Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of member cli: add -filter expression to flags into release/1.15.x #18275

This pull request is big! We’re only showing the most recent 250 commits.

Commits on May 25, 2023

  1. Update index.mdx (#17477)

    lkysow authored May 25, 2023
    Configuration menu
    Copy the full SHA
    720dda7 View commit details
    Browse the repository at this point in the history

Commits on May 26, 2023

  1. Configuration menu
    Copy the full SHA
    7177aad View commit details
    Browse the repository at this point in the history
  2. perf: Remove expensive reflection from raft/mesh hot path (#16552)

    * perf: Remove expensive reflection from raft/mesh hot path
    
    Replaces a reflection-based copy of a struct in the mesh topology with a
    deep-copy generated implementation.
    
    This is in the hot-path of raft FSM updates, and the reflection overhead was a
    substantial part of mesh registration times (~90%). This could manifest as raft
    thread saturation, and resulting instability.
    
    Co-authored-by: Joel Brandhorst <[email protected]>
    
    * add changelog
    
    ---------
    
    Co-authored-by: Joel Brandhorst <[email protected]>
    Co-authored-by: John Murret <[email protected]>
    3 people authored May 26, 2023
    Configuration menu
    Copy the full SHA
    3605fde View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    2740d12 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    516eb4f View commit details
    Browse the repository at this point in the history
  5. Add builtin/property-override Envoy Extension (#17487)

    `property-override` is an extension that allows for arbitrarily
    patching Envoy resources based on resource matching filters. Patch
    operations resemble a subset of the JSON Patch spec with minor
    differences to facilitate patching pre-defined (protobuf) schemas.
    
    See Envoy Extension product documentation for more details.
    
    Co-authored-by: Eric Haberkorn <[email protected]>
    Co-authored-by: Kyle Havlovitz <[email protected]>
    3 people authored May 26, 2023
    Configuration menu
    Copy the full SHA
    5a46a8c View commit details
    Browse the repository at this point in the history

Commits on May 29, 2023

  1. Support Listener and ClusterLoadAssignment in property-override (

    …#17497)
    
    * Support Listener in Property Override
    
    Add support for patching `Listener` resources via the builtin
    `property-override` extension.
    
    Refactor existing listener patch code in `BasicEnvoyExtender` to
    simplify addition of resource support.
    
    * Support ClusterLoadAssignment in Property Override
    
    Add support for patching `ClusterLoadAssignment` resources via the
    builtin `property-override` extension.
    zalimeni authored May 29, 2023
    Configuration menu
    Copy the full SHA
    e1df0f2 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0944f71 View commit details
    Browse the repository at this point in the history
  3. HCP Telemetry Feature (#17460)

    * Move hcp client to subpackage hcpclient (#16800)
    
    * [HCP Observability] New MetricsClient (#17100)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * Add tests and godoc for metrics client
    
    * close body after request
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * remove clone
    
    * Extract CloudConfig and mock for future PR
    
    * Switch to hclog.FromContext
    
    * [HCP Observability] OTELExporter (#17128)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Create new OTELExporter which uses the MetricsClient
    Add transform because the conversion is in an /internal package
    
    * Fix lint error
    
    * early return when there are no metrics
    
    * Add NewOTELExporter() function
    
    * Downgrade to metrics SDK version: v1.15.0-rc.1
    
    * Fix imports
    
    * fix small nits with comments and url.URL
    
    * Fix tests by asserting actual error for context cancellation, fix parallel, and make mock more versatile
    
    * Cleanup error handling and clarify empty metrics case
    
    * Fix input/expected naming in otel_transform_test.go
    
    * add comment for metric tracking
    
    * Add a general isEmpty method
    
    * Add clear error types
    
    * update to latest version 1.15.0 of OTEL
    
    * [HCP Observability] OTELSink (#17159)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Create new OTELExporter which uses the MetricsClient
    Add transform because the conversion is in an /internal package
    
    * Fix lint error
    
    * early return when there are no metrics
    
    * Add NewOTELExporter() function
    
    * Downgrade to metrics SDK version: v1.15.0-rc.1
    
    * Fix imports
    
    * fix small nits with comments and url.URL
    
    * Fix tests by asserting actual error for context cancellation, fix parallel, and make mock more versatile
    
    * Cleanup error handling and clarify empty metrics case
    
    * Fix input/expected naming in otel_transform_test.go
    
    * add comment for metric tracking
    
    * Add a general isEmpty method
    
    * Add clear error types
    
    * update to latest version 1.15.0 of OTEL
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Initialize OTELSink with sync.Map for all the instrument stores.
    
    * Moved PeriodicReader init to NewOtelReader function. This allows us to use a ManualReader for tests.
    
    * Switch to mutex instead of sync.Map to avoid type assertion
    
    * Add gauge store
    
    * Clarify comments
    
    * return concrete sink type
    
    * Fix lint errors
    
    * Move gauge store to be within sink
    
    * Use context.TODO,rebase and clenaup opts handling
    
    * Rebase onto otl exporter to downgrade metrics API to v1.15.0-rc.1
    
    * Fix imports
    
    * Update to latest stable version by rebasing on cc-4933, fix import, remove mutex init, fix opts error messages and use logger from ctx
    
    * Add lots of documentation to the OTELSink
    
    * Fix gauge store comment and check ok
    
    * Add select and ctx.Done() check to gauge callback
    
    * use require.Equal for attributes
    
    * Fixed import naming
    
    * Remove float64 calls and add a NewGaugeStore method
    
    * Change name Store to Set in gaugeStore, add concurrency tests in both OTELSink and gauge store
    
    * Generate 100 gauge operations
    
    * Seperate the labels into goroutines in sink test
    
    * Generate kv store for the test case keys to avoid using uuid
    
    * Added a race test with 300 samples for OTELSink
    
    * Do not pass in waitgroup and use error channel instead.
    
    * Using SHA 7dea2225a218872e86d2f580e82c089b321617b0 to avoid build failures in otel
    
    * Fix nits
    
    * [HCP Observability] Init OTELSink in Telemetry (#17162)
    
    * Move hcp client to subpackage hcpclient (#16800)
    
    * [HCP Observability] New MetricsClient (#17100)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * Add tests and godoc for metrics client
    
    * close body after request
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * remove clone
    
    * Extract CloudConfig and mock for future PR
    
    * Switch to hclog.FromContext
    
    * [HCP Observability] New MetricsClient (#17100)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * Add tests and godoc for metrics client
    
    * close body after request
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * remove clone
    
    * Extract CloudConfig and mock for future PR
    
    * Switch to hclog.FromContext
    
    * [HCP Observability] New MetricsClient (#17100)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * Add tests and godoc for metrics client
    
    * close body after request
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * remove clone
    
    * Extract CloudConfig and mock for future PR
    
    * Switch to hclog.FromContext
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Create new OTELExporter which uses the MetricsClient
    Add transform because the conversion is in an /internal package
    
    * Fix lint error
    
    * early return when there are no metrics
    
    * Add NewOTELExporter() function
    
    * Downgrade to metrics SDK version: v1.15.0-rc.1
    
    * Fix imports
    
    * fix small nits with comments and url.URL
    
    * Fix tests by asserting actual error for context cancellation, fix parallel, and make mock more versatile
    
    * Cleanup error handling and clarify empty metrics case
    
    * Fix input/expected naming in otel_transform_test.go
    
    * add comment for metric tracking
    
    * Add a general isEmpty method
    
    * Add clear error types
    
    * update to latest version 1.15.0 of OTEL
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Initialize OTELSink with sync.Map for all the instrument stores.
    
    * Moved PeriodicReader init to NewOtelReader function. This allows us to use a ManualReader for tests.
    
    * Switch to mutex instead of sync.Map to avoid type assertion
    
    * Add gauge store
    
    * Clarify comments
    
    * return concrete sink type
    
    * Fix lint errors
    
    * Move gauge store to be within sink
    
    * Use context.TODO,rebase and clenaup opts handling
    
    * Rebase onto otl exporter to downgrade metrics API to v1.15.0-rc.1
    
    * Fix imports
    
    * Update to latest stable version by rebasing on cc-4933, fix import, remove mutex init, fix opts error messages and use logger from ctx
    
    * Add lots of documentation to the OTELSink
    
    * Fix gauge store comment and check ok
    
    * Add select and ctx.Done() check to gauge callback
    
    * use require.Equal for attributes
    
    * Fixed import naming
    
    * Remove float64 calls and add a NewGaugeStore method
    
    * Change name Store to Set in gaugeStore, add concurrency tests in both OTELSink and gauge store
    
    * Generate 100 gauge operations
    
    * Seperate the labels into goroutines in sink test
    
    * Generate kv store for the test case keys to avoid using uuid
    
    * Added a race test with 300 samples for OTELSink
    
    * [HCP Observability] OTELExporter (#17128)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Create new OTELExporter which uses the MetricsClient
    Add transform because the conversion is in an /internal package
    
    * Fix lint error
    
    * early return when there are no metrics
    
    * Add NewOTELExporter() function
    
    * Downgrade to metrics SDK version: v1.15.0-rc.1
    
    * Fix imports
    
    * fix small nits with comments and url.URL
    
    * Fix tests by asserting actual error for context cancellation, fix parallel, and make mock more versatile
    
    * Cleanup error handling and clarify empty metrics case
    
    * Fix input/expected naming in otel_transform_test.go
    
    * add comment for metric tracking
    
    * Add a general isEmpty method
    
    * Add clear error types
    
    * update to latest version 1.15.0 of OTEL
    
    * Do not pass in waitgroup and use error channel instead.
    
    * Using SHA 7dea2225a218872e86d2f580e82c089b321617b0 to avoid build failures in otel
    
    * Rebase onto otl exporter to downgrade metrics API to v1.15.0-rc.1
    
    * Initialize OTELSink with sync.Map for all the instrument stores.
    
    * Added telemetry agent to client and init sink in deps
    
    * Fixed client
    
    * Initalize sink in deps
    
    * init sink in telemetry library
    
    * Init deps before telemetry
    
    * Use concrete telemetry.OtelSink type
    
    * add /v1/metrics
    
    * Avoid returning err for telemetry init
    
    * move sink init within the IsCloudEnabled()
    
    * Use HCPSinkOpts in deps instead
    
    * update golden test for configuration file
    
    * Switch to using extra sinks in the telemetry library
    
    * keep name MetricsConfig
    
    * fix log in verifyCCMRegistration
    
    * Set logger in context
    
    * pass around MetricSink in deps
    
    * Fix imports
    
    * Rebased onto otel sink pr
    
    * Fix URL in test
    
    * [HCP Observability] OTELSink (#17159)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Create new OTELExporter which uses the MetricsClient
    Add transform because the conversion is in an /internal package
    
    * Fix lint error
    
    * early return when there are no metrics
    
    * Add NewOTELExporter() function
    
    * Downgrade to metrics SDK version: v1.15.0-rc.1
    
    * Fix imports
    
    * fix small nits with comments and url.URL
    
    * Fix tests by asserting actual error for context cancellation, fix parallel, and make mock more versatile
    
    * Cleanup error handling and clarify empty metrics case
    
    * Fix input/expected naming in otel_transform_test.go
    
    * add comment for metric tracking
    
    * Add a general isEmpty method
    
    * Add clear error types
    
    * update to latest version 1.15.0 of OTEL
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Initialize OTELSink with sync.Map for all the instrument stores.
    
    * Moved PeriodicReader init to NewOtelReader function. This allows us to use a ManualReader for tests.
    
    * Switch to mutex instead of sync.Map to avoid type assertion
    
    * Add gauge store
    
    * Clarify comments
    
    * return concrete sink type
    
    * Fix lint errors
    
    * Move gauge store to be within sink
    
    * Use context.TODO,rebase and clenaup opts handling
    
    * Rebase onto otl exporter to downgrade metrics API to v1.15.0-rc.1
    
    * Fix imports
    
    * Update to latest stable version by rebasing on cc-4933, fix import, remove mutex init, fix opts error messages and use logger from ctx
    
    * Add lots of documentation to the OTELSink
    
    * Fix gauge store comment and check ok
    
    * Add select and ctx.Done() check to gauge callback
    
    * use require.Equal for attributes
    
    * Fixed import naming
    
    * Remove float64 calls and add a NewGaugeStore method
    
    * Change name Store to Set in gaugeStore, add concurrency tests in both OTELSink and gauge store
    
    * Generate 100 gauge operations
    
    * Seperate the labels into goroutines in sink test
    
    * Generate kv store for the test case keys to avoid using uuid
    
    * Added a race test with 300 samples for OTELSink
    
    * Do not pass in waitgroup and use error channel instead.
    
