Anita Akaeze
f5985fedce
do not trigger integration tests ( #18948 )
2023-09-21 19:10:34 +00:00
Anita Akaeze
1f941e48c1
Fix for loop in filter_changed_files_go_test script ( #18931 )
...
* iterate through array
* remove comment
2023-09-20 16:10:38 -07:00
Anita Akaeze
0236c48369
Update base ref property name ( #18851 )
...
* Update base ref property name
* Test skip ci (#18924 )
test_push_merge
* cleanup test push code
2023-09-20 14:33:30 -07:00
cskh
9b497f8c78
CI: lint test-integ ( #18875 )
...
* CI: lint test-integ
* fix lint error
2023-09-19 10:05:51 -04:00
Ashesh Vidyut
0018b7e5a8
Fixes for integration tests windows for ENT ( #18839 )
...
* fixes for integration tests
* fix runner size for enterprise
* fix spacing
* fix spacing
* removed branch test run
2023-09-18 10:45:22 +05:30
Michael Zalimeni
09fffd4b1e
Disable docs change CI skip detection ( #18775 )
...
There's currently a bug that causes CI to be skipped on all non-PR
changes. Until that's fixed and we can be certain the check will fail CI
or default to running tests in the case of errors, disabling this check.
2023-09-13 17:27:02 +00:00
Ashesh Vidyut
0b6efbb9c1
Windows Integration Test Changes ( #18758 )
...
* some changes to debug
* revert machines
* increased timeout
* added sleep 10 seconds before test start
* chagne envoy version
* removed sleep
* revert timeout
* replace position
* removed date
* Revert "[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437 )"
This reverts commit 05604eeec1
.
* fix build
* Revert "replace position"
This reverts commit 48e6af46a8daae186c283f30d316b1104906993e.
* Revert "Revert "[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437 )""
This reverts commit d7c568e2be727b72e6827225782e0e17ac06b74a.
* comment out api gateway http hostnames test
* fix import
* revert integ test run on PR
2023-09-13 15:40:08 +05:30
Sophie Gairo
a55c4a1c25
Test: NET-5592 - update Nomad integration testing ( #18768 )
...
NET-5592 - update Nomad integration testing
2023-09-12 14:59:27 -05:00
Michael Zalimeni
5e7afdf9a1
[NET-5574] Update Go version to 1.20.8 ( #18742 )
...
Update Go version to 1.20.8
This resolves several CVEs (see changelog entry).
2023-09-12 11:40:51 -04:00
Dhia Ayachi
b1688ad856
Run copyright after running deep-copy as part of the Makefile/CI ( #18741 )
...
* execute copyright headers after performing deep-copy generation.
* fix copyright install
* Apply suggestions from code review
Co-authored-by: Semir Patel <semir.patel@hashicorp.com>
* Apply suggestions from code review
Co-authored-by: Semir Patel <semir.patel@hashicorp.com>
* rename steps to match codegen naming
* remove copywrite install category
---------
Co-authored-by: Semir Patel <semir.patel@hashicorp.com>
2023-09-11 13:50:52 -04:00
Ashesh Vidyut
7429aba3c9
Increase timeout for integration test windows. ( #18737 )
...
increase timeout
2023-09-11 08:24:49 +00:00
Ashesh Vidyut
bf291f5b8d
Fix windows integrations tests machine size ( #18736 )
...
fix windows integrations tests machine size
2023-09-11 06:36:56 +00:00
John Murret
3e78b4cf34
Prefix sidecar proxy test files with source and destination. ( #18620 )
...
* mesh-controller: handle L4 protocols for a proxy without upstreams
* sidecar-controller: Support explicit destinations for L4 protocols and single ports.
* This controller generates and saves ProxyStateTemplate for sidecar proxies.
* It currently supports single-port L4 ports only.
* It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
* It will update the status of the pbmesh.Upstreams resource if anything is invalid.
* endpoints-controller: add workload identity to the service endpoints resource
* small fixes
* review comments
* Address PR comments
* sidecar-proxy controller: Add support for transparent proxy
This currently does not support inferring destinations from intentions.
* PR review comments
* mesh-controller: handle L4 protocols for a proxy without upstreams
* sidecar-controller: Support explicit destinations for L4 protocols and single ports.
* This controller generates and saves ProxyStateTemplate for sidecar proxies.
* It currently supports single-port L4 ports only.
