Jack Pearkes
e65f66ac07
website: document and warn users about disabling serf_wan port
...
See https://github.com/hashicorp/consul/pull/3984 for more.
This also fixes a link to a heading that existed twice in the document.
2018-03-29 08:19:21 -07:00
runsisi
b082c8d3ab
minor fix for endpoints shutdown
...
Signed-off-by: runsisi <runsisi@zte.com.cn>
2018-03-29 21:45:46 +08:00
Matt Keeler
4b4c071e8a
Update CHANGELOG.md
2018-03-29 09:07:21 -04:00
Matt Keeler
ea6767d8bc
Merge pull request #3990 from hashicorp/b-gh-3854
...
Warn when node name isnt a valid DNS label
2018-03-29 09:04:47 -04:00
Preetha
3086b3b638
Merge pull request #3995 from hashicorp/f-update-dns-lib
...
update dns lib
2018-03-28 11:57:19 -05:00
Hannah Oppenheimer
b9a691b05f
Merge pull request #3991 from hashicorp/community-organization
...
Alphabetizing community tools list
2018-03-28 11:36:02 -05:00
Preetha Appan
38bf3c5cd2
Update CHANGELOG
2018-03-28 10:28:14 -05:00
Preetha Appan
5702319c71
vendorfmt
2018-03-28 10:25:49 -05:00
Pierre Souchay
9dc7194321
Bump version of miekg/dns to 1.0.4
...
See https://github.com/hashicorp/consul/issues/3977
While trying to improve furthermore #3948 (This pull request is still valid since we are not using Compression to compute the result anyway).
I saw a strange behaviour of dns library.
Basically, msg.Len() and len(msg.Pack()) disagree on Message len.
Thus, calculation of DNS response is false consul relies on msg.Len() instead of the result of Pack()
This is linked to miekg/dns#453 and a fix has been provided with miekg/dns#454
Would it be possible to upgrade miekg/dns to a more recent function ?
Consul might for instance upgrade to a post 1.0 release such as https://github.com/miekg/dns/releases/tag/v1.0.4
2018-03-28 10:23:57 -05:00
Preetha Appan
c7581d68c6
Renames agent API layer for service metadata to "meta" for consistency
2018-03-28 09:04:50 -05:00
Preetha Appan
d8372382e6
Update changelog
2018-03-27 16:42:50 -05:00
Preetha
daa61c5803
Merge pull request #3881 from pierresouchay/service_metadata
...
Feature Request: Support key-value attributes for services
2018-03-27 16:33:57 -05:00
Preetha Appan
38b7ecd758
Update CHANGELOG
2018-03-27 16:09:55 -05:00
Preetha
3c96d64eaa
Merge pull request #3984 from hashicorp/f-allow-federation-disable
...
Allows disabling WAN federation by setting serf WAN port to -1
2018-03-27 16:05:53 -05:00
Matt Keeler
ebc6f414ac
Formatting update
2018-03-27 16:31:27 -04:00
Pierre Souchay
980189a33f
Added validation of ServiceMeta in Catalog
...
Fixed Error Message when ServiceMeta is not valid
Added Unit test for adding a Service with badly formatted ServiceMeta
2018-03-27 22:22:42 +02:00
Preetha Appan
226cb2e95c
fix typo and remove comment
2018-03-27 14:28:05 -05:00
Matt Keeler
3facce6bfa
GH-3854: Warn when node name isnt a valid DNS label
2018-03-27 15:00:33 -04:00
Preetha
a0583fc426
Merge pull request #3988 from guidoiaquinti/master
...
Bumps go version to 1.10
2018-03-27 12:09:18 -05:00
Guido Iaquinti
f629567eb3
Updates CHANGELOG.md
2018-03-27 17:30:20 +01:00
Guido Iaquinti
47d1385c88
Bumps go version to 1.10
2018-03-27 17:27:51 +01:00
Preetha Appan
010a459365
Remove unnecessary nil checks
2018-03-27 10:59:42 -05:00
Preetha Appan
6c0bb5a810
Fix test and remove unused method
2018-03-27 09:44:41 -05:00
Paul Banks
0d5600ff60
Add vendored `testify/require` subpackage; upgrade `assert` to match. ( #3986 )
2018-03-27 15:19:15 +01:00
Preetha Appan
296596be98
Update CHANGELOG.md
2018-03-27 08:31:02 -05:00
Preetha
007ebe4370
Merge pull request #3982 from hashicorp/yamux_update
...
Update yamux to pick up performance improvements
2018-03-27 08:28:00 -05:00
Preetha Appan
d77ab91123
Allows disabling WAN federation by setting serf WAN port to -1
2018-03-26 14:21:06 -05:00
Kyle Havlovitz
10bda48a41
Merge pull request #3979 from guidoiaquinti/master
...
