Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of docs: improve upgrade path guidance into release/1.15.x #16927

This pull request is big! We’re only showing the most recent 250 commits.

Commits on Feb 17, 2023

  1. ISSUE_TEMPLATE: Update issue template to include ask for HCL config f…

    …iles for bugs (#16307)
    
    * Update bug_report.md
    David Yu authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    a8dc108 View commit details
    Browse the repository at this point in the history
  2. Fix hostname alignment checks for HTTPRoutes (#16300)

    * Fix hostname alignment checks for HTTPRoutes
    Andrew Stucki authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    e4a992c View commit details
    Browse the repository at this point in the history
  3. Fix panicky xDS test flakes (#16305)

    * Add defensive guard to make some tests less flaky and panic less
    
    * Do the actual fix
    Andrew Stucki authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    ee99d5c View commit details
    Browse the repository at this point in the history
  4. Add stricter validation and some normalization code for API Gateway C…

    …onfigEntries (#16304)
    
    * Add stricter validation and some normalization code for API Gateway ConfigEntries
    Andrew Stucki authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    58801cc View commit details
    Browse the repository at this point in the history
  5. ISSUE TEMPLATE: update issue templates to include comments instead of…

    … inline text for instructions (#16313)
    
    * Update bug_report.md
    * Update feature_request.md
    * Update ui_issues.md
    * Update pull_request_template.md
    David Yu authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    9ed554b View commit details
    Browse the repository at this point in the history
  6. [OSS] security: update go to 1.20.1 (#16263)

    * security: update go to 1.20.1
    DanStough authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    f143610 View commit details
    Browse the repository at this point in the history
  7. Protobuf Refactoring for Multi-Module Cleanliness (#16302)

    Protobuf Refactoring for Multi-Module Cleanliness
    
    This commit includes the following:
    
    Moves all packages that were within proto/ to proto/private
    Rewrites imports to account for the packages being moved
    Adds in buf.work.yaml to enable buf workspaces
    Names the proto-public buf module so that we can override the Go package imports within proto/buf.yaml
    Bumps the buf version dependency to 1.14.0 (I was trying out the version to see if it would get around an issue - it didn't but it also doesn't break things and it seemed best to keep up with the toolchain changes)
    
    Why:
    
    In the future we will need to consume other protobuf dependencies such as the Google HTTP annotations for openapi generation or grpc-gateway usage.
    There were some recent changes to have our own ratelimiting annotations.
    The two combined were not working when I was trying to use them together (attempting to rebase another branch)
    Buf workspaces should be the solution to the problem
    Buf workspaces means that each module will have generated Go code that embeds proto file names relative to the proto dir and not the top level repo root.
    This resulted in proto file name conflicts in the Go global protobuf type registry.
    The solution to that was to add in a private/ directory into the path within the proto/ directory.
    That then required rewriting all the imports.
    
    Is this safe?
    
    AFAICT yes
    The gRPC wire protocol doesn't seem to care about the proto file names (although the Go grpc code does tack on the proto file name as Metadata in the ServiceDesc)
    Other than imports, there were no changes to any generated code as a result of this.
    mkeeler authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    085c0ad View commit details
    Browse the repository at this point in the history
  8. new docs for consul and consul-k8s troubleshoot command (#16284)

    * new docs for consul and consul-k8s troubleshoot command
    
    * add changelog
    
    * add troubleshoot command
    
    * address comments, and update cli output to match
    
    * revert changes to troubleshoot upstreams, changes will happen in separate pr
    
    * Update .changelog/16284.txt
    
    Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
    
    * address comments
    
    * update trouble proxy output
    
    * add missing s, add required fields in usage
    
    ---------
    
    Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
    malizz and ndhanushkodi authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    c9c49ea View commit details
    Browse the repository at this point in the history
  9. Normalize all API Gateway references (#16316)

    Andrew Stucki authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    15d2684 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    4607b53 View commit details
    Browse the repository at this point in the history
  11. ISSUE_TEMPLATE: formatting for comments (#16325)

    * Update all templates.
    David Yu authored Feb 17, 2023
    Configuration menu
    Copy the full SHA
    4126088 View commit details
    Browse the repository at this point in the history

Commits on Feb 18, 2023

  1. Configuration menu
    Copy the full SHA
    82b5b4c View commit details
    Browse the repository at this point in the history

Commits on Feb 21, 2023

  1. fix: add tls config to unix socket when https is used (#16301)

    * fix: add tls config to unix socket when https is used
    
    * unit test and changelog
    huikang authored Feb 21, 2023
    Configuration menu
    Copy the full SHA
    8e5942f View commit details
    Browse the repository at this point in the history
  2. fix flakieness (#16338)

    xwa153 authored Feb 21, 2023
    Configuration menu
    Copy the full SHA
    9d55cd1 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    8997f2b View commit details
    Browse the repository at this point in the history
  4. [API Gateway] Validate listener name is not empty (#16340)

    * [API Gateway] Validate listener name is not empty
    
    * Update docstrings and test
    Andrew Stucki authored Feb 21, 2023
    Configuration menu
    Copy the full SHA
    7f9ec78 View commit details
    Browse the repository at this point in the history
  5. Fix issue with peer services incorrectly appearing as connect-enabled. (

    #16339)
    
    Prior to this commit, all peer services were transmitted as connect-enabled
    as long as a one or more mesh-gateways were healthy. With this change, there
    is now a difference between typical services and connect services transmitted
    via peering.
    
    A service will be reported as "connect-enabled" as long as any of these
    conditions are met:
    
    1. a connect-proxy sidecar is registered for the service name.
    2. a connect-native instance of the service is registered.
    3. a service resolver / splitter / router is registered for the service name.
    4. a terminating gateway has registered the service.
    hashi-derek authored Feb 21, 2023
    Configuration menu
    Copy the full SHA
    ad865f5 View commit details
    Browse the repository at this point in the history

Commits on Feb 22, 2023

  1. [API Gateway] Turn down controller log levels (#16348)

    Andrew Stucki authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    823fc82 View commit details
    Browse the repository at this point in the history
  2. [API Gateway] Fix targeting service splitters in HTTPRoutes (#16350)

    * [API Gateway] Fix targeting service splitters in HTTPRoutes
    
    * Fix test description
    Andrew Stucki authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    18e2ee7 View commit details
    Browse the repository at this point in the history
  3. [API Gateway] Various fixes for Config Entry fields (#16347)

    * [API Gateway] Various fixes for Config Entry fields
    
    * simplify logic per PR review
    Andrew Stucki authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    0972697 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    de17c7c View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    5309f68 View commit details
    Browse the repository at this point in the history
  6. Update existing docs from Consul API Gateway -> API Gateway for Kuber…

    …netes (#16360)
    
    * Update existing docs from Consul API Gateway -> API Gateway for Kubernetes
    
    * Update page header to reflect page title change
    
    * Update nav title to match new page title
    nathancoleman authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    b09d04a View commit details
    Browse the repository at this point in the history
  7. initial code (#16296)

    NiniOak authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    84c7b00 View commit details
    Browse the repository at this point in the history
  8. Add changelog entry for API Gateway (Beta) (#16369)

    * Placeholder commit for changelog entry
    
    * Add changelog entry announcing support for API Gateway on VMs
    
    * Adjust casing
    nathancoleman authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    c0384c2 View commit details
    Browse the repository at this point in the history
  9. [API Gateway] Fix infinite loop in controller and binding non-accepte…

    …d routes and gateways (#16377)
    Andrew Stucki authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    641737f View commit details
    Browse the repository at this point in the history
  10. Rate limiter/add ip prefix (#16342)

    * add support for prefixes in the config tree
    
    * fix to use default config when the prefix have no config
    dhiaayachi authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    ae9c228 View commit details
    Browse the repository at this point in the history
  11. Documentation update: Adding K8S clusters to external Consul servers (#…

    …16285)
    
    * Remove Consul Client installation option
    
    With Consul-K8S 1.0 and introduction of Consul-Dataplane, K8S has
    the option to run without running Consul Client agents.
    
    * remove note referring to the same documentation
    
    * Added instructions on the use of httpsPort when servers are not running TLS enabled
    
    * Modified titile and description
    Ranjandas authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    182f6c8 View commit details
    Browse the repository at this point in the history
  12. Add docs for usage endpoint and command (#16258)

    * Add docs for usage endpoint and command
    kyhavlov authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    5400e3d View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    98a771d View commit details
    Browse the repository at this point in the history
  14. Configuration menu
    Copy the full SHA
    2e6b7d7 View commit details
    Browse the repository at this point in the history
  15. Docs/rate limiting 1.15 (#16345)

    * Added rate limit section to agent overview, updated headings per style guide
    
    * added GTRL section and overview
    
    * added usage docs for rate limiting 1.15
    
    * added file for initializing rate limits
    
    * added steps for initializing rate limits
    
    * updated descriptions for rate_limits in agent conf
    
    * updated rate limiter-related metrics
    
    * tweaks to agent index
    
    * Apply suggestions from code review
    
    Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
    Co-authored-by: Krastin Krastev <krastin@hashicorp.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: Krastin Krastev <krastin@hashicorp.com>
    
    * Apply suggestions from code review
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
    Co-authored-by: Krastin Krastev <krastin@hashicorp.com>
    Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
    4 people authored Feb 22, 2023
    Configuration menu
    Copy the full SHA
    340b562 View commit details
    Browse the repository at this point in the history
  16. Configuration menu
    Copy the full SHA
    0c66bbf View commit details
    Browse the repository at this point in the history

Commits on Feb 23, 2023

  1. Configuration menu
    Copy the full SHA
    8ac211b View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    3358d82 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    595131f View commit details
    Browse the repository at this point in the history
  4. Add envoy extension docs (#16376)

    * Add envoy extension docs
    
    * Update message about envoy extensions with proxy defaults
    
    * fix tab error
    
    * Update website/content/docs/connect/proxies/envoy-extensions/usage/lua.mdx
    
    * fix operator prerender issue
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * update envoyextension warning in proxy defaults so its inline
    
    * Update website/content/docs/connect/proxies/envoy-extensions/index.mdx
    
    ---------
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    im2nguyen and trujillo-adam authored Feb 23, 2023
    Configuration menu
    Copy the full SHA
    27af33e View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    3de9f7f View commit details
    Browse the repository at this point in the history
  6. Troubleshoot service to service comms (#16385)