* It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
* It will update the status of the pbmesh.Upstreams resource if anything is invalid.
* endpoints-controller: add workload identity to the service endpoints resource
* small fixes
* review comments
* Make sure endpoint refs route to mesh port instead of an app port
* Address PR comments
* fixing copyright
* tidy imports
* sidecar-proxy controller: Add support for transparent proxy
This currently does not support inferring destinations from intentions.
* tidy imports
* add copyright headers
* Prefix sidecar proxy test files with source and destination.
* Update controller_test.go
---------
Co-authored-by: Iryna Shustava <iryna@hashicorp.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com>
2023-09-08 17:28:55 -06:00
Ashesh Vidyut
993fe9a6a6
Using larger machine for Enterprise ( #18713 )
...
using 4x large for ent
2023-09-08 05:43:46 +00:00
Nick Irvine
80d72e71c1
restore common-topo peering integration tests, but nightly [NET-5476] ( #18673 )
2023-09-06 22:45:46 +00:00
Ashesh Vidyut
ac27585dd4
Fix windows Ent runner ( #18683 )
...
* fix windows image for enterprise
* added quotesT
2023-09-06 15:23:09 +05:30
Curt Bushko
f2ce472ae1
PLAT-1192 - Run CI on smaller instances ( #18624 )
...
Use smaller runners
2023-08-31 10:56:59 -04:00
Jared Kirschner
180c1e22c1
test: run automated tests against Vault 1.11 - 1.14 ( #18590 )
...
Begin to test against Vault 1.14. Drop tests against Vault 1.10.
2023-08-28 13:32:42 -04:00
Curt Bushko
7bc30e989c
Set concurrency for workflows ( #18567 )
...
* Set concurrency for workflows
2023-08-28 12:05:25 -04:00
cskh
c8ef063523
CI: send slack notification on failed nightly job ( #18578 )
2023-08-25 09:39:08 -04:00
Anita Akaeze
63fa78a141
NET-5382 & PLAT-1159: Do not trigger workflow if only doc files are in commit history ( #18528 )
...
NET-5382: Do not run workflow runs if at least one path matches
2023-08-23 15:26:05 -04:00
cskh
c4b3234bbc
CI: fix envoy versions in CI of release branch ( #18538 )
...
* CI: fix envoy versions in CI of release branch
* - remove steps sds for 1.15 nightly run
- checkout the release branch
* add default name
* fix
* Update go-tests.yml
* fix checkout code
* add comments and revert schedule
2023-08-22 11:16:12 -04:00
Semir Patel
53e28a4963
OSS -> CE (community edition) changes ( #18517 )
2023-08-22 09:46:03 -05:00
cskh
587663dbcb
Create nightly test-integration for consul release branch ( #18530 )
...
* Create nightly test-integration for consul release branch
* test
* fix
2023-08-21 10:07:49 -04:00
cskh
d3837e389c
CI Split integration tests to run nightly and every PR ( #18518 )
...
* CI Split integration tests to run nightly and every PR
* Checkout release branch for nightly test
2023-08-18 10:56:33 -04:00
Nathan Coleman
d488fc79a9
NET-5371 License checker pt2 ( #18491 )
...
* Update grep command to work on ubuntu
* Run license checker when new commits are pushed to PR
2023-08-16 20:48:14 +00:00
Nathan Coleman
9e9800e8ce
Add license-checker action that fails when any backported file contains BUSL header ( #18485 )
...
* Add license-checker action that fails when any backported file contains BUSL header
* Quote echoed variable to retain line breaks
* Add ticket to reference for more details
2023-08-16 14:31:33 -04:00
Matt Keeler
b4cdfbbc12
Disable deep-copy codegen verification for now. ( #18446 )
...
Once we figure out what to do with license headers for these files we should re-enable this check.
2023-08-11 10:15:45 -04:00
hashicorp-copywrite[bot]
5fb9df1640
[COMPLIANCE] License changes ( #18443 )
...
* Adding explicit MPL license for sub-package
This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository.
* Adding explicit MPL license for sub-package
This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository.
* Updating the license from MPL to Business Source License
Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at <Blog URL>, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl.
* add missing license headers
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
* Update copyright file headers to BUSL-1.1
---------
Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
2023-08-11 09:12:13 -04:00
cskh
43d8898e08
bump testcontainers-go from 0.22.0 and remove pinned go version in in… ( #18395 )
...
