16206 Commits

Author SHA1 Message Date
kisunji
63946e5849 Update golang.org/x/net to address CVE-2021-44716 2021-12-15 11:58:48 -05:00
kisunji
59ddc44cc7 Update golang.org/x/net to address CVE-2021-44716 2021-12-15 11:54:47 -05:00
Freddy
26c7d19913
Merge pull request #11844 from hashicorp/support-darwin-arm64 2021-12-15 09:42:03 -07:00
Bryce Kalow
a068867400
website: fix algolia indexing (#11413) 2021-12-15 08:30:46 -06:00
John Cowen
20cc028ac0
ui: Fixes an issue with the version footer when scrolling (#11850) 2021-12-15 13:55:31 +00:00
Michele Degges
03507b5053 Removing test branch 2021-12-14 18:19:14 -08:00
Mark Anderson
9806b7c268
Website fixups for admin partitions (#11842)
* Website fixups for admin partitions

Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2021-12-14 17:55:21 -08:00
Michele Degges
5f70f2812d Add darwin arm64 suport 2021-12-14 17:46:04 -08:00
trujillo-adam
38a45517cc
Merge pull request #11778 from hashicorp/docs/admin-partitions-rc-updates
Updates for admin partitions to include changes for RC
2021-12-14 17:38:17 -08:00
trujillo-adam
8ea3764cb6 applying final feedback 2021-12-14 17:36:25 -08:00
Kyle Havlovitz
9576e0f9dd
Merge pull request #11838 from hashicorp/partitions-dns-docs
docs: Update dns sections for partition query format and virtual IPs
2021-12-14 16:22:35 -08:00
Evan Culver
8edb01ec26
Update product version extraction for CRT (#11843) 2021-12-14 16:11:16 -08:00
Kyle Havlovitz
b40e7da006
Update wording of partition format section 2021-12-14 15:56:49 -08:00
Freddy
16d90ead94
Merge pull request #11837 from hashicorp/docs/upgrade-specific 2021-12-14 16:25:25 -07:00
R.B. Boyer
04d7efd61c Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2021-12-14 16:22:00 -06:00
R.B. Boyer
4c657cdfda deprecate another endpoint 2021-12-14 16:22:00 -06:00
R.B. Boyer
96390f6cee also update for dns_prefer_namespace deprecation 2021-12-14 16:22:00 -06:00
R.B. Boyer
40a54b7e98 docs: version specific upgrade content for 1.11.0 2021-12-14 16:22:00 -06:00
Chris S. Kim
729ff425ff
docs: Add API docs for Admin Partitions (#11834) 2021-12-14 17:04:02 -05:00
R.B. Boyer
ef3a32b4ad
docs: document partition config flag (#11840) 2021-12-14 16:02:08 -06:00
Chris S. Kim
f76fc6cabe
docs: Update discovery chain compilation results with partition fields (#11835) 2021-12-14 15:37:34 -05:00
Kyle Havlovitz
5ded24690e
Merge pull request #11839 from hashicorp/export-config-name-docs
docs: Update exported-services page to include required Name field
2021-12-14 12:30:06 -08:00
trujillo-adam
a2327c7a81 fixed merge conflicts 2021-12-14 12:28:15 -08:00
Kyle Havlovitz
f4010065a7 docs: Update exported-services page to include required Name field 2021-12-14 12:10:30 -08:00
trujillo-adam
4840ba85ed trying to fix merge conflicts and apply feedback 2021-12-14 11:54:33 -08:00
trujillo-adam
69d07dcc92
Apply suggestions from code review
Apply suggestions from code review

