Commit Graph

14709 Commits (90b42c66fa61956cb7ce9d50595c3a9328e7e7d8)

Author SHA1 Message Date
trujillo-adam 90b42c66fa Merge pull request #10892 from hashicorp/docs-tables-service-discovery-services
Reformatting service discovery parameters into tables
2021-08-30 22:21:20 +00:00
mrspanishviking 32f7a58f82 Merge pull request #10912 from hashicorp/auto_config
docs: added information about a conflict when using auto_config and a…
2021-08-30 15:33:15 +00:00
Mike Morris d1bd04badb Merge branch 'stable-website' into backport/1.10.x-docs-updates 2021-08-28 12:29:52 -04:00
hc-github-team-consul-core c5ee56668c Merge branch 'release/1.10.2' into remote-x 2021-08-27 21:14:21 +00:00
hc-github-team-consul-core 62bc62d3c1 Putting source back into Dev Mode 2021-08-27 21:14:18 +00:00
hc-github-team-consul-core 3cb6eeedbd
Release v1.10.2 2021-08-27 19:44:05 +00:00
hc-github-team-consul-core 8ab3884ae2
update bindata_assetfs.go 2021-08-27 19:44:04 +00:00
Dustin Clifford 3885dea053 docs: Bad External VM Example (#10943)
Adds a missing `\` for continuation in the example command for
connecting an external VM client outside of Kubernetes to the Consul
server cluster.
2021-08-27 18:40:10 +00:00
Dustin Clifford 0ba7eafcee docs: Bad External VM Example (#10943)
Adds a missing `\` for continuation in the example command for
connecting an external VM client outside of Kubernetes to the Consul
server cluster.
2021-08-27 18:40:07 +00:00
Evan Culver 51fd366b43
Reset go.sum 2021-08-27 11:20:13 -07:00
Evan Culver 8546861a50
Update go.mod & go.sum correctly 2021-08-27 10:39:57 -07:00
Evan Culver 3ae445b5f3
Bump api version to v1.10.0 2021-08-27 10:32:54 -07:00
Evan Culver a377209d73
changelog: add unreleased entries for 1.10.2 (#10940) 2021-08-27 10:59:28 -04:00
Luke Kysow 7eac534335
Update helm reference (#10939)
* Update helm reference

* Fix docs issue breaking build

* Remove keys that aren't yet in the release
2021-08-26 18:03:29 -07:00
Luke Kysow abdd2bdaab
Update helm reference (#10939)
* Update helm reference

* Fix docs issue breaking build

* Remove keys that aren't yet in the release
2021-08-26 18:02:42 -07:00
Evan Culver 3357e57dac
[1.10.x] rpc: authorize raft requests (#10931) 2021-08-26 15:25:08 -07:00
Kenia b7a4fe0b4d ui: Hide all metrics for ingress gateway services (#10858) 2021-08-26 20:16:55 +00:00
Kenia b6cb12be96 ui: Add tests for topology metrics stats (#10600) 2021-08-26 19:17:39 +00:00
Chris S. Kim 7a635ff8e1
[1.10.x] Backport (#10811) and update vendor with new yamux version (#10929) 2021-08-26 14:35:38 -04:00
Chris S. Kim f7ce97d73c ent->oss test fix (#10926) 2021-08-26 18:07:32 +00:00
Kenia 88d8b84614 ui: Add support in Topology view for Routing Configurations (#10872) 2021-08-26 17:59:16 +00:00
Kenia 5a1b176d10 ui: Create Routing Configurations route and page (#10835) 2021-08-26 17:47:23 +00:00
John Cowen 9d18b08da3 ui: [BUGFIX] Add missing `@` to fix missing non-subset Failovers (#10913)
This commit fixes a problem where parent Failovers where not showing (subset children were fine).

