Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of Vault CA provider clean up previous default issuers into release/1.16.x #18782

This pull request is big! We’re only showing the most recent 250 commits.

Commits on Jul 14, 2023

  1. NET-4657/add resource service client (#18053)

    ### Description
    
    <!-- Please describe why you're making this change, in plain English.
    -->
    Dan had already started on this
    [task](#17849) which is needed
    to start building the HTTP APIs. This just needed some cleanup to get it
    ready for review.
    
    Overview:
    
    - Rename `internalResourceServiceClient` to
    `insecureResourceServiceClient` for name consistency
    - Configure a `secureResourceServiceClient` with auth enabled
    
    ### PR Checklist
    
    * [ ] ~updated test coverage~
    * [ ] ~external facing docs updated~
    * [x] appropriate backport labels added
    * [ ] ~not a security concern~
    JadhavPoonam authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    5208ea9 View commit details
    Browse the repository at this point in the history
  2. Fix bug with Vault CA provider (#18112)

    Updating RootPKIPath but not IntermediatePKIPath would not update 
    leaf signing certs with the new root. Unsure if this happens in practice 
    but manual testing showed it is a bug that would break mesh and agent 
    connections once the old root is pruned.
    Chris S. Kim authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    747a4c7 View commit details
    Browse the repository at this point in the history
  3. [NET-4897] net/http host header is now verified and request.host that…

    … contains socked now error (#18129)
    
    ### Description
    
    This is related to #18124 where
    we pinned the go versions in CI to 1.20.5 and 1.19.10.
    
    go 1.20.6 and 1.19.11 now validate request host headers for validity,
    including the hostname cannot be prefixed with slashes.
    
    For local communications (npipe://, unix://), the hostname is not used,
    but we need valid and meaningful hostname. Prior versions go Go would
    clean the host header, and strip slashes in the process, but go1.20.6
    and go1.19.11 no longer do, and reject the host header. Around the
    community we are seeing that others are intercepting the req.host and if
    it starts with a slash or ends with .sock, they changing the host to
    localhost or another dummy value.
    
    [client: define a "dummy" hostname to use for local connections by
    thaJeztah · Pull Request #45942 ·
    moby/moby](moby/moby#45942)
    
    ### Testing & Reproduction steps
    
    Check CI tests.
    
    ### Links
    * [ ] updated test coverage
    * [ ] external facing docs updated
    * [ ] appropriate backport labels added
    * [ ] not a security concern
    jmurret authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    5af7390 View commit details
    Browse the repository at this point in the history
  4. add a conditional around setting LANFilter.AllSegments to make sure i…

    …t is valid (#18139)
    
    ### Description
    
    This is to correct a code problem because this assumes all segments, but
    when you get to Enterprise, you can be in partition that is not the
    default partition, in which case specifying all segments does not
    validate and fails. This is to correct the setting of this filter with
    `AllSegments` to `true` to only occur when in the the `default`
    partition.
    
    ### Testing & Reproduction steps
    
    <!--
    
    * In the case of bugs, describe how to replicate
    * If any manual tests were done, document the steps and the conditions
    to replicate
    * Call out any important/ relevant unit tests, e2e tests or integration
    tests you have added or are adding
    
    -->
    
    ### Links
    
    <!--
    
    Include any links here that might be helpful for people reviewing your
    PR (Tickets, GH issues, API docs, external benchmarks, tools docs, etc).
    If there are none, feel free to delete this section.
    
    Please be mindful not to leak any customer or confidential information.
    HashiCorp employees may want to use our internal URL shortener to
    obfuscate links.
    
    -->
    
    ### PR Checklist
    
    * [ ] updated test coverage
    * [ ] external facing docs updated
    * [ ] appropriate backport labels added
    * [ ] not a security concern
    jmurret authored Jul 14, 2023
    Configuration menu
    Copy the full SHA
    691bc96 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    05b665e View commit details
    Browse the repository at this point in the history

Commits on Jul 15, 2023

  1. Configuration menu
    Copy the full SHA
    e719478 View commit details
    Browse the repository at this point in the history

Commits on Jul 17, 2023

  1. fix: update delegateMock used in ENT (#18149)

    ### Description
    
    <!-- Please describe why you're making this change, in plain English.
    -->
    The mock is used in `http_ent_test` file which caused lint failures. For
    OSS->ENT parity adding the same change here.
    
    ### Links
    
    <!--
    
    Include any links here that might be helpful for people reviewing your
    PR (Tickets, GH issues, API docs, external benchmarks, tools docs, etc).
    If there are none, feel free to delete this section.
    
    Please be mindful not to leak any customer or confidential information.
    HashiCorp employees may want to use our internal URL shortener to
    obfuscate links.
    
    -->
    
    Identified in OSS->ENT [merge
    PR](hashicorp/consul-enterprise#6328)
    
    ### PR Checklist
    
    * [ ] ~updated test coverage~
    * [ ] ~external facing docs updated~
    * [x] appropriate backport labels added
    * [ ] ~not a security concern~
    JadhavPoonam authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    5930518 View commit details
    Browse the repository at this point in the history
  2. Use JWT-auth filter in metadata mode & Delegate validation to RBAC fi…

    …lter (#18062)
    
    ### Description
    
    <!-- Please describe why you're making this change, in plain English.
    -->
    
    - Currently the jwt-auth filter doesn't take into account the service
    identity when validating jwt-auth, it only takes into account the path
    and jwt provider during validation. This causes issues when multiple
    source intentions restrict access to an endpoint with different JWT
    providers.
    - To fix these issues, rather than use the JWT auth filter for
    validation, we use it in metadata mode and allow it to forward the
    successful validated JWT token payload to the RBAC filter which will
    make the decisions.
    
    This PR ensures requests with and without JWT tokens successfully go
    through the jwt-authn filter. The filter however only forwards the data
    for successful/valid tokens. On the RBAC filter level, we check the
    payload for claims and token issuer + existing rbac rules.
    
    ### Testing & Reproduction steps
    
    <!--
    
    * In the case of bugs, describe how to replicate
    * If any manual tests were done, document the steps and the conditions
    to replicate
    * Call out any important/ relevant unit tests, e2e tests or integration
    tests you have added or are adding
    
    -->
    
    - This test covers a multi level jwt requirements (requirements at top
    level and permissions level). It also assumes you have envoy running,
    you have a redis and a sidecar proxy service registered, and have a way
    to generate jwks with jwt. I mostly use:
    https://www.scottbrady91.com/tools/jwt for this.
    
    - first write your proxy defaults
    ```
    Kind = "proxy-defaults"
    name = "global"
    config {
      protocol = "http"
    }
    ```
    - Create two providers 
    ```
    Kind = "jwt-provider"
    Name = "auth0"
    Issuer = "https://ronald.local"
    
    JSONWebKeySet = {
        Local = {
         JWKS = "eyJrZXlzIjog....."
        }
    }
    ```
    
    ```
    Kind = "jwt-provider"
    Name = "okta"
    Issuer = "https://ronald.local"
    
    JSONWebKeySet = {
       Local = {
         JWKS = "eyJrZXlzIjogW3...."
        }
    }
    ```
    
    - add a service intention
    ```
    Kind = "service-intentions"
    Name = "redis"
    
    JWT = {
      Providers = [
        {
          Name = "okta"
        },
      ]
    }
    
    Sources = [
      {
        Name = "*"
        Permissions = [{
          Action = "allow"
          HTTP = {
            PathPrefix = "/workspace"
          }
          JWT = {
            Providers = [
              {
                Name = "okta"
                VerifyClaims = [
                  {
                      Path = ["aud"]
                      Value = "my_client_app"
                  },
                  {
                    Path = ["sub"]
                    Value = "5be86359073c434bad2da3932222dabe"
                  }
                ]
              },
            ]
          }
    
        },
        {
          Action = "allow"
          HTTP = {
            PathPrefix = "/"
          }
          JWT = {
            Providers = [
              {
                Name = "auth0"
              },
            ]
          }
    
        }]
      }
    ]
    ```
    - generate 3 jwt tokens: 1 from auth0 jwks, 1 from okta jwks with
    different claims than `/workspace` expects and 1 with correct claims
    - connect to your envoy (change service and address as needed) to view
    logs and potential errors. You can add: `-- --log-level debug` to see
    what data is being forwarded
    ```
    consul connect envoy -sidecar-for redis1 -grpc-addr 127.0.0.1:8502
    ```
    - Make the following requests: 
    ```
    curl -s -H "Authorization: Bearer $Auth0_TOKEN" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v
    
    RBAC filter denied
    
    curl -s -H "Authorization: Bearer $Okta_TOKEN_with_wrong_claims" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v
    
    RBAC filter denied
    
    curl -s -H "Authorization: Bearer $Okta_TOKEN_with_correct_claims" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v
    
    Successful request
    ```
    
    
    ### TODO
    
    * [x] Update test coverage
    * [ ] update integration tests (follow-up PR)
    * [x] appropriate backport labels added
    roncodingenthusiast authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    bcc6a9d View commit details
    Browse the repository at this point in the history
  3. Support Consul Connect Envoy Command on Windows (#17694)

    ### Description
    
    Add support for consul connect envoy command on windows. This PR fixes
    the comments of PR - #15114
    
    ### Testing
    * Built consul.exe from this branch on windows and hosted here - [AWS
    S3](https://asheshvidyut-bucket.s3.ap-southeast-2.amazonaws.com/consul.zip)
    * Updated the
    [tutorial](https://developer.hashicorp.com/consul/tutorials/developer-mesh/consul-windows-workloads)
    and changed the `consul_url.default` value to [AWS
    S3](https://asheshvidyut-bucket.s3.ap-southeast-2.amazonaws.com/consul.zip)
    * Followed the steps in the tutorial and verified that everything is
    working as described.
    
    ### PR Checklist
    
    * [x] updated test coverage
    * [ ] external facing docs updated
    * [x] appropriate backport labels added
    * [x] not a security concern
    
    ---------
    
    Co-authored-by: Franco Bruno Lavayen <[email protected]>
    Co-authored-by: Jose Ignacio Lorenzo <[email protected]>
    Co-authored-by: Jose Ignacio Lorenzo <[email protected]>
    Co-authored-by: Dhia Ayachi <[email protected]>
    5 people authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    f7c5ba5 View commit details
    Browse the repository at this point in the history
  4. Change docs to say 168h instead of 7d for server_rejoin_age_max (#18154)

    ### Description
    
    Addresses
    #17171 (comment)
    David Yu authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    e52ea0e View commit details
    Browse the repository at this point in the history
  5. [OSS] test: improve xDS listener code coverage (#18138)

    test: improve xDS listener code coverage
    DanStough authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    33d898b View commit details
    Browse the repository at this point in the history
  6. Re-order expected/actual for assertContainerState in consul container…

    … tests (#18157)
    
    Re-order expected/actual, consul container tests
    roncodingenthusiast authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    03cf37e View commit details
    Browse the repository at this point in the history
  7. group and document make file (#17943)

    * group and document make file
    wangxinyi7 authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    07fce86 View commit details
    Browse the repository at this point in the history
  8. Add testing/deployer (neé consul-topology) [NET-4610] (#17823)

    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: Freddy <[email protected]>
    4 people authored Jul 17, 2023
    Configuration menu
    Copy the full SHA
    6200536 View commit details
    Browse the repository at this point in the history

Commits on Jul 18, 2023

  1. Configuration menu
    Copy the full SHA
    9214457 View commit details
    Browse the repository at this point in the history
  2. Add FIPS reference to consul enterprise docs (#18028)

    * Add FIPS reference to consul enterprise docs
    
    * Update website/content/docs/enterprise/index.mdx
    
    Co-authored-by: David Yu <[email protected]>
    
    * remove support for ecs client (fips)
    
    ---------
    
    Co-authored-by: David Yu <[email protected]>
    im2nguyen and David Yu authored Jul 18, 2023
    Configuration menu
    Copy the full SHA
    548a5ca View commit details
    Browse the repository at this point in the history
  3. add peering_commontopo tests [NET-3700] (#17951)

    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: Freddy <[email protected]>
    Co-authored-by: NiniOak <[email protected]>
    5 people authored Jul 18, 2023
    Configuration menu
    Copy the full SHA
    cd3fc9e View commit details
    Browse the repository at this point in the history

Commits on Jul 19, 2023

  1. docs - remove Sentinel from enterprise features list (#18176)

    * Update index.mdx
    * Update kv.mdx
    * Update docs-nav-data.json
    * delete sentinel.mdx
    * Update redirects.js
    
    ---------
    
    Co-authored-by: Tu Nguyen <[email protected]>
    David Yu and im2nguyen authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    2e326e2 View commit details
    Browse the repository at this point in the history
  2. [NET-4865] Bump golang.org/x/net to 0.12.0 (#18186)

    Bump golang.org/x/net to 0.12.0
    
    While not necessary to directly address CVE-2023-29406 (which should be
    handled by using a patched version of Go when building), an
    accompanying change to HTTP/2 error handling does impact agent code.
    
