mirror of https://github.com/hashicorp/consul
SECVULN-8621_consul_api_validate_request_content_type
backport/rboyer/fix-manual-vip-writes/jointly-sweet-dingo
release/1.20.x
main
dependabot/go_modules/github.com/hashicorp/hcp-sdk-go-0.124.0
dependabot/go_modules/github.com/aliyun/alibaba-cloud-sdk-go-1.63.54
backport/docs/change-backendRefs-api-group/largely-working-woodcock
dependabot/go_modules/k8s.io/apimachinery-0.31.3
dependabot/go_modules/github.com/olekukonko/tablewriter-0.0.5
dependabot/npm_and_yarn/ui/cross-spawn-6.0.6
dependabot/npm_and_yarn/website/husky-9.1.7
dependabot/github_actions/slackapi/slack-github-action-2.0.0
SuyashHashiCorp-patch-2
SuyashHashiCorp-patch-1-1
dependabot/go_modules/go.opentelemetry.io/otel/metric-1.32.0
dependabot/go_modules/golang.org/x/oauth2-0.24.0
backport/SECVULN-8633-TOB-CONSUL24-17-Consul-configuration-allows-repeated-keys/publicly-deciding-hookworm
dependabot/npm_and_yarn/website/next-15.0.3
dependabot/go_modules/github.com/hashicorp/raft-1.7.1
dependabot/go_modules/github.com/hashicorp/go-sockaddr-1.0.7
dependabot/go_modules/github.com/hashicorp/raft-boltdb/v2-2.3.0
dependabot/go_modules/gotest.tools/v3-3.5.1
backport/docs/CE-749-remove-references-from-consul/humbly-leading-emu
release/1.18.x
release/1.19.x
release/1.15.x
backup_grafana-dashboards
dependabot/npm_and_yarn/ui/elliptic-6.6.0
release/1.18.5
release/1.15.15
release/1.19.3
release/1.20.1
dependabot/github_actions/actions/setup-go-5.1.0
dhiaayachi/fix-trustbundle-peers
zalimeni/go-work
backport/zalimeni/feature/net-1151-l7-intentions-security-fixes--api-docs-1.19
dhiaayachi/raft-wal-backend-as-default
release/1.20.0
zalimeni/feature/net-1151-l7-intentions-security-fixes--archive
backport/Suppress-CVE-2024-8096/quietly-brief-koala
dependabot/github_actions/golangci/golangci-lint-action-6.1.1
dependabot/npm_and_yarn/ui/rollup-2.79.2
zalimeni/test-ci-skips
feature/envoy-support-tlsv13
release/1.20.0-rc1
backport/fix-changelog/nearly-grown-kangaroo
bump/go-and-envoy/rc1.20
dhiaayachi/raft-wal-backend-as-default-code
NET-8983/raft-version-bump
ci/update-security-scanner-token
backport/Suppress-CVE-2024-8096/gradually-brave-ewe
zalimeni/dhiaayachi/raft-wal-backend-as-default--suggestions
b-ui/manual-backport-d3-color
SECVULN-8533-lodash-template
upgrade-1.3-dataplane-to-1.6-dataplane
ui/codemirror-lint-removal
ui/de-lint
ui/remove-jsonlint-dep
SECVULN-6892-word-wrap
dependabot/npm_and_yarn/ui/express-4.20.0
dependabot/go_modules/test/integration/consul-container/github.com/docker/docker-25.0.6incompatible
jm/ent-deps
dependabot/go_modules/test-integ/github.com/docker/docker-25.0.6incompatible
release/1.17.x
may-alignment
dependabot/go_modules/test/integration/consul-container/github.com/opencontainers/runc-1.1.14
dependabot/npm_and_yarn/ui/webpack-5.94.0
release/1.17.7
release/1.18.4
release/1.19.2
jm/release-1.18.4
release/1.16.x
jm/retract
jm/1.9-sub
jm/1.5-sub
jm/1.19-updated-go-mods
using-art-hashi
apivalidateclusters
adds-helm-docs-update-from-1-4-2-consul-k8s
NET-10719-fix-apigw-jwt-cluster-generation
temp
backport/NET-8717-Vulnerabilities-in-consul-enterprise-d3-color/accurately-normal-snipe
artifact-manifest/main/smoothly-fresh-quagga
NET-10248-consul-cross-namespace-requests-to-a-terminating-gateway-fail-with-no-healthy-upstream
revert-21572-zalimeni/update-bpa
update-to-blessed-fork-of-mapstucture
dependabot/github_actions/docker/setup-qemu-action-3.2.0
optimized-seek-prefix-watch
fix-tests
dependabot/npm_and_yarn/website/prettier-3.3.3
dependabot/github_actions/browser-actions/setup-chrome-1.7.2
release/1.19.1
backport/update-envoy/merely-stunning-doberman
NET-10288-Bump-go-to-resolve-CVE-2024-24791
backport/zalimeni/net-5622-consolidate-envoy-version-mgmt/similarly-crisp-mako
jm/bpa
backport/NET-10288-Bump-go-to-resolve-CVE-2024-24791/wrongly-optimal-lamprey
NET-10290-Bump-envoy-to-resolve-CVE-2024-39305
iradix-improved
zs.test-mdx-fixes
zalimeni/net-5622-consolidate-envoy-version-mgmt-1.18
zalimeni/net-5622-consolidate-envoy-version-mgmt-test-1.19-nightly
zalimeni/fix-nightly-branch-sourcing-get-go-version
test/zalimeni/docs-skip-mdx
test/zalimeni/docs-skip-md
smre-317/redhat-projectid
backport/docs/1-19-release-notes-fix/factually-evolving-koala
backport/docs/external-crd-fix/accurately-talented-cobra
release/1.19.0
dan/1.19.0/changelog-update
zalimeni/net-5622-consolidate-envoy-version-mgmt-test-nightly-upgrade
zalimeni/net-5622-consolidate-envoy-version-mgmt-1.17
backport/CE-577-release-notes/namely-fleet-lionfish
dans/remove-multiport-docs
backport/CE-564-external-services-crd/carefully-generous-kodiak
zalimeni/update-submodules-post-1.5.0
backport/CE-572-file-system-certificate/slowly-pure-herring
security/ui-dependency-bump
HCPCP-1619-unix-socket-host
dhiaayachi/go-toolchain
rboyer/deployer-with-v2-tproxy-bookmark
dans/test-pr-labeler
net-6706
make-codegen
art
release/1.18.2
revert-version-updates
backport/jm/ui-main/openly-ace-mole
release/1.16.8
release/1.17.5
docs/waf-page-migration
backport/zalimeni/test-bpa-0.4.1/urgently-accepted-snipe
net-8416-add-gateway-api-request-redirect-filter
zalimeni/net-9229-remove-coredns-1.16
sarah/test-license-script
sarah/test-reproducible-build
backport/zalimeni/k8s-1.4.0-docs-feedback/willingly-strong-pony
backport/zalimeni/net-9224-bump-go-1.21.10/uniquely-bold-jackal
SuyashHashiCorp-patch-1
security/auto-go-bump
backport/security-coredns-fix/1.15.x
backport/security-coredns-fix/1.16.x
backport/security-coredns-fix/1.17.x
release/1.15.12
zalimeni/test-ent-license-exclusion
zalimeni/test-ent-license-exclusion-2
zalimeni/test-ent-license-exclusion--baseline-main
zalimeni/net-9141-exclude-ce-license-ent
backport/zalimeni/upgrade-vault-remove-go-jose.v2/usually-quality-locust
backport/zalimeni/upgrade-vault-remove-go-jose.v2/extremely-feasible-rat
backport/zalimeni/upgrade-vault-remove-go-jose.v2/privately-square-walrus
dans/remove-ws-from-jira-gha
docs/krastin/nomad-for-consul
docs/manual-backport-kv-page
docs/manual-backport-for-LTS
kv-1.10.8-withlogs
ds-nd/net-9016-kvdataloss
kv-1.14.8-withlogs
jm-net-5879
backport/docs/tutorial-refresh-support/mostly-settled-alien
backport/docs/tutorial-refresh-support/yearly-integral-clam
backport/file-system-certificate/formally-top-minnow
docs/consul-ia-experiment
zalimeni/verify-docker-engine-version
zalimeni/test/main-baseline-envoy-int-tests
NET-6821-Host-Header-Rewrite
docs/add-partition-query-api
hack-hcp-integration-split
backport/david-yu-build-dockerfile/mutually-assuring-albacore
backport/david-yu-patch-3/informally-factual-colt
release/1.18.1
docs/cluster-peering-improvements
backport/add-tests-for-gw-proxy-controller/loosely-primary-crane
NET-6820-Mesh-GW-Customize-mesh-gateway-proxy-limits
jm/NET-8431
dependabot/npm_and_yarn/ui/follow-redirects-1.15.6
docs/jkirschner-hashicorp-patch-1
release/1.14.x
revert-20682-CC-7479-add-alert-to-link-to-hcp-modal-to-refresh-page
backport/david-yu-gke-autopilot/internally-sharp-thrush
proxycfg-deadlock-2
proxycfg-deadlock
zalimeni/submodules-to-go-work
sqm
backport/david-yu-cleanup-1-18/distinctly-stirring-catfish
david-yu-patch-2
backport/release/1.18.0-followup
release/1.18.0
zalimeni/no-op-test-ci-1.14
backport/zalimeni/net-6741-add-make-target-dependency-update-modules/partly-welcome-unicorn
skpratt/resource-api-support
manual-backport-1.8.0-ingress-gateway
backport/zalimeni/net-7713-v2-docs-virtual-port-ref-k8s--1.18.0
rboyer/xds-refactor
service-endpoints-id-ports
nickcellino/link-status
david-yu-v2-update
computed-gateway-routes-spike
backport/david-yu-gke-autopilot/recently-driving-dingo
backport/zalimeni/net-6741-add-make-target-dependency-update-modules/entirely-genuine-koi
jm/cc
zalimeni/dns-recurse-only-if-enabled
rboyer/proxy-configuration-cache
update-link-to-documents-from-link-to-hcp-modal
net-8075/certs-for-api-gateways
net-7986/routes-for-api-gateways
rboyer/fix-v2-testing
net-7953/adjust-computed-gateway-protos
net-7984/clusters-for-api-gateways
listener-route-spike
release/1.15.10
ashwin-michael/crd-auto-generation
release/1.17.3
release/1.16.6
backport/fix-ent-merge/enormously-close-sculpin
backport/link-to-hcp-modal-error-when-acls-disabled/severely-cool-sparrow
nicoleta/bum-envoy-on-1.15.x
nicoleta/bump-envoy-on-1.18.x
docs/consul-ia-experiment-cts-adam
nicoleta/bump-envoy
dyu/envoy-bump
johnlanda/bench
dans/NET-7910/v2-dns-enable-peering
backport/docs/lkysow/verify-outgoing/luckily-viable-anchovy
backport/docs/lkysow/verify-outgoing/sincerely-expert-buck
backport/docs/lkysow/verify-outgoing/strictly-well-sheepdog
backport/backport/remove-CONSUL_HCP_LINK_ENABLED-flag/scarcely-precise-silkworm-manual
CC-7146/hcp-link-item-in-the-nav-bar
nd/net-7510-openapi-followup-matt-poc
backport/cc-7147-link-to-hcp-modal/kindly-verified-snipe
backport/remove-CONSUL_HCP_LINK_ENABLED-flag/scarcely-precise-silkworm
resource-v1-1.18
resource-v1
backport/jjti/fix-hcp-client-logs/infinitely-decent-ibex
backport/jjti/fix-hcp-client-logs/visually-secure-spaniel
backport/jjti/fix-hcp-client-logs/happily-charmed-jawfish
backport/jjti/fix-hcp-client-logs/presently-free-roughy
backport/jjti/fix-hcp-export-logger/intensely-growing-horse
backport/jjti/fix-hcp-client-logs/commonly-desired-antelope
release/1.18.0-rc1
backport/dans/NET-6796/dns-v2-catalog-v2-ns-soa/mostly-real-ibex
eliminate-gotest.tools/v3
backport/jjti/fix-hcp-client-logs/evenly-clean-slug
backport/exported_services_cli_and_docs/rc1
backport/jm/no-parallel-dns-tests/ultimately-accurate-sponge
backport/jm/no-parallel-dns-tests/tightly-liberal-emu
backport/jm/no-parallel-dns-tests/sharply-true-tetra
backport/tauhid621_exported_services_docs_and_cli/specially-blessed-longhorn
backport/derekm/NET-7652/broadly-regular-firefly
backport/derekm/NET-7652/freely-peaceful-kit
backport/jm/no-parallel-dns-tests/willingly-adjusted-mallard
fixes/helper-text-config-entry-delete
backport/jm/endpoint-result/yearly-better-sunfish
backport/update-exported-services-compat-triggers/immensely-humble-labrador
backport/tauhid621_exported_services_docs_and_cli/normally-positive-lionfish
backport/kisunji/fix-permissive-envoy-ext/unduly-set-ram
NET-7376-consul-consul-k8s-Set-status-on-APIGateway-with-required-info-from-kubesig
backport/kisunji/fix-permissive-envoy-ext/lately-ideal-calf
hcp/expose-grpc-scada
xw/NET-5725-client-refactor
xw/NET-5725-grpc-cli-clean-up
NET-6469/add-custom-watch
ui/copy-link-mock-endpoint-to-prefixed-api
ui/fix-mock-api-endpoint
jm/gh-20360
ui/fix-tests-whoopsie
backport/krastin/vault-for-consul/factually-enough-buck
backport/krastin/vault-for-consul/clearly-main-molly
CC-7146/convert-consul-hcp-to-a-simpler-component-for-some-upcoming-changes
docs/refactor-discover-services-docs
backport/derekm/fix-cicd-docker-pull/steadily-evolved-kitten
backport/CC-7146/convert-consul-hcp-to-a-simpler-component-for-some-upcoming-changes/barely-trusting-yeti
loshz/NET-7225-peeringv2-proto-check
CC-7146/Sidebar-item-for-linking-status
local-mesh-gateway-pst
zalimeni/net-5586-support-virtual-port-xroute-dest
ron-test
traffic-permissions-cache
backport/tauhid621/exported_services_api_grpc/literally-cuddly-gecko
backport/troubleshoot-ports
docs/proposed-docs-overview-pages
release/1.17.2
release/1.15.9
NET-5090/implicit-destinations
release/1.16.5
backport/NET-3860/moderately-awake-grouse
update-version-1.17
net-6230-namespace-tp
resource-type-scope-gen
zalimeni/net-6597-upgrade-go-jose-go-oidc
fix-transparent-proxy
backport/docs/k8s-acl-fix/repeatedly-solid-cricket
NET-7014-consul-Look-up-mesh-gateway-controlling-workload-instead-of-assuming-its-identity
jm/v2-dns-v1-data-fetcher
mesh-gateway-broken-all-the-things
zalimeni/api-sdk-backwards-compat-go-version-detect
backport/jm/remove-tests-skipping/finally-romantic-anteater
backport/jm/remove-tests-skipping/typically-credible-bug
backport/jm/remove-tests-skipping/physically-enough-molly
release/1.13.x
release/1.12.x
backport/spatel/busl-2024/entirely-closing-dove
backport/spatel/busl-2024/correctly-picked-buffalo
backport/spatel/busl-2024/namely-saved-squid
backport/patch-1/arguably-special-marlin
zalimeni/use-consul-go-version-nomad-vault-int-suite
backport/zalimeni/use-go-version-file/marginally-modest-condor
backport/zalimeni/use-go-version-file/firmly-tops-chow
backport/zalimeni/use-go-version-file/sincerely-native-man
backport/krastin/vault-for-consul/noticeably-awaited-chamois
architecture-log
cc-7178-skip-flakey-test-in-navigation
ui/cc-7178-skip-flakey-test-in-navigation
backport/krastin/vault-for-consul/indirectly-mint-bison
zalimeni/check-go-max-procs
backport/jm/NET-7025/commonly-saved-glowworm
backport/jm/NET-7025/pleasantly-balanced-sole
jm/split-compatibility
backport/krastin/vault-for-consul/thankfully-big-condor
jm/NET-6941
backport/jm/NET-7025/implicitly-optimal-drum
backport/jm/NET-6944/clearly-winning-fly
backport/jm/NET-6944/subtly-adequate-gopher
backport/net-bind-service/evenly-sharp-hornet
mesh-gateway-all-the-things
backport/dyu/ubi/completely-neat-cobra
backport/dyu/ubi/optionally-content-bug
backport/dyu/ubi/ultimately-singular-leech
backport/dyu/ubi/carefully-funky-bonefish
zalimeni/tmp-show-least-request-prop-override-golden
backport/dyu/ubi/finally-growing-grub
backport/ui/CC-7062-get-back-metrics-test-with-updated-selector-upd/broadly-diverse-bear
ui/CC-7062-get-back-metrics-test-with-updated-selector-upd
tauhid621/exported_services_api
backport/add-ent-and-ce-frontend-test-runs-to-pr/painfully-outgoing-drum
backport/add-ent-and-ce-frontend-test-runs-to-pr/morally-sure-fowl
backport/add-ent-and-ce-frontend-test-runs-to-pr/similarly-new-sloth
backport/dyu/network-segments/loudly-tops-tadpole
zalimeni/enable-security-scans-release--test
backport/dyu/network-segments/specially-prepared-mammoth
backport/natemollica-nm-server-workload-telemetry-update/apparently-immune-oriole
backport/natemollica-nm-server-workload-telemetry-update/secondly-massive-kiwi
backport/natemollica-nm-server-workload-telemetry-update/hopelessly-modest-lark
kisunji/net-6230-namespace-trafperms
ui/CC-7062-get-back-metrics-test-with-updated-selector-for-draft
ui/CC-7062-get-back-metrics-test-with-updated-selector
docs/consul-ia-experiement-fdbk-1
release/1.17.1
release/1.16.4
release/1.15.8
backport/fix-role-linked-token-list/blindly-trusted-glowworm
fix/make-test-deployer
backport/docs/added-redirects-for-conf-entries-1.14.x
backport/docs/added-redirects-for-conf-entries-1.13.x
backport/docs/added-redirects-for-conf-entries
zalimeni/sanitize-slack-ci-failure-input--test
backport/releng/remove-duplicate-ubi/singularly-leading-finch
backport/docs/added-1.17-features-to-enterprise-overview
backport/releng/remove-duplicate-ubi/mainly-sterling-bulldog
backport/docs/flag-ent-features-1.17/marginally-stirred-crappie
backport/gateway-upstream-disambiguation-ce/strictly-pleasant-mule
backport/consul-collector-reduce-flush-intervals/externally-natural-pangolin
openapi
backport/NET-3860/namely-curious-iguana
backport/lorna/cc-6925/hcp-tls/monthly-correct-buck
extend-retry