    * Using SHA 7dea2225a218872e86d2f580e82c089b321617b0 to avoid build failures in otel
    
    * Fix nits
    
    * pass extraSinks as function param instead
    
    * Add default interval as package export
    
    * remove verifyCCM func
    
    * Add clusterID
    
    * Fix import and add t.Parallel() for missing tests
    
    * Kick Vercel CI
    
    * Remove scheme from endpoint path, and fix error logging
    
    * return metrics.MetricSink for sink method
    
    * Update SDK
    
    * [HCP Observability] Metrics filtering and Labels in Go Metrics sink (#17184)
    
    * Move hcp client to subpackage hcpclient (#16800)
    
    * [HCP Observability] New MetricsClient (#17100)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * Add tests and godoc for metrics client
    
    * close body after request
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * remove clone
    
    * Extract CloudConfig and mock for future PR
    
    * Switch to hclog.FromContext
    
    * [HCP Observability] New MetricsClient (#17100)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * Add tests and godoc for metrics client
    
    * close body after request
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * remove clone
    
    * Extract CloudConfig and mock for future PR
    
    * Switch to hclog.FromContext
    
    * [HCP Observability] New MetricsClient (#17100)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * Add tests and godoc for metrics client
    
    * close body after request
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * remove clone
    
    * Extract CloudConfig and mock for future PR
    
    * Switch to hclog.FromContext
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Create new OTELExporter which uses the MetricsClient
    Add transform because the conversion is in an /internal package
    
    * Fix lint error
    
    * early return when there are no metrics
    
    * Add NewOTELExporter() function
    
    * Downgrade to metrics SDK version: v1.15.0-rc.1
    
    * Fix imports
    
    * fix small nits with comments and url.URL
    
    * Fix tests by asserting actual error for context cancellation, fix parallel, and make mock more versatile
    
    * Cleanup error handling and clarify empty metrics case
    
    * Fix input/expected naming in otel_transform_test.go
    
    * add comment for metric tracking
    
    * Add a general isEmpty method
    
    * Add clear error types
    
    * update to latest version 1.15.0 of OTEL
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Initialize OTELSink with sync.Map for all the instrument stores.
    
    * Moved PeriodicReader init to NewOtelReader function. This allows us to use a ManualReader for tests.
    
    * Switch to mutex instead of sync.Map to avoid type assertion
    
    * Add gauge store
    
    * Clarify comments
    
    * return concrete sink type
    
    * Fix lint errors
    
    * Move gauge store to be within sink
    
    * Use context.TODO,rebase and clenaup opts handling
    
    * Rebase onto otl exporter to downgrade metrics API to v1.15.0-rc.1
    
    * Fix imports
    
    * Update to latest stable version by rebasing on cc-4933, fix import, remove mutex init, fix opts error messages and use logger from ctx
    
    * Add lots of documentation to the OTELSink
    
    * Fix gauge store comment and check ok
    
    * Add select and ctx.Done() check to gauge callback
    
    * use require.Equal for attributes
    
    * Fixed import naming
    
    * Remove float64 calls and add a NewGaugeStore method
    
    * Change name Store to Set in gaugeStore, add concurrency tests in both OTELSink and gauge store
    
    * Generate 100 gauge operations
    
    * Seperate the labels into goroutines in sink test
    
    * Generate kv store for the test case keys to avoid using uuid
    
    * Added a race test with 300 samples for OTELSink
    
    * [HCP Observability] OTELExporter (#17128)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Create new OTELExporter which uses the MetricsClient
    Add transform because the conversion is in an /internal package
    
    * Fix lint error
    
    * early return when there are no metrics
    
    * Add NewOTELExporter() function
    
    * Downgrade to metrics SDK version: v1.15.0-rc.1
    
    * Fix imports
    
    * fix small nits with comments and url.URL
    
    * Fix tests by asserting actual error for context cancellation, fix parallel, and make mock more versatile
    
    * Cleanup error handling and clarify empty metrics case
    
    * Fix input/expected naming in otel_transform_test.go
    
    * add comment for metric tracking
    
    * Add a general isEmpty method
    
    * Add clear error types
    
    * update to latest version 1.15.0 of OTEL
    
    * Do not pass in waitgroup and use error channel instead.
    
    * Using SHA 7dea2225a218872e86d2f580e82c089b321617b0 to avoid build failures in otel
    
    * Rebase onto otl exporter to downgrade metrics API to v1.15.0-rc.1
    
    * Initialize OTELSink with sync.Map for all the instrument stores.
    
    * Added telemetry agent to client and init sink in deps
    
    * Fixed client
    
    * Initalize sink in deps
    
    * init sink in telemetry library
    
    * Init deps before telemetry
    
    * Use concrete telemetry.OtelSink type
    
    * add /v1/metrics
    
    * Avoid returning err for telemetry init
    
    * move sink init within the IsCloudEnabled()
    
    * Use HCPSinkOpts in deps instead
    
    * update golden test for configuration file
    
    * Switch to using extra sinks in the telemetry library
    
    * keep name MetricsConfig
    
    * fix log in verifyCCMRegistration
    
    * Set logger in context
    
    * pass around MetricSink in deps
    
    * Fix imports
    
    * Rebased onto otel sink pr
    
    * Fix URL in test
    
    * [HCP Observability] OTELSink (#17159)
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Create new OTELExporter which uses the MetricsClient
    Add transform because the conversion is in an /internal package
    
    * Fix lint error
    
    * early return when there are no metrics
    
    * Add NewOTELExporter() function
    
    * Downgrade to metrics SDK version: v1.15.0-rc.1
    
    * Fix imports
    
    * fix small nits with comments and url.URL
    
    * Fix tests by asserting actual error for context cancellation, fix parallel, and make mock more versatile
    
    * Cleanup error handling and clarify empty metrics case
    
    * Fix input/expected naming in otel_transform_test.go
    
    * add comment for metric tracking
    
    * Add a general isEmpty method
    
    * Add clear error types
    
    * update to latest version 1.15.0 of OTEL
    
    * Client configured with TLS using HCP config and retry/throttle
    
    * run go mod tidy
    
    * Remove one abstraction to use the config from deps
    
    * Address PR feedback
    
    * Initialize OTELSink with sync.Map for all the instrument stores.
    
    * Moved PeriodicReader init to NewOtelReader function. This allows us to use a ManualReader for tests.
    
    * Switch to mutex instead of sync.Map to avoid type assertion
    
    * Add gauge store
    
    * Clarify comments
    
    * return concrete sink type
    
    * Fix lint errors
    
    * Move gauge store to be within sink
    
    * Use context.TODO,rebase and clenaup opts handling
    
    * Rebase onto otl exporter to downgrade metrics API to v1.15.0-rc.1
    
    * Fix imports
    
    * Update to latest stable version by rebasing on cc-4933, fix import, remove mutex init, fix opts error messages and use logger from ctx
    
    * Add lots of documentation to the OTELSink
    
    * Fix gauge store comment and check ok
    
    * Add select and ctx.Done() check to gauge callback
    
    * use require.Equal for attributes
    
    * Fixed import naming
    
    * Remove float64 calls and add a NewGaugeStore method
    
    * Change name Store to Set in gaugeStore, add concurrency tests in both OTELSink and gauge store
    
    * Generate 100 gauge operations
    
    * Seperate the labels into goroutines in sink test
    
    * Generate kv store for the test case keys to avoid using uuid
    
    * Added a race test with 300 samples for OTELSink
    
    * Do not pass in waitgroup and use error channel instead.
    
    * Using SHA 7dea2225a218872e86d2f580e82c089b321617b0 to avoid build failures in otel
    
    * Fix nits
    
    * pass extraSinks as function param instead
    
    * Add default interval as package export
    
    * remove verifyCCM func
    
    * Add clusterID
    
    * Fix import and add t.Parallel() for missing tests
    
    * Kick Vercel CI
    
    * Remove scheme from endpoint path, and fix error logging
    
    * return metrics.MetricSink for sink method
    
    * Update SDK
    
    * Added telemetry agent to client and init sink in deps
    
    * Add node_id and __replica__ default labels
    
    * add function for default labels and set x-hcp-resource-id
    
    * Fix labels tests
    
    * Commit suggestion for getDefaultLabels
    
    Co-authored-by: Joshua Timmons <[email protected]>
    
    * Fixed server.id, and t.Parallel()
    
    * Make defaultLabels a method on the TelemetryConfig object
    
    * Rename FilterList to lowercase filterList
    
    * Cleanup filter implemetation by combining regex into a single one, and making the type lowercase
    
    * Fix append
    
    * use regex directly for filters
    
    * Fix x-resource-id test to use mocked value
    
    * Fix log.Error formats
    
    * Forgot the len(opts.Label) optimization)
    
    * Use cfg.NodeID instead
    
    ---------
    
    Co-authored-by: Joshua Timmons <[email protected]>
    
    * remove replic tag (#17484)
    
    * [HCP Observability] Add custom metrics for OTEL sink, improve logging, upgrade modules and cleanup metrics client (#17455)
    
    * Add custom metrics for Exporter and transform operations
    
    * Improve deps logging
    
    Run go mod tidy
    
    * Upgrade SDK and OTEL
    
    * Remove the partial success implemetation and check for HTTP status code in metrics client
    
    * Add x-channel
    
    * cleanup logs in deps.go based on PR feedback
    
    * Change to debug log and lowercase
    
    * address test operation feedback
    
    * use GetHumanVersion on version
    
    * Fix error wrapping
    
    * Fix metric names
    
    * [HCP Observability] Turn off retries for now until dynamically configurable (#17496)
    
    * Remove retries for now until dynamic configuration is possible
    
    * Clarify comment
    
    * Update changelog
    
    * improve changelog
    
    ---------
    
    Co-authored-by: Joshua Timmons <[email protected]>
    Achooo and jjti authored May 29, 2023
    Configuration menu
    Copy the full SHA
    091925b View commit details
    Browse the repository at this point in the history

Commits on May 30, 2023

  1. Configuration menu
    Copy the full SHA
    65b8ccd View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    b74e87b View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    bc9bb99 View commit details
    Browse the repository at this point in the history
  4. [NET-3092] JWT Verify claims handling (#17452)

    * [NET-3092] JWT Verify claims handling
    roncodingenthusiast authored May 30, 2023
    Configuration menu
    Copy the full SHA
    55e283d View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    85cfec6 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    44f9013 View commit details
    Browse the repository at this point in the history
  7. Add Upstream Service Targeting to Property Override Extension (#17517)

    * add upstream service targeting to property override extension
    
    * Also add baseline goldens for service specific property override extension.
    * Refactor the extension framework to put more logic into the templates.
    
    * fix up the golden tests
    erichaberkorn authored May 30, 2023
    Configuration menu
    Copy the full SHA
    d99312b View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    04a0d01 View commit details
    Browse the repository at this point in the history
  9. Add version endpoint (#17506)

    * add FIPS verison info
    
    * separate out feature functionality from build identification
    
    * split out ent test
    
    * add version endpoint
    skpratt authored May 30, 2023
    Configuration menu
    Copy the full SHA
    e559c59 View commit details
    Browse the repository at this point in the history
  10. FIPS gossip changes (#17507)

    * separate fips gossip
    
    * clean up
    skpratt authored May 30, 2023
    Configuration menu
    Copy the full SHA
    a46ac4b View commit details
    Browse the repository at this point in the history

Commits on May 31, 2023

  1. Configuration menu
    Copy the full SHA
    fdda7ad View commit details
    Browse the repository at this point in the history
  2. Accept ap, datacenter, and namespace query params (#17525)

    This commit only contains the OSS PR (datacenter query param support).
    A separate enterprise PR adds support for ap and namespace query params.
    
    Resources in Consul can exists within scopes such as datacenters, cluster
    peers, admin partitions, and namespaces. You can refer to those resources from
    interfaces such as the CLI, HTTP API, DNS, and configuration files.
    
    Some scope levels have consistent naming: cluster peers are always referred to
    as "peer".
    
    Other scope levels use a short-hand in DNS lookups...
    - "ns" for namespace
    - "ap" for admin partition
    - "dc" for datacenter
    
    ...But use long-hand in CLI commands:
    - "namespace" for namespace
    - "partition" for admin partition
    - and "datacenter"
    
    However, HTTP API query parameters do not follow a consistent pattern,
    supporting short-hand for some scopes but long-hand for others:
    - "ns" for namespace
    - "partition" for admin partition
    - and "dc" for datacenter.
    
    This inconsistency is confusing, especially for users who have been exposed to
    providing scope names through another interface such as CLI or DNS queries.
    
    This commit improves UX by consistently supporting both short-hand and
    long-hand forms of the namespace, partition, and datacenter scopes in HTTP API
    query parameters.
    jkirschner-hashicorp authored May 31, 2023
    Configuration menu
    Copy the full SHA
    b9c9d79 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    a065eef View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    217248b View commit details
    Browse the repository at this point in the history
  5. add changelog (#17528)

    dhiaayachi authored May 31, 2023
    Configuration menu
    Copy the full SHA
    da94cbd View commit details
    Browse the repository at this point in the history
  6. Export peering cli (#15654)

    * Sujata's peering-cli branch
    
    * Added error message for connecting to cluster
    
    * We can export service to peer
    
    * export handling multiple peers
    
    * export handles multiple peers
    
    * export now can handle multiple services
    
    * Export after 1st cleanup
    
    * Successful export
    
    * Added the namespace option
    
    * Add .changelog entry
    
    * go mod tidy
    
    * Stub unit tests for peering export command
    
    * added export in peering.go
    
    * Adding export_test
    
    * Moved the code to services from peers and cleaned the serviceNamespace
    
    * Added support for exporting to partitions
    
    * Fixed partition bug
    
    * Added unit tests for export command
    
    * Add multi-tenancy flags
    
    * gofmt
    
    * Add some helpful comments
    
    * Exclude namespace + partition flags when running OSS
    
    * cleaned up partition stuff
    
    * Validate required flags differently for OSS vs. ENT
    
    * Update success output to include only the requested consumers
    
    * cleaned up
    
    * fixed broken test
    
    * gofmt
    
    * Include all flags in OSS build
    
    * Remove example previously added to peering command
    
    * Move stray import into correct block
    
    * Update changelog entry to include support for exporting to a partition
    
    * Add required-ness label to consumer-peers flag description
    
    * Update command/services/export/export.go
    
    Co-authored-by: Dan Stough <[email protected]>
    
    * Add docs placeholder for new services export command
    
    * Moved piece of code to OSS
    
    * Break config entry init + update into separate functions
    
    * fixed
    
    * Vary existing service export comparison for OSS vs. ENT
    
    * Move OSS-specific test to export_oss_test.go
    
    * Set config entry name based on partition being exported from
    
    * Set namespace on added services
    
    * Adding namespace
    
    * Remove export documentation
    
    We will include documentation in a followup PR
    
    * Consolidate code from export_oss into export.go
    
    * Consolidated export_oss_test.go and export_test.go
    
    * Add example of partition export to command synopsis
    
    * Allow empty peers flag if partitions flag provided
    
    * Add test coverage for -consumer-partitions flag
    
    * Update command/services/export/export.go
    
    Co-authored-by: Jared Kirschner <[email protected]>
    
    * Update command/services/export/export.go
    
    Co-authored-by: Jared Kirschner <[email protected]>
    
    * Update changelog entry
    
    * Use "cluster peers" to clear up any possible confusion
    
    * Update test assertions
    
    ---------
    
    Co-authored-by: 20sr20 <[email protected]>
    Co-authored-by: Dan Stough <[email protected]>
    Co-authored-by: Jared Kirschner <[email protected]>
    4 people authored May 31, 2023
    Configuration menu
    Copy the full SHA
    b438a07 View commit details
    Browse the repository at this point in the history
  7. Fix tproxy failover issue with sameness groups (#17533)

    Sameness groups with default-for-failover enabled did not function properly with
    tproxy whenever all instances of the service disappeared from the local cluster.
    This occured, because there were no corresponding resolvers (due to the implicit
    failover policy) which caused VIPs to be deallocated.
    
