaFtnYFAmFDyoMACgkQsLRBCXaF
tna8nQ//bVAd6nKI0Xgotmf2Loce0yobD6PH8IyzllO24jPSGwHFXQsx0d8a5QkV
H1wx6KrXysXKCojrICX3/88T4KNypYpIXIBZoTBQ0rEXaTMoqACcT4y58/UcjFg2
bN8T/wjvD8BV2e0xcZb2C6SgXx8m64UtZKePN1fobKBEpSCszJz8EeWPtPzXdWps
f9axbgV81qy9DTyO7MvbOvco/QaEgzjK+o/57bcLBXZmfWpI1DIARkgIY8XB7pC3
Gq59OegjqjiCliJcnLfIpvemLZg/7BhnLOO5ccvctdgoxFUnzsWk+mKTL0tPyy+d
ZNa1kVgIQKWUoSRje7rHUSu+270PifLegp3zrHLrwKpa2UQGldck13hSMTyBqz1n
5TywpdMJoXZSj5tml2lvaskUh91zvO9v6sX4zJJkES/Kt2KXdHBAGkmzPuiXl5YW
1eScGz5990CwULinV+Cb32HYEojSSD4FWs9KC5NpJmI2kIOiybgiUKIG5uKdz0wh
971BDjCNTC+x+pivtyEy0HAWOUlqROYRpCc40e7Xx0LmJvQ0nqCK2rCWC+0Bi1jK
QCeesSK7vm6Hnw3/OnlIu7fu71+KZs1qGJBtBcqCoxTsgONd5+woWL5ziUZd7Bh2
JloGlOrUFk2Ci2XeD0EO5lboLwsaMVDHXXx1beee5u7b2nORKDA=
=tXEa
-----END PGP SIGNATURE-----
Merge tag 'v1.11.0-alpha' into main
Version 1.11.0-alpha
2021-09-22 10:05:57 -05:00
Matt Keeler
c04d5c4238
Add changelog entry for audit logging header extraction improvement
2021-09-22 10:23:01 -04:00