    See https://go-review.googlesource.com/c/net/+/506995 for the HTTP/2
    change.
    
    Bump this dependency across our submodules as well for the sake of
    potential indirect consumers of `x/net/http`.
    zalimeni authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    29cdb75 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    003370d View commit details
    Browse the repository at this point in the history
  4. [NET-4865] security: Update Go version to 1.20.6 (#18190)

    Update Go version to 1.20.6
    
    This resolves [CVE-2023-29406]
    (https://nvd.nist.gov/vuln/detail/CVE-2023-29406) for uses of the
    `net/http` standard library.
    
    Note that until the follow-up to #18124 is done, the version of Go used
    in those impacted tests will need to remain on 1.20.5.
    zalimeni authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    e8dd04d View commit details
    Browse the repository at this point in the history
  5. Improve XDS test coverage: JWT auth edition (#18183)

    * Improve XDS test coverage: JWT auth edition
    
    more tests
    
    * test: xds coverage for jwt listeners
    
    ---------
    
    Co-authored-by: DanStough <[email protected]>
    roncodingenthusiast and DanStough authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    18bc041 View commit details
    Browse the repository at this point in the history
  6. update readme.md (#18191)

    u[date readme.md
    NiniOak authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    271e5af View commit details
    Browse the repository at this point in the history
  7. Update submodules to latest following 1.16.0 (#18197)

    Align all our internal use of submodules on the latest versions.
    zalimeni authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    72999bb View commit details
    Browse the repository at this point in the history
  8. SEC-090: Automated trusted workflow pinning (2023-07-18) (#18174)

    Result of tsccr-helper -log-level=info -pin-all-workflows .
    
    Co-authored-by: hashicorp-tsccr[bot] <hashicorp-tsccr[bot]@users.noreply.github.com>
    hashicorp-tsccr[bot] and hashicorp-tsccr[bot] authored Jul 19, 2023
    Configuration menu
    Copy the full SHA
    1ef5dfc View commit details
    Browse the repository at this point in the history

Commits on Jul 20, 2023

  1. Fix Backport Assistant PR commenting (#18200)

    * Fix Backport Assistant failure PR commenting
    
    For general comments on a PR, it looks like you have to use the `/issue`
    endpoint rather than `/pulls`, which requires commit/other
    review-specific target details.
    
    This matches the endpoint used in `backport-reminder.yml`.
    
    * Remove Backport Reminder workflow
    
    This is noisy (even when adding multiple labels, individual comments per
    label are generated), and likely no longer needed: we haven't had this
    work in a long time due to an expired GH token, and we now have better
    automation for backport PR assignment.
    zalimeni authored Jul 20, 2023
    Configuration menu
    Copy the full SHA
    1c7fcdf View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    ada767f View commit details
    Browse the repository at this point in the history
  3. Explicitly enable WebSocket upgrades (#18150)

    This PR explicitly enables WebSocket upgrades in Envoy's UpgradeConfig for all
    proxy types. (API Gateway, Ingress, and Sidecar.)
    
    Fixes #8283
    blake authored Jul 20, 2023
    Configuration menu
    Copy the full SHA
    2c5a09b View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    5cd2876 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    7e6ce76 View commit details
    Browse the repository at this point in the history
  6. [OSS] Improve xDS Code Coverage - Clusters (#18165)

    test: improve xDS cluster code coverage
    DanStough authored Jul 20, 2023
    Configuration menu
    Copy the full SHA
    2793761 View commit details
    Browse the repository at this point in the history

Commits on Jul 21, 2023

  1. NET-4222 take config file consul container (#18218)

    Net 4222 take config file consul container
    huikang authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    c2066b9 View commit details
    Browse the repository at this point in the history
  2. Envoy Integration Test Windows (#18007)

    * [CONSUL-395] Update check_hostport and Usage (#40)
    
    * [CONSUL-397] Copy envoy binary from Image (#41)
    
    * [CONSUL-382] Support openssl in unique test dockerfile (#43)
    
    * [CONSUL-405] Add bats to single container (#44)
    
    * [CONSUL-414] Run Prometheus Test Cases and Validate Changes (#46)
    
    * [CONSUL-410] Run Jaeger in Single container (#45)
    
    * [CONSUL-412] Run test-sds-server in single container (#48)
    
    * [CONSUL-408] Clean containers (#47)
    
    * [CONSUL-384] Rebase and sync fork (#50)
    
    * [CONSUL-415] Create Scenarios Troubleshooting Docs (#49)
    
    * [CONSUL-417] Update Docs Single Container (#51)
    
    * [CONSUL-428] Add Socat to single container (#54)
    
    * [CONSUL-424] Replace pkill in kill_envoy function (#52)
    
    * [CONSUL-434] Modify Docker run functions in Helper script (#53)
    
    * [CONSUL-435] Replace docker run in set_ttl_check_state & wait_for_agent_service_register functions (#55)
    
    * [CONSUL-438] Add netcat (nc) in the Single container Dockerfile (#56)
    
    * [CONSUL-429] Replace Docker run with Docker exec (#57)
    
    * [CONSUL-436] Curl timeout and run tests (#58)
    
    * [CONSUL-443] Create dogstatsd Function (#59)
    
    * [CONSUL-431] Update Docs Netcat (#60)
    
    * [CONSUL-439] Parse nc Command in function (#61)
    
    * [CONSUL-463] Review curl Exec and get_ca_root Func (#63)
    
    * [CONSUL-453] Docker hostname in Helper functions (#64)
    
    * [CONSUL-461] Test wipe volumes without extra cont (#66)
    
    * [CONSUL-454] Check ports in the Server and Agent containers (#65)
    
    * [CONSUL-441] Update windows dockerfile with version (#62)
    
    * [CONSUL-466] Review case-grpc Failing Test (#67)
    
    * [CONSUL-494] Review case-cfg-resolver-svc-failover (#68)
    
    * [CONSUL-496] Replace docker_wget & docker_curl (#69)
    
    * [CONSUL-499] Cleanup Scripts - Remove nanoserver (#70)
    
    * [CONSUL-500] Update Troubleshooting Docs (#72)
    
    * [CONSUL-502] Pull & Tag Envoy Windows Image (#73)
    
    * [CONSUL-504] Replace docker run in docker_consul (#76)
    
    * [CONSUL-505] Change admin_bind
    
    * [CONSUL-399] Update envoy to 1.23.1 (#78)
    
    * [CONSUL-510] Support case-wanfed-gw on Windows (#79)
    
    * [CONSUL-506] Update troubleshooting Documentation (#80)
    
    * [CONSUL-512] Review debug_dump_volumes Function (#81)
    
    * [CONSUL-514] Add zipkin to Docker Image (#82)
    
    * [CONSUL-515] Update Documentation (#83)
    
    * [CONSUL-529] Support case-consul-exec (#86)
    
    * [CONSUL-530] Update Documentation (#87)
    
    * [CONSUL-530] Update default consul version 1.13.3
    
    * [CONSUL-539] Cleanup (#91)
    
    * [CONSUL-546] Scripts Clean-up (#92)
    
    * [CONSUL-491] Support admin_access_log_path value for Windows (#71)
    
    * [CONSUL-519] Implement mkfifo Alternative (#84)
    
    * [CONSUL-542] Create OS Specific Files for Envoy Package (#88)
    
    * [CONSUL-543] Create exec_supported.go (#89)
    
    * [CONSUL-544] Test and Build Changes (#90)
    
    * Implement os.DevNull
    
    * using mmap instead of disk files
    
    * fix import in exec-unix
    
    * fix nmap open too many arguemtn
    
    * go fmt on file
    
    * changelog file
    
    * fix go mod
    
    * Update .changelog/17694.txt
    
    Co-authored-by: Dhia Ayachi <[email protected]>
    
    * different mmap library
    
    * fix bootstrap json
    
    * some fixes
    
    * chocolatey version fix and image fix
    
    * using different library
    
    * fix Map funciton call
    
    * fix mmap call
    
    * fix tcp dump
    
    * fix tcp dump
    
    * windows tcp dump
    
    * Fix docker run
    
    * fix tests
    
    * fix go mod
    
    * fix version 16.0
    
    * fix version
    
    * fix version dev
    
    * sleep to debug
    
    * fix sleep
    
    * fix permission issue
    
    * fix permission issue
    
    * fix permission issue
    
    * fix command
    
    * fix command
    
    * fix funciton
    
    * fix assert config entry status command not found
    
    * fix command not found assert_cert_has_cn
    
    * fix command not found assert_upstream_missing
    
    * fix command not found assert_upstream_missing_once
    
    * fix command not found get_upstream_endpoint
    
    * fix command not found get_envoy_public_listener_once
    
    * fix command not found
    
    * fix test cases
    
    * windows integration test workflow github
    
    * made code similar to unix using npipe
    
    * fix go.mod
    
    * fix dialing of npipe
    
    * dont wait
    
    * check size of written json
    
    * fix undefined n
    
    * running
    
    * fix dep
    
    * fix syntax error
    
    * fix workflow file
    
    * windows runner
    
    * fix runner
    
    * fix from json
    
    * fix runs on
    
    * merge connect envoy
    
    * fix cin path
    
    * build
    
    * fix file name
    
    * fix file name
    
    * fix dev build
    
    * remove unwanted code
    
    * fix upload
    
    * fix bin name
    
    * fix path
    
    * checkout current branch
    
    * fix path
    
    * fix tests
    
    * fix shell bash for windows sh files
    
    * fix permission of run-test.sh
    
    * removed docker dev
    
    * added shell bash for tests
    
    * fix tag
    
    * fix win=true
    
    * fix cd
    
    * added dev
    
    * fix variable undefined
    
    * removed failing tests
    
    * fix tcp dump image
    
    * fix curl
    
    * fix curl
    
    * tcp dump path
    
    * fix tcpdump path
    
    * fix curl
    
    * fix curl install
    
    * stop removing intermediate containers
    
    * fix tcpdump docker image
    
    * revert -rm
    
    * --rm=false
    
    * makeing docker image before
    
    * fix tcpdump
    
    * removed case consul exec
    
    * removed terminating gateway simple
    
    * comment case wasm
    
    * removed data dog
    
    * comment out upload coverage
    
    * uncomment case-consul-exec
    
    * comment case consul exec
    
    * if always
    
    * logs
    
    * using consul 1.17.0
    
    * fix quotes
    
    * revert quotes
    
    * redirect to dev null
    
    * Revert version
    
    * revert consul connect
    
    * fix version
    
    * removed envoy connect
    
    * not using function
    
    * change log
    
    * docker logs
    
    * fix logs
    
    * restructure bad authz
    
    * rmeoved dev null
    
    * output
    
    * fix file descriptor
    
    * fix cacert
    
    * fix cacert
    
    * fix ca cert
    
    * cacert does not work in windows curl
    
    * fix func
    
    * removed docker logs
    
    * added sleep
    
    * fix tls
    
    * commented case-consul-exec
    
    * removed echo
    
    * retry docker consul
    
    * fix upload bin
    
    * uncomment consul exec
    
    * copying consul.exe to docker image
    
    * copy fix
    
    * fix paths
    
    * fix path
    
    * github workspace path
    
    * latest version
    
    * Revert "latest version"
    
    This reverts commit 5a7d7b8.
    
    * commented consul exec
    
    * added ssl revoke best effort
    
    * revert best effort
    
    * removed unused files
    
    * rename var name and change dir
    
    * windows runner
    
    * permission
    
    * needs setup fix
    
    * swtich to github runner
    
    * fix file path
    
    * fix path
    
    * fix path
    
    * fix path
    
    * fix path
    
    * fix path
    
    * fix build paths
    
    * fix tag
    
    * nightly runs
    
    * added matrix in github workflow, renamed files
    
    * fix job
    
    * fix matrix
    
    * removed brackes
    
    * from json
    
    * without using job matrix
    
    * fix quotes
    
    * revert job matrix
    
    * fix workflow
    
    * fix comment
    
    * added comment
    
    * nightly runs
    
    * removed datadog ci as it is already measured in linux one
    
    * running test
    
    * Revert "running test"
    
    This reverts commit 7013d15.
    