    This ticket expands upon the VIP allocations so that both service-defaults and
    service-intentions (without destination wildcards) will ensure that the virtual
    IP exists.
    hashi-derek authored May 31, 2023
    Configuration menu
    Copy the full SHA
    ba26e18 View commit details
    Browse the repository at this point in the history
  8. [API Gateway] Fix use of virtual resolvers in HTTPRoutes (#17055)

    * [API Gateway] Fix use of virtual resolvers in routes
    
    * Add changelog entry
    Andrew Stucki authored May 31, 2023
    Configuration menu
    Copy the full SHA
    ca12ce9 View commit details
    Browse the repository at this point in the history

Commits on Jun 1, 2023

  1. Avoid panic applying TProxy Envoy extensions (#17537)

    When UpstreamEnvoyExtender was introduced, some code was left duplicated
    between it and BasicEnvoyExtender. One path in that code panics when a
    TProxy listener patch is attempted due to no upstream data in
    RuntimeConfig matching the local service (which would only happen in
    rare cases).
    
    Instead, we can remove the special handling of upstream VIPs from
    BasicEnvoyExtender entirely, greatly simplifying the listener filter
    patch code and avoiding the panic. UpstreamEnvoyExtender, which needs
    this code to function, is modified to ensure a panic does not occur.
    
    This also fixes a second regression in which the Lua extension was not
    applied to TProxy outbound listeners.
    zalimeni authored Jun 1, 2023
    Configuration menu
    Copy the full SHA
    ad03a5d View commit details
    Browse the repository at this point in the history
  2. Revert "fix(connect envoy): set initial_fetch_timeout to wait for ini…

    …tial xDS… (#17317)" (#17540)
    
    This reverts commit be7d2a4.
    DanStough authored Jun 1, 2023
    Configuration menu
    Copy the full SHA
    a043981 View commit details
    Browse the repository at this point in the history
  3. docs: add note about Nomad support for Consul 1.13.8 (#17512)

    * docs: add note about Nomad support for Consul 1.13.8
    
    * apply code review changes
    lgfa29 authored Jun 1, 2023
    Configuration menu
    Copy the full SHA
    7293e1a View commit details
    Browse the repository at this point in the history

Commits on Jun 2, 2023

  1. Configuration menu
    Copy the full SHA
    d9e18b4 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    cf4059f View commit details
    Browse the repository at this point in the history
  3. Resolves issue-16844 - systemd notify by default (#16845)

    * updates `consul.service` systemd service unit to use `Type=notify` to
      resolve issue #16844
    * add changelog update to match
    drawks authored Jun 2, 2023
    Configuration menu
    Copy the full SHA
    a55d368 View commit details
    Browse the repository at this point in the history
  4. add changelog entries for 1.15.3 (#17558)

    malizz authored Jun 2, 2023
    Configuration menu
    Copy the full SHA
    88951bf View commit details
    Browse the repository at this point in the history

Commits on Jun 5, 2023

  1. Fix up case where subscription is terminated due to ACLs changing or …

    …a snapshot restore occurring (#17566)
    
    * Fix up case where subscription is terminated due to ACLs changing or a snapshot restore occurring
    
    * Add changelog entry
    
    * Switch to use errors.Is
    Andrew Stucki authored Jun 5, 2023
    Configuration menu
    Copy the full SHA
    4ddb88e View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    8617f8a View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    caa044f View commit details
    Browse the repository at this point in the history
  4. Various bits of cleanup detected when using Go Workspaces (#17462)

    TLDR with many modules the versions included in each diverged quite a bit. Attempting to use Go Workspaces produces a bunch of errors.
    
    This commit:
    
    1. Fixes envoy-library-references.sh to work again
    2. Ensures we are pulling in [email protected] everywhere (previously it was at that version in some modules and others were much older)
    3. Remove one usage of golang/protobuf that caused us to have a direct dependency on it.
    4. Remove deprecated usage of the Endpoint field in the grpc resolver.Target struct. The current version of grpc (v1.55.0) has removed that field and recommended replacement with URL.Opaque and calls to the Endpoint() func when needing to consume the previous field.
    4. `go work init <all the paths to go.mod files>` && `go work sync`. This syncrhonized versions of dependencies from the main workspace/root module to all submodules
    5. Updated .gitignore to ignore the go.work and go.work.sum files. This seems to be standard practice at the moment.
    6. Update doc comments in protoc-gen-consul-rate-limit to be go fmt compatible
    7. Upgraded makefile infra to perform linting, testing and go mod tidy on all modules in a flexible manner.
    8. Updated linter rules to prevent usage of golang/protobuf
    9. Updated a leader peering test to account for an extra colon in a grpc error message.
    mkeeler authored Jun 5, 2023
    Configuration menu
    Copy the full SHA
    77f44fa View commit details
    Browse the repository at this point in the history
  5. docs: clarify the behavior of prepending hostname to metrics (#17521)

    * docs: clarify the behavior of prepending hostname to metrics
    
    * Update website/content/docs/agent/config/config-files.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    huikang and trujillo-adam authored Jun 5, 2023
    Configuration menu
    Copy the full SHA
    dd71bb8 View commit details
    Browse the repository at this point in the history

Commits on Jun 6, 2023

  1. Fix subscribing/fetching objects not in the default partition (#17581)

    * Fix subscribing/fetching objects not in the default namespace
    
    * add changelog
    Andrew Stucki authored Jun 6, 2023
    Configuration menu
    Copy the full SHA
    f9d9d4d View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    8e52d48 View commit details
    Browse the repository at this point in the history
  3. Fix metric names in Consul agent telemetry docs (#17577)

    Joshua Timmons authored Jun 6, 2023
    Configuration menu
    Copy the full SHA
    7a2ee14 View commit details
    Browse the repository at this point in the history
  4. Fix Property Override Services parsing (#17584)

    Ensure that the embedded api struct is properly parsed when
    deserializing config containing a set ResourceFilter.Services field.
    
    Also enhance existing integration test to guard against bugs and
    exercise this field.
    zalimeni authored Jun 6, 2023
    Configuration menu
    Copy the full SHA
    2dd5551 View commit details
    Browse the repository at this point in the history
  5. Implement the service endpoints controller (#17216)

    * Add a ReplaceType dep mapper and move them into their own file
    
    * Implement the service endpoints controller
    
    * Implement a Catalog Controllers Integration Test
    mkeeler authored Jun 6, 2023
    Configuration menu
    Copy the full SHA
    a5ba889 View commit details
    Browse the repository at this point in the history

Commits on Jun 7, 2023

  1. Configuration menu
    Copy the full SHA
    a35cafa View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    39d4aaf View commit details
    Browse the repository at this point in the history
  3. fix some testing.T retry.R mixups (#17600)

    Fix some linter warnings before updating the lint-consul-retry code in hashicorp/lint-consul-retry#4
    rboyer authored Jun 7, 2023
    Configuration menu
    Copy the full SHA
    820cdf5 View commit details
    Browse the repository at this point in the history
  4. Disable terminating-gateway for property-override (#17605)

    More validation is needed to ensure this behaves as expected; in the
    meantime, align with docs and disable this proxy type.
    zalimeni authored Jun 7, 2023
    Configuration menu
    Copy the full SHA
    1db02a0 View commit details
    Browse the repository at this point in the history
  5. [OSS] Post Consul 1.16 updates (#17606)

    * chore: update dev build to 1.17
    
    * chore(ci): add nightly 1.16 test
    
    Drop the oldest and add the newest running release branch to nightly
    builds.
    zalimeni authored Jun 7, 2023
    Configuration menu
    Copy the full SHA
    1e920a7 View commit details
    Browse the repository at this point in the history
  6. Add writeAuditRPCEvent to agent_oss (#17607)

    * Add writeAuditRPCEvent to agent_oss
    
    * fix the other diffs
    
    * backport change log
    roncodingenthusiast authored Jun 7, 2023
    Configuration menu
    Copy the full SHA
    8118aae View commit details
    Browse the repository at this point in the history

Commits on Jun 8, 2023

  1. Configuration menu
    Copy the full SHA
    779647b View commit details
    Browse the repository at this point in the history
  2. [API Gateway] Fix trust domain for external peered services in synthe…

    …sis code (#17609)
    
    * [API Gateway] Fix trust domain for external peered services in synthesis code
    
    * Add changelog
    Andrew Stucki authored Jun 8, 2023
    Configuration menu
    Copy the full SHA
    9a4f503 View commit details
    Browse the repository at this point in the history
  3. backport ent changes to oss (#17614)

    * backport ent changes to oss
    
    * Update .changelog/_5669.txt
    
    Co-authored-by: Michael Zalimeni <[email protected]>
    
    ---------
    
    Co-authored-by: Michael Zalimeni <[email protected]>
    roncodingenthusiast and zalimeni authored Jun 8, 2023
    Configuration menu
    Copy the full SHA
    17f4689 View commit details
    Browse the repository at this point in the history
  4. Update intentions.mdx (#17619)

    Make behaviour of L7 intentions clearer
    lkysow authored Jun 8, 2023
    Configuration menu
    Copy the full SHA
    8598288 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    7ae457c View commit details
    Browse the repository at this point in the history

Commits on Jun 9, 2023

  1. Configuration menu
    Copy the full SHA
    30e0c23 View commit details
    Browse the repository at this point in the history
  2. [API Gateway] Fix rate limiting for API gateways (#17631)

    * [API Gateway] Fix rate limiting for API gateways
    
    * Add changelog
    
    * Fix failing unit tests
    
    * Fix operator usage tests for api package
    Andrew Stucki authored Jun 9, 2023
    Configuration menu
    Copy the full SHA
    3cb7056 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    ec347ef View commit details
    Browse the repository at this point in the history

Commits on Jun 10, 2023

  1. PmTLS and tproxy improvements with failover and L7 traffic mgmt for k…

    …8s (#17624)
    
    * porting over changes from enterprise repo to oss
    
    * applied feedback on service mesh for k8s overview
    
    * fixed typo
    
    * removed ent-only build script file
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    
    * Apply suggestions from code review
    
    Co-authored-by: David Yu <[email protected]>
    Co-authored-by: Jeff Boruszak <[email protected]>
    
    ---------
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    Co-authored-by: David Yu <[email protected]>
    3 people authored Jun 10, 2023
    Configuration menu
    Copy the full SHA
    5e84674 View commit details
    Browse the repository at this point in the history

Commits on Jun 12, 2023

  1. Delete check-legacy-links-format.yml (#17647)

    Bryce Kalow authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    b1d3ec0 View commit details
    Browse the repository at this point in the history
  2. docs: Reference doc updates for permissive mTLS settings (#17371)

    * Reference doc updates for permissive mTLS settings
    * Document config entry filtering
    * Fix minor doc errors (double slashes in link url paths)
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    Paul Glass and trujillo-adam authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    809c188 View commit details
    Browse the repository at this point in the history
  3. Add generic experiments configuration and use it to enable catalog v2…

    … resources (#17604)
    
    * Add generic experiments configuration and use it to enable catalog v2 resources
    
    * Run formatting with -s as CI will validate that this has been done
    mkeeler authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    baaf6d8 View commit details
    Browse the repository at this point in the history
  4. api-gateway: stop adding all header filters to virtual host when gene…

    …rating xDS (#17644)
    
    * Add header filter to api-gateway xDS golden test
    
    * Stop adding all header filters to virtual host when generating xDS for api-gateway
    
    * Regenerate xDS golden file for api-gateway w/ header filter
    nathancoleman authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    1074252 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    f8d3721 View commit details
    Browse the repository at this point in the history
  6. Add new Consul 1.16 docs (#17651)

