Commit Graph

19374 Commits

Author SHA1 Message Date
Michael Klein 033694e6a3 Fix PeerName is part of service uniqueness
We need to make a PeerName part of a the service id when present.

This makes sure that peers can export services named
the same as other peers but have the UI still treat them
as separate services.
2022-10-26 17:34:45 +02:00
Michael Klein e5130be812
Merge pull request #15156 from hashicorp/ui/peer-create-redirect-to-show
ui: peer create redirect to show
2022-10-26 17:16:28 +02:00
wenincode c1800b9187 Remove consul logo icons 2022-10-26 08:57:43 -06:00
wenincode cbc150f7bf Update iconography documentation 2022-10-26 08:57:31 -06:00
Michael Klein ca0dbe2052 Improve layout address list peer detail 2022-10-26 16:17:05 +02:00
Michael Klein 41e50a0f8d
Merge pull request #15148 from hashicorp/ui/update-hds-usage-best-practices
UI: update hds usage to hds best practices
2022-10-26 16:10:05 +02:00
wenincode 6a4cd42a2b Remove shadow-template/host and related components 2022-10-26 08:07:35 -06:00
wenincode b34244c62d Remove template log 2022-10-26 06:43:57 -06:00
Michael Klein 3ba50bd5a3 Redirect to peers.show after establishing peering 2022-10-26 11:15:57 +02:00
Michael Klein 63a2d5a1f5 Prettify peers.index template 2022-10-26 11:15:06 +02:00
Michael Klein 44c7614b3b prettify peer/initiate form 2022-10-26 10:11:41 +02:00
wenincode f96b45b9f0 Add back logo-consul-color 2022-10-25 14:13:12 -06:00
wenincode ee9481d3aa Remove some icons 2022-10-25 14:02:38 -06:00
Eric Haberkorn 1bdad89026
fix bug that resulted in generating Envoy configs that use CDS with an EDS configuration (#15140) 2022-10-25 14:49:57 -04:00
wenincode 9eb97b29f9 Use FlightIcon component for k8s type select in authmethods 2022-10-25 12:01:09 -06:00
Luke Kysow d3aa2bd9c5
ingress-gateways: don't log error when registering gateway (#15001)
* ingress-gateways: don't log error when registering gateway

Previously, when an ingress gateway was registered without a
corresponding ingress gateway config entry, an error was logged
because the watch on the config entry returned a nil result.
This is expected so don't log an error.
2022-10-25 10:55:44 -07:00
Luke Kysow fbd47e1161
config entry: hardcode proxy-defaults name as global (#14833)
* config entry: hardcode proxy-defaults name as global

proxy-defaults can only have the name global. Because of this,
we support not even setting the name in the config file:

```
kind = "proxy-defaults"
```

Previously, writing this would result in the output:

```
Config entry written: proxy-defaults/
```

Now it will output:

```
Config entry written: proxy-defaults/global
```

This change follows what was done for the new Mesh config entry.
2022-10-25 10:55:15 -07:00
wenincode 64904d35da Format auth method search bar template 2022-10-25 11:55:09 -06:00
wenincode 59936ae661 Set the color to black for vault 2022-10-25 11:44:27 -06:00
Luke Kysow 9999672fd7
autoencrypt: helpful error for clients with wrong dc (#14832)
* autoencrypt: helpful error for clients with wrong dc

If clients have set a different datacenter than the servers they're
connecting with for autoencrypt, give a helpful error message.
2022-10-25 10:13:41 -07:00
wenincode 4d47dd78e7 Share code with new icons for sources select 2022-10-25 11:12:15 -06:00
Michael Klein 0c2903a730 Update hds-docs with custom utility class 2022-10-25 18:40:36 +02:00
R.B. Boyer 3c44116a8f
cache: refactor agent cache fetching to prevent unnecessary fetches on error (#14956)
This continues the work done in #14908 where a crude solution to prevent a
goroutine leak was implemented. The former code would launch a perpetual
goroutine family every iteration (+1 +1) and the fixed code simply caused a
new goroutine family to first cancel the prior one to prevent the
leak (-1 +1 == 0).

This PR refactors this code completely to:

- make it more understandable
- remove the recursion-via-goroutine strangeness
- prevent unnecessary RPC fetches when the prior one has errored.

The core issue arose from a conflation of the entry.Fetching field to mean:

- there is an RPC (blocking query) in flight right now
- there is a goroutine running to manage the RPC fetch retry loop

The problem is that the goroutine-leak-avoidance check would treat
Fetching like (2), but within the body of a goroutine it would flip that
boolean back to false before the retry sleep. This would cause a new
chain of goroutines to launch which #14908 would correct crudely.

The refactored code uses a plain for-loop and changes the semantics
to track state for "is there a goroutine associated with this cache entry"
instead of the former.