    * pr comment fixes
    
    * running test now
    
    * running subset of test
    
    * running subset of test
    
    * job matrix
    
    * shell bash
    
    * removed bash shell
    
    * linux machine for job matrix
    
    * fix output
    
    * added cat to debug
    
    * using ubuntu latest
    
    * fix job matrix
    
    * fix win true
    
    * fix go test
    
    * revert job matrix
    
    ---------
    
    Co-authored-by: Jose Ignacio Lorenzo <[email protected]>
    Co-authored-by: Franco Bruno Lavayen <[email protected]>
    Co-authored-by: Ivan K Berlot <[email protected]>
    Co-authored-by: Ezequiel Fernández Ponce <[email protected]>
    Co-authored-by: joselo85 <[email protected]>
    Co-authored-by: Ezequiel Fernández Ponce <[email protected]>
    Co-authored-by: Dhia Ayachi <[email protected]>
    8 people authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    47d445d View commit details
    Browse the repository at this point in the history
  3. fix typos and update ecs compat table (#18215)

    * fix typos and update ecs compat table
    
    * real info for the ecs compat matrix table
    
    * Update website/content/docs/ecs/compatibility.mdx
    
    Co-authored-by: Chris Thain <[email protected]>
    
    ---------
    
    Co-authored-by: Chris Thain <[email protected]>
    trujillo-adam and cthain authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    926db9c View commit details
    Browse the repository at this point in the history
  4. [OSS] proxystate: add proxystate protos (#18216)

    * proxystate: add proxystate protos to pbmesh and resolve imports and conflicts between message names
    ndhanushkodi authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    c932d79 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    7e01fcf View commit details
    Browse the repository at this point in the history
  6. [CC-5718] Remove HCP token requirement during bootstrap (#18140)

    * [CC-5718] Remove HCP token requirement during bootstrap
    
    * Re-add error for loading HCP management token
    
    * Remove old comment
    
    * Add changelog entry
    
    * Remove extra validation line
    
    * Apply suggestions from code review
    
    Co-authored-by: lornasong <[email protected]>
    
    ---------
    
    Co-authored-by: lornasong <[email protected]>
    jjacobson93 and lornasong authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    6671d7e View commit details
    Browse the repository at this point in the history
  7. [NET-4122] Doc guidance for federation with externalServers (#18207)

    Doc guidance for federation with externalServers
    
    Add guidance for proper configuration when joining to a secondary
    cluster using WAN fed with external servers also enabled.
    
    Also clarify federation requirements and fix formatting for an
    unrelated value.
    
    Update both the Helm chart reference (synced from `consul-k8s`, see
    hashicorp/consul-k8s#2583) and the docs on using `externalServers`.
    zalimeni authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    c138f24 View commit details
    Browse the repository at this point in the history
  8. [OSS] Improve xDS Code Coverage - Endpoints and Misc (#18222)

    test: improve xDS endpoints code coverage
    DanStough authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    8e3a1dd View commit details
    Browse the repository at this point in the history
  9. Clarify license reporting timing and GDPR compliance (#18237)

    Add Alicia's edits to clarify log timing and other details
    judithpatudith authored Jul 21, 2023
    Configuration menu
    Copy the full SHA
    7ce539e View commit details
    Browse the repository at this point in the history

Commits on Jul 22, 2023

  1. Fix Github Workflow File (#18241)

    * [CONSUL-382] Support openssl in unique test dockerfile (#43)
    
    * [CONSUL-405] Add bats to single container (#44)
    
    * [CONSUL-414] Run Prometheus Test Cases and Validate Changes (#46)
    
    * [CONSUL-410] Run Jaeger in Single container (#45)
    
    * [CONSUL-412] Run test-sds-server in single container (#48)
    
    * [CONSUL-408] Clean containers (#47)
    
    * [CONSUL-384] Rebase and sync fork (#50)
    
    * [CONSUL-415] Create Scenarios Troubleshooting Docs (#49)
    
    * [CONSUL-417] Update Docs Single Container (#51)
    
    * [CONSUL-428] Add Socat to single container (#54)
    
    * [CONSUL-424] Replace pkill in kill_envoy function (#52)
    
    * [CONSUL-434] Modify Docker run functions in Helper script (#53)
    
    * [CONSUL-435] Replace docker run in set_ttl_check_state & wait_for_agent_service_register functions (#55)
    
    * [CONSUL-438] Add netcat (nc) in the Single container Dockerfile (#56)
    
    * [CONSUL-429] Replace Docker run with Docker exec (#57)
    
    * [CONSUL-436] Curl timeout and run tests (#58)
    
    * [CONSUL-443] Create dogstatsd Function (#59)
    
    * [CONSUL-431] Update Docs Netcat (#60)
    
    * [CONSUL-439] Parse nc Command in function (#61)
    
    * [CONSUL-463] Review curl Exec and get_ca_root Func (#63)
    
    * [CONSUL-453] Docker hostname in Helper functions (#64)
    
    * [CONSUL-461] Test wipe volumes without extra cont (#66)
    
    * [CONSUL-454] Check ports in the Server and Agent containers (#65)
    
    * [CONSUL-441] Update windows dockerfile with version (#62)
    
    * [CONSUL-466] Review case-grpc Failing Test (#67)
    
    * [CONSUL-494] Review case-cfg-resolver-svc-failover (#68)
    
    * [CONSUL-496] Replace docker_wget & docker_curl (#69)
    
    * [CONSUL-499] Cleanup Scripts - Remove nanoserver (#70)
    
    * [CONSUL-500] Update Troubleshooting Docs (#72)
    
    * [CONSUL-502] Pull & Tag Envoy Windows Image (#73)
    
    * [CONSUL-504] Replace docker run in docker_consul (#76)
    
    * [CONSUL-505] Change admin_bind
    
    * [CONSUL-399] Update envoy to 1.23.1 (#78)
    
    * [CONSUL-510] Support case-wanfed-gw on Windows (#79)
    
    * [CONSUL-506] Update troubleshooting Documentation (#80)
    
    * [CONSUL-512] Review debug_dump_volumes Function (#81)
    
    * [CONSUL-514] Add zipkin to Docker Image (#82)
    
    * [CONSUL-515] Update Documentation (#83)
    
    * [CONSUL-529] Support case-consul-exec (#86)
    
    * [CONSUL-530] Update Documentation (#87)
    
    * [CONSUL-530] Update default consul version 1.13.3
    
    * [CONSUL-539] Cleanup (#91)
    
    * [CONSUL-546] Scripts Clean-up (#92)
    
    * [CONSUL-491] Support admin_access_log_path value for Windows (#71)
    
    * [CONSUL-519] Implement mkfifo Alternative (#84)
    
    * [CONSUL-542] Create OS Specific Files for Envoy Package (#88)
    
    * [CONSUL-543] Create exec_supported.go (#89)
    
    * [CONSUL-544] Test and Build Changes (#90)
    
    * Implement os.DevNull
    
    * using mmap instead of disk files
    
    * fix import in exec-unix
    
    * fix nmap open too many arguemtn
    
    * go fmt on file
    
    * changelog file
    
    * fix go mod
    
    * Update .changelog/17694.txt
    
    Co-authored-by: Dhia Ayachi <[email protected]>
    
    * different mmap library
    
    * fix bootstrap json
    
    * some fixes
    
    * chocolatey version fix and image fix
    
    * using different library
    
    * fix Map funciton call
    
    * fix mmap call
    
    * fix tcp dump
    
    * fix tcp dump
    
    * windows tcp dump
    
    * Fix docker run
    
    * fix tests
    
    * fix go mod
    
    * fix version 16.0
    
    * fix version
    
    * fix version dev
    
    * sleep to debug
    
    * fix sleep
    
    * fix permission issue
    
    * fix permission issue
    
    * fix permission issue
    
    * fix command
    
    * fix command
    
    * fix funciton
    
    * fix assert config entry status command not found
    
    * fix command not found assert_cert_has_cn
    
    * fix command not found assert_upstream_missing
    
    * fix command not found assert_upstream_missing_once
    
    * fix command not found get_upstream_endpoint
    
    * fix command not found get_envoy_public_listener_once
    
    * fix command not found
    
    * fix test cases
    
    * windows integration test workflow github
    
    * made code similar to unix using npipe
    
    * fix go.mod
    
    * fix dialing of npipe
    
    * dont wait
    
    * check size of written json
    
    * fix undefined n
    
    * running
    
    * fix dep
    
    * fix syntax error
    
    * fix workflow file
    
    * windows runner
    
    * fix runner
    
    * fix from json
    
    * fix runs on
    
    * merge connect envoy
    
    * fix cin path
    
    * build
    
    * fix file name
    
    * fix file name
    
    * fix dev build
    
    * remove unwanted code
    
    * fix upload
    
    * fix bin name
    
    * fix path
    
    * checkout current branch
    
    * fix path
    
    * fix tests
    
    * fix shell bash for windows sh files
    
    * fix permission of run-test.sh
    
    * removed docker dev
    
    * added shell bash for tests
    
    * fix tag
    
    * fix win=true
    
    * fix cd
    
    * added dev
    
    * fix variable undefined
    
    * removed failing tests
    
    * fix tcp dump image
    
    * fix curl
    
    * fix curl
    
    * tcp dump path
    
    * fix tcpdump path
    
    * fix curl
    
    * fix curl install
    
    * stop removing intermediate containers
    
    * fix tcpdump docker image
    
    * revert -rm
    
    * --rm=false
    
    * makeing docker image before
    
    * fix tcpdump
    
    * removed case consul exec
    
    * removed terminating gateway simple
    
    * comment case wasm
    
    * removed data dog
    
    * comment out upload coverage
    
    * uncomment case-consul-exec
    
    * comment case consul exec
    
    * if always
    
    * logs
    
    * using consul 1.17.0
    
    * fix quotes
    
    * revert quotes
    
    * redirect to dev null
    
    * Revert version
    
    * revert consul connect
    
    * fix version
    
    * removed envoy connect
    
    * not using function
    
    * change log
    
    * docker logs
    
    * fix logs
    
    * restructure bad authz
    
    * rmeoved dev null
    
    * output
    
    * fix file descriptor
    
    * fix cacert
    
    * fix cacert
    
    * fix ca cert
    
    * cacert does not work in windows curl
    
    * fix func
    
    * removed docker logs
    
    * added sleep
    
    * fix tls
    
    * commented case-consul-exec
    
    * removed echo
    
    * retry docker consul
    
    * fix upload bin
    
    * uncomment consul exec
    
    * copying consul.exe to docker image
    
    * copy fix
    
    * fix paths
    
    * fix path
    
    * github workspace path
    
    * latest version
    
    * Revert "latest version"
    
    This reverts commit 5a7d7b8.
    
    * commented consul exec
    
    * added ssl revoke best effort
    
    * revert best effort
    
    * removed unused files
    
    * rename var name and change dir
    
    * windows runner
    
    * permission
    
    * needs setup fix
    
    * swtich to github runner
    
    * fix file path
    
    * fix path
    
    * fix path
    
    * fix path
    
    * fix path
    
    * fix path
    
    * fix build paths
    
    * fix tag
    
    * nightly runs
    
    * added matrix in github workflow, renamed files
    
    * fix job
    
    * fix matrix
    
    * removed brackes
    
    * from json
    
    * without using job matrix
    
    * fix quotes
    
    * revert job matrix
    
    * fix workflow
    
    * fix comment
    
    * added comment
    
    * nightly runs
    
    * removed datadog ci as it is already measured in linux one
    
    * running test
    
    * Revert "running test"
    
    This reverts commit 7013d15.
    
    * pr comment fixes
    
    * running test now
    
    * running subset of test
    
    * running subset of test
    
    * job matrix
    
    * shell bash
    
    * removed bash shell
    
    * linux machine for job matrix
    
    * fix output
    
    * added cat to debug
    
    * using ubuntu latest
    
    * fix job matrix
    
    * fix win true
    
    * fix go test
    
    * revert job matrix
    
    * Fix tests
    
    ---------
    
    Co-authored-by: Ivan K Berlot <[email protected]>
    Co-authored-by: Jose Ignacio Lorenzo <[email protected]>
    Co-authored-by: Franco Bruno Lavayen <[email protected]>
    Co-authored-by: Ezequiel Fernández Ponce <[email protected]>
    Co-authored-by: joselo85 <[email protected]>
    Co-authored-by: Ezequiel Fernández Ponce <[email protected]>
    Co-authored-by: Dhia Ayachi <[email protected]>
    8 people authored Jul 22, 2023
    Configuration menu
    Copy the full SHA
    2b0d64e View commit details
    Browse the repository at this point in the history

Commits on Jul 23, 2023

  1. NET-4996 - filter go-tests and test-integration workflows from runnin…

    …g on docs only and ui only changes (#18236)
    jmurret authored Jul 23, 2023
    Configuration menu
    Copy the full SHA
    a11dba7 View commit details
    Browse the repository at this point in the history

Commits on Jul 24, 2023

  1. Align build arch matrix with enterprise (#18235)

    Ensure that OSS remains in sync w/ Enterprise by aligning the format of
    arch matrix args for various build jobs.
    zalimeni authored Jul 24, 2023
    Configuration menu
    Copy the full SHA
    8b46bac View commit details
    Browse the repository at this point in the history
  2. Revert "NET-4996 - filter go-tests and test-integration workflows fro…

    …m running on docs only and ui only changes" (#18248)
    
    Revert "NET-4996 - filter go-tests and test-integration workflows from running on docs only and ui only changes (#18236)"
    
    This reverts commit a11dba7.
    jmurret authored Jul 24, 2023
    Configuration menu
    Copy the full SHA
    639210e View commit details
    Browse the repository at this point in the history
  3. resource: Add scope to resource type registration [NET-4976] (#18214)

    Enables querying a resource type's registration to determine if a resource is cluster, partition, or partition and namespace scoped.
    analogue authored Jul 24, 2023
    Configuration menu
    Copy the full SHA
    efb45fe View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    b162c51 View commit details
    Browse the repository at this point in the history
  5. NET-1825: More new ACL token creation docs (#18063)