    * Merge pull request #5773 from hashicorp/docs/rate-limiting-from-ip-addresses-1.16
    
    updated docs for rate limiting for IP addresses - 1.16
    
    * Merge pull request #5609 from hashicorp/docs/enterprise-utilization-reporting
    
    Add docs for enterprise utilization reporting
    
    * Merge pull request #5734 from hashicorp/docs/envoy-ext-1.16
    
    Docs/envoy ext 1.16
    
    * Merge pull request #5773 from hashicorp/docs/rate-limiting-from-ip-addresses-1.16
    
    updated docs for rate limiting for IP addresses - 1.16
    
    * Merge pull request #5609 from hashicorp/docs/enterprise-utilization-reporting
    
    Add docs for enterprise utilization reporting
    
    * Merge pull request #5734 from hashicorp/docs/envoy-ext-1.16
    
    Docs/envoy ext 1.16
    
    * fix build errors
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    im2nguyen and trujillo-adam authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    862e78f View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    c04c122 View commit details
    Browse the repository at this point in the history
  8. Post 1.16.0-rc1 updates (#17663)

    - Update changelog to include new entries from release
    - Update submodule versions to latest published
    zalimeni authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    446a640 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    290ba0e View commit details
    Browse the repository at this point in the history
  10. docs: Sameness Groups (#17628)

    * port from enterprise branch
    
    * Apply suggestions from code review
    
    Co-authored-by: shanafarkas <[email protected]>
    
    * Update website/content/docs/connect/cluster-peering/usage/create-sameness-groups.mdx
    
    * next steps
    
    * Update website/content/docs/connect/cluster-peering/usage/create-sameness-groups.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/k8s/connect/cluster-peering/usage/create-sameness-groups.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    ---------
    
    Co-authored-by: shanafarkas <[email protected]>
    Co-authored-by: trujillo-adam <[email protected]>
    3 people authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    ef77f9a View commit details
    Browse the repository at this point in the history
  11. Remove "BETA" marker from config entries (#17670)

    Thomas Eckert authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    c384f24 View commit details
    Browse the repository at this point in the history
  12. CAPIgw for K8s installation updates for 1.16 (#17627)

    * trimmed CRD step and reqs from installation
    
    * updated tech specs
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    Co-authored-by: Jeff Apple <[email protected]>
    
    * added upgrade instruction
    
    * removed tcp port req
    
    * described downtime and DT-less upgrades
    
    * applied additional review feedback
    
    ---------
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    Co-authored-by: Jeff Apple <[email protected]>
    3 people authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    27206d9 View commit details
    Browse the repository at this point in the history
  13. additional feedback on API gateway upgrades (#17677)

    * additional feedback
    
    * Update website/content/docs/api-gateway/upgrades.mdx
    
    Co-authored-by: Jeff Apple <[email protected]>
    
    ---------
    
    Co-authored-by: Jeff Apple <[email protected]>
    trujillo-adam and Jeff-Apple authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    b678742 View commit details
    Browse the repository at this point in the history
  14. docs: JWT Authorization for intentions (#17643)

    * Initial page/nav creation
    
    * configuration entry reference page
    
    * Usage + fixes
    
    * service intentions page
    
    * usage
    
    * description
    
    * config entry updates
    
    * formatting fixes
    
    * Update website/content/docs/connect/config-entries/service-intentions.mdx
    
    Co-authored-by: Paul Glass <[email protected]>
    
    * service intentions review fixes
    
    * Overview page review fixes
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    ---------
    
    Co-authored-by: Paul Glass <[email protected]>
    Co-authored-by: trujillo-adam <[email protected]>
    3 people authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    66704e5 View commit details
    Browse the repository at this point in the history
  15. docs: minor fixes to JWT auth docs (#17680)

    * Fixes
    
    * service intentions fixes
    boruszak authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    37a13dc View commit details
    Browse the repository at this point in the history
  16. Fix two WAL metrics in docs/agent/telemetry.mdx (#17593)

    Joshua Timmons authored Jun 12, 2023
    Configuration menu
    Copy the full SHA
    28d81ec View commit details
    Browse the repository at this point in the history

Commits on Jun 13, 2023

  1. Configuration menu
    Copy the full SHA
    0ddafcf View commit details
    Browse the repository at this point in the history
  2. Add release notes 1.16 rc (#17665)

    * Merge pull request #5773 from hashicorp/docs/rate-limiting-from-ip-addresses-1.16
    
    updated docs for rate limiting for IP addresses - 1.16
    
    * Merge pull request #5609 from hashicorp/docs/enterprise-utilization-reporting
    
    Add docs for enterprise utilization reporting
    
    * Merge pull request #5734 from hashicorp/docs/envoy-ext-1.16
    
    Docs/envoy ext 1.16
    
    * Add release notes for 1.16-rc
    
    * Add consul-e license utlization reporting
    
    * Update with rc absolute links
    
    * Update with rc absolute links
    
    * fix typo
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update to use callout component
    
    * address typo
    
    * docs: FIPS 140-2 Compliance (#17668)
    
    * Page + nav + formatting
    
    * link fix
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    * link fix
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Apple <[email protected]>
    
    * Update website/content/docs/enterprise/fips.mdx
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    Co-authored-by: Jeff Apple <[email protected]>
    
    * fix apigw install values file
    
    * fix typos in release notes
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    Co-authored-by: Jeff Boruszak <[email protected]>
    Co-authored-by: Jeff Apple <[email protected]>
    4 people authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    3a8fc61 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    421e9d8 View commit details
    Browse the repository at this point in the history
  4. adding redirects for tproxy and envoy extensions (#17688)

    * adding redirects
    
    * Apply suggestions from code review
    trujillo-adam authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    11764a4 View commit details
    Browse the repository at this point in the history
  5. Fix FIPS copy (#17691)

    * fix release notes links
    
    * fix typos on fips docs
    im2nguyen authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    4b843ae View commit details
    Browse the repository at this point in the history
  6. [NET-4107][Supportability] Log Level set to TRACE and duration set to…

    … 5m for consul-debug (#17596)
    
    * changed duration to 5 mins and log level to trace
    
    * documentation update
    
    * change log
    absolutelightning authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    d54d5fb View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    a8f1350 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    ddce431 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    bba5cd8 View commit details
    Browse the repository at this point in the history
  10. Refactor disco chain prioritize by locality structs (#17696)

    This includes prioritize by localities on disco chain targets rather than
    resolvers, allowing different targets within the same partition to have
    different policies.
    erichaberkorn authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    0a1efe7 View commit details
    Browse the repository at this point in the history
  11. agent: remove agent cache dependency from service mesh leaf certifica…

    …te management (#17075)
    
    * agent: remove agent cache dependency from service mesh leaf certificate management
    
    This extracts the leaf cert management from within the agent cache.
    
    This code was produced by the following process:
    
    1. All tests in agent/cache, agent/cache-types, agent/auto-config,
       agent/consul/servercert were run at each stage.
    
        - The tests in agent matching .*Leaf were run at each stage.
    
        - The tests in agent/leafcert were run at each stage after they
          existed.
    
    2. The former leaf cert Fetch implementation was extracted into a new
       package behind a "fake RPC" endpoint to make it look almost like all
       other cache type internals.
    
    3. The old cache type was shimmed to use the fake RPC endpoint and
       generally cleaned up.
    
    4. I selectively duplicated all of Get/Notify/NotifyCallback/Prepopulate
       from the agent/cache.Cache implementation over into the new package.
       This was renamed as leafcert.Manager.
    
        - Code that was irrelevant to the leaf cert type was deleted
          (inlining blocking=true, refresh=false)
    
    5. Everything that used the leaf cert cache type (including proxycfg
       stuff) was shifted to use the leafcert.Manager instead.
    
    6. agent/cache-types tests were moved and gently replumbed to execute
       as-is against a leafcert.Manager.
    
    7. Inspired by some of the locking changes from derek's branch I split
       the fat lock into N+1 locks.
    
    8. The waiter chan struct{} was eventually replaced with a
       singleflight.Group around cache updates, which was likely the biggest
       net structural change.
    
    9. The awkward two layers or logic produced as a byproduct of marrying
       the agent cache management code with the leaf cert type code was
       slowly coalesced and flattened to remove confusion.
    
    10. The .*Leaf tests from the agent package were copied and made to work
        directly against a leafcert.Manager to increase direct coverage.
    
    I have done a best effort attempt to port the previous leaf-cert cache
    type's tests over in spirit, as well as to take the e2e-ish tests in the
    agent package with Leaf in the test name and copy those into the
    agent/leafcert package to get more direct coverage, rather than coverage
    tangled up in the agent logic.
    
    There is no net-new test coverage, just coverage that was pushed around
    from elsewhere.
    rboyer authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    72f991d View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    0c15748 View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    d497623 View commit details
    Browse the repository at this point in the history
  14. add enterprise notes for IP-based rate limits (#17711)

    * add enterprise notes for IP-based rate limits
    
    * Apply suggestions from code review
    
    Co-authored-by: Tu Nguyen <[email protected]>
    Co-authored-by: David Yu <[email protected]>
    
    * added bolded 'Enterprise' in list items.
    
    ---------
    
    Co-authored-by: Tu Nguyen <[email protected]>
    Co-authored-by: David Yu <[email protected]>
    3 people authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    ab909b4 View commit details
    Browse the repository at this point in the history
  15. Update compatibility.mdx (#17713)

    David Yu authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    28647ef View commit details
    Browse the repository at this point in the history
  16. Remove extraneous version info for Config entries (#17716)

    * Update terminating-gateway.mdx
    * Update exported-services.mdx
    * Update mesh.mdx
    David Yu authored Jun 13, 2023
    Configuration menu
    Copy the full SHA
    9acbe76 View commit details
    Browse the repository at this point in the history

Commits on Jun 14, 2023

  1. fix: typo in link to section (#17527)

    Co-authored-by: trujillo-adam <[email protected]>
    tcraxs and trujillo-adam authored Jun 14, 2023
    Configuration menu
    Copy the full SHA
    8d9f2eb View commit details
    Browse the repository at this point in the history
  2. Bump Alpine to 3.18 (#17719)

    * Update Dockerfile
    
    * Create 17719.txt
    David Yu authored Jun 14, 2023
    Configuration menu
    Copy the full SHA
    212e090 View commit details
    Browse the repository at this point in the history
  3. NET-1825: New ACL token creation docs (#16465)

    Co-authored-by: trujillo-adam <[email protected]>
    Co-authored-by: Jared Kirschner <[email protected]>
    3 people authored Jun 14, 2023
    Configuration menu
    Copy the full SHA
    6a90c23 View commit details
    Browse the repository at this point in the history
  4. [NET-3865] [Supportability] Additional Information in the output of '…

    …consul operator raft list-peers' (#17582)
    
    * init
    
    * fix tests
    
    * added -detailed in docs
    
    * added change log
    
    * fix doc
    
    * checking for entry in map
    
    * fix tests
    
    * removed detailed flag
    
    * removed detailed flag
    
    * revert unwanted changes
    
    * removed unwanted changes
    
    * updated change log
    
    * pr review comment changes
    
    * pr comment changes single API instead of two
    
    * fix change log
    
    * fix tests
    
    * fix tests
    
    * fix test operator raft endpoint test
    
    * Update .changelog/17582.txt
    
    Co-authored-by: Semir Patel <[email protected]>
    
    * nits
    
    * updated docs
    
    ---------
    
    Co-authored-by: Semir Patel <[email protected]>
    absolutelightning and analogue authored Jun 14, 2023
    Configuration menu
    Copy the full SHA
    fa40654 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    9289e68 View commit details
    Browse the repository at this point in the history
  6. Bump atlassian/gajira-transition from 3.0.0 to 3.0.1 (#17741)

    Bumps [atlassian/gajira-transition](https://github.com/atlassian/gajira-transition) from 3.0.0 to 3.0.1.
    - [Release notes](https://github.com/atlassian/gajira-transition/releases)
    - [Commits](atlassian/gajira-transition@4749176...38fc9cd)
    
    ---
    updated-dependencies:
    - dependency-name: atlassian/gajira-transition
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <[email protected]>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored Jun 14, 2023
    Configuration menu
    Copy the full SHA
    abb05de View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    7ab287c View commit details
    Browse the repository at this point in the history
  8. docs: Failover overview minor fix (#17743)

    * Incorrect symbol
    
    * Clarification
    
    * slight edit for clarity
    boruszak authored Jun 14, 2023
    Configuration menu
    Copy the full SHA
    a633347 View commit details
    Browse the repository at this point in the history

Commits on Jun 15, 2023

  1. docs - update Envoy and Dataplane compat matrix (#17752)

    * Update envoy.mdx
    
    added more detail around default versus other compatible versions
    David Yu authored Jun 15, 2023
    Configuration menu
    Copy the full SHA
    37bd0e1 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0994ccf View commit details
    Browse the repository at this point in the history
  3. Updated docs added explanation. (#17751)

    * init
    
    * fix tests
    
    * added -detailed in docs
    
    * added change log
    
    * fix doc
    
    * checking for entry in map
    
    * fix tests
    
    * removed detailed flag
    
    * removed detailed flag
    
    * revert unwanted changes
    
    * removed unwanted changes
    
    * updated change log
    
    * pr review comment changes
    
    * pr comment changes single API instead of two
    
    * fix change log
    
    * fix tests
    
    * fix tests
    
    * fix test operator raft endpoint test
    
    * Update .changelog/17582.txt
    
    Co-authored-by: Semir Patel <[email protected]>
    
    * nits
    
    * updated docs
    
    * explanation added
    
    ---------
    
    Co-authored-by: Semir Patel <[email protected]>
    absolutelightning and analogue authored Jun 15, 2023
    Configuration menu
    Copy the full SHA
    fdde92c View commit details
    Browse the repository at this point in the history
  4. Update index.mdx (#17749)

    lkysow authored Jun 15, 2023
    Configuration menu
    Copy the full SHA
    0e9a012 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    7dec75f View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    8c74a1d View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    ad0a277 View commit details
    Browse the repository at this point in the history
  8. Fix issue with streaming service health watches. (#17775)

    Fix issue with streaming service health watches.
    