    * Troubleshoot service to service comms
    
    * adjustments
    
    * breaking fix
    
    * api-docs breaking fix
    
    * Links added to CLI pages
    
    * Update website/content/docs/troubleshoot/troubleshoot-services.mdx
    
    Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
    
    * Update website/content/docs/troubleshoot/troubleshoot-services.mdx
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    
    * Update website/content/docs/troubleshoot/troubleshoot-services.mdx
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    
    * nav re-ordering
    
    * Edits recommended in code review
    
    ---------
    
    Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    3 people authored Feb 23, 2023
    Configuration menu
    Copy the full SHA
    d1294cf View commit details
    Browse the repository at this point in the history
  7. Docs/cluster peering 1.15 updates (#16291)

    * initial commit
    
    * initial commit
    
    * Overview updates
    
    * Overview page improvements
    
    * More Overview improvements
    
    * improvements
    
    * Small fixes/updates
    
    * Updates
    
    * Overview updates
    
    * Nav data
    
    * More nav updates
    
    * Fix
    
    * updates
    
    * Updates + tip test
    
    * Directory test
    
    * refining
    
    * Create restructure w/ k8s
    
    * Single usage page
    
    * Technical Specification
    
    * k8s pages
    
    * typo
    
    * L7 traffic management
    
    * Manage connections
    
    * k8s page fix
    
    * Create page tab corrections
    
    * link to k8s
    
    * intentions
    
    * corrections
    
    * Add-on intention descriptions
    
    * adjustments
    
    * Missing </CodeTabs>
    
    * Diagram improvements
    
    * Final diagram update
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    Co-authored-by: David Yu <dyu@hashicorp.com>
    
    * diagram name fix
    
    * Fixes
    
    * Updates to index.mdx
    
    * Tech specs page corrections
    
    * Tech specs page rename
    
    * update link to tech specs
    
    * K8s - new pages + tech specs
    
    * k8s - manage peering connections
    
    * k8s L7 traffic management
    
    * Separated establish connection pages
    
    * Directory fixes
    
    * Usage clean up
    
    * k8s docs edits
    
    * Updated nav data
    
    * CodeBlock Component fix
    
    * filename
    
    * CodeBlockConfig removal
    
    * Redirects
    
    * Update k8s filenames
    
    * Reshuffle k8s tech specs for clarity, fmt yaml files
    
    * Update general cluster peering docs, reorder CLI > API > UI, cross link to kubernetes
    
    * Fix config rendering in k8s usage docs, cross link to general usage from k8s docs
    
    * fix legacy link
    
    * update k8s docs
    
    * fix nested list rendering
    
    * redirect fix
    
    * page error
    
    ---------
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    Co-authored-by: David Yu <dyu@hashicorp.com>
    Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
    5 people authored Feb 23, 2023
    Configuration menu
    Copy the full SHA
    cddf86f View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    7c9801e View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    4653d82 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    6b5e48b View commit details
    Browse the repository at this point in the history
  11. Fix various flaky tests (#16396)

    Chris S. Kim authored Feb 23, 2023
    Configuration menu
    Copy the full SHA
    a518893 View commit details
    Browse the repository at this point in the history
  12. Native API Gateway Docs (#16365)

    * Create empty files
    
    * Copy over content for overview
    
    * Copy over content for usage
    
    * Copy over content for api-gateway config
    
    * Copy over content for http-route config
    
    * Copy over content for tcp-route config
    
    * Copy over content for inline-certificate config
    
    * Add docs to the sidebar
    
    * Clean up overview. Start cleaning up usage
    
    * Add BETA badge to API Gateways portion of nav
    
    * Fix header
    
    * Fix up usage
    
    * Fix up API Gateway config
    
    * Update paths to be consistent w/ other gateway docs
    
    * Fix up http-route
    
    * Fix up inline-certificate
    
    * rename path
    
    * Fix up tcp-route
    
    * Add CodeTabs
    
    * Add headers to config pages
    
    * Fix configuration model for http route and inline certificate
    
    * Add version callout to API gateway overview page
    
    * Fix values for inline certificate
    
    * Fix values for api gateway configuration
    
    * Fix values for TCP Route config
    
    * Fix values for HTTP Route config
    
    * Adds link from k8s gateway to vm gateway page
    
    * Remove versioning warning
    
    * Serve overview page at ../api-gateway, consistent w/ mesh-gateway
    
    * Remove weight field from tcp-route docs
    
    * Linking to usage instead of overview from k8s api-gateway to vm api-gateway
    
    * Fix issues in usage page
    
    * Fix links in usage
    
    * Capitalize Kubernetes
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * remove optional callout
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * Apply suggestions from code review
    
    * Update website/content/docs/connect/gateways/api-gateway/configuration/api-gateway.mdx
    
    * Fix formatting of Hostnames
    
    * Update website/content/docs/api-gateway/index.mdx
    
    * Update website/content/docs/connect/gateways/api-gateway/configuration/http-route.mdx
    
    Co-authored-by: Andrew Stucki <andrew.stucki@hashicorp.com>
    
    * Add cross-linking of config entries
    
    * Fix rendering error on new operator usage docs
    
    * Update website/content/docs/connect/gateways/api-gateway/configuration/http-route.mdx
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * Update website/content/docs/connect/gateways/api-gateway/configuration/http-route.mdx
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * Apply suggestions from code review
    
    * Apply suggestions from code review
    
    * Add BETA badges to config entry links
    
    * http route updates
    
    * Add Enterprise keys
    
    * Use map instead of list for meta field, use consistent formatting
    
    * Convert spaces to tabs
    
    * Add all Enterprise info to TCP Route
    
    * Use pascal case for JSON api-gateway example
    
    * Add enterprise to HCL api-gw cfg
    
    * Use pascal case for missed JSON config fields
    
    * Add enterprise to JSON api-gw cfg
    
    * Add enterprise to api-gw values
    
    * adds enterprise to http route
    
    * Update website/content/docs/connect/gateways/api-gateway/index.mdx
    
    Co-authored-by: danielehc <40759828+danielehc@users.noreply.github.com>
    
    * Add enterprise to api-gw spec
    
    * Add missing namespace, partition + meta to specification
    
    * fixes for http route
    
    * Fix ordering of API Gatetway cfg spec items
    
    * whitespace
    
    * Add linking of values to tcp
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
    
    * Fix comma in wrong place
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
    
    * Move Certificates down
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
    
    * Tabs to spaces in httproute
    
    * Use configuration entry instead of config entry
    
    * Fix indentations on api-gateway and tcp-route
    
    * Add whitespace between code block and prose
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * adds <> to http route
    
    ---------
    
    Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
    Co-authored-by: Melisa Griffin <melisa.griffin@hashicorp.com>
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
    Co-authored-by: Melisa Griffin <missylbytes@users.noreply.github.com>
    Co-authored-by: Andrew Stucki <andrew.stucki@hashicorp.com>
    Co-authored-by: danielehc <40759828+danielehc@users.noreply.github.com>
    Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
    10 people authored Feb 23, 2023
    Configuration menu
    Copy the full SHA
    3c77a89 View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    1ed70cf View commit details
    Browse the repository at this point in the history
  14. Configuration menu
    Copy the full SHA
    d4dee31 View commit details
    Browse the repository at this point in the history

Commits on Feb 24, 2023

  1. Configuration menu
    Copy the full SHA
    ab0d43e View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    dca7c18 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    94b3789 View commit details
    Browse the repository at this point in the history
  4. Basic gobased API gateway spinup test (#16278)

    * wip, proof of concept, gateway service being registered, don't know how to hit it
    
    * checkpoint
    
    * Fix up API Gateway go tests (#16297)
    
    * checkpoint, getting InvalidDiscoveryChain route protocol does not match targeted service protocol
    
    * checkpoint
    
    * httproute hittable
    
    * tests working, one header test failing
    
    * differentiate services by status code, minor cleanup
    
    * working tests
    
    * updated GetPort interface
    
    * fix getport
    
    ---------
    
    Co-authored-by: Andrew Stucki <andrew.stucki@hashicorp.com>
    sarahalsmiller and Andrew Stucki authored Feb 24, 2023
    Configuration menu
    Copy the full SHA
    d99dcd4 View commit details
    Browse the repository at this point in the history
  5. Fix attempt for test fail panics in xDS (#16319)

    * Fix attempt for test fail panics in xDS
    
    * switch to a mutex pointer
    Andrew Stucki authored Feb 24, 2023
    Configuration menu
    Copy the full SHA
    801a173 View commit details
    Browse the repository at this point in the history
  6. update changelog (#16426)

    * update changelog
    
    * fix changelog formatting
    malizz authored Feb 24, 2023
    Configuration menu
    Copy the full SHA
    1ba5e36 View commit details
    Browse the repository at this point in the history

Commits on Feb 25, 2023

  1. Configuration menu
    Copy the full SHA
    d9e6748 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    859abf8 View commit details
    Browse the repository at this point in the history

Commits on Feb 27, 2023

  1. Refactor and move wal docs (#16387)

    * Add WAL documentation. Also fix some minor metrics registration details
    
    * Add tests to verify metrics are registered correctly
    
    * refactor and move wal docs
    
    * Updates to the WAL overview page
    
    * updates to enable WAL usage topic
    
    * updates to the monitoring WAL backend topic
    
    * updates for revert WAL topic
    
    * a few tweaks to overview and udpated metadescriptions
    
    * Apply suggestions from code review
    
    Co-authored-by: Paul Banks <pbanks@hashicorp.com>
    
    * make revert docs consistent with enable
    
    * Apply suggestions from code review
    
    Co-authored-by: Paul Banks <pbanks@hashicorp.com>
    
    * address feedback
    
    * address final feedback
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: Paul Banks <pbanks@hashicorp.com>
    Co-authored-by: trujillo-adam <ajosetru@gmail.com>
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
    5 people authored Feb 27, 2023
    Configuration menu
    Copy the full SHA
    ec4a2e1 View commit details
    Browse the repository at this point in the history
  2. UI: Update Consul UI colors to use HDS colors (#16111)

    * update red color variables to hds
    
    * change background red to be one step lighter
    
    * map oranges
    
    * map greens
    
    * map blues
    
    * map greys
    
    * delete themes, colours: lemon, magenta, strawberry, and vault color aliases
    
    * add unmapped rainbow colours
    
    * replace white and transparent vars, remove unused semantic vars and frame placeholders
    
    * small tweaks to improve contrast, change node health status x/check colours for non-voters to match design doc, replace semantic colour action w hds colour
    
    * add unmapped grays, remove dark theme, manually set nav bar to use dark colours
    