    Co-authored-by: trujillo-adam <[email protected]>
    Paul Glass and trujillo-adam authored Jul 24, 2023
    Configuration menu
    Copy the full SHA
    b7cdd18 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    4d3f9a1 View commit details
    Browse the repository at this point in the history
  7. [NET-3700] Backfill changelog entry for c2bbe67 and 7402d06 (#18259)

    Backfill changelog entry for c2bbe67 and 7402d06
    
    Add a changelog entry for the follow-up PR since it was specific to the
    fix and references the original change.
    zalimeni authored Jul 24, 2023
    Configuration menu
    Copy the full SHA
    9a82df2 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    319a223 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    090e869 View commit details
    Browse the repository at this point in the history

Commits on Jul 25, 2023

  1. member cli: add -filter expression to flags (#18223)

    * member cli: add -filter expression to flags
    
    * changelog
    
    * update doc
    
    * Add test cases
    
    * use quote
    huikang authored Jul 25, 2023
    Configuration menu
    Copy the full SHA
    31d2813 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    9b540e2 View commit details
    Browse the repository at this point in the history

Commits on Jul 26, 2023

  1. docs: Update ext-authz documentation for kubernetes (#18281)

    Update ext-authz documentation for kubernetes
    gautambaghel authored Jul 26, 2023
    Configuration menu
    Copy the full SHA
    02cf177 View commit details
    Browse the repository at this point in the history
  2. docs: Consul on Kubernetes specific upgrade info (#18230)

    * Compatibility page - dataplanes mention
    
    * Upgrading higher-level dataplane mention
    
    * `exec=` string callout
    
    * More visible for upgrade page
    
    * Apply suggestions from code review
    
    Co-authored-by: Tu Nguyen <[email protected]>
    
    ---------
    
    Co-authored-by: Tu Nguyen <[email protected]>
    Co-authored-by: John Murret <[email protected]>
    3 people authored Jul 26, 2023
    Configuration menu
    Copy the full SHA
    d147c3e View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    e37f702 View commit details
    Browse the repository at this point in the history
  4. docs: K8s secondary DC requirements (#18280)

    * Requested edit
    
    * Apply suggestions from code review
    
    Co-authored-by: trujillo-adam <[email protected]>
    
    ---------
    
    Co-authored-by: trujillo-adam <[email protected]>
    boruszak and trujillo-adam authored Jul 26, 2023
    Configuration menu
    Copy the full SHA
    e29ceab View commit details
    Browse the repository at this point in the history
  5. api-gateway: subscribe to bound-api-gateway only after receiving api-…

    …gateway (#18291)
    
    * api-gateway: subscribe to bound-api-gateway only after receiving api-gateway
    
    This fixes a race condition due to our dependency on having the listener(s) from the api-gateway config entry in order to fully and properly process the resources on the bound-api-gateway config entry.
    
    * Apply suggestions from code review
    
    * Add changelog entry
    nathancoleman authored Jul 26, 2023
    Configuration menu
    Copy the full SHA
    5caa0ae View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    09b251f View commit details
    Browse the repository at this point in the history
  7. Update list of Envoy versions (#18300)

    Update supported envoy versions to 1.24.10, 1.25.9, 1.26.4, 1.27.0.
    zalimeni authored Jul 26, 2023
    Configuration menu
    Copy the full SHA
    cf4deeb View commit details
    Browse the repository at this point in the history

Commits on Jul 27, 2023

  1. [NET-4904] Update list of Envoy versions in docs (#18306)

    Update list of Envoy versions in docs
    
    Update supported Envoy versions across Consul release versions.
    zalimeni authored Jul 27, 2023
    Configuration menu
    Copy the full SHA
    cbfeb6c View commit details
    Browse the repository at this point in the history

Commits on Jul 28, 2023

  1. Update actions for TSCCR (#18317)

    Update action versions before deadline
    curtbushko authored Jul 28, 2023
    Configuration menu
    Copy the full SHA
    449e050 View commit details
    Browse the repository at this point in the history

Commits on Jul 31, 2023

  1. Fix topology view when displaying mixed connect-native/normal service…

    …s. (#13023)
    
    * Fix topoloy intention with mixed connect-native/normal services.
    
    If a service is registered twice, once with connect-native and once
    without, the topology views would prune the existing intentions. This
    change brings the code more in line with the transparent proxy behavior.
    
    * Dedupe nodes in the ServiceTopology ui endpoint (like done with tags).
    
    * Consider a service connect-native as soon as one instance is.
    apollo13 authored Jul 31, 2023
    Configuration menu
    Copy the full SHA
    6ada2e0 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    356b29b View commit details
    Browse the repository at this point in the history
  3. docs: Fix some comments (#17118)

    Signed-off-by: cui fliter <[email protected]>
    cuishuang authored Jul 31, 2023
    Configuration menu
    Copy the full SHA
    18a5edd View commit details
    Browse the repository at this point in the history
  4. [NET-4703] Prevent partial application of Envoy extensions (#18068)

    Prevent partial application of Envoy extensions
    
    Ensure that non-required extensions do not change xDS resources before
    exiting on failure by cloning proto messages prior to applying each
    extension.
    
    To support this change, also move `CanApply` checks up a layer and make
    them prior to attempting extension application, s.t. we avoid
    unnecessary copies where extensions can't be applied.
    
    Last, ensure that we do not allow panics from `CanApply` or `Extend`
    checks to escape the attempted extension application.
    zalimeni authored Jul 31, 2023
    Configuration menu
    Copy the full SHA
    b1b05f0 View commit details
    Browse the repository at this point in the history
  5. docs: Simplify example jq commands by removing pipes (#18327)

    Simplify jq command examples by removing pipes to other commands.
    blake authored Jul 31, 2023
    Configuration menu
    Copy the full SHA
    3894940 View commit details
    Browse the repository at this point in the history

Commits on Aug 1, 2023

  1. Configuration menu
    Copy the full SHA
    bb6fc63 View commit details
    Browse the repository at this point in the history
  2. [CC-5719] Add support for builtin global-read-only policy (#18319)

    * [CC-5719] Add support for builtin global-read-only policy
    
    * Add changelog
    
    * Add read-only to docs
    
    * Fix some minor issues.
    
    * Change from ReplaceAll to Sprintf
    
    * Change IsValidPolicy name to return an error instead of bool
    
    * Fix PolicyList test
    
    * Fix other tests
    
    * Apply suggestions from code review
    
    Co-authored-by: Paul Glass <[email protected]>
    
    * Fix state store test for policy list.
    
    * Fix naming issues
    
    * Update acl/validation.go
    
    Co-authored-by: Chris Thain <[email protected]>
    
    * Update agent/consul/acl_endpoint.go
    
    ---------
    
    Co-authored-by: Paul Glass <[email protected]>
    Co-authored-by: Chris Thain <[email protected]>
    3 people authored Aug 1, 2023
    Configuration menu
    Copy the full SHA
    6424ef6 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    e459399 View commit details
    Browse the repository at this point in the history
  4. resource: adding various helpers for working with resources (#18342)

    This is a bit of a grab bag of helpers that I found useful for working with them when authoring substantial Controllers. Subsequent PRs will make use of them.
    rboyer authored Aug 1, 2023
    Configuration menu
    Copy the full SHA
    13ce787 View commit details
    Browse the repository at this point in the history
  5. Wasm integration tests for local and remote wasm files (#17756)

    * wasm integration tests for local and remote wasm files
    
    refactoring and cleanup for wasm testing
    
    remove wasm debug logging
    
    PR feedback, wasm build lock
    
    correct path pattern for wasm build files
    
    Add new helper function to minimize changes to existing test code
    
    Remove extra param
    
    mod tidy
    
    add custom service setup to test lib
    
    add wait until static server sidecar can reach nginx sidecar
    
    Doc comments
    
    PR feedback
    
    Update workflows to compile wasm for integration tests
    
    Fix docker build path
    
    Fix package name for linter
    
    Update makefile, fix redeclared function
    
    Update expected wasm filename
    
    Debug test ls in workflow
    
    remove pwd in favor of relative path
    
    more debugging
    
    Build wasm in compatability tests as well
    
    Build wasm directly in ci rather than in container
    
    Debug tinygo and llvm version
    
    Change wasm file extension
    
    Remove tinygo debugging
    
    Remove extra comments
    
    * Add compiled wasm and build instructions
    johnlanda authored Aug 1, 2023
    Configuration menu
    Copy the full SHA
    2a8bf5d View commit details
    Browse the repository at this point in the history
  6. [HCP Telemetry] Periodic Refresh for Dynamic Telemetry Configuration (#…

    …18168)
    
    * OTElExporter now uses an EndpointProvider to discover the endpoint
    
    * OTELSink uses a ConfigProvider to obtain filters and labels configuration
    
    * improve tests for otel_sink
    
    * Regex logic is moved into client for a method on the TelemetryConfig object
    
    * Create a telemetry_config_provider and update deps to use it
    
    * Fix conversion
    
    * fix import newline
    
    * Add logger to hcp client and move telemetry_config out of the client.go file
    
    * Add a telemetry_config.go to refactor client.go
    
    * Update deps
    
    * update hcp deps test
    
    * Modify telemetry_config_providers
    
    * Check for nil filters
    
    * PR review updates
    
    * Fix comments and move around pieces
    
    * Fix comments
    
    * Remove context from client struct
    
    * Moved ctx out of sink struct and fixed filters, added a test
    
    * Remove named imports, use errors.New if not fformatting
    
    * Remove HCP dependencies in telemetry package
    
    * Add success metric and move lock only to grab the t.cfgHahs
    
    * Update hash
    
    * fix nits
    
    * Create an equals method and add tests
    
    * Improve telemetry_config_provider.go tests
    
    * Add race test
    
    * Add missing godoc
    
    * Remove mock for MetricsClient
    
    * Avoid goroutine test panics
    
    * trying to kick CI lint issues by upgrading mod
    
    * imprve test code and add hasher for testing
    
    * Use structure logging for filters, fix error constants, and default to allow all regex
    
    * removed hashin and modify logic to simplify
    
    * Improve race test and fix PR feedback by removing hash equals and avoid testing the timer.Ticker logic, and instead unit test
    
    * Ran make go-mod-tidy
    
    * Use errtypes in the test
    
    * Add changelog
    
    * add safety check for exporter endpoint
    
    * remove require.Contains by using error types, fix structure logging, and fix success metric typo in exporter
    
    * Fixed race test to have changing config values
    
    * Send success metric before modifying config
    
    * Avoid the defer and move the success metric under
    Achooo authored Aug 1, 2023
    Configuration menu
    Copy the full SHA
    828567c View commit details
    Browse the repository at this point in the history

Commits on Aug 2, 2023

  1. NET-4240 - Snapshots are failing on Windows (#18302)

    * fix go mod
    
    * fix go sum
    
    * added change log
    
    * ran make go mod tidy
    absolutelightning authored Aug 2, 2023
    Configuration menu
    Copy the full SHA
    67fc93e View commit details
    Browse the repository at this point in the history
  2. Register ProxyStateTemplate Resource (#18316)

      Also, change the ProxyState.id to identity. This is because we already have the id of this proxy
      from the resource, and this id should be name-aligned with the workload it represents. It should
      also have the owner ref set to the workload ID if we need that. And so the id field seems unnecessary.
      We do, however, need a reference to workload identity so that we can authorize the proxy when it initially
      connects to the xDS server.
    ishustava authored Aug 2, 2023
    Configuration menu
    Copy the full SHA
    a33001f View commit details
    Browse the repository at this point in the history
  3. [NET-5146] security: Update Go version to 1.20.7 and x/net to 0.13.0 (

    #18358)
    
    * Update Go version to 1.20.7
    
    This resolves [CVE-2023-29409]
    (https://nvd.nist.gov/vuln/detail/CVE-2023-29409)(`crypto/tls`).
    
