Commit Graph

14580 Commits (3357e57dac9aadabd476f7a14973e47f003c4cf0)

Author SHA1 Message Date
Evan Culver 3357e57dac
[1.10.x] rpc: authorize raft requests (#10931) 2021-08-26 15:25:08 -07:00
Kenia b7a4fe0b4d ui: Hide all metrics for ingress gateway services (#10858) 2021-08-26 20:16:55 +00:00
Kenia b6cb12be96 ui: Add tests for topology metrics stats (#10600) 2021-08-26 19:17:39 +00:00
Chris S. Kim 7a635ff8e1
[1.10.x] Backport (#10811) and update vendor with new yamux version (#10929) 2021-08-26 14:35:38 -04:00
Chris S. Kim f7ce97d73c ent->oss test fix (#10926) 2021-08-26 18:07:32 +00:00
Kenia 88d8b84614 ui: Add support in Topology view for Routing Configurations (#10872) 2021-08-26 17:59:16 +00:00
Kenia 5a1b176d10 ui: Create Routing Configurations route and page (#10835) 2021-08-26 17:47:23 +00:00
John Cowen 9d18b08da3 ui: [BUGFIX] Add missing `@` to fix missing non-subset Failovers (#10913)
This commit fixes a problem where parent Failovers where not showing (subset children were fine).

Seems to have been introduced with a move/glimmer upgrade here #9154 so I'm adding a 1.9.x backport.
2021-08-26 16:02:34 +00:00
Freddy 9f3ab77242 Merge pull request #10911 from hashicorp/areas/update 2021-08-26 15:31:32 +00:00
Chris S. Kim 358a26d4cf api: expose upstream routing configurations in topology view (#10811)
Some users are defining routing configurations that do not have associated services. This commit surfaces these configs in the topology visualization. Also fixes a minor internal bug with non-transparent proxy upstream/downstream references.
2021-08-25 19:21:41 +00:00
R.B. Boyer b42bd0f2df
[1.10.x] grpc: ensure that streaming gRPC requests work over mesh gateway based wan federation (#10908)
Backport of #10838 to 1.10.x
2021-08-25 09:26:08 -05:00
Kenia f43eab3873 ui: Disabling policy form fields from users with 'read' permissions (#10902) 2021-08-25 13:43:18 +00:00
John Cowen 45ac42e0fe ui: Unskip auth-method serializer test (#10878)
During #9617 we added a list view only for AuthMethods, but not a detail view. We did add the Adapter/Serializer that collected/reshaped data for a detail view.

The test for this serializer was skipped here, but I'm not sure why.

We then added #9845 which began to use this AuthMethod Serializer, but we didn't go back to finish up the skipped test here either.

This PR unskips this test and finishes off the test correctly.
2021-08-25 11:35:30 +00:00
Freddy d7a833419e
Merge pull request #10900 from hashicorp/backport/10825-pq-san-validation 2021-08-24 14:43:18 -06:00
John Cowen 3012cd6fa3 ui: [BUGFIX] Properly encode non-URL safe characters in OIDC responses (#10901)
This commit fixes 2 problems with our OIDC flow in the UI, the first is straightforwards, the second is relatively more in depth:

1: A typo (1.10.1 only)

During #10503 we injected our settings service into the our oidc-provider service, there are some comments in the PR as to the whys and wherefores for this change (https://github.com/hashicorp/consul/pull/10503/files#diff-aa2ffda6d0a966ba631c079fa3a5f60a2a1bdc7eed5b3a98ee7b5b682f1cb4c3R28)

Fixing the typo so it was no longer looking for an unknown service (repository/settings > settings)
fixed this.

2: URL encoding (1.9.x, 1.10.x)

TL;DR: /oidc/authorize/provider/with/slashes/code/with/slashes/status/with/slashes should be /oidc/authorize/provider%2Fwith%2Fslashes/code%2Fwith%2Fslashes/status%2Fwith%2Fslashes

When we receive our authorization response back from the OIDC 3rd party, we POST the code and status data from that response back to consul via acallback as part of the OIDC flow. From what I remember back when this feature was originally added, the method is a POST request to avoid folks putting secret-like things into API requests/URLs/query params that are more likely to be visible to the human eye, and POSTing is expected behaviour.

Additionally, in the UI we identify all external resources using unique resource identifiers. Our OIDC flow uses these resources and their identifiers to perform the OIDC flow using a declarative state machine. If any information in these identifiers uses non-URL-safe characters then these characters require URL encoding and we added a helper a while back to specifically help us to do this once we started using this for things that required URL encoding.