    * map consul pink colour
    
    * map yellows
    
    * add unmapped oranges, delete light theme
    
    * remove readme, base variables, clean up dangling colours
    
    * Start working on the nav disclosure menus
    
    * Update main-nav-horizontal dropdowns
    
    * Format template
    
    * Update box-shadow tokens
    
    * Replace --tone- usage with tokens
    
    * Update nav disabled state and panel border colour
    
    * Replace rgb usage on tile
    
    * Fix permissions modal overlay
    
    * More fixes
    
    * Replace orange-500 with amber-200
    
    * Update badge colors
    
    * Update vertical sidebar colors
    
    * Remove top border on consul peer list ul
    
    ---------
    
    Co-authored-by: wenincode <tyler.wendlandt@hashicorp.com>
    ellacai and wenincode authored Feb 27, 2023
    Configuration menu
    Copy the full SHA
    06ff422 View commit details
    Browse the repository at this point in the history
  3. Add missing link (#16437)

    im2nguyen authored Feb 27, 2023
    Configuration menu
    Copy the full SHA
    378f017 View commit details
    Browse the repository at this point in the history
  4. docs: remove extra whitespace in frontmatter (#16436)

    Bryce Kalow authored Feb 27, 2023
    Configuration menu
    Copy the full SHA
    344411b View commit details
    Browse the repository at this point in the history
  5. Delete Vagrantfile (#16442)

    David Yu authored Feb 27, 2023
    Configuration menu
    Copy the full SHA
    1606472 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    c771346 View commit details
    Browse the repository at this point in the history
  7. UI: Fix rendering issue in search and lists (#16444)

    * Upgrade ember-cli-string-helpers
    
    * add extra lock change
    Tyler Wendlandt authored Feb 27, 2023
    Configuration menu
    Copy the full SHA
    a0862e6 View commit details
    Browse the repository at this point in the history

Commits on Feb 28, 2023

  1. Configuration menu
    Copy the full SHA
    afbc566 View commit details
    Browse the repository at this point in the history
  2. Update ingress-gateways.mdx (#16330)

    * Update ingress-gateways.mdx
    
    Added an example of running the HELM install for the ingress gateways using values.yaml
    
    * Apply suggestions from code review
    
    * Update ingress-gateways.mdx
    
    Adds closing back ticks on example command. The suggesting UI strips them out.
    
    ---------
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    amitchahalgits and trujillo-adam authored Feb 28, 2023
    Configuration menu
    Copy the full SHA
    3cbbd63 View commit details
    Browse the repository at this point in the history
  3. grpc: fix data race in balancer registration (#16229)

    Registering gRPC balancers is thread-unsafe because they are stored in a
    global map variable that is accessed without holding a lock. Therefore,
    it's expected that balancers are registered _once_ at the beginning of
    your program (e.g. in a package `init` function) and certainly not after
    you've started dialing connections, etc.
    
    > NOTE: this function must only be called during initialization time
    > (i.e. in an init() function), and is not thread-safe.
    
    While this is fine for us in production, it's challenging for tests that
    spin up multiple agents in-memory. We currently register a balancer per-
    agent which holds agent-specific state that cannot safely be shared.
    
    This commit introduces our own registry that _is_ thread-safe, and
    implements the Builder interface such that we can call gRPC's `Register`
    method once, on start-up. It uses the same pattern as our resolver
    registry where we use the dial target's host (aka "authority"), which is
    unique per-agent, to determine which builder to use.
    boxofrad authored Feb 28, 2023
    Configuration menu
    Copy the full SHA
    73b9b40 View commit details
    Browse the repository at this point in the history
  4. cli: ensure acl token read -self works (#16445)

    Fixes a regression in #16044
    
    The consul acl token read -self cli command should not require an -accessor-id because typically the persona invoking this would not already know the accessor id of their own token.
    rboyer authored Feb 28, 2023
    Configuration menu
    Copy the full SHA
    2682021 View commit details
    Browse the repository at this point in the history
  5. docs: Add backwards compatibility for Consul 1.14.x and consul-datapl…

    …ane in the Envoy compat matrix (#16462)
    
    * Update envoy.mdx
    David Yu authored Feb 28, 2023
    Configuration menu
    Copy the full SHA
    04f9c6b View commit details
    Browse the repository at this point in the history
  6. gateways: add e2e test for API Gateway HTTPRoute ParentRef change (#1…

    …6408)
    
    * test(gateways): add API Gateway HTTPRoute ParentRef change test
    
    * test(gateways): add checkRouteError helper
    
    * test(gateways): remove EOF check
    
    in CI this seems to sometimes be 'connection reset by peer' instead
    
    * Update test/integration/consul-container/test/gateways/http_route_test.go
    mikemorris authored Feb 28, 2023
    Configuration menu
    Copy the full SHA
    29db217 View commit details
    Browse the repository at this point in the history
  7. Gateway Test HTTPPathRewrite (#16418)

    * add http url path rewrite
    
    * add Mike's test back in
    
    * update kind to use api.APIGateway
    sarahalsmiller authored Feb 28, 2023
    Configuration menu
    Copy the full SHA
    6db445b View commit details
    Browse the repository at this point in the history
  8. cli: remove stray whitespace when loading the consul version from the…

    … VERSION file (#16467)
    
    Fixes a regression from #15631 in the output of `consul version` from:
    
        Consul v1.16.0-dev
        +ent
        Revision 56b86ac+CHANGES
    
    to
    
        Consul v1.16.0-dev+ent
        Revision 56b86ac+CHANGES
    rboyer authored Feb 28, 2023
    Configuration menu
    Copy the full SHA
    ec593c2 View commit details
    Browse the repository at this point in the history
  9. Docs/services refactor docs day 122022 (#16103)

    * converted main services page to services overview page
    
    * set up services usage dirs
    
    * added Define Services usage page
    
    * converted health checks everything page to Define Health Checks usage page
    
    * added Register Services and Nodes usage page
    
    * converted Query with DNS to Discover Services and Nodes Overview page
    
    * added Configure DNS Behavior usage page
    
    * added Enable Static DNS Lookups usage page
    
    * added the Enable Dynamic Queries DNS Queries usage page
    
    * added the Configuration dir and overview page - may not need the overview, tho
    
    * fixed the nav from previous commit
    
    * added the Services Configuration Reference page
    
    * added Health Checks Configuration Reference page
    
    * updated service defaults configuraiton entry to new configuration ref format
    
    * fixed some bad links found by checker
    
    * more bad links found by checker
    
    * another bad link found by checker
    
    * converted main services page to services overview page
    
    * set up services usage dirs
    
    * added Define Services usage page
    
    * converted health checks everything page to Define Health Checks usage page
    
    * added Register Services and Nodes usage page
    
    * converted Query with DNS to Discover Services and Nodes Overview page
    
    * added Configure DNS Behavior usage page
    
    * added Enable Static DNS Lookups usage page
    
    * added the Enable Dynamic Queries DNS Queries usage page
    
    * added the Configuration dir and overview page - may not need the overview, tho
    
    * fixed the nav from previous commit
    
    * added the Services Configuration Reference page
    
    * added Health Checks Configuration Reference page
    
    * updated service defaults configuraiton entry to new configuration ref format
    
    * fixed some bad links found by checker
    
    * more bad links found by checker
    
    * another bad link found by checker
    
    * fixed cross-links between new topics
    
    * updated links to the new services pages
    
    * fixed bad links in scale file
    
    * tweaks to titles and phrasing
    
    * fixed typo in checks.mdx
    
    * started updating the conf ref to latest template
    
    * update SD conf ref to match latest CT standard
    
    * Apply suggestions from code review
    
    Co-authored-by: Eddie Rowe <74205376+eddie-rowe@users.noreply.github.com>
    
    * remove previous version of the checks page
    
    * fixed cross-links
    
    * Apply suggestions from code review
    
    Co-authored-by: Eddie Rowe <74205376+eddie-rowe@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: Eddie Rowe <74205376+eddie-rowe@users.noreply.github.com>
    trujillo-adam and eddie-rowe authored Feb 28, 2023
    Configuration menu
    Copy the full SHA
    23e247d View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    be800f0 View commit details
    Browse the repository at this point in the history

Commits on Mar 1, 2023

  1. add provider ca auth-method support for azure

    Does the required dance with the local HTTP endpoint to get the required
    data for the jwt based auth setup in Azure. Keeps support for 'legacy'
    mode where all login data is passed on via the auth methods parameters.
    Refactored check for hardcoded /login fields.
    eikenb authored Mar 1, 2023
    Configuration menu
    Copy the full SHA
    4f2d9a9 View commit details
    Browse the repository at this point in the history
  2. Changed titles for services pages to sentence style cap (#16477)

    * Changed titles for services pages to sentence style cap
    
    * missed a meta title
    trujillo-adam authored Mar 1, 2023
    Configuration menu
    Copy the full SHA
    1f422f3 View commit details
    Browse the repository at this point in the history
  3. docs: Consul 1.15.0 and Consul K8s 1.0 release notes (#16481)

    * add new release notes
    ---------
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    David Yu and im2nguyen authored Mar 1, 2023
    Configuration menu
    Copy the full SHA
    66de1de View commit details
    Browse the repository at this point in the history
  4. fix (cli): return error msg if acl policy not found (#16485)

    * fix: return error msg if acl policy not found
    
    * changelog
    
    * add test
    huikang authored Mar 1, 2023
    Configuration menu
    Copy the full SHA
    3970115 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    5ac1bdd View commit details
    Browse the repository at this point in the history
  6. Improve ux to help users avoid overwriting fields of ACL tokens, role…

    …s and policies (#16288)
    
    * Deprecate merge-policies and add options add-policy-name/add-policy-id to improve CLI token update command
    
    * deprecate merge-roles fields
    
    * Fix potential flakey tests and update ux to remove 'completely' + typo fixes
    roncodingenthusiast authored Mar 1, 2023
    Configuration menu
    Copy the full SHA
    4f8594b View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    367a64f View commit details
    Browse the repository at this point in the history
  8. docs: Update release notes with Envoy compat issue (#16494)

    * Update v1_15_x.mdx
    
    ---------
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    David Yu and im2nguyen authored Mar 1, 2023
    Configuration menu
    Copy the full SHA
    21c3095 View commit details
    Browse the repository at this point in the history

Commits on Mar 2, 2023

  1. Suppress AlreadyRegisteredError to fix test retries (#16501)

    * Suppress AlreadyRegisteredError to fix test retries
    
    * Remove duplicate sink
    Chris S. Kim authored Mar 2, 2023
    Configuration menu
    Copy the full SHA
    b177dc4 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    321439f View commit details
    Browse the repository at this point in the history
  3. add provider ca support for jwt file base auth

    Adds support for a jwt token in a file. Simply reads the file and sends
    the read in jwt along to the vault login.
    