* bump testcontainers-go from 0.22.0 and remove pinned go version in integ test
* go mod tidy
* Replace deprecated target.Authority with target.URL.Host
2023-08-08 18:08:14 +00:00
cskh
7902ae20a1
Upgrade test: remove outdated test and disable log due to verbosity ( #18403 )
...
* remove outdated test
* disable log since we have too many parallel tests
2023-08-08 13:16:32 -04:00
Ashesh Vidyut
96ce4daefa
Not using chmod - fixed integration test for Enterprise ( #18401 )
...
* Not using chmod
* checking icacls
* Removed push
2023-08-08 07:12:03 +00:00
R.B. Boyer
89aac4b098
add some initial CODEOWNERS ( #18346 )
2023-08-03 16:22:18 -05:00
Michael Zalimeni
905e371607
[NET-5146] security: Update Go version to 1.20.7 and `x/net` to 0.13.0 ( #18358 )
...
* Update Go version to 1.20.7
This resolves [CVE-2023-29409]
(https://nvd.nist.gov/vuln/detail/CVE-2023-29409 )(`crypto/tls`).
* Bump golang.org/x/net to 0.13.0
Addresses [CVE-2023-3978](https://nvd.nist.gov/vuln/detail/CVE-2023-3978 )
for security scans (non-impacting).
2023-08-02 13:10:29 -04:00
Curt Bushko
449e050741
Update actions for TSCCR ( #18317 )
...
Update action versions before deadline
2023-07-28 12:49:23 -04:00
Michael Zalimeni
cf4deeb7ea
Update list of Envoy versions ( #18300 )
...
Update supported envoy versions to 1.24.10, 1.25.9, 1.26.4, 1.27.0.
2023-07-26 21:48:29 +00:00
Dan Bond
9b540e29bc
go-tests: disable s390x ( #18273 )
2023-07-25 10:58:12 -07:00
John Murret
639210e28d
Revert "NET-4996 - filter go-tests and test-integration workflows from running on docs only and ui only changes" ( #18248 )
...
Revert "NET-4996 - filter go-tests and test-integration workflows from running on docs only and ui only changes (#18236 )"
This reverts commit a11dba710e
.
2023-07-24 10:05:43 -06:00
Michael Zalimeni
8b46bac36d
Align build arch matrix with enterprise ( #18235 )
...
Ensure that OSS remains in sync w/ Enterprise by aligning the format of
arch matrix args for various build jobs.
2023-07-24 11:22:34 -04:00
John Murret
a11dba710e
NET-4996 - filter go-tests and test-integration workflows from running on docs only and ui only changes ( #18236 )
2023-07-23 13:08:15 -06:00
Ashesh Vidyut
2b0d64ee27
Fix Github Workflow File ( #18241 )
...
* [CONSUL-382] Support openssl in unique test dockerfile (#43 )
* [CONSUL-405] Add bats to single container (#44 )
* [CONSUL-414] Run Prometheus Test Cases and Validate Changes (#46 )
* [CONSUL-410] Run Jaeger in Single container (#45 )
* [CONSUL-412] Run test-sds-server in single container (#48 )
* [CONSUL-408] Clean containers (#47 )
* [CONSUL-384] Rebase and sync fork (#50 )
* [CONSUL-415] Create Scenarios Troubleshooting Docs (#49 )
* [CONSUL-417] Update Docs Single Container (#51 )
* [CONSUL-428] Add Socat to single container (#54 )
* [CONSUL-424] Replace pkill in kill_envoy function (#52 )
* [CONSUL-434] Modify Docker run functions in Helper script (#53 )
* [CONSUL-435] Replace docker run in set_ttl_check_state & wait_for_agent_service_register functions (#55 )
* [CONSUL-438] Add netcat (nc) in the Single container Dockerfile (#56 )
* [CONSUL-429] Replace Docker run with Docker exec (#57 )
* [CONSUL-436] Curl timeout and run tests (#58 )
* [CONSUL-443] Create dogstatsd Function (#59 )
* [CONSUL-431] Update Docs Netcat (#60 )
* [CONSUL-439] Parse nc Command in function (#61 )
* [CONSUL-463] Review curl Exec and get_ca_root Func (#63 )
* [CONSUL-453] Docker hostname in Helper functions (#64 )
* [CONSUL-461] Test wipe volumes without extra cont (#66 )
* [CONSUL-454] Check ports in the Server and Agent containers (#65 )
* [CONSUL-441] Update windows dockerfile with version (#62 )
* [CONSUL-466] Review case-grpc Failing Test (#67 )
* [CONSUL-494] Review case-cfg-resolver-svc-failover (#68 )
* [CONSUL-496] Replace docker_wget & docker_curl (#69 )
* [CONSUL-499] Cleanup Scripts - Remove nanoserver (#70 )
* [CONSUL-500] Update Troubleshooting Docs (#72 )
