R.B. Boyer
a101820c27
update changelog
2020-05-11 21:00:26 -05:00
R.B. Boyer
1efafd7523
acl: add auth method for JWTs ( #7846 )
2020-05-11 20:59:29 -05:00
Daniel Nephin
d286e8e5a0
ci: debugging for golangci-lint download failing
...
We've seen a few CI runs fail with "exit status 52". This will hopefully give us more detail about what is failing.
2020-05-11 19:54:18 -04:00
Kit Patella
58ee349a83
Merge pull request #7843 from hashicorp/oss-sync/auditing-config
...
agent/config: Fix tests & include Audit struct as a pointer on Config
2020-05-11 14:23:44 -07:00
Kit Patella
10b3478a4d
agent/config: include Audit struct as a pointer on Config, fix tests
2020-05-11 14:13:05 -07:00
Kit Patella
b5564751bf
Merge pull request #7841 from hashicorp/oss-sync/auditing-config
...
OSS sync - Auditing config
2020-05-11 13:44:38 -07:00
Kit Patella
f5030957d0
agent/config: add auditing config to OSS and add to enterpriseConfigMap exclusions
2020-05-11 13:27:35 -07:00
Chris Piraino
c21052457b
Return early from updateGatewayServices if nothing to update ( #7838 )
...
* Return early from updateGatewayServices if nothing to update
Previously, we returned an empty slice of gatewayServices, which caused
us to accidentally delete everything in the memdb table
* PR comment and better formatting
2020-05-11 14:46:48 -05:00
Chris Piraino
4d6751bf16
Fix TestInternal_GatewayServiceDump_Ingress ( #7840 )
...
Protocol was added as a field on GatewayServices after
GatewayServiceDump PR branch was created.
2020-05-11 14:46:31 -05:00
R.B. Boyer
7414a3fa53
cli: ensure 'acl auth-method update' doesn't deep merge the Config field ( #7839 )
2020-05-11 14:21:17 -05:00
Chris Piraino
74c0543ef2
PR comment and better formatting
2020-05-11 14:04:59 -05:00
Iryna Shustava
cd5a539c38
docs: add docs for configuring ACLs with external servers ( #7802 )
2020-05-11 11:26:10 -07:00
Chris Piraino
fb9ee9d892
Return early from updateGatewayServices if nothing to update
...
Previously, we returned an empty slice of gatewayServices, which caused
us to accidentally delete everything in the memdb table
2020-05-11 12:38:04 -05:00
Freddy
b3ec383d04
Gateway Services Nodes UI Endpoint ( #7685 )
...
The endpoint supports queries for both Ingress Gateways and Terminating Gateways. Used to display a gateway's linked services in the UI.
2020-05-11 11:35:17 -06:00
Kyle Havlovitz
136549205c
Merge pull request #7759 from hashicorp/ingress/tls-hosts
...
Add TLS option for Ingress Gateway listeners
2020-05-11 09:18:43 -07:00
Kyle Havlovitz
8d140ce9af
Disallow the blanket wildcard prefix from being used as custom host
2020-05-08 20:24:18 -07:00
Chris Piraino
a0e1f57ac2
Remove development log line
2020-05-08 20:24:18 -07:00
Chris Piraino
646902621b
Set default protocol to http in TLS integration test
2020-05-08 20:23:23 -07:00
Chris Piraino
26f92e74f6
Compute all valid DNSSANs for ingress gateways
...
For DNSSANs we take into account the following and compute the
appropriate wildcard values:
- source datacenter
- namespaces
- alt domains
2020-05-08 20:23:17 -07:00
Daniel Nephin
c4ad84302d
Merge pull request #7713 from hashicorp/dnephin/connect-proxy-passive-healthcheck
...
xds: Add passive health check config for upstreams (aka envoy outlier detection)
2020-05-08 15:48:50 -04:00
Daniel Nephin
5655d7f34e
Add outlier_detection check to integration test
...
Fix decoding of time.Duration types.
2020-05-08 14:56:57 -04:00
Daniel Nephin
eaa05d623a
xds: Add passive health check config for upstreams
2020-05-08 14:56:57 -04:00
Chris Piraino
429d0cedd2
Restoring config entries updates the gateway-services table ( #7811 )
...
- Adds a new validateConfigEntryEnterprise function
- Also fixes some state store tests that were failing in enterprise
2020-05-08 13:24:33 -05:00
Daniel Nephin
e60bb9f102
test: Remove t.Parallel() from agent/structs tests
...
go test will only run tests in parallel within a single package. In this case the package test run time is exactly the same with or without t.Parallel() (~0.7s).
In generally we should avoid t.Parallel() as it causes a number of problems with `go test` not reporting failure messages correctly. I encountered one of these problems, which is what prompted this change. Since `t.Parallel` is not providing any benefit in this package, this commit removes it.
The change was automated with:
git grep -l 't.Parallel' | xargs sed -i -e '/t.Parallel/d'
2020-05-08 14:06:10 -04:00
Freddy
c32a4f1ece
Fix up enterprise compatibility for gateways ( #7813 )
2020-05-08 09:44:34 -06:00
Jono Sosulska
9b363e9f23
Fix spelling of deregister ( #7804 )
2020-05-08 10:03:45 -04:00
Denislav Denov
f04966d69c
Merge pull request #7815 from hashicorp/denislavdenov-patch-1
...