backport/doc-v2-traffic-permission/jointly-top-ant
backport/jm/go-tests-notify-3/genuinely-pumped-glowworm
backport/jm/go-tests-notify-3/luckily-tough-platypus
backport/jm/go-tests-notify-3/allegedly-trusting-moose
lorna/cc-6925/1-15
nfi-poc-gotestdoc
zalimeni/skip-failure-notification-slack-on-cancel--test-skip-refactor
zalimeni/skip-failure-notification-slack-on-cancel--test-skip-latest
backport/lorna/cc-6925/hcp-tls/immensely-dear-grouper
backport/jm/go-tests-notify-3/nicely-electric-calf
dl-license
test-branch
derekm/NET-6565/release-1.15.3-wpac
config_replication_id
zalimeni/add-make-target-dependency-update-modules
backport/docs/fips-cluster-peering/repeatedly-evolved-stallion
backport/zalimeni/net-6725-fix-sidecarproxycontroller-flake/literally-on-raven
backport/zalimeni/net-6725-fix-sidecarproxycontroller-flake/primarily-logical-stingray
deepcopy-gatewaycontroller
dyu-license
backport/RELPLAT-980-license-file-updates/vertically-modern-dogfish
NET-6313/resource-list-poc
backport/kisunji/controller-test-fix/internally-artistic-buzzard
tauhid621/peer_exported_services_api
backport/ui/NET-438-add-ent-version-suffix/privately-inspired-escargot
backport/ui/NET-438-add-ent-version-suffix/actively-faithful-walleye
zalimeni/update-k8s-docs-1.17.x
kisunji/small
ui/temporary-remove-tests-which-fails-on-consul-enterprise
ui/temporary-remove-token-policy-test
backport/dhiaayachi/fix_panic_policy_delete/logically-amazed-crow
backport/dhiaayachi/fix_panic_policy_delete/publicly-pumped-tadpole
add-bind-type-policy
backport/consul-collector-reduce-flush-intervals/likely-loved-hog
ui/NET-438-add-ent-version-suffix
zalimeni/net-6600-remove-insecure-hash-use
backport/ci-remove-duplicate-test/actually-sensible-swine
NET-6416-meshgateway-acls
jm/go-tests-notify
spatel/gci-format-all-the-things
jm/go-tests-notify-2
NET-6453/skip-traffic-permission-test-on-M1
backport/docs/manage-traffic-link-fix/hardly-together-salmon
backport/sarahalsmiller-timeoutbehaviormutation/only-native-cow
backport/NET-5688-gwui-fixes/mentally-superb-prawn
backport/NET-5688-gwui-fixes/noticeably-easy-magpie
jm/split-tests
backport/integ-test-use-asserter/internally-cheerful-mullet
NET-6608
backport/jm/local-app-protocol-test/hardly-noble-aardvark
backport/nathancoleman-patch-1/ghastly-endless-lioness
backport/zalimeni/alemuro/3101-support-statefulset-pvc-retain--docs/logically-complete-krill
backport/ui/feature/make-global-read-only-policy-non-editable/instantly-hardy-chamois
backport/fix-home-link/wholly-regular-bengal
backport/rboyer/deployer-makefile/early-steady-sloth
ui/fix-home-link
jm/empty-endpoints
silent-ui-tests
backport/rboyer/fix-drift/singularly-glad-locust
release/1.17.0
nfi-cache-unit-test-results
jm/NET-6385-hack
jm/destination-tests-grpc
jm/resource-tests
controller-cache
build-darwin-ubuntu
jm/NET-5150
backport/docs/add-redirects-1.8-conf-entries/freely-grateful-camel
backport/docs/add-redirects-1.8-conf-entries/pleasantly-cunning-pig
backport/docs/add-redirects-1.8-conf-entries/illegally-driving-fawn
backport/docs/add-redirects-1.8-conf-entries/factually-relieved-flounder
backport/update-docs-for-splitting/primarily-smashing-halibut
robyer/deployer-l7-split-tests
NET-5889-absl
NET-6354
backport/docs/multi-port-v1-17-ga/hopelessly-premium-ostrich
release/1.16.3
release/1.15.7
release/1.14.11
net-5889/workloadhealth-tests
dans/that-time-dan-broke-consul
hack-cloudlink
backport/nathancoleman-patch-1/badly-pro-pug
net-6138/release/1.17.x
jm/agent-hack
jm/fix-jwt-auth-bug
jm/retry-on-connect-failure
debugging-jm/NET-6294-deepcopy
backport/docs/note-about-connect-service-upstream-env-var/lively-exciting-reptile
validate-decoded-helper
jm/NET-6294-NET-4944
backport/kisunji/ent-label-ratelimit/normally-casual-sparrow
debugging-jm/NET-6294
kisunji/ent-label-ratelimit
doc-clarify-version-format
jm/checking-changes-old
jm/move-code
ishustava/fix-agent-proxy-mgr-instantiation
backport/dhiaayachi/raft-wal-0.4.1/sadly-super-monarch
backport/jm/NET-6081/equally-complete-thrush
backport/net-4786/mesh-strict-dns/conversely-climbing-aphid
backport/jm/NET-5397/violently-choice-perch
backport/spatel/list-default-peername/endlessly-moral-krill
fix-controller-watch
backport/upgrade-to-node-18/rationally-fancy-flamingo
dhiaayachi/NET-5519-ns-bridge-2
backport/disable_envoy_check/mistakenly-mighty-glider
backport/disable_envoy_check/closely-liberal-monkfish
backport/kisunji/vault-ca-fixes/awfully-smooth-katydid
backport/kisunji/vault-ca-fixes/fully-electric-phoenix
NET-5327-consistency-docs
ui/NET-5414
backport/derekm/grpc-server-keepalive/gladly-popular-cod
backport/dyu/multi-port/greatly-musical-lab
backport/docs/multiport-hcp-update/seemingly-valid-jaybird
CC-6363/downgrade-node-for-v-1-point-15
CC-6363/downgrade-node-for-ci
backport/dyu/dns-port/typically-creative-hermit
mvincent/no-freelist-logging
backport/docs/initial-multiport-fixes/constantly-thorough-pheasant
CC-5545/upgrade-hds-packages
backport/RELPLAT-897-copywrite-bot-workarounds/likely-content-goshawk
ui/CC-6137
backport/nd/net-4931-l7/endlessly-intimate-reindeer
backport/ishustava/NET-5377-sidecar-proxy-ctrl-improvements/oddly-talented-sole
backport/ishustava/NET-3995-computed-proxy-config/slightly-cheerful-kangaroo
backport/ashwin/generate-proto-deep-copy-json-marshal/naturally-exotic-anemone
backport/dyu/dns-port/manually-light-ant
service-owner-ref
docs/release-1.17-reconcile-1
docs/1.17-docs-reconcile
backport/docs/1-17-release-notes/friendly-smiling-sailfish
docs/1-17-release-notes
add-new-golden-file-tests
backport/cthain/net-5807/vault-ca-namespace-config/miserably-factual-blowfish
jwt-multiple-virtual-hosts
backport/cthain/net-5807/vault-ca-namespace-config/heavily-rested-donkey
backport/dyu/gh-pr-workflow/definitely-relaxed-mollusk
backport/NET-4135/marginally-ultimate-sculpin
backport/NET-4135/fairly-stable-lamb
release/1.17.0-rc1
revert-19038-NET-5788-fix-ready-listeners-in-core
jm/NET-5822-test
ishustava/test-int-tests
hcp-link-config-skeleton
kisunji/1.14.x-docs-backport
backend-changes-doesnt-run-frontend-task-on-ci-test
changes-to-ui-folder-test
jm/NET-5590-xds-server
backport/docs/patch-release/constantly-teaching-giraffe
backport/fix-doc/physically-growing-doberman
v2-tproxy-container-tests
jm/NET-4931
resource-type-gen2
backport/jwt-warning-docs/completely-poetic-herring
backport/jwt-warning-docs/uniquely-organic-muskox
backport/test_skip_ci/widely-normal-platypus
backport/test_skip_ci/usually-glowing-fowl
backport/test_skip_ci/literally-cuddly-woodcock
test_ci_skip
v2-gateways-controller
stub-v2-gateways
backport/NET-5611_fix_trigger_ci/simply-relevant-foal
v2-gateways-api-proto
release/1.15.6
backport/docs/apigee-backports/deeply-active-jackal
release/1.16.2
backport/docs/note-about-connect-service-upstream-env-var/certainly-helped-horse
backport/docs/fix-k8s-crd-example-configs/naturally-capital-bobcat
release/1.14.10
docs/note-about-connect-service-upstream-env-var
backport/docs/fix-k8s-crd-example-configs/seriously-real-cricket
backport/NET-4519/annually-huge-filly
backport/NET-4519/deadly-precise-jawfish
backport/NET-4519/heavily-equal-spaniel
backport/docs/fix-broken-links-8-18/cleanly-wired-honeybee
18831-backport1.14.10
18831-backport1.16.2
18831-backport1.15.6
tagger-14
docs/rebackport-k8s-fed-req-failed-pick
update-api-version
backport/docs/k8s-federation-requirements/rapidly-resolved-doberman
revert-18796-docs/ext-authz-apigee
core-multiport-fixes
backport/catalog-deregistration-fix/grossly-lenient-treefrog
backport/catalog-deregistration-fix/optionally-blessed-cockatoo
derekm/xds-use-same-http-protocol-downstream-to-localapp
nfi-fix-go-test-check
backport/docs/ce-514-envoy-constraints/publicly-modern-sturgeon
jm/v2-examples
rebase-multiport-test-fixes
jm/explicit-based-l7
wire-up-traffic-permissions
backport/kisunji/fix-test/blatantly-prime-loon
backport/kisunji/fix-test/admittedly-valid-ray
backport/kisunji/fix-test/entirely-major-chigger
backport/kisunji/cleanup-resources/solely-moved-dodo
backport/kisunji/cleanup-resources/secondly-devoted-longhorn
backport/am-ak-patch-1/really-stirring-flounder
ishustava/NET-5580-bump-all-resource-versions
backport/16955-transfer-leader/safely-positive-bobcat
retry-timeout-e2e-test-NET-5208
stepbui1-patch-1
backport/kisunji/vault-ca-clean-unused-issuers/curiously-neat-tarpon
backport/kisunji/vault-ca-clean-unused-issuers/rapidly-smart-sunbird
backport/kisunji/vault-ca-clean-unused-issuers/hugely-eminent-monster
ishustava/multi-port-test-fixes
ishustava/v2-traffic-perms-ir-suggestions
update-node-version-to-14
backport/ui/feature/make-global-read-only-policy-non-editable/infinitely-related-hornet
backport/ui/feature/make-global-read-only-policy-non-editable/frequently-crack-mouse
fix-integ-machines
increase-maching-size
nfi-fix-test-integ-go-mod
v2-backend-ref-note
backport/spatel/emit-consul-version-periodically/kindly-close-wasp
oss-rename-trigger
jm/multi-port-integ
NET-5017-status-condition-fixes
NET-1643-66794-consul-version-in-prometheus-format-metrics-is-0
rboyer/golden-proto-json
NET-5084/TrafficPermission-WorkloadIdentity-protos
natemollica-nm-patch-2
jm/net-4941-leaf
natemollica-nm-patch-1
backport/jer/cc6039-policy-desc/adversely-sought-ladybird
backport/jer/cc6039-policy-desc/multiply-native-bird
backport/spatel/emit-consul-version-periodically/mentally-choice-bug
backport/NET-1521/conversely-romantic-dodo
v2-docstring-updates
vault-nomad-version-bump
backport/nfi-net5476-nightly-peering-integ/horribly-enough-piranha
backport-1.16-fix-snapshot-test
backport/dans/fix-snapshot-save-test/willingly-golden-leopard
backport/dans/fix-snapshot-save-test/vaguely-solid-sheepdog
backport/dans/fix-snapshot-save-test/partly-sweeping-mollusk
NET-1594-backport-1.15.x
NET-1594-backport-1.14.x
NET-1594-backport
fix-fips-build-amd
ui/copy-edits-for-built-in-policy-alert
ui/rm-intention-test-with-latency
spatel/fix-typo
johnlanda/trafficpermissionscontroller
backport/derekm/NET-4958/missing-endpoints/unlikely-positive-wildcat
NET-5147-plumbing
dhiaayachi/NET-4926-v1-ns-delete
backport/cc-4960/move-first-fetch-into-provider/informally-exciting-blowfish
backport/cc-4960/move-first-fetch-into-provider/rapidly-climbing-airedale
poc-cli-grpc
skpratt/workload-identity
jm/NET-4944-1
NET-581-Configure-Vault-namespaces-for-Connect-CA-via-Helm-Stanza
backport/cc-4960/move-first-fetch-into-provider/separately-nearby-seagull
backport/docs/fix-broken-links-8-18/conversely-gentle-swan
promtheus_consul_version
jjtimmons/backport-otel-freq-2
jjtimmons/backport-48c8a83
spatel/scope-required-in-registration
jm/delete-website
backport/jjtimmons/reduce-export-freq/hardly-generous-martin
backport/jjtimmons/reduce-export-freq/safely-frank-mudfish
backport/nightly-slack-notification/daily-rich-wren
backport/nightly-slack-notification/legally-smart-terrier
jm/NET-4944
backport/gha-concurrency/honestly-live-sailfish
backport/gha-concurrency/largely-gentle-crab
backport/gha-concurrency/mildly-great-unicorn
backport/gha-concurrency/finally-exciting-filly
backport/spatel/oss_to_ce/mentally-well-moccasin
backport/spatel/oss_to_ce/highly-moral-spider
NET-438/add-ent-version-suffix
ui/NET-438/add-ent-version-suffix
backport/fix_altdomain_dcname_overlap/loudly-definite-dingo
backport/docs/k8s-tgw-tutorial-role-id-fix/duly-known-shad
pglass/dump-aws-bearer-token
backport/docs/blake/fix-spelling-errors-aug23/partially-equal-haddock
backport/ui/bug/fix#18406/promptly-choice-goose
backport/ui/bug/fix#18406/roughly-credible-llama
backport/fix_altdomain_dcname_overlap/mistakenly-ready-hog
backport/fix_altdomain_dcname_overlap/thoroughly-daring-mule
backport/spatel/oss_to_ce/obviously-proud-fish
backport/docs/k8s-tgw-tutorial-role-id-fix/seemingly-social-chow
backport/zalimeni/net-5163-prioritize-by-locality-test/pleasantly-central-chow
backport/zalimeni/net-5163-prioritize-by-locality-test/primarily-harmless-marmoset
backport/zalimeni/net-5163-prioritize-by-locality-test/ultimately-related-drum
backport/zalimeni/net-5163-prioritize-by-locality-test/verbally-suited-aphid
backport/docs/k8s-tgw-tutorial-role-id-fix/severely-innocent-mosquito
gh-13491
gh-18096-fix-missing-ttl-value
ishustava/xds-server-v2
ishustava/sidecar-proxy-controller-tproxy
update-linux-package-license
sar-for-unit-tests
backport/compliance/license-changes/vigorously-holy-escargot
disable-flaky
backport/zalimeni/net-5217-derive-proxy-locality-from-parent-service-oss/absolutely-pumped-adder
docs-backport-fix-er
fix-flaky
rboyer/wrappedtypes
retry-flaky
release/1.14.9
release/1.15.5
backport/upgrade-testcontainer-version/pleasantly-moved-penguin
zalimeni/net-5189-fix-any-slice-handling-repeated-fields
backport/docs/add-rate-limit-ops-diagram/widely-alive-mallard
compliance/add-headers
zalimeni/try-go-workspace-submodules
release/1.16.1
backport/docs/k8s-federation-requirements/finally-lenient-cub
backport/docs/k8s-federation-requirements/friendly-prompt-jay
backport/integ-test-upgrade-test/truly-becoming-mule
backport/patch-1/tightly-endless-javelin
nfi-go-test-cache
nfi-split-lint-from-go-tests
backport/zalimeni/net-5146-bump-go-net_http-cve/externally-innocent-maggot
backport/ronald/fix-docs-typo/uniformly-teaching-martin
backport/NET-3860/uniformly-funny-pug
backport/cc-4960/hcp-telemetry-periodic-refresh/namely-joint-tarpon
backport/cc-4960/hcp-telemetry-periodic-refresh/quietly-splendid-leech
backport/mixed-service-topology/physically-large-griffon
backport/mixed-service-topology/accurately-nearby-falcon
ishustava/mesh-controller-upstream-proxy
jjtimmons/hcp-telemetry-periodic-refresh-start-up
backport/zalimeni/net-4904-bump-envoy-versions-docs/normally-endless-wren
backport/dyu/readme/globally-concise-oarfish
backport/docs/k8s-federation-requirements/surely-eminent-tomcat
poc-httpfilter
jer/ccm-read-only-squashed
wan-fed-v2
backport/docs/k8s-federation-requirements/constantly-vocal-cougar
jm/branch-filters
backport/gh-18152-members-filter-dc/firstly-ideal-maggot
backport/jer/ccm-read-only/lightly-worthy-sawfish
backport/jer/ccm-read-only/unlikely-glad-snapper
jm/fix-sw-qa
zalimeni/api-1.23.0-release
nvanthao/b-delete-config
backport/zalimeni/fix-submodule-versions-latest/thankfully-funny-colt
NET-4924_update_readme
release/1.11.x
markcv-upstreamConfig-update
backport/kisunji/NET-4766-vault-ca-bug-fix/inherently-harmless-louse
backport/kisunji/NET-4766-vault-ca-bug-fix/secondly-first-mullet
poc-alpn-glow
commontopo-better
nd/spike-proxy-state-controller
backport/kisunji/NET-4766-vault-ca-bug-fix/really-leading-tick
jm/go-testcontainers
go-action-cache
backport/docs/lkysow/prepare-dataplane-upgrade/deeply-joint-herring
backport/patch-1/briefly-merry-mantis
ishustava/authz-types
nvanthao/b-snapshot-recovery
hackathon/consul-common-errors
gotest-remote-cache
gotest-remote-cache-2
ui/ariadne/ui-changes
backport/dyu/jobs-pr-feedback/presumably-composed-wildcat
dyu/1.15-docs
ariadne/hack/backend
preetha/NET-1322
backport/dyu/jobs-pr-feedback/mildly-immune-hyena
ui/ariadne-core-ui