We use a uint64 unique identity per goroutine instead of a boolean so
that any orphaned goroutines can tell when they've been replaced when
the expiry loop deletes a cache entry while the goroutine is still running
and is later replaced.
2022-10-25 10:27:26 -05:00
wenincode 19e99f0188 Update icon-map to work for auth methods 2022-10-25 07:14:55 -06:00
Michael Klein bdbeb9e3f6 Use HDS utilities instead of tailwind peer details 2022-10-25 14:17:40 +02:00
Michael Klein b73e64f896 Update HDS docs 2022-10-25 14:03:31 +02:00
Michael Klein 7e4d12d8d0 Disable custom color utilities based on hds colors
We want to use the utility classes that HDS provides instead.
2022-10-25 14:03:11 +02:00
Michael Klein cbbc0036b6
Merge pull request #15113 from hashicorp/ui/fix-auto-import-public-url
ui: fix - customize ember-auto-import publicAssetURL in production
2022-10-25 13:46:11 +02:00
R.B. Boyer da70daba43
test: ensure that all dependencies in a test agent use the test logger (#14996) 2022-10-24 17:02:38 -05:00
Jared Kirschner a80a49aed9
Merge pull request #15142 from hashicorp/docs/update-changelog-vault-ca-provider-improvement
changelog: update Vault CA provider policy guidance
2022-10-24 17:35:01 -04:00
Jared Kirschner 1296ce8c4d
Merge pull request #15141 from hashicorp/docs/upgrade-vault-ca-provider-policy-guidance
docs: update Vault CA provider policy guidance
2022-10-24 17:34:43 -04:00
Jared Kirschner 0d7e2dc923 changelog: update Vault CA provider policy guidance 2022-10-24 14:26:14 -07:00
Jared Kirschner 1ac7988541 docs: update Vault CA provider policy guidance 2022-10-24 14:16:51 -07:00
Chris S. Kim 3ce522f19c Ignore ioutil linter messages 2022-10-24 16:12:08 -04:00
Chris S. Kim c2f5565f22 Remove rsyslog from CI steps
The service was never successfully running and did not fail any tests
2022-10-24 16:12:08 -04:00
Chris S. Kim ae3860b71c Fix build-date.sh reference
https://discuss.circleci.com/t/circle-working-directory-doesnt-expand/17007
2022-10-24 16:12:08 -04:00
Chris S. Kim 9f0ed81cfd Remove invalid 1xx HTTP codes
These tests started failing in go1.19, presumably due to
support for valid 1xx responses being added.

https://github.com/golang/go/issues/56346
2022-10-24 16:12:08 -04:00
Chris S. Kim bde57c0dd0 Regenerate files according to 1.19.2 formatter 2022-10-24 16:12:08 -04:00
Chris S. Kim 0aaf49fed7 Add changelog 2022-10-24 16:12:08 -04:00
Chris S. Kim 41019adf56 Update go version to 1.19 2022-10-24 16:12:08 -04:00
cskh db82ffe503
fix(peering): replicating wan address (#15108)
* fix(peering): replicating wan address

* add changelog

* unit test
2022-10-24 15:44:57 -04:00
wenincode d1019c25ce Use FlightIcon component for external sources 2022-10-24 13:39:28 -06:00
Iryna Shustava 176abb5ff2
proxycfg: watch service-defaults config entries (#15025)
To support Destinations on the service-defaults (for tproxy with terminating gateway), we need to now also make servers watch service-defaults config entries.
2022-10-24 12:50:28 -06:00
Chris S. Kim b236e86030 Move oss-only test to its own file 2022-10-24 14:17:43 -04:00
R.B. Boyer d04cf25fa8
test: fix flaky TestHealthServiceNodes_NodeMetaFilter by waiting until the streaming subsystem has a valid grpc connection (#15019)
Also potentially unflakes TestHealthIngressServiceNodes for similar
reasons.
2022-10-24 13:09:53 -05:00
R.B. Boyer 300860412c
chore: update golangci-lint to v1.50.1 (#15022) 2022-10-24 11:48:02 -05:00
Venu Yanamandra efc813e92d
Update error message when restoring ENT snapshot in OSS (#15066) 2022-10-24 11:40:26 -04:00
Jared Kirschner 61b60a79e1
Merge pull request #15028 from hashicorp/docs/auto-cert-1-13-2
Update upgrade docs for 1.13.2.
2022-10-24 11:39:29 -04:00
Michael Klein 653b390005 fix: customize eai publicAssetURL in production
The `lib/startup`-addon is used to create a custom
index.html page to boot up the app. Because this is
a custom approach and we aren't relying on setting
rootURL to a different value when running the app
in `production` we need to set `publicAssetURL`
in the configuration we pass to `ember-auto-import`.

Reference:
9a2887f1d0/docs/upgrade-guide-2.0.md (quick-summary)
2022-10-24 14:28:58 +02:00
Freddy 94ff34bbe4
Update website/content/docs/upgrading/upgrade-specific.mdx 2022-10-22 15:49:57 -06:00