14851 Commits

Author SHA1 Message Date
Dhia Ayachi
b6180e9541
Merge branch 'main' into dhia/ca-cas-config-refactor 2021-07-22 12:38:34 -04:00
Dhia Ayachi
3960d34c5e fix index for CAOpSetRootsAndConfig operation 2021-07-22 12:18:38 -04:00
Dhia Ayachi
c6859b3fb0
config raft apply silent error (#10657)
* return an error when the index is not valid

* check response as bool when applying `CAOpSetConfig`

* remove check for bool response

* fix error message and add check to test

* fix comment

* add changelog
2021-07-22 10:32:27 -04:00
Dhia Ayachi
5d38dc5bd0 refactor to use same pattern as ConfigEntry 2021-07-22 10:30:39 -04:00
Dhia Ayachi
caac67e311 remove unnecessary var 2021-07-21 16:10:03 -04:00
Dhia Ayachi
733fa10e3c add cas field and wire it from API to backend 2021-07-21 16:09:04 -04:00
R.B. Boyer
b0657973f2
add partition cli flag to all cli commands that have namespace flag (#10668) 2021-07-21 14:45:24 -05:00
Blake Covarrubias
c89287dc77
Merge pull request #10462 from hashicorp/docs/add-ns-agent-services-9710
docs: Add namespace parameters to /agent/service* endpoints
2021-07-21 11:16:49 -07:00
Blake Covarrubias
f61eee0ac6 Update output for /v1/agent/health/service/(id|name)/ endpoints 2021-07-21 11:09:53 -07:00
Blake Covarrubias
da747c2cc0 docs: Add namespace parameters to /agent/service*
Document supported namespace parameters for /agent/service* API
endpoints.

Resolves #9710
2021-07-21 11:07:37 -07:00
Blake Covarrubias
6c462d399b
cli: Document pass-through option for consul connect envoy (#10666)
Update help text of `consul connect envoy` command to mention the
ability to provide pass-through options.
2021-07-21 10:43:10 -07:00
Blake Covarrubias
e515c9d449 docs: Update responses for /v1/session/ endpoints post 1.7
Update output for /v1/session/ endpoints to match output post Consul
1.7.0.

Documents new `NodeChecks` and `ServiceChecks` parameters which were
added in that release.

Resolves #7341, resolves #10095
2021-07-21 08:26:59 -07:00
Dhia Ayachi
37ee7a77a5
Merge branch 'dhia/config-raft-apply-silent-error' into dhia/ca-cas-config-refactor 2021-07-20 21:11:01 -04:00
Dhia Ayachi
3461a3b5a8 convert test to use require 2021-07-20 20:52:58 -04:00
Dhia Ayachi
67c1e18b81 add changelog 2021-07-20 15:49:35 -04:00
Dhia Ayachi
f4bcbc4c7d fix comment 2021-07-20 15:46:40 -04:00
Dhia Ayachi
12d9dae19d
Merge branch 'dhia/config-raft-apply-silent-error' into dhia/ca-cas-config-refactor 2021-07-20 15:44:29 -04:00
Dhia Ayachi
6ed9fb5f75 fix error message and add check to test 2021-07-20 15:42:14 -04:00
Dhia Ayachi
c46fb62051 Fix error message 2021-07-20 15:35:41 -04:00
Dhia Ayachi
8969638da8 refactor CACheckAndSetConfig to not return bool response 2021-07-20 14:30:00 -04:00
Dhia Ayachi
c52ad29eb7 remove check for bool response 2021-07-20 14:14:16 -04:00
John Cowen
bc7ece2bb0
docs: Refer to macOS vs Mac OS X in the main README (#10639) 2021-07-20 19:00:47 +01:00
Freddy
cf4821885d
Avoid panic on concurrent writes to cached service config map (#10647)
If multiple instances of a service are co-located on the same node then
their proxies will all share a cache entry for their resolved service
configuration. This is because the cache key contains the name of the
watched service but does not take into account the ID of the watching
proxies.

This means that there will be multiple agent service manager watches
that can wake up on the same cache update. These watchers then
concurrently modify the value in the cache when merging the resolved
config into the local proxy definitions.

