Commit Graph

4771 Commits

Author SHA1 Message Date
James Phillips 8b67991ef7
Adds complete ACL coverage for /v1/session endpoints. 2016-12-12 21:59:22 -08:00
James Phillips 60d4322c49
Adds support to ACL package for session policies. 2016-12-12 20:20:28 -08:00
James Phillips 99e810f9c7
Adds complete ACL coverage for /v1/internal/ui/node endpoints. 2016-12-12 18:22:10 -08:00
James Phillips 2404af6f94
Adds complete ACL support for /v1/query/<query id or name>/execute.
This was already supported by previous changes to the ACL filter, so
we just added a test to show it working.
2016-12-12 17:28:06 -08:00
James Phillips 9c785c7022
Fixes implementation of node ACLs for /v1/catalog/node/<node>.
This would return a "permission denied" error, but this changes it to
return the same response as a node that doesn't exist (as was originally
intended and written in the code comments).
2016-12-12 16:53:31 -08:00
James Phillips 35475a66df
Adds full ACL coverage for /v1/health endpoints. 2016-12-12 16:28:52 -08:00
James Phillips bcf1ffad99
Adds complete ACL coverage for /v1/coordinate/nodes and Coordinate.Update RPC. 2016-12-12 14:52:27 -08:00
James Phillips 0139bbb963
Adds support for a new "acl_agent_token" which is used for internal
catalog operations.
2016-12-12 14:52:27 -08:00
James Phillips 0ed6b1bb18
Bans anonymous queries that aren't tied to a session.
This gets us coverage of PQ creation under the existing service
policy or the soon-to-be-added session policy.
2016-12-12 14:52:27 -08:00
James Phillips 8aef91473f Merge pull request #2590 from hashicorp/acl-complete-catalog
Adds new node ACL policy and applies it to catalog endpoints.
2016-12-12 14:52:10 -08:00
James Phillips 2ace618bf9
Adds complete ACL coverage for /v1/catalog/service/<service>. 2016-12-12 08:34:15 -08:00
James Phillips 8038f21684
Adds complete ACL coverage for /v1/catalog/nodes. 2016-12-10 16:49:19 -08:00
James Phillips 9d6567ff08
Adds complete ACL coverage for /v1/catalog/node/<node>. 2016-12-10 16:49:19 -08:00
James Phillips 9b7564490c
Adds complete ACL coverage for /v1/catalog/deregister.
This included some state store helpers to make this more efficient.
2016-12-09 21:04:44 -08:00
James Phillips 800c67c58a
Adds complete ACL coverage for /v1/catalog/register. 2016-12-09 21:04:37 -08:00
James Phillips 17db4a5722 Merge pull request #2575 from bradleyfalzon/patch-1
Link to consensus.html#deployment-table not #toc_4
2016-12-08 14:02:52 -08:00
James Phillips 66b437ca33
Removes the exception for the "consul" service in the catalog. 2016-12-07 17:58:23 -08:00
Seth Vargo e026bf2551 Merge pull request #2580 from hashicorp/sethvargo/kv_main
Switch to KV CLI in getting started
2016-12-07 14:42:13 -08:00
Seth Vargo bdb318a3ef
Switch to KV CLI in getting started 2016-12-07 14:01:51 -08:00
Seth Vargo 406a868277 Merge pull request #2579 from hashicorp/sethvargo/kv_main
Update homepage to use KV CLI instead of curl
2016-12-07 11:56:59 -08:00
Seth Vargo 2beb18c0ab
Update homepage to use KV CLI instead of curl 2016-12-07 11:32:35 -08:00
James Phillips 7fa4ab3fd1
Adds support to ACL package for node policies. 2016-12-06 20:05:15 -08:00
Kyle Havlovitz 3a24debd79 Update CHANGELOG.md 2016-12-06 20:14:58 -05:00
Kyle Havlovitz 6cd5e4d491 Merge pull request #2574 from hashicorp/f-udp-checksum
Update memberlist vendor deps
2016-12-06 14:20:29 -05:00
James Phillips 9b4f316b21
Sorts all the ACl policy handlers for easier navigation (no functional changes). 2016-12-06 11:06:15 -08:00
James Phillips 8ae9e17dff
Adds an opt-in for new ACL policies and features coming in Consul 0.8. 2016-12-06 11:06:14 -08:00
