Commit Graph

19374 Commits

Author SHA1 Message Date
Freddy 415e4a5012
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 18:12:25 -06:00
Freddy d47006d27e
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 18:12:13 -06:00
David Yu d714003dda
docs: update versions to include .x in release notes (#15104) 2022-10-21 16:20:24 -07:00
Freddy ccf15f4153
Merge pull request #15032 from hashicorp/docs/mgw-primary-upgrade 2022-10-21 16:52:27 -06:00
Freddy 72553b3499
Update website/content/docs/connect/gateways/mesh-gateway/wan-federation-via-mesh-gateways.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-10-21 16:43:40 -06:00
freddygv ca9df9c851 Clarify how addresses are propagated 2022-10-21 15:50:49 -06:00
freddygv 50709e60d4 Relax start version requirement 2022-10-21 15:27:39 -06:00
Freddy b9fa83b72b
Update website/content/docs/connect/gateways/mesh-gateway/wan-federation-via-mesh-gateways.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-10-21 15:17:00 -06:00
Freddy 21c6edcdc7
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:35 -06:00
Freddy 5944c28dd6
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:29 -06:00
Freddy 8c6a8f0b28
Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:22 -06:00
Jared Kirschner cc843c4be8
Merge pull request #14813 from hashicorp/docs/1-10-upgrade-compatibility-clarification
docs: clarify 1.10 upgrade compatibility
2022-10-21 16:57:23 -04:00
DanStough 0a5b238ca8 chore: update main for release/1.14.x branch 2022-10-21 15:50:51 -04:00
Iryna Shustava 2a25669b13
cli/sdk: Allow redirection to a different consul dns port (#15050) 2022-10-21 13:15:32 -06:00
Luke Kysow 44c9c9b05d
builds: fix "Killed" error with make dev (#15003)
Previously, I would sometimes get Killed errors when executing the
binary created by `make dev`. This is because we were using `cp`
and OSX has a bug where it caches the old signature and so doesn't
allow the new binary to run (see https://apple.stackexchange.com/a/428388)
2022-10-21 11:10:11 -07:00
Freddy d1868bbfd0
Merge pull request #15086 from hashicorp/peering/establish-forbidden 2022-10-21 11:36:04 -06:00
Jared Kirschner db413fcdb8 docs: clarify 1.10 upgrade compatibility 2022-10-21 10:04:52 -07:00
Tyler Wendlandt 2354c06a93
Merge pull request #15085 from hashicorp/ui/feature/net-889-prepopulate-partition-sso-login
ui: NET-889 pre-populate partition SSO login
2022-10-21 09:07:04 -06:00
Jared Kirschner db6364a68f
Merge pull request #15045 from hashicorp/docs/fix-recently-broken-links
Docs/fix recently broken links
2022-10-21 10:02:35 -04:00
Jared Kirschner 434d92c488 docs: use standard links in ent callout 2022-10-21 06:18:05 -07:00
freddygv d65e60de86 Return forbidden on permission denied
This commit updates the establish endpoint to bubble up a 403 status
code to callers when the establishment secret from the token is invalid.
This is a signal that a new peering token must be generated.
2022-10-20 17:11:49 -06:00
wenincode 88670b2a12 Remove extra partition test 2022-10-20 16:23:53 -06:00
cskh fa970a85ad
integration test: specify image name for testing dev container (#15069)
* integration test: specify image name for testing dev container