Seems to have been introduced with a move/glimmer upgrade here #9154 so I'm adding a 1.9.x backport.
2021-08-26 16:02:34 +00:00
Freddy 9f3ab77242 Merge pull request #10911 from hashicorp/areas/update 2021-08-26 15:31:32 +00:00
Chris S. Kim 358a26d4cf api: expose upstream routing configurations in topology view (#10811)
Some users are defining routing configurations that do not have associated services. This commit surfaces these configs in the topology visualization. Also fixes a minor internal bug with non-transparent proxy upstream/downstream references.
2021-08-25 19:21:41 +00:00
R.B. Boyer b42bd0f2df
[1.10.x] grpc: ensure that streaming gRPC requests work over mesh gateway based wan federation (#10908)
Backport of #10838 to 1.10.x
2021-08-25 09:26:08 -05:00
Kenia f43eab3873 ui: Disabling policy form fields from users with 'read' permissions (#10902) 2021-08-25 13:43:18 +00:00
John Cowen 45ac42e0fe ui: Unskip auth-method serializer test (#10878)
During #9617 we added a list view only for AuthMethods, but not a detail view. We did add the Adapter/Serializer that collected/reshaped data for a detail view.

The test for this serializer was skipped here, but I'm not sure why.

We then added #9845 which began to use this AuthMethod Serializer, but we didn't go back to finish up the skipped test here either.

This PR unskips this test and finishes off the test correctly.
2021-08-25 11:35:30 +00:00
Freddy d7a833419e
Merge pull request #10900 from hashicorp/backport/10825-pq-san-validation 2021-08-24 14:43:18 -06:00
John Cowen 3012cd6fa3 ui: [BUGFIX] Properly encode non-URL safe characters in OIDC responses (#10901)
This commit fixes 2 problems with our OIDC flow in the UI, the first is straightforwards, the second is relatively more in depth:

1: A typo (1.10.1 only)

During #10503 we injected our settings service into the our oidc-provider service, there are some comments in the PR as to the whys and wherefores for this change (https://github.com/hashicorp/consul/pull/10503/files#diff-aa2ffda6d0a966ba631c079fa3a5f60a2a1bdc7eed5b3a98ee7b5b682f1cb4c3R28)

Fixing the typo so it was no longer looking for an unknown service (repository/settings > settings)
fixed this.

2: URL encoding (1.9.x, 1.10.x)

TL;DR: /oidc/authorize/provider/with/slashes/code/with/slashes/status/with/slashes should be /oidc/authorize/provider%2Fwith%2Fslashes/code%2Fwith%2Fslashes/status%2Fwith%2Fslashes

When we receive our authorization response back from the OIDC 3rd party, we POST the code and status data from that response back to consul via acallback as part of the OIDC flow. From what I remember back when this feature was originally added, the method is a POST request to avoid folks putting secret-like things into API requests/URLs/query params that are more likely to be visible to the human eye, and POSTing is expected behaviour.

Additionally, in the UI we identify all external resources using unique resource identifiers. Our OIDC flow uses these resources and their identifiers to perform the OIDC flow using a declarative state machine. If any information in these identifiers uses non-URL-safe characters then these characters require URL encoding and we added a helper a while back to specifically help us to do this once we started using this for things that required URL encoding.

The final fix here make sure that we URL encode code and status before using them with one of our unique resource identifiers, just like we do with the majority of other places where we use these identifiers.
2021-08-24 15:59:54 +00:00
Freddy 14db6cd75c Merge pull request #10873 from hashicorp/fix/10825-pq-san-validation 2021-08-23 19:00:30 -06:00
Nitya Dhanushkodi da3b30c18d doc: remove sentence that tproxy works cross-DC with config entries. (#10885)
It can only work if there is a running service instance in the local DC,
so this is a bit misleading, since failover and redirects are typically
used when there is not an instance in the local DC.
2021-08-23 19:15:51 +00:00
Nitya Dhanushkodi 457256509e doc: remove sentence that tproxy works cross-DC with config entries. (#10885)
It can only work if there is a running service instance in the local DC,
so this is a bit misleading, since failover and redirects are typically
used when there is not an instance in the local DC.
2021-08-23 19:15:48 +00:00
Zachary Shilton 12ce524dd1 Upgrade global styles (#10692)
* website: upgrade global-styles packages

* website: move community page to CSS modules

* website: replace g-container with g-grid-container

* website: hide alert-banner on mobile

* website: backfill missing global type styles

* website: fix code font-size in download custom content

* website: bump to latest patched dependencies
2021-08-20 16:21:08 +00:00
Blake Covarrubias 46f677a8f1 docs: Add common CA config options to provider doc pages (#10842)
Add the list of common Connect CA configuration options to the
provider-specific CA docs.