    It also supports a legacy mode with the jwt string being passed
    directly. In which case the path is made optional.
    eikenb authored Mar 2, 2023
    Configuration menu
    Copy the full SHA
    4211069 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    bbbdc5f View commit details
    Browse the repository at this point in the history
  5. add provider ca auth support for kubernetes

    Adds support for Kubernetes jwt/token file based auth. Only needs to
    read the file and save the contents as the jwt/token.
    eikenb authored Mar 2, 2023
    Configuration menu
    Copy the full SHA
    e8eec1f View commit details
    Browse the repository at this point in the history
  6. Merge pull request #4538 from hashicorp/NET-2396 (#16516)

    NET-2396: refactor test to reduce duplication
    NiniOak authored Mar 2, 2023
    Configuration menu
    Copy the full SHA
    2b6d35f View commit details
    Browse the repository at this point in the history
  7. Merge pull request #4584 from hashicorp/refactor_cluster_config (#16517)

    NET-2841: PART 1 - refactor NewPeeringCluster to support custom config
    NiniOak authored Mar 2, 2023
    Configuration menu
    Copy the full SHA
    358c35e View commit details
    Browse the repository at this point in the history

Commits on Mar 3, 2023

  1. Add ServiceResolver RequestTimeout for route timeouts to make Termina…

    …tingGateway upstream timeouts configurable (#16495)
    
    * Leverage ServiceResolver ConnectTimeout for route timeouts to make TerminatingGateway upstream timeouts configurable
    
    * Regenerate golden files
    
    * Add RequestTimeout field
    
    * Add changelog entry
    Andrew Stucki authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    4b661d1 View commit details
    Browse the repository at this point in the history
  2. Fix issue where terminating gateway service resolvers weren't properl…

    …y cleaned up (#16498)
    
    * Fix issue where terminating gateway service resolvers weren't properly cleaned up
    
    * Add integration test for cleaning up resolvers
    
    * Add changelog entry
    
    * Use state test and drop integration test
    Andrew Stucki authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    5deffbd View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    5f81662 View commit details
    Browse the repository at this point in the history
  4. modified unsupported envoy version error (#16518)

    - When an envoy version is out of a supported range, we now return the envoy version being used as `major.minor.x` to indicate that it is the minor version at most that is incompatible
    - When an envoy version is in the list of unsupported envoy versions we return back the envoy version in the error message as `major.minor.patch` as now the exact version matters.
    wilkermichael authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    c517f07 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    84156af View commit details
    Browse the repository at this point in the history
  6. Fix resolution of service resolvers with subsets for external upstrea…

    …ms (#16499)
    
    * Fix resolution of service resolvers with subsets for external upstreams
    
    * Add tests
    
    * Add changelog entry
    
    * Update view filter logic
    Andrew Stucki authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    cc0765b View commit details
    Browse the repository at this point in the history
  7. fixed broken links associated with cluster peering updates (#16523)

    * fixed broken links associated with cluster peering updates
    
    * additional links to fix
    
    * typos
    
    * fixed redirect file
    trujillo-adam authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    43bd351 View commit details
    Browse the repository at this point in the history
  8. add provider ca support for approle auth-method

    Adds support for the approle auth-method. Only handles using the approle
    role/secret to auth and it doesn't support the agent's extra management
    configuration options (wrap and delete after read) as they are not
    required as part of the auth (ie. they are vault agent things).
    eikenb authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    56ffee6 View commit details
    Browse the repository at this point in the history
  9. update connect/ca's vault AuthMethod conf section (#16346)

    Updated Params field to re-frame as supporting arguments specific to the
    supported vault-agent auth-auth methods with links to each methods
    "#configuration" section.
    Included a call out limits on parameters supported.
    eikenb authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    8910002 View commit details
    Browse the repository at this point in the history
  10. proxycfg: ensure that an irrecoverable error in proxycfg closes the x…

    …ds session and triggers a replacement proxycfg watcher (#16497)
    
    Receiving an "acl not found" error from an RPC in the agent cache and the
    streaming/event components will cause any request loops to cease under the
    assumption that they will never work again if the token was destroyed. This
    prevents log spam (#14144, #9738).
    
    Unfortunately due to things like:
    
    - authz requests going to stale servers that may not have witnessed the token
      creation yet
    
    - authz requests in a secondary datacenter happening before the tokens get
      replicated to that datacenter
    
    - authz requests from a primary TO a secondary datacenter happening before the
      tokens get replicated to that datacenter
    
    The caller will get an "acl not found" *before* the token exists, rather than
    just after. The machinery added above in the linked PRs will kick in and
    prevent the request loop from looping around again once the tokens actually
    exist.
    
    For `consul-dataplane` usages, where xDS is served by the Consul servers
    rather than the clients ultimately this is not a problem because in that
    scenario the `agent/proxycfg` machinery is on-demand and launched by a new xDS
    stream needing data for a specific service in the catalog. If the watching
    goroutines are terminated it ripples down and terminates the xDS stream, which
    CDP will eventually re-establish and restart everything.
    
    For Consul client usages, the `agent/proxycfg` machinery is ahead-of-time
    launched at service registration time (called "local" in some of the proxycfg
    machinery) so when the xDS stream comes in the data is already ready to go. If
    the watching goroutines terminate it should terminate the xDS stream, but
    there's no mechanism to re-spawn the watching goroutines. If the xDS stream
    reconnects it will see no `ConfigSnapshot` and will not get one again until
    the client agent is restarted, or the service is re-registered with something
    changed in it.
    
    This PR fixes a few things in the machinery:
    
    - there was an inadvertent deadlock in fetching snapshot from the proxycfg
      machinery by xDS, such that when the watching goroutine terminated the
      snapshots would never be fetched. This caused some of the xDS machinery to
      get indefinitely paused and not finish the teardown properly.
    
    - Every 30s we now attempt to re-insert all locally registered services into
      the proxycfg machinery.
    
    - When services are re-inserted into the proxycfg machinery we special case
      "dead" ones such that we unilaterally replace them rather that doing that
      conditionally.
    rboyer authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    9a485cd View commit details
    Browse the repository at this point in the history
  11. NET-2903 Normalize weight for http routes (#16512)

    * NET-2903 Normalize weight for http routes
    
    * Update website/content/docs/connect/gateways/api-gateway/configuration/http-route.mdx
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    missylbytes and trujillo-adam authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    129eca8 View commit details
    Browse the repository at this point in the history
  12. Add some basic UI improvements for api-gateway services (#16508)

    * Add some basic ui improvements for api-gateway services
    
    * Add changelog entry
    
    * Use ternary for null check
    
    * Update gateway doc links
    
    * rename changelog entry for new PR
    
    * Fix test
    Andrew Stucki authored Mar 3, 2023
    Configuration menu
    Copy the full SHA
    897e5ef View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    9e93a30 View commit details
    Browse the repository at this point in the history

Commits on Mar 6, 2023

  1. Configuration menu
    Copy the full SHA
    fc23232 View commit details
    Browse the repository at this point in the history
  2. Improve ux around ACL token to help users avoid overwriting node/serv…

    …ice identities (#16506)
    
    * Deprecate merge-node-identities and merge-service-identities flags
    
    * added tests for node identities changes
    
    * added changelog file and docs
    roncodingenthusiast authored Mar 6, 2023
    Configuration menu
    Copy the full SHA
    bf501a3 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    8daddff View commit details
    Browse the repository at this point in the history
  4. Merge pull request #4573 from hashicorp/NET-2841 (#16544)

    * Merge pull request #4573 from hashicorp/NET-2841
    
    NET-2841: PART 2 refactor upgrade tests to include version 1.15
    
    * update upgrade versions
    NiniOak authored Mar 6, 2023
    Configuration menu
    Copy the full SHA
    9d8e00d View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    94ecb9c View commit details
    Browse the repository at this point in the history
  6. Update the consul-k8s cli docs for the new proxy log subcommand (#1…

    …6458)
    
    * Update the consul-k8s cli docs for the new `proxy log` subcommand
    
    * Updated consul-k8s docs from PR feedback
    
    * Added proxy log command to release notes
    jm96441n authored Mar 6, 2023
    Configuration menu
    Copy the full SHA
    6166889 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    7ea2bd6 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    63204b5 View commit details
    Browse the repository at this point in the history
  9. Fix flakey tests related to ACL token updates (#16545)

    * Fix flakey tests related to ACL token updates
    
    * update all acl token update tests
    
    * extra create_token function to its own thing
    roncodingenthusiast authored Mar 6, 2023
    Configuration menu
    Copy the full SHA
    f135b14 View commit details
    Browse the repository at this point in the history

Commits on Mar 7, 2023

  1. support vault auth config for alicloud ca provider

    Add support for using existing vault auto-auth configurations as the
    provider configuration when using Vault's CA provider with AliCloud.
    