* [CONSUL-502] Pull & Tag Envoy Windows Image (#73 )
* [CONSUL-504] Replace docker run in docker_consul (#76 )
* [CONSUL-505] Change admin_bind
* [CONSUL-399] Update envoy to 1.23.1 (#78 )
* [CONSUL-510] Support case-wanfed-gw on Windows (#79 )
* [CONSUL-506] Update troubleshooting Documentation (#80 )
* [CONSUL-512] Review debug_dump_volumes Function (#81 )
* [CONSUL-514] Add zipkin to Docker Image (#82 )
* [CONSUL-515] Update Documentation (#83 )
* [CONSUL-529] Support case-consul-exec (#86 )
* [CONSUL-530] Update Documentation (#87 )
* [CONSUL-530] Update default consul version 1.13.3
* [CONSUL-539] Cleanup (#91 )
* [CONSUL-546] Scripts Clean-up (#92 )
* [CONSUL-491] Support admin_access_log_path value for Windows (#71 )
* [CONSUL-519] Implement mkfifo Alternative (#84 )
* [CONSUL-542] Create OS Specific Files for Envoy Package (#88 )
* [CONSUL-543] Create exec_supported.go (#89 )
* [CONSUL-544] Test and Build Changes (#90 )
* Implement os.DevNull
* using mmap instead of disk files
* fix import in exec-unix
* fix nmap open too many arguemtn
* go fmt on file
* changelog file
* fix go mod
* Update .changelog/17694.txt
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
* different mmap library
* fix bootstrap json
* some fixes
* chocolatey version fix and image fix
* using different library
* fix Map funciton call
* fix mmap call
* fix tcp dump
* fix tcp dump
* windows tcp dump
* Fix docker run
* fix tests
* fix go mod
* fix version 16.0
* fix version
* fix version dev
* sleep to debug
* fix sleep
* fix permission issue
* fix permission issue
* fix permission issue
* fix command
* fix command
* fix funciton
* fix assert config entry status command not found
* fix command not found assert_cert_has_cn
* fix command not found assert_upstream_missing
* fix command not found assert_upstream_missing_once
* fix command not found get_upstream_endpoint
* fix command not found get_envoy_public_listener_once
* fix command not found
* fix test cases
* windows integration test workflow github
* made code similar to unix using npipe
* fix go.mod
* fix dialing of npipe
* dont wait
* check size of written json
* fix undefined n
* running
* fix dep
* fix syntax error
* fix workflow file
* windows runner
* fix runner
* fix from json
* fix runs on
* merge connect envoy
* fix cin path
* build
* fix file name
* fix file name
* fix dev build
* remove unwanted code
* fix upload
* fix bin name
* fix path
* checkout current branch
* fix path
* fix tests
* fix shell bash for windows sh files
* fix permission of run-test.sh
* removed docker dev
* added shell bash for tests
* fix tag
* fix win=true
* fix cd
* added dev
* fix variable undefined
* removed failing tests
* fix tcp dump image
* fix curl
* fix curl
* tcp dump path
* fix tcpdump path
* fix curl
* fix curl install
* stop removing intermediate containers
* fix tcpdump docker image
* revert -rm
* --rm=false
* makeing docker image before
* fix tcpdump
* removed case consul exec
* removed terminating gateway simple
* comment case wasm
* removed data dog
* comment out upload coverage
* uncomment case-consul-exec
* comment case consul exec
* if always
* logs
* using consul 1.17.0
* fix quotes
* revert quotes
* redirect to dev null
* Revert version
* revert consul connect
* fix version
* removed envoy connect
* not using function
* change log
* docker logs
* fix logs
* restructure bad authz
* rmeoved dev null
* output
* fix file descriptor
* fix cacert
* fix cacert
* fix ca cert
* cacert does not work in windows curl
* fix func
* removed docker logs
* added sleep
* fix tls
* commented case-consul-exec
* removed echo
* retry docker consul
* fix upload bin
* uncomment consul exec
* copying consul.exe to docker image
* copy fix
* fix paths
* fix path
* github workspace path
* latest version
* Revert "latest version"
This reverts commit 5a7d7b82d9e7553bcb01b02557ec8969f9deba1d.
