Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure. https://www.consul.io
Go to file
John Cowen 75c7491224 ui: Don't default to the default namespace, use the token default namespace instead (#10503)
The default namespace, and the tokens default namespace (or its origin namespace) is slightly more complicated than other things we deal with in the UI, there's plenty of info/docs on this that I've added in this PR.

Previously:

When a namespace was not specified in the URL, we used to default to the default namespace. When you logged in using a token we automatically forward you the namespace URL that your token originates from, so you are then using the namespace for your token by default. You can of course then edit the URL to remove the namespace portion, or perhaps revisit the UI at the root path with you token already set. In these latter cases we would show you information from the default namespace. So if you had no namespace segment/portion in the URL, we would assume default, perform actions against the default namespace and highlight the default namespace in the namespace selector menu. If you wanted to perform actions in your tokens origin namespace you would have to manually select it from the namespace selector menu.

This PR:

Now, when you have no namespace segment/portion in the URL, we use the token's origin namespace instead (and if you don't have a token, we then use the default namespace like it was previously)

Notes/thoughts:

I originally thought we were showing an incorrectly selected namespace in the namespace selector, but it also matched up with what we were doing with the API, so it was in fact correct. The issue was more that we weren't selecting the origin namespace of the token for the user when a namespace segment was omitted from the URL. Seeing as we automatically forward you to the tokens origin namespace when you log in, and we were correctly showing the namespace we were acting on when you had no namespace segment in the URL (in the previous case default), I'm not entirely sure how much of an issue this actually was.

This characteristic of namespace+token+namespace is a little weird and its easy to miss a subtlety or two so I tried to add some documentation in here for future me/someone else (including some in depth code comment around one of the API endpoints where this is very subtle and very hard to miss). I'm not the greatest at words, so would be great to get some edits there if it doesn't seem clear to folks.

The fact that we used to save your previous datacenter and namespace into local storage for reasons also meant the interaction here was slightly more complicated than it needed to be, so whilst we were here we rejigged things slightly to satisfy said reasons still but not use local storage (we try and grab the info from higher up). A lot of the related code here is from before we had our Routlets which I think could probably make all of this a lot less complicated, but I didn't want to do a wholesale replacement in this PR, we can save that for a separate PR on its own at some point.
2021-07-07 10:47:24 +00:00
.changelog ui: Don't default to the default namespace, use the token default namespace instead (#10503) 2021-07-07 10:47:24 +00:00
.circleci Merge pull request #10515 from hashicorp/dnephin/fix-arm32-atomic-aligment 2021-06-30 18:01:33 -04:00
.github Merge pull request #10527 from hashicorp/rename-main-branch 2021-06-30 17:58:22 -04:00
acl acl: remove t.Parallel 2020-11-17 12:37:02 -05:00
agent Merge pull request #10539 from hashicorp/dnephin/backport-to-1.10.x 2021-07-05 12:35:56 -04:00
api Merge pull request #10473 from knusbaum/ioutil 2021-06-29 20:13:53 +00:00
bench
build-support Merge pull request #10527 from hashicorp/rename-main-branch 2021-06-30 17:58:22 -04:00
command Merge pull request #10515 from hashicorp/dnephin/fix-arm32-atomic-aligment 2021-06-30 18:01:33 -04:00
connect connect/proxy: fixes logic bug preventing builtin/native proxy from starting upstream listeners (#10486) 2021-06-24 20:03:15 +00:00
contributing Merge pull request #10527 from hashicorp/rename-main-branch 2021-06-30 17:58:22 -04:00
demo demo: Added udp port forwarding 2018-05-30 13:56:56 +09:00
grafana add readme outlining how to edit and publish 2021-01-12 14:47:11 -08:00
internal state: add a regression test for state store schema 2021-01-15 18:49:55 -05:00
ipaddr Ensure Consul is IPv6 compliant (#5468) 2019-06-04 10:02:38 -04:00
lib Move some things around to allow for license updating via config reload 2021-05-25 13:58:35 +00:00
logging improve monitor performance (#10368) 2021-06-15 16:23:20 +00:00
proto Merge pull request #10514 from hashicorp/dnephin/actually-enable-streaming 2021-06-29 16:50:02 -04:00
sdk hcs-1936: Prepare for adding license auto-retrieval to auto-config in enterprise 2021-05-24 17:21:08 +00:00
sentinel Allow users to configure either unstructured or JSON logging (#7130) 2020-01-28 17:50:41 -06:00
service_os Changes made : 2018-06-28 21:18:14 -04:00
snapshot testing: skip slow tests with -short 2020-12-07 13:42:55 -05:00
terraform terraform: remove modules in repo (#5085) 2019-04-04 16:31:43 -07:00
test hcs-1936: Prepare for adding license auto-retrieval to auto-config in enterprise 2021-05-24 17:21:08 +00:00
testrpc add testrpc.WaitForServiceIntentions to help unflake tests that manipulate intentions (#8867) 2020-10-07 14:20:25 -05:00
tlsutil Merge pull request #10490 from hashicorp/dnephin/fix-tls-for-health-check 2021-06-24 18:16:15 -04:00
types Move RPC router from Client/Server and into BaseDeps (#8559) 2020-08-27 11:23:52 -04:00
ui ui: Don't default to the default namespace, use the token default namespace instead (#10503) 2021-07-07 10:47:24 +00:00
vendor upgrade golang crypto from 0.0.0-20200930160638-afb6bcd081ae => v0.0.0-20210513164829-c07d793c2f9a (#10390) 2021-06-14 16:39:38 +00:00
version Putting source back into Dev Mode 2021-07-01 19:39:43 +00:00
website Add headings to Helm docs (#10562) 2021-07-06 18:23:49 +00:00
.dockerignore Update the scripting 2018-06-14 21:42:47 -04:00
.gitignore website: remove netlify artifacts and port missing redirects over to new format (#9601) 2021-01-21 10:16:17 -05:00
.golangci.yml xds: remove deprecated usages of xDS (#9602) 2021-02-22 15:00:15 -06:00
.hashibot.hcl hashibot: let hashibot help us more (#7281) 2020-02-19 15:30:27 +01:00
CHANGELOG.md Merge pull request #10539 from hashicorp/dnephin/backport-to-1.10.x 2021-07-05 12:35:56 -04:00
GNUmakefile Merge pull request #10527 from hashicorp/rename-main-branch 2021-06-30 17:58:22 -04:00
INTERNALS.md Add contributing dir with Config file checklist (#7017) 2020-01-14 12:24:03 +00:00
LICENSE
NOTICE.md add copyright notice file 2018-07-09 10:58:26 -07:00
README.md Merge pull request #10527 from hashicorp/rename-main-branch 2021-06-30 17:58:22 -04:00
Vagrantfile Adds a basic Linux Vagrant setup, stolen from Nomad. 2017-10-06 08:10:12 -07:00
codecov.yml Update all the references in CI and makefile to the bindata file location 2020-10-01 16:19:10 +01:00
go.mod deps: bump to consul/api v1.9.0 and consul/sdk v0.8.0 2021-06-22 13:14:05 -04:00
go.sum deps: remove go.sum pin for consul/api and consul/sdk 2021-06-22 13:16:03 -04:00
main.go Merge pull request #10338 from hashicorp/dnephin/fix-logging-indent 2021-06-03 16:21:20 +00:00
main_test.go
package-lock.json Add Algolia indexing to CI 2020-06-29 12:14:43 -04:00

README.md

Consul CircleCI Discuss

Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.

Consul provides several key features:

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Mesh/Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.