To avoid this concurrent map write we will only delete the key from
opaque config in the local proxy definition after the merge, rather
than from the cached value before the merge.
2021-07-20 10:09:29 -06:00
Blake Covarrubias
e2fff3dde9 website: Fix circular redirect with TLS on existing cluster
Fix an issue where /docs/k8s/operations/tls-on-existing-cluster would
never load when navigating directly to the URL because of a circular
redirect.
2021-07-20 08:41:43 -07:00
hc-github-team-consul-core
139717d3f8 auto-updated agent/uiserver/bindata_assetfs.go from commit 1eb7a83ee 2021-07-20 15:15:10 +00:00
Kenia
1eb7a83eec
ui: Add tests for topology metrics stats (#10600) 2021-07-20 11:09:15 -04:00
Dhia Ayachi
92f892f22e check response as bool when applying CAOpSetConfig 2021-07-20 11:03:18 -04:00
Dhia Ayachi
485603cc8f return an error when the index is not valid 2021-07-20 11:02:09 -04:00
Blake Covarrubias
c271308473
docs: Add intentions to ACL System docs (#10323)
Adds mention of `intentions` rules to ACL System and ACL Rules pages.

Resolves #9790
2021-07-19 15:31:41 -07:00
Blake Covarrubias
a0cd3dd88e
Add DNS recursor strategy option (#10611)
This change adds a new `dns_config.recursor_strategy` option which
controls how Consul queries DNS resolvers listed in the `recursors`
config option. The supported options are `sequential` (default), and
`random`.

Closes #8807

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: Priyanka Sengupta <psengupta@flatiron.com>
2021-07-19 15:22:51 -07:00
Blake Covarrubias
832896ed11 docs: Fix spelling errors across website 2021-07-19 14:29:54 -07:00
Daniel Nephin
499250cbf1
Merge pull request #10396 from hashicorp/dnephin/fix-more-data-races
Fix some data races
2021-07-16 18:21:58 -04:00
Daniel Nephin
1c8ac9cd4b
Merge pull request #10009 from hashicorp/dnephin/trim-dns-response-with-edns
dns: properly trim response when EDNS is used
2021-07-16 18:09:25 -04:00
Daniel Nephin
a77575e93e acl: use SetHash consistently in testPolicyForID
A previous commit used SetHash on two of the cases to fix a data race. This commit applies
that change to all cases. Using SetHash in this test helper should ensure that the
test helper behaves closer to production.
2021-07-16 17:59:56 -04:00
Daniel Nephin
a639d657ae
Merge pull request #10353 from hashicorp/dnephin/prune-build-scripts-1
Remove a few unused things from build-support
2021-07-16 14:27:00 -04:00
Daniel Nephin
4bf58d8e6a dns: improve naming of error to match DNS terminology
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2021-07-16 12:40:24 -04:00
Dhia Ayachi
f0cd1441a9 fix truncate when NS is set
Also: fix test to catch the issue
2021-07-16 12:40:11 -04:00
Evan Culver
0527dcff57
acls: Show AuthMethodNamespace when reading/listing ACL token meta (#10598) 2021-07-15 10:38:52 -07:00
Daniel Nephin
bb675139c1
Merge pull request #10567 from hashicorp/dnephin/config-unexport-build
config: unexport the remaining builder methods
2021-07-15 12:05:19 -04:00
Freddy
12b7e07d5c
Merge pull request #10621 from hashicorp/vuln/validate-sans 2021-07-15 09:43:55 -06:00
freddygv
444af47750 Add changelog entry 2021-07-15 09:27:46 -06:00
Daniel Nephin
0ba5d74fcc
Merge pull request #10617 from hashicorp/dnephin/config-add-missing-docs
docs: add config options that were missing
2021-07-15 11:23:32 -04:00
Daniel Nephin
bb7fb21004
Fix godoc comment
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2021-07-15 11:22:46 -04:00
Daniel Nephin
81bb5f33eb
Merge pull request #10618 from hashicorp/dnephin/docs-add-deprecation-version-grpc-port
docs: add deprecation version for ports.grpc settings
2021-07-15 11:14:51 -04:00
R.B. Boyer
20feb42d3a
xds: ensure single L7 deny intention with default deny policy does not result in allow action (CVE-2021-36213) (#10619) 2021-07-15 10:09:00 -05:00
hc-github-team-consul-core
58807668bd auto-updated agent/uiserver/bindata_assetfs.go from commit 0762da3a6 2021-07-15 11:23:49 +00:00
John Cowen
0762da3a62
ui: [BUGFIX] Ensure we use the ns query param name when requesting permissions (#10608)
Previously when namespaces were enabled, we weren't requesting permission for the actively selected namespace, and instead always checking the permissions for the default namespace.

This commit ensures we request permissions for the actively selected namespace.
2021-07-15 12:19:07 +01:00
freddygv
b4c5c58c9b Add TODOs about partition handling 2021-07-14 22:21:55 -06:00
freddygv
5a82656510 Update golden files 2021-07-14 22:21:55 -06:00
freddygv
47da00d3c7 Validate SANs for passthrough clusters and failovers 2021-07-14 22:21:55 -06:00