* commented consul exec
* added ssl revoke best effort
* revert best effort
* removed unused files
* rename var name and change dir
* windows runner
* permission
* needs setup fix
* swtich to github runner
* fix file path
* fix path
* fix path
* fix path
* fix path
* fix path
* fix build paths
* fix tag
* nightly runs
* added matrix in github workflow, renamed files
* fix job
* fix matrix
* removed brackes
* from json
* without using job matrix
* fix quotes
* revert job matrix
* fix workflow
* fix comment
* added comment
* nightly runs
* removed datadog ci as it is already measured in linux one
* running test
* Revert "running test"
This reverts commit 7013d15a23732179d18ec5d17336e16b26fab5d4.
* pr comment fixes
* running test now
* running subset of test
* running subset of test
* job matrix
* shell bash
* removed bash shell
* linux machine for job matrix
* fix output
* added cat to debug
* using ubuntu latest
* fix job matrix
* fix win true
* fix go test
* revert job matrix
* Fix tests
---------
Co-authored-by: Ivan K Berlot <ivanberlot@gmail.com>
Co-authored-by: Jose Ignacio Lorenzo <74208929+joselo85@users.noreply.github.com>
Co-authored-by: Franco Bruno Lavayen <cocolavayen@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <20102608+ezfepo@users.noreply.github.com>
Co-authored-by: joselo85 <joseignaciolorenzo85@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <ezequiel.fernandez@southworks.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
2023-07-22 04:18:42 +00:00
Dan Bond
7e01fcf5c0
ci: don't verify s390x ( #18224 )
2023-07-21 10:00:37 -07:00
Ashesh Vidyut
47d445d680
Envoy Integration Test Windows ( #18007 )
...
* [CONSUL-395] Update check_hostport and Usage (#40 )
* [CONSUL-397] Copy envoy binary from Image (#41 )
* [CONSUL-382] Support openssl in unique test dockerfile (#43 )
* [CONSUL-405] Add bats to single container (#44 )
* [CONSUL-414] Run Prometheus Test Cases and Validate Changes (#46 )
* [CONSUL-410] Run Jaeger in Single container (#45 )
* [CONSUL-412] Run test-sds-server in single container (#48 )
* [CONSUL-408] Clean containers (#47 )
* [CONSUL-384] Rebase and sync fork (#50 )
* [CONSUL-415] Create Scenarios Troubleshooting Docs (#49 )
* [CONSUL-417] Update Docs Single Container (#51 )
* [CONSUL-428] Add Socat to single container (#54 )
* [CONSUL-424] Replace pkill in kill_envoy function (#52 )
* [CONSUL-434] Modify Docker run functions in Helper script (#53 )
* [CONSUL-435] Replace docker run in set_ttl_check_state & wait_for_agent_service_register functions (#55 )
* [CONSUL-438] Add netcat (nc) in the Single container Dockerfile (#56 )
* [CONSUL-429] Replace Docker run with Docker exec (#57 )
* [CONSUL-436] Curl timeout and run tests (#58 )
* [CONSUL-443] Create dogstatsd Function (#59 )
* [CONSUL-431] Update Docs Netcat (#60 )
* [CONSUL-439] Parse nc Command in function (#61 )
* [CONSUL-463] Review curl Exec and get_ca_root Func (#63 )
* [CONSUL-453] Docker hostname in Helper functions (#64 )
* [CONSUL-461] Test wipe volumes without extra cont (#66 )
* [CONSUL-454] Check ports in the Server and Agent containers (#65 )
* [CONSUL-441] Update windows dockerfile with version (#62 )
* [CONSUL-466] Review case-grpc Failing Test (#67 )
* [CONSUL-494] Review case-cfg-resolver-svc-failover (#68 )
* [CONSUL-496] Replace docker_wget & docker_curl (#69 )
* [CONSUL-499] Cleanup Scripts - Remove nanoserver (#70 )
* [CONSUL-500] Update Troubleshooting Docs (#72 )
* [CONSUL-502] Pull & Tag Envoy Windows Image (#73 )
* [CONSUL-504] Replace docker run in docker_consul (#76 )
* [CONSUL-505] Change admin_bind
* [CONSUL-399] Update envoy to 1.23.1 (#78 )