Seth Vargo 4e97f36614 Merge pull request #2557 from hashicorp/sethvargo/safer_server
Use a random port instead of idx in testutil
2016-12-06 10:09:28 -08:00
Bradley Falzon 839fdc64b3 Link to consensus.html#deployment-table not #toc_4 2016-12-06 15:40:40 +10:30
James Phillips fba22f997e
Fixes broken link in options doc. 2016-12-05 18:53:51 -08:00
James Phillips a3dc0965a8 Clarifies ACL replication token. 2016-12-05 18:43:05 -08:00
Kyle Havlovitz acc21cc5fe
Update memberlist vendor deps 2016-12-05 17:27:52 -05:00
James Phillips 4efa1a72fa Merge pull request #2568 from shantanugadgil/patch-1
Update kv.html.markdown
2016-12-03 11:23:56 -08:00
shantanugadgil f8febd94b8 Update kv.html.markdown 2016-12-03 13:35:55 +05:30
James Phillips 91b0e87436 Update CHANGELOG.md 2016-12-02 07:56:51 -08:00
James Phillips c88b4a2867 Update CHANGELOG.md 2016-12-02 07:56:06 -08:00
Sean Chittenden 24192f4d48
Small vendor update for go-sockaddr: now able to filter by CIDR. 2016-12-03 01:21:34 +11:00
Sean Chittenden 4d82f1018b Merge pull request #2563 from hashicorp/f-sockaddr-0.7
F sockaddr 0.7
2016-12-02 22:38:32 +11:00
Sean Chittenden 594e75a301
Update Windows support. 2016-12-02 18:05:18 +11:00
James Phillips 34a9708ea5 Merge pull request #2564 from mzupan/fix-query-doc
Doc Fix: The Near key is out of place
2016-12-01 22:50:22 -08:00
Mike Zupan fc352d7a62 Needs to be moved
This took 2 hours from my life. The near has to be inside a service and not in the main block.
2016-12-01 22:47:02 -08:00
Sean Chittenden 5fc97b997d
Fix compilation on Windows. 2016-12-02 17:04:28 +11:00
Sean Chittenden 830125a8b3
Run all known addresses through go-sockaddr/template.
The following is now possible:

```
$ consul agent -dev -client="{{GetPrivateIP}}" -bind='{{GetInterfaceIP "en0"}}'
```
2016-12-02 16:35:38 +11:00
Sean Chittenden f3ed18e95f
Import github.com/hashicorp/go-sockaddr 2016-12-02 15:14:44 +11:00
Kyle Havlovitz c0dd5b65b6 Add retry with backoff to initial bootstrap checks (#2561) 2016-12-01 17:05:02 -05:00
Kyle Havlovitz ead30ca62b Fix race issue in monitor endpoint test 2016-12-01 13:40:00 -05:00
James Phillips 98adcfb17d Merge pull request #2556 from williamlord/master
Update snapshot.html.markdown for spelling mistake
2016-12-01 07:44:06 -08:00
James Phillips 7690d80378 Update CHANGELOG.md 2016-12-01 07:43:10 -08:00
James Phillips 0282dd908a Merge pull request #2531 from alicebob/txntypes
fix KVOp types
2016-12-01 07:41:10 -08:00
Seth Vargo 9010b0e0f4
Use a random port instead of idx in testutil
The testutil server uses an atomic incrementer to generate unique port
numbers. This works great until tests are run in parallel, _across
packages_. Because each package starts at the same "offset" idx, they
collide.

One way to overcome this is to run each packages' test in isolation, but
that makes the test suite much longer as it does not maximize
parallelization. Alternatively, instead of having "predictable" ports,
we can let the OS choose a random open port automatically.

This still has a (albeit smaller) race condition in that the OS could
return an open port twice, before the server has a chance to actually
start and occupy said port. In practice, I have not been able to hit
this race condition, so it either doesn't happen or it happens far less
frequently that the existing implementation.

I'm not sure how I feel about the panic, but this is just test code, so
I'm including to say it's okay?
2016-12-01 17:24:26 +02:00
William Lord 4d1f56a287 Update snapshot.html.markdown 2016-12-01 10:11:35 +00:00