RJ Spiker
dc06877d8f
website - add g-section li styles
2018-06-25 12:26:13 -07:00
RJ Spiker
049ff5babc
website - add second button to hero
2018-06-25 12:26:13 -07:00
RJ Spiker
7c3dca6225
website - cta section and button updates
2018-06-25 12:26:12 -07:00
RJ Spiker
c9226fec35
website - some section component refactoring and adding code samples
2018-06-25 12:26:12 -07:00
RJ Spiker
79e882fce9
website - timeline component font-size adjustment
2018-06-25 12:26:12 -07:00
RJ Spiker
8c99c3258e
website - hero bg image update
2018-06-25 12:26:11 -07:00
RJ Spiker
64218ec7af
initial commit for website upgrade
2018-06-25 12:26:11 -07:00
Jack Pearkes
315cc04536
website: fix a TODO in a page description
2018-06-25 12:26:11 -07:00
Jack Pearkes
36e1dd6ffd
website: note windows support
2018-06-25 12:26:10 -07:00
Matt Keeler
98e98fa815
Remove build tags from vendored vault file to allow for this to merge properly into enterprise
2018-06-25 12:26:10 -07:00
Matt Keeler
677d6dac80
Remove x509 name constraints
...
These were only added as SPIFFE intends to use the in the future but currently does not mandate their usage due to patch support in common TLS implementations and some ambiguity over how to use them with URI SAN certificates. We included them because until now everything seem fine with it, however we've found the latest version of `openssl` (1.1.0h) fails to validate our certificats if its enabled. LibreSSL as installed on OS X by default doesn’t have these issues. For now it's most compatible not to have them and later we can find ways to add constraints with wider compatibility testing.
2018-06-25 12:26:10 -07:00
Matt Keeler
163fe11101
Make sure we omit the Kind value in JSON if empty
2018-06-25 12:26:10 -07:00
Matt Keeler
01f82717b4
Vendor the vault api
2018-06-25 12:26:10 -07:00
Kyle Havlovitz
0b5d7277f9
website: fix example config in vault CA docs
2018-06-25 12:26:09 -07:00
Jack Pearkes
e4f5753e06
bump to beta4
2018-06-25 12:26:01 -07:00
Mitchell Hashimoto
4acbe3fdf0
website: add vs. Envoy page
2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
e6e984a813
website: address Armon's feedback
2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
834137fe55
website: remove redundant "as well"
2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
7ad6f7b758
website: address pearkes feedback
2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
ec1322a95d
website: address feedback
2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
68826b2b76
website: istio vs. and nomad platform guide
2018-06-25 12:25:43 -07:00
Jack Pearkes
105c4763dc
update UI to latest
2018-06-25 12:25:42 -07:00
Kyle Havlovitz
3baa67cdef
connect/ca: pull the cluster ID from config during a rotation
2018-06-25 12:25:42 -07:00
Kyle Havlovitz
8c2c9705d9
connect/ca: use weak type decoding in the Vault config parsing
2018-06-25 12:25:42 -07:00
Kyle Havlovitz
b4ef7bb64d
connect/ca: leave blank root key/cert out of the default config (unnecessary)
2018-06-25 12:25:42 -07:00
Kyle Havlovitz
8e028b7dc6
website: add Vault CA provider doc sections
2018-06-25 12:25:42 -07:00
Kyle Havlovitz
050da22473
connect/ca: undo the interface changes and use sign-self-issued in Vault
2018-06-25 12:25:42 -07:00
Kyle Havlovitz
914d9e5e20
connect/ca: add leaf verify check to cross-signing tests
2018-06-25 12:25:41 -07:00
Kyle Havlovitz
bc997688e3
connect/ca: update Consul provider to use new cross-sign CSR method
2018-06-25 12:25:41 -07:00
Kyle Havlovitz
8a70ea64a6
connect/ca: update Vault provider to add cross-signing methods
2018-06-25 12:25:41 -07:00
Kyle Havlovitz
6a2fc00997
connect/ca: add URI SAN support to the Vault provider
2018-06-25 12:25:41 -07:00
Kyle Havlovitz
226a59215d
connect/ca: fix vault provider URI SANs and test
2018-06-25 12:25:41 -07:00
Kyle Havlovitz
1a8ac686b2
connect/ca: add the Vault CA provider
2018-06-25 12:25:41 -07:00
Paul Banks
51fc48e8a6
Sign certificates valid from 1 minute earlier to avoid failures caused by clock drift
2018-06-25 12:25:41 -07:00
Paul Banks
e33bfe249e
Note leadership issues in comments
2018-06-25 12:25:41 -07:00
Paul Banks
b5f24a21cb
Fix test broken by final telemetry PR change!
2018-06-25 12:25:40 -07:00
Paul Banks
e514570dfa
Actually return Intermediate certificates bundled with a leaf!
2018-06-25 12:25:40 -07:00
John Cowen
9f8b87cdda
Check for NOT connect-proxy
2018-06-25 12:25:40 -07:00
John Cowen
cc3d578271
Filter Source and Destination menus by Kind
2018-06-25 12:25:40 -07:00
Matt Keeler
e22b9c8e15
Output the service Kind in the /v1/internal/ui/services endpoint
2018-06-25 12:25:40 -07:00
Paul Banks
3a6024e1b0
Fix merge error
2018-06-25 12:25:40 -07:00
Paul Banks
17789d4fe3
register TCP check for managed proxies
2018-06-25 12:25:40 -07:00
Paul Banks
280f14d64c
Make proxy only listen after initial certs are fetched
2018-06-25 12:25:40 -07:00
John Cowen
d61a09ea28
Fix linting typo, caused the selection of future services to break
2018-06-25 12:25:40 -07:00
Paul Banks
b562b9f66a
Add proxy telemetry to docs
2018-06-25 12:25:39 -07:00
Paul Banks
420ae3df69
Limit proxy telemetry config to only be visible with authenticated with a proxy token
2018-06-25 12:25:39 -07:00
Paul Banks
597e55e8e2
Misc test fixes
2018-06-25 12:25:39 -07:00
Paul Banks
c6ef6a61c9
Refactor to use embedded struct.
2018-06-25 12:25:39 -07:00
Paul Banks
2f8c1d2059
Remove go-diff vendor as assert.JSONEq output is way better for our case
2018-06-25 12:25:39 -07:00
Paul Banks
9f559da913
Revert telemetry config changes ready for cleaner approach
2018-06-25 12:25:39 -07:00