Commit Graph

12052 Commits

Author SHA1 Message Date
Daniel Nephin a0d47afb93 Merge pull request #9853 from hashicorp/dnephin/fix-ci-nomad-integ
ci: update config for nomad main branch rename
2021-03-09 20:29:26 +00:00
hashicorp-ci f0b9dc7175 Putting source back into Dev Mode 2021-03-05 16:59:15 +00:00
hashicorp-ci ceef4d6ada
Release v1.8.9 2021-03-04 19:22:48 +00:00
hashicorp-ci 1f92b6cb84
update bindata_assetfs.go 2021-03-04 19:22:47 +00:00
Mike Morris bad702cc73 changelog: add unreleased entries for v1.8.9, remove v1.8.9-beta1 section 2021-03-04 14:12:46 -05:00
John Cowen 24981a6c68 ui: Remove any trailing fullstop/period DNS characters from Gateways UI API (#9752)
Previous to this commit, the API response would include Gateway
Addresses in the form `domain.name.:8080`, which due to the addition of
the port is probably not the expected response.

This commit rightTrims any `.` characters from the end of the domain
before formatting the address to include the port resulting in
`domain.name:8080`
2021-02-25 09:36:43 +00:00
R.B. Boyer 76795ae6d6
test: omit envoy golden test files that differ from the latest version (#9824)
backport of #9807 to 1.8.x
2021-02-24 15:49:32 -06:00
R.B. Boyer 46edc401ad connect: if the token given to the vault provider returns no data avoid a panic (#9806)
Improves #9800
2021-02-22 20:09:25 +00:00
R.B. Boyer 58f068f53a
[1.8.x] test: remove warnings and ensure the expose checks envoy test actually runs (#9804) 2021-02-22 14:02:08 -06:00
R.B. Boyer 40987a2b69
xds: only try to create an ipv6 expose checks listener if ipv6 is supported by the kernel (#9794)
1.8.x backport of #9765

Conflicts:
- agent/xds/listeners_test.go
- test/integration/connect/envoy/helpers.bash
- agent/xds/testdata (different envoy versions)
2021-02-22 10:45:40 -06:00
hashicorp-ci 88fe6f6bd7 Putting source back into Dev Mode 2021-02-11 19:44:58 +00:00
hashicorp-ci 2f27ba6d38
Release v1.8.9-beta1 2021-02-11 19:00:48 +00:00
hashicorp-ci b18269d20a
update bindata_assetfs.go 2021-02-11 19:00:47 +00:00
Matt Keeler 80bb529f98
Update CHANGELOG.md for the 1.8.9-beta1 release (#9757) 2021-02-11 13:29:09 -05:00
R.B. Boyer 22640c9e87
[1.8.x] connect: update supported envoy point releases to 1.14.6, 1.13.7, 1.12.7, 1.11.2 (#9739)
selective backport of #9737
2021-02-10 13:11:51 -06:00
R.B. Boyer 415be133fa
connect: connect CA Roots in the primary datacenter should use a SigningKeyID derived from their local intermediate (#9428) (#9734)
1.8.x backport of #9428
2021-02-09 16:55:22 -06:00
Matt Keeler 5b543790d2
Backport to release/1.8.x: #9738 - Stop background refresh of cached data for requests that result in ACL not found errors (#9742) 2021-02-09 11:32:38 -05:00
Freddy c18a218bbb Avoid potential proxycfg/xDS deadlock using non-blocking send 2021-02-08 23:18:38 +00:00
R.B. Boyer 556b8bd1c2 server: use the presense of stored federation state data as a sign that we already activated the federation state feature flag (#9519)
This way we only have to wait for the serf barrier to pass once before
we can make use of federation state APIs Without this patch every
restart needs to re-compute the change.
2021-02-08 19:30:58 +00:00
R.B. Boyer eed2302b43 xds: prevent LDS flaps in mesh gateways due to unstable datacenter lists (#9651)
Also fix a similar issue in Terminating Gateways that was masked by an overzealous test.
2021-02-08 16:20:37 +00:00
R.B. Boyer bb5c2e802b xds: deduplicate mesh gateway listeners in a stable way (#9650)
In a situation where the mesh gateway is configured to bind to multiple
network interfaces, we use a feature called 'tagged addresses'.
Sometimes an address is duplicated across multiple tags such as 'lan'
and 'lan_ipv4'.