    This commit fixes an issue where the health streams were unaware of service
    export changes. Whenever an exported-services config entry is modified, it is
    effectively an ACL change.
    
    The bug would be triggered by the following situation:
    
    - no services are exported
    - an upstream watch to service X is spawned
    - the streaming backend filters out data for service X (due to lack of exports)
    - service X is finally exported
    
    In the situation above, the streaming backend does not trigger a refresh of its
    data.  This means that any events that were supposed to have been received prior
    to the export are NOT backfilled, and the watches never see service X spawning.
    
    We currently have decided to not trigger a stream refresh in this situation due
    to the potential for a thundering herd effect (touching exports would cause a
    re-fetch of all watches for that partition, potentially).  Therefore, a local
    blocking-query approach was added by this commit for agentless.
    
    It's also worth noting that the streaming subscription is currently bypassed
    most of the time with agentful, because proxycfg has a `req.Source.Node != ""`
    which prevents the `streamingEnabled` check from passing.  This means that while
    agents should technically have this same issue, they don't experience it with
    mesh health watches.
    
    Note that this is a temporary fix that solves the issue for proxycfg, but not
    service-discovery use cases.
    hashi-derek authored Jun 15, 2023
    Configuration menu
    Copy the full SHA
    04edace View commit details
    Browse the repository at this point in the history
  9. Property Override validation improvements (#17759)

    * Reject inbound Prop Override patch with Services
    
    Services filtering is only supported for outbound TrafficDirection patches.
    
    * Improve Prop Override unexpected type validation
    
    - Guard against additional invalid parent and target types
    - Add specific error handling for Any fields (unsupported)
    zalimeni authored Jun 15, 2023
    Configuration menu
    Copy the full SHA
    f9aa7ae View commit details
    Browse the repository at this point in the history
  10. Fixes (#17765)

    boruszak authored Jun 15, 2023
    Configuration menu
    Copy the full SHA
    414a61d View commit details
    Browse the repository at this point in the history
  11. Update license get explanation (#17782)

    This PR is to clarify what happens if the license get command is run on a follower if the leader hasn't been updated with a newer license.
    markcampv authored Jun 15, 2023
    Configuration menu
    Copy the full SHA
    730c599 View commit details
    Browse the repository at this point in the history

Commits on Jun 16, 2023

  1. Add Patch index to Prop Override validation errors (#17777)

    When a patch is found invalid, include its index for easier debugging
    when multiple patches are provided.
    zalimeni authored Jun 16, 2023
    Configuration menu
    Copy the full SHA
    265c003 View commit details
    Browse the repository at this point in the history
  2. Stop referenced jwt providers from being deleted (#17755)

    * Stop referenced jwt providers from being deleted
    roncodingenthusiast authored Jun 16, 2023
    Configuration menu
    Copy the full SHA
    5f95f5f View commit details
    Browse the repository at this point in the history
  3. Implement a Catalog Controllers Lifecycle Integration Test (#17435)

    * Implement a Catalog Controllers Lifecycle Integration Test
    
    * Prevent triggering the race detector.
    
    This allows defining some variables for protobuf constants and using those in comparisons. Without that, something internal in the fmt package ended up looking at the protobuf message size cache and triggering the race detector.
    mkeeler authored Jun 16, 2023
    Configuration menu
    Copy the full SHA
    653a886 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    5352ccf View commit details
    Browse the repository at this point in the history
  5. Catalog V2 Container Based Integration Test (#17674)

    * Implement the Catalog V2 controller integration container tests
    
    This now allows the container tests to import things from the root module. However for now we want to be very restrictive about which packages we allow importing.
    
    * Add an upgrade test for the new catalog
    
    Currently this should be dormant and not executed. However its put in place to detect breaking changes in the future and show an example of how to do an upgrade test with integration tests structured like catalog v2.
    
    * Make testutil.Retry capable of performing cleanup operations
    
    These cleanup operations are executed after each retry attempt.
    
    * Move TestContext to taking an interface instead of a concrete testing.T
    
    This allows this to be used on a retry.R or generally anything that meets the interface.
    
    * Move to using TestContext instead of background contexts
    
    Also this forces all test methods to implement the Cleanup method now instead of that being an optional interface.
    
    
    Co-authored-by: Daniel Upton <[email protected]>
    mkeeler and boxofrad authored Jun 16, 2023
    Configuration menu
    Copy the full SHA
    37636ea View commit details
    Browse the repository at this point in the history

Commits on Jun 17, 2023

  1. Fix Docs for Trails Leader By (#17763)

    * init
    
    * fix tests
    
    * added -detailed in docs
    
    * added change log
    
    * fix doc
    
    * checking for entry in map
    
    * fix tests
    
    * removed detailed flag
    
    * removed detailed flag
    
    * revert unwanted changes
    
    * removed unwanted changes
    
    * updated change log
    
    * pr review comment changes
    
    * pr comment changes single API instead of two
    
    * fix change log
    
    * fix tests
    
    * fix tests
    
    * fix test operator raft endpoint test
    
    * Update .changelog/17582.txt
    
    Co-authored-by: Semir Patel <[email protected]>
    
    * nits
    
    * updated docs
    
    * explanation added
    
    * fix doc
    
    * fix docs
    
    ---------
    
    Co-authored-by: Semir Patel <[email protected]>
    absolutelightning and analogue authored Jun 17, 2023
    Configuration menu
    Copy the full SHA
    00c8575 View commit details
    Browse the repository at this point in the history

Commits on Jun 20, 2023

  1. Improve Prop Override docs examples (#17799)

    - Provide more realistics examples for setting properties not already
      supported natively by Consul
    - Remove superfluous commas from HCL, correct target service name, and
      fix service defaults vs. proxy defaults in examples
    - Align existing integration test to updated docs
    zalimeni authored Jun 20, 2023
    Configuration menu
    Copy the full SHA
    18b1555 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    d2363eb View commit details
    Browse the repository at this point in the history
  3. Add documentation for remote debugging of integration tests. (#17800)

    * Add documentation for remote debugging of integration tests.
    
    * add link from main docs page.
    
    * changes related to PR feedback
    jmurret authored Jun 20, 2023
    Configuration menu
    Copy the full SHA
    6d39328 View commit details
    Browse the repository at this point in the history
  4. Clarify limitations of Prop Override extension (#17801)

    Explicitly document the limitations of the extension, particularly what
    kind of fields it is capable of modifying.
    zalimeni authored Jun 20, 2023
    Configuration menu
    Copy the full SHA
    e4c9793 View commit details
    Browse the repository at this point in the history
  5. Fix formatting for webhook-certs Consul tutorial (#17810)

    * Fix formatting for webhook-certs Consul tutorial
    * Make a small grammar change to also pick up whitespace changes necessary for formatting
    
    ---------
    
    Co-authored-by: David Yu <[email protected]>
    stevenzamborsky and David Yu authored Jun 20, 2023
    Configuration menu
    Copy the full SHA
    2a94ffa View commit details
    Browse the repository at this point in the history
  6. Add jwt-authn metrics to jwt-provider docs (#17816)

    * [NET-3095] add jwt-authn metrics docs
    roncodingenthusiast authored Jun 20, 2023
    Configuration menu
    Copy the full SHA
    ee95bc7 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    f17b7f3 View commit details
    Browse the repository at this point in the history

Commits on Jun 21, 2023

  1. Set GOPRIVATE for all hashicorp repos in CI (#17817)

    Consistently set GOPRIVATE to include all hashicorp repos, s.t. private
    modules are successfully pulled in enterprise CI.
    zalimeni authored Jun 21, 2023
    Configuration menu
    Copy the full SHA
    500dcb1 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    a3ba559 View commit details
    Browse the repository at this point in the history
  3. Fixup consul-container/test/debugging.md (#17815)

    Add missing `-t` flag and fix minor typo.
    zalimeni authored Jun 21, 2023
    Configuration menu
    Copy the full SHA
    d0797c4 View commit details
    Browse the repository at this point in the history
  4. fixes #17732 - AccessorID in request body should be optional when upd…

    …ating ACL token (#17739)
    
    * AccessorID in request body should be optional when updating ACL token
    
    * add a test case
    
    * fix test case
    
    * add changelog entry for PR #17739
    gbolo authored Jun 21, 2023
    Configuration menu
    Copy the full SHA
    82441a2 View commit details
    Browse the repository at this point in the history
  5. CA provider doc updates and Vault provider minor update (#17831)

    Update CA provider docs
    
    Clarify that providers can differ between
    primary and secondary datacenters
    
    Provide a comparison chart for consul vs
    vault CA providers
    
    Loosen Vault CA provider validation for RootPKIPath
    
    Update Vault CA provider documentation
    Chris S. Kim authored Jun 21, 2023
    Configuration menu
    Copy the full SHA
    a4653de View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    366bd6f View commit details
    Browse the repository at this point in the history

Commits on Jun 22, 2023

  1. CI Updates (#17834)

    * Ensure that git access to private repos uses the ELEVATED_GITHUB_TOKEN
    
    * Bump the runner size for the protobuf generation check
    
    This has failed previously when the runner process that communicates with GitHub gets starved causing the job to fail.
    mkeeler authored Jun 22, 2023
    Configuration menu
    Copy the full SHA
    1864874 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    b782f2e View commit details
    Browse the repository at this point in the history

Commits on Jun 23, 2023

  1. watch: support -filter for consul watch: checks, services, nodes, ser…

    …vice (#17780)
    
    * watch: support -filter for watch checks
    
    * Add filter for watch nodes, services, and service
    - unit test added
    - Add changelog
    - update doc
    huikang authored Jun 23, 2023
    Configuration menu
    Copy the full SHA
    f16c5d8 View commit details
    Browse the repository at this point in the history
  2. Trigger OSS => ENT merge for all release branches (#17853)

    Previously, this only triggered for release/*.*.x branches; however, our release process involves cutting a release/1.16.0 branch, for example, at time of code freeze these days. Any PRs to that branch after code freeze today do not make their way to consul-enterprise. This will make behavior for a .0 branch consistent with current behavior for a .x branch.
    nathancoleman authored Jun 23, 2023
    Configuration menu
    Copy the full SHA
    1f63671 View commit details
    Browse the repository at this point in the history
  3. Update service-mesh.mdx (#17845)

    Deleted two commas which looks quite like some leftovers.
    cn0047 authored Jun 23, 2023
    Configuration menu
    Copy the full SHA
    2e2cbc1 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    94eb36b View commit details
    Browse the repository at this point in the history
  5. docs: add note about path prefix matching behavior for HTTPRoute conf…

    …ig (#17860)
    
    * Add note about path prefix matching behavior for HTTPRoute config
    
    * Update website/content/docs/connect/gateways/api-gateway/configuration/http-route.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    nathancoleman and trujillo-adam authored Jun 23, 2023
    Configuration menu
    Copy the full SHA
    5244ede View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    d5d3a3d View commit details
    Browse the repository at this point in the history

Commits on Jun 26, 2023

  1. Configuration menu
    Copy the full SHA
    48445df View commit details
    Browse the repository at this point in the history
  2. resource: enforce consistent naming of resource types (#17611)

    For consistency, resource type names must follow these rules:
    
    - `Group` must be snake case, and in most cases a single word.
    - `GroupVersion` must be lowercase, start with a "v" and end with a number.
    - `Kind` must be pascal case.
    
    These were chosen because they map to our protobuf type naming
    conventions.
    boxofrad authored Jun 26, 2023
    Configuration menu
    Copy the full SHA
    b117eb0 View commit details
    Browse the repository at this point in the history
  3. tooling: generate protoset file (#17364)

    Extends the `proto` make target to generate a protoset file for use with
    grpcurl etc.
    boxofrad authored Jun 26, 2023
    Configuration menu
    Copy the full SHA
    ce24646 View commit details
    Browse the repository at this point in the history
  4. Fix a bug that wrongly trims domains when there is an overlap with DC…

    … name (#17160)
    
    * Fix a bug that wrongly trims domains when there is an overlap with DC name
    
    Before this change, when DC name and domain/alt-domain overlap, the domain name incorrectly trimmed from the query.
    