* [CONSUL-510] Support case-wanfed-gw on Windows (#79 )
* [CONSUL-506] Update troubleshooting Documentation (#80 )
* [CONSUL-512] Review debug_dump_volumes Function (#81 )
* [CONSUL-514] Add zipkin to Docker Image (#82 )
* [CONSUL-515] Update Documentation (#83 )
* [CONSUL-529] Support case-consul-exec (#86 )
* [CONSUL-530] Update Documentation (#87 )
* [CONSUL-530] Update default consul version 1.13.3
* [CONSUL-539] Cleanup (#91 )
* [CONSUL-546] Scripts Clean-up (#92 )
* [CONSUL-491] Support admin_access_log_path value for Windows (#71 )
* [CONSUL-519] Implement mkfifo Alternative (#84 )
* [CONSUL-542] Create OS Specific Files for Envoy Package (#88 )
* [CONSUL-543] Create exec_supported.go (#89 )
* [CONSUL-544] Test and Build Changes (#90 )
* Implement os.DevNull
* using mmap instead of disk files
* fix import in exec-unix
* fix nmap open too many arguemtn
* go fmt on file
* changelog file
* fix go mod
* Update .changelog/17694.txt
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
* different mmap library
* fix bootstrap json
* some fixes
* chocolatey version fix and image fix
* using different library
* fix Map funciton call
* fix mmap call
* fix tcp dump
* fix tcp dump
* windows tcp dump
* Fix docker run
* fix tests
* fix go mod
* fix version 16.0
* fix version
* fix version dev
* sleep to debug
* fix sleep
* fix permission issue
* fix permission issue
* fix permission issue
* fix command
* fix command
* fix funciton
* fix assert config entry status command not found
* fix command not found assert_cert_has_cn
* fix command not found assert_upstream_missing
* fix command not found assert_upstream_missing_once
* fix command not found get_upstream_endpoint
* fix command not found get_envoy_public_listener_once
* fix command not found
* fix test cases
* windows integration test workflow github
* made code similar to unix using npipe
* fix go.mod
* fix dialing of npipe
* dont wait
* check size of written json
* fix undefined n
* running
* fix dep
* fix syntax error
* fix workflow file
* windows runner
* fix runner
* fix from json
* fix runs on
* merge connect envoy
* fix cin path
* build
* fix file name
* fix file name
* fix dev build
* remove unwanted code
* fix upload
* fix bin name
* fix path
* checkout current branch
* fix path
* fix tests
* fix shell bash for windows sh files
* fix permission of run-test.sh
* removed docker dev
* added shell bash for tests
* fix tag
* fix win=true
* fix cd
* added dev
* fix variable undefined
* removed failing tests
* fix tcp dump image
* fix curl
* fix curl
* tcp dump path
* fix tcpdump path
* fix curl
* fix curl install
* stop removing intermediate containers
* fix tcpdump docker image
* revert -rm
* --rm=false
* makeing docker image before
* fix tcpdump
* removed case consul exec
* removed terminating gateway simple
* comment case wasm
* removed data dog
* comment out upload coverage
* uncomment case-consul-exec
* comment case consul exec
* if always
* logs
* using consul 1.17.0
* fix quotes
* revert quotes
* redirect to dev null
* Revert version
* revert consul connect
* fix version
* removed envoy connect
* not using function
* change log
* docker logs
* fix logs
* restructure bad authz
* rmeoved dev null
* output
* fix file descriptor
* fix cacert
* fix cacert
* fix ca cert
* cacert does not work in windows curl
* fix func
* removed docker logs
* added sleep
* fix tls
* commented case-consul-exec
* removed echo
* retry docker consul
* fix upload bin
* uncomment consul exec
* copying consul.exe to docker image
* copy fix
* fix paths
* fix path
* github workspace path
* latest version
* Revert "latest version"
This reverts commit 5a7d7b82d9e7553bcb01b02557ec8969f9deba1d.