    AliCloud requires 2 extra fields to enable it to use STS (it's preferred
    auth setup). Our vault-plugin-auth-alicloud package contained a method
    to help generate them as they require you to make an http call to
    a faked endpoint proxy to get them (url and headers base64 encoded).
    eikenb authored Mar 7, 2023
    Configuration menu
    Copy the full SHA
    f5641ff View commit details
    Browse the repository at this point in the history
  2. Update docs to reflect functionality (#16549)

    * Update docs to reflect functionality
    
    * make consistent with other client runtimes
    im2nguyen authored Mar 7, 2023
    Configuration menu
    Copy the full SHA
    a5b8256 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    b649a5e View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    dbaf8bf View commit details
    Browse the repository at this point in the history
  5. docs: Document config entry permissions (#16556)

    Paul Glass authored Mar 7, 2023
    Configuration menu
    Copy the full SHA
    58016d1 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    3d75ab8 View commit details
    Browse the repository at this point in the history

Commits on Mar 8, 2023

  1. NET-2954: Improve integration tests CI execution time (#16565)

    * NET-2954: Improve integration tests CI execution time
    
    * fix ci
    
    * remove comments and modify config file
    NiniOak authored Mar 8, 2023
    Configuration menu
    Copy the full SHA
    280bdd3 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    89de91b View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    e5c2818 View commit details
    Browse the repository at this point in the history
  4. Bump submodules from latest 1.15.1 patch release (#16578)

    * Update changelog with Consul patch releases 1.13.7, 1.14.5, 1.15.1
    
    * Bump submodules from latest patch release
    
    * Forgot one
    analogue authored Mar 8, 2023
    Configuration menu
    Copy the full SHA
    9a5cb20 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    e2c4a78 View commit details
    Browse the repository at this point in the history

Commits on Mar 9, 2023

  1. added a backport-checker GitHub action (#16567)

    * added a backport-checker GitHub action
    
    * Update .github/workflows/backport-checker.yml
    wilkermichael authored Mar 9, 2023
    Configuration menu
    Copy the full SHA
    47db3d7 View commit details
    Browse the repository at this point in the history
  2. auto-updated agent/uiserver/dist/ from commit 63204b5 (#16587)

    Co-authored-by: hc-github-team-consul-core <github-team-consul-core@hashicorp.com>
    Andrew Stucki and hc-github-team-consul-core authored Mar 9, 2023
    Configuration menu
    Copy the full SHA
    040647e View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    176945a View commit details
    Browse the repository at this point in the history
  4. UI: Fix htmlsafe errors throughout the app (#16574)

    * Upgrade ember-intl
    
    * Add changelog
    
    * Add yarn lock
    Tyler Wendlandt authored Mar 9, 2023
    Configuration menu
    Copy the full SHA
    e6aeb31 View commit details
    Browse the repository at this point in the history
  5. Add namespace file with build tag for OSS gateway tests (#16590)

    * Add namespace file with build tag for OSS tests
    
    * Remove TODO comment
    jm96441n authored Mar 9, 2023
    Configuration menu
    Copy the full SHA
    fa93a0d View commit details
    Browse the repository at this point in the history
  6. JIRA pr check: Filter out OSS/ENT merges (#16593)

    * jira pr check filter out dependabot and oss/ent merges
    David Yu authored Mar 9, 2023
    Configuration menu
    Copy the full SHA
    40312ac View commit details
    Browse the repository at this point in the history

Commits on Mar 10, 2023

  1. Configuration menu
    Copy the full SHA
    57e2493 View commit details
    Browse the repository at this point in the history
  2. Add Peer Locality to Discovery Chains (#16588)

    Add peer locality to discovery chains
    erichaberkorn authored Mar 10, 2023
    Configuration menu
    Copy the full SHA
    e298f50 View commit details
    Browse the repository at this point in the history
  3. fixes for unsupported partitions field in CRD metadata block (#16604)

    * fixes for unsupported partitions field in CRD metadata block
    
    * Apply suggestions from code review
    
    Co-authored-by: Luke Kysow <1034429+lkysow@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: Luke Kysow <1034429+lkysow@users.noreply.github.com>
    trujillo-adam and lkysow authored Mar 10, 2023
    Configuration menu
    Copy the full SHA
    5190269 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    a01920b View commit details
    Browse the repository at this point in the history
  5. Consul WAN Fed with Vault Secrets Backend document updates (#16597)

    * Consul WAN Fed with Vault Secrets Backend document updates
    
    * Corrected dc1-consul.yaml and dc2-consul.yaml file highlights
    
    * Update website/content/docs/k8s/deployment-configurations/vault/wan-federation.mdx
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * Update website/content/docs/k8s/deployment-configurations/vault/wan-federation.mdx
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    natemollica-nm and trujillo-adam authored Mar 10, 2023
    Configuration menu
    Copy the full SHA
    726c97b View commit details
    Browse the repository at this point in the history
  6. Allow HCP metrics collection for Envoy proxies

    Co-authored-by: Ashvitha Sridharan <ashvitha.sridharan@hashicorp.com>
    Co-authored-by: Freddy <freddygv@users.noreply.github.com>
    
    Add a new envoy flag: "envoy_hcp_metrics_bind_socket_dir", a directory
    where a unix socket will be created with the name
    `<namespace>_<proxy_id>.sock` to forward Envoy metrics.
    
    If set, this will configure:
    - In bootstrap configuration a local stats_sink and static cluster.
      These will forward metrics to a loopback listener sent over xDS.
    
    - A dynamic listener listening at the socket path that the previously
      defined static cluster is sending metrics to.
    
    - A dynamic cluster that will forward traffic received at this listener
      to the hcp-metrics-collector service.
    
    
    Reasons for having a static cluster pointing at a dynamic listener:
    - We want to secure the metrics stream using TLS, but the stats sink can
      only be defined in bootstrap config. With dynamic listeners/clusters
      we can use the proxy's leaf certificate issued by the Connect CA,
      which isn't available at bootstrap time.
    
    - We want to intelligently route to the HCP collector. Configuring its
      addreess at bootstrap time limits our flexibility routing-wise. More
      on this below.
    
    Reasons for defining the collector as an upstream in `proxycfg`:
    - The HCP collector will be deployed as a mesh service.
    
    - Certificate management is taken care of, as mentioned above.
    
    - Service discovery and routing logic is automatically taken care of,
      meaning that no code changes are required in the xds package.
    
    - Custom routing rules can be added for the collector using discovery
      chain config entries. Initially the collector is expected to be
      deployed to each admin partition, but in the future could be deployed
      centrally in the default partition. These config entries could even be
      managed by HCP itself.
    Achooo authored Mar 10, 2023
    Configuration menu
    Copy the full SHA
    f95ffe0 View commit details
    Browse the repository at this point in the history

Commits on Mar 13, 2023

  1. Configuration menu
    Copy the full SHA
    7cb2af1 View commit details
    Browse the repository at this point in the history
  2. Add sameness-group configuration entry. (#16608)

    This commit adds a sameness-group config entry to the API and structs packages. It includes some validation logic and a new memdb index that tracks the default sameness-group for each partition. Sameness groups will simplify the effort of managing failovers / intentions / exports for peers and partitions.
    
    Note that this change purely to introduce the configuration entry and does not include the full functionality of sameness-groups.
    hashi-derek authored Mar 13, 2023
    Configuration menu
    Copy the full SHA
    f2902e6 View commit details
    Browse the repository at this point in the history
  3. Preserve CARoots when updating Vault CA configuration (#16592)

    If a CA config update did not cause a root change, the codepath would return early and skip some steps which preserve its intermediate certificates and signing key ID. This commit re-orders some code and prevents updates from generating new intermediate certificates.
    Chris S. Kim authored Mar 13, 2023
    Configuration menu
    Copy the full SHA
    d5677e5 View commit details
    Browse the repository at this point in the history

Commits on Mar 14, 2023

  1. Add UI copyright headers files (#16614)

    * Add copyright headers to UI files
    
    * Ensure copywrite file ignores external libs
    roncodingenthusiast authored Mar 14, 2023
    Configuration menu
    Copy the full SHA
    9d21736 View commit details
    Browse the repository at this point in the history
  2. Docs discovery typo (#16628)

    * docs(discovery): typo
    
    * docs(discovery): EOF and trim lines
    
    ---------
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    bdronneau and trujillo-adam authored Mar 14, 2023
    Configuration menu
    Copy the full SHA
    a915d0c View commit details
    Browse the repository at this point in the history
  3. Fix issue with trust bundle read ACL check. (#16630)

    This commit fixes an issue where trust bundles could not be read
    by services in a non-default namespace, unless they had excessive
    ACL permissions given to them.
    
    Prior to this change, `service:write` was required in the default
    namespace in order to read the trust bundle. Now, `service:write`
    to a service in any namespace is sufficient.
    hashi-derek authored Mar 14, 2023
    Configuration menu
    Copy the full SHA
    8f75d99 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    5a3fec6 View commit details
    Browse the repository at this point in the history
  5. Backport ENT-4704 (#16612)

    freddygv authored Mar 14, 2023
    Configuration menu
    Copy the full SHA
    724b752 View commit details
    Browse the repository at this point in the history

Commits on Mar 15, 2023

  1. Configuration menu
    Copy the full SHA
    ad25ba3 View commit details
    Browse the repository at this point in the history
  2. Add known issues to Raft WAL docs. (#16600)

    * Add known issues to Raft WAL docs.
    
    * Refactor update based on review feedback
    banks authored Mar 15, 2023
    Configuration menu
    Copy the full SHA
    e557fb4 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    48f0a28 View commit details
    Browse the repository at this point in the history
  4. Update e2e tests for namespaces (#16627)

    * Refactored "NewGatewayService" to handle namespaces, fixed
    TestHTTPRouteFlattening test
    
    * Fixed existing http_route tests for namespacing
    
    * Squash aclEnterpriseMeta for ResourceRefs and HTTPServices, accept
    namespace for creating connect services and regular services
    
    * Use require instead of assert after creating namespaces in
    http_route_tests
    
    * Refactor NewConnectService and NewGatewayService functions to use cfg
    objects to reduce number of method args
    
    * Rename field on SidecarConfig in tests from `SidecarServiceName` to
    `Name` to avoid stutter
    jm96441n authored Mar 15, 2023
    Configuration menu
    Copy the full SHA
    ff5887a View commit details
    Browse the repository at this point in the history
  5. net 2731 ip config entry OSS version (#16642)

    * ip config entry
    
    * name changing
    
    * move to ent
    
    * ent version
    
    * renaming
    
    * change format
    
    * renaming
    
    * refactor
    
    * add default values
    xwa153 authored Mar 15, 2023
    Configuration menu
    Copy the full SHA
    152c753 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    57e034b View commit details
    Browse the repository at this point in the history

Commits on Mar 16, 2023

  1. First cluster grpc service should be NodePort for the second cluster …

    …to connect (#16430)
    
    * First cluster grpc service should be NodePort
    
    This is based on the issue opened here hashicorp/consul-k8s#1903
    
    If you follow the documentation https://developer.hashicorp.com/consul/docs/k8s/deployment-configurations/single-dc-multi-k8s exactly as it is, the first cluster will only create the consul UI service on NodePort but not the rest of the services (including for grpc). By default, from the helm chart, they are created as headless services by setting clusterIP None. This will cause an issue for the second cluster to discover consul server on the first cluster over gRPC as it cannot simply cannot through gRPC default port 8502 and it ends up in an error as shown in the issue hashicorp/consul-k8s#1903
    
    As a solution, the grpc service should be exposed using NodePort (or LoadBalancer). I added those changes required in both cluster1-values.yaml and cluster2-values.yaml, and also a description for those changes for the normal users to understand. Kindly review and I hope this PR will be accepted.
    
