Commit Graph

16409 Commits

Author SHA1 Message Date
Daniel Nephin 7a6e03c19b acl: Remove a call to aclAccessorID
I missed this on the first pass, we no longer need to look up this ID, because we have it
from the Authorizer.
2022-01-26 17:21:45 -05:00
Daniel Nephin e134e43da6 acl: remove calls to ResolveIdentityFromToken
We already have an ACLResolveResult, so we can get the accessor ID from
it.
2022-01-22 15:05:42 -05:00
Daniel Nephin edca8d61a3 acl: remove ResolveTokenToIdentity
By exposing the AccessorID from the primary ResolveToken method we can
remove this duplication.
2022-01-22 14:47:59 -05:00
Daniel Nephin a5e8af79c3 acl: return a resposne from ResolveToken that includes the ACLIdentity
So that we can duplicate duplicate methods.
2022-01-22 14:33:09 -05:00
Daniel Nephin 8c9c48e219 acl: remove duplicate methods
Now that ACLResolver is embedded we don't need ResolveTokenToIdentity on
Client and Server.

Moving ResolveTokenAndDefaultMeta to ACLResolver removes the duplicate
implementation.
2022-01-22 14:12:08 -05:00
Daniel Nephin 241663a046 acl: embed ACLResolver in Client and Server
In preparation for removing duplicate resolve token methods.
2022-01-22 14:07:26 -05:00
David Yu 9dc6abaa70
docs: 1.11.0 release notes (#12138)
* Work in Progress

* edit nav to show 1.11

* slight updates to release note content

* acl changes

* add details on bbolt

* first draft

* add more admin partition details

* revert package-lock.json

* Update website/content/docs/release-notes/1-11-0.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/docs/release-notes/1-11-0.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/docs/release-notes/1-11-0.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/docs/release-notes/1-11-0.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/docs/release-notes/1-11-0.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/docs/release-notes/1-11-0.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* add sds change, and 1.10 change for tproxy

* Small changes

* Update website/content/docs/release-notes/1-11-0.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/release-notes/1-11-0.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* adding Consul Service mesh term

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-21 15:46:02 -08:00
Chris S. Kim 06fbee2801
Push bindata_assetfs.go to a non-protected branch (#12151) 2022-01-21 16:10:54 -05:00
Chris S. Kim bee18f4a1d
Generate bindata_assetfs.go (#12146) 2022-01-21 16:06:44 -05:00
R.B. Boyer 38e0106701
update main to reflect it is v1.12.0-dev (#12157) 2022-01-21 15:03:11 -06:00
David Yu c69b05ca55
docs: Vault Secrets Backend K8s, remove code tabs (#12156)
* Update connect-ca.mdx

* Update gossip.mdx

* Update index.mdx

* Update server-tls.mdx
2022-01-21 11:28:38 -08:00
David Yu 662fb1b919
docs: Formatting Consul K8s Vault docs (#12148)
* Update index.mdx

* Update gossip.mdx

* Update install-cli.mdx

* Update gossip.mdx

* Update website/content/docs/k8s/installation/vault/gossip.mdx

Co-authored-by: Bryce Kalow <bkalow@hashicorp.com>

* fix MDX formatting

* local changes

* adding formatting changes

* Update website/content/docs/k8s/installation/vault/connect-ca.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* adding shell-session to service mesh certs

Co-authored-by: Bryce Kalow <bkalow@hashicorp.com>
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-21 11:01:48 -08:00
John Cowen e6a084807b
ui: Enable theming (#12134)
plus Themeable icons (#12135)
2022-01-21 12:19:03 +00:00
John Cowen 61d7acd51f
ui: Tweak some code related meta information (#12117)
* ui: Correct some meta info

