Commit Graph

16706 Commits

Author SHA1 Message Date
mrspanishviking 8aecfa877a
Apply suggestions from code review
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-02-03 14:06:41 -07:00
mrspanishviking 4500622004
Apply suggestions from code review
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-02-03 14:00:06 -07:00
Jake Herschman 246d5e947d
Merge pull request #11944 from hashicorp/cts-docs-clean-up 2022-02-03 14:08:33 -05:00
Daniel Nephin b058845110 sdk: add TestLogLevel for setting log level in tests
And default log level to WARN.
2022-02-03 13:42:28 -05:00
David Yu 81461565d7
docs: provide example for enabling mesh on a per namespace basis (#12255)
* docs: provide example for enabling mesh on a per namespace basis

* add headings

* Update install.mdx

* Update install.mdx

* Update website/content/docs/k8s/installation/install.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update install.mdx

* Update website/content/docs/k8s/installation/install.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/docs/k8s/installation/install.mdx

Co-authored-by: Iryna Shustava <ishustava@users.noreply.github.com>

* add changes from review

* Update install.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: Iryna Shustava <ishustava@users.noreply.github.com>
2022-02-03 10:40:06 -08:00
Jared Kirschner 4c3cfba4df
Merge pull request #12230 from hashicorp/badge-improvements
README Badge Improvements
2022-02-03 13:36:05 -05:00
Jared Kirschner d205183576 Improve README header
Improvements include:
- separate the project name from the badges
- use the project logo
- show more relevant badges
2022-02-03 10:15:38 -08:00
David Yu f020cedab2
docs: formatting and update to consul-k8s 0.40.0 (#12256)
* docs: formatting and update to consul-k8s 0.40.0

* Update index.mdx

* Update index.mdx

* test indentation

* Update index.mdx

* formatting

* Update index.mdx

* Update index.mdx

* Update index.mdx

* Update index.mdx

* Update website/content/docs/k8s/upgrade/index.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/upgrade/index.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/upgrade/index.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-02-03 08:12:47 -08:00
Jared Kirschner 1ff27b0b16
Merge pull request #10833 from jkirschner-hashicorp/improve-compile-from-source-docs
docs: improve compile from source docs
2022-02-03 11:05:46 -05:00
Jared Kirschner 918a1057c7 Update Consul logo assets on docs site 2022-02-03 07:39:35 -08:00
Daniel Nephin f504a02776 Replace build script with 'go build' 2022-02-03 07:19:57 -08:00
John Cowen 39f15306d9
ui: Change approach to loading debug.css (#12242)
We need a way to load certain CSS based on the environment you are viewing, i.e. we have debug CSS that we use for our Eng Documentation and various other DX utilities that shouldn't be compiled into our production or test builds.

Previously we would compile two entirely different CSS files (app and debug) and the load one or the other depending on which environment you were in.

This approach just empties out the debug.css file in certain environments (prod/test) which means we can just import that file from app. When in staging/development this imports the contents of debug.css (quite a bit of CSS) whereas when building for production/test this debug.css is emptied out during the build process.

There is a slight little hack in order to have this work, we import _debug.scss which imports the debug.scss file. I couldn't for the life of me figure out how to have broccoli empty out a file during the build process, so instead we essentially copy over debug.scss during dev and create an empty file during prod to _debug.scss.

When using make build to build an artifact for production CSS remains at ~58kb (during dev its a lot bigger than this)
2022-02-03 08:40:03 +00:00
Blake Covarrubias a6f51d8c1b docs: Fix discrepancy with sidecar min/max port range
Remove incorrect sidecar port range on docs for built-in proxy.

Updates the bind_port/port fields on the built-in proxy and sidecar
service registration pages to link to the `sidecar_min_port` and
`sidecar_max_port` configuration options for the defined port range.