config-issue-616
docs/cts-zscaler-partner-guide
boxofrad/extract-type-registration
backport/patch-1/likely-next-halibut
oss-merge-pr-branch
backport/issue-17886-expose-certs/definitely-wise-sturgeon
add-peering-commontopo-tests-ci-fiddling
testingconsul-clean-up
backport/docs/config-enable-debug/conversely-positive-goblin
backport/docs/config-enable-debug/endlessly-probable-manatee
backport/docs/config-enable-debug/broadly-loving-tomcat
backport/docs/config-enable-debug/willingly-master-sloth
jm/NET-4739
update-upgrade-test-image
jm/verify-linux-fix
spatel/NET-3409-automate-goimports-on-commit-using-precommit
spatel/throwaway-gci-results-2
spatel/throwaway
spatel/throwaway-reviser-results
spatel/throwaway-gci-results
backup-windows-integration-27th-june
release/1.14.8
release/1.15.4
release/1.16.0
release/1.13.9
jm/preflight
NET-4277
windows-integration-test-envoy
code-organization
boxofrad/resource-service-client
debug-1.16-api
backport/gh-17320-update-metrics-doc/probably-promoted-lynx
backport/fix-error-msg-fmt/normally-allowed-redbird
f-reloadable-configuration-enable-debug-backup
ishustava/spike-controller-leaf-cert-watch
NET-4277-tests
backport/asheshvidyut/NET-3865/gratefully-apt-haddock
NET-4558-Address-comments-for-PR-https-github.com-hashicorp-consul-pull-15235
aahel
fix-leaf-panic
jm/acc-tests
revert-17760-backport/docs/lkysow-upgrade/scarcely-master-adder
backport/docs/jwt-auth-fixes/poorly-suited-pelican
rboyer/spike-agent-cache-watch--fork
ishustava/spike-agent-cache-watch
ishustava/spike-proxy-cfg-src-v2
docs/fix-release-notes-links
backport/docs/api-gw-k8s-add-upgrade-step-1.16/fully-suited-cattle
jm/NET-4237
boxofrad/spike-version-translation
backport/brk.chore/remove-link-format-check/promptly-aware-garfish
release/1.16.0-rc1
ui/feature/use-cut-list-item-for-services
dans/NET-3917/initial-fetch-timeout-permafix
boxofrad/spike-server-resource
release/1.15.3
backport/zalimeni/net-3900-fix-tproxy-extension-panic/slowly-blessed-moray
backport/NET-3893/container-logs/intensely-nice-boar
backport/NET-3893/container-logs/obviously-primary-sawfly
jm/ip-rate-limit-api
backport/CI-upload-upgrade-test-to-datadog/incredibly-helping-pig
jjtimmons/increase-buckets
boxofrad/spike-resource-http
backport/feature/hcp-telemetry/personally-central-caribou
zalimeni/net-3447-reintroduce-new-extension-resources
test/jjtimmons/hcp-telemetry
backport/docs/common-errors/amazingly-golden-pony
migrate-tests-to-use-slack-actions
remove-to-ingress
spatel/better-testlist-main
backport/f/metrics-collector-rename/achooo
release/1.14.7
release/1.13.8
backport/f/metrics-collector-rename/highly-clean-elf
docs/fix-broken-links-1
backport/fix-submat-view-bug/physically-stirring-zebra
backport/dans/NET-3917/default-0s-initial_fetch_timeout/fairly-fluent-drake
backport/jer/cloud-docs/briefly-adequate-filly
NET-3914-gha-upgrade-test-single-runner
NET-3914-gha-run-compat-tests-single-runner
backport/jer/cloud-docs/gratefully-stunning-frog
kisunji/subloggers
jm/test-splitting
NET-3914-gha-change-upgrade-test-small-runner-no-splitting
backport/NET-3914-fix-container-test-slow-image-build/sharply-game-mastiff
NET-3914-gha-change-upgrade-test-small-runner
backport/hans/add_new_field_to_bootstrap_config_and_push_state/primarily-sweeping-tapir
backport/hans/add_new_field_to_bootstrap_config_and_push_state/sadly-eminent-man
NET-3914-gha-resolve-the-issue-of-running-multiple-docker-container
jm/rmv-compat
jm/remove-compat-test-splitting
malizz/update-proto-imports-in-1.14.x
backport/ent-port-upgrade-tests-flatten/early-precious-treefrog
backport/kisunji/fix-flakes/formally-giving-goldfish
backport/derekm/NET-3881/health-call-loop-entfix/possibly-safe-swan
NET-2063-Implementation-API-GW-Use-XDS-primitives-instead-of-Ingress-GW-primitives
backport/derekm/NET-3881/health-call-loop/trivially-dashing-ox
backport/revert-17166-jm/remove-compat-test-splitting/reliably-lenient-roughy
backport/cc-4929-cap-socket-path/horribly-sunny-airedale
eikenb/vault-integration-testing
docs/er-404-inline-checker
backport/jm/remove-compat-test-splitting/rationally-wondrous-krill
backport/jm/remove-compat-test-splitting/honestly-outgoing-calf
backport/derekm/NET-3007/fix-peer-stream-cleanup/friendly-caring-krill
backport/jm/NET-3692/strangely-solid-owl
backport/upgrade-test-targetImage/enormously-endless-bluegill
backport/upgrade-test-targetImage/generally-guiding-horse
docs/clarify-cross-partition-mgw-export-requirement
clarify-connect-language-in-cli-help-text
backport/docs/clarify-connect-language-2/humbly-native-spaniel
backport/cc-4716-link-existing-clusters/hopelessly-full-koi
boxofrad/backend-list-by-owner
spatel/sandbox
docs/redirect-dns-docs
upgrade-test-remove-docker-login
cc-4931/nick-refactor
backport/cc-4716-link-existing-clusters/slightly-on-wren
jm/0427
jm/same-docker-compose
jm/gh-call
backport/spatel/NET-1646-add-max-ejection-percent/rarely-working-guinea
im2nguyen-patch-1
backport/docs/admin-partitions-node-scope/forcibly-bursting-kid
backport/cc-4519-collect-node-id/brightly-sharp-akita
backport/cc-4519-collect-node-id/suitably-funky-warthog
backport/docs/address-multicluster-singledc-docs/hopefully-set-mallard
kisunji/NET-2590-default-intention-policy
eikenb/matrix-integration-testing
derekm/improve-vip-lookups
jm/gha-recreation
backport/jm96441n/normalize-status-conditions/implicitly-mighty-racer
backport/loshz-patch-1/friendly-touched-killdeer
backport/raft-1.5.0-pipeline-fix/extremely-eager-chamois
backport/cp_NET-3684/mentally-fit-squirrel
docs/api-catalog-register-snake_case
no-op-ron-lint
kisunji/lintest
backport/jm/rmv-test-integrations/probably-topical-shrimp
nfi-api-client-nop-write
jm/gtsm
backport/jm/test-integrations/clearly-curious-liger
updategolangx
jm/hack-int2
backport/NET-3474/start-reporting-agent/slowly-inviting-whippet
jm/ul
test-gh-fix
sarah-test-docker-cpus
nfi-poc-unit-and-upgrade-type
nfi-poc-unit-and-upgrade
stub-api-gateway-xds
xds-native-primitives-poc
jm/hack-int
test-no-concurrency-full
test-no-concurrency
nfi-gha-fiddling
anita-upgrade-fix
NET-2029-Normalize-status-for-new-config-entry-types
hk/jm/test-integrations-fix-upgrade-test
backport/NET-3476/add-reporting-config/quickly-talented-wildcat
hk/jm/test-integrations-fix-compatibility-test
jm/test-integrations-hui-test-integ
boxofrad/controller-api-spike
jm96441n/manual-backport-dupe-parents
backport/jm/ba/sadly-tolerant-wombat
backport/jm/ba/usually-promoted-tapir
jm/success
jm/break-branch-protection
docs/vault-secrets-backend-limitations
404-checker-update
backport/jm/macos-arm64/actively-improved-dinosaur
backport/jm/deep-copy-lint-enums/gladly-fine-pegasus
backport/peering/re-establish-terminated/immensely-active-beetle
ci/main-assetfs-build
release/1.15.2
release/1.14.6
backport/jm/3372/freely-singular-dingo
backport/jm/3372/freely-intimate-gannet
acl/wait-for-token-replication-to-use-token
jer/merge-ccm-bootstrap-config
jm/3372-2
docs/intentions-refactor-docs-day-2022
spatel/pre-commit
jm/NET-3372
jm/test-split
GH-migration-add-oss-ent-builder-logic
backport/nathancoleman-patch-1/distinctly-growing-parakeet
docs/update-config-entry-ref-component
jm/NET-3394
backport/loshz/NET-3029-fix/radically-relaxing-robin
backport/loshz/NET-3029-fix/constantly-romantic-fox
backport/docs/wal-fix/certainly-romantic-parrot
docs/fix-broken-links
backport/remove-unused-are-hosts-set-check/loudly-sweet-dingo
jm/snap-restore
docs/update-content-cluster-peering
origin/markcv/update-envoy-version-doc
jm/ent-dev-migration
backport/add-query-for-namespace-lookup-when-creating-services
backport-squashing-fix-for-namespaces
NET-3059/acl-agent-api
backport/update-e2e-tests-for-namespaces/wholly-daring-porpoise
jm/snapshot-restore-tests
backport/docs_discovery_typo/jointly-happy-crane
ui/feature/ember-update-3.28.6
backport/cc-4361/hcp-metrics-bootstrap-config/manually-composed-snail
banks-patch-1
add-partitions-to-e2e-gateway-tests
backport/improve_ci_run_time/miserably-glowing-boa
backport/fix-changelog-check/blindly-pumped-shrimp
hans/ccm-playground
improve_ci_run_time
release/1.15.1
release/1.13.7
release/1.14.5
backport/fix_docs_conflict_leftovers/highly-sweet-whale
backport/NET-2292-upgrade-port-http/initially-innocent-dodo
api-gateway-ui
docs/sentence-case-titles
backport/dans/NET-1757/access-logs-docs/only-definite-polecat
backport/more-xds-races-and-panics/visually-tidy-crow
ui/chore/upgrade-ember-3-28
release/1.15.0
backport/brk.fix/update-links-for-developer/reasonably-choice-vulture
backport/patch-1/actually-sharing-chigger
backport/patch-1/easily-cheerful-dingo
backport/patch-1/socially-better-stork
backport/patch-1/verbally-glad-killdeer
wal-docs
spatel/NET-1847-repro
backport/kisunji/fix-flakes/honestly-bright-dove
backport/kisunji/fix-flakes/firstly-desired-dove
locality-aware-routing
stable-website
backport/operator-usage-docs/definitely-curious-gecko
envoy-ext-local-ratelimit-fix
temp-branch
dyu/dockerfile
troubleshoot/changelog
x/wal
eikenb/cloudfoundry-vault-provider-auth
NET-1723/append-rules
api-gateway-sds-fixes
releng-329
proxycfg/init-local-gateways-map
gateways/typed-status-regen
backport/patch-1/severely-ruling-mouse
backport/patch-1/legally-massive-flounder
gateway-listener-binding-bugfix
backport/envoy-bootstrap-log-fix/infinitely-communal-midge
errors/acl-agent-token-not-set
checkpoint_telemetry_poc
bug-service-defaults-override-by-proxy-defaults
jm-plug
jm-plug-git
api-gateway-all-controllers
routes-controller
jm-plug-http
docs/jeff-sandbox
backport/envoy-bootstrap-logging/enormously-outgoing-martin
jm/plug
NET-2088-upgrade-test-ingress-gateway
spatel/post-release-fixups
backport/licensing-exp-v2-docs/optionally-allowed-whippet
backport/docs/scale-typo/mostly-verified-werewolf
backport/docs/scale-typo/early-set-drum
backport/docs/page-descs-for-CLI/implicitly-precious-calf
backport/docs/page-descs-for-CLI/early-ample-basilisk
backport/danielehc-fix-filter-links/cleanly-humble-mole
backport/danielehc-fix-filter-links/vaguely-welcome-jawfish
release/1.12.9
release/1.13.6
release/1.14.4
test-prepare
backport/docs/nrichu-hcp-doc-patch/jolly-poetic-rat
errors/acl-not-found-bootstrap-not-exist
backport/docs/amb.migrate-link-formats/adversely-helping-troll
backport/docs/amb.migrate-link-formats/jointly-renewed-dolphin
backport/docs/amb.migrate-link-formats/thoroughly-obliging-trout
backport/docs/amb.migrate-link-formats/truly-supreme-hagfish
backport/docs/amb.migrate-link-formats/usually-sweeping-panda
luoxuan00733-patch-1
backport/ashwin/use-prxoy-health-docs/uniformly-new-cattle
b/scada-retry-disconnect
container-test-speedup
docs/rework-service-splitter-ref-docs
docs/rework-service-splitter-ref-docs-no-objects
docs/consul-k8s-upgrade
backport/ashwin/envoy-readiness/cleanly-supreme-poodle
backport/ashwin/envoy-readiness/visually-warm-sunfish
dans/fic-https-basic-test
backport/patch-1/noticeably-desired-seal
NET-1728/remove-docs-with-token-param
backport/docs/fix-bad-links-service-defaults-ref/evenly-causal-buzzard
backport/docs/fix-bad-links-service-defaults-ref/supposedly-selected-arachnid
backport/docs/fix-bad-links-service-defaults-ref/hardly-related-llama
skpratt/acl-error-debug
experiment/raft-grpc
NET-1805-upgrade-test-grpc
RELENG-305
docs/krastin/connect-serviceintentions-fixlinks
skpratt/acl-controller-test
fix-failing-linting-test
hcp-LastContact
remove-legacy-acl-vestiges
docs/peer-in-dns-lookups
NET-1805-cleanup-test-container-lib-basic-topology-single-dc
NET-1530-set-envoy-ext-rate-limit-plugin
backport/docs/update-consul-k8s-nginx-ingress-controller-example/sadly-inviting-pika
fix-protobuf-generation
backport/set-product-version/enormously-glad-titmouse
backport/set-product-version/instantly-direct-kitten
backport/set-product-version/infinitely-awaited-halibut
remove-legacy-acl-endpoints-cli
jm/hack
backport/update-apigw-version/commonly-noted-vervet
backport/update-apigw-version/annually-renewing-whippet
backport/docs/peering-api-update/amazingly-chief-mosquito
backport/patch-1/formally-happy-dane
sp/better-make-help
docs/k8s-0-49-helm-docs
vault-compatability-consul-pki-token
backport/vault-compatability-consul-pki-token/terribly-grand-tetra
backport/vault-compatability-consul-pki-token/usefully-ethical-kiwi
backport/vault-compatability-consul-pki-token/incredibly-discrete-lamprey
backport/vault-compatability-consul-pki-token/arguably-cool-silkworm
backport/vault-compatability-consul-pki-token/lightly-arriving-cattle
dans/fix-compat-test-access-logs
release/1.14.3
release/1.13.5
release/1.12.8
ingress-gw-tracing-config
a10-thunder-adc
cts-pan-ngfw
jm/mock-handler
malizz/NET-1663/fix-bug
jm/mock-handler-2
windows-preview
fix-flaky-peerstream-test
backport/docs/enterprise-feature-table/recently-upright-lemur
backport/docs/admin-partitions-link-k8s/trivially-excited-jaybird
update-go-1.18.9-rboyer
update-golang-x-libs
dans/make-peer-name-uniform
backport/docs/clarify-vault-ca-provider-permissions-needed/optionally-hardy-emu
mktg-tf-b183f7b50da4e35426c936006092c7b3
server-rate-limit/multilimiter-lock
eculver/verifications
release/1.14.2
release/1.13.4
release/1.12.7
kisunji/NET-1396-token-self-expanded
backport/ishustava/1.14-agentless-docs-updates/internally-star-beetle
server-rate-limit/mock-handler-2
backport/fix-gRPC-limit-peering/especially-premium-asp
NET-685-rate-limiting-to-registering-imported-services
test-go-build-cache
release/1.14.1
backport/docs/cluster-peering-parameter-fixes/yearly-flowing-arachnid
add-downstream-service-meta
backport/docs/k8s-1-14-releasenotes/widely-organic-wahoo
jm/multilimiter-memdb
docs/update-loglevel-trace
backport/docs/admin-partitions-114-update/correctly-enough-shad
backport/docs/dyu-compat-matrix/positively-funky-dory
backport/patch-1/correctly-cheerful-anchovy
docs/fix-broken-markdown-link
backport/david-yu-ubi/curiously-cunning-meerkat
backport/david-yu-ubi/publicly-loving-bluejay
backport/david-yu-ubi/secretly-balanced-rodent
nd/update-compat
release/1.14.0
backport/broken_links/evidently-improved-starfish
backport/broken_links/lately-faithful-falcon
backport/broken_links/regularly-living-monitor
backport/import-filter-v2
backport/import-filter
eculver/enable-arm-verifications
dans/skaffold-experiment
boxofrad/better-vault-error-logging
xds/cds-ack
backport/fix-unremoved-service-mesh-gateway/primarily-growing-wren
backport/kisunji/update-hcp-scada-provider/socially-wise-silkworm
backport/proxy-register-port-race-2/deeply-warm-man
backport/proxy-register-port-race-2/hugely-whole-hippo
cluster-peering-partitions
consul-vs-comp
backport/fix-issuer-growing-list-maybe-from-vault/barely-still-aardvark
backport/fix-issuer-growing-list-maybe-from-vault/blindly-adequate-bluebird
backport/fix-issuer-growing-list-maybe-from-vault/uniquely-master-falcon
origin/markcv/CSEP-157/duplicate-sidecar-port-validation
backport/fix-integ-flakiness/accurately-cunning-cardinal
backport/fix-integ-flakiness/precisely-simple-quagga
dependabot/go_modules/github.com/aws/aws-sdk-go-1.44.128