* Encoder doesn't take an argument whereas decoder does

* Math.trunc looks like the closest to parseInt but using the correct type

*  use a dynamic string when setting things on window
2022-01-21 11:42:48 +00:00
Evan Culver 89ed18dc42
Provide an 'escape-hatch' for website-checker workflow (#11882) 2022-01-20 18:34:01 -08:00
Ashwin Venkatesh 7568f3a102
Add support for 'Partition' and 'RetryJoin' (#12126)
- Adding a 'Partition' and 'RetryJoin' command allows test cases where
  one would like to spin up a Consul Agent in a non-default partition to
test use-cases that are common when enabling Admin Partition on
Kubernetes.
2022-01-20 16:49:36 -05:00
R.B. Boyer b9e9f1106b
docs: update config entry docs for proxy-defaults to follow new template (#12011) 2022-01-20 15:35:27 -06:00
Chris S. Kim 6cecd35e6e
ci: Add explanation in forbidigo (#12140) 2022-01-20 13:07:10 -05:00
R.B. Boyer baa45a6987
lint: forbid require.New and assert.New (#12139)
See #12137
2022-01-20 11:36:29 -06:00
R.B. Boyer 412ee92c27
Merge pull request #12137 from hashicorp/testify-no-structs
test: stop using require.New and assert.New from testify
2022-01-20 11:02:39 -06:00
Blake Covarrubias cdd56970a3
Merge pull request #12024 from hashicorp/docs/update-links-to-avoid-redirects
docs: Avoid redirects by pointing links to new URLs
2022-01-20 08:59:51 -08:00
Blake Covarrubias f09aea524f Fix spelling errors 2022-01-20 08:54:23 -08:00
Blake Covarrubias 0936a9a6e1 Redirect Ambassador tutorial to Learn 2022-01-20 08:52:52 -08:00
Blake Covarrubias bc410ffc03 Redirect /platform/k8s/upgrading to new URL 2022-01-20 08:52:52 -08:00
Blake Covarrubias 64016f6108 Redirect old K8s uninstall URLs to new location 2022-01-20 08:52:51 -08:00
Blake Covarrubias fcd5f66895 Consolidate /download-tools redirects 2022-01-20 08:52:51 -08:00
Blake Covarrubias 9ee9249149 Remove duplicate redirects 2022-01-20 08:52:51 -08:00
Blake Covarrubias 26401c5c26 Convert absolute URLs to relative URLs for consul.io 2022-01-20 08:52:51 -08:00
Blake Covarrubias 59394e4aa2 docs: Avoid redirects by pointing links to new URLs
Avoid HTTP redirects for internal site links by updating old URLs to
point to the new location for the target content.
2022-01-20 08:52:51 -08:00
R.B. Boyer b60d89e7ef bulk rewrite using this script
set -euo pipefail

    unset CDPATH

    cd "$(dirname "$0")"

    for f in $(git grep '\brequire := require\.New(' | cut -d':' -f1 | sort -u); do
        echo "=== require: $f ==="
        sed -i '/require := require.New(t)/d' $f
        # require.XXX(blah) but not require.XXX(tblah) or require.XXX(rblah)
        sed -i 's/\brequire\.\([a-zA-Z0-9_]*\)(\([^tr]\)/require.\1(t,\2/g' $f
        # require.XXX(tblah) but not require.XXX(t, blah)
        sed -i 's/\brequire\.\([a-zA-Z0-9_]*\)(\(t[^,]\)/require.\1(t,\2/g' $f
        # require.XXX(rblah) but not require.XXX(r, blah)
        sed -i 's/\brequire\.\([a-zA-Z0-9_]*\)(\(r[^,]\)/require.\1(t,\2/g' $f
        gofmt -s -w $f
    done

    for f in $(git grep '\bassert := assert\.New(' | cut -d':' -f1 | sort -u); do
        echo "=== assert: $f ==="
        sed -i '/assert := assert.New(t)/d' $f
        # assert.XXX(blah) but not assert.XXX(tblah) or assert.XXX(rblah)
        sed -i 's/\bassert\.\([a-zA-Z0-9_]*\)(\([^tr]\)/assert.\1(t,\2/g' $f
        # assert.XXX(tblah) but not assert.XXX(t, blah)
        sed -i 's/\bassert\.\([a-zA-Z0-9_]*\)(\(t[^,]\)/assert.\1(t,\2/g' $f
        # assert.XXX(rblah) but not assert.XXX(r, blah)
        sed -i 's/\bassert\.\([a-zA-Z0-9_]*\)(\(r[^,]\)/assert.\1(t,\2/g' $f
        gofmt -s -w $f
    done
2022-01-20 10:46:23 -06:00
R.B. Boyer 31f6f55bbe test: normalize require.New and assert.New syntax 2022-01-20 10:45:56 -06:00
David Yu 19d5d58e5c
docs: Add specific version install guide for `consul-k8s` CLI, refactor install (#12114)
* docs: Add specific version install guide for `consul-k8s` CLI

* parameterize version

* remove extra path

* Update k8s-cli.mdx

* slight formatting

* Update k8s-cli.mdx

* specific version details in overall install guide

* shell details

* Update install.mdx

* Update k8s-cli.mdx

* Update install.mdx

* broken link

* typo

* Update website/content/docs/k8s/installation/compatibility.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/k8s-cli.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* Update website/content/docs/k8s/installation/install.mdx

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>

* moving install cli commands to separate page

* add tabs, wip

* add specific distro install guides

* add upgrade tabs

* build failure

* not sure why heading is not working

* remove whitespace

* add more whitespace

* fixes on formatting

* remove package lock

* add back package lock json

* test

* latest

* remove modified file

* adding fix to yum install

* create folder for upgrade and move upgrade cli there

* revert package-lock

* adding upgrade file

* Update website/content/docs/k8s/upgrade/upgrade-cli.mdx

Co-authored-by: Thomas Eckert <teckert@hashicorp.com>

* Update website/content/docs/k8s/installation/install-cli.mdx

Co-authored-by: Thomas Eckert <teckert@hashicorp.com>

* Update website/content/docs/k8s/installation/install-cli.mdx

Co-authored-by: Thomas Eckert <teckert@hashicorp.com>

* Update install-cli.mdx

* multi-line copy

Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
Co-authored-by: Thomas Eckert <teckert@hashicorp.com>
2022-01-20 08:26:31 -08:00
R.B. Boyer 424f3cdd2c
proxycfg: introduce explicit UpstreamID in lieu of bare string (#12125)
The gist here is that now we use a value-type struct proxycfg.UpstreamID
as the map key in ConfigSnapshot maps where we used to use "upstream
id-ish" strings. These are internal only and used just for bidirectional
trips through the agent cache keyspace (like the discovery chain target
struct).