Fixes #12253
2022-02-02 20:12:00 -08:00
Michele Degges 5942e474cf Use docker mirror 2022-02-02 17:41:56 -08:00
Evan Culver f98f37ba55
Merge branch 'enable-security-scan' of github.com:hashicorp/consul into enable-security-scan 2022-02-02 17:32:17 -08:00
Evan Culver d12e0ceddf
Add changelog entry 2022-02-02 17:31:08 -08:00
Michele Degges 29ebe13141 Merge branch 'fix-broken-dockerfile' of github.com:hashicorp/consul into fix-broken-dockerfile 2022-02-02 15:39:14 -08:00
Daniel Nephin df2a7e2ae5
Merge pull request #11783 from hashicorp/dnephin/ca-vault-root-as-intermediate
ca: add a test that uses an intermediate CA as the primary CA
2022-02-02 16:05:59 -05:00
Jared Kirschner b357ec9e20
Merge pull request #11391 from hashicorp/add-changelog-creation-to-contributor-docs
Add changelog creation to contributor docs
2022-02-02 14:50:02 -05:00
Jared Kirschner 45acc91c26 Add changelog creation to contributor docs 2022-02-02 10:58:27 -08:00
Daniel Nephin 7839b2d7e0 ca: add a test that uses an intermediate CA as the primary CA
This test found a bug in the secondary. We were appending the root cert
to the PEM, but that cert was already appended. This was failing
validation in Vault here:
https://github.com/hashicorp/vault/blob/sdk/v0.3.0/sdk/helper/certutil/types.go#L329

Previously this worked because self signed certs have the same
SubjectKeyID and AuthorityKeyID. So having the same self-signed cert
repeated doesn't fail that check.

However with an intermediate that is not self-signed, those values are
different, and so we fail the check. A test I added in a previous commit
should show that this continues to work with self-signed root certs as
well.
2022-02-02 13:41:35 -05:00
claire labry 985ac9f185
Merge branch 'main' into enable-security-scan 2022-02-02 13:36:48 -05:00
Daniel Nephin 2ef26f48b8
Merge pull request #12250 from hashicorp/dnephin/acl-resolver-safer-identity
acl: un-embed ACLIdentity
2022-02-02 13:10:35 -05:00
Daniel Nephin ac732ce82b acl: un-embed ACLIdentity
This is safer than embedding two interface because there are a number of
places where we check the concrete type. If we check the concrete type
on the top-level interface it will fail. So instead expose the
ACLIdentity from a method.
2022-02-02 12:07:31 -05:00
John Cowen 0f94ce3964
ui: Alias all our Structure Icons to Flight Icons (#12209) 2022-02-02 13:24:47 +00:00
mrspanishviking a8c6543e72
Apply suggestions from code review
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-02-01 15:22:32 -07:00
mrspanishviking 6be5970217
Apply suggestions from code review
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-02-01 15:18:47 -07:00
mrspanishviking 7c31acca72
Merge pull request #12243 from gitrgoliveira/patch-1
Update redirect-traffic.mdx
2022-02-01 15:09:02 -07:00
mrspanishviking ed586ade37
Update website/content/commands/connect/redirect-traffic.mdx
Co-authored-by: Blake Covarrubias <blake.covarrubias@gmail.com>
2022-02-01 15:08:23 -07:00
JG d433a9d085
packaging: fix issues in pre/postremove scripts (#12147)
Fixes several issues with the pre/postremove scripts for both rpm and
deb packages. Specifically:

For postremove:
- the postremove script now functions correctly (i.e. restarts consul
  after a package upgrade) on rpm-based systems (where $1 is numeric
  rather than `purge` or `upgrade`)
- `systemctl daemon-reload` is called on package removal (rather than
  only on upgrade)
- calls `systemctl try-restart` instead of `systemctl restart`, which
  will only (re)start consul if it was already running when the upgrade
  happened.