    * Update website/content/docs/k8s/deployment-configurations/single-dc-multi-k8s.mdx
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * Update website/content/docs/k8s/deployment-configurations/single-dc-multi-k8s.mdx
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    * Update website/content/docs/k8s/deployment-configurations/single-dc-multi-k8s.mdx
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
    vjwilson1987 and trujillo-adam authored Mar 16, 2023
    Configuration menu
    Copy the full SHA
    c26b6bc View commit details
    Browse the repository at this point in the history
  2. Add in query options for catalog service existing in a specific (#16652)

    namespace when creating service for tests
    jm96441n authored Mar 16, 2023
    Configuration menu
    Copy the full SHA
    197ed67 View commit details
    Browse the repository at this point in the history

Commits on Mar 17, 2023

  1. Configuration menu
    Copy the full SHA
    b473151 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    eaa39f4 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    33a2058 View commit details
    Browse the repository at this point in the history
  4. [API Gateway] Fix invalid cluster causing gateway programming delay (#…

    …16661)
    
    * Add test for http routes
    
    * Add fix
    
    * Fix tests
    
    * Add changelog entry
    
    * Refactor and fix flaky tests
    Andrew Stucki authored Mar 17, 2023
    Configuration menu
    Copy the full SHA
    501b87f View commit details
    Browse the repository at this point in the history

Commits on Mar 18, 2023

  1. Bump tomhjp/gh-action-jira-search from 0.2.1 to 0.2.2 (#16667)

    Bumps [tomhjp/gh-action-jira-search](https://github.com/tomhjp/gh-action-jira-search) from 0.2.1 to 0.2.2.
    - [Release notes](https://github.com/tomhjp/gh-action-jira-search/releases)
    - [Commits](tomhjp/gh-action-jira-search@v0.2.1...v0.2.2)
    
    ---
    updated-dependencies:
    - dependency-name: tomhjp/gh-action-jira-search
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored Mar 18, 2023
    Configuration menu
    Copy the full SHA
    22cf122 View commit details
    Browse the repository at this point in the history
  2. build(deps): bump atlassian/gajira-transition from 2.0.1 to 3.0.1 (#1…

    …5921)
    
    Bumps [atlassian/gajira-transition](https://github.com/atlassian/gajira-transition) from 2.0.1 to 3.0.1.
    - [Release notes](https://github.com/atlassian/gajira-transition/releases)
    - [Commits](atlassian/gajira-transition@v2.0.1...v3.0.1)
    
    ---
    updated-dependencies:
    - dependency-name: atlassian/gajira-transition
      dependency-type: direct:production
      update-type: version-update:semver-major
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    Co-authored-by: David Yu <dyu@hashicorp.com>
    dependabot[bot] and David Yu authored Mar 18, 2023
    Configuration menu
    Copy the full SHA
    2ee3336 View commit details
    Browse the repository at this point in the history
  3. Snapshot restore tests (#16647)

    * add snapshot restore test
    
    * add logstore as test parameter
    
    * Use the correct image version
    
    * make sure we read the logs from a followers to test the follower snapshot install path.
    
    * update to raf-wal v0.3.0
    
    * add changelog.
    
    * updating changelog for bug description and removed integration test.
    
    * setting up test container builder to only set logStore for 1.15 and higher
    
    ---------
    
    Co-authored-by: Paul Banks <pbanks@hashicorp.com>
    Co-authored-by: John Murret <john.murret@hashicorp.com>
    3 people authored Mar 18, 2023
    Configuration menu
    Copy the full SHA
    b9d8552 View commit details
    Browse the repository at this point in the history

Commits on Mar 20, 2023

  1. Configuration menu
    Copy the full SHA
    7477f52 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    9c64731 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    0b4dc25 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    606f8fb View commit details
    Browse the repository at this point in the history
  5. Fix route subscription when using namespaces (#16677)

    * Fix route subscription when using namespaces
    
    * Update changelog
    
    * Fix changelog entry to reference that the bug was enterprise only
    jm96441n authored Mar 20, 2023
    Configuration menu
    Copy the full SHA
    1ef9f4d View commit details
    Browse the repository at this point in the history
  6. peering: peering partition failover fixes (#16673)

    add local source partition for peered upstreams
    ndhanushkodi authored Mar 20, 2023
    Configuration menu
    Copy the full SHA
    b9bd2c3 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    b4598a7 View commit details
    Browse the repository at this point in the history
  8. Docs/update jira sync pr issue (#16688)

    * fix jira sync actions, remove custom fields
    
    * remove more additional fields, debug
    im2nguyen authored Mar 20, 2023
    Configuration menu
    Copy the full SHA
    e39e7d1 View commit details
    Browse the repository at this point in the history
  9. Docs: Jira sync Update issuetype to bug (#16689)

    * update issuetype to bug
    
    * fix conditional for pr edu
    im2nguyen authored Mar 20, 2023
    Configuration menu
    Copy the full SHA
    cb26004 View commit details
    Browse the repository at this point in the history
  10. build(deps): bump tomhjp/gh-action-jira-create from 0.2.0 to 0.2.1 (#…

    …16685)
    
    Bumps [tomhjp/gh-action-jira-create](https://github.com/tomhjp/gh-action-jira-create) from 0.2.0 to 0.2.1.
    - [Release notes](https://github.com/tomhjp/gh-action-jira-create/releases)
    - [Commits](tomhjp/gh-action-jira-create@v0.2.0...v0.2.1)
    
    ---
    updated-dependencies:
    - dependency-name: tomhjp/gh-action-jira-create
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    Co-authored-by: David Yu <dyu@hashicorp.com>
    dependabot[bot] and David Yu authored Mar 20, 2023
    Configuration menu
    Copy the full SHA
    46af09b View commit details
    Browse the repository at this point in the history
  11. build(deps): bump tomhjp/gh-action-jira-comment from 0.1.0 to 0.2.0 (#…

    …16684)
    
    Bumps [tomhjp/gh-action-jira-comment](https://github.com/tomhjp/gh-action-jira-comment) from 0.1.0 to 0.2.0.
    - [Release notes](https://github.com/tomhjp/gh-action-jira-comment/releases)
    - [Commits](tomhjp/gh-action-jira-comment@v0.1.0...v0.2.0)
    
    ---
    updated-dependencies:
    - dependency-name: tomhjp/gh-action-jira-comment
      dependency-type: direct:production
      update-type: version-update:semver-minor
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    Co-authored-by: David Yu <dyu@hashicorp.com>
    dependabot[bot] and David Yu authored Mar 20, 2023
    Configuration menu
    Copy the full SHA
    4f445a7 View commit details
    Browse the repository at this point in the history
  12. NET-2397: Add readme.md to upgrade test subdirectory (#16610)

    * NET-2397: Add readme.md to upgrade test subdirectory
    
    * remove test code
    
    * fix link and update  steps of adding new test cases (#16654)
    
    * fix link and update  steps of adding new test cases
    
    * Apply suggestions from code review
    
    Co-authored-by: Nick Irvine <115657443+nfi-hashicorp@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: Nick Irvine <115657443+nfi-hashicorp@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: cskh <hui.kang@hashicorp.com>
    Co-authored-by: Nick Irvine <115657443+nfi-hashicorp@users.noreply.github.com>
    3 people authored Mar 20, 2023
    Configuration menu
    Copy the full SHA
    0fc8a3e View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    2f13f75 View commit details
    Browse the repository at this point in the history
  14. Configuration menu
    Copy the full SHA
    c8d9cad View commit details
    Browse the repository at this point in the history
  15. Configuration menu
    Copy the full SHA
    7eb3dcb View commit details
    Browse the repository at this point in the history
  16. UI: update Ember to 3.28.6 (#16616)

    ---------
    
    Co-authored-by: wenincode <tyler.wendlandt@hashicorp.com>
    valeriia-ruban and wenincode authored Mar 20, 2023
    Configuration menu
    Copy the full SHA
    d75f2ba View commit details
    Browse the repository at this point in the history

Commits on Mar 21, 2023

  1. Regen helm docs (#16701)

    lkysow authored Mar 21, 2023
    Configuration menu
    Copy the full SHA
    1f4c590 View commit details
    Browse the repository at this point in the history
  2. Remove unused are hosts set check (#16691)

    * Remove unused are hosts set check
    
    * Remove all traces of unused 'AreHostsSet' parameter
    
    * Remove unused Hosts attribute
    
    * Remove commented out use of snap.APIGateway.Hosts
    jm96441n authored Mar 21, 2023
    Configuration menu
    Copy the full SHA
    8dd1d73 View commit details
    Browse the repository at this point in the history
  3. [NET-3029] Migrate build-distros to GHA (#16669)

    * migrate build distros to GHA
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * build-arm
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * don't use matrix
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * check-go-mod
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * add notify slack script
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * notify slack if failure
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * rm notify slack script
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * fix check-go-mod job
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    ---------
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    loshz authored Mar 21, 2023
    Configuration menu
    Copy the full SHA
    eca8b02 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    93a3a76 View commit details
    Browse the repository at this point in the history
  5. fix build workflow (#16719)

    Signed-off-by: Dan Bond <danbond@protonmail.com>
    loshz authored Mar 21, 2023
    Configuration menu
    Copy the full SHA
    036ee56 View commit details
    Browse the repository at this point in the history
  6. Helm docs without developer.hashicorp.com prefix (#16711)

    This was causing linter errors
    lkysow authored Mar 21, 2023
    Configuration menu
    Copy the full SHA
    8f7e4d4 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    769d950 View commit details
    Browse the repository at this point in the history

Commits on Mar 22, 2023

  1. Configuration menu
    Copy the full SHA
    7f6f689 View commit details
    Browse the repository at this point in the history
  2. Copyright headers for config files git + circleci (#16703)

    * Copyright headers for config files git + circleci
    
    * Release folder copyright headers
    roncodingenthusiast authored Mar 22, 2023
    Configuration menu
    Copy the full SHA
    e818fde View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    3c5c53a View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    495ad4c View commit details
    Browse the repository at this point in the history
  5. delete config when nil (#16690)

    * delete config when nil
    
    * fix mock interface implementation
    
    * fix handler test to use the right assertion
    
    * extract DeleteConfig as a separate API.
    