* commented consul exec
* added ssl revoke best effort
* revert best effort
* removed unused files
* rename var name and change dir
* windows runner
* permission
* needs setup fix
* swtich to github runner
* fix file path
* fix path
* fix path
* fix path
* fix path
* fix path
* fix build paths
* fix tag
* nightly runs
* added matrix in github workflow, renamed files
* fix job
* fix matrix
* removed brackes
* from json
* without using job matrix
* fix quotes
* revert job matrix
* fix workflow
* fix comment
* added comment
* nightly runs
* removed datadog ci as it is already measured in linux one
* running test
* Revert "running test"
This reverts commit 7013d15a23732179d18ec5d17336e16b26fab5d4.
* pr comment fixes
* running test now
* running subset of test
* running subset of test
* job matrix
* shell bash
* removed bash shell
* linux machine for job matrix
* fix output
* added cat to debug
* using ubuntu latest
* fix job matrix
* fix win true
* fix go test
* revert job matrix
---------
Co-authored-by: Jose Ignacio Lorenzo <74208929+joselo85@users.noreply.github.com>
Co-authored-by: Franco Bruno Lavayen <cocolavayen@gmail.com>
Co-authored-by: Ivan K Berlot <ivanberlot@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <20102608+ezfepo@users.noreply.github.com>
Co-authored-by: joselo85 <joseignaciolorenzo85@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <ezequiel.fernandez@southworks.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
2023-07-21 20:26:00 +05:30
Michael Zalimeni
1c7fcdf188
Fix Backport Assistant PR commenting ( #18200 )
...
* Fix Backport Assistant failure PR commenting
For general comments on a PR, it looks like you have to use the `/issue`
endpoint rather than `/pulls`, which requires commit/other
review-specific target details.
This matches the endpoint used in `backport-reminder.yml`.
* Remove Backport Reminder workflow
This is noisy (even when adding multiple labels, individual comments per
label are generated), and likely no longer needed: we haven't had this
work in a long time due to an expired GH token, and we now have better
automation for backport PR assignment.
2023-07-20 11:39:01 -04:00
hashicorp-tsccr[bot]
1ef5dfcfc6
SEC-090: Automated trusted workflow pinning (2023-07-18) ( #18174 )
...
Result of tsccr-helper -log-level=info -pin-all-workflows .
Co-authored-by: hashicorp-tsccr[bot] <hashicorp-tsccr[bot]@users.noreply.github.com>
2023-07-19 16:56:50 -07:00
Michael Zalimeni
e8dd04d662
[NET-4865] security: Update Go version to 1.20.6 ( #18190 )
...
Update Go version to 1.20.6
This resolves [CVE-2023-29406]
(https://nvd.nist.gov/vuln/detail/CVE-2023-29406 ) for uses of the
`net/http` standard library.
Note that until the follow-up to #18124 is done, the version of Go used
in those impacted tests will need to remain on 1.20.5.
2023-07-19 17:02:18 -04:00
Nick Irvine
cd3fc9e1d0
add peering_commontopo tests [NET-3700] ( #17951 )
...
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
Co-authored-by: NiniOak <anita.akaeze@hashicorp.com>
2023-07-18 16:41:30 -07:00
Nick Irvine
62005369b5
Add `testing/deployer` (neé `consul-topology`) [NET-4610] ( #17823 )
...
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2023-07-17 15:15:22 -07:00
Nick Irvine
05b665e856
chore: bump upgrade integrations tests to 1.15, 116 [NET-4743] ( #18130 )
2023-07-14 17:13:41 -04:00
John Murret
5af73901a2
[NET-4897] net/http host header is now verified and request.host that contains socked now error ( #18129 )
...
### Description
This is related to https://github.com/hashicorp/consul/pull/18124 where
we pinned the go versions in CI to 1.20.5 and 1.19.10.
go 1.20.6 and 1.19.11 now validate request host headers for validity,
including the hostname cannot be prefixed with slashes.
For local communications (npipe://, unix://), the hostname is not used,
but we need valid and meaningful hostname. Prior versions go Go would
clean the host header, and strip slashes in the process, but go1.20.6
and go1.19.11 no longer do, and reject the host header. Around the
community we are seeing that others are intercepting the req.host and if
it starts with a slash or ends with .sock, they changing the host to
localhost or another dummy value.
[client: define a "dummy" hostname to use for local connections by
thaJeztah · Pull Request #45942 ·
moby/moby](https://github.com/moby/moby/pull/45942 )
### Testing & Reproduction steps
Check CI tests.
### Links
* [ ] updated test coverage
* [ ] external facing docs updated
* [ ] appropriate backport labels added
* [ ] not a security concern
2023-07-14 14:53:27 -06:00