    * Bump golang.org/x/net to 0.13.0
    
    Addresses [CVE-2023-3978](https://nvd.nist.gov/vuln/detail/CVE-2023-3978)
    for security scans (non-impacting).
    zalimeni authored Aug 2, 2023
    Configuration menu
    Copy the full SHA
    905e371 View commit details
    Browse the repository at this point in the history

Commits on Aug 3, 2023

  1. Configuration menu
    Copy the full SHA
    9c227e2 View commit details
    Browse the repository at this point in the history
  2. [OSS] test: xds coverage for routes (#18369)

    test: xds coverage for routes
    DanStough authored Aug 3, 2023
    Configuration menu
    Copy the full SHA
    284e3bd View commit details
    Browse the repository at this point in the history
  3. Fix policy lookup to allow for slashes (#18347)

    * Fix policy lookup to allow for slashes
    
    * Fix suggestions
    
    * Fix other test
    
    * Revert some lines
    jjacobson93 authored Aug 3, 2023
    Configuration menu
    Copy the full SHA
    8e5e16d View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    89aac4b View commit details
    Browse the repository at this point in the history

Commits on Aug 4, 2023

  1. Configuration menu
    Copy the full SHA
    0a48a24 View commit details
    Browse the repository at this point in the history
  2. expose grpc as http endpoint (#18221)

    expose resource grpc endpoints as http endpoints
    wangxinyi7 authored Aug 4, 2023
    Configuration menu
    Copy the full SHA
    1f28ac2 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    1ebd001 View commit details
    Browse the repository at this point in the history
  4. [docs] Fix ServiceDefaults example in distributed tracing (#17212)

    Fix ServiceDefaults example in distributed tracing.
    ilpianista authored Aug 4, 2023
    Configuration menu
    Copy the full SHA
    38c356c View commit details
    Browse the repository at this point in the history

Commits on Aug 5, 2023

  1. Fix #17730 - Dev mode has new line (#18367)

    * adding new line only in case of pretty in url not in dev mode
    
    * change log added
    absolutelightning authored Aug 5, 2023
    Configuration menu
    Copy the full SHA
    417ae9f View commit details
    Browse the repository at this point in the history

Commits on Aug 7, 2023

  1. Configuration menu
    Copy the full SHA
    48effe5 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    63cc037 View commit details
    Browse the repository at this point in the history

Commits on Aug 8, 2023

  1. Not using chmod - fixed integration test for Enterprise (#18401)

    * Not using chmod
    
    * checking icacls
    
    * Removed push
    absolutelightning authored Aug 8, 2023
    Configuration menu
    Copy the full SHA
    96ce4da View commit details
    Browse the repository at this point in the history
  2. replaced ordered list of rate limit ops with flow diagram (#18398)

    * replaced ordered list of rate limit ops with flow diagram
    
    * made diagram font bigger
    
    * updated colors for dark mode img
    
    * fixed typo
    
    * recentered dark mode image
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    
    ---------
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    trujillo-adam and boruszak authored Aug 8, 2023
    Configuration menu
    Copy the full SHA
    2096f23 View commit details
    Browse the repository at this point in the history
  3. Upgrade test: remove outdated test and disable log due to verbosity (#…

    …18403)
    
    * remove outdated test
    
    * disable log since we have too many parallel tests
    huikang authored Aug 8, 2023
    Configuration menu
    Copy the full SHA
    7902ae2 View commit details
    Browse the repository at this point in the history
  4. bump testcontainers-go from 0.22.0 and remove pinned go version in in… (

    #18395)
    
    * bump testcontainers-go from 0.22.0 and remove pinned go version in integ test
    
    * go mod tidy
    
    * Replace deprecated target.Authority with target.URL.Host
    huikang authored Aug 8, 2023
    Configuration menu
    Copy the full SHA
    43d8898 View commit details
    Browse the repository at this point in the history
  5. Add ServiceEndpoints Mutation hook tests (#18404)

    * Add ServiceEndpoints Mutation hook tests
    
    * Move endpoint owner validation into the validation hook
    
    Also there were some minor changes to error validation to account for go-cmp not liking to peer through an errors.errorstring type that get created by errors.New
    mkeeler authored Aug 8, 2023
    Configuration menu
    Copy the full SHA
    91d331b View commit details
    Browse the repository at this point in the history
  6. catalog: add FailoverPolicy mutation and validation hooks (#18390)

    Add most of the validation and mutation hooks for the FailoverPolicy resource.
    rboyer authored Aug 8, 2023
    Configuration menu
    Copy the full SHA
    bfc519f View commit details
    Browse the repository at this point in the history
  7. NET-5115 Add retry + timeout filters for api-gateway (#18324)

    * squash, implement retry/timeout in consul core
    
    * update tests
    sarahalsmiller authored Aug 8, 2023
    Configuration menu
    Copy the full SHA
    e235c8b View commit details
    Browse the repository at this point in the history

Commits on Aug 9, 2023

  1. catalog: adding a controller to reconcile FailoverPolicy resources (#…

    …18399)
    
    Add most of the semantic cross-resource validation for FailoverPolicy resources using a new controller.
    rboyer authored Aug 9, 2023
    Configuration menu
    Copy the full SHA
    42efc11 View commit details
    Browse the repository at this point in the history
  2. fix the error in ent repo (#18421)

    fix the error in ent repo
    wangxinyi7 authored Aug 9, 2023
    Configuration menu
    Copy the full SHA
    facd5b0 View commit details
    Browse the repository at this point in the history
  3. build: updates for 1.16.1 release (#18415)

    * build: updates for 1.16.1 release
    
    * build: fix missing replace directive for envoyextensions
    
    * build: go mod tidy testing/deployer
    DanStough authored Aug 9, 2023
    Configuration menu
    Copy the full SHA
    948ce8b View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    bb1a288 View commit details
    Browse the repository at this point in the history

Commits on Aug 10, 2023

  1. docs: fix incorrect proxy-defaults config in Lua Envoy extension (#18418

    )
    
    fix incorrect proxy-defaults config
    nvanthao authored Aug 10, 2023
    Configuration menu
    Copy the full SHA
    10f69d8 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    bee12c6 View commit details
    Browse the repository at this point in the history
  3. [NET-5217] [OSS] Derive sidecar proxy locality from parent service (#…

    …18437)
    
    * Add logging to locality policy application
    
    In OSS, this is currently a no-op.
    
    * Inherit locality when registering sidecars
    
    When sidecar locality is not explicitly configured, inherit locality
    from the proxied service.
    zalimeni authored Aug 10, 2023
    Configuration menu
    Copy the full SHA
    05604ee View commit details
    Browse the repository at this point in the history
  4. NET-4984: Update APIGW Config Entries for JWT Auth (#18366)

    * Added oss config entries for Policy and JWT on APIGW
    
    * Updated structs for config entry
    
    * Updated comments, ran deep-copy
    
    * Move JWT configuration into OSS file
    
    * Add in the config entry OSS file for jwts
    
    * Added changelog
    
    * fixing proto spacing
    
    * Moved to using manually written deep copy method
    
    * Use pointers for override/default fields in apigw config entries
    
    * Run gen scripts for changed types
    jm96441n authored Aug 10, 2023
    Configuration menu
    Copy the full SHA
    6c8ca0f View commit details
    Browse the repository at this point in the history
  5. k8s compat - Openshift versions (#18307)

    * Update compatibility.mdx
    
    Co-authored-by: trujillo-adam <[email protected]>
    David Yu and trujillo-adam authored Aug 10, 2023
    Configuration menu
    Copy the full SHA
    6981658 View commit details
    Browse the repository at this point in the history
  6. APIGW: Update HTTPRouteConfigEntry for JWT Auth (#18422)

    * Updated httproute config entry for JWT Filters
    
    * Added manual deepcopy method for httproute jwt filter
    
    * Fix test
    
    * Update JWTFilter to be in oss file
    
    * Add changelog
    
    * Add build tags for deepcopy oss file
    jm96441n authored Aug 10, 2023
    Configuration menu
    Copy the full SHA
    df11e4e View commit details
    Browse the repository at this point in the history

Commits on Aug 11, 2023

  1. [COMPLIANCE] License changes (#18443)

    * Adding explicit MPL license for sub-package
    
    This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository.
    
    * Adding explicit MPL license for sub-package
    
    This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository.
    
    * Updating the license from MPL to Business Source License
    
    Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at <Blog URL>, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl.
    
    * add missing license headers
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    * Update copyright file headers to BUSL-1.1
    
    ---------
    
    Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
    hashicorp-copywrite[bot] authored Aug 11, 2023
    Configuration menu
    Copy the full SHA
    5fb9df1 View commit details
    Browse the repository at this point in the history
  2. Net-2708/delete resource endpoint (#18420)

    * feat: add http delete endpoint for resource service
    
    * refactor: clean up
    JadhavPoonam authored Aug 11, 2023
    Configuration menu
    Copy the full SHA
    5717cbd View commit details
    Browse the repository at this point in the history
  3. Disable deep-copy codegen verification for now. (#18446)

    Once we figure out what to do with license headers for these files we should re-enable this check.
    mkeeler authored Aug 11, 2023
    Configuration menu
    Copy the full SHA
    b4cdfbb View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    66bcaa3 View commit details
    Browse the repository at this point in the history
  5. NET-4952 Add docs for export command (#18425)

    * Init file for services export command docs
    
    * Add link for export command to nav
    
    * Add export to list of subcommands for services
    
    * Add usage and basic command options
    
    * Add API options using includes
    
    * Add section for enterprise options
    
    * Include argument value in flag format
    
    * Add examples
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    
    ---------
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    nathancoleman and boruszak authored Aug 11, 2023
    Configuration menu
    Copy the full SHA
    4a0afb5 View commit details
    Browse the repository at this point in the history
  6. Net-2712/resource hcl parsing (#18250)

    * Initial protohcl implementation
    
    Co-authored-by: Matt Keeler <[email protected]>
    Co-authored-by: Daniel Upton <[email protected]>
    
    * resourcehcl: implement resource decoding on top of protohcl
    
    Co-authored-by: Daniel Upton <[email protected]>
    
    * fix: resolve ci failures
    
    * test: add additional unmarshalling tests
    
    * refactor: update function test to clean protohcl package imports
    
    ---------
    
    Co-authored-by: Matt Keeler <[email protected]>
    Co-authored-by: Daniel Upton <[email protected]>
    3 people authored Aug 11, 2023
    Configuration menu
    Copy the full SHA
    559c61e View commit details
    Browse the repository at this point in the history
  7. read endpoint (#18268)

    implement http read endpoint to expose resource grpc service read method
    wangxinyi7 authored Aug 11, 2023
    Configuration menu
    Copy the full SHA
    cda884a View commit details
    Browse the repository at this point in the history

Commits on Aug 15, 2023

  1. Net-2707/list resource endpoint (#18444)

    feat: list resources endpoint
    JadhavPoonam authored Aug 15, 2023
    Configuration menu
    Copy the full SHA
    f88d4fe View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    d565056 View commit details
    Browse the repository at this point in the history
  3. NET-5187: Upgrade test timeout due to log producer errors (#18461)

    Stop log producer before restarting container
    NiniOak authored Aug 15, 2023
    Configuration menu
    Copy the full SHA
    0e94f48 View commit details
    Browse the repository at this point in the history
  4. [NET-4799] [OSS] xdsv2: listeners L4 support for connect proxies (#18436

    )
    
    * refactor to avoid future import cycles
    ndhanushkodi authored Aug 15, 2023
    Configuration menu
    Copy the full SHA
    6b7ccd0 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    217107f View commit details
    Browse the repository at this point in the history

Commits on Aug 16, 2023

  1. [COMPLIANCE] License update (#18479)

    Update BUSL LICENSE to include licensed product and version.
    
    Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
    hashicorp-copywrite[bot] authored Aug 16, 2023
    Configuration menu
    Copy the full SHA
    adf8ddb View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    b8acd78 View commit details
    Browse the repository at this point in the history
  3. docs: Update OpenShift compatibility (#18478)

    Update compatibility.mdx
    David Yu authored Aug 16, 2023
    Configuration menu
    Copy the full SHA
    5ca8cd6 View commit details
    Browse the repository at this point in the history
  4. resource: Make resource delete tenancy aware (#18476)

    resource: Make resource delete tenancy awarae
    analogue authored Aug 16, 2023
    Configuration menu
    Copy the full SHA
    e6c1c47 View commit details
    Browse the repository at this point in the history
  5. Add license-checker action that fails when any backported file contai…

    …ns BUSL header (#18485)
    
    * Add license-checker action that fails when any backported file contains BUSL header
    
    * Quote echoed variable to retain line breaks
    
    * Add ticket to reference for more details
    nathancoleman authored Aug 16, 2023
    Configuration menu
    Copy the full SHA
    9e9800e View commit details
    Browse the repository at this point in the history
  6. docs: Update K8s TGW tutorial to reliably obtain role ID (#18474)

    The `grep` command used to obtain the ID for the terminating gateway
    role is not reliable in all scenarios. For example, if there is a
    similarly named role, the command may return the wrong role ID for the
    active terminating gateway instance.
    
    This commit updates the command to use jq to obtain the role ID. If
    multiple roles are found, jq will raise an error informing the user
    that it cannot reliably determine the role ID.
    blake authored Aug 16, 2023
    Configuration menu
    Copy the full SHA
    aa21b12 View commit details
    Browse the repository at this point in the history
  7. NET-5371 License checker pt2 (#18491)

    * Update grep command to work on ubuntu
    
    * Run license checker when new commits are pushed to PR
    nathancoleman authored Aug 16, 2023
    Configuration menu
    Copy the full SHA
    d488fc7 View commit details
    Browse the repository at this point in the history
  8. README - Update KV use case to Dynamic App Configuration (#18301)

    * Update README.md
    * Update kv.mdx
    * Add BUSL badge
    David Yu authored Aug 16, 2023
    Configuration menu
    Copy the full SHA
    ea7b419 View commit details
    Browse the repository at this point in the history

Commits on Aug 17, 2023

  1. README - re-order badges and update hub link (#18498)

    Update README.md
    David Yu authored Aug 17, 2023
    Configuration menu
    Copy the full SHA
    cbedbc0 View commit details
    Browse the repository at this point in the history
  2. [NET-5163] Support locality testing in consul-container (#18484)

    * Support locality testing in consul-container
    
    Support including locality in client sidecar config.
    
