Commit Graph

18877 Commits

Author SHA1 Message Date
Chris S. Kim 670531f828 Retry docker build steps 2022-08-08 12:22:16 -04:00
claire labry 7b2691ec34
Merge pull request #13790 from hashicorp/post-publish-website
introduces the post publish website event
2022-08-08 10:55:11 -05:00
sarahalsmiller 3bd8fbad82
Merge pull request #13675 from hashicorp/sa-restructure-documentation
Restructure Api Gateway Documentation
2022-08-08 10:35:23 -05:00
Freddy d7be72c7fd
Merge pull request #14024 from hashicorp/peering/secrets-fixes 2022-08-08 09:30:09 -06:00
freddygv d421e18172 Update snapshot test 2022-08-08 09:17:15 -06:00
Sarah Alsmiller b9f70c0bf1 fix identation 2022-08-08 10:16:24 -05:00
freddygv 1031ffc3c7 Re-validate existing secrets at state store
Previously establishment and pending secrets were only checked at the
RPC layer. However, given that these are Check-and-Set transactions we
should ensure that the given secrets are still valid when persisting a
secret exchange or promotion.

Otherwise it would be possible for concurrent requests to overwrite each
other.
2022-08-08 09:06:07 -06:00
Sarah Alsmiller 4b8b1b502c revert indent 2022-08-08 09:33:22 -05:00
Sarah Alsmiller c8e78f1f8d test 2022-08-08 09:32:28 -05:00
freddygv 0ea4bfae94 Test fixes 2022-08-08 08:31:47 -06:00
Sarah Alsmiller 6e80e6ab37 indentation 2022-08-08 09:21:51 -05:00
sarahalsmiller 62142aa921
Update website/content/docs/api-gateway/configuration/gateway.mdx 2022-08-08 09:16:36 -05:00
Michael Klein b955490852
Update peerings docs links (#14040) 2022-08-08 16:12:17 +02:00
John Cowen 9caf430e8e
ui: Add additional generation/initiation data-sources (#14018) 2022-08-08 11:23:02 +01:00
John Cowen e2eb4e620f
ui: Ensure we dispatch validation state (#14021)
* ui: Ensure we dispatch validation state

* Changelog
2022-08-08 11:12:40 +01:00
John Cowen 50b85c3189
ui: Make DataWriter also deal with more standard shaped errors (#14025)
* ui: Make DataWriter also deal with more standard shaped errors

* ui: Add error states/messages for peering establishment (#14026)

* ui: Add error states/messages for peering establishment

* Inspect state instead of asking about existence of error
2022-08-08 10:51:02 +01:00
freddygv c04515a844 Use proto message for each secrets write op
Previously there was a field indicating the operation that triggered a
secrets write. Now there is a message for each operation and it contains
the secret ID being persisted.
2022-08-08 01:41:00 -06:00
Jared Kirschner 22511ec491 Allow uppercase in proxy launch -sidecar-for arg
Previously, when launching a sidecar proxy with one of the following commands:
- consul connect envoy -sidecar-for=...
- consul connect proxy -sidecar-for=...

... the -sidecar-for argument could only contain lowercase letters, even if
the service was registered with some uppercase letters.