The final fix here make sure that we URL encode code and status before using them with one of our unique resource identifiers, just like we do with the majority of other places where we use these identifiers.
2021-08-24 15:59:54 +00:00
Freddy 14db6cd75c Merge pull request #10873 from hashicorp/fix/10825-pq-san-validation 2021-08-23 19:00:30 -06:00
Nitya Dhanushkodi da3b30c18d doc: remove sentence that tproxy works cross-DC with config entries. (#10885)
It can only work if there is a running service instance in the local DC,
so this is a bit misleading, since failover and redirects are typically
used when there is not an instance in the local DC.
2021-08-23 19:15:51 +00:00
Blake Covarrubias 46f677a8f1 docs: Add common CA config options to provider doc pages (#10842)
Add the list of common Connect CA configuration options to the
provider-specific CA docs.

Previously these options were only documented under the agent
configuration options. This change makes it so that all supported CA
provider configuration options are available from a single location.

Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-08-19 12:22:18 -07:00
Mike Wickett ac44b4f580 chore: update alert banner (#10816) 2021-08-18 20:40:51 +00:00
Freddy 6db08dcf64
checks: Add Interval and Timeout to API response (#10717) (#10868)
Co-authored-by: Evan Culver <eculver@users.noreply.github.com>
2021-08-18 10:04:56 -06:00
Olatunde Alex-Oni 9cb722b418 Update documentation for enable_key_list_policy
The current suggests the option expects a string of either "enabled" or "disabled" but this results in an error `'acl.enable_key_list_policy' expected type 'bool', got unconvertible type 'string', value: 'enabled'`. Setting to a boolean value resolves this, also had a quick look at the code (d2b58cd0d6/agent/config/runtime.go (L109)) and it suggests this too
2021-08-16 20:12:09 +00:00
Mike Morris e67322083f ci: make changelog-checker only validate PR number against main base (#10844) 2021-08-16 19:41:36 +00:00
R.B. Boyer 7d484266a0 ci: upgrade to use Go 1.16.7 (#10856) 2021-08-16 17:22:01 +00:00
Kenia 54399c5394 ui: Update intention permissions notice wording (#10836) 2021-08-16 16:05:17 +00:00
Blake Covarrubias 16ce4911fa Document possible risk w.r.t exposing the admin API in Envoy (#10817)
Add a section to the Connect Security page which highlights the risks
of exposing Envoy's administration interface outside of localhost.

Resolves #5692

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Kent 'picat' Gruber <kent@hashicorp.com>
2021-08-13 17:06:45 +00:00
Daniel Nephin f7c4d6b878
Merge pull request #10847 from hashicorp/dnephin/fix-relese-1.10.x
[1.10.x] Fix the build
2021-08-13 10:42:36 -04:00
Blake Covarrubias 543aa7fb50 Document tagged addresses (#10744)
Add section for tagged addresses on service definition documentation.

Resolves #6989

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-08-12 23:50:38 +00:00
Blake Covarrubias 7612569f88 docs: Clarify ingress gateway's -address flag (#10810)
Clarify the function of `-address` flag when instantiating an ingress
gateway.

Resolves #9849

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-08-12 21:57:18 +00:00
Mike Morris dd3ff5a579
backport(1.10): deps: upgrade gogo-protobuf to v1.3.2 (#10839)
* deps: upgrade gogo-protobuf to v1.3.2 (#10813)

* go mod tidy using go 1.16

* proto: regen protobufs after upgrading gogo/protobuf

Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>

* vendor: make update-vendor

Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-08-12 17:51:10 -04:00
Daniel Nephin 36023900bd proxycfg: fix cherry-pick errors
The previous commit from main required some changes to get the tests passing.
2021-08-12 17:41:29 -04:00
Daniel Nephin b865e7c8a6 Merge pull request #10824 from hashicorp/dnephin/acl-token-bug
proxycfg: Use acl.tokens.default token as a default when there is no token in the registration
2021-08-12 21:01:14 +00:00
Mark Anderson 1140e508f3 Fixup to support unix domain socket via command line (#10758)
Missed the need to add support for unix domain socket config via
api/command line. This is a variant of the problems described in
it is easy to drop one.

Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2021-08-12 17:06:29 +00:00
Chris Piraino fd121046a4 docs: remove note on ingress gateway hosts field needing a port number (#10827)
This was necessary in older versions of Consul, but was obsoleted by
making Consul add the port number itself when constructing the Envoy
configuration.
2021-08-11 21:38:12 +00:00
Blake Covarrubias 3e8caa4c17 docs: Update code blocks across website
* Use CodeTabs for examples in multiple formats.
* Ensure correct language on code fences.
* Use CodeBlockConfig for examples with filenames, or which need
highlighted content.
2021-08-11 20:21:27 +00:00
Kenia c41b6189e8 ui: Split up the socket mode from the socket path (#10581) 2021-08-11 17:01:52 +00:00
Blake Covarrubias 005e193e55 docs: Add JSON examples to all config entries
This commit adds example JSON configs for several config entry
resources were missing examples in this language.