    Also align test config structs with Ent to avoid future conflicts.
    
    * Refactor consul-container fortio helpers
    
    Refactor fortio test helpers to separate HTTP retries from waiting on
    fortio result changes due to e.g. service startup and failovers.
    zalimeni authored Aug 17, 2023
    Configuration menu
    Copy the full SHA
    61b7c0d View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    b80c525 View commit details
    Browse the repository at this point in the history
  4. Fix HCL (#18513)

    * Fix HCL
    
    * Update create-sameness-groups.mdx
    lkysow authored Aug 17, 2023
    Configuration menu
    Copy the full SHA
    c533a51 View commit details
    Browse the repository at this point in the history
  5. NET-4932 - xds v2 - implement base connect proxy functionality for en…

    …dpoints (#18500)
    
    * NET-4853 - xds v2 - implement base connect proxy functionality for clusters
    
    * NET-4853 - xds v2 - implement base connect proxy functionality for clusters
    
    * NET-4932 - xds v2 - implement base connect proxy functionality for endpoints
    
    * Update endpoints_test.go
    
    * gofmt
    
    * Update naming.go
    jmurret authored Aug 17, 2023
    Configuration menu
    Copy the full SHA
    92cfb4a View commit details
    Browse the repository at this point in the history
  6. Support custom watches on controller (#18439)

    * Support custom watches on controller
    * refactor mapper methods
    thisisnotashwin authored Aug 17, 2023
    Configuration menu
    Copy the full SHA
    97b41d9 View commit details
    Browse the repository at this point in the history
  7. NET-4858 - xds v2 - implement base connect proxy functionality for ro…

    …utes (#18501)
    
    * NET-4853 - xds v2 - implement base connect proxy functionality for clusters
    
    * NET-4853 - xds v2 - implement base connect proxy functionality for clusters
    
    * NET-4932 - xds v2 - implement base connect proxy functionality for endpoints
    
    * Update endpoints_test.go
    
    * gofmt
    
    * NET-4858 - Make connect proxy route tests pass using xds v2
    
    * Update endpoints_test.go
    
    * Update naming.go
    
    * use alsoRunTestForV2
    
    * remove unused makeAddress
    
    * gofmt
    
    * fixing clusters
    jmurret authored Aug 17, 2023
    Configuration menu
    Copy the full SHA
    9ea182f View commit details
    Browse the repository at this point in the history

Commits on Aug 18, 2023

  1. Configuration menu
    Copy the full SHA
    cc596ce View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0b580ff View commit details
    Browse the repository at this point in the history
  3. CI Split integration tests to run nightly and every PR (#18518)

    * CI Split integration tests to run nightly and every PR
    
    * Checkout release branch for nightly test
    huikang authored Aug 18, 2023
    Configuration menu
    Copy the full SHA
    d3837e3 View commit details
    Browse the repository at this point in the history
  4. Fix broken links caught in weekly report (#18522)

    * fix broken link caught in weekly report
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    
    ---------
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    im2nguyen and boruszak authored Aug 18, 2023
    Configuration menu
    Copy the full SHA
    5af4bbb View commit details
    Browse the repository at this point in the history

Commits on Aug 21, 2023

  1. Create nightly test-integration for consul release branch (#18530)

    * Create nightly test-integration for consul release branch
    
    * test
    
    * fix
    huikang authored Aug 21, 2023
    Configuration menu
    Copy the full SHA
    587663d View commit details
    Browse the repository at this point in the history
  2. docs: Fix spelling errors across various pages on the site (#18533)

    This commit fixes numerous spelling errors across the site and also
    removes unnecessary whitespace that was present in the edited files.
    blake authored Aug 21, 2023
    Configuration menu
    Copy the full SHA
    eab88bf View commit details
    Browse the repository at this point in the history
  3. Make proto-public license MPL (#18531)

    * Make proto-public license MPL
    
    * Add proto-public dir to exclusion list in .copywrite.hcl
    analogue authored Aug 21, 2023
    Configuration menu
    Copy the full SHA
    e5842cd View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    217d305 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    6d22179 View commit details
    Browse the repository at this point in the history

Commits on Aug 22, 2023

  1. Configuration menu
    Copy the full SHA
    547f4f8 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    53e28a4 View commit details
    Browse the repository at this point in the history
  3. CI: fix envoy versions in CI of release branch (#18538)

    * CI: fix envoy versions in CI of release branch
    
    * - remove steps sds for 1.15 nightly run
    - checkout the release branch
    
    * add default name
    
    * fix
    
    * Update go-tests.yml
    
    * fix checkout code
    
    * add comments and revert schedule
    huikang authored Aug 22, 2023
    Configuration menu
    Copy the full SHA
    c4b3234 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    570c84d View commit details
    Browse the repository at this point in the history
  5. mesh: add validation for the new pbmesh resources (#18410)

    Adds validation for HTTPRoute, GRPCRoute, TCPRoute, DestinationPolicy, and ComputedRoutes.
    rboyer authored Aug 22, 2023
    Configuration menu
    Copy the full SHA
    55723c5 View commit details
    Browse the repository at this point in the history
  6. xds controller: resolve ServiceEndpoints references in ProxyStateTemp… (

    #18544)
    
    xds controller: resolve ServiceEndpoints references in ProxyStateTemplate
    thisisnotashwin authored Aug 22, 2023
    Configuration menu
    Copy the full SHA
    0d60380 View commit details
    Browse the repository at this point in the history
  7. mesh: adding type aliases for mesh resource usage (#18448)

    Introduces some simple type aliases for DecodedResource[*X] wrappers for each type which cut down on the verbosity
    rboyer authored Aug 22, 2023
    Configuration menu
    Copy the full SHA
    17667a1 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    4f9955d View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    5b88aae View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    8a93124 View commit details
    Browse the repository at this point in the history
  11. fix for , non presence of consul-version meta (#18464)

    * fix for #18406 , non presence of consul-version meta
    
    * removed redundant checks
    
    * updated mock-api to mimic api response for synthetic nodes
    
    * added test to test getDistinctConsulVersions method with synthetic-node case
    
    * updated typo in comments
    
    * added change log
    vijayraghav-io authored Aug 22, 2023
    Configuration menu
    Copy the full SHA
    a1755d1 View commit details
    Browse the repository at this point in the history

Commits on Aug 23, 2023

  1. Configuration menu
    Copy the full SHA
    a1cd3f8 View commit details
    Browse the repository at this point in the history
  2. bug: prevent go routine leakage due to existing DeferCheck (#18558)

    * bug: prevent go routine leakage due to existing DeferCheck
    
    * add changelog
    huikang authored Aug 23, 2023
    Configuration menu
    Copy the full SHA
    b37587b View commit details
    Browse the repository at this point in the history
  3. NET-5382 & PLAT-1159: Do not trigger workflow if only doc files are i…

    …n commit history (#18528)
    
    NET-5382: Do not run workflow runs if at least one path matches
    NiniOak authored Aug 23, 2023
    Configuration menu
    Copy the full SHA
    63fa78a View commit details
    Browse the repository at this point in the history
  4. UI: community verbiage (#18560)

    * chore: update community verbiage
    
    * chore: add changelog entry
    natmegs authored Aug 23, 2023
    Configuration menu
    Copy the full SHA
    34eb700 View commit details
    Browse the repository at this point in the history

Commits on Aug 24, 2023

  1. Fix Windows FIPS Build (#18357)

    * Fix Windows FIPS Build
    
    * create new file for windows arm
    
    * removed build tag
    
    * fix buidl tags
    
    * fix multiple go build
    absolutelightning authored Aug 24, 2023
    Configuration menu
    Copy the full SHA
    2cc2c6b View commit details
    Browse the repository at this point in the history
  2. CE port of enterprise extension (#18572)

    CE commit
    Chris S. Kim authored Aug 24, 2023
    Configuration menu
    Copy the full SHA
    82993fc View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    067a011 View commit details
    Browse the repository at this point in the history
  4. NET-5147: Added placeholder structs for JWT functionality (#18575)

    * Added placeholder structs for JWT functionality
    
    * Added watches for CE vs ENT
    
    * Add license header
    
    * Undo plumbing work
    
    * Add context arg
    jm96441n authored Aug 24, 2023
    Configuration menu
    Copy the full SHA
    59ab57f View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    2225bf0 View commit details
    Browse the repository at this point in the history
  6. NET-5338 - NET-5338 - Run a v2 mode xds server (#18579)

    * NET-5338 - NET-5338 - Run a v2 mode xds server
    
    * fix linting
    jmurret authored Aug 24, 2023
    Configuration menu
    Copy the full SHA
    051f250 View commit details
    Browse the repository at this point in the history

Commits on Aug 25, 2023

  1. Configuration menu
    Copy the full SHA
    c8ef063 View commit details
    Browse the repository at this point in the history
  2. CE commit (#18583)

    Chris S. Kim authored Aug 25, 2023
    Configuration menu
    Copy the full SHA
    ecdcde4 View commit details
    Browse the repository at this point in the history

Commits on Aug 28, 2023

  1. Fix broken link on sameness group page (#18511)

    fix broken link
    im2nguyen authored Aug 28, 2023
    Configuration menu
    Copy the full SHA
    2f58e05 View commit details
    Browse the repository at this point in the history
  2. Fix typo in permissive mTLS docs (#18551)

    Update onboarding-tproxy-mode.mdx
    im2nguyen authored Aug 28, 2023
    Configuration menu
    Copy the full SHA
    0e17e98 View commit details
    Browse the repository at this point in the history
  3. Set concurrency for workflows (#18567)

    * Set concurrency for workflows
    curtbushko authored Aug 28, 2023
    Configuration menu
    Copy the full SHA
    7bc30e9 View commit details
    Browse the repository at this point in the history
  4. test: run automated tests against Vault 1.11 - 1.14 (#18590)

    Begin to test against Vault 1.14. Drop tests against Vault 1.10.
    jkirschner-hashicorp authored Aug 28, 2023
    Configuration menu
    Copy the full SHA
    180c1e2 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    48c8a83 View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2023

  1. NET-4944 - wire up controllers with proxy tracker (#18603)

    Co-authored-by: github-team-consul-core <[email protected]>
    jmurret and hc-github-team-consul-core authored Aug 29, 2023
    Configuration menu
    Copy the full SHA
    0e60650 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    797e42d View commit details
    Browse the repository at this point in the history
  3. Distinguish v2 catalog Protocol unset from default (#18612)

    Even though we intend to default to TCP when this field is not
    explicitly provided, uncluding an `UNSPECIFIED` default enum value allows us
    to create inheritance chains, e.g. service to workload.
    zalimeni authored Aug 29, 2023
    Configuration menu
    Copy the full SHA
    f8812ed View commit details
    Browse the repository at this point in the history

Commits on Aug 30, 2023

  1. Configuration menu
    Copy the full SHA
    58e5658 View commit details
    Browse the repository at this point in the history
  2. [HCP Telemetry] Move first TelemetryConfig Fetch into the TelemetryCo…

    …nfigProvider (#18318)
    
    * Add Enabler interface to turn sink on/off
    
    * Use h for hcpProviderImpl vars, fix PR feeback and fix errors
    
    * Keep nil check in exporter and fix tests
    
    * Clarify comment and fix function name
    
    * Use disable instead of enable
    
    * Fix errors nit in otlp_transform
    
    * Add test for refreshInterval of updateConfig
    
    * Add disabled field in MetricsConfig struct
    
    * Fix PR feedback: improve comment and remove double colons
    
    * Fix deps test which requires a maybe
    
    * Update hcp-sdk-go to v0.61.0
    
    * use disabled flag in telemetry_config.go
    
    * Handle 4XX errors in telemetry_provider
    
    * Fix deps test
    
    * Check 4XX instead
    
    * Run make go-mod-tidy
    Achooo authored Aug 30, 2023
    Configuration menu
    Copy the full SHA
    0f48b7a View commit details
    Browse the repository at this point in the history
  3. update comments and docs about running envoy integration tests with t…

    …he ENVOY_VERSION set. (#18614)
    
    update ENVOY_VERSION and documentation of it used in the bats envoy tests.
    