    * fix mock limiter implementation to satisfy the new interface
    
    * fix failing tests
    
    * add test comments
    dhiaayachi authored Mar 22, 2023
    Configuration menu
    Copy the full SHA
    3ba0eb5 View commit details
    Browse the repository at this point in the history
  6. Changelog for audit logging fix. (#16700)

    * Changelog for audit logging fix.
    lkysow authored Mar 22, 2023
    Configuration menu
    Copy the full SHA
    4845816 View commit details
    Browse the repository at this point in the history

Commits on Mar 23, 2023

  1. Configuration menu
    Copy the full SHA
    e3fd7d3 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    3df2719 View commit details
    Browse the repository at this point in the history
  3. Remove version bump from CRT workflow (#16728)

    This bumps the version to reflect the next patch release; however, we use a specific branch for each patch release and so never wind up cutting a release directly from the `release/1.15.x` (for example) where this is intended to work.
    nathancoleman authored Mar 23, 2023
    Configuration menu
    Copy the full SHA
    d61f3da View commit details
    Browse the repository at this point in the history

Commits on Mar 24, 2023

  1. tests instantiating clients w/o shutting down (#16755)

    noticed via their port still in use messages.
    eikenb authored Mar 24, 2023
    Configuration menu
    Copy the full SHA
    0b1dc4e View commit details
    Browse the repository at this point in the history
  2. RELENG-471: Remove obsolete load-test workflow (#16737)

    * Remove obsolete load-test workflow
    
    * remove load-tests from circleci config.
    
    ---------
    
    Co-authored-by: John Murret <john.murret@hashicorp.com>
    shore and jmurret authored Mar 24, 2023
    Configuration menu
    Copy the full SHA
    a6831da View commit details
    Browse the repository at this point in the history
  3. add failover policy to ProxyConfigEntry in api (#16759)

    * add failover policy to ProxyConfigEntry in api
    
    * update docs
    malizz authored Mar 24, 2023
    Configuration menu
    Copy the full SHA
    a168d0e View commit details
    Browse the repository at this point in the history
  4. Fix broken links in Consul docs (#16640)

    * Fix broken links in Consul docs
    
    * more broken link fixes
    
    * more 404 fixes
    
    * 404 fixes
    
    * broken link fix
    
    ---------
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    eddie-rowe and im2nguyen authored Mar 24, 2023
    Configuration menu
    Copy the full SHA
    ce6e278 View commit details
    Browse the repository at this point in the history
  5. Change partition for peers in discovery chain targets (#16769)

    This commit swaps the partition field to the local partition for
    discovery chains targeting peers. Prior to this change, peer upstreams
    would always use a value of default regardless of which partition they
    exist in. This caused several issues in xds / proxycfg because of id
    mismatches.
    
    Some prior fixes were made to deal with one-off id mismatches that this
    PR also cleans up, since they are no longer needed.
    hashi-derek authored Mar 24, 2023
    Configuration menu
    Copy the full SHA
    2236975 View commit details
    Browse the repository at this point in the history
  6. Docs/intentions refactor docs day 2022 (#16758)

    * converted intentions conf entry to ref CT format
    
    * set up intentions nav
    
    * add page for intentions usage
    
    * final intentions usage page
    
    * final intentions overview page
    
    * fixed old relative links
    
    * updated diagram for overview
    
    * updated links to intentions content
    
    * fixed typo in updated links
    
    * rename intentions overview page file to index
    
    * rollback link updates to intentions overview
    
    * fixed nav
    
    * Updated custom HTML in API and CLI pages to MD
    
    * applied suggestions from review to index page
    
    * moved conf examples from usage to conf ref
    
    * missed custom HTML section
    
    * applied additional feedback
    
    * Apply suggestions from code review
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    
    * updated headings in usage page
    
    * renamed files and udpated nav
    
    * updated links to new file names
    
    * added redirects and final tweaks
    
    * typo
    
    ---------
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    trujillo-adam and im2nguyen authored Mar 24, 2023
    Configuration menu
    Copy the full SHA
    90bbae5 View commit details
    Browse the repository at this point in the history

Commits on Mar 27, 2023

  1. Add storage backend interface and in-memory implementation (#16538)

    Introduces `storage.Backend`, which will serve as the interface between the
    Resource Service and the underlying storage system (Raft today, but in the
    future, who knows!).
    
    The primary design goal of this interface is to keep its surface area small,
    and push as much functionality as possible into the layers above, so that new
    implementations can be added with little effort, and easily proven to be
    correct. To that end, we also provide a suite of "conformance" tests that can
    be run against a backend implementation to check it behaves correctly.
    
    In this commit, we introduce an initial in-memory storage backend, which is
    suitable for tests and when running Consul in development mode. This backend is
    a thin wrapper around the `Store` type, which implements a resource database
    using go-memdb and our internal pub/sub system. `Store` will also be used to
    handle reads in our Raft backend, and in the future, used as a local cache for
    external storage systems.
    boxofrad authored Mar 27, 2023
    Configuration menu
    Copy the full SHA
    81df781 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    d4603a4 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    3415689 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    c085b1e View commit details
    Browse the repository at this point in the history
  5. Fix struct tags for TCPService enterprise meta (#16781)

    * Fix struct tags for TCPService enterprise meta
    
    * Add changelog
    jm96441n authored Mar 27, 2023
    Configuration menu
    Copy the full SHA
    351bdc3 View commit details
    Browse the repository at this point in the history
  6. Expand route flattening test for multiple namespaces (#16745)

    * Exand route flattening test for multiple namespaces
    
    * Add helper for checking http route config entry exists without checking for bound
    status
    
    * Fix port and hostname check for http route flattening test
    jm96441n authored Mar 27, 2023
    Configuration menu
    Copy the full SHA
    9217ac1 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    032aba3 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    42c5b29 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    10df4d8 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    440f112 View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    e5d58c5 View commit details
    Browse the repository at this point in the history

Commits on Mar 28, 2023

  1. Configuration menu
    Copy the full SHA
    12be12f View commit details
    Browse the repository at this point in the history
  2. Update normalization of route refs (#16789)

    * Use merge of enterprise meta's rather than new custom method
    
    * Add merge logic for tcp routes
    
    * Add changelog
    
    * Normalize certificate refs on gateways
    
    * Fix infinite call loop
    
    * Explicitly call enterprise meta
    jm96441n authored Mar 28, 2023
    Configuration menu
    Copy the full SHA
    c833464 View commit details
    Browse the repository at this point in the history
  3. copyright headers for agent folder (#16704)

    * copyright headers for agent folder
    
    * Ignore test data files
    
    * fix proto files and remove headers in agent/uiserver folder
    
    * ignore deep-copy files
    roncodingenthusiast authored Mar 28, 2023
    Configuration menu
    Copy the full SHA
    94ec4eb View commit details
    Browse the repository at this point in the history
  4. Copyright headers for command folder (#16705)

    * copyright headers for agent folder
    
    * Ignore test data files
    
    * fix proto files and remove headers in agent/uiserver folder
    
    * ignore deep-copy files
    
    * copyright headers for agent folder
    
    * Copyright headers for command folder
    
    * fix merge conflicts
    roncodingenthusiast authored Mar 28, 2023
    Configuration menu
    Copy the full SHA
    4c070c3 View commit details
    Browse the repository at this point in the history
  5. Add copyright headers for acl, api and bench folders (#16706)

    * copyright headers for agent folder
    
    * Ignore test data files
    
    * fix proto files and remove headers in agent/uiserver folder
    
    * ignore deep-copy files
    
    * copyright headers for agent folder
    
    * fix merge conflicts
    
    * copyright headers for agent folder
    
    * Ignore test data files
    
    * fix proto files
    
    * ignore agent/uiserver folder for now
    
    * copyright headers for agent folder
    
    * Add copyright headers for acl, api and bench folders
    roncodingenthusiast authored Mar 28, 2023
    Configuration menu
    Copy the full SHA
    4b2137c View commit details
    Browse the repository at this point in the history
  6. Github Actions Migration - move go-tests workflows to GHA (#16761)

    * go-tests workflow
    
    * add test splitting to go-tests
    
    * fix re-reun fails report path
    
    * fix re-reun fails report path another place
    
    * fixing tests for32bit and race
    
    * use script file to generate runners
    
    * fixing run path
    
    * add checkout
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * passing runs-on
    
    * setting up runs-on as a parameter to check-go-mod
    
    * making on pull_request
    
    * Update .github/scripts/rerun_fails_report.sh
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * make runs-on required
    
    * removing go-version param that is not used.
    
    * removing go-version param that is not used.
    
    * Modify build-distros to use medium runners (#16773)
    
    * go-tests workflow
    
    * add test splitting to go-tests
    
    * fix re-reun fails report path
    
    * fix re-reun fails report path another place
    
    * fixing tests for32bit and race
    
    * use script file to generate runners
    
    * fixing run path
    
    * add checkout
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * passing runs-on
    
    * setting up runs-on as a parameter to check-go-mod
    
    * trying mediums
    
    * adding in script
    
    * fixing runs-on to be parameter
    
    * fixing merge conflict
    
    * changing to on push
    
    * removing whitespace
    
    * go-tests workflow
    
    * add test splitting to go-tests
    
    * fix re-reun fails report path
    
    * fix re-reun fails report path another place
    
    * fixing tests for32bit and race
    
    * use script file to generate runners
    
    * fixing run path
    
    * add checkout
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * passing runs-on
    
    * setting up runs-on as a parameter to check-go-mod
    
    * changing back to on pull_request
    
    ---------
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * Github Actions Migration - move verify-ci workflows to GHA (#16777)
    
    * add verify-ci workflow
    
    * adding comment and changing to on pull request.
    
    * changing to pull_requests
    
    * changing to pull_request
    
    * Apply suggestions from code review
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    
    * [NET-3029] Migrate frontend to GHA (#16731)
    
    * changing set up to a small
    
    * using consuls own custom runner pool.
    