The examples have been updated to use the new CodeTabs resource
instead of the Tab component.
2021-08-10 22:35:12 +00:00
Blake Covarrubias b01fa1f924 cli: Fix broken KV import on Windows (#10820)
Consul 1.10 (PR #9792) introduced the ability to specify a prefix when
importing KV's. This however introduced a regression on Windows
systems which breaks `kv import`. The key name is joined with
specified`-prefix` using `filepath.Join()` which uses a forward slash
(/) to delimit values on Unix-based systems, and a backslash (\) to
delimit values on Windows – the latter of which is incompatible with
Consul KV paths.

This commit replaces filepath.Join() with path.Join() which uses a
forward slash as the delimiter, providing consistent key join behavior
across supported operating systems.

Fixes #10583
2021-08-10 21:42:52 +00:00
Blake Covarrubias b62f9a4e39 cli: Use admin bind address in self_admin cluster (#10757)
Configure the self_admin cluster to use the admin bind address
provided when starting Envoy.

Fixes #10747
2021-08-10 00:11:57 +00:00
trujillo-adam 5540de03f3 Merge pull request #10812 from hashicorp/docs-envoy-proxy-breaks-when-enabling-tls
docs: adding env var info
2021-08-09 22:59:22 +00:00
Blake Covarrubias a078fd2b8c cli: Test API access using /status/leader in consul watch (#10795)
Replace call to /agent/self with /status/leader to verify agent
reachability before initializing a watch. This endpoint is not guarded
by ACLs, and as such can be queried by any API client regardless of
their permissions.

Fixes #9353
2021-08-09 16:01:46 +00:00
Mike Morris 1125d60ea5
changelog: add KNOWN ISSUES note for streaming with mesh gateways (#10799)
* changelog: suggest use_streaming_backend=false
2021-08-05 18:04:56 -04:00
Daniel Nephin 7720275679
Merge pull request #10798 from hashicorp/dnephin/backport-txn-authz-fix
[1.10.x] acl: fix txn_endpoint to properly authorize service registrations
2021-08-05 17:53:34 -04:00
Daniel Nephin f3718c70c1 Add changelog 2021-08-05 15:45:51 -04:00
Daniel Nephin 1186e38ac6 acl: remove special handling of services in txn_endpoint
Previously we were passing an Authorizer that would always allow the
operation, then later checking the authorization using vetServiceTxnOp.

On the surface this seemed strange, but I think it was actually masking
a bug as well. Over time `servicePreApply` was changed to add additional
authorization for `service.Proxy.DestinationServiceName`, but because
we were passing a nil Authorizer, that authorization was not handled on
the txn_endpoint.

`TxnServiceOp.FillAuthzContext` has some special handling in enterprise,
so we need to make sure to continue to use that from the Txn endpoint.

This commit removes the `vetServiceTxnOp` function, and passes in the
`FillAuthzContext` function so that `servicePreApply` can be used by
both the catalog and txn endpoints. This should be much less error prone
and prevent bugs like this in the future.
2021-08-05 15:41:56 -04:00
Dhia Ayachi fe1a2f5d9b defer setting the state before returning to avoid stuck in `INITIALIZING` state (#10630)
* defer setting the state before returning to avoid being stuck in `INITIALIZING` state

* add changelog

* move comment with the right if statement

* ca: report state transition error from setSTate

* update comment to reflect state transition

Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-08-05 18:54:40 +00:00
trujillo-adam e3f751b87b Merge pull request #10763 from hashicorp/docs-proxy-integration-improvements
general language and readability improvements to proxy integration docs
2021-08-04 21:37:35 +00:00
Dhia Ayachi 2f5ce9950a fix state index for `CAOpSetRootsAndConfig` op (#10675)
* fix state index for `CAOpSetRootsAndConfig` op

* add changelog

* Update changelog

Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>

* remove the change log as it's not needed

Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-08-04 17:08:51 +00:00
Sabeen Syed 362f1c610b
Add Citrix TF module links to NIA docs (#10710) (#10764) 2021-08-04 11:45:37 -05:00
Kenia 5c8f1e6647 ui: Fix Health Checks in K/V form Lock Sessions Info section (#10767) 2021-08-04 16:42:49 +00:00
Daniel Nephin c840d9a075 Merge pull request #10601 from hashicorp/joshwolfer-patch-1
docs: link to config entries from enable_central_service_config
2021-08-03 20:36:11 +00:00