    Example:
    
    Given: datacenter = dc-test, alt-domain = test.consul.
    Querying for "test-node.node.dc-test.consul" will faile, because the
    code was trimming "test.consul" instead of just ".consul"
    
    This change, fixes the issue by adding dot (.) before trimming
    
    * trimDomain: ensure domain trimmed without modyfing original domains
    
    * update changelog
    
    ---------
    
    Co-authored-by: Dhia Ayachi <[email protected]>
    shamil and dhiaayachi authored Jun 26, 2023
    Configuration menu
    Copy the full SHA
    33a2d90 View commit details
    Browse the repository at this point in the history
  5. deps: aws-sdk-go v1.44.289 (#17876)

    Signed-off-by: Dan Bond <[email protected]>
    loshz authored Jun 26, 2023
    Configuration menu
    Copy the full SHA
    8e02a0e View commit details
    Browse the repository at this point in the history
  6. api-gateway: add operation cannot be fulfilled error to common errors (

    …#17874)
    
    * add error message
    
    * Update website/content/docs/api-gateway/usage/errors.mdx
    
    Co-authored-by: Nathan Coleman <[email protected]>
    
    * fix formating issues
    
    ---------
    
    Co-authored-by: Nathan Coleman <[email protected]>
    sarahalsmiller and nathancoleman authored Jun 26, 2023
    Configuration menu
    Copy the full SHA
    e552e3d View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    08c5048 View commit details
    Browse the repository at this point in the history

Commits on Jun 27, 2023

  1. Configuration menu
    Copy the full SHA
    a96a9e7 View commit details
    Browse the repository at this point in the history
  2. docs: update config enable_debug (#17866)

    * update doc for config enable_debug
    
    * Update website/content/docs/agent/config/config-files.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    nvanthao and trujillo-adam authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    6bc2222 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    601490b View commit details
    Browse the repository at this point in the history
  4. Allow service identity tokens the ability to read jwt-providers (#17893)

    * Allow service identity tokens the ability to read jwt-providers
    
    * more tests
    
    * service_prefix tests
    roncodingenthusiast authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    767ef2d View commit details
    Browse the repository at this point in the history
  5. Update docs (#17476)

    Co-authored-by: trujillo-adam <[email protected]>
    mr-miles and trujillo-adam authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    c8cfa60 View commit details
    Browse the repository at this point in the history
  6. Add emit_tags_as_labels to envoy bootstrap config when using Consul T…

    …elemetry Collector (#17888)
    Joshua Timmons authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    55056be View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    abeeea1 View commit details
    Browse the repository at this point in the history
  8. Create and update release notes for 1.16 and 1.2 (#17895)

    * update release notes for 1.16 and 1.2
    
    * update latest consul core release
    im2nguyen authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    1c819e6 View commit details
    Browse the repository at this point in the history
  9. Propose new changes to APIgw upgrade instructions (#17693)

    * Propose new changes to APIgw upgrade instructions
    
    * fix build error
    
    * update callouts to render correctly
    
    * Add hideClipboard to log messages
    
    * Added clarification around consul k8s and crds
    im2nguyen authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    b76c4d7 View commit details
    Browse the repository at this point in the history
  10. Add workflow to verify linux release packages (#17904)

    * adding docker files to verify linux packages.
    
    * add verifr-release-linux.yml
    
    * updating name
    
    * pass inputs directly into jobs
    
    * add other linux package platforms
    
    * remove on push
    
    * fix TARGETARCH on debian and ubuntu so it can check arm64 and amd64
    
    * fixing amazon to use the continue line
    
    * add ubuntu i386
    
    * fix comment lines
    
    * working
    
    * remove commented out workflow jobs
    
    * Apply suggestions from code review
    
    Co-authored-by: Nathan Coleman <[email protected]>
    
    * update fedora and ubuntu to use latest tag
    
    ---------
    
    Co-authored-by: Nathan Coleman <[email protected]>
    jmurret and nathancoleman authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    3368f14 View commit details
    Browse the repository at this point in the history
  11. Reference hashicorp/consul instead of consul for Docker image (#17914)

    * Reference hashicorp/consul instead of consul for Docker image
    
    * Update Make targets that pull consul directly
    nathancoleman authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    f787088 View commit details
    Browse the repository at this point in the history
  12. Update Consul K8s Upgrade Doc Updates (#17921)

    Updating upgrade procedures to encompass expected errors during upgrade process from v1.13.x to v1.14.x.
    natemollica-nm authored Jun 27, 2023
    Configuration menu
    Copy the full SHA
    310bc68 View commit details
    Browse the repository at this point in the history

Commits on Jun 28, 2023

  1. Update sameness-group.mdx (#17915)

    David Yu authored Jun 28, 2023
    Configuration menu
    Copy the full SHA
    6f5da97 View commit details
    Browse the repository at this point in the history
  2. Update create-sameness-groups.mdx (#17927)

    David Yu authored Jun 28, 2023
    Configuration menu
    Copy the full SHA
    b168132 View commit details
    Browse the repository at this point in the history
  3. deps: coredns v1.10.1 (#17912)

    loshz authored Jun 28, 2023
    Configuration menu
    Copy the full SHA
    7dbba6c View commit details
    Browse the repository at this point in the history
  4. Ensure RSA keys are at least 2048 bits in length (#17911)

    * Ensure RSA keys are at least 2048 bits in length
    
    * Add changelog
    
    * update key length check for FIPS compliance
    
    * Fix no new variables error and failing to return when error exists from
    validating
    
    * clean up code for better readability
    
    * actually return value
    jm96441n authored Jun 28, 2023
    Configuration menu
    Copy the full SHA
    67a239a View commit details
    Browse the repository at this point in the history
  5. tlsutil: Fix check TLS configuration (#17481)

    * tlsutil: Fix check TLS configuration
    * Rewording docs.
    * Update website/content/docs/services/configuration/checks-configuration-reference.mdx
    Co-authored-by: trujillo-adam <[email protected]>
    * Fix typos and add changelog entry.
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    beautifulentropy and trujillo-adam authored Jun 28, 2023
    Configuration menu
    Copy the full SHA
    f019457 View commit details
    Browse the repository at this point in the history
  6. docs: Deprecations for connect-native SDK and specific connect native…

    … APIs (#17937)
    
    * Update v1_16_x.mdx
    * Update connect native golang page
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    David Yu and trujillo-adam authored Jun 28, 2023
    Configuration menu
    Copy the full SHA
    6f660e5 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    bdf4fad View commit details
    Browse the repository at this point in the history

Commits on Jun 29, 2023

  1. Fixes Secondary ConnectCA update (#17846)

    This fixes a bug that was identified which resulted in subsequent
    ConnectCA configuration update not to persist in the cluster.
    Ranjandas authored Jun 29, 2023
    Configuration menu
    Copy the full SHA
    1b1f33f View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    a60b363 View commit details
    Browse the repository at this point in the history
  3. Fix streaming backend link (#17958)

    * Fix streaming backend link
    * Update health.mdx
    David Yu authored Jun 29, 2023
    Configuration menu
    Copy the full SHA
    85b78fe View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    1512ea3 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    f7305b2 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    2736e64 View commit details
    Browse the repository at this point in the history

Commits on Jun 30, 2023

  1. feature - [NET - 4005] - [Supportability] Reloadable Configuration - …

    …enable_debug (#17565)
    
    * # This is a combination of 9 commits.
    # This is the 1st commit message:
    
    init without tests
    
    # This is the commit message #2:
    
    change log
    
    # This is the commit message #3:
    
    fix tests
    
    # This is the commit message #4:
    
    fix tests
    
    # This is the commit message #5:
    
    added tests
    
    # This is the commit message #6:
    
    change log breaking change
    
    # This is the commit message #7:
    
    removed breaking change
    
    # This is the commit message #8:
    
    fix test
    
    # This is the commit message #9:
    
    keeping the test behaviour same
    
    * # This is a combination of 12 commits.
    # This is the 1st commit message:
    
    init without tests
    
    # This is the commit message #2:
    
    change log
    
    # This is the commit message #3:
    
    fix tests
    
    # This is the commit message #4:
    
    fix tests
    
    # This is the commit message #5:
    
    added tests
    
    # This is the commit message #6:
    
    change log breaking change
    
    # This is the commit message #7:
    
    removed breaking change
    
    # This is the commit message #8:
    
    fix test
    
    # This is the commit message #9:
    
    keeping the test behaviour same
    
    # This is the commit message #10:
    
    made enable debug atomic bool
    
    # This is the commit message #11:
    
    fix lint
    
    # This is the commit message #12:
    
    fix test true enable debug
    
    * parent 10f500e
    author absolutelightning <[email protected]> 1687352587 +0530
    committer absolutelightning <[email protected]> 1687352592 +0530
    
    init without tests
    
    change log
    
    fix tests
    
    fix tests
    
    added tests
    
    change log breaking change
    
    removed breaking change
    
    fix test
    
    keeping the test behaviour same
    
    made enable debug atomic bool
    
    fix lint
    
    fix test true enable debug
    
    using enable debug in agent as atomic bool
    
    test fixes
    
    fix tests
    
    fix tests
    
    added update on correct locaiton
    
    fix tests
    
    fix reloadable config enable debug
    
    fix tests
    
    fix init and acl 403
    
    * revert commit
    absolutelightning authored Jun 30, 2023
    Configuration menu
    Copy the full SHA
    2af6bc4 View commit details
    Browse the repository at this point in the history
  2. Fix formatting codeblocks on APIgw docs (#17970)

    * fix formatting codeblocks
    
    * remove unnecessary indents
    im2nguyen authored Jun 30, 2023
    Configuration menu
    Copy the full SHA
    5b7f360 View commit details
    Browse the repository at this point in the history
  3. Remove POC code (#17974)

    Chris S. Kim authored Jun 30, 2023
    Configuration menu
    Copy the full SHA
    50a9d1b View commit details
    Browse the repository at this point in the history
  4. update doc (#17910)

    * update doc
    
    * update link
    wangxinyi7 authored Jun 30, 2023
    Configuration menu
    Copy the full SHA
    9ce89c4 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    0b1299c View commit details
    Browse the repository at this point in the history
  6. docs: samenessGroup YAML examples (#17984)

    * configuration entry syntax
    
    * Example config
    boruszak authored Jun 30, 2023
    Configuration menu
    Copy the full SHA
    f096fc5 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    df85dd8 View commit details
    Browse the repository at this point in the history

Commits on Jul 1, 2023

  1. Fix typo (#17198)

    servcies => services
    evanphx authored Jul 1, 2023
    Configuration menu
    Copy the full SHA
    dc6ea1b View commit details
    Browse the repository at this point in the history

Commits on Jul 4, 2023

  1. Expose JWKS cluster config through JWTProviderConfigEntry (#17978)

    * Expose JWKS cluster config through JWTProviderConfigEntry
    
    * fix typos, rename trustedCa to trustedCA
    roncodingenthusiast authored Jul 4, 2023
    Configuration menu
    Copy the full SHA
    8039427 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    4f0bdd3 View commit details
    Browse the repository at this point in the history

Commits on Jul 5, 2023

  1. Fix incorrect protocol for transparent proxy upstreams. (#17894)

    This PR fixes a bug that was introduced in:
    #16021
    
    A user setting a protocol in proxy-defaults would cause tproxy implicit
    upstreams to not honor the upstream service's protocol set in its
    `ServiceDefaults.Protocol` field, and would instead always use the
    proxy-defaults value.
    
    Due to the fact that upstreams configured with "tcp" can successfully contact
    upstream "http" services, this issue was not recognized until recently (a
    proxy-defaults with "tcp" and a listening service with "http" would make
    successful requests, but not the opposite).
    
    As a temporary work-around, users experiencing this issue can explicitly set
    the protocol on the `ServiceDefaults.UpstreamConfig.Overrides`, which should
    take precedence.
    
    The fix in this PR removes the proxy-defaults protocol from the wildcard
    upstream that tproxy uses to configure implicit upstreams. When the protocol
    was included, it would always overwrite the value during discovery chain
    compilation, which was not correct. The discovery chain compiler also consumes
    proxy defaults to determine the protocol, so simply excluding it from the
    wildcard upstream config map resolves the issue.
    hashi-derek authored Jul 5, 2023
    Configuration menu
    Copy the full SHA
    0094dbf View commit details
    Browse the repository at this point in the history
  2. feat: include nodes count in operator usage endpoint and cli command (#…

    …17939)
    
    * feat: update operator usage api endpoint to include nodes count
    
    * feat: update operator usange cli command to includes nodes count
    JadhavPoonam authored Jul 5, 2023
    Configuration menu
    Copy the full SHA
    8af4ad1 View commit details
    Browse the repository at this point in the history
  3. [OSS] Improve Gateway Test Coverage of Catalog Health (#18011)

    * fix(cli): remove failing check from 'connect envoy' registration for api gateway
    
    * test(integration): add tests to check catalog statsus of gateways on startup
    
    * remove extra sleep comment
    
    * Update test/integration/consul-container/libs/assert/service.go
    
    * changelog
    DanStough authored Jul 5, 2023
    Configuration menu
    Copy the full SHA
    b94095d View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    7f3446e View commit details
    Browse the repository at this point in the history
  5. Fix removed service-to-service peering links (#17221)

    * docs: fix removed service-to-service peering links
    
    * docs: extend peering-via-mesh-gateways intro (thanks @trujillo-adam)
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    karras and trujillo-adam authored Jul 5, 2023
    Configuration menu
    Copy the full SHA
    2c2e628 View commit details
    Browse the repository at this point in the history
  6. docs: Sameness "beta" warning (#18017)

    * Warning updates
    
    * .x
    boruszak authored Jul 5, 2023
    Configuration menu
    Copy the full SHA
    7ef807d View commit details
    Browse the repository at this point in the history
  7. updated typo in tab heading (#18022)

    * updated typo in tab heading
    
    * updated tab group typo, too
    trujillo-adam authored Jul 5, 2023
    Configuration menu
    Copy the full SHA
    548829a View commit details
    Browse the repository at this point in the history
  8. Document that DNS lookups can target cluster peers (#17990)

    Static DNS lookups, in addition to explicitly targeting a datacenter,
    can target a cluster peer. This was added in 95dc0c7 but didn't make the documentation.
    