There is code to deduplicate these things when creating envoy listeners,
but that code doesn't ensure that the same tag wins every time. If the
winning tag flaps between xDS discovery requests it will cause the
listener to be drained and replaced.
2021-02-05 22:28:57 +00:00
Hans Hasselberg e6584182f2 Add flags to support CA generation for Connect (#9585) 2021-01-27 07:55:31 +00:00
Matt Keeler bb8386316d Add changelog entry for change to the temporary client license duration (#9642) 2021-01-26 21:15:53 +00:00
R.B. Boyer 685c38a1b1 server: initialize mgw-wanfed to use local gateways more on startup (#9528)
Fixes #9342
2021-01-25 23:31:28 +00:00
R.B. Boyer 17e16f708f
chore: [1.8.x] regenerate envoy golden files (#9635)
Backport of #9634
2021-01-25 15:34:50 -06:00
hashicorp-ci dd110e8c74 Merge branch 'release/1.8.8' into remote-x 2021-01-22 20:17:04 +00:00
hashicorp-ci 6bb9524dd8 Putting source back into Dev Mode 2021-01-22 20:16:59 +00:00
hashicorp-ci 1a7f21a061
Release v1.8.8 2021-01-22 18:50:03 +00:00
hashicorp-ci e2f9307430
update bindata_assetfs.go 2021-01-22 18:50:02 +00:00
Mike Morris a2da08bd6b changelog: add unreleased entries for v1.8.8 2021-01-22 11:44:54 -05:00
Alvin Huang 6976289413 ci: fix logic for check-vendor (#9619) 2021-01-22 11:39:09 -05:00
Alvin Huang acb9b4ccaa ci: fix logic for check-vendor (#9619) 2021-01-22 16:37:23 +00:00
R.B. Boyer f135c3b64e server: when wan federating via mesh gateways only do heuristic primary DC bypass on the leader (#9366)
Fixes #9341
2021-01-22 16:07:11 +00:00
Alvin Huang 4d470f9822 ci: change check-vendor to verify git status has no changes (#9615) 2021-01-21 23:30:07 +00:00
Matt Keeler 7cddf128e9
Backport #9570 to release/1.8.x: Ensure that CA initialization does not block leader election. (#9571)
Backport of PR: 9570

After fixing that bug I uncovered a couple more:

Fix an issue where we might try to cross sign a cert when we never had a valid root.
Fix a potential issue where reconfiguring the CA could cause either the Vault or AWS PCA CA providers to delete resources that are still required by the new incarnation of the CA.

Ensure that CA initialization does not block leader election.

After fixing that bug I uncovered a couple more:

Fix an issue where we might try to cross sign a cert when we never had a valid root.
Fix a potential issue where reconfiguring the CA could cause either the Vault or AWS PCA CA providers to delete resources that are still required by the new incarnation of the CA.
2021-01-21 09:04:30 -05:00
Matt Keeler 87f7bb475c Fix flaky test by marking mock expectations as optional (#9596)
These expectations are optional because in a slow CI environment the deadline to cancell the context might occur before the go routine reaches issuing the RPC. Either way we are successfully ensuring context cancellation is working.
2021-01-20 15:59:13 +00:00
Alvin Huang 7bb043a42d rename envoy job names for circleci config linter 2021-01-19 13:19:26 -05:00
Alvin Huang 383dd32bdf modify aws assume role circleci command 2021-01-19 13:17:14 -05:00
Daniel Nephin d399690ae4
Merge pull request #9520 from hashicorp/dnephin/1.8.x-fix-integration-test-fail
[1.8.x] Pin alpine/socat image to a version
2021-01-07 11:59:37 -05:00
Daniel Nephin eeb3b85122 Pin alpine/socat image to a version.
To fix failing integration tests. The latest version (`1.7.4.0-r0`)
appears to not be catting all the bytes, so the expected metrics are
missing in the output.
2021-01-06 18:44:02 -05:00
Matt Keeler 792fb090fe Add changelog for #9487 (#9491) 2021-01-05 18:06:27 +00:00
John Cowen af335e7ecc
ui: Make sure we pass the nspace through to the API for nodes (#9488)
Nodes themselves are not namespaced, so we'd originally assumed we did not need to pass through the ns query parameter when listing or viewing nodes.

As it turns out the API endpoints we use to list and view nodes (and related things) return things that are namespaced, therefore any API requests for nodes do require a the ns query parameter to be passed through to the request.

This PR adds the necessary ns query param to all things Node, apart from the querying for the leader which only returns node related information.
2021-01-05 15:54:23 +00:00
Matt Keeler 0d4b710c4a Special case the error returned when we have a Raft leader but are not tracking it in the ServerLookup (#9487)
This can happen when one other node in the cluster such as a client is unable to communicate with the leader server and sees it as failed. When that happens its failing status eventually gets propagated to the other servers in the cluster and eventually this can result in RPCs returning “No cluster leader” error.

That error is misleading and unhelpful for determing the root cause of the issue as its not raft stability but rather and client -> server networking issue. Therefore this commit will add a new error that will be returned in that case to differentiate between the two cases.
2021-01-04 19:05:58 +00:00
Mike Morris ceb4a9874e
ci(1.8.x): update to Go 1.14.13 (#9374) 2021-01-04 12:56:21 -05:00
hashicorp-ci 78d344c95e Putting source back into Dev Mode 2020-12-10 23:23:31 +00:00
hashicorp-ci cbe8f01e9a
Release v1.8.7 2020-12-10 21:46:52 +00:00
hashicorp-ci bf98530f78
update bindata_assetfs.go 2020-12-10 21:46:51 +00:00
Mike Morris 86be641c3d changelog: add unreleased v1.8.7 entries, remove v1.8.7-beta1 section 2020-12-10 15:57:06 -05:00
R.B. Boyer 0ecd16a382
acl: global tokens created by auth methods now correctly replicate to secondary datacenters (#9363)
Previously the tokens would fail to insert into the secondary's state
store because the AuthMethod field of the ACLToken did not point to a
known auth method from the primary.

Backport of #9351 to 1.8.x
2020-12-10 08:35:48 -06:00
Matt Keeler 8f79c50dff Add changelog for fixing the namespace replication bug from #9271 (#9347) 2020-12-08 17:05:27 +00:00