* Add todo
2022-10-20 17:12:36 -04:00
trujillo-adam 91e40195bd
Merge pull request #15080 from hashicorp/docs/fix-type-service-reg
fixed broken link/typo in service mesh reg page
2022-10-20 13:21:24 -07:00
Derek Menteer 3f2403ffe4 Update go mod file for api package. 2022-10-20 15:08:03 -05:00
Derek Menteer 9b4846ce64 Update changelog for release. 2022-10-20 15:08:03 -05:00
trujillo-adam c5f736fdab fixed broken link/typo in service mesh reg page 2022-10-20 13:00:33 -07:00
Chris S. Kim 5a02f73436
Merge pull request #15068 from hashicorp/kisunji/update-gomemdb
Update go-memdb to fix a goroutine leak
2022-10-20 14:46:53 -04:00
Chris S. Kim a7ea26192b Update expected encoding in test
go-memdb was updated in v1.3.3 to make integers in indexes sortable, which changed how integers were encoded.
2022-10-20 14:32:42 -04:00
Chris S. Kim f2209b2fbe Add changelog 2022-10-20 14:32:42 -04:00
Chris S. Kim 59f14f5e01 Update go-memdb to fix a goroutine leak 2022-10-20 14:32:42 -04:00
Chris S. Kim 052142065a
Merge pull request #15063 from hashicorp/update-redhat-tag
[CI-only] Update RedHat registry tag
2022-10-20 13:49:02 -04:00
trujillo-adam 2765f58bc7
Merge pull request #14166 from nickwales/main
Typo fix
2022-10-20 09:24:50 -07:00
Sam Salisbury 7b4da9d4f4
docker: update redhat_tag 2022-10-20 16:01:38 +01:00
Michael Klein c35556caa7
Merge pull request #15023 from hashicorp/ui/fix/token-secret-id-handling
ui: Fix token in cookie passthrough
2022-10-20 08:49:37 +02:00
Freddy 678f8b8876
Merge pull request #15065 from hashicorp/gh-15051-advertise_addr_wan 2022-10-19 18:10:56 -06:00
wenincode f0cdbb00b3 Pre-populate partition on sso login 2022-10-19 17:26:25 -06:00
freddygv 6d9be5fb15 Use plain TaggedAddressWAN 2022-10-19 16:32:44 -06:00
freddygv 8d211cc9cc Add unit test 2022-10-19 16:26:15 -06:00
cskh eae5f87002 changelog 2022-10-19 16:37:50 -04:00
cskh 058ee4fb84 fix: wan address isn't used by peering token 2022-10-19 16:33:25 -04:00
Curt Bushko 00cf1fbd44
Merge pull request #15064 from hashicorp/curtbushko/update-envoy-bootstrap
update prometheus template args
2022-10-19 16:17:42 -04:00
Curt Bushko 161273a931
Update command/connect/envoy/bootstrap_tpl.go
Co-authored-by: Paul Glass <pglass@hashicorp.com>
2022-10-19 15:52:10 -04:00
Curt Bushko cd185c4c2c update prometheus template args 2022-10-19 15:44:19 -04:00
Michele Degges 45cfb1272f
[CI-only] Update RedHat registry tag
There are a few changes being made to RedHat's registry on October 20, 2022 that affect the way images need to be tagged prior to being pushed to the registry. This PR changes the tag to conform to the new standard. 

We have other work queued up in crt-workflows-common and actions-docker-build to support the other required changes. 

This PR should be merged to `main` and all release branches on or after October 20, 2022, and MUST be merged before your next production release. Otherwise, the automation to push to the RedHat registry will not work.

----

A detailed list of changes shared from RedHat (as an FYI):

The following changes will occur for container certification projects that leverage the Red Hat hosted registry [[registry.connect.redhat.com](http://registry.connect.redhat.com/)] for image distribution:

- All currently published images are migrating to a NEW, Red Hat hosted quay registry. Partners do not have to do anything for this migration, and this will not impact customers. The registry will still utilize [registry.connect.redhat.com](http://registry.connect.redhat.com/) as the registry URL.

- The registry URL currently used to push, tag, and certify images, as well as the registry login key, will change. You can see these changes under the “Images” tab of the container certification project. You will now see a [quay.io](http://quay.io/) address and will no longer see [scan.connect.redhat.com](http://scan.connect.redhat.com/).

- Partners will have the opportunity to auto-publish images by selecting “Auto-publish” in the Settings tab of your certification project. This will automatically publish images that pass all certification tests.

- For new container image projects, partners will have the option to host within their own chosen image registry while using [registry.connect.redhat.com](http://registry.connect.redhat.com/) as a proxy address. This means the end user can authenticate to the Red Hat registry to pull a partner image without having to provide additional authentication to the partner’s registry.
2022-10-19 10:55:48 -07:00
Nitya Dhanushkodi 5e156772f6
Remove ability to specify external addresses in GenerateToken endpoint (#14930)
* Reverts "update generate token endpoint to take external addresses (#13844)"

This reverts commit f47319b7c6.
2022-10-19 09:31:36 -07:00
Tyler Wendlandt 2a9cc3f084
Merge pull request #14971 from hashicorp/ui/feature/agentless-nodes-banner
ui: agentless nodes notice banner banner
2022-10-19 09:06:46 -06:00
cskh 6a9739ad7e
chore: fix the module path to align with the code structure (#15053) 2022-10-19 10:36:35 -04:00
Michael Klein 7285a9160f Cleanup app boot by using hcp service 2022-10-19 08:34:36 +02:00
Michael Klein 14b90314e9 Encapsulate hcp related logic in service 2022-10-19 08:34:36 +02:00