dans/NET-1154/persist-ca-updates-in-peering
nd/bring-back-peering-ext-addr
backport/nathancoleman-patch-1/instantly-premium-sturgeon
skpratt/test-coverage-report-ci
backport/raft-fix-nonvoter/evenly-pro-cod
skpratt/temp-debug
backport/docs/auto-cert-1-13-2/constantly-above-turtle
backport/docs/mgw-primary-upgrade/poorly-sincere-rattler
backport/docs/1-10-upgrade-compatibility-clarification/distinctly-relaxing-snail
backport/docs/1-10-upgrade-compatibility-clarification/gradually-united-polecat
docs/fix-ent-dns-service-lookup-link
backport/main/strangely-tops-wombat
release/1.13.3
release/1.12.6
release/1.11.11
backport/chore-fix-module-name/fully-giving-hagfish
backport/update-ent-license-link/exactly-bold-hyena
docs/auto-cert
kisunji/fix-golden
lkysow/service-not-exist
fix-agent-cache-leak-3
docs/misc-fixes
eculver/stable-website/latest-envoy-support
remove-deprecated-peering-fields
backport/docs/new-vault-connect-ca-permissions-needed/miserably-fun-drum
backport/docs/new-vault-connect-ca-permissions-needed/happily-knowing-sponge
backport/nathancoleman-patch-1/lightly-intimate-labrador
backport/docs/invoke-services-from-lambda/vigorously-generous-treefrog
backport/docs/invoke-services-from-lambda/severely-useful-katydid
backport/fix-flaky-integ-test-ingress/preferably-feasible-rattler
backport/fix-flaky-integ-test-ingress/noticeably-unified-dane
backport/fix-flaky-integ-test-ingress/commonly-strong-cow
release/1.14.0-beta1
backport/docs/clarify-license-behavior-on-restart/morally-ready-monkey
backport/malizz-validate-name-on-dlt-proxy-defaults/seriously-eager-werewolf
ui/chore/upgrade-327
backport/docs_update_helm_docs_vault_synccatalog/fairly-saved-filly
backport/docs/capigw-typos-usage/socially-needed-dodo
backport/krastin/website/telemetry-labels/duly-firm-toucan
gh-maxconnections-ingress-gateway
release/1.13.2
backport/patch-1/primarily-infinite-asp
release/1.11.10
release/1.11.9
release/1.12.5
backport/docs/fix-api-landing-page-typos/curiously-eminent-quail
backport/docs/fox-peering-metrics-labels-table/quietly-ready-louse
backport/docs/fox-peering-metrics-labels-table/conversely-capital-yak
backport/docs/fix-node-lookup-by-removing-tag/moderately-brave-barnacle
fix-peering-2-partitions
docs/update-faq-header
backport/docs/search-metadata-headers/supposedly-eternal-ox
grpc-tls-compat
backport/docs/what-is-consul-devdot-update/mutually-pleasing-insect
propogate-request-time-downstream
backport/dev-portal/largely-exact-worm
docs/api-overview-devdot
mathew.estafanous/dev
docs/update-storage-class-ref-arch
backport/docs/use_values_yaml_everywhere/clearly-frank-bonefish
backport/docs/use_values_yaml_everywhere/broadly-pro-possum
NET-801-add-internal-endpoint-to-return-peer-stream-health-from-peerstream-tracker
use_values_yaml_instead_of_config_yaml
backport/docs/capigw-tech-spec-update/explicitly-renewing-badger
backport/docs/capigw-tech-spec-update/formerly-awaited-elf
api-gw-docs-broken-link
NET-818-server-cert
ui/feature/has-peerings-class
backport/krastin/docs/improve-license/mostly-polite-turtle
NET-800-add-internal-endpoint-to-return-all-exported-services-to-a-given-peer
ui/bugfix/notfound-t
dns-srv-separate-tag-from-protocol
backport/gh-14341-txn-struct/randomly-noted-piglet
add-linter-net-rpc-r2
ui/scratch/ci-stuff
lkysow/windows-tests
backport/peering/term-delete/thoroughly-tough-snipe
replace-learn-links
remove-references-to-consul-connect
backport/docs/crossref-maint-mode-from-health-checks/explicitly-renewed-owl
release/1.10.x
consul-docs-ia-redesign-v2
eculver/oss-ent/new-params
backport/fix-merge-config-entry/badly-eternal-bonefish
backport/fix-merge-config-entry/carefully-open-stingray
backport/ashwin/cluster-peering-helm-docs/curiously-legible-drum
max-jitter
backport/dev-portal/thoroughly-enabling-kid
backport/eculver/update-nomad-integ-tests/nicely-fresh-bullfrog
backport/eculver/update-nomad-integ-tests/needlessly-saved-collie
kisunji/kv-docs-fix
backport/api-gateway-install-redirrects/wholly-one-sunbird
RELTOOL-20
kisunji-patch-1
release/1.13.1
kisunji/peering-bugfix-changelog
ignore-exported-prefix-on-cluster-metrics
boruszak/docs-stable-merge
release/1.12.4
release/1.11.8
backport/ashwin/recreate-token-docs/virtually-new-koi
catalog-service-list-filter
leadership-transfer-cmd
ui/node-engine
backport/kisunji/nomad-docs/weekly-hip-starling
backport/kisunji/nomad-docs/hugely-concise-crawdad
release/1.13.0
backport/consul-er-add-service-discovery-seo-doc/notably-social-koala
backport/kisunji/peering-tproxy-docs/truly-dominant-sawfly
kisunji/1.13.x-docs-cherrypick
docs/cluster-peering-beta
consul-docs-ia-redesign
backport/1.13.x/api-gw-docs
sa-restructure-documentation
fix-deregister-url-service-id
shutdown-test-agents
terminating-gateway-service
backport/nia/docs-0.7.0/rarely-dear-finch
terminating-gateway-service-base
backport/jkirschner-hashicorp-patch-1/reasonably-devoted-pheasant
ishustava/dns-proxy-poc
backport/ashwin/peer-count-metric/greatly-many-chimp
acpana/nonuser-peering-reg-3
backport/docs/remove-comparisons-from-ref-docs/definitely-direct-hyena
docs/cli-characteristics-and-crossref
test-linter
docs/clarify-network-area-mesh-gw-compatibility
backport/partition-cli-acl-info-and-api-crossref/hopefully-able-urchin
backport/david-yu-agent-latency-requirements/severely-ready-raccoon
backport/nicoleta-k8s-annotations/shortly-rested-duckling
backport/docs/deemphasize-token-query-param/reasonably-amusing-impala
backport/jkirschner-hashicorp-patch-3/seriously-living-squirrel
ui/scratch/empty-w-route
ui/scratch/empty
backport/docs/single-dc-multi-k8s/weekly-humorous-cricket
acpana/clean-peer-2
dstough/CSLC-130-restrict-terminating-gateway-access-to-tls
backport/jm/vault-docs-redesign/indirectly-logical-monitor
backport/support-fossa-scanning/externally-darling-dane
backport/support-fossa-scanning/actually-nearby-bream
backport/support-fossa-scanning/allegedly-fleet-donkey
backport/support-fossa-scanning/separately-exact-marlin
doc-fix-missing-fed-methods
release/1.12.3
release/1.10.12
release/1.11.7
backport/tgate-http2-upstream/merely-civil-mouse
backport/dns-parititon-docs/certainly-real-vulture
docs/cluster-peering-updates
backport/docs/fix-consul-ecs-tf-path/cleanly-happy-newt
docs-cluster-peering-technical-preview
backport/docs/correct-1.10.x-upgrade-path/hardly-ultimate-leopard
acpana/peering-imported-counter
more-lambda-docs-tweaks
acpana/no-19-metrics
backport/eculver/fix-pkg-name/firmly-holy-sole
backport/eculver/fix-pkg-name/mainly-modern-elk
CSLC-91-egress-connect-proxy-2
CSLC-91-egress-connect-proxy
eculver/missing-docs-changes
backport/david-yu-patch-2/nominally-viable-squirrel
backport/david-yu-patch-2/correctly-eternal-hamster
catalog_node_watch_fix
backport/david-yu-docs-cluster-peering/poorly-flying-leopard
david-yu-cluster-peering-docs-1-12
dyu-cluster-peering-fix-1-12
kisunji/temp
backport/docs/capigw-0.3/carefully-sharp-rattler
backport/docs/capigw-0.3/correctly-peaceful-muskrat
peering-upstream-annotation
release/1.13.0-alpha2
backport/david-yu-log-level-error/lightly-polite-porpoise
backport/david-yu-log-level-error/quickly-helping-ghoul
eculver/1.13.0-alpha1-changelog
backport/correct-redhat-tags/humbly-central-cricket
backport/correct-redhat-tags/promptly-intense-dodo
backport/correct-redhat-tags/sadly-deep-tiger
kisunji/serveraddrs-generate-token-req
release/1.13.0-alpha1
release/1.13.0-techpreview1
dstough/acl-for-destinations
fix-lambda-docs-spacing-bug
lambda-beta-docs
backport/dstough/fix-metrics-false-positive/ghastly-up-mole
backport/dstough/fix-metrics-false-positive/implicitly-integral-leech
backport/ui/feature/hcp/absolutely-mighty-mastiff
jkirschner-hashicorp-patch-2
backport/ma/vault-namespace-intermediate-provider-v2/positively-unified-aardvark
eculver/1.12.x/latest-changelog
ui/feature/fault-tolerance-link
release/1.12.2
CSLC-103-egress-gtwy-cert-tgtwy
fix_k8s_helm_docs_june
dstough/test-endpoint-service-query
backport/gh-13169-show-leader-metrics/fairly-worthy-redbird
backport/gh-13169-show-leader-metrics/formally-pleasing-pigeon
backport/gh-13169-show-leader-metrics/inherently-wealthy-lab
backport/gh-13169-show-leader-metrics/legally-winning-joey
backport/update_docs_multicluster_k8s/admittedly-decent-grubworm
backport/update_docs_multicluster_k8s/hideously-epic-tiger
kisunji/1.12.x-revert-pathescape
backport/dstough/add-noop-jobs-for-branch-protect/wildly-tight-ladybird
backport/dstough/add-noop-jobs-for-branch-protect/formerly-moving-monkey
backport/dstough/add-noop-jobs-for-branch-protect/uniformly-ideal-stallion
oss-merge-v2
backport/dstough/GH-12628-multiple-https-ingress-services/distinctly-charming-stork
backport/dstough/GH-12628-multiple-https-ingress-services/yearly-accepted-pipefish
lambda-docs
release/1.12.1
release/1.11.6
release/1.10.11
ui/scratch/side-app-example
fix-entpoint-get-500
fix-cherry-pick
backport/CTIA-5-gh-12578-endpoint-returns-500-instead-of-404/reliably-dear-hen
backport/CTIA-5-gh-12578-endpoint-returns-500-instead-of-404/partly-liberal-bluegill
backport/CTIA-5-gh-12578-endpoint-returns-500-instead-of-404/merely-optimum-wahoo
CTIA-8-verify-builds-v2
backport/ui/bugfix/icon-tweaks/wrongly-quick-sunbird
backport/jm/0.44.0/wholly-saving-flea
backport/upstream-oss-merge/briefly-guided-quagga
dstough/GH-11250-system-ca-for-tgateways
backport/dev-image-publishing/willingly-literate-stag
kisunji/grpc-native-balancer
kisunji/merge-stable-website
backport/docs-nomad-ent/scarcely-thorough-anteater
backport/docs-nomad-ent/only-touched-mutt
backport/docs-nomad-ent/cheaply-guiding-sloth
release/1.9.x
david-yu-admin-partitions
kisunji/catalog-service-list-filter
ua-test/conflict-1
release/1.12.0
backport/nia/beta-docs-0.6.0/actively-tidy-mantis
backport/nia/beta-docs-0.6.0/evenly-humble-ray
backport/consul-k8s-docs-typo/firstly-present-hawk
backport/consul-k8s-docs-typo/largely-liked-badger
david-yu-edit-pr
backport/david-yu-enterprise-image/noticeably-brave-man
backport/david-yu-enterprise-image/wholly-welcome-platypus
vanphan24-patch-1
backport/docs/remove-empty-codeblockconfig-elements/severely-merry-newt
backport/docs/remove-empty-codeblockconfig-elements/daily-viable-oryx
backport/david-yu-admin-partitions/gradually-open-octopus
backport/david-yu-admin-partitions/deeply-fair-quagga
backport/david-yu-admin-partitions/eminently-awaited-porpoise
backport/david-yu-admin-partitions/typically-fast-shark
backport/david-yu-admin-partitions/jointly-ready-mole
docs-day
backport/docs/update-acl-docs/locally-happy-wasp
backport/docs/update-acl-docs/publicly-up-pony
docs/cli-breakout-positional-args
backport/docs/uri-decode-resource-names-for-http-api/early-neat-pipefish
backport/docs/uri-decode-resource-names-for-http-api/fairly-busy-mouse
backport/docs/consistency-mode-improvements/annually-united-iguana
backport/docs/consistency-mode-improvements/willingly-sterling-bluegill
backport/docs/consistency-mode-improvements/slowly-mint-bull
backport/docs/consistency-mode-improvements/implicitly-smart-jaguar
backport/docs/consistency-mode-improvements/mildly-wanted-slug
backport/docs/consistency-mode-improvements/nationally-key-swan
backport/david-yu-admin-partitions/officially-charming-orca
backport/david-yu-k8s-install-helm/trivially-intimate-aardvark
backport/david-yu-k8s-install-helm/normally-cool-fish
backport/david-yu-k8s-install-helm/notably-thorough-crow
backport/docs/redirect-acl-system-page/rapidly-awaited-bluegill
backport/docs/redirect-acl-system-page/similarly-smiling-kodiak
backport/docs/clarify-snapshot-restore-version-restriction/blindly-sure-buffalo
backport/docs/clarify-snapshot-restore-version-restriction/firstly-endless-eagle
dstough/gateway-linked-endpoint
backport/patch-1/humbly-helpful-poodle
backport/patch-1/loudly-up-hippo
backport/ma/x-forwarded-client-cert-docs-fix/extremely-definite-shark
backport/ma/x-forwarded-client-cert-docs-fix/repeatedly-fluent-filly
kisunji/replace-registry-pattern
retry-join-timeout
backport/docs/restore-missing-config-content/curiously-evolving-snail
backport/add-release-config-key/gradually-wanted-trout
backport/add-release-config-key/lightly-sterling-mongrel
backport/add-release-config-key/mentally-equal-wallaby
ui/bugfix/spelling
ma/vault-namespace-intermediate-provider
FFMMM-patch-1
backport/docs/restore-missing-config-content/eminently-definite-tick
lkysow/consul-plugin-exec
add-peering-changes
debug-sdk
japple/cherry-pick-1.11.x-release-notes
japple-rel-notes-reorg
kisunji/approval-button
jm-client-timeout
add-linter-net-rpc-2-test
ma/backport-stable-website
kisunji/merge-test
kisunji/temp-rpc-deadline
udp-check
jm/client-timeout-2
jm/client-timeout
dyu-relnotes
eculver/verify-release-artifacts
rboyer/add-linter-net-rpc
grpc-envoy-bootstrap-params-oss-test
consistent-error-handling
fix-syslog
eculver/envoy-1.21.1
release/1.9.17
release/1.10.10
release/1.11.5
jm/hcp-vault
docs/vault-connect-ca-namespace-improvements
jm/vault-wan-fed
community-12079
jm/test
jm/vault-wan-fed-2
jm/vault-gossip
fix-lambda-l7-routing
kisunji/pin-circleci-docker-version
eculver/auth-method-docs
docs/clarify-crd-tutorial
ma/move-enterprise-meta-try2-oss
release/1.12.0-beta1
jm/helm
clly/upgrade-vault-api
jm/helm-updates
release/1.8.x
evrowe-consul-ui-readme-update
backport/patch-1/forcibly-shining-javelin
backport/patch-1/properly-polished-condor
feature-negotiation-grpc-api
boxofrad/autoreload-merge
kisunji/cache-fix-test
docs/agent-config
bump-api
remove-gogo-getters
dnephin/docs-more-details-about-vault-provider
ffmmm/default-prom-s
test-no-disk
kisunji/rpc-shim
serverless-via-metadata
ui/feature/fix-auth-method-views
dnephin/remove-lib-translate-keys-attempt-2
dnephin/acl-resolver-6
dnephin/rpc-metrics
docs/clarify-connect-language
david-yu-bump-envoy
zs.test-placeholder-page-removal
release/1.9.16
release/1.10.9
release/1.11.4
case-insensitive-node-names-acl-checks
kisunji/fix-stable-website
gw-xds-handling-eventual-consistency
pcmccarron-patch-1
jm/vault-ent-license
ui/chore/ci/1.11.x
dnephin/docs-day-acl-overview
david-yu-release-note
dnephin/http-struct-interfaces
ishustava/auth-method-secondary-dc
sm/add-goarm-to-main
tgw/resolver-query-fix-1-9
tgw/resolver-query-fix-1-10
tgw/resolver-query-fix
david-yu-bug-report
dnephin/prefix-overlap-watches
release/1.11.3
release/1.9.15
release/1.10.8
boxofrad/upgrade-grpc
boxofrad/spike-catalog-write-rate-limit
dnephin/acl-resolve-token-5
lkysow/serverless-via-metadata
ui/bugfix/2-instance-1-proxy
gha-basic-artifact-validation
add-docs-for-anno
cts-ls-test-docs
external-services
ma/resource-listing
dnephin/ca-remove-unused-fields
dnephin/acl-resolve-token-4
dep/raft-boltdb
blake/support-qname-minimization-6579
copy-working-file
sarah-test
add-missing-consul-env-file
kisunji/assetfs-merge-ci
blake/ingress-no-dnsname-port-gh-11092
david-yu-patch-1
brk.check-link-follow-redirect
cts-deprecate-port-option
boxofrad/streaming-contention-simple-semaphore
urldecode-url-query-params-part-1
update_gen_meta-2
update_gen_meta-1
update_gen_meta
kisunji/small-testfix