Co-authored-by: Ashwin Venkatesh <ashwin@hashicorp.com>
Co-authored-by: David Yu <dyu@hashicorp.com>
2021-12-14 11:51:34 -08:00
trujillo-adam
674b1fc55c Merge branch 'docs/admin-partitions-rc-updates' of github.com:hashicorp/consul into docs/admin-partitions-rc-updates
applying feedback on admin partitions rc docs
2021-12-14 11:44:15 -08:00
Kyle Havlovitz
1a03cd6a4c docs: add virtual IP section to DNS docs 2021-12-14 11:39:17 -08:00
trujillo-adam
e064f3561b applying feedback on rc admin partition documentation 2021-12-14 11:28:38 -08:00
Kyle Havlovitz
d11c55e4c7 docs: Update namespaced DNS services section for partitions format 2021-12-14 11:05:41 -08:00
Paul Banks
131897bff6
Merge pull request #11164 from hashicorp/docs/ingress-sds
Document SDS for ingress gateways
2021-12-14 17:32:40 +00:00
Freddy
d114d0722d
Merge pull request #11829 from hashicorp/ap/upstream-metrics 2021-12-14 09:16:59 -07:00
freddygv
6bbf109bdd Update golden files 2021-12-14 08:57:09 -07:00
freddygv
68424b318a Get partition label from upstream metrics 2021-12-14 08:40:47 -07:00
Matt Siegel
a38be58eaa
Merge pull request #11826 from hashicorp/proxycfg/valid-upstreams
[OSS] Handle discovery chain race
2021-12-14 10:14:00 -05:00
freddygv
bae0ccbe7f Add changelog entry 2021-12-13 19:03:12 -07:00
freddygv
21f2c2e68d Purge chain if it shouldn't be there 2021-12-13 18:56:44 -07:00
freddygv
fe85138453 additional test fixes 2021-12-13 18:56:44 -07:00
freddygv
d26b4860fd Account for new upstreams constraint in tests 2021-12-13 18:56:28 -07:00
freddygv
2fe27b748d Check ingress upstreams when gating chain watches 2021-12-13 18:56:28 -07:00
freddygv
6814e84459 Use ptr receiver in all Upstream methods 2021-12-13 18:56:14 -07:00
freddygv
6af9a0d8cf Avoid storing chain without an upstream 2021-12-13 18:56:14 -07:00
freddygv
ba12dc215b Clean up chains separately from their watches 2021-12-13 18:56:14 -07:00
freddygv
c5c290c503 Validate chains are associated with upstreams
Previously we could get into a state where discovery chain entries were
not cleaned up after the associated watch was cancelled. These changes
add handling for that case where stray chain references are encountered.
2021-12-13 18:56:13 -07:00
freddygv
70d6358426 Store intention upstreams in snapshot 2021-12-13 18:56:13 -07:00
R.B. Boyer
81ea8129d7
proxycfg: ensure all of the watches are canceled if they are cancelable (#11824) 2021-12-13 15:56:17 -06:00
Jared Kirschner
f81dd817ff
Merge pull request #11818 from hashicorp/improve-url-not-found-response
http: improve 404 Not Found response message
2021-12-13 16:08:50 -05:00
R.B. Boyer
4aabbe529c
proxycfg: use external addresses in tproxy when crossing partition boundaries (#11823) 2021-12-13 14:34:49 -06:00
Jared Kirschner
2de79abc00 http: improve 404 Not Found response message
When a URL path is not found, return a non-empty message with the 404 status
code to help the user understand what went wrong. If the URL path was not
prefixed with '/v1/', suggest that may be the cause of the problem (which is a
common mistake).
2021-12-13 11:03:25 -08:00
Freddy
85fe875d07
Use anonymousToken when querying by secret ID (#11813)
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Dan Upton <daniel@floppy.co>

This query has been incorrectly querying by accessor ID since New ACLs
were added. However, the legacy token compat allowed this to continue to
work, since it made a fallback query for the anonymousToken ID.

PR #11184 removed this legacy token query, which means that the query by
accessor ID is now the only check for the anonymous token's existence.

This PR updates the GetBySecret call to use the secret ID of the token.
2021-12-13 10:56:09 -07:00