8312 Commits

Author SHA1 Message Date
RJ Spiker
7fa4955545 website - a couple of text-asset component reponsive tweaks 2018-06-25 12:26:13 -07:00
RJ Spiker
e61484c079 website - responsive styling for section and text/asset components 2018-06-25 12:26:13 -07:00
RJ Spiker
9879835fd9 website - some button and section updates, add home hero start 2018-06-25 12:26:13 -07:00
RJ Spiker
dc06877d8f website - add g-section li styles 2018-06-25 12:26:13 -07:00
RJ Spiker
049ff5babc website - add second button to hero 2018-06-25 12:26:13 -07:00
RJ Spiker
7c3dca6225 website - cta section and button updates 2018-06-25 12:26:12 -07:00
RJ Spiker
c9226fec35 website - some section component refactoring and adding code samples 2018-06-25 12:26:12 -07:00
RJ Spiker
79e882fce9 website - timeline component font-size adjustment 2018-06-25 12:26:12 -07:00
RJ Spiker
8c99c3258e website - hero bg image update 2018-06-25 12:26:11 -07:00
RJ Spiker
64218ec7af initial commit for website upgrade 2018-06-25 12:26:11 -07:00
Jack Pearkes
315cc04536 website: fix a TODO in a page description 2018-06-25 12:26:11 -07:00
Jack Pearkes
36e1dd6ffd website: note windows support 2018-06-25 12:26:10 -07:00
Matt Keeler
98e98fa815 Remove build tags from vendored vault file to allow for this to merge properly into enterprise 2018-06-25 12:26:10 -07:00
Matt Keeler
677d6dac80 Remove x509 name constraints
These were only added as SPIFFE intends to use the in the future but currently does not mandate their usage due to patch support in common TLS implementations and some ambiguity over how to use them with URI SAN certificates. We included them because until now everything seem fine with it, however we've found the latest version of `openssl` (1.1.0h) fails to validate our certificats if its enabled. LibreSSL as installed on OS X by default doesn’t have these issues. For now it's most compatible not to have them and later we can find ways to add constraints with wider compatibility testing.
2018-06-25 12:26:10 -07:00
Matt Keeler
163fe11101 Make sure we omit the Kind value in JSON if empty 2018-06-25 12:26:10 -07:00
Matt Keeler
01f82717b4 Vendor the vault api 2018-06-25 12:26:10 -07:00
Kyle Havlovitz
0b5d7277f9 website: fix example config in vault CA docs 2018-06-25 12:26:09 -07:00
Jack Pearkes
e4f5753e06 bump to beta4 2018-06-25 12:26:01 -07:00
Mitchell Hashimoto
4acbe3fdf0 website: add vs. Envoy page 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
e6e984a813 website: address Armon's feedback 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
834137fe55 website: remove redundant "as well" 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
7ad6f7b758 website: address pearkes feedback 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
ec1322a95d website: address feedback 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
68826b2b76 website: istio vs. and nomad platform guide 2018-06-25 12:25:43 -07:00
Jack Pearkes
105c4763dc update UI to latest 2018-06-25 12:25:42 -07:00
Kyle Havlovitz
3baa67cdef connect/ca: pull the cluster ID from config during a rotation 2018-06-25 12:25:42 -07:00
Kyle Havlovitz
8c2c9705d9 connect/ca: use weak type decoding in the Vault config parsing 2018-06-25 12:25:42 -07:00
Kyle Havlovitz
b4ef7bb64d connect/ca: leave blank root key/cert out of the default config (unnecessary) 2018-06-25 12:25:42 -07:00
Kyle Havlovitz
8e028b7dc6 website: add Vault CA provider doc sections 2018-06-25 12:25:42 -07:00
Kyle Havlovitz
050da22473 connect/ca: undo the interface changes and use sign-self-issued in Vault 2018-06-25 12:25:42 -07:00
Kyle Havlovitz
914d9e5e20 connect/ca: add leaf verify check to cross-signing tests 2018-06-25 12:25:41 -07:00
Kyle Havlovitz
bc997688e3 connect/ca: update Consul provider to use new cross-sign CSR method 2018-06-25 12:25:41 -07:00
Kyle Havlovitz
8a70ea64a6 connect/ca: update Vault provider to add cross-signing methods 2018-06-25 12:25:41 -07:00
Kyle Havlovitz
6a2fc00997 connect/ca: add URI SAN support to the Vault provider 2018-06-25 12:25:41 -07:00
Kyle Havlovitz
226a59215d connect/ca: fix vault provider URI SANs and test 2018-06-25 12:25:41 -07:00
Kyle Havlovitz
1a8ac686b2 connect/ca: add the Vault CA provider 2018-06-25 12:25:41 -07:00
Paul Banks
51fc48e8a6 Sign certificates valid from 1 minute earlier to avoid failures caused by clock drift 2018-06-25 12:25:41 -07:00
Paul Banks
e33bfe249e Note leadership issues in comments 2018-06-25 12:25:41 -07:00
Paul Banks
b5f24a21cb Fix test broken by final telemetry PR change! 2018-06-25 12:25:40 -07:00
Paul Banks
e514570dfa Actually return Intermediate certificates bundled with a leaf! 2018-06-25 12:25:40 -07:00
John Cowen
9f8b87cdda Check for NOT connect-proxy 2018-06-25 12:25:40 -07:00
John Cowen
cc3d578271 Filter Source and Destination menus by Kind 2018-06-25 12:25:40 -07:00
Matt Keeler
e22b9c8e15 Output the service Kind in the /v1/internal/ui/services endpoint 2018-06-25 12:25:40 -07:00
Paul Banks
3a6024e1b0 Fix merge error 2018-06-25 12:25:40 -07:00
Paul Banks
17789d4fe3 register TCP check for managed proxies 2018-06-25 12:25:40 -07:00
Paul Banks
280f14d64c Make proxy only listen after initial certs are fetched 2018-06-25 12:25:40 -07:00
John Cowen
d61a09ea28 Fix linting typo, caused the selection of future services to break 2018-06-25 12:25:40 -07:00
Paul Banks
b562b9f66a Add proxy telemetry to docs 2018-06-25 12:25:39 -07:00
Paul Banks
420ae3df69 Limit proxy telemetry config to only be visible with authenticated with a proxy token 2018-06-25 12:25:39 -07:00
Paul Banks
597e55e8e2 Misc test fixes 2018-06-25 12:25:39 -07:00