fix-broken-dockerfile-sam
boxofrad/streaming-contention-experiment
boxofrad/streaming-contention-close-in-goroutine
boxofrad/streaming-contention-next-fast-path
boxofrad/streaming-contention-semaphore-wakeup
release/1.11.2
release/1.10.7
release/1.9.14
dnephin/docs-day-acl-move-rules-table
docs/tables-instead-of-lists
Amier3-patch-1
clarify-hcl-cli
docs/fix-exported-services
kisunji/upgrade-warning
dnephin/docs-day-acl-move-config-ref
blake/1.11-oidc-ui-nspace-fix
add-patches
ma/ipv6-robustness-fixes
refactor-add-patches
kisunji/more-ent-test-fixes
ui/chore/remove-tooltip-component
ui/bugfix/fixup-routlets
blake/fix-kv-import-folder-prefix-10906
release/1.10.6
release/1.9.13
release/1.8.19
release/1.11.1
ui/bugfix/403-partitions-endpoint
release/1.11.0
release/1.9.12
release/1.8.18
release/1.10.5
boxofrad/fix-changelog-pr-links
improve-intention-error-messages
ap/main-docs
ap/exports-docs
terminating-gateway-overrides
kisunji/go1.17.4
release/1.11.0-rc
partition/session-test-kvs-endpoint
ishustava/vault-k8s-docs
boxofrad/rename-master-acl-tokens-internally
loadtest-test
brk.feat/mdx-v2
revert-11692-cherry-pick-fix
cherry-pick-fix
cherry-pick-merge
dnephin/ca-cluster-id
dnephin/ca-cluster-id-2
dnephin/catalog-service-list-filter
agent/tls-types
ishustava/debug-mesh-gw-test
ffmmm/b-10871
release/1.11.0-beta3
release/1.9.11
release/1.8.17
release/1.10.4
ma/typo-fix
ma/md5_fix_oss
release/1.11.0-beta2
ui/scratch/storybook-overlord
dnephin/deprecate-verify-incoming
crt-consul-migration
dnephin/acl-resolver-7
ui/scratch/light-sshhhhh
revert-11376-leadership-transfer-onleave
ui/backport/1.8.x/11328
crt-migration-build-flags
add_build_ui
dnephin/ca-manager-move-to-new-package-2
dnephin/ca-manager-move-to-new-package
kisunji/fix-stable-website-2
release/1.11.0-beta1
tagged-addrs
dnephin/conn-pool-docs
backport/1.11.x/11107
release/1.11.0-alpha
raft-tls-include-intermediates
release/1.10.2
release/1.9.9
release/1.8.15
docs/update-wan-fed-mesh-gateway-guide
docs/consul-snapshot-agent-kms-policy-4369
dhia/ca-cas-config-refactor
dnephin/secure-defaults
release/1.10.1
release/1.9.8
release/1.8.14
mirror-to-ent
release/1.10.1-beta1
website/1.10.0
release/1.10.0
release/1.8.13
release/1.9.7
release/1.10.0-rc2
release/1.10.0-rc
dnephin/agent-setup-user-event-handler
dnephin/cleanup-ae
dnephin/fix-serf-tag-data-race
release/1.10.0-beta4
release/1.9.6
release/1.8.12
release/1.8.11
release/1.7.x
release/1.10.0-beta3
release/1.8.11-beta2
dnephin/move-dns-server-to-apiServers
release/1.8.11-beta1
envoy-crash-help
release/1.6.x
release/1.10.0-beta2
reach
dnephin/ci-handle-ent-differences
dnephin/structs-proxy-defaults-remove-name-field
release/1.10.0-beta1
release/1.9.5
release/1.7.14
release/1.8.10
bny-custom-04052021
health-prefer-connect
release/1.10.0-alpha
release/1.9.4
release/1.8.9
release/1.7.13
release/1.8.9-beta1
release/1.9.3
mgw-wanfed-hard-network-partition
release/1.7.12
release/1.8.8
release/1.9.2
km.vercel-config
release/1.9.1
release/1.8.7
release/1.7.11
m1-investigate
wasm-filters
rboyer/hack-neo
release/1.8.7-beta1
dnephin/cleanup-ae-3
dnephin/cleanup-ae-2
release/1.9.0
release/1.6.10
release/1.8.6
release/1.7.10
release/1.9.0-rc1
release/1.9.0-beta3
release/1.9.0-beta2
correct-acl-hash-replication
test/load-test-lambda
release/1.7.9
release/1.8.5
nia_resize_image
dnephin/enable-logging-color
ui/feature/ui-config-dashboard-urls
only_async_trigger_changes
ui/chore/standardize-statechart-yield
scratch/data-source-metrics
no-change-cache
add-ui-checker
release/1.8.4
release/1.7.8
release/1.6.9
release/1.8.2
release/1.7.6
feature/acl-replication-status
k8s_healthcheck
release/1.8.1
release/1.7.5
release/1.6.7
blake/v1.8.0-ingress-websocket-fix
release/1.8.0
1.14.0-beta1
1.6.2
streaming-rpc
disco-retain-details
hack-deploy
docs/k8s-deployment
x/streaming-v2
x/bench-catalog
x/singleflight
service-tags-upgrade-fix
fix-leaf-timeout
mrktfix18
v1.11.0-beta2
v1.11.0-beta1
v1.10.3
v1.9.10
v1.8.16
v1.11.0-alpha
v1.10.2
v1.8.15
v1.9.9
v1.9.8
v1.8.14
v1.10.1
v1.10.1-beta1
v1.10.0
v1.9.7
v1.8.13
v1.10.0-rc2
v1.10.0-rc
v1.10.0-beta4
v1.9.6
v1.8.12
v1.8.11
v1.10.0-beta3
v1.8.11-beta2
v1.8.11-beta1
v1.10.0-beta2
v1.10.0-beta1
v1.7.14
v1.8.10
v1.9.5
v1.10.0-alpha
v1.9.4
v1.8.9
v1.7.13
v1.8.9-beta1
v1.9.3
v1.7.12
v1.8.8
v1.9.2
v1.9.1
v1.8.7
v1.7.11
v1.8.7-beta1
v1.9.0
v1.6.10
v1.7.10
v1.8.6
v1.9.0-rc1
v1.9.0-beta3
v1.9.0-beta2
v1.7.9
v1.8.5
v1.9.0-beta1
v1.8.4
v1.6.9
v1.7.8
v1.7.7
v1.8.3
v1.6.8
v1.7.6
v1.8.2
v1.8.1
v1.6.7
v1.7.5
v1.8.0
v1.8.0-rc1
v1.7.4
v1.6.6
v1.8.0-beta2
v1.8.0-beta1
v1.7.3
v1.6.5
v1.7.2
v1.6.4
v1.7.1
v1.7.0
api/v1.4.0
sdk/v0.4.0
v1.7.0-beta4
v1.6.3
v1.7.0-beta3
v1.7.0-beta2
v1.7.0-beta1
v1.6.2
v1.6.1
v1.6.0
v1.6.0-rc1
v1.6.0-beta3
v1.5.3
v1.6.0-beta2
v1.6.0-beta1
v1.5.2
v1.5.1
v1.4.5
v1.5.0
api/v1.0.1
sdk/v0.1.0
api/v1.0.0
internal/v0.1.0
v1.4.4
v1.4.3
v1.4.2
v1.4.1
v1.2.4
v1.4.0
v1.3.1
v1.4.0-rc1
v1.3.0
v1.2.3
v1.2.2
v1.2.1
v1.2.0
v1.1.0
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3
v1.0.2
v1.0.1
v1.0.1-rc1
v1.0.0
v1.0.0-beta2
v1.0.0-beta1
v0.9.3
v0.9.3-rc2
v0.9.3-rc1
v0.9.2
v0.9.1
v0.9.0
v0.9.0-rc1
v0.8.5
v0.8.4
v0.8.3
v0.8.2
v0.8.1
v0.8.0
v0.8.0-rc1
v0.7.5
v0.7.4
v0.7.3
v0.7.2
v0.7.2-rc1
v0.7.1
v0.7.0
v0.7.0-rc2
v0.7.0-rc1
v0.6.4
v0.6.4-rc3
v0.6.4-rc2
v0.6.4-rc1
v0.6.3
v0.6.2
v0.6.1
v0.6.0
v0.6.0-rc2
v0.6.0-rc1
api/v1.1.0
api/v1.10.0
api/v1.10.1
api/v1.11.0
api/v1.12.0
api/v1.13.0
api/v1.13.1
api/v1.14.0
api/v1.15.0
api/v1.15.1
api/v1.15.2
api/v1.15.3
api/v1.16.0
api/v1.17.0
api/v1.18.0
api/v1.18.1
api/v1.18.2
api/v1.19.0
api/v1.19.1
api/v1.19.2
api/v1.2.0
api/v1.20.0
api/v1.21.0
api/v1.21.1
api/v1.21.2
api/v1.21.3
api/v1.21.4
api/v1.22.0
api/v1.22.0-rc1
api/v1.23.0
api/v1.24.0
api/v1.25.0
api/v1.25.1
api/v1.26.0-rc1
api/v1.26.1
api/v1.26.1-rc1
api/v1.27.0
api/v1.27.1
api/v1.27.2
api/v1.28.0
api/v1.28.0-rc1
api/v1.28.1
api/v1.28.2
api/v1.28.3
api/v1.28.4
api/v1.28.5
api/v1.29.0
api/v1.29.1
api/v1.29.2
api/v1.29.3
api/v1.29.4
api/v1.29.5
api/v1.29.5-rc1
api/v1.29.6
api/v1.3.0
api/v1.30.0
api/v1.5.0
api/v1.6.0
api/v1.7.0
api/v1.8.0
api/v1.8.1
api/v1.9.0
api/v1.9.1
ent-changelog-1.15.11
ent-changelog-1.15.12
ent-changelog-1.15.13
ent-changelog-1.15.14
ent-changelog-1.15.15
ent-changelog-1.16.7
ent-changelog-1.16.8
ent-changelog-1.17.4
ent-changelog-1.17.5
ent-changelog-1.17.6
ent-changelog-1.17.7
ent-changelog-1.18.3
ent-changelog-1.18.4
ent-changelog-1.18.5
ent-changelog-1.19.3
envoyextensions/v0.1.0
envoyextensions/v0.1.1
envoyextensions/v0.1.2
envoyextensions/v0.2.0
envoyextensions/v0.2.1
envoyextensions/v0.2.2
envoyextensions/v0.2.3
envoyextensions/v0.2.4
envoyextensions/v0.3.0
envoyextensions/v0.3.0-rc1
envoyextensions/v0.4.0
envoyextensions/v0.4.1
envoyextensions/v0.5.0-rc1
envoyextensions/v0.5.1
envoyextensions/v0.5.1-rc1
envoyextensions/v0.5.2
envoyextensions/v0.5.3
envoyextensions/v0.5.4
envoyextensions/v0.6.0
envoyextensions/v0.6.0-rc1
envoyextensions/v0.6.1
envoyextensions/v0.6.2
envoyextensions/v0.7.0
envoyextensions/v0.7.1
envoyextensions/v0.7.2
envoyextensions/v0.7.3
envoyextensions/v0.7.4
envoyextensions/v0.7.4-rc1
envoyextensions/v0.7.5
envoyextensions/v0.7.6
list
proto-public/v0.1.0
proto-public/v0.1.1
proto-public/v0.2.0
proto-public/v0.2.1
proto-public/v0.3.0
proto-public/v0.4.0
proto-public/v0.4.0-rc1
proto-public/v0.4.1
proto-public/v0.5.0-rc1
proto-public/v0.5.1
proto-public/v0.5.1-rc1
proto-public/v0.5.2
proto-public/v0.5.3
proto-public/v0.5.4-rc1
proto-public/v0.6.0
proto-public/v0.6.0-rc1
proto-public/v0.6.1
proto-public/v0.6.2
proto-public/v0.6.3
sdk/v0.1.1
sdk/v0.10.0
sdk/v0.11.0
sdk/v0.12.0
sdk/v0.13.0
sdk/v0.13.1
sdk/v0.14.0
sdk/v0.14.0-rc1
sdk/v0.14.1
sdk/v0.14.2-rc1
sdk/v0.14.3-rc1
sdk/v0.15.0
sdk/v0.15.1
sdk/v0.16.0
sdk/v0.16.0-rc1
sdk/v0.16.1
sdk/v0.2.0
sdk/v0.3.0
sdk/v0.5.0
sdk/v0.6.0
sdk/v0.7.0
sdk/v0.8.0
sdk/v0.9.0
stable-website-pre-1.12.0-force-push
troubleshoot/v0.1.0
troubleshoot/v0.1.1
troubleshoot/v0.1.2
troubleshoot/v0.2.0
troubleshoot/v0.2.1
troubleshoot/v0.2.2
troubleshoot/v0.3.0
troubleshoot/v0.3.0-rc1
troubleshoot/v0.3.1
troubleshoot/v0.4.0-rc1
troubleshoot/v0.4.1
troubleshoot/v0.4.1-rc1
troubleshoot/v0.5.0
troubleshoot/v0.5.1
troubleshoot/v0.5.2
troubleshoot/v0.5.3
troubleshoot/v0.5.4
troubleshoot/v0.6.0
troubleshoot/v0.6.0-rc1
troubleshoot/v0.6.1
troubleshoot/v0.6.2
troubleshoot/v0.6.3
troubleshoot/v0.6.5
troubleshoot/v0.7.0
troubleshoot/v0.7.1
troubleshoot/v0.7.2
troubleshoot/v0.7.2-rc1
troubleshoot/v0.7.3
v0.1.0
v0.2.0
v0.2.1
v0.3.0
v0.3.1
v0.4.0
v0.4.1
v0.5.0
v0.5.0rc1
v0.5.1
v0.5.2
v0.9.4
v1.0.8
v1.1.1
v1.10.10
v1.10.11
v1.10.12
v1.10.4
v1.10.5
v1.10.6
v1.10.7
v1.10.8
v1.10.9
v1.11.0
v1.11.0-beta3
v1.11.0-rc
v1.11.1
v1.11.10
v1.11.11
v1.11.2
v1.11.3
v1.11.4
v1.11.5
v1.11.6
v1.11.7
v1.11.8
v1.11.9
v1.12.0
v1.12.0-beta1
v1.12.1
v1.12.2
v1.12.3
v1.12.4
v1.12.5
v1.12.6
v1.12.7
v1.12.8
v1.12.9
v1.13.0
v1.13.0-alpha1
v1.13.0-alpha2
v1.13.1
v1.13.2
v1.13.3
v1.13.4
v1.13.5
v1.13.6
v1.13.7
v1.13.8
v1.13.9
v1.14.0
v1.14.0-beta1
v1.14.1
v1.14.10
v1.14.11
v1.14.2
v1.14.3
v1.14.4
v1.14.5
v1.14.6
v1.14.7
v1.14.8
v1.14.9
v1.15.0
v1.15.1
v1.15.10
v1.15.11
v1.15.2
v1.15.3
v1.15.4
v1.15.5
v1.15.6
v1.15.7
v1.15.8
v1.15.9
v1.16.0
v1.16.0-rc1
v1.16.1
v1.16.2
v1.16.3
v1.16.4
v1.16.5
v1.16.6
v1.16.7
v1.17.0
v1.17.0-rc1
v1.17.1
v1.17.2
v1.17.3
v1.17.4
v1.18.0
v1.18.0-rc1
v1.18.1
v1.18.2
v1.19.0
v1.19.1
v1.19.2
v1.20.0
v1.20.0-rc1
v1.20.1
v1.8.17
v1.8.18
v1.8.19
v1.9.11
v1.9.12
v1.9.13
v1.9.14
v1.9.15
v1.9.16
v1.9.17
${ noResults }
20026 Commits (d1bc9fbbf3d298f0f4172432dc73709c0c1e9364)
Author | SHA1 | Message | Date |
---|---|---|---|
Matt Keeler |
d1bc9fbbf3
|
Pin version of lint-consul-retry (#19775)
v1.3.0 was before the linter became more accurate. All the issues the linter found have been applied to main but are not being backported. |
1 year ago |
John Maguire |
7cc019f9c8
|
[NET-5688] APIGateway UI Topology Fixes (#19657) (#19764)
* [NET-5688] APIGateway UI Topology Fixes (#19657) * Update catalog and ui endpoints to show APIGateway in gateway service topology view * Added initial implementation for service view * updated ui * Fix topology view for gateways * Adding tests for gw controller * remove unused args * Undo formatting changes * Fix call sites for upstream/downstream gw changes * Add config entry tests * Fix function calls again * Move from ServiceKey to ServiceName, cleanup from PR review * Add additional check for length of services in bound apigateway for IsSame comparison * fix formatting for proto * gofmt * Add DeepCopy for retrieved BoundAPIGateway * gofmt * gofmt * Rename function to be more consistent * Remove BUSL license * Fix import |
1 year ago |
Michael Zalimeni |
8874f1fceb
|
Revert "[NET-6232] docs: Update consul-k8s Helm chart docs (1.1.x) (#19699) (#19749)
Revert "[NET-6232] docs: Update consul-k8s Helm chart docs (1.1.x) (#19699)"
This reverts commit
|
1 year ago |
Michael Zalimeni |
c4b3ca81d5
|
[NET-6232] docs: Update consul-k8s Helm chart docs (1.1.x) (#19699)
docs: Update consul-k8s Helm chart docs (1.1.x) Sync docs for recent changes to the Helm chart from `consul-k8s`. |
1 year ago |
hc-github-team-consul-core |
218dca12c1
|
Backport of ci: Run `go mod tidy` check on submodules into release/1.15.x (#19746)
backport of commit
|
1 year ago |
Dhia Ayachi |
567417dfba
|
[1.15.x backport] Fix panic policy delete (#19733)
fix a panic in the CLI when deleting an acl policy with an unknown name (#19679) * fix a panic in the CLI when deleting an acl policy with an unknown name * add changelog |
1 year ago |
hc-github-team-consul-core |
88227e4507
|
Backport of [NET-6617] security: Bump github.com/golang-jwt/jwt/v4 to 4.5.0 into release/1.15.x (#19739)
backport of commit
|
1 year ago |
Valeriia Ruban |
b4f36881cd
|
Backport/UI/net 438 add ent version suffix/privately inspired wolf self (#19712)
* chore: add suffix to consul version in sidenav |
1 year ago |
Valeriia Ruban |
407a41e07e
|
Backport/UI/feature/make global read only policy non editable/instantly hardy chamois 2 (#19623)
* feat: Change global-read-only policy to non editable (downgraded styles of alerts) |
1 year ago |
hc-github-team-consul-core |
789affd7af
|
Backport of [Docs] Update admin-partitions.mdx into release/1.15.x (#19630)
* backport of commit |
1 year ago |
hc-github-team-consul-core |
02c14601fa
|
Backport of Fix parts of admin-partitions guide into release/1.15.x (#19624)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
e7c5029b31
|
Backport of increasing unit tests timeout from 10m to 30m into release/1.15.x (#19424)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
d79540b0b0
|
Backport of test: update certs for 10 year expiry into release/1.15.x (#19559)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
9195cd691e
|
Backport of Fix more test flakes into release/1.15.x (#19544)
* backport of commit
|
1 year ago |
hc-github-team-consul-core |
502a4257b6
|
Backport of [NET-6459] Fix issue with wanfed lan ip conflicts. into release/1.15.x (#19521)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
4d648c8355
|
Backport of Shuffle CICD tests to spread worker load. into release/1.15.x (#19518)
backport of commit
|
1 year ago |
Tyler Wendlandt |
d477441046
|
ui: 1.15.x back to hcp link conditions (#19444)
Only show back to hcp link if CONSUL_HCP_URL is present |
1 year ago |
Ronald |
64b689711c
|
helm docs for Consul k8s release 1.1.7 (#19498)
* Consul k8s release 1.1.7 * fix typos |
1 year ago |
hc-github-team-consul-core |
cd54946c90
|
Backport of build: ensure we pull through the hashicorp proxy instead of going directly to the docker hub into release/1.15.x (#19484)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
9f17bf7fcf
|
Backport of Regen expired test certs into release/1.15.x (#19477)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
b22a770b3f
|
Backport of added redirect for conf entries 1.8.x into release/1.15.x (#19464)
* no-op commit due to failed cherry-picking * added redirect for conf entries 1.8.x (#19460) fixed merge conflicts in redirect --------- Co-authored-by: temp <temp@hashicorp.com> Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com> |
1 year ago |
hc-github-team-consul-core |
a0a9e4ff1d
|
Backport of NET-5186 Add NET_BIND_SERVICE capability to consul-dataplane requirements into release/1.15.x (#19450)
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com> |
1 year ago |
Blake Covarrubias |
8c7c3cc6c2
|
Backport of docs: Fix Kubernetes CRD example configs into release/1.15.x (#19439)
docs: Fix Kubernetes CRD example configs (#18878) Fixes configuration examples for several Consul Kubernetes CRDs. The CRDs were missing required fields such as `apiVersion`, `metadata`, and `spec`. Co-authored-by: Tu Nguyen <im2nguyen@gmail.com> |
1 year ago |
Michael Zalimeni |
5f0212bbfc
|
Backport of [NET-6138] security: Bump google.golang.org/grpc to 1.56.3 (CVE-2023-44487) to release/1.15.x (#19421)
Bump google.golang.org/grpc to 1.56.3
This resolves [CVE-2023-44487](https://nvd.nist.gov/vuln/detail/CVE-2023-44487).