Now, the -sidecar-for argument is treated as case-insensitive.
2022-08-05 10:55:22 -07:00
Sarah Alsmiller da38571f4b Merge branch 'sa-restructure-documentation' of github.com:hashicorp/consul into sa-restructure-documentation 2022-08-05 10:38:31 -05:00
Sarah Alsmiller c71bc86d2a note rendering weird 2022-08-05 10:38:20 -05:00
Sarah Alsmiller ea921f3818 bulleted list 2022-08-05 10:36:07 -05:00
sarahalsmiller 6f65653f32
Update website/content/docs/api-gateway/configuration/gateway.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:31:28 -05:00
sarahalsmiller 7a0817aa63
Update website/content/docs/api-gateway/configuration/gateway.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:31:19 -05:00
Sarah Alsmiller 5f98f18494 delete confusing sentence 2022-08-05 10:28:28 -05:00
Sarah Alsmiller 60108c860a Merge branch 'sa-restructure-documentation' of github.com:hashicorp/consul into sa-restructure-documentation 2022-08-05 10:18:15 -05:00
Sarah Alsmiller 830cb60b13 remove configuration section 2022-08-05 10:18:04 -05:00
Sarah Alsmiller cc36b3712d render issue 2022-08-05 10:16:41 -05:00
sarahalsmiller 446957ff51
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:13:15 -05:00
sarahalsmiller 82e39e87ee
Update website/redirects.js
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:13:00 -05:00
sarahalsmiller d677cf4c6a
Update website/content/docs/api-gateway/usage.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:11:36 -05:00
sarahalsmiller 87bf6eba49
Update website/content/docs/api-gateway/usage.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:10:55 -05:00
Sarah Alsmiller 18a7340e5a clarify artifacts being applied 2022-08-05 10:05:58 -05:00
sarahalsmiller 05ca89c169
Update website/content/docs/api-gateway/install.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:01:29 -05:00
sarahalsmiller ba0135808c
Update website/content/docs/api-gateway/install.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 10:00:45 -05:00
sarahalsmiller 62e195bbf1
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 09:59:15 -05:00
sarahalsmiller d27037477f
Update website/content/docs/api-gateway/configuration/gatewayclassconfig.mdx
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-05 09:59:01 -05:00
Kyle Havlovitz 6580566c3b Update ingress/terminating wildcard logic and handle destinations 2022-08-05 07:56:10 -07:00
cskh 155c4bc2af
fix(cli): error message in service deregister subcommand (#14028) 2022-08-04 11:07:40 -04:00
John Cowen ff88fcdb39
ui: Ensure CopyableCode copy icon/button is fully clickable (#14016)
* ui: Ensure CopyableCode copy icon/button is fully clickable

* Give it a 40px height also
2022-08-04 13:30:52 +01:00
freddygv 8067890787 Inherit active secret when exchanging 2022-08-03 17:32:53 -05:00
freddygv 60d6e28c97 Pass explicit signal with op for secrets write
Previously the updates to the peering secrets UUID table relied on
inferring what action triggered the update based on a reconciliation
against the existing secrets.

Instead we now explicitly require the operation to be given so that the
inference isn't necessary. This makes the UUID table logic easier to
reason about and fixes some related bugs.

There is also an update so that the peering secrets get handled on
snapshots/restores.
2022-08-03 17:25:12 -05:00
freddygv 9ca687bc7c Avoid deleting peering secret UUIDs at dialers
Dialers do not keep track of peering secret UUIDs, so they should not
attempt to clean up data from that table when their peering is deleted.

We also now keep peer server addresses when marking peerings for
deletion. Peer server addresses are used by the ShouldDial() helper
when determining whether the peering is for a dialer or an acceptor.
We need to keep this data so that peering secrets can be cleaned up
accordingly.
2022-08-03 16:34:57 -05:00
Michael Klein a06eeeda15
ui: peering UI fixes - api contract change / wrong link in peerings list (#14007)
* Don't send `Datacenter` when establishing peer

* Don't surface link to non-existing peers.edit route anymore
2022-08-03 15:04:19 +02:00
John Cowen 17d712c039
ui: Re-hook up regenerate button (#14015) 2022-08-03 13:55:57 +01:00
skpratt 58eed6b049
Merge pull request #13906 from skpratt/validate-port-agent-split
Separate port and socket path validation for local agent
2022-08-02 16:58:41 -05:00
boruszak 017a94c0b6 Minor edit 2022-08-02 16:25:13 -05:00
boruszak 8d676619b3 Proofing edits 2022-08-02 16:20:43 -05:00
boruszak 6c5d4df590 Proofing edits 2022-08-02 16:01:22 -05:00
boruszak 0e349ad6aa New features/functions list 2022-08-02 15:17:09 -05:00
boruszak 8f45d8347f New "Mesh Gateways for Peered Clusters" page 2022-08-02 15:09:00 -05:00