    Co-authored-by: github-team-consul-core <[email protected]>
    jmurret and hc-github-team-consul-core authored Aug 30, 2023
    Configuration menu
    Copy the full SHA
    255aa15 View commit details
    Browse the repository at this point in the history

Commits on Aug 31, 2023

  1. delete all v2 resources type when deleting a namespace (CE) (#18621)

    * add namespace scope to ServiceV1Alpha1Type
    
    * add CE portion of namespace deletion
    dhiaayachi authored Aug 31, 2023
    Configuration menu
    Copy the full SHA
    f8d77f0 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    7b9e243 View commit details
    Browse the repository at this point in the history
  3. PLAT-1192 - Run CI on smaller instances (#18624)

    Use smaller runners
    curtbushko authored Aug 31, 2023
    Configuration menu
    Copy the full SHA
    f2ce472 View commit details
    Browse the repository at this point in the history
  4. NET-3181 - Allow log file naming like Nomad (#18617)

    * fixes file name for consul
    
    * added log file
    
    * added tests for rename method
    absolutelightning authored Aug 31, 2023
    Configuration menu
    Copy the full SHA
    d45c3c2 View commit details
    Browse the repository at this point in the history
  5. Add the plumbing for APIGW JWT work (#18609)

    * Add the plumbing for APIGW JWT work
    
    * Remove unneeded import
    
    * Add deep equal function for HTTPMatch
    
    * Added plumbing for status conditions
    
    * Remove unneeded comment
    
    * Fix comments
    
    * Add calls in xds listener for apigateway to setup listener jwt auth
    jm96441n authored Aug 31, 2023
    Configuration menu
    Copy the full SHA
    9876923 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    892ba52 View commit details
    Browse the repository at this point in the history
  7. fix: make UNSPECIFIED protocol pass validation (#18634)

    We explicitly enumerate the allowed protocols in validation, so this
    change is necessary to use the new enum value.
    
    Also add tests for enum validators to ensure they stay aligned to
    protos unless we explicitly want them to diverge.
    zalimeni authored Aug 31, 2023
    Configuration menu
    Copy the full SHA
    699aa47 View commit details
    Browse the repository at this point in the history

Commits on Sep 1, 2023

  1. NET 1594 - Snapshot Agent Filename Should Include Consul Version / Da…

    …tacenter (#18625)
    
    * init
    
    * tests added and few fixes
    
    * revert arg message
    
    * changelog added
    
    * removed var declaration
    
    * fix CI
    
    * fix test
    
    * added node name and status
    
    * updated save.mdx
    
    * added example
    
    * fix tense
    
    * fix description
    absolutelightning authored Sep 1, 2023
    Configuration menu
    Copy the full SHA
    78e3cbe View commit details
    Browse the repository at this point in the history
  2. Net 3181 consul gh issue 15709 allow log file naming like nomad - fix…

    … bug (#18631)
    
    * fixes file name for consul
    
    * added log file
    
    * added tests for rename method
    
    * append instead of trunc
    
    * fix file truncate issue
    
    * added changelog
    
    * fix for build destros ci
    
    * removed changelog
    
    * solaris
    absolutelightning authored Sep 1, 2023
    Configuration menu
    Copy the full SHA
    13eefbb View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    b96cff7 View commit details
    Browse the repository at this point in the history
  4. [NET-4958] Fix issue where envoy endpoints would fail to populate aft…

    …er snapshot restore (#18636)
    
    Fix issue where agentless endpoints would fail to populate after snapshot restore.
    
    Fixes an issue that was introduced in #17775. This issue happens because
    a long-lived pointer to the state store is held, which is unsafe to do.
    Snapshot restorations will swap out this state store, meaning that the
    proxycfg watches would break for agentless.
    hashi-derek authored Sep 1, 2023
    Configuration menu
    Copy the full SHA
    b56fbc7 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    a698142 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    82c2281 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    cd3bfc5 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    9915b47 View commit details
    Browse the repository at this point in the history
  9. fix: remove Intention test with latency to make consul-enterprise rep… (

    #18654)
    
    fix: remove Intention test with latency to make consul-enterprise repo tests work
    valeriia-ruban authored Sep 1, 2023
    Configuration menu
    Copy the full SHA
    99845eb View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    22df51f View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    a2f3d13 View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    ac867d6 View commit details
    Browse the repository at this point in the history

Commits on Sep 5, 2023

  1. Net 2714/xw cli read command (#18462)

    enable `consul resource read` command in cli
    wangxinyi7 authored Sep 5, 2023
    Configuration menu
    Copy the full SHA
    df9d12a View commit details
    Browse the repository at this point in the history
  2. change log for audit log (#18668)

    * change log for audit log
    
    * fix file name
    
    * breaking change
    absolutelightning authored Sep 5, 2023
    Configuration menu
    Copy the full SHA
    0c18404 View commit details
    Browse the repository at this point in the history
  3. Add TCP+TLS Healthchecks (#18381)

    * Begin adding TCPUseTLS
    
    * More TCP with TLS plumbing
    
    * Making forward progress
    
    * Keep on adding TCP+TLS support for healthchecks
    
    * Removed too many lines
    
    * Unit tests for TCP+TLS
    
    * Update tlsutil/config.go
    
    Co-authored-by: Samantha <[email protected]>
    
    * Working on the tcp+tls unit test
    
    * Updated the runtime integration tests
    
    * Progress
    
    * Revert this file back to HEAD
    
    * Remove debugging lines
    
    * Implement TLS enabled TCP socket server and make a successful TCP+TLS healthcheck on it
    
    * Update docs
    
    * Update agent/agent_test.go
    
    Co-authored-by: Samantha <[email protected]>
    
    * Update website/content/docs/ecs/configuration-reference.mdx
    
    Co-authored-by: Samantha <[email protected]>
    
    * Update website/content/docs/ecs/configuration-reference.mdx
    
    Co-authored-by: Samantha <[email protected]>
    
    * Update agent/checks/check.go
    
    Co-authored-by: Samantha <[email protected]>
    
    * Address comments
    
    * Remove extraneous bracket
    
    * Update agent/agent_test.go
    
    Co-authored-by: Samantha <[email protected]>
    
    * Update agent/agent_test.go
    
    Co-authored-by: Samantha <[email protected]>
    
    * Update website/content/docs/ecs/configuration-reference.mdx
    
    Co-authored-by: Samantha <[email protected]>
    
    * Update the mockTLSServer
    
    * Remove trailing newline
    
    * Address comments
    
    * Fix merge problem
    
    * Add changelog entry
    
    ---------
    
    Co-authored-by: Samantha <[email protected]>
    pgporada and beautifulentropy authored Sep 5, 2023
    Configuration menu
    Copy the full SHA
    7ea9867 View commit details
    Browse the repository at this point in the history

Commits on Sep 6, 2023

  1. Fix windows Ent runner (#18683)

    * fix windows image for enterprise
    
    * added quotesT
    absolutelightning authored Sep 6, 2023
    Configuration menu
    Copy the full SHA
    ac27585 View commit details
    Browse the repository at this point in the history
  2. Removed nodename and status from consul snapshot save -append-filenam…

    …e command and using leader version in version (#18680)
    
    * init
    
    * fix tests
    
    * fix tests lint
    
    * fix api call inside dc
    
    * updated doc
    
    * address comments
    absolutelightning authored Sep 6, 2023
    Configuration menu
    Copy the full SHA
    60b0485 View commit details
    Browse the repository at this point in the history
  3. update guide to reflect tenancy and scope (#18687)

    * update guide to reflect tenancy and scope
    
    * Apply suggestions from code review
    
    Co-authored-by: Semir Patel <[email protected]>
    
    * update ACLHooks signature
    
    * Update docs/resources/guide.md
    
    Co-authored-by: Semir Patel <[email protected]>
    
    ---------
    
    Co-authored-by: Semir Patel <[email protected]>
    dhiaayachi and analogue authored Sep 6, 2023
    Configuration menu
    Copy the full SHA
    ec507fe View commit details
    Browse the repository at this point in the history
  4. Add support for querying tokens by service name. (#18667)

    Add support for querying tokens by service name
    
    The consul-k8s endpoints controller has a workflow where it fetches all tokens.
    This is not performant for large clusters, where there may be a sizable number
    of tokens. This commit attempts to alleviate that problem and introduces a new
    way to query by the token's service name.
    hashi-derek authored Sep 6, 2023
    Configuration menu
    Copy the full SHA
    56917eb View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    80d72e7 View commit details
    Browse the repository at this point in the history
  6. dataplane: Allow getting bootstrap parameters when using V2 APIs (#18504

    )
    
    This PR enables the GetEnvoyBootstrapParams endpoint to construct envoy bootstrap parameters from v2 catalog and mesh resources.
    
       * Make bootstrap request and response parameters less specific to services so that we can re-use them for workloads or service instances.
       * Remove ServiceKind from bootstrap params response. This value was unused previously and is not needed for V2.
       * Make access logs generation generic so that we can generate them using v1 or v2 resources.
    ishustava authored Sep 6, 2023
    Configuration menu
    Copy the full SHA
    4eb2197 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    373c7dc View commit details
    Browse the repository at this point in the history
  8. Reformat proxy docs refresh (#18623)

    * first commit; reformat PD conf entry
    
    * updated proxies overview page
    
    * added Deploy SM proxy usage and removed reg index
    
    * moved sidecar proxy usage to main proxy folder
    
    * recast sidecar reg page as Deploy sidecar services
    
    * fix typos
    
    * recast SM reg as conf reference- set the sidebar
    
    * add redirects
    
    * fix links
    
    * add PD conf entry usage to appropro pages
    
    * edits to proxy conf ref
    
    * fix links on index page
    
    * example command to write PD conf entry
    
    * updated links to old SM proxy reg page
    
    * updated links to sidecar service reg page
    
    * tryna fix front matter issues
    
    * Apply suggestions from code review
    
    Co-authored-by: Ronald  <[email protected]>
    
    * added paragraph about SM proxies to overivew
    
    * Apply suggestions from code review
    
    Co-authored-by: Jeff Boruszak <[email protected]>
    
    ---------
    
    Co-authored-by: Ronald <[email protected]>
    Co-authored-by: Jeff Boruszak <[email protected]>
    3 people authored Sep 6, 2023
    Configuration menu
    Copy the full SHA
    a17f4a0 View commit details
    Browse the repository at this point in the history

Commits on Sep 7, 2023

  1. sidecar-proxy controller: L4 controller with explicit upstreams (NET-…

    …3988) (#18352)
    
    * This controller generates and saves ProxyStateTemplate for sidecar proxies.
    * It currently supports single-port L4 ports only.
    * It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
    * It will update the status of the pbmesh.Upstreams resource if anything is invalid.
    * This commit also changes service endpoints to include workload identity. This made the implementation a bit easier as we don't need to look up as many workloads and instead rely on endpoints data.
    ishustava authored Sep 7, 2023
    Configuration menu
    Copy the full SHA
    3c70e14 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    acd9b3d View commit details
    Browse the repository at this point in the history
  3. [APIGW] NET-5017 JWT Cleanup/Status Conditions (#18700)

    * Fixes issues in setting status
    
    * Update golden files for changes to xds generation to not use deprecated
    methods
    
    * Fixed default for validation of JWT for route
    jm96441n authored Sep 7, 2023
    Configuration menu
    Copy the full SHA
    2c244b6 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    2e7d951 View commit details
    Browse the repository at this point in the history
  5. fix: NET-1521 show latest config in /v1/agent/self (#18681)

    * fix: NET-1521 show latest config in /v1/agent/self
    nvanthao authored Sep 7, 2023
    Configuration menu
    Copy the full SHA
    56d6e54 View commit details
    Browse the repository at this point in the history

Commits on Sep 8, 2023

  1. Using larger machine for Enterprise (#18713)

    using 4x large for ent
    absolutelightning authored Sep 8, 2023
    Configuration menu
    Copy the full SHA
    993fe9a View commit details
    Browse the repository at this point in the history
  2. [NET-5325] ACL templated policies support in tokens and roles (#18708)

    * [NET-5325] ACL templated policies support in tokens and roles
    - Add API support for creating tokens/roles with templated-policies
    - Add CLI support for creating tokens/roles with templated-policies
    
    * adding changelog
    roncodingenthusiast authored Sep 8, 2023
    Configuration menu
    Copy the full SHA
    bbef879 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    9adb617 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    bbc2763 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    3569d70 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    876c662 View commit details
    Browse the repository at this point in the history
  7. Net-2713/resource apply command (#18610)

    * feat: implement apply command
    
    * fix: resolve lint issues
    
    * refactor: use fixed types
    
    * fix: ci lint failures after main rebase
    JadhavPoonam authored Sep 8, 2023
    Configuration menu
    Copy the full SHA
    235988b View commit details
    Browse the repository at this point in the history
  8. NET-5530 Support response header modifiers on http-route config entry (

    …#18646)
    
    * Add response header filters to http-route config entry definitions
    
    * Map response header filters from config entry when constructing route destination
    
    * Support response header modifiers at the service level as well
    
    * Update protobuf definitions
    
    * Update existing unit tests
    
    * Add response filters to route consolidation logic
    
    * Make existing unit tests more robust
    
    * Add missing docstring
    
    * Add changelog entry
    
    * Add response filter modifiers to existing integration test
    
    * Add more robust testing for response header modifiers in the discovery chain
    
    * Add more robust testing for request header modifiers in the discovery chain
    
    * Modify test to verify that service filter modifiers take precedence over rule filter modifiers
    nathancoleman authored Sep 8, 2023
    Configuration menu
    Copy the full SHA
    e5d26a1 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    576ffdf View commit details
    Browse the repository at this point in the history
  10. [NET-5330] Support templated policies in Binding rules (#18719)

    * [NET-5330] Support templated policies in Binding rules
    
    * changelog for templated policy support in binding rules
    roncodingenthusiast authored Sep 8, 2023
    Configuration menu
    Copy the full SHA
    40d7ebc View commit details
    Browse the repository at this point in the history
  11. NET-5530 Generate deep-copy code (#18730)

    * Generate deep-copy code
    
    * Undo license header removal
    nathancoleman authored Sep 8, 2023
    Configuration menu
    Copy the full SHA
    ed79c60 View commit details
    Browse the repository at this point in the history
  12. sidecar-proxy controller: Add support for transparent proxy (NET-5069) (

    #18458)
    
    This commit adds support for transparent proxy to the sidecar proxy controller. As we do not yet support inferring destinations from intentions, this assumes that all services in the cluster are destinations.
    ishustava authored Sep 8, 2023
    Configuration menu
    Copy the full SHA
    1557e1d View commit details
    Browse the repository at this point in the history
  13. Prefix sidecar proxy test files with source and destination. (#18620)

    * mesh-controller: handle L4 protocols for a proxy without upstreams
    
    * sidecar-controller: Support explicit destinations for L4 protocols and single ports.
    
