Commit Graph

8686 Commits (54088e19e49fff67c17d78982589181562402935)

Author SHA1 Message Date
RJ Spiker feb0426eaf website - logo-grid responsive updates 2018-06-25 12:26:14 -07:00
RJ Spiker f434a30511 website - add appropriately sized assets and adjust styles 2018-06-25 12:26:14 -07:00
RJ Spiker 7fa4955545 website - a couple of text-asset component reponsive tweaks 2018-06-25 12:26:13 -07:00
RJ Spiker e61484c079 website - responsive styling for section and text/asset components 2018-06-25 12:26:13 -07:00
RJ Spiker 9879835fd9 website - some button and section updates, add home hero start 2018-06-25 12:26:13 -07:00
RJ Spiker dc06877d8f website - add g-section li styles 2018-06-25 12:26:13 -07:00
RJ Spiker 049ff5babc website - add second button to hero 2018-06-25 12:26:13 -07:00
RJ Spiker 7c3dca6225 website - cta section and button updates 2018-06-25 12:26:12 -07:00
RJ Spiker c9226fec35 website - some section component refactoring and adding code samples 2018-06-25 12:26:12 -07:00
RJ Spiker 79e882fce9 website - timeline component font-size adjustment 2018-06-25 12:26:12 -07:00
RJ Spiker 8c99c3258e website - hero bg image update 2018-06-25 12:26:11 -07:00
RJ Spiker 64218ec7af initial commit for website upgrade 2018-06-25 12:26:11 -07:00
Jack Pearkes 315cc04536 website: fix a TODO in a page description 2018-06-25 12:26:11 -07:00
Jack Pearkes 36e1dd6ffd website: note windows support 2018-06-25 12:26:10 -07:00
Matt Keeler 98e98fa815 Remove build tags from vendored vault file to allow for this to merge properly into enterprise 2018-06-25 12:26:10 -07:00
Matt Keeler 677d6dac80 Remove x509 name constraints
These were only added as SPIFFE intends to use the in the future but currently does not mandate their usage due to patch support in common TLS implementations and some ambiguity over how to use them with URI SAN certificates. We included them because until now everything seem fine with it, however we've found the latest version of `openssl` (1.1.0h) fails to validate our certificats if its enabled. LibreSSL as installed on OS X by default doesn’t have these issues. For now it's most compatible not to have them and later we can find ways to add constraints with wider compatibility testing.
2018-06-25 12:26:10 -07:00
Matt Keeler 163fe11101 Make sure we omit the Kind value in JSON if empty 2018-06-25 12:26:10 -07:00
Matt Keeler 01f82717b4 Vendor the vault api 2018-06-25 12:26:10 -07:00
Kyle Havlovitz 0b5d7277f9 website: fix example config in vault CA docs 2018-06-25 12:26:09 -07:00
Jack Pearkes e4f5753e06 bump to beta4 2018-06-25 12:26:01 -07:00
Mitchell Hashimoto 4acbe3fdf0 website: add vs. Envoy page 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto e6e984a813 website: address Armon's feedback 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto 834137fe55 website: remove redundant "as well" 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto 7ad6f7b758 website: address pearkes feedback 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto ec1322a95d website: address feedback 2018-06-25 12:25:43 -07:00
Mitchell Hashimoto 68826b2b76 website: istio vs. and nomad platform guide 2018-06-25 12:25:43 -07:00
Jack Pearkes 105c4763dc update UI to latest 2018-06-25 12:25:42 -07:00
Kyle Havlovitz 3baa67cdef connect/ca: pull the cluster ID from config during a rotation 2018-06-25 12:25:42 -07:00
Kyle Havlovitz 8c2c9705d9 connect/ca: use weak type decoding in the Vault config parsing 2018-06-25 12:25:42 -07:00
Kyle Havlovitz b4ef7bb64d connect/ca: leave blank root key/cert out of the default config (unnecessary) 2018-06-25 12:25:42 -07:00
Kyle Havlovitz 8e028b7dc6 website: add Vault CA provider doc sections 2018-06-25 12:25:42 -07:00
Kyle Havlovitz 050da22473 connect/ca: undo the interface changes and use sign-self-issued in Vault 2018-06-25 12:25:42 -07:00
Kyle Havlovitz 914d9e5e20 connect/ca: add leaf verify check to cross-signing tests 2018-06-25 12:25:41 -07:00
Kyle Havlovitz bc997688e3 connect/ca: update Consul provider to use new cross-sign CSR method 2018-06-25 12:25:41 -07:00
Kyle Havlovitz 8a70ea64a6 connect/ca: update Vault provider to add cross-signing methods 2018-06-25 12:25:41 -07:00
Kyle Havlovitz 6a2fc00997 connect/ca: add URI SAN support to the Vault provider 2018-06-25 12:25:41 -07:00
Kyle Havlovitz 226a59215d connect/ca: fix vault provider URI SANs and test 2018-06-25 12:25:41 -07:00
Kyle Havlovitz 1a8ac686b2 connect/ca: add the Vault CA provider 2018-06-25 12:25:41 -07:00
Paul Banks 51fc48e8a6 Sign certificates valid from 1 minute earlier to avoid failures caused by clock drift 2018-06-25 12:25:41 -07:00
Paul Banks e33bfe249e Note leadership issues in comments 2018-06-25 12:25:41 -07:00
Paul Banks b5f24a21cb Fix test broken by final telemetry PR change! 2018-06-25 12:25:40 -07:00
Paul Banks e514570dfa Actually return Intermediate certificates bundled with a leaf! 2018-06-25 12:25:40 -07:00
John Cowen 9f8b87cdda Check for NOT connect-proxy 2018-06-25 12:25:40 -07:00
John Cowen cc3d578271 Filter Source and Destination menus by Kind 2018-06-25 12:25:40 -07:00
Matt Keeler e22b9c8e15 Output the service Kind in the /v1/internal/ui/services endpoint 2018-06-25 12:25:40 -07:00
Paul Banks 3a6024e1b0 Fix merge error 2018-06-25 12:25:40 -07:00
Paul Banks 17789d4fe3 register TCP check for managed proxies 2018-06-25 12:25:40 -07:00
Paul Banks 280f14d64c Make proxy only listen after initial certs are fetched 2018-06-25 12:25:40 -07:00
John Cowen d61a09ea28 Fix linting typo, caused the selection of future services to break 2018-06-25 12:25:40 -07:00
Paul Banks b562b9f66a Add proxy telemetry to docs 2018-06-25 12:25:39 -07:00