Update license.mdx
2020-05-08 16:04:39 +03:00
Denislav Denov
6cb782708f
Update website/pages/docs/commands/license.mdx
...
Co-authored-by: danielehc <40759828+danielehc@users.noreply.github.com>
2020-05-08 15:51:52 +03:00
Denislav Denov
2b39b21f0f
Update license.mdx
...
Hello team,
I noticed that the reset part of the consul license command was missing in the documentation so I added it and created this PR.
2020-05-08 11:13:41 +03:00
R.B. Boyer
82379779a2
cli: oss refactors to support making the auth method CLI aware of namespace rules in enterprise ( #7812 )
2020-05-07 17:08:42 -05:00
Chris Piraino
f55e20a2f7
Allow ingress gateways to send empty clusters, routes, and listeners ( #7795 )
...
This is useful when updating an config entry with no services, and the
expected behavior is that envoy closes all listeners and clusters.
We also allow empty routes because ingress gateways name route
configurations based on the port of the listener, so it is important we
remove any stale routes. Then, if a new listener with an old port is
added, we will not have to deal with stale routes hanging around routing
to the wrong place.
Endpoints are associated with clusters, and thus by deleting the
clusters we don't have to care about sending empty endpoint responses.
2020-05-07 16:19:25 -05:00
Chris Piraino
0bd5618cb2
Cleanup proxycfg for TLS
...
- Use correct enterprise metadata for finding config entry
- nil out cancel functions on config snapshot copy
- Look at HostsSet when checking validity
2020-05-07 10:22:57 -05:00
Jeff Escalante
f0df674e07
add alert banner to website
2020-05-06 20:06:39 -04:00
Chris Piraino
5105bf3d67
Require individual services in ingress entry to match protocols ( #7774 )
...
We require any non-wildcard services to match the protocol defined in
the listener on write, so that we can maintain a consistent experience
through ingress gateways. This also helps guard against accidental
misconfiguration by a user.
- Update tests that require an updated protocol for ingress gateways
2020-05-06 16:09:24 -05:00
Freddy
b069887b2a
Remove timeout and call to Fatal from goroutine ( #7797 )
2020-05-06 14:33:17 -06:00
R.B. Boyer
59b03b18d0
update changelog
2020-05-06 15:32:27 -05:00
R.B. Boyer
56ea112908
test: make auth method cli crud test work in both oss and ent ( #7800 )
2020-05-06 15:16:50 -05:00
Kyle Havlovitz
b2a0251f66
Add a check for custom host to ingress TLS integration test
2020-05-06 15:12:02 -05:00
Chris Piraino
0c22eacca8
Add TLS field to ingress API structs
...
- Adds test in api and command/config/write packages
2020-05-06 15:12:02 -05:00
Chris Piraino
30792e933b
Add test for adding DNSSAN for ConnectCALeaf cache type
2020-05-06 15:12:02 -05:00
Kyle Havlovitz
d452769d92
Add TLS integration test for ingress gateway
...
- Pull Consul Root CA from API in order to verify certificate chain
- Assert on the DNSSAN as well to ensure it is correct
2020-05-06 15:12:02 -05:00
Chris Piraino
0b9ba9660d
Validate hosts input in ingress gateway config entry
...
We can only allow host names that are valid domain names because we put
these hosts into a DNSSAN. In addition, we validate that the wildcard
specifier '*' is only present as the leftmost label to allow for a
wildcard DNSSAN and associated wildcard Host routing in the ingress
gateway proxy.
2020-05-06 15:12:02 -05:00
Kyle Havlovitz
f14c54e25e
Add TLS option and DNS SAN support to ingress config
...
xds: Only set TLS context for ingress listener when requested
2020-05-06 15:12:02 -05:00
R.B. Boyer
db870ba92b
test: make auth method cli crud test helper ignore the default namespace ( #7799 )
2020-05-06 15:09:47 -05:00
Chris Piraino
01e89f03ea
Merge pull request #7678 from hashicorp/ingress/host-header-routing
...
Allow ingress gateways to route traffic based on Host header
2020-05-06 15:07:36 -05:00
Chris Piraino
905279f5d1
A proxy-default config entry only exists in the default namespace
2020-05-06 15:06:14 -05:00
Chris Piraino
d498a0afc9
Correctly set a namespace label in the required domain for xds routes
...
If an upstream is not in the default namespace, we expect DNS requests
to be served over "<service-name>.ingress.<namespace>.*"
2020-05-06 15:06:14 -05:00
Chris Piraino
114a18e890
Remove outdated comment
2020-05-06 15:06:14 -05:00
Chris Piraino
d8517bd6fd
Better document wildcard specifier interactions
2020-05-06 15:06:14 -05:00
Chris Piraino
45e635286a
Re-add comment on connect-proxy virtual hosts
2020-05-06 15:06:14 -05:00