Also includes various fixes from later release versions required for
tests and linters to pass. See
|
1 year ago |
hc-github-team-consul-core |
53a355be90
|
Backport of Fix casing in example yaml config into release/1.15.x (#19406)
Backport of Fix casing in example yaml config to release/1.15.x Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com> |
1 year ago |
hc-github-team-consul-core |
ece48dc09f
|
Backport of Use strict DNS for mesh gateways with hostnames into release/1.15.x (#19394)
Use strict DNS for mesh gateways with hostnames Co-authored-by: Andrew Stucki <andrew.stucki@hashicorp.com> |
1 year ago |
hc-github-team-consul-core |
a83ff94c68
|
Backport of Add note about service upstream env var dot broken into release/1.15.x (#19397)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
8cbbf0d691
|
Backport of chor: update rule to run frontend github tasks when changes are made … into release/1.15.x (#19064)
|
1 year ago |
hc-github-team-consul-core |
d6ce6135c7
|
Backport of Golden File Tests for TermGW w/ Cluster Peering into release/1.15.x (#19191)
backport of commit
|
1 year ago |
Derek Menteer |
d0fea44be0
|
Backport of Add grpc keepalive configuration into release/1.15.x (#19… (#19347)
Backport of Add grpc keepalive configuration into release/1.15.x (#19339) Add grpc keepalive configuration. (#19339) Prior to the introduction of this configuration, grpc keepalive messages were sent after 2 hours of inactivity on the stream. This posed issues in various scenarios where the server-side xds connection balancing was unaware that envoy instances were uncleanly killed / force-closed, since the connections would only be cleaned up after ~5 minutes of TCP timeouts occurred. Setting this config to a 30 second interval with a 20 second timeout ensures that at most, it should take up to 50 seconds for a dead xds connection to be closed. |
1 year ago |
Chris S. Kim |
bb4ea08e60
|
[1.15.x] Vault CA bugfixes (#19285) (#19337)
Vault CA bugfixes (#19285) * Re-add retry logic to Vault token renewal * Fix goroutine leak * Add test for detecting goroutine leak * Add changelog * Rename tests * Add comment |
1 year ago |
Chris Thain |
bcafb66a98
|
release/1.15.x - Update supported Envoy versions (#19272)
|
1 year ago |
hc-github-team-consul-core |
1bc046c26f
|
Backport of build(docker): always publish full and minor version tags for dev images into release/1.15.x (#19280)
Backport of build(docker): always publish full and minor version tags for dev images into release/1.17.x (#19282)
backport of commit
|
1 year ago |
Chris Hut |
a06ddfcffd
|
Downgrading node on CI to support v1.15.X (#19249)
|
1 year ago |
hc-github-team-consul-core |
c33ef90dde
|
Backport of [NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17.0 into release/1.15.x (#19233)
* backport of commit |
1 year ago |
hc-github-team-consul-core |
2f54aff813
|
Backport of Fix BUSL license checker to skip >= 1.17.x target branches (#19152) into release/1.15.x (#19156)
backport of commit
|
1 year ago |
Chris Thain |
d91e61f46a
|
release/1.15.x: Manual backport of #19095 (#19147)
|
1 year ago |
hc-github-team-consul-core |
737213fc15
|
Backport of Replace `hub` with `gh` for member roles on JIRA sync checks into release/1.15.x (#19121)
backport of commit
|
1 year ago |
Ashesh Vidyut |
7b45148f13
|
Backport NET-4135 - Fix NodeMeta filtering Catalog List Services API (#18322) (#19116)
NET-4135 - Fix NodeMeta filtering Catalog List Services API (#18322) * logs for debugging * Init * white spaces fix * added change log * Fix tests * fix typo * using queryoptionfilter to populate args.filter * tests * fix test * fix tests * fix tests * fix tests * fix tests * fix variable name * fix tests * fix tests * fix tests * Update .changelog/18322.txt * fix change log * address nits * removed unused line * doing join only when filter has nodemeta * fix tests * fix tests * Update agent/consul/catalog_endpoint.go * fix tests * removed unwanted code --------- Co-authored-by: Ganesh S <ganesh.seetharaman@hashicorp.com> Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com> |
1 year ago |
hc-github-team-consul-core |
661f0805b5
|
Backport of Allow connections through Terminating Gateways from peered clusters NET-3463 into release/1.15.x (#19091)
Allow connections through Terminating Gateways from peered clusters NET-3463 (#18959) * Add InboundPeerTrustBundle maps to Terminating Gateway * Add notify and cancelation of watch for inbound peer trust bundles * Pass peer trust bundles to the RBAC creation function * Regenerate Golden Files * add changelog, also adds another spot that needed peeredTrustBundles * Add basic test for terminating gateway with peer trust bundle * Add intention to cluster peered golden test * rerun codegen * update changelog * really update the changelog --------- Co-authored-by: Thomas Eckert <teckert@hashicorp.com> Co-authored-by: Melisa Griffin <melisa.griffin@hashicorp.com> |
1 year ago |
hc-github-team-consul-core |
e2b44ebbc2
|
Backport of docs: clarify the requriment for cross-partition network into release/1.15.x (#19079)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
a53d136443
|
Backport of Fixes docs of Consul Debug - Adds info about Since Flag into release/1.15.x (#19073)
backport of commit
|
1 year ago |
Chris S. Kim |
5dd7d91ab1
|
[1.15.x] Update upgrade-specific.mdx (#19063)
Update upgrade-specific.mdx |
1 year ago |
hc-github-team-consul-core |
020f685f8c
|
Backport of Include RequestTimeout in marshal/unmarshal of ServiceResolverConfigE… into release/1.15.x (#19033)
* read endpoint (#18268) implement http read endpoint to expose resource grpc service read method * Net-2707/list resource endpoint (#18444) feat: list resources endpoint * Fix incorrect yaml in examples (#18463) * NET-5187: Upgrade test timeout due to log producer errors (#18461) Stop log producer before restarting container * [NET-4799] [OSS] xdsv2: listeners L4 support for connect proxies (#18436) * refactor to avoid future import cycles * resource: Make resource list tenancy aware (#18475) * [COMPLIANCE] License update (#18479) Update BUSL LICENSE to include licensed product and version. Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com> * docs: specify manual server metadata intervention (#18477) * docs: Update OpenShift compatibility (#18478) Update compatibility.mdx * resource: Make resource delete tenancy aware (#18476) resource: Make resource delete tenancy awarae * Add license-checker action that fails when any backported file contains BUSL header (#18485) * Add license-checker action that fails when any backported file contains BUSL header * Quote echoed variable to retain line breaks * Add ticket to reference for more details * docs: Update K8s TGW tutorial to reliably obtain role ID (#18474) The `grep` command used to obtain the ID for the terminating gateway role is not reliable in all scenarios. For example, if there is a similarly named role, the command may return the wrong role ID for the active terminating gateway instance. This commit updates the command to use jq to obtain the role ID. If multiple roles are found, jq will raise an error informing the user that it cannot reliably determine the role ID. * NET-5371 License checker pt2 (#18491) * Update grep command to work on ubuntu * Run license checker when new commits are pushed to PR * README - Update KV use case to Dynamic App Configuration (#18301) * Update README.md * Update kv.mdx * Add BUSL badge * README - re-order badges and update hub link (#18498) Update README.md * [NET-5163] Support locality testing in consul-container (#18484) * Support locality testing in consul-container Support including locality in client sidecar config. Also align test config structs with Ent to avoid future conflicts. * Refactor consul-container fortio helpers Refactor fortio test helpers to separate HTTP retries from waiting on fortio result changes due to e.g. service startup and failovers. * NET-4853 - xds v2 - implement base connect proxy functionality for clusters (#18499) * Fix HCL (#18513) * Fix HCL * Update create-sameness-groups.mdx * NET-4932 - xds v2 - implement base connect proxy functionality for endpoints (#18500) * NET-4853 - xds v2 - implement base connect proxy functionality for clusters * NET-4853 - xds v2 - implement base connect proxy functionality for clusters * NET-4932 - xds v2 - implement base connect proxy functionality for endpoints * Update endpoints_test.go * gofmt * Update naming.go * Support custom watches on controller (#18439) * Support custom watches on controller * refactor mapper methods * NET-4858 - xds v2 - implement base connect proxy functionality for routes (#18501) * NET-4853 - xds v2 - implement base connect proxy functionality for clusters * NET-4853 - xds v2 - implement base connect proxy functionality for clusters * NET-4932 - xds v2 - implement base connect proxy functionality for endpoints * Update endpoints_test.go * gofmt * NET-4858 - Make connect proxy route tests pass using xds v2 * Update endpoints_test.go * Update naming.go * use alsoRunTestForV2 * remove unused makeAddress * gofmt * fixing clusters * bimapper: allow to untrack links and support reference or id (#18451) * bimapper: fix data race (#18519) * CI Split integration tests to run nightly and every PR (#18518) * CI Split integration tests to run nightly and every PR * Checkout release branch for nightly test * Fix broken links caught in weekly report (#18522) * fix broken link caught in weekly report * Apply suggestions from code review Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> --------- Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> * Create nightly test-integration for consul release branch (#18530) * Create nightly test-integration for consul release branch * test * fix * docs: Fix spelling errors across various pages on the site (#18533) This commit fixes numerous spelling errors across the site and also removes unnecessary whitespace that was present in the edited files. * Make proto-public license MPL (#18531) * Make proto-public license MPL * Add proto-public dir to exclusion list in .copywrite.hcl * NET-4943 - Implement ProxyTracker (#18535) * resource: Make resource watchlist tenancy aware (#18539) * Reduce required type arguments for DecodedResource (#18540) * OSS -> CE (community edition) changes (#18517) * CI: fix envoy versions in CI of release branch (#18538) * CI: fix envoy versions in CI of release branch * - remove steps sds for 1.15 nightly run - checkout the release branch * add default name * fix * Update go-tests.yml * fix checkout code * add comments and revert schedule * catalog: add failover mode enum validation (#18545) * mesh: add validation for the new pbmesh resources (#18410) Adds validation for HTTPRoute, GRPCRoute, TCPRoute, DestinationPolicy, and ComputedRoutes. * xds controller: resolve ServiceEndpoints references in ProxyStateTemp… (#18544) xds controller: resolve ServiceEndpoints references in ProxyStateTemplate * mesh: adding type aliases for mesh resource usage (#18448) Introduces some simple type aliases for DecodedResource[*X] wrappers for each type which cut down on the verbosity * Update trust bundle into proxy-state-template (#18550) * catalog: validating Protocol and Health enums on Service, Workload, and ServiceEndpoints (#18554) * chore: fix missing/incorrect license headers (#18555) * fix for , non presence of consul-version meta (#18464) * fix for #18406 , non presence of consul-version meta * removed redundant checks * updated mock-api to mimic api response for synthetic nodes * added test to test getDistinctConsulVersions method with synthetic-node case * updated typo in comments * added change log * feat: add experiments flag to testserver sdk (#18541) * bug: prevent go routine leakage due to existing DeferCheck (#18558) * bug: prevent go routine leakage due to existing DeferCheck * add changelog * NET-5382 & PLAT-1159: Do not trigger workflow if only doc files are in commit history (#18528) NET-5382: Do not run workflow runs if at least one path matches * UI: community verbiage (#18560) * chore: update community verbiage * chore: add changelog entry * Fix Windows FIPS Build (#18357) * Fix Windows FIPS Build * create new file for windows arm * removed build tag * fix buidl tags * fix multiple go build * CE port of enterprise extension (#18572) CE commit * resource: Make resource listbyowner tenancy aware (#18566) * NET-5147: Added placeholder structs for JWT functionality (#18575) * Added placeholder structs for JWT functionality * Added watches for CE vs ENT * Add license header * Undo plumbing work * Add context arg * resource: Make resource writestatus tenancy aware (#18577) * NET-5338 - NET-5338 - Run a v2 mode xds server (#18579) * NET-5338 - NET-5338 - Run a v2 mode xds server * fix linting * CI: send slack notification on failed nightly job (#18578) * CE commit (#18583) * Fix broken link on sameness group page (#18511) fix broken link * Fix typo in permissive mTLS docs (#18551) Update onboarding-tproxy-mode.mdx * Set concurrency for workflows (#18567) * Set concurrency for workflows * test: run automated tests against Vault 1.11 - 1.14 (#18590) Begin to test against Vault 1.14. Drop tests against Vault 1.10. * Reduce the frequency of metric exports to minutely (#18584) * NET-4944 - wire up controllers with proxy tracker (#18603) Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com> * Watch the ProxyTracker from xDS controller (#18611) * Distinguish v2 catalog Protocol unset from default (#18612) Even though we intend to default to TCP when this field is not explicitly provided, uncluding an `UNSPECIFIED` default enum value allows us to create inheritance chains, e.g. service to workload. * Added OpenTelemetry Access Logging Envoy extension (#18336) * [HCP Telemetry] Move first TelemetryConfig Fetch into the TelemetryConfigProvider (#18318) * Add Enabler interface to turn sink on/off * Use h for hcpProviderImpl vars, fix PR feeback and fix errors * Keep nil check in exporter and fix tests * Clarify comment and fix function name * Use disable instead of enable * Fix errors nit in otlp_transform * Add test for refreshInterval of updateConfig * Add disabled field in MetricsConfig struct * Fix PR feedback: improve comment and remove double colons * Fix deps test which requires a maybe * Update hcp-sdk-go to v0.61.0 * use disabled flag in telemetry_config.go * Handle 4XX errors in telemetry_provider * Fix deps test * Check 4XX instead * Run make go-mod-tidy * update comments and docs about running envoy integration tests with the ENVOY_VERSION set. (#18614) update ENVOY_VERSION and documentation of it used in the bats envoy tests. Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com> * delete all v2 resources type when deleting a namespace (CE) (#18621) * add namespace scope to ServiceV1Alpha1Type * add CE portion of namespace deletion * resource: Allow nil tenancy (#18618) * PLAT-1192 - Run CI on smaller instances (#18624) Use smaller runners * NET-3181 - Allow log file naming like Nomad (#18617) * fixes file name for consul * added log file * added tests for rename method * Add the plumbing for APIGW JWT work (#18609) * Add the plumbing for APIGW JWT work * Remove unneeded import * Add deep equal function for HTTPMatch * Added plumbing for status conditions * Remove unneeded comment * Fix comments * Add calls in xds listener for apigateway to setup listener jwt auth * docs: admin partition and DNS clarification (#18613) * fix: make UNSPECIFIED protocol pass validation (#18634) We explicitly enumerate the allowed protocols in validation, so this change is necessary to use the new enum value. Also add tests for enum validators to ensure they stay aligned to protos unless we explicitly want them to diverge. * NET 1594 - Snapshot Agent Filename Should Include Consul Version / Datacenter (#18625) * init * tests added and few fixes * revert arg message * changelog added * removed var declaration * fix CI * fix test * added node name and status * updated save.mdx * added example * fix tense * fix description * Net 3181 consul gh issue 15709 allow log file naming like nomad - fix bug (#18631) * fixes file name for consul * added log file * added tests for rename method * append instead of trunc * fix file truncate issue * added changelog * fix for build destros ci * removed changelog * solaris * resource: Require scope for resource registration (#18635) * [NET-4958] Fix issue where envoy endpoints would fail to populate after snapshot restore (#18636) Fix issue where agentless endpoints would fail to populate after snapshot restore. Fixes an issue that was introduced in #17775. This issue happens because a long-lived pointer to the state store is held, which is unsafe to do. Snapshot restorations will swap out this state store, meaning that the proxycfg watches would break for agentless. * Add extra logging for mesh health endpoints. (#18647) * feat: Change global-read-only policy to non editable (#18602) * remove stray FIPS file (#18651) * Add known issue notice for #18636. (#18650) * fix: remove Intention test with latency to make consul-enterprise rep… (#18654) fix: remove Intention test with latency to make consul-enterprise repo tests work * fix: add telemetry bind socket to proxyConfiguration proto (#18652) * feat: copy edits for built-in policy alert (#18655) * test: fix snapshot save w/ append test for ENT (#18656) * Net 2714/xw cli read command (#18462) enable `consul resource read` command in cli * change log for audit log (#18668) * change log for audit log * fix file name * breaking change * Add TCP+TLS Healthchecks (#18381) * Begin adding TCPUseTLS * More TCP with TLS plumbing * Making forward progress * Keep on adding TCP+TLS support for healthchecks * Removed too many lines * Unit tests for TCP+TLS * Update tlsutil/config.go Co-authored-by: Samantha <hello@entropy.cat> * Working on the tcp+tls unit test * Updated the runtime integration tests * Progress * Revert this file back to HEAD * Remove debugging lines * Implement TLS enabled TCP socket server and make a successful TCP+TLS healthcheck on it * Update docs * Update agent/agent_test.go Co-authored-by: Samantha <hello@entropy.cat> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <hello@entropy.cat> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <hello@entropy.cat> * Update agent/checks/check.go Co-authored-by: Samantha <hello@entropy.cat> * Address comments * Remove extraneous bracket * Update agent/agent_test.go Co-authored-by: Samantha <hello@entropy.cat> * Update agent/agent_test.go Co-authored-by: Samantha <hello@entropy.cat> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <hello@entropy.cat> * Update the mockTLSServer * Remove trailing newline * Address comments * Fix merge problem * Add changelog entry --------- Co-authored-by: Samantha <hello@entropy.cat> * Fix windows Ent runner (#18683) * fix windows image for enterprise * added quotesT * Removed nodename and status from consul snapshot save -append-filename command and using leader version in version (#18680) * init * fix tests * fix tests lint * fix api call inside dc * updated doc * address comments * update guide to reflect tenancy and scope (#18687) * update guide to reflect tenancy and scope * Apply suggestions from code review Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * update ACLHooks signature * Update docs/resources/guide.md Co-authored-by: Semir Patel <semir.patel@hashicorp.com> --------- Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * Add support for querying tokens by service name. (#18667) Add support for querying tokens by service name The consul-k8s endpoints controller has a workflow where it fetches all tokens. This is not performant for large clusters, where there may be a sizable number of tokens. This commit attempts to alleviate that problem and introduces a new way to query by the token's service name. * restore common-topo peering integration tests, but nightly [NET-5476] (#18673) * dataplane: Allow getting bootstrap parameters when using V2 APIs (#18504) This PR enables the GetEnvoyBootstrapParams endpoint to construct envoy bootstrap parameters from v2 catalog and mesh resources. * Make bootstrap request and response parameters less specific to services so that we can re-use them for workloads or service instances. * Remove ServiceKind from bootstrap params response. This value was unused previously and is not needed for V2. * Make access logs generation generic so that we can generate them using v1 or v2 resources. * switch all client nodes in dc2 to dataplane [NET-4299] (#18608) * Reformat proxy docs refresh (#18623) * first commit; reformat PD conf entry * updated proxies overview page * added Deploy SM proxy usage and removed reg index * moved sidecar proxy usage to main proxy folder * recast sidecar reg page as Deploy sidecar services * fix typos * recast SM reg as conf reference- set the sidebar * add redirects * fix links * add PD conf entry usage to appropro pages * edits to proxy conf ref * fix links on index page * example command to write PD conf entry * updated links to old SM proxy reg page * updated links to sidecar service reg page * tryna fix front matter issues * Apply suggestions from code review Co-authored-by: Ronald <roncodingenthusiast@users.noreply.github.com> * added paragraph about SM proxies to overivew * Apply suggestions from code review Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> --------- Co-authored-by: Ronald <roncodingenthusiast@users.noreply.github.com> Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> * sidecar-proxy controller: L4 controller with explicit upstreams (NET-3988) (#18352) * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * This commit also changes service endpoints to include workload identity. This made the implementation a bit easier as we don't need to look up as many workloads and instead rely on endpoints data. * test: update sidecarproxy/builder golden tests to use determinstic golden data (#18703) * [APIGW] NET-5017 JWT Cleanup/Status Conditions (#18700) * Fixes issues in setting status * Update golden files for changes to xds generation to not use deprecated methods * Fixed default for validation of JWT for route * Added changelog for jwt features (#18709) * fix: NET-1521 show latest config in /v1/agent/self (#18681) * fix: NET-1521 show latest config in /v1/agent/self * Using larger machine for Enterprise (#18713) using 4x large for ent * [NET-5325] ACL templated policies support in tokens and roles (#18708) * [NET-5325] ACL templated policies support in tokens and roles - Add API support for creating tokens/roles with templated-policies - Add CLI support for creating tokens/roles with templated-policies * adding changelog * Adds PassiveHealthCheck Fields to ServiceDefaults and IngressGateway (#18532) Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com> * Instantiate secure resource service client after the grpc server (#18712) * ENT port: test-integ/peering: peer through mesh gateway [NET-4609] (#18605) Co-authored-by: Matt Keeler <mjkeeler7@gmail.com> * [CC-6039] Update builtin policy descriptions (#18705) * Net-2713/resource apply command (#18610) * feat: implement apply command * fix: resolve lint issues * refactor: use fixed types * fix: ci lint failures after main rebase * NET-5530 Support response header modifiers on http-route config entry (#18646) * Add response header filters to http-route config entry definitions * Map response header filters from config entry when constructing route destination * Support response header modifiers at the service level as well * Update protobuf definitions * Update existing unit tests * Add response filters to route consolidation logic * Make existing unit tests more robust * Add missing docstring * Add changelog entry * Add response filter modifiers to existing integration test * Add more robust testing for response header modifiers in the discovery chain * Add more robust testing for request header modifiers in the discovery chain * Modify test to verify that service filter modifiers take precedence over rule filter modifiers * fix: emit consul version metric on a regular interval (#18724) * [NET-5330] Support