    The driving function for the change is `parseLocality` here: https://github.com/hashicorp/consul/blob/0b1299c28d8127129d61310ee4280055298438e0/agent/dns_oss.go#L25
    
    The biggest change in this is to adjust the standard lookup syntax to tie
    `.<datacenter>` to `.dc` as required-together, and to append in the similar `.<cluster-peer>.peer` optional argument, both to A record and SRV record lookups.
    
    Co-authored-by: David Yu <[email protected]>
    jcjones and David Yu authored Jul 5, 2023
    Configuration menu
    Copy the full SHA
    7689a5e View commit details
    Browse the repository at this point in the history

Commits on Jul 6, 2023

  1. Configuration menu
    Copy the full SHA
    ada3938 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    f7d399f View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    820cdbb View commit details
    Browse the repository at this point in the history
  4. docs - add service sync annotations and k8s service weight annotation (

    …#18032)
    
    * Docs for hashicorp/consul-k8s#2293
    * remove versions for enterprise features since they are old
    
    ---------
    
    Co-authored-by: Tu Nguyen <[email protected]>
    David Yu and im2nguyen authored Jul 6, 2023
    Configuration menu
    Copy the full SHA
    85f2ae0 View commit details
    Browse the repository at this point in the history

Commits on Jul 7, 2023

  1. docs - add jobs use case for service mesh k8s (#18037)

    * docs - add jobs use case for service mesh k8s
    * add code blocks
    David Yu authored Jul 7, 2023
    Configuration menu
    Copy the full SHA
    b9a6a74 View commit details
    Browse the repository at this point in the history
  2. address feedback (#18045)

    David Yu authored Jul 7, 2023
    Configuration menu
    Copy the full SHA
    b0a2e33 View commit details
    Browse the repository at this point in the history

Commits on Jul 10, 2023

  1. Configuration menu
    Copy the full SHA
    f4b0804 View commit details
    Browse the repository at this point in the history
  2. [OSS] Fix initial_fetch_timeout to wait for all xDS resources (#18024)

    * fix(connect): set initial_fetch_time to wait indefinitely
    
    * changelog
    
    * PR feedback 1
    DanStough authored Jul 10, 2023
    Configuration menu
    Copy the full SHA
    1b08626 View commit details
    Browse the repository at this point in the history

Commits on Jul 11, 2023

  1. Configuration menu
    Copy the full SHA
    7decc30 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    da79997 View commit details
    Browse the repository at this point in the history
  3. Fix a couple typos in Agent Telemetry Metrics docs (#18080)

    * Fix metrics docs
    
    * Add changelog
    
    Signed-off-by: josh <[email protected]>
    
    ---------
    
    Signed-off-by: josh <[email protected]>
    Joshua Timmons authored Jul 11, 2023
    Configuration menu
    Copy the full SHA
    a30ba33 View commit details
    Browse the repository at this point in the history
  4. docs updates - cluster peering and virtual services (#18069)

    * Update route-to-virtual-services.mdx
    * Update establish-peering.mdx
    David Yu authored Jul 11, 2023
    Configuration menu
    Copy the full SHA
    bfb9212 View commit details
    Browse the repository at this point in the history
  5. Update service-mesh-compare.mdx (#17279)

    grammar change
    david3a authored Jul 11, 2023
    Configuration menu
    Copy the full SHA
    0e58c89 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    bd5af7f View commit details
    Browse the repository at this point in the history

Commits on Jul 12, 2023

  1. Configuration menu
    Copy the full SHA
    3dc6f8f View commit details
    Browse the repository at this point in the history
  2. Docs: Update proxy lifecycle annotations and consul-dataplane flags (#…

    …18075)
    
    * Update proxy lifecycle annotations and consul-dataplane flags
    curtbushko authored Jul 12, 2023
    Configuration menu
    Copy the full SHA
    51d8eb8 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    f472164 View commit details
    Browse the repository at this point in the history
  4. Docs for dataplane upgrade on k8s (#18051)

    * Docs for dataplane upgrade on k8s
    
    ---------
    
    Co-authored-by: David Yu <[email protected]>
    Co-authored-by: trujillo-adam <[email protected]>
    3 people authored Jul 12, 2023
    Configuration menu
    Copy the full SHA
    ebfed56 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    f51a9d2 View commit details
    Browse the repository at this point in the history
  6. Displays Consul version of each nodes in UI nodes section (#17754)

    * update UINodes and UINodeInfo response with consul-version info added as NodeMeta, fetched from serf members
    
    * update test cases TestUINodes, TestUINodeInfo
    
    * added nil check for map
    
    * add consul-version in local agent node metadata
    
    * get consul version from serf member and add this as node meta in catalog register request
    
    * updated ui mock response to include consul versions as node meta
    
    * updated ui trans and added version as query param to node list route
    
    * updates in ui templates to display consul version with filter and sorts
    
    * updates in ui - model class, serializers,comparators,predicates for consul version feature
    
    * added change log for Consul Version Feature
    
    * updated to get version from consul service, if for some reason not available from serf
    
    * updated changelog text
    
    * updated dependent testcases
    
    * multiselection version filter
    
    * Update agent/consul/state/catalog.go
    
    comments updated
    
    Co-authored-by: Jared Kirschner <[email protected]>
    
    ---------
    
    Co-authored-by: Jared Kirschner <[email protected]>
    vijayraghav-io and jkirschner-hashicorp authored Jul 12, 2023
    Configuration menu
    Copy the full SHA
    2f20c77 View commit details
    Browse the repository at this point in the history
  7. api gw 1.16 updates (#18081)

    * api gw 1.16 updates
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    
    * update CodeBlockConfig filename
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <[email protected]>
    Co-authored-by: Jeff Boruszak <[email protected]>
    
    * remove non-standard intentions page
    
    * Update website/content/docs/api-gateway/configuration/index.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    ---------
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    Co-authored-by: trujillo-adam <[email protected]>
    3 people authored Jul 12, 2023
    Configuration menu
    Copy the full SHA
    d1f5d9b View commit details
    Browse the repository at this point in the history
  8. [NET-4103] ci: build s390x (#18067)

    * ci: build s390x
    
    * ci: test s390x
    
    * ci: dev build s390x
    
    * no GOOS
    
    * ent only
    
    * build: publish s390x
    
    * fix syntax error
    
    * fix syntax error again
    
    * fix syntax error again x2
    
    * test branch
    
    * Move s390x conditionals to step level
    
    * remove test branch
    
    ---------
    
    Co-authored-by: emilymianeil <[email protected]>
    loshz and emilymianeil authored Jul 12, 2023
    Configuration menu
    Copy the full SHA
    3b3aa1f View commit details
    Browse the repository at this point in the history

Commits on Jul 13, 2023

  1. :ermahgerd "Sevice Mesh" -> "Service Mesh" (#18116)

    Just a typo in the docs.
    nv-hashi authored Jul 13, 2023
    Configuration menu
    Copy the full SHA
    efe9816 View commit details
    Browse the repository at this point in the history
  2. Split pbmesh.UpstreamsConfiguration as a resource out of pbmesh.Upstr…

    …eams (#17991)
    
    Configuration that previously was inlined into the Upstreams resource
    applies to both explicit and implicit upstreams and so it makes sense to
    split it out into its own resource.
    
    It also has other minor changes:
    - Renames `proxy.proto` proxy_configuration.proto`
    - Changes the type of `Upstream.destination_ref` from `pbresource.ID` to
    `pbresource.Reference`
    - Adds comments to fields that didn't have them
    ishustava authored Jul 13, 2023
    Configuration menu
    Copy the full SHA
    c328ba8 View commit details
    Browse the repository at this point in the history
  3. [NET-4895] ci - api tests and consul container tests error because of…

    … dependency bugs with go 1.20.6. Pin go to 1.20.5. (#18124)
    
    ### Description
    The following jobs started failing when go 1.20.6 was released:
    - `go-test-api-1-19`
    - `go-test-api-1-20`
    - `compatibility-integration-tests`
    - `upgrade-integration-tests`
    
    `compatibility-integration-tests` and `compatibility-integration-tests`
    to this testcontainers issue:
    testcontainers/testcontainers-go#1359. This
    issue calls for testcontainers to release a new version when one of
    their dependencies is fixed. When that is done, we will unpin the go
    versions in `compatibility-integration-tests` and
    `compatibility-integration-tests`.
    
    ### Testing & Reproduction steps
    
    See these jobs broken in CI and then see them work with this PR.
    
    ---------
    
    Co-authored-by: Chris Thain <[email protected]>
    jmurret and cthain authored Jul 13, 2023
    Configuration menu
    Copy the full SHA
    a2c6953 View commit details
    Browse the repository at this point in the history
  4. Add ingress gateway deprecation notices to docs (#18102)

    ### Description
    
    This adds notices, that ingress gateway is deprecated, to several places
    in the product docs where ingress gateway is the topic.
    
    ### Testing & Reproduction steps
    
    Tested with a local copy of the website.
    
    ### Links
    
    Deprecation of ingress gateway was announced in the Release Notes for
    Consul 1.16 and Consul-K8s 1.2. See:
    
    [https://developer.hashicorp.com/consul/docs/release-notes/consul/v1_16_x#what-s-deprecated](https://developer.hashicorp.com/consul/docs/release-notes/consul/v1_16_x#what-s-deprecated
    )
    
    [https://developer.hashicorp.com/consul/docs/release-notes/consul-k8s/v1_2_x#what-s-deprecated](https://developer.hashicorp.com/consul/docs/release-notes/consul-k8s/v1_2_x#what-s-deprecated)
    
    ### PR Checklist
    
    * [N/A] updated test coverage
    * [X] external facing docs updated
    * [X] appropriate backport labels added
    * [X] not a security concern
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    Jeff-Apple and trujillo-adam authored Jul 13, 2023
    Configuration menu
    Copy the full SHA
    68863b4 View commit details
    Browse the repository at this point in the history

Commits on Jul 14, 2023

  1. Add docs for jwt cluster configuration (#18004)

    ### Description
    
    <!-- Please describe why you're making this change, in plain English.
    -->
    
    - Add jwt-provider docs for jwks cluster configuration. The
    configuration was added here:
    #17978
    roncodingenthusiast authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    2229206 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    ad6364a View commit details
    Browse the repository at this point in the history
  3. NET-4657/add resource service client (#18053)

    ### Description
    
    <!-- Please describe why you're making this change, in plain English.
    -->
    Dan had already started on this
    [task](#17849) which is needed
    to start building the HTTP APIs. This just needed some cleanup to get it
    ready for review.
    
    Overview:
    
    - Rename `internalResourceServiceClient` to
    `insecureResourceServiceClient` for name consistency
    - Configure a `secureResourceServiceClient` with auth enabled
    
    ### PR Checklist
    
    * [ ] ~updated test coverage~
    * [ ] ~external facing docs updated~
    * [x] appropriate backport labels added
    * [ ] ~not a security concern~
    JadhavPoonam authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    5208ea9 View commit details
    Browse the repository at this point in the history
  4. Fix bug with Vault CA provider (#18112)

    Updating RootPKIPath but not IntermediatePKIPath would not update 
    leaf signing certs with the new root. Unsure if this happens in practice 
    but manual testing showed it is a bug that would break mesh and agent 
    connections once the old root is pruned.
    Chris S. Kim authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    747a4c7 View commit details
    Browse the repository at this point in the history
  5. [NET-4897] net/http host header is now verified and request.host that…

    … contains socked now error (#18129)
    
    ### Description
    
    This is related to #18124 where
    we pinned the go versions in CI to 1.20.5 and 1.19.10.
    
    go 1.20.6 and 1.19.11 now validate request host headers for validity,
    including the hostname cannot be prefixed with slashes.
    
    For local communications (npipe://, unix://), the hostname is not used,
    but we need valid and meaningful hostname. Prior versions go Go would
    clean the host header, and strip slashes in the process, but go1.20.6
    and go1.19.11 no longer do, and reject the host header. Around the
    community we are seeing that others are intercepting the req.host and if
    it starts with a slash or ends with .sock, they changing the host to
    localhost or another dummy value.
    
    [client: define a "dummy" hostname to use for local connections by
    thaJeztah · Pull Request #45942 ·
    moby/moby](moby/moby#45942)
    
    ### Testing & Reproduction steps
    
    Check CI tests.
    
    ### Links
    * [ ] updated test coverage
    * [ ] external facing docs updated
    * [ ] appropriate backport labels added
    * [ ] not a security concern
    jmurret authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    5af7390 View commit details
    Browse the repository at this point in the history
  6. add a conditional around setting LANFilter.AllSegments to make sure i…

    …t is valid (#18139)
    
    ### Description
    
    This is to correct a code problem because this assumes all segments, but
    when you get to Enterprise, you can be in partition that is not the
    default partition, in which case specifying all segments does not
    validate and fails. This is to correct the setting of this filter with
    `AllSegments` to `true` to only occur when in the the `default`
    partition.
    
    ### Testing & Reproduction steps
    
    <!--
    
    * In the case of bugs, describe how to replicate
    * If any manual tests were done, document the steps and the conditions
    to replicate
    * Call out any important/ relevant unit tests, e2e tests or integration
    tests you have added or are adding
    
    -->
    
    ### Links
    
    <!--
    
    Include any links here that might be helpful for people reviewing your
    PR (Tickets, GH issues, API docs, external benchmarks, tools docs, etc).
    If there are none, feel free to delete this section.
    
    Please be mindful not to leak any customer or confidential information.
    HashiCorp employees may want to use our internal URL shortener to
    obfuscate links.
    