Previously these options were only documented under the agent
configuration options. This change makes it so that all supported CA
provider configuration options are available from a single location.

Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-08-19 12:22:18 -07:00
Blake Covarrubias 95af6ff6f3 docs: Add common CA config options to provider doc pages (#10842)
Add the list of common Connect CA configuration options to the
provider-specific CA docs.

Previously these options were only documented under the agent
configuration options. This change makes it so that all supported CA
provider configuration options are available from a single location.

Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-08-19 18:20:11 +00:00
Mike Wickett ac44b4f580 chore: update alert banner (#10816) 2021-08-18 20:40:51 +00:00
Mike Wickett 9e66894892 chore: update alert banner (#10816) 2021-08-18 20:40:49 +00:00
Freddy 6db08dcf64
checks: Add Interval and Timeout to API response (#10717) (#10868)
Co-authored-by: Evan Culver <eculver@users.noreply.github.com>
2021-08-18 10:04:56 -06:00
Olatunde Alex-Oni 9cb722b418 Update documentation for enable_key_list_policy
The current suggests the option expects a string of either "enabled" or "disabled" but this results in an error `'acl.enable_key_list_policy' expected type 'bool', got unconvertible type 'string', value: 'enabled'`. Setting to a boolean value resolves this, also had a quick look at the code (d2b58cd0d6/agent/config/runtime.go (L109)) and it suggests this too
2021-08-16 20:12:09 +00:00
Olatunde Alex-Oni f8b0b8c119 Update documentation for enable_key_list_policy
The current suggests the option expects a string of either "enabled" or "disabled" but this results in an error `'acl.enable_key_list_policy' expected type 'bool', got unconvertible type 'string', value: 'enabled'`. Setting to a boolean value resolves this, also had a quick look at the code (d2b58cd0d6/agent/config/runtime.go (L109)) and it suggests this too
2021-08-16 20:12:06 +00:00
Mike Morris e67322083f ci: make changelog-checker only validate PR number against main base (#10844) 2021-08-16 19:41:36 +00:00
R.B. Boyer 7d484266a0 ci: upgrade to use Go 1.16.7 (#10856) 2021-08-16 17:22:01 +00:00
Kenia 54399c5394 ui: Update intention permissions notice wording (#10836) 2021-08-16 16:05:17 +00:00
Blake Covarrubias 16ce4911fa Document possible risk w.r.t exposing the admin API in Envoy (#10817)
Add a section to the Connect Security page which highlights the risks
of exposing Envoy's administration interface outside of localhost.

Resolves #5692

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Kent 'picat' Gruber <kent@hashicorp.com>
2021-08-13 17:06:45 +00:00
Blake Covarrubias 1de22c78b7 Document possible risk w.r.t exposing the admin API in Envoy (#10817)
Add a section to the Connect Security page which highlights the risks
of exposing Envoy's administration interface outside of localhost.

Resolves #5692

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Kent 'picat' Gruber <kent@hashicorp.com>
2021-08-13 17:06:42 +00:00
Daniel Nephin f7c4d6b878
Merge pull request #10847 from hashicorp/dnephin/fix-relese-1.10.x
[1.10.x] Fix the build
2021-08-13 10:42:36 -04:00
Blake Covarrubias 543aa7fb50 Document tagged addresses (#10744)
Add section for tagged addresses on service definition documentation.

Resolves #6989

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-08-12 23:50:38 +00:00
Blake Covarrubias 5d8b6ab032 Document tagged addresses (#10744)
Add section for tagged addresses on service definition documentation.

Resolves #6989

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-08-12 23:50:35 +00:00
Blake Covarrubias 7612569f88 docs: Clarify ingress gateway's -address flag (#10810)
Clarify the function of `-address` flag when instantiating an ingress
gateway.

Resolves #9849

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-08-12 21:57:18 +00:00