templated policies in Binding rules (#18719) * [NET-5330] Support templated policies in Binding rules * changelog for templated policy support in binding rules * NET-5530 Generate deep-copy code (#18730) * Generate deep-copy code * Undo license header removal * sidecar-proxy controller: Add support for transparent proxy (NET-5069) (#18458) This commit adds support for transparent proxy to the sidecar proxy controller. As we do not yet support inferring destinations from intentions, this assumes that all services in the cluster are destinations. * Prefix sidecar proxy test files with source and destination. (#18620) * mesh-controller: handle L4 protocols for a proxy without upstreams * sidecar-controller: Support explicit destinations for L4 protocols and single ports. * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * endpoints-controller: add workload identity to the service endpoints resource * small fixes * review comments * Address PR comments * sidecar-proxy controller: Add support for transparent proxy This currently does not support inferring destinations from intentions. * PR review comments * mesh-controller: handle L4 protocols for a proxy without upstreams * sidecar-controller: Support explicit destinations for L4 protocols and single ports. * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * endpoints-controller: add workload identity to the service endpoints resource * small fixes * review comments * Make sure endpoint refs route to mesh port instead of an app port * Address PR comments * fixing copyright * tidy imports * sidecar-proxy controller: Add support for transparent proxy This currently does not support inferring destinations from intentions. * tidy imports * add copyright headers * Prefix sidecar proxy test files with source and destination. * Update controller_test.go --------- Co-authored-by: Iryna Shustava <iryna@hashicorp.com> Co-authored-by: R.B. Boyer <rb@hashicorp.com> Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com> * k8s: Update audit-logging docs to include K8s examples (#18721) Update audit-logging.mdx * Fix windows integrations tests machine size (#18736) fix windows integrations tests machine size * Increase timeout for integration test windows. (#18737) increase timeout * Net-4292/list command (#18649) * feat: implement list command * refactor: apply command file parsing * Added logs for debugging (#18740) * added logs * added echo * removed pull request * xds: update golden tests to be deterministic (#18707) * Run copyright after running deep-copy as part of the Makefile/CI (#18741) * execute copyright headers after performing deep-copy generation. * fix copyright install * Apply suggestions from code review Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * Apply suggestions from code review Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * rename steps to match codegen naming * remove copywrite install category --------- Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * [NET-5333] Add api to read/list and preview templated policies (#18748) * NET-5132 - Configure multiport routing for connect proxies in TProxy mode (#18606) * mesh-controller: handle L4 protocols for a proxy without upstreams * sidecar-controller: Support explicit destinations for L4 protocols and single ports. * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * endpoints-controller: add workload identity to the service endpoints resource * small fixes * review comments * Address PR comments * sidecar-proxy controller: Add support for transparent proxy This currently does not support inferring destinations from intentions. * PR review comments * mesh-controller: handle L4 protocols for a proxy without upstreams * sidecar-controller: Support explicit destinations for L4 protocols and single ports. * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * endpoints-controller: add workload identity to the service endpoints resource * small fixes * review comments * Make sure endpoint refs route to mesh port instead of an app port * Address PR comments * fixing copyright * tidy imports * sidecar-proxy controller: Add support for transparent proxy This currently does not support inferring destinations from intentions. * tidy imports * add copyright headers * Prefix sidecar proxy test files with source and destination. * Update controller_test.go * NET-5132 - Configure multiport routing for connect proxies in TProxy mode * formatting golden files * reverting golden files and adding changes in manually. build implicit destinations still has some issues. * fixing files that were incorrectly repeating the outbound listener * PR comments * extract AlpnProtocol naming convention to getAlpnProtocolFromPortName(portName) * removing address level filtering. * adding license to resources_test.go --------- Co-authored-by: Iryna Shustava <iryna@hashicorp.com> Co-authored-by: R.B. Boyer <rb@hashicorp.com> Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com> * added time stamps (#18757) * fix: write endpoint errors out gracefully (#18743) * [NET-5574] Update Go version to 1.20.8 (#18742) Update Go version to 1.20.8 This resolves several CVEs (see changelog entry). * Add Envoy golden test for OTEL access logging extension (#18760) * mesh: create new routes-controller to reconcile xRoute types into a ComputedRoutes resource (#18460) This new controller produces an intermediate output (ComputedRoutes) that is meant to summarize all relevant xRoutes and related mesh configuration in an easier-to-use format for downstream use to construct the ProxyStateTemplate. It also applies status updates to the xRoute resource types to indicate that they are themselves semantically valid inputs. * xds controller: setup watches for and compute leaf cert references in ProxyStateTemplate, and wire up leaf cert manager dependency (#18756) * Refactors the leafcert package to not have a dependency on agent/consul and agent/cache to avoid import cycles. This way the xds controller can just import the leafcert package to use the leafcert manager. The leaf cert logic in the controller: * Sets up watches for leaf certs that are referenced in the ProxyStateTemplate (which generates the leaf certs too). * Gets the leaf cert from the leaf cert cache * Stores the leaf cert in the ProxyState that's pushed to xds * For the cert watches, this PR also uses a bimapper + a thin wrapper to map leaf cert events to related ProxyStateTemplates Since bimapper uses a resource.Reference or resource.ID to map between two resource types, I've created an internal type for a leaf certificate to use for the resource.Reference, since it's not a v2 resource. The wrapper allows mapping events to resources (as opposed to mapping resources to resources) The controller tests: Unit: Ensure that we resolve leaf cert references Lifecycle: Ensure that when the CA is updated, the leaf cert is as well Also adds a new spiffe id type, and adds workload identity and workload identity URI to leaf certs. This is so certs are generated with the new workload identity based SPIFFE id. * Pulls out some leaf cert test helpers into a helpers file so it can be used in the xds controller tests. * Wires up leaf cert manager dependency * Support getting token from proxytracker * Add workload identity spiffe id type to the authorize and sign functions --------- Co-authored-by: John Murret <john.murret@hashicorp.com> * Test: NET-5592 - update Nomad integration testing (#18768) NET-5592 - update Nomad integration testing * Add workload identity ACL rules (#18769) * Windows Integration Test Changes (#18758) * some changes to debug * revert machines * increased timeout * added sleep 10 seconds before test start * chagne envoy version * removed sleep * revert timeout * replace position * removed date * Revert "[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437)" This reverts commit |
1 year ago |
hc-github-team-consul-core |
d0e2e9737e
|
Backport of Fix type of datacenter in Service Resolvers Config Entry into release/1.15.x (#19012)
* Fix type of datacenter in Service Resolvers Config Entry (#19004) * fix redirect datacenter doc --------- Co-authored-by: Ashesh Vidyut <134911583+absolutelightning@users.noreply.github.com> Co-authored-by: absolutelightning <ashesh.vidyut@hashicorp.com> |
1 year ago |
hc-github-team-consul-core |
cbbc740134
|
Backport of peerstream: fix flaky test related to autopilot integration into release/1.15.x (#18989)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
6a8aede243
|
Backport of Fix docs for log file name changes into release/1.15.x (#18976)
* Update list of Envoy versions (#18300) Update supported envoy versions to 1.24.10, 1.25.9, 1.26.4, 1.27.0. * [NET-4904] Update list of Envoy versions in docs (#18306) Update list of Envoy versions in docs Update supported Envoy versions across Consul release versions. * Update actions for TSCCR (#18317) Update action versions before deadline * Fix topology view when displaying mixed connect-native/normal services. (#13023) * Fix topoloy intention with mixed connect-native/normal services. If a service is registered twice, once with connect-native and once without, the topology views would prune the existing intentions. This change brings the code more in line with the transparent proxy behavior. * Dedupe nodes in the ServiceTopology ui endpoint (like done with tags). * Consider a service connect-native as soon as one instance is. * Stop JWT provider from being written in non default namespace (#18325) * docs: Fix some comments (#17118) Signed-off-by: cui fliter <imcusg@gmail.com> * [NET-4703] Prevent partial application of Envoy extensions (#18068) Prevent partial application of Envoy extensions Ensure that non-required extensions do not change xDS resources before exiting on failure by cloning proto messages prior to applying each extension. To support this change, also move `CanApply` checks up a layer and make them prior to attempting extension application, s.t. we avoid unnecessary copies where extensions can't be applied. Last, ensure that we do not allow panics from `CanApply` or `Extend` checks to escape the attempted extension application. * docs: Simplify example jq commands by removing pipes (#18327) Simplify jq command examples by removing pipes to other commands. * fix typo in create a mesh token docs (#18337) * [CC-5719] Add support for builtin global-read-only policy (#18319) * [CC-5719] Add support for builtin global-read-only policy * Add changelog * Add read-only to docs * Fix some minor issues. * Change from ReplaceAll to Sprintf * Change IsValidPolicy name to return an error instead of bool * Fix PolicyList test * Fix other tests * Apply suggestions from code review Co-authored-by: Paul Glass <pglass@hashicorp.com> * Fix state store test for policy list. * Fix naming issues * Update acl/validation.go Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com> * Update agent/consul/acl_endpoint.go --------- Co-authored-by: Paul Glass <pglass@hashicorp.com> Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com> * [NET-5121] proxystate: move protos to subdirectory to avoid conflicts (#18335) * also makes a few protos updates * resource: adding various helpers for working with resources (#18342) This is a bit of a grab bag of helpers that I found useful for working with them when authoring substantial Controllers. Subsequent PRs will make use of them. * Wasm integration tests for local and remote wasm files (#17756) * wasm integration tests for local and remote wasm files refactoring and cleanup for wasm testing remove wasm debug logging PR feedback, wasm build lock correct path pattern for wasm build files Add new helper function to minimize changes to existing test code Remove extra param mod tidy add custom service setup to test lib add wait until static server sidecar can reach nginx sidecar Doc comments PR feedback Update workflows to compile wasm for integration tests Fix docker build path Fix package name for linter Update makefile, fix redeclared function Update expected wasm filename Debug test ls in workflow remove pwd in favor of relative path more debugging Build wasm in compatability tests as well Build wasm directly in ci rather than in container Debug tinygo and llvm version Change wasm file extension Remove tinygo debugging Remove extra comments * Add compiled wasm and build instructions * [HCP Telemetry] Periodic Refresh for Dynamic Telemetry Configuration (#18168) * OTElExporter now uses an EndpointProvider to discover the endpoint * OTELSink uses a ConfigProvider to obtain filters and labels configuration * improve tests for otel_sink * Regex logic is moved into client for a method on the TelemetryConfig object * Create a telemetry_config_provider and update deps to use it * Fix conversion * fix import newline * Add logger to hcp client and move telemetry_config out of the client.go file * Add a telemetry_config.go to refactor client.go * Update deps * update hcp deps test * Modify telemetry_config_providers * Check for nil filters * PR review updates * Fix comments and move around pieces * Fix comments * Remove context from client struct * Moved ctx out of sink struct and fixed filters, added a test * Remove named imports, use errors.New if not fformatting * Remove HCP dependencies in telemetry package * Add success metric and move lock only to grab the t.cfgHahs * Update hash * fix nits * Create an equals method and add tests * Improve telemetry_config_provider.go tests * Add race test * Add missing godoc * Remove mock for MetricsClient * Avoid goroutine test panics * trying to kick CI lint issues by upgrading mod * imprve test code and add hasher for testing * Use structure logging for filters, fix error constants, and default to allow all regex * removed hashin and modify logic to simplify * Improve race test and fix PR feedback by removing hash equals and avoid testing the timer.Ticker logic, and instead unit test * Ran make go-mod-tidy * Use errtypes in the test * Add changelog * add safety check for exporter endpoint * remove require.Contains by using error types, fix structure logging, and fix success metric typo in exporter * Fixed race test to have changing config values * Send success metric before modifying config * Avoid the defer and move the success metric under * NET-4240 - Snapshots are failing on Windows (#18302) * fix go mod * fix go sum * added change log * ran make go mod tidy * Register ProxyStateTemplate Resource (#18316) Also, change the ProxyState.id to identity. This is because we already have the id of this proxy from the resource, and this id should be name-aligned with the workload it represents. It should also have the owner ref set to the workload ID if we need that. And so the id field seems unnecessary. We do, however, need a reference to workload identity so that we can authorize the proxy when it initially connects to the xDS server. * [NET-5146] security: Update Go version to 1.20.7 and `x/net` to 0.13.0 (#18358) * Update Go version to 1.20.7 This resolves [CVE-2023-29409] (https://nvd.nist.gov/vuln/detail/CVE-2023-29409)(`crypto/tls`). * Bump golang.org/x/net to 0.13.0 Addresses [CVE-2023-3978](https://nvd.nist.gov/vuln/detail/CVE-2023-3978) for security scans (non-impacting). * mesh: adding the protobuf types and resources backing mesh config v2 (#18351) * [OSS] test: xds coverage for routes (#18369) test: xds coverage for routes * Fix policy lookup to allow for slashes (#18347) * Fix policy lookup to allow for slashes * Fix suggestions * Fix other test * Revert some lines * add some initial CODEOWNERS (#18346) * Add redirects for mesh-gateway docs (#18377) * expose grpc as http endpoint (#18221) expose resource grpc endpoints as http endpoints * bimapper: fix a bug and add some more test coverage (#18387) * [docs] Fix ServiceDefaults example in distributed tracing (#17212) Fix ServiceDefaults example in distributed tracing. * Fix #17730 - Dev mode has new line (#18367) * adding new line only in case of pretty in url not in dev mode * change log added * chore: make go-mod-tidy (#18388) * resource: Make resource read tenancy aware (#18397) * Not using chmod - fixed integration test for Enterprise (#18401) * Not using chmod * checking icacls * Removed push * replaced ordered list of rate limit ops with flow diagram (#18398) * replaced ordered list of rate limit ops with flow diagram * made diagram font bigger * updated colors for dark mode img * fixed typo * recentered dark mode image * Apply suggestions from code review Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> --------- Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> * Upgrade test: remove outdated test and disable log due to verbosity (#18403) * remove outdated test * disable log since we have too many parallel tests * bump testcontainers-go from 0.22.0 and remove pinned go version in in… (#18395) * bump testcontainers-go from 0.22.0 and remove pinned go version in integ test * go mod tidy * Replace deprecated target.Authority with target.URL.Host * Add ServiceEndpoints Mutation hook tests (#18404) * Add ServiceEndpoints Mutation hook tests * Move endpoint owner validation into the validation hook Also there were some minor changes to error validation to account for go-cmp not liking to peer through an errors.errorstring type that get created by errors.New * catalog: add FailoverPolicy mutation and validation hooks (#18390) Add most of the validation and mutation hooks for the FailoverPolicy resource. * NET-5115 Add retry + timeout filters for api-gateway (#18324) * squash, implement retry/timeout in consul core * update tests * catalog: adding a controller to reconcile FailoverPolicy resources (#18399) Add most of the semantic cross-resource validation for FailoverPolicy resources using a new controller. * fix the error in ent repo (#18421) fix the error in ent repo * build: updates for 1.16.1 release (#18415) * build: updates for 1.16.1 release * build: fix missing replace directive for envoyextensions * build: go mod tidy testing/deployer * update ECS links (#18419) * docs: fix incorrect proxy-defaults config in Lua Envoy extension (#18418) fix incorrect proxy-defaults config * resource: Make resource write tenancy aware (#18423) * [NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437) * Add logging to locality policy application In OSS, this is currently a no-op. * Inherit locality when registering sidecars When sidecar locality is not explicitly configured, inherit locality from the proxied service. * NET-4984: Update APIGW Config Entries for JWT Auth (#18366) * Added oss config entries for Policy and JWT on APIGW * Updated structs for config entry * Updated comments, ran deep-copy * Move JWT configuration into OSS file * Add in the config entry OSS file for jwts * Added changelog * fixing proto spacing * Moved to using manually written deep copy method * Use pointers for override/default fields in apigw config entries * Run gen scripts for changed types * k8s compat - Openshift versions (#18307) * Update compatibility.mdx Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com> * APIGW: Update HTTPRouteConfigEntry for JWT Auth (#18422) * Updated httproute config entry for JWT Filters * Added manual deepcopy method for httproute jwt filter * Fix test * Update JWTFilter to be in oss file * Add changelog * Add build tags for deepcopy oss file * [COMPLIANCE] License changes (#18443) * Adding explicit MPL license for sub-package This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Adding explicit MPL license for sub-package This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Updating the license from MPL to Business Source License Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at <Blog URL>, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl. * add missing license headers * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 --------- Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com> * Net-2708/delete resource endpoint (#18420) * feat: add http delete endpoint for resource service * refactor: clean up * Disable deep-copy codegen verification for now. (#18446) Once we figure out what to do with license headers for these files we should re-enable this check. * build: upgrade to latest buf v1.26.0 (#18426) * NET-4952 Add docs for export command (#18425) * Init file for services export command docs * Add link for export command to nav * Add export to list of subcommands for services * Add usage and basic command options * Add API options using includes * Add section for enterprise options * Include argument value in flag format * Add examples * Apply suggestions from code review Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> --------- Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> * Net-2712/resource hcl parsing (#18250) * Initial protohcl implementation Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com> Co-authored-by: Daniel Upton <daniel@floppy.co> * resourcehcl: implement resource decoding on top of protohcl Co-authored-by: Daniel Upton <daniel@floppy.co> * fix: resolve ci failures * test: add additional unmarshalling tests * refactor: update function test to clean protohcl package imports --------- Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com> Co-authored-by: Daniel Upton <daniel@floppy.co> * read endpoint (#18268) implement http read endpoint to expose resource grpc service read method * Net-2707/list resource endpoint (#18444) feat: list resources endpoint * Fix incorrect yaml in examples (#18463) * NET-5187: Upgrade test timeout due to log producer errors (#18461) Stop log producer before restarting container * [NET-4799] [OSS] xdsv2: listeners L4 support for connect proxies (#18436) * refactor to avoid future import cycles * resource: Make resource list tenancy aware (#18475) * [COMPLIANCE] License update (#18479) Update BUSL LICENSE to include licensed product and version. Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com> * docs: specify manual server metadata intervention (#18477) * docs: Update OpenShift compatibility (#18478) Update compatibility.mdx * resource: Make resource delete tenancy aware (#18476) resource: Make resource delete tenancy awarae * Add license-checker action that fails when any backported file contains BUSL header (#18485) * Add license-checker action that fails when any backported file contains BUSL header * Quote echoed variable to retain line breaks * Add ticket to reference for more details * docs: Update K8s TGW tutorial to reliably obtain role ID (#18474) The `grep` command used to obtain the ID for the terminating gateway role is not reliable in all scenarios. For example, if there is a similarly named role, the command may return the wrong role ID for the active terminating gateway instance. This commit updates the command to use jq to obtain the role ID. If multiple roles are found, jq will raise an error informing the user that it cannot reliably determine the role ID. * NET-5371 License checker pt2 (#18491) * Update grep command to work on ubuntu * Run license checker when new commits are pushed to PR * README - Update KV use case to Dynamic App Configuration (#18301) * Update README.md * Update kv.mdx * Add BUSL badge * README - re-order badges and update hub link (#18498) Update README.md * [NET-5163] Support locality testing in consul-container (#18484) * Support locality testing in consul-container Support including locality in client sidecar config. Also align test config structs with Ent to avoid future conflicts. * Refactor consul-container fortio helpers Refactor fortio test helpers to separate HTTP retries from waiting on fortio result changes due to e.g. service startup and failovers. * NET-4853 - xds v2 - implement base connect proxy functionality for clusters (#18499) * Fix HCL (#18513) * Fix HCL * Update create-sameness-groups.mdx * NET-4932 - xds v2 - implement base connect proxy functionality for endpoints (#18500) * NET-4853 - xds v2 - implement base connect proxy functionality for clusters * NET-4853 - xds v2 - implement base connect proxy functionality for clusters * NET-4932 - xds v2 - implement base connect proxy functionality for endpoints * Update endpoints_test.go * gofmt * Update naming.go * Support custom watches on controller (#18439) * Support custom watches on controller * refactor mapper methods * NET-4858 - xds v2 - implement base connect proxy functionality for routes (#18501) * NET-4853 - xds v2 - implement base connect proxy functionality for clusters * NET-4853 - xds v2 - implement base connect proxy functionality for clusters * NET-4932 - xds v2 - implement base connect proxy functionality for endpoints * Update endpoints_test.go * gofmt * NET-4858 - Make connect proxy route tests pass using xds v2 * Update endpoints_test.go * Update naming.go * use alsoRunTestForV2 * remove unused makeAddress * gofmt * fixing clusters * bimapper: allow to untrack links and support reference or id (#18451) * bimapper: fix data race (#18519) * CI Split integration tests to run nightly and every PR (#18518) * CI Split integration tests to run nightly and every PR * Checkout release branch for nightly test * Fix broken links caught in weekly report (#18522) * fix broken link caught in weekly report * Apply suggestions from code review Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> --------- Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> * Create nightly test-integration for consul release branch (#18530) * Create nightly test-integration for consul release branch * test * fix * docs: Fix spelling errors across various pages on the site (#18533) This commit fixes numerous spelling errors across the site and also removes unnecessary whitespace that was present in the edited files. * Make proto-public license MPL (#18531) * Make proto-public license MPL * Add proto-public dir to exclusion list in .copywrite.hcl * NET-4943 - Implement ProxyTracker (#18535) * resource: Make resource watchlist tenancy aware (#18539) * Reduce required type arguments for DecodedResource (#18540) * OSS -> CE (community edition) changes (#18517) * CI: fix envoy versions in CI of release branch (#18538) * CI: fix envoy versions in CI of release branch * - remove steps sds for 1.15 nightly run - checkout the release branch * add default name * fix * Update go-tests.yml * fix checkout code * add comments and revert schedule * catalog: add failover mode enum validation (#18545) * mesh: add validation for the new pbmesh resources (#18410) Adds validation for HTTPRoute, GRPCRoute, TCPRoute, DestinationPolicy, and ComputedRoutes. * xds controller: resolve ServiceEndpoints references in ProxyStateTemp… (#18544) xds controller: resolve ServiceEndpoints references in ProxyStateTemplate * mesh: adding type aliases for mesh resource usage (#18448) Introduces some simple type aliases for DecodedResource[*X] wrappers for each type which cut down on the verbosity * Update trust bundle into proxy-state-template (#18550) * catalog: validating Protocol and Health enums on Service, Workload, and ServiceEndpoints (#18554) * chore: fix missing/incorrect license headers (#18555) * fix for , non presence of consul-version meta (#18464) * fix for #18406 , non presence of consul-version meta * removed redundant checks * updated mock-api to mimic api response for synthetic nodes * added test to test getDistinctConsulVersions method with synthetic-node case * updated typo in comments * added change log * feat: add experiments flag to testserver sdk (#18541) * bug: prevent go routine leakage due to existing DeferCheck (#18558) * bug: prevent go routine leakage due to existing DeferCheck * add changelog * NET-5382 & PLAT-1159: Do not trigger workflow if only doc files are in commit history (#18528) NET-5382: Do not run workflow runs if at least one path matches * UI: community verbiage (#18560) * chore: update community verbiage * chore: add changelog entry * Fix Windows FIPS Build (#18357) * Fix Windows FIPS Build * create new file for windows arm * removed build tag * fix buidl tags * fix multiple go build * CE port of enterprise extension (#18572) CE commit * resource: Make resource listbyowner tenancy aware (#18566) * NET-5147: Added placeholder structs for JWT functionality (#18575) * Added placeholder structs for JWT functionality * Added watches for CE vs ENT * Add license header * Undo plumbing work * Add context arg * resource: Make resource writestatus tenancy aware (#18577) * NET-5338 - NET-5338 - Run a v2 mode xds server (#18579) * NET-5338 - NET-5338 - Run a v2 mode xds server * fix linting * CI: send slack notification on failed nightly job (#18578) * CE commit (#18583) * Fix broken link on sameness group page (#18511) fix broken link * Fix typo in permissive mTLS docs (#18551) Update onboarding-tproxy-mode.mdx * Set concurrency for workflows (#18567) * Set concurrency for workflows * test: run automated tests against Vault 1.11 - 1.14 (#18590) Begin to test against Vault 1.14. Drop tests against Vault 1.10. * Reduce the frequency of metric exports to minutely (#18584) * NET-4944 - wire up controllers with proxy tracker (#18603) Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com> * Watch the ProxyTracker from xDS controller (#18611) * Distinguish v2 catalog Protocol unset from default (#18612) Even though we intend to default to TCP when this field is not explicitly provided, uncluding an `UNSPECIFIED` default enum value allows us to create inheritance chains, e.g. service to workload. * Added OpenTelemetry Access Logging Envoy extension (#18336) * [HCP Telemetry] Move first TelemetryConfig Fetch into the TelemetryConfigProvider (#18318) * Add Enabler interface to turn sink on/off * Use h for hcpProviderImpl vars, fix PR feeback and fix errors * Keep nil check in exporter and fix tests * Clarify comment and fix function name * Use disable instead of enable * Fix errors nit in otlp_transform * Add test for refreshInterval of updateConfig * Add disabled field in MetricsConfig struct * Fix PR feedback: improve comment and remove double colons * Fix deps test which requires a maybe * Update hcp-sdk-go to v0.61.0 * use disabled flag in telemetry_config.go * Handle 4XX errors in telemetry_provider * Fix deps test * Check 4XX instead * Run make go-mod-tidy * update comments and docs about running envoy integration tests with the ENVOY_VERSION set. (#18614) update ENVOY_VERSION and documentation of it used in the bats envoy tests. Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com> * delete all v2 resources type when deleting a namespace (CE) (#18621) * add namespace scope to ServiceV1Alpha1Type * add CE portion of namespace deletion * resource: Allow nil tenancy (#18618) * PLAT-1192 - Run CI on smaller instances (#18624) Use smaller runners * NET-3181 - Allow log file naming like Nomad (#18617) * fixes file name for consul * added log file * added tests for rename method * Add the plumbing for APIGW JWT work (#18609) * Add the plumbing for APIGW JWT work * Remove unneeded import * Add deep equal function for HTTPMatch * Added plumbing for status conditions * Remove unneeded comment * Fix comments * Add calls in xds listener for apigateway to setup listener jwt auth * docs: admin partition and DNS clarification (#18613) * fix: make UNSPECIFIED protocol pass validation (#18634) We explicitly enumerate the allowed protocols in validation, so this change is necessary to use the new enum value. Also add tests for enum validators to ensure they stay aligned to protos unless we explicitly want them to diverge. * NET 1594 - Snapshot Agent Filename Should Include Consul Version / Datacenter (#18625) * init * tests added and few fixes * revert arg message * changelog added * removed var declaration * fix CI * fix test * added node name and status * updated save.mdx * added example * fix tense * fix description * Net 3181 consul gh issue 15709 allow log file naming like nomad - fix bug (#18631) * fixes file name for consul * added log file * added tests for rename method * append instead of trunc * fix file truncate issue * added changelog * fix for build destros ci * removed changelog * solaris * resource: Require scope for resource registration (#18635) * [NET-4958] Fix issue where envoy endpoints would fail to populate after snapshot restore (#18636) Fix issue where agentless endpoints would fail to populate after snapshot restore. Fixes an issue that was introduced in #17775. This issue happens because a long-lived pointer to the state store is held, which is unsafe to do. Snapshot restorations will swap out this state store, meaning that the proxycfg watches would break for agentless. * Add extra logging for mesh health endpoints. (#18647) * feat: Change global-read-only policy to non editable (#18602) * remove stray FIPS file (#18651) * Add known issue notice for #18636. (#18650) * fix: remove Intention test with latency to make consul-enterprise rep… (#18654) fix: remove Intention test with latency to make consul-enterprise repo tests work * fix: add telemetry bind socket to proxyConfiguration proto (#18652) * feat: copy edits for built-in policy alert (#18655) * test: fix snapshot save w/ append test for ENT (#18656) * Net 2714/xw cli read command (#18462) enable `consul resource read` command in cli * change log for audit log (#18668) * change log for audit log * fix file name * breaking change * Add TCP+TLS Healthchecks (#18381) * Begin adding TCPUseTLS * More TCP with TLS plumbing * Making forward progress * Keep on adding TCP+TLS support for healthchecks * Removed too many lines * Unit tests for TCP+TLS * Update tlsutil/config.go Co-authored-by: Samantha <hello@entropy.cat> * Working on the tcp+tls unit test * Updated the runtime integration tests * Progress * Revert this file back to HEAD * Remove debugging lines * Implement TLS enabled TCP socket server and make a successful TCP+TLS healthcheck on it * Update docs * Update agent/agent_test.go Co-authored-by: Samantha <hello@entropy.cat> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <hello@entropy.cat> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <hello@entropy.cat> * Update agent/checks/check.go Co-authored-by: Samantha <hello@entropy.cat> * Address comments * Remove extraneous bracket * Update agent/agent_test.go Co-authored-by: Samantha <hello@entropy.cat> * Update agent/agent_test.go Co-authored-by: Samantha <hello@entropy.cat> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <hello@entropy.cat> * Update the mockTLSServer * Remove trailing newline * Address comments * Fix merge problem * Add changelog entry --------- Co-authored-by: Samantha <hello@entropy.cat> * Fix windows Ent runner (#18683) * fix windows image for enterprise * added quotesT * Removed nodename and status from consul snapshot save -append-filename command and using leader version in version (#18680) * init * fix tests * fix tests lint * fix api call inside dc * updated doc * address comments * update guide to reflect tenancy and scope (#18687) * update guide to reflect tenancy and scope * Apply suggestions from code review Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * update ACLHooks signature * Update docs/resources/guide.md Co-authored-by: Semir Patel <semir.patel@hashicorp.com> --------- Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * Add support for querying tokens by service name. (#18667) Add support for querying tokens by service name The consul-k8s endpoints controller has a workflow where it fetches all tokens. This is not performant for large clusters, where there may be a sizable number of tokens. This commit attempts to alleviate that problem and introduces a new way to query by the token's service name. * restore common-topo peering integration tests, but nightly [NET-5476] (#18673) * dataplane: Allow getting bootstrap parameters when using V2 APIs (#18504) This PR enables the GetEnvoyBootstrapParams endpoint to construct envoy bootstrap parameters from v2 catalog and mesh resources. * Make bootstrap request and response parameters less specific to services so that we can re-use them for workloads or service instances. * Remove ServiceKind from bootstrap params response. This value was unused previously and is not needed for V2. * Make access logs generation generic so that we can generate them using v1 or v2 resources. * switch all client nodes in dc2 to dataplane [NET-4299] (#18608) * Reformat proxy docs refresh (#18623) * first commit; reformat PD conf entry * updated proxies overview page * added Deploy SM proxy usage and removed reg index * moved sidecar proxy usage to main proxy folder * recast sidecar reg page as Deploy sidecar services * fix typos * recast SM reg as conf reference- set the sidebar * add redirects * fix links * add PD conf entry usage to appropro pages * edits to proxy conf ref * fix links on index page * example command to write PD conf entry * updated links to old SM proxy reg page * updated links to sidecar service reg page * tryna fix front matter issues * Apply suggestions from code review Co-authored-by: Ronald <roncodingenthusiast@users.noreply.github.com> * added paragraph about SM proxies to overivew * Apply suggestions from code review Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> --------- Co-authored-by: Ronald <roncodingenthusiast@users.noreply.github.com> Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com> * sidecar-proxy controller: L4 controller with explicit upstreams (NET-3988) (#18352) * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * This commit also changes service endpoints to include workload identity. This made the implementation a bit easier as we don't need to look up as many workloads and instead rely on endpoints data. * test: update sidecarproxy/builder golden tests to use determinstic golden data (#18703) * [APIGW] NET-5017 JWT Cleanup/Status Conditions (#18700) * Fixes issues in setting status * Update golden files for changes to xds generation to not use deprecated methods * Fixed default for validation of JWT for route * Added changelog for jwt features (#18709) * fix: NET-1521 show latest config in /v1/agent/self (#18681) * fix: NET-1521 show latest config in /v1/agent/self * Using larger machine for Enterprise (#18713) using 4x large for ent * [NET-5325] ACL templated policies support in tokens and roles (#18708) * [NET-5325] ACL templated policies support in tokens and roles - Add API support for creating tokens/roles with templated-policies - Add CLI support for creating tokens/roles with templated-policies * adding changelog * Adds PassiveHealthCheck Fields to ServiceDefaults and IngressGateway (#18532) Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com> * Instantiate secure resource service client after the grpc server (#18712) * ENT port: test-integ/peering: peer through mesh gateway [NET-4609] (#18605) Co-authored-by: Matt Keeler <mjkeeler7@gmail.com> * [CC-6039] Update builtin policy descriptions (#18705) * Net-2713/resource apply command (#18610) * feat: implement apply command * fix: resolve lint issues * refactor: use fixed types * fix: ci lint failures after main rebase * NET-5530 Support response header modifiers on http-route config entry (#18646) * Add response header filters to http-route config entry definitions * Map response header filters from config entry when constructing route destination * Support response header modifiers at the service level as well * Update protobuf definitions * Update existing unit tests * Add response filters to route consolidation logic * Make existing unit tests more robust * Add missing docstring * Add changelog entry * Add response filter modifiers to existing integration test * Add more robust testing for response header modifiers in the discovery chain * Add more robust testing for request header modifiers in the discovery chain * Modify test to verify that service filter modifiers take precedence over rule filter modifiers * fix: emit consul version metric on a regular interval (#18724) * [NET-5330] Support templated policies in Binding rules (#18719) * [NET-5330] Support templated policies in Binding rules * changelog for templated policy support in binding rules * NET-5530 Generate deep-copy code (#18730) * Generate deep-copy code * Undo license header removal * sidecar-proxy controller: Add support for transparent proxy (NET-5069) (#18458) This commit adds support for transparent proxy to the sidecar proxy controller. As we do not yet support inferring destinations from intentions, this assumes that all services in the cluster are destinations. * Prefix sidecar proxy test files with source and destination. (#18620) * mesh-controller: handle L4 protocols for a proxy without upstreams * sidecar-controller: Support explicit destinations for L4 protocols and single ports. * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * endpoints-controller: add workload identity to the service endpoints resource * small fixes * review comments * Address PR comments * sidecar-proxy controller: Add support for transparent proxy This currently does not support inferring destinations from intentions. * PR review comments * mesh-controller: handle L4 protocols for a proxy without upstreams * sidecar-controller: Support explicit destinations for L4 protocols and single ports. * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * endpoints-controller: add workload identity to the service endpoints resource * small fixes * review comments * Make sure endpoint refs route to mesh port instead of an app port * Address PR comments * fixing copyright * tidy imports * sidecar-proxy controller: Add support for transparent proxy This currently does not support inferring destinations from intentions. * tidy imports * add copyright headers * Prefix sidecar proxy test files with source and destination. * Update controller_test.go --------- Co-authored-by: Iryna Shustava <iryna@hashicorp.com> Co-authored-by: R.B. Boyer <rb@hashicorp.com> Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com> * k8s: Update audit-logging docs to include K8s examples (#18721) Update audit-logging.mdx * Fix windows integrations tests machine size (#18736) fix windows integrations tests machine size * Increase timeout for integration test windows. (#18737) increase timeout * Net-4292/list command (#18649) * feat: implement list command * refactor: apply command file parsing * Added logs for debugging (#18740) * added logs * added echo * removed pull request * xds: update golden tests to be deterministic (#18707) * Run copyright after running deep-copy as part of the Makefile/CI (#18741) * execute copyright headers after performing deep-copy generation. * fix copyright install * Apply suggestions from code review Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * Apply suggestions from code review Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * rename steps to match codegen naming * remove copywrite install category --------- Co-authored-by: Semir Patel <semir.patel@hashicorp.com> * [NET-5333] Add api to read/list and preview templated policies (#18748) * NET-5132 - Configure multiport routing for connect proxies in TProxy mode (#18606) * mesh-controller: handle L4 protocols for a proxy without upstreams * sidecar-controller: Support explicit destinations for L4 protocols and single ports. * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * endpoints-controller: add workload identity to the service endpoints resource * small fixes * review comments * Address PR comments * sidecar-proxy controller: Add support for transparent proxy This currently does not support inferring destinations from intentions. * PR review comments * mesh-controller: handle L4 protocols for a proxy without upstreams * sidecar-controller: Support explicit destinations for L4 protocols and single ports. * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * endpoints-controller: add workload identity to the service endpoints resource * small fixes * review comments * Make sure endpoint refs route to mesh port instead of an app port * Address PR comments * fixing copyright * tidy imports * sidecar-proxy controller: Add support for transparent proxy This currently does not support inferring destinations from intentions. * tidy imports * add copyright headers * Prefix sidecar proxy test files with source and destination. * Update controller_test.go * NET-5132 - Configure multiport routing for connect proxies in TProxy mode * formatting golden files * reverting golden files and adding changes in manually. build implicit destinations still has some issues. * fixing files that were incorrectly repeating the outbound listener * PR comments * extract AlpnProtocol naming convention to getAlpnProtocolFromPortName(portName) * removing address level filtering. * adding license to resources_test.go --------- Co-authored-by: Iryna Shustava <iryna@hashicorp.com> Co-authored-by: R.B. Boyer <rb@hashicorp.com> Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com> * added time stamps (#18757) * fix: write endpoint errors out gracefully (#18743) * [NET-5574] Update Go version to 1.20.8 (#18742) Update Go version to 1.20.8 This resolves several CVEs (see changelog entry). * Add Envoy golden test for OTEL access logging extension (#18760) * mesh: create new routes-controller to reconcile xRoute types into a ComputedRoutes resource (#18460) This new controller produces an intermediate output (ComputedRoutes) that is meant to summarize all relevant xRoutes and related mesh configuration in an easier-to-use format for downstream use to construct the ProxyStateTemplate. It also applies status updates to the xRoute resource types to indicate that they are themselves semantically valid inputs. * xds controller: setup watches for and compute leaf cert references in ProxyStateTemplate, and wire up leaf cert manager dependency (#18756) * Refactors the leafcert package to not have a dependency on agent/consul and agent/cache to avoid import cycles. This way the xds controller can just import the leafcert package to use the leafcert manager. The leaf cert logic in the controller: * Sets up watches for leaf certs that are referenced in the ProxyStateTemplate (which generates the leaf certs too). * Gets the leaf cert from the leaf cert cache * Stores the leaf cert in the ProxyState that's pushed to xds * For the cert watches, this PR also uses a bimapper + a thin wrapper to map leaf cert events to related ProxyStateTemplates Since bimapper uses a resource.Reference or resource.ID to map between two resource types, I've created an internal type for a leaf certificate to use for the resource.Reference, since it's not a v2 resource. The wrapper allows mapping events to resources (as opposed to mapping resources to resources) The controller tests: Unit: Ensure that we resolve leaf cert references Lifecycle: Ensure that when the CA is updated, the leaf cert is as well Also adds a new spiffe id type, and adds workload identity and workload identity URI to leaf certs. This is so certs are generated with the new workload identity based SPIFFE id. * Pulls out some leaf cert test helpers into a helpers file so it can be used in the xds controller tests. * Wires up leaf cert manager dependency * Support getting token from proxytracker * Add workload identity spiffe id type to the authorize and sign functions --------- Co-authored-by: John Murret <john.murret@hashicorp.com> * Test: NET-5592 - update Nomad integration testing (#18768) NET-5592 - update Nomad integration testing * Add workload identity ACL rules (#18769) * Windows Integration Test Changes (#18758) * some changes to debug * revert machines * increased timeout * added sleep 10 seconds before test start * chagne envoy version * removed sleep * revert timeout * replace position * removed date * Revert "[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437)" This reverts commit |
1 year ago |
Blake Covarrubias |
1ef137d326
|
Backport of docs: Fix ServiceDefaults example in distributed tracing into release/1.15.x (#18974)
backport of commit
|
1 year ago |
hc-github-team-consul-core |
c0b41f8537
|
Backport of docs: Change heading to filename in CodeBlockConfig into release/1.15.x (#18968)
Backport of docs: Change heading to filename in CodeBlockConfig to release/1.15.x
backport of commit
|
1 year ago |
hc-github-team-consul-core |
b3e99edb4a
|
Backport of docs: Replace unicode quotes with ASCII quotes into release/1.15.x (#18971)
backport of commit
|
1 year ago |