For the few places where the upstream id needs to be projected into xDS,
that's what (proxycfg.UpstreamID).EnvoyID() is for. This lets us ALWAYS
inject the partition and namespace into these things without making
stuff like the golden testdata diverge.
2022-01-20 10:12:04 -06:00
Dan Upton ca3aca92c4
[OSS] Remove remaining references to master (#11827) 2022-01-20 12:47:50 +00:00
R.B. Boyer 850ca7e12d
update changelog (#12128) 2022-01-19 17:28:53 -06:00
Blake Covarrubias 82b88dbc6e docs: Link to supported config kinds in `config write`
Remove statement about service-defaults and proxy-defaults being the
only supported configuration entry types. Update the sentence to point
to the configuration entry documentation for a list of supported
types.
2022-01-19 15:19:05 -08:00
Blake Covarrubias 17f8c311be docs: Fix typo in service resolver's RingHashConfig
Fix typo in documentation for service resolver's RingHashConfig. The
correct child parameters are `MinimumRingSize` and `MaximumRingSize`.
2022-01-19 15:17:53 -08:00
Evan Culver fe4b53df22
Update version to use 1.11.2 as base (#12127) 2022-01-19 14:37:39 -08:00
Luke Kysow d54fba5153
Update k8s upgrade docs (#12123)
There is no longer the lifecycle sidecar
2022-01-19 13:41:30 -08:00
VictorBac 31a39c9528
Add GRPC and GRPCUseTLS to api.HealthCheckDefinition (#12108)
* Add GRPC to HealthCheckDefinition

* add GRPC and GRPCUseTLS
2022-01-19 16:09:15 -05:00
Bryce Kalow d7a0392dbc
website: chore: upgrades react-content (#12120) 2022-01-19 14:36:56 -06:00
Blake Covarrubias 1495a1f111
docs: Document .addr DNS domain in SRV responses (#12056)
Document `.addr` DNS subdomain that can be returned in SRV response
records.

Co-authored-by: Neena Pemmaraju <neena@hashicorp.com>
2022-01-19 09:45:30 -08:00
John Cowen 48ace89c6a
ui: Runtime Injectable Components (#11969)
- Simplifies how we 'import' our configuration files a little in order to make them more grokable.
- Starts to exclude files based on explicit configuration rather than convention.
- Adds the first instance of us being able to select an implementation (of multiple) of a component at runtime.
2022-01-19 10:14:59 +00:00
John Cowen cdb8a35501
ui: Fixup KV folder creation then further creation within that folder (#12081)
The fix here is two fold:

- We shouldn't be providing the DataSource (which loads the data) with an id when we are creating from within a folder (in the buggy code we are providing the parentKey of the new KV you are creating)
- Being able to provide an empty id to the DataSource/KV repository and that repository responding with a newly created object is more towards the "new way of doing forms", therefore the corresponding code to return a newly created ember-data object. As we changed the actual bug in point 1 here, we need to make sure the repository responds with an empty object when the request id is empty.
2022-01-19 10:09:25 +00:00
Hariram Sankaran b0e3956c57
docs: Fix typo on NIA architecture page (#10797)
Fix typo under Task section. Change 'the dynamic service data' to
'that dynamic service data'.
2022-01-18 20:43:11 -08:00
Jared Kirschner 1a615f63a5
Merge pull request #12100 from hashicorp/update-gateway-overview-visual
docs: clarify gateways don't connect to public internet
2022-01-18 19:03:32 -05:00
trujillo-adam 9b00acec40
Merge pull request #11898 from hashicorp/docs/service-mesh-config-entries-add-partitions--1.11.0
updated configuration entry params for admin partitions 1.11
2022-01-18 15:46:15 -08:00
trujillo-adam 7573b80454 applied final feedback 2022-01-18 15:40:43 -08:00
trujillo-adam 727dbbd817
Apply suggestions from code review
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-01-18 15:31:58 -08:00
Jared Kirschner 3fc42a2f1f docs: clarify gateways don't connect to internet
Consul's ingress and terminating gateways are meant to enable connectivity
within your organizational network between services outside the Consul service
mesh and those within. They are not meant to connect to the public internet.
2022-01-18 13:28:26 -08:00