For preremove:
- if the package is being completely uninstalled (rather than upgraded),
  stop consul before removing the package
2022-02-01 12:07:18 -08:00
John Cowen 417cb8d838
ui: attach-shadow modifier (#12207)
* ui: attach-shadow modifier
* ui: adopt-styles helper (#12208)
2022-02-01 19:48:57 +00:00
Jake Herschman 9cfe4aebcf Updated copy based on feedback 2022-02-01 13:59:26 -05:00
Daniel Nephin 947e972dd2 docs: update install from source
GOPATH is not longer necessary as of Go1.11.

No additional tools are required, just Go.
2022-02-01 09:32:48 -08:00
Jared Kirschner c42186f360 docs: link from makefile to compile instructions
Some practitioners look to the makefile directly rather than to the consul
website for information on how to compile from source. Link to the website
instructions directly from the makefile so the practitioner can accomplish
their task successfully without a careful read of the makefile.
2022-02-01 09:32:48 -08:00
Jared Kirschner e2385fe329 docs: show how to cross-compile from source 2022-02-01 09:32:47 -08:00
Ricardo Oliveira c4ea922958
Update website/content/commands/connect/redirect-traffic.mdx
Co-authored-by: mrspanishviking <cardenas88karl@gmail.com>
2022-02-01 17:20:20 +00:00
Ricardo Oliveira db9c6acf04
Update redirect-traffic.mdx 2022-02-01 17:10:49 +00:00
John Cowen 189895e8fa
ui: style-map helper (#12203) 2022-02-01 16:39:02 +00:00
John Cowen 59756e4a88
ui: on-outside modifier (#12206) 2022-02-01 14:25:24 +00:00
David Yu 2893275e33
docs: slight formatting update and provide example with service mesh enabled (#12227)
* docs: slight formatting update and provide example with service mesh install

* add status

* Update website/content/docs/k8s/installation/install.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update install.mdx

* Update install.mdx

* Update install.mdx

* Update install.mdx

* Update install.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-31 17:26:44 -08:00
Daniel Nephin 9d80c1886a
Merge pull request #12167 from hashicorp/dnephin/acl-resolve-token-3
acl: rename ResolveTokenToIdentityAndAuthorizer to ResolveToken
2022-01-31 19:21:06 -05:00
Daniel Nephin 997bf1e5a4
Merge pull request #12166 from hashicorp/dnephin/acl-resolve-token-2
acl: remove ResolveTokenToIdentity
2022-01-31 19:19:21 -05:00
Jared Kirschner eaf28e38dd
Merge pull request #12232 from hashicorp/pcmccarron-press-kit
updating press kit link
2022-01-31 19:01:43 -05:00
Daniel Nephin 343b6deb79 acl: rename ResolveTokenToIdentityAndAuthorizer to ResolveToken
This change allows us to remove one of the last remaining duplicate
resolve token methods (Server.ResolveToken).

With this change we are down to only 2, where the second one also
handles setting the default EnterpriseMeta from the token.
2022-01-31 18:04:19 -05:00
Daniel Nephin d363cc0f07 acl: remove unused methods on fakes, and add changelog
Also document the metric that was removed in a previous commit.
2022-01-31 17:53:53 -05:00
Peter M b113bf86cf
updating to brand 2022-01-31 13:22:29 -07:00
Peter M 998a339eb1
Update website/components/footer/index.jsx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-01-31 13:21:19 -07:00
Peter M 569f460b18
updating press kit link
pointing to the brand page instead of a zip file.
2022-01-31 11:44:17 -07:00
Daniel Nephin b2b84e7fc6
Merge pull request #12165 from hashicorp/dnephin/acl-resolve-token
acl: remove some of the duplicate resolve token methods
2022-01-31 13:27:49 -05:00
David Yu c84fe812c5
docs: Small changes to API Gateway docs (#12226)
* docs: Small changes to API Gateway docs

* Update api-gateway.mdx

* Update website/content/docs/api-gateway.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-31 09:00:20 -08:00