    ---------
    
    Co-authored-by: Dan Bond <danbond@protonmail.com>
    jmurret and loshz authored Mar 28, 2023
    Configuration menu
    Copy the full SHA
    a3973a8 View commit details
    Browse the repository at this point in the history
  7. Copyright headers for missing files/folders (#16708)

    * copyright headers for agent folder
    roncodingenthusiast authored Mar 28, 2023
    Configuration menu
    Copy the full SHA
    b646746 View commit details
    Browse the repository at this point in the history

Commits on Mar 29, 2023

  1. Configuration menu
    Copy the full SHA
    3e69ff1 View commit details
    Browse the repository at this point in the history
  2. docs: Updates to support HCP Consul cluster peering release (#16774)

    * New HCP Consul documentation section + links
    
    * Establish cluster peering usage cross-link
    
    * unrelated fix to backport to v1.15
    
    * nav correction + fixes
    
    * Tech specs fixes
    
    * specifications for headers
    
    * Tech specs fixes + alignments
    
    * sprawl edits
    
    * Tip -> note
    boruszak authored Mar 29, 2023
    Configuration menu
    Copy the full SHA
    4c038df View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    32358dd View commit details
    Browse the repository at this point in the history
  4. [COMPLIANCE] Add Copyright and License Headers (#16807)

    * [COMPLIANCE] Add Copyright and License Headers
    
    * fix headers for generated files
    
    * ignore dist folder
    
    ---------
    
    Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
    Co-authored-by: Ronald Ekambi <ronekambi@gmail.com>
    Co-authored-by: Ronald <roncodingenthusiast@users.noreply.github.com>
    3 people authored Mar 29, 2023
    Configuration menu
    Copy the full SHA
    39a0c4f View commit details
    Browse the repository at this point in the history

Commits on Mar 30, 2023

  1. Configuration menu
    Copy the full SHA
    0d1d2fc View commit details
    Browse the repository at this point in the history
  2. ci: changes resulting from running on consul-enterprise (#16816)

    * changes resulting from running on consul-enterprise
    
    * removing comment line
    jmurret authored Mar 30, 2023
    Configuration menu
    Copy the full SHA
    aab9397 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    4ae5992 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    cc23b0e View commit details
    Browse the repository at this point in the history

Commits on Mar 31, 2023

  1. Configuration menu
    Copy the full SHA
    99ba13b View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    651549c View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    bf64a33 View commit details
    Browse the repository at this point in the history
  4. Add sameness-group to exported-services config entries (#16836)

    This PR adds the sameness-group field to exported-service
    config entries, which allows for services to be exported
    to multiple destination partitions / peers easily.
    hashi-derek authored Mar 31, 2023
    Configuration menu
    Copy the full SHA
    8d40cf9 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    a6d69ad View commit details
    Browse the repository at this point in the history
  6. [NET-3029] Migrate dev-* jobs to GHA (#16792)

    * ci: add build-artifacts workflow
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * makefile for gha dev-docker
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * use docker actions instead of make
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * Add context
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * testing push
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * set short sha
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * upload to s3
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * rm s3 upload
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * use runner setup job
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * on push
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * testing
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * on pr
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * revert testing
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * OSS/ENT logic
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * add comments
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    
    * Update .github/workflows/build-artifacts.yml
    
    Co-authored-by: John Murret <john.murret@hashicorp.com>
    
    ---------
    
    Signed-off-by: Dan Bond <danbond@protonmail.com>
    Co-authored-by: John Murret <john.murret@hashicorp.com>
    loshz and jmurret authored Mar 31, 2023
    Configuration menu
    Copy the full SHA
    3e6f8b7 View commit details
    Browse the repository at this point in the history
  7. add region field (#16825)

    * add region field
    
    * fix syntax error in test file
    
    * go fmt
    
    * go fmt
    
    * remove test
    malizz authored Mar 31, 2023
    Configuration menu
    Copy the full SHA
    fc64a70 View commit details
    Browse the repository at this point in the history

Commits on Apr 3, 2023

  1. Connect CA Primary Provider refactor (#16749)

    * Rename Intermediate cert references to LeafSigningCert
    
    Within the Consul CA subsystem, the term "Intermediate"
    is confusing because the meaning changes depending on
    provider and datacenter (primary vs secondary). For
    example, when using the Consul CA the "ActiveIntermediate"
    may return the root certificate in a primary datacenter.
    
    At a high level, we are interested in knowing which
    CA is responsible for signing leaf certs, regardless of
    its position in a certificate chain. This rename makes
    the intent clearer.
    
    * Move provider state check earlier
    
    * Remove calls to GenerateLeafSigningCert
    
    GenerateLeafSigningCert (formerly known
    as GenerateIntermediate) is vestigial in
    non-Vault providers, as it simply returns
    the root certificate in primary
    datacenters.
    
    By folding Vault's intermediate cert logic
    into `GenerateRoot` we can encapsulate
    the intermediate cert handling within
    `newCARoot`.
    
    * Move GenerateLeafSigningCert out of PrimaryProvidder
    
    Now that the Vault Provider calls
    GenerateLeafSigningCert within
    GenerateRoot, we can remove the method
    from all other providers that never
    used it in a meaningful way.
    
    * Add test for IntermediatePEM
    
    * Rename GenerateRoot to GenerateCAChain
    
    "Root" was being overloaded in the Consul CA
    context, as different providers and configs
    resulted in a single root certificate or
    a chain originating from an external trusted
    CA. Since the Vault provider also generates
    intermediates, it seems more accurate to
    call this a CAChain.
    Chris S. Kim authored Apr 3, 2023
    Configuration menu
    Copy the full SHA
    a5397b1 View commit details
    Browse the repository at this point in the history
  2. Update changelog with patch releases (#16856)

    * Update changelog with patch releases
    
    * Backport missed 1.0.4 patch release to changelog
    zalimeni authored Apr 3, 2023
    Configuration menu
    Copy the full SHA
    f54e310 View commit details
    Browse the repository at this point in the history
  3. Fix typo on cli-flags.mdx (#16843)

    Change "segements" to segments
    ramramhariram authored Apr 3, 2023
    Configuration menu
    Copy the full SHA
    71c32b4 View commit details
    Browse the repository at this point in the history
  4. Allow dialer to re-establish terminated peering (#16776)

    Currently, if an acceptor peer deletes a peering the dialer's peering
    will eventually get to a "terminated" state. If the two clusters need to
    be re-peered the acceptor will re-generate the token but the dialer will
    encounter this error on the call to establish:
    
    "failed to get addresses to dial peer: failed to refresh peer server
    addresses, will continue to use initial addresses: there is no active
    peering for "<<<ID>>>""
    
    This is because in `exchangeSecret().GetDialAddresses()` we will get an
    error if fetching addresses for an inactive peering. The peering shows
    up as inactive at this point because of the existing terminated state.
    
    Rather than checking whether a peering is active we can instead check
    whether it was deleted. This way users do not need to delete terminated
    peerings in the dialing cluster before re-establishing them.
    freddygv authored Apr 3, 2023
    Configuration menu
    Copy the full SHA
    f6de5ff View commit details
    Browse the repository at this point in the history
  5. CA mesh CA expiration to it's own section

    This is part of an effort to raise awareness that you need to monitor
    your mesh CA if coming from an external source as you'll need to manage
    the rotation.
    eikenb authored Apr 3, 2023
    Configuration menu
    Copy the full SHA
    4085412 View commit details
    Browse the repository at this point in the history
  6. Fix broken doc in consul-k8s upgrade (#16852)

    Signed-off-by: dttung2905 <ttdao.2015@accountancy.smu.edu.sg>
    Co-authored-by: David Yu <dyu@hashicorp.com>
    dttung2905 and David Yu authored Apr 3, 2023
    Configuration menu
    Copy the full SHA
    0582f13 View commit details
    Browse the repository at this point in the history

Commits on Apr 4, 2023

  1. docs: add envoy to the proxycfg diagram (#16834)

    * docs: add envoy to the proxycfg diagram
    huikang authored Apr 4, 2023
    Configuration menu
    Copy the full SHA
    a319953 View commit details
    Browse the repository at this point in the history
  2. ci: increase deep-copy and lint-enum jobs to use large runner as they…

    … hang in ENT (#16866)
    
    * docs: add envoy to the proxycfg diagram (#16834)
    
    * docs: add envoy to the proxycfg diagram
    
    * increase dee-copy job to use large runner.  disable lint-enums on ENT
    
    * set lint-enums to a large
    
    * remove redunant installation of deep-copy
    
    ---------
    
    Co-authored-by: cskh <hui.kang@hashicorp.com>
    jmurret and huikang authored Apr 4, 2023
    Configuration menu
    Copy the full SHA
    afc8f97 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    671d582 View commit details
    Browse the repository at this point in the history

Commits on Apr 5, 2023

  1. ad arm64 testing (#16876)

    jmurret authored Apr 5, 2023
    Configuration menu
    Copy the full SHA
    dcb9da2 View commit details
    Browse the repository at this point in the history
  2. Omit false positives from 404 checker (#16881)

    * Remove false positives from 404 checker
    
    * fix remaining 404s
    eddie-rowe authored Apr 5, 2023
    Configuration menu
    Copy the full SHA
    25f9da4 View commit details
    Browse the repository at this point in the history
  3. ci: fixes missing deps in frontend gha workflows (#16872)

    Signed-off-by: Dan Bond <danbond@protonmail.com>
    loshz authored Apr 5, 2023
    Configuration menu
    Copy the full SHA
    bdff715 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    3f74827 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    ad3a68a View commit details
    Browse the repository at this point in the history

Commits on Apr 6, 2023

  1. Configuration menu
    Copy the full SHA
    4fa2537 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    1794484 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    175bb1a View commit details
    Browse the repository at this point in the history
  4. Fix API GW broken link (#16885)

    * Fix API GW broken link
    
    * Update website/content/docs/api-gateway/upgrades.mdx
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    
    ---------
    
    Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
    eddie-rowe and im2nguyen authored Apr 6, 2023
    Configuration menu
    Copy the full SHA
    5bdf795 View commit details
    Browse the repository at this point in the history
  5. ci: Add success jobs. make go-test-enterprise conditional. build-dist…

    …ros and go-tests trigger on push to main and release branches (#16905)
    
    * Add go-tests-success job and make go-test-enterprise conditional
    
    * fixing lint-32bit reference
    
    * fixing reference to -go-test-troubleshoot
    
    * add all jobs that fan out.
    
    * fixing success job to need set up
    
    * add echo to success job
    
    * adding success jobs to build-artifacts, build-distros, and frontend.
    
    * changing the name of the job in verify ci to be consistent with other workflows
    
    * enable go-tests, build-distros, and verify-ci to run on merge to main and release branches because they currently do not with just the pull_request trigger
    jmurret authored Apr 6, 2023
    Configuration menu
    Copy the full SHA
    430df05 View commit details
    Browse the repository at this point in the history

Commits on Apr 7, 2023

  1. Configuration menu
    Copy the full SHA
    0a208a2 View commit details
    Browse the repository at this point in the history
  2. fixup

    jkirschner-hashicorp committed Apr 7, 2023
    Configuration menu
    Copy the full SHA
    8b549ff View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    29510f5 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    ab32e3b View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    0ee8f83 View commit details
    Browse the repository at this point in the history