    -->
    
    ### PR Checklist
    
    * [ ] updated test coverage
    * [ ] external facing docs updated
    * [ ] appropriate backport labels added
    * [ ] not a security concern
    jmurret authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    691bc96 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    05b665e View commit details
    Browse the repository at this point in the history

Commits on Jul 15, 2023

  1. Configuration menu
    Copy the full SHA
    e719478 View commit details
    Browse the repository at this point in the history

Commits on Jul 17, 2023

  1. fix: update delegateMock used in ENT (#18149)

    ### Description
    
    <!-- Please describe why you're making this change, in plain English.
    -->
    The mock is used in `http_ent_test` file which caused lint failures. For
    OSS->ENT parity adding the same change here.
    
    ### Links
    
    <!--
    
    Include any links here that might be helpful for people reviewing your
    PR (Tickets, GH issues, API docs, external benchmarks, tools docs, etc).
    If there are none, feel free to delete this section.
    
    Please be mindful not to leak any customer or confidential information.
    HashiCorp employees may want to use our internal URL shortener to
    obfuscate links.
    
    -->
    
    Identified in OSS->ENT [merge
    PR](hashicorp/consul-enterprise#6328)
    
    ### PR Checklist
    
    * [ ] ~updated test coverage~
    * [ ] ~external facing docs updated~
    * [x] appropriate backport labels added
    * [ ] ~not a security concern~
    JadhavPoonam authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    5930518 View commit details
    Browse the repository at this point in the history
  2. Use JWT-auth filter in metadata mode & Delegate validation to RBAC fi…

    …lter (#18062)
    
    ### Description
    
    <!-- Please describe why you're making this change, in plain English.
    -->
    
    - Currently the jwt-auth filter doesn't take into account the service
    identity when validating jwt-auth, it only takes into account the path
    and jwt provider during validation. This causes issues when multiple
    source intentions restrict access to an endpoint with different JWT
    providers.
    - To fix these issues, rather than use the JWT auth filter for
    validation, we use it in metadata mode and allow it to forward the
    successful validated JWT token payload to the RBAC filter which will
    make the decisions.
    
    This PR ensures requests with and without JWT tokens successfully go
    through the jwt-authn filter. The filter however only forwards the data
    for successful/valid tokens. On the RBAC filter level, we check the
    payload for claims and token issuer + existing rbac rules.
    
    ### Testing & Reproduction steps
    
    <!--
    
    * In the case of bugs, describe how to replicate
    * If any manual tests were done, document the steps and the conditions
    to replicate
    * Call out any important/ relevant unit tests, e2e tests or integration
    tests you have added or are adding
    
    -->
    
    - This test covers a multi level jwt requirements (requirements at top
    level and permissions level). It also assumes you have envoy running,
    you have a redis and a sidecar proxy service registered, and have a way
    to generate jwks with jwt. I mostly use:
    https://www.scottbrady91.com/tools/jwt for this.
    
    - first write your proxy defaults
    ```
    Kind = "proxy-defaults"
    name = "global"
    config {
      protocol = "http"
    }
    ```
    - Create two providers 
    ```
    Kind = "jwt-provider"
    Name = "auth0"
    Issuer = "https://ronald.local"
    
    JSONWebKeySet = {
        Local = {
         JWKS = "eyJrZXlzIjog....."
        }
    }
    ```
    
    ```
    Kind = "jwt-provider"
    Name = "okta"
    Issuer = "https://ronald.local"
    
    JSONWebKeySet = {
       Local = {
         JWKS = "eyJrZXlzIjogW3...."
        }
    }
    ```
    
    - add a service intention
    ```
    Kind = "service-intentions"
    Name = "redis"
    
    JWT = {
      Providers = [
        {
          Name = "okta"
        },
      ]
    }
    
    Sources = [
      {
        Name = "*"
        Permissions = [{
          Action = "allow"
          HTTP = {
            PathPrefix = "/workspace"
          }
          JWT = {
            Providers = [
              {
                Name = "okta"
                VerifyClaims = [
                  {
                      Path = ["aud"]
                      Value = "my_client_app"
                  },
                  {
                    Path = ["sub"]
                    Value = "5be86359073c434bad2da3932222dabe"
                  }
                ]
              },
            ]
          }
    
        },
        {
          Action = "allow"
          HTTP = {
            PathPrefix = "/"
          }
          JWT = {
            Providers = [
              {
                Name = "auth0"
              },
            ]
          }
    
        }]
      }
    ]
    ```
    - generate 3 jwt tokens: 1 from auth0 jwks, 1 from okta jwks with
    different claims than `/workspace` expects and 1 with correct claims
    - connect to your envoy (change service and address as needed) to view
    logs and potential errors. You can add: `-- --log-level debug` to see
    what data is being forwarded
    ```
    consul connect envoy -sidecar-for redis1 -grpc-addr 127.0.0.1:8502
    ```
    - Make the following requests: 
    ```
    curl -s -H "Authorization: Bearer $Auth0_TOKEN" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v
    
    RBAC filter denied
    
    curl -s -H "Authorization: Bearer $Okta_TOKEN_with_wrong_claims" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v
    
    RBAC filter denied
    
    curl -s -H "Authorization: Bearer $Okta_TOKEN_with_correct_claims" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v
    
    Successful request
    ```
    
    
    ### TODO
    
    * [x] Update test coverage
    * [ ] update integration tests (follow-up PR)
    * [x] appropriate backport labels added
    roncodingenthusiast authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    bcc6a9d View commit details
    Browse the repository at this point in the history
  3. Support Consul Connect Envoy Command on Windows (#17694)

    ### Description
    
    Add support for consul connect envoy command on windows. This PR fixes
    the comments of PR - #15114
    
    ### Testing
    * Built consul.exe from this branch on windows and hosted here - [AWS
    S3](https://asheshvidyut-bucket.s3.ap-southeast-2.amazonaws.com/consul.zip)
    * Updated the
    [tutorial](https://developer.hashicorp.com/consul/tutorials/developer-mesh/consul-windows-workloads)
    and changed the `consul_url.default` value to [AWS
    S3](https://asheshvidyut-bucket.s3.ap-southeast-2.amazonaws.com/consul.zip)
    * Followed the steps in the tutorial and verified that everything is
    working as described.
    
    ### PR Checklist
    
    * [x] updated test coverage
    * [ ] external facing docs updated
    * [x] appropriate backport labels added
    * [x] not a security concern
    
    ---------
    
    Co-authored-by: Franco Bruno Lavayen <[email protected]>
    Co-authored-by: Jose Ignacio Lorenzo <[email protected]>
    Co-authored-by: Jose Ignacio Lorenzo <[email protected]>
    Co-authored-by: Dhia Ayachi <[email protected]>
    5 people authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    f7c5ba5 View commit details
    Browse the repository at this point in the history
  4. Change docs to say 168h instead of 7d for server_rejoin_age_max (#18154)

    ### Description
    
    Addresses
    #17171 (comment)
    David Yu authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    e52ea0e View commit details
    Browse the repository at this point in the history
  5. [OSS] test: improve xDS listener code coverage (#18138)

    test: improve xDS listener code coverage
    DanStough authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    33d898b View commit details
    Browse the repository at this point in the history
  6. Re-order expected/actual for assertContainerState in consul container…

    … tests (#18157)
    
    Re-order expected/actual, consul container tests
    roncodingenthusiast authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    03cf37e View commit details
    Browse the repository at this point in the history
  7. group and document make file (#17943)

    * group and document make file
    wangxinyi7 authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    07fce86 View commit details
    Browse the repository at this point in the history
  8. Add testing/deployer (neé consul-topology) [NET-4610] (#17823)

    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: Freddy <[email protected]>
    4 people authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    6200536 View commit details
    Browse the repository at this point in the history

Commits on Jul 18, 2023

  1. Configuration menu
    Copy the full SHA
    9214457 View commit details
    Browse the repository at this point in the history
  2. Add FIPS reference to consul enterprise docs (#18028)

    * Add FIPS reference to consul enterprise docs
    
    * Update website/content/docs/enterprise/index.mdx
    
    Co-authored-by: David Yu <[email protected]>
    
    * remove support for ecs client (fips)
    
    ---------
    
    Co-authored-by: David Yu <[email protected]>
    im2nguyen and David Yu authored Jul 18, 2023
    Configuration menu
    Copy the full SHA
    548a5ca View commit details
    Browse the repository at this point in the history
  3. add peering_commontopo tests [NET-3700] (#17951)

    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: Freddy <[email protected]>
    Co-authored-by: NiniOak <[email protected]>
    5 people authored Jul 18, 2023
    Configuration menu
    Copy the full SHA
    cd3fc9e View commit details
    Browse the repository at this point in the history

Commits on Jul 19, 2023

  1. docs - remove Sentinel from enterprise features list (#18176)

    * Update index.mdx
    * Update kv.mdx
    * Update docs-nav-data.json
    * delete sentinel.mdx
    * Update redirects.js
    
    ---------
    
    Co-authored-by: Tu Nguyen <[email protected]>
    David Yu and im2nguyen authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    2e326e2 View commit details
    Browse the repository at this point in the history
  2. [NET-4865] Bump golang.org/x/net to 0.12.0 (#18186)

    Bump golang.org/x/net to 0.12.0
    
    While not necessary to directly address CVE-2023-29406 (which should be
    handled by using a patched version of Go when building), an
    accompanying change to HTTP/2 error handling does impact agent code.
    
    See https://go-review.googlesource.com/c/net/+/506995 for the HTTP/2
    change.
    
    Bump this dependency across our submodules as well for the sake of
    potential indirect consumers of `x/net/http`.
    zalimeni authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    29cdb75 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    003370d View commit details
    Browse the repository at this point in the history
  4. [NET-4865] security: Update Go version to 1.20.6 (#18190)

    Update Go version to 1.20.6
    
    This resolves [CVE-2023-29406]
    (https://nvd.nist.gov/vuln/detail/CVE-2023-29406) for uses of the
    `net/http` standard library.
    
    Note that until the follow-up to #18124 is done, the version of Go used
    in those impacted tests will need to remain on 1.20.5.
    zalimeni authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    e8dd04d View commit details
    Browse the repository at this point in the history
  5. Improve XDS test coverage: JWT auth edition (#18183)

    * Improve XDS test coverage: JWT auth edition
    
    more tests
    
    * test: xds coverage for jwt listeners
    
    ---------
    
    Co-authored-by: DanStough <[email protected]>
    roncodingenthusiast and DanStough authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    18bc041 View commit details
    Browse the repository at this point in the history
  6. update readme.md (#18191)

    u[date readme.md
    NiniOak authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    271e5af View commit details
    Browse the repository at this point in the history
  7. Update submodules to latest following 1.16.0 (#18197)

    Align all our internal use of submodules on the latest versions.
    zalimeni authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    72999bb View commit details
    Browse the repository at this point in the history
  8. SEC-090: Automated trusted workflow pinning (2023-07-18) (#18174)

    Result of tsccr-helper -log-level=info -pin-all-workflows .
    
    Co-authored-by: hashicorp-tsccr[bot] <hashicorp-tsccr[bot]@users.noreply.github.com>
    hashicorp-tsccr[bot] and hashicorp-tsccr[bot] authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    1ef5dfc View commit details
    Browse the repository at this point in the history

Commits on Jul 20, 2023

  1. Fix Backport Assistant PR commenting (#18200)

    * Fix Backport Assistant failure PR commenting
    
    For general comments on a PR, it looks like you have to use the `/issue`
    endpoint rather than `/pulls`, which requires commit/other
    review-specific target details.
    
    This matches the endpoint used in `backport-reminder.yml`.
    
    * Remove Backport Reminder workflow
    
    This is noisy (even when adding multiple labels, individual comments per
    label are generated), and likely no longer needed: we haven't had this
    work in a long time due to an expired GH token, and we now have better
    automation for backport PR assignment.
    zalimeni authored Jul 20, 2023
    Configuration menu
    Copy the full SHA
    1c7fcdf View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    ada767f View commit details
    Browse the repository at this point in the history
  3. Explicitly enable WebSocket upgrades (#18150)

    This PR explicitly enables WebSocket upgrades in Envoy's UpgradeConfig for all
    proxy types. (API Gateway, Ingress, and Sidecar.)
    
    Fixes #8283
    blake authored Jul 20, 2023
    Configuration menu
    Copy the full SHA
    2c5a09b View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    5cd2876 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    7e6ce76 View commit details
    Browse the repository at this point in the history
  6. [OSS] Improve xDS Code Coverage - Clusters (#18165)

    test: improve xDS cluster code coverage
    DanStough authored Jul 20, 2023
    Configuration menu
    Copy the full SHA
    2793761 View commit details
    Browse the repository at this point in the history

Commits on Jul 21, 2023

  1. NET-4222 take config file consul container (#18218)

    Net 4222 take config file consul container
    huikang authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    c2066b9 View commit details
    Browse the repository at this point in the history
  2. backport of commit fe571c6

    huikang committed Jul 21, 2023
    Configuration menu
    Copy the full SHA
    1c1b349 View commit details
    Browse the repository at this point in the history
  3. backport of commit 779901b

    huikang committed Jul 21, 2023
    Configuration menu
    Copy the full SHA
    c543592 View commit details
    Browse the repository at this point in the history
  4. backport of commit adfa761

    huikang committed Jul 21, 2023
    Configuration menu
    Copy the full SHA
    dbaae3b View commit details
    Browse the repository at this point in the history