Consolidate logging output
2018-03-26 10:07:20 -07:00
Preetha Appan
7091595595
Update yamux to pick up performance improvements
2018-03-26 08:56:40 -05:00
Jack Pearkes
c862148ea2
Merge pull request #3927 from hashicorp/docs-encrypt-key-note
...
Docs: Clarify encrypt key for WAN joined DCs
2018-03-22 14:16:02 -07:00
Hannah Oppenheimer
996297033d
Alphabetizing community tools list
2018-03-22 12:36:42 -05:00
Guido Iaquinti
8cd11d5888
Add package name to log output
2018-03-21 15:56:14 +00:00
Jack Pearkes
559d35156a
Merge pull request #3929 from sryabkov/patch-1
...
Highlighting the dead link in documentation
2018-03-19 16:00:32 -07:00
Paul Banks
7a90a44a71
Note TLS cipher suite support changes
2018-03-19 21:51:14 +00:00
Josh Soref
94835a2715
Spelling ( #3958 )
...
* spelling: another
* spelling: autopilot
* spelling: beginning
* spelling: circonus
* spelling: default
* spelling: definition
* spelling: distance
* spelling: encountered
* spelling: enterprise
* spelling: expands
* spelling: exits
* spelling: formatting
* spelling: health
* spelling: hierarchy
* spelling: imposed
* spelling: independence
* spelling: inspect
* spelling: last
* spelling: latest
* spelling: client
* spelling: message
* spelling: minimum
* spelling: notify
* spelling: nonexistent
* spelling: operator
* spelling: payload
* spelling: preceded
* spelling: prepared
* spelling: programmatically
* spelling: required
* spelling: reconcile
* spelling: responses
* spelling: request
* spelling: response
* spelling: results
* spelling: retrieve
* spelling: service
* spelling: significantly
* spelling: specifies
* spelling: supported
* spelling: synchronization
* spelling: synchronous
* spelling: themselves
* spelling: unexpected
* spelling: validations
* spelling: value
2018-03-19 16:56:00 +00:00
Paul Banks
8871ad130d
Merge pull request #3961 from canterberry/docs/tls-cipher-suites
...
📝 Clarify the list of supported TLS cipher suites
2018-03-19 16:51:14 +00:00
Paul Banks
37c07b3cac
Use master
2018-03-19 16:50:52 +00:00
Paul Banks
a8f7681c70
Merge pull request #3962 from canterberry/upgrade/tls-cipher-suites
...
🔒 Update supported TLS cipher suites
2018-03-19 16:44:33 +00:00
Paul Banks
9e4b10ab6f
Merge pull request #3966 from hashicorp/docs-ui-acls
...
website: add UI section to ACL guide
2018-03-19 16:40:50 +00:00
Preetha Appan
da2d5304cb
Update CHANGELOG
2018-03-16 09:39:00 -05:00
Preetha Appan
2eed7766a8
cleanup unit test code a bit
2018-03-16 09:36:57 -05:00
Preetha
c87699abf2
Merge pull request #3885 from eddsteel/support-options-requests
...
Support OPTIONS requests
2018-03-16 09:20:16 -05:00
Devin Canterberry
2187ab1e1c
🎨 Formatting changes only; convert leading space to tabs
2018-03-15 10:30:38 -07:00
Devin Canterberry
961aea97fe
📝 Prefer brevity at the cost of some ambiguity
2018-03-15 10:25:27 -07:00
Devin Canterberry
7236c95e11
✅ Match expectation of TLSCipherSuites to values of tls_cipher_suites
2018-03-15 10:19:46 -07:00
Devin Canterberry
a61abcd931
🐛 Formatting changes only; add missing trailing commas
2018-03-15 10:19:46 -07:00
Devin Canterberry
c901307a47
🔒 Update supported TLS cipher suites
...
The list of cipher suites included in this commit are consistent with
the values and precedence in the [Golang TLS documentation](https://golang.org/src/crypto/tls/cipher_suites.go ).
> **Note:** Cipher suites with RC4 are still included within the list
> of accepted values for compatibility, but **these cipher suites are
> not safe to use** and should be deprecated with warnings and
> subsequently removed. Support for RC4 ciphers has already been
> removed or disabled by default in many prominent browsers and tools,
> including Golang.
>
> **References:**
>
> * [RC4 on Wikipedia](https://en.wikipedia.org/wiki/RC4 )
> * [Mozilla Security Blog](https://blog.mozilla.org/security/2015/09/11/deprecating-the-rc4-cipher/ )
2018-03-15 10:19:46 -07:00
Devin Canterberry
1db58de366
⤵️ Merge from `master`; no conflicts
2018-03-15 09:13:01 -07:00
Jack Pearkes
6fb94ff40a
website: clarify where ACL token is set in the UI
2018-03-14 16:50:04 -07:00
Jack Pearkes
c66628a06f
website: add section on securing the UI with ACLs
...
Figured it would be worth documenting due to #3931 .
2018-03-14 16:46:04 -07:00