    * This controller generates and saves ProxyStateTemplate for sidecar proxies.
    * It currently supports single-port L4 ports only.
    * It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
    * It will update the status of the pbmesh.Upstreams resource if anything is invalid.
    
    * endpoints-controller: add workload identity to the service endpoints resource
    
    * small fixes
    
    * review comments
    
    * Address PR comments
    
    * sidecar-proxy controller: Add support for transparent proxy
    
    This currently does not support inferring destinations from intentions.
    
    * PR review comments
    
    * mesh-controller: handle L4 protocols for a proxy without upstreams
    
    * sidecar-controller: Support explicit destinations for L4 protocols and single ports.
    
    * This controller generates and saves ProxyStateTemplate for sidecar proxies.
    * It currently supports single-port L4 ports only.
    * It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
    * It will update the status of the pbmesh.Upstreams resource if anything is invalid.
    
    * endpoints-controller: add workload identity to the service endpoints resource
    
    * small fixes
    
    * review comments
    
    * Make sure endpoint refs route to mesh port instead of an app port
    
    * Address PR comments
    
    * fixing copyright
    
    * tidy imports
    
    * sidecar-proxy controller: Add support for transparent proxy
    
    This currently does not support inferring destinations from intentions.
    
    * tidy imports
    
    * add copyright headers
    
    * Prefix sidecar proxy test files with source and destination.
    
    * Update controller_test.go
    
    ---------
    
    Co-authored-by: Iryna Shustava <[email protected]>
    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: github-team-consul-core <[email protected]>
    4 people authored Sep 8, 2023
    Configuration menu
    Copy the full SHA
    3e78b4c View commit details
    Browse the repository at this point in the history

Commits on Sep 10, 2023

  1. k8s: Update audit-logging docs to include K8s examples (#18721)

    Update audit-logging.mdx
    David Yu authored Sep 10, 2023
    Configuration menu
    Copy the full SHA
    24d031d View commit details
    Browse the repository at this point in the history

Commits on Sep 11, 2023

  1. Fix windows integrations tests machine size (#18736)

    fix windows integrations tests machine size
    absolutelightning authored Sep 11, 2023
    Configuration menu
    Copy the full SHA
    bf291f5 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    7429aba View commit details
    Browse the repository at this point in the history
  3. Net-4292/list command (#18649)

    * feat: implement list command
    
    * refactor: apply command file parsing
    JadhavPoonam authored Sep 11, 2023
    Configuration menu
    Copy the full SHA
    48ef8b6 View commit details
    Browse the repository at this point in the history
  4. Added logs for debugging (#18740)

    * added logs
    
    * added echo
    
    * removed pull request
    absolutelightning authored Sep 11, 2023
    Configuration menu
    Copy the full SHA
    172e915 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    a69e901 View commit details
    Browse the repository at this point in the history
  6. Run copyright after running deep-copy as part of the Makefile/CI (#18741

    )
    
    * execute copyright headers after performing deep-copy generation.
    
    * fix copyright install
    
    * Apply suggestions from code review
    
    Co-authored-by: Semir Patel <[email protected]>
    
    * Apply suggestions from code review
    
    Co-authored-by: Semir Patel <[email protected]>
    
    * rename steps to match codegen naming
    
    * remove copywrite install category
    
    ---------
    
    Co-authored-by: Semir Patel <[email protected]>
    dhiaayachi and analogue authored Sep 11, 2023
    Configuration menu
    Copy the full SHA
    b1688ad View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    9776c10 View commit details
    Browse the repository at this point in the history

Commits on Sep 12, 2023

  1. NET-5132 - Configure multiport routing for connect proxies in TProxy …

    …mode (#18606)
    
    * mesh-controller: handle L4 protocols for a proxy without upstreams
    
    * sidecar-controller: Support explicit destinations for L4 protocols and single ports.
    
    * This controller generates and saves ProxyStateTemplate for sidecar proxies.
    * It currently supports single-port L4 ports only.
    * It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
    * It will update the status of the pbmesh.Upstreams resource if anything is invalid.
    
    * endpoints-controller: add workload identity to the service endpoints resource
    
    * small fixes
    
    * review comments
    
    * Address PR comments
    
    * sidecar-proxy controller: Add support for transparent proxy
    
    This currently does not support inferring destinations from intentions.
    
    * PR review comments
    
    * mesh-controller: handle L4 protocols for a proxy without upstreams
    
    * sidecar-controller: Support explicit destinations for L4 protocols and single ports.
    
    * This controller generates and saves ProxyStateTemplate for sidecar proxies.
    * It currently supports single-port L4 ports only.
    * It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
    * It will update the status of the pbmesh.Upstreams resource if anything is invalid.
    
    * endpoints-controller: add workload identity to the service endpoints resource
    
    * small fixes
    
    * review comments
    
    * Make sure endpoint refs route to mesh port instead of an app port
    
    * Address PR comments
    
    * fixing copyright
    
    * tidy imports
    
    * sidecar-proxy controller: Add support for transparent proxy
    
    This currently does not support inferring destinations from intentions.
    
    * tidy imports
    
    * add copyright headers
    
    * Prefix sidecar proxy test files with source and destination.
    
    * Update controller_test.go
    
    * NET-5132 - Configure multiport routing for connect proxies in TProxy mode
    
    * formatting golden files
    
    * reverting golden files and adding changes in manually.  build implicit destinations still has some issues.
    
    * fixing files that were incorrectly repeating the outbound listener
    
    * PR comments
    
    * extract AlpnProtocol naming convention to getAlpnProtocolFromPortName(portName)
    
    * removing address level filtering.
    
    * adding license to resources_test.go
    
    ---------
    
    Co-authored-by: Iryna Shustava <[email protected]>
    Co-authored-by: R.B. Boyer <[email protected]>
    Co-authored-by: github-team-consul-core <[email protected]>
    4 people authored Sep 12, 2023
    Configuration menu
    Copy the full SHA
    62062fd View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    697836b View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    264166f View commit details
    Browse the repository at this point in the history
  4. [NET-5574] Update Go version to 1.20.8 (#18742)

    Update Go version to 1.20.8
    
    This resolves several CVEs (see changelog entry).
    zalimeni authored Sep 12, 2023
    Configuration menu
    Copy the full SHA
    5e7afdf View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    4724a4e View commit details
    Browse the repository at this point in the history
  6. mesh: create new routes-controller to reconcile xRoute types into a C…

    …omputedRoutes resource (#18460)
    
    This new controller produces an intermediate output (ComputedRoutes) that is meant to summarize all relevant xRoutes and related mesh configuration in an easier-to-use format for downstream use to construct the ProxyStateTemplate.
    
    It also applies status updates to the xRoute resource types to indicate that they are themselves semantically valid inputs.
    rboyer authored Sep 12, 2023
    Configuration menu
    Copy the full SHA
    89e6725 View commit details
    Browse the repository at this point in the history
  7. xds controller: setup watches for and compute leaf cert references in…

    … ProxyStateTemplate, and wire up leaf cert manager dependency (#18756)
    
    * Refactors the leafcert package to not have a dependency on agent/consul and agent/cache to avoid import cycles. This way the xds controller can just import the leafcert package to use the leafcert manager.
    
    The leaf cert logic in the controller:
    * Sets up watches for leaf certs that are referenced in the ProxyStateTemplate (which generates the leaf certs too).
    * Gets the leaf cert from the leaf cert cache
    * Stores the leaf cert in the ProxyState that's pushed to xds
    * For the cert watches, this PR also uses a bimapper + a thin wrapper to map leaf cert events to related ProxyStateTemplates
    
    Since bimapper uses a resource.Reference or resource.ID to map between two resource types, I've created an internal type for a leaf certificate to use for the resource.Reference, since it's not a v2 resource.
    The wrapper allows mapping events to resources (as opposed to mapping resources to resources)
    
    The controller tests:
    Unit: Ensure that we resolve leaf cert references
    Lifecycle: Ensure that when the CA is updated, the leaf cert is as well
    
    Also adds a new spiffe id type, and adds workload identity and workload identity URI to leaf certs. This is so certs are generated with the new workload identity based SPIFFE id.
    
    * Pulls out some leaf cert test helpers into a helpers file so it
    can be used in the xds controller tests.
    * Wires up leaf cert manager dependency
    * Support getting token from proxytracker
    * Add workload identity spiffe id type to the authorize and sign functions
    
    
    
    ---------
    
    Co-authored-by: John Murret <[email protected]>
    ndhanushkodi and jmurret authored Sep 12, 2023
    Configuration menu
    Copy the full SHA
    78b170a View commit details
    Browse the repository at this point in the history
  8. Test: NET-5592 - update Nomad integration testing (#18768)

    NET-5592 - update Nomad integration testing
    sophie-gairo authored Sep 12, 2023
    Configuration menu
    Copy the full SHA
    a55c4a1 View commit details
    Browse the repository at this point in the history
  9. Add workload identity ACL rules (#18769)

    Chris S. Kim authored Sep 12, 2023
    Configuration menu
    Copy the full SHA
    d090668 View commit details
    Browse the repository at this point in the history

Commits on Sep 13, 2023

  1. Windows Integration Test Changes (#18758)

    * some changes to debug
    
    * revert machines
    
    * increased timeout
    
    * added sleep 10 seconds before test start
    
    * chagne envoy version
    
    * removed sleep
    
    * revert timeout
    
    * replace position
    
    * removed date
    
    * Revert "[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437)"
    
    This reverts commit 05604ee.
    
    * fix build
    
    * Revert "replace position"
    
    This reverts commit 48e6af4.
    
    * Revert "Revert "[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437)""
    
    This reverts commit d7c568e.
    
    * comment out api gateway http hostnames test
    
    * fix import
    
    * revert integ test run on PR
    absolutelightning authored Sep 13, 2023
    Configuration menu
    Copy the full SHA
    0b6efbb View commit details
    Browse the repository at this point in the history
  2. Add V2 TCP traffic permissions (#18771)

    Add support for TCP traffic permissions
    erichaberkorn authored Sep 13, 2023
    Configuration menu
    Copy the full SHA
    12be06f View commit details
    Browse the repository at this point in the history
  3. resource: add helper to normalize inner Reference tenancy during muta…

    …te (#18765)
    
    When one resource contains an inner field that is of type *pbresource.Reference we want the
    Tenancy to be reasonably defaulted by the following rules:
    
    1. The final values will be limited by the scope of the referenced type.
    2. Values will be inferred from the parent's tenancy, and if that is insufficient then using
       the default tenancy for the type's scope.
    3. Namespace will only be used from a parent if the reference and the parent share a
       partition, otherwise the default namespace will be used.
    
    Until we tackle peering, this hard codes an assumption of peer name being local. The
    logic for defaulting may need adjustment when that is addressed.
    rboyer authored Sep 13, 2023
    Configuration menu
    Copy the full SHA
    07f54fe View commit details
    Browse the repository at this point in the history
  4. Disable docs change CI skip detection (#18775)

    There's currently a bug that causes CI to be skipped on all non-PR
    changes. Until that's fixed and we can be certain the check will fail CI
    or default to running tests in the case of errors, disabling this check.
    zalimeni authored Sep 13, 2023
    Configuration menu
    Copy the full SHA
    09fffd4 View commit details
    Browse the repository at this point in the history
  5. Added cleanup of previous default issuers

    Chris S. Kim committed Sep 13, 2023
    Configuration menu
    Copy the full SHA
    edcd84e View commit details
    Browse the repository at this point in the history
  6. Add changelog

    Chris S. Kim committed Sep 13, 2023
    Configuration menu
    Copy the full SHA
    aec9a72 View commit details
    Browse the repository at this point in the history
  7. Delete corresponding key

    Chris S. Kim committed Sep 13, 2023
    Configuration menu
    Copy the full SHA
    9bbe1b5 View commit details
    Browse the repository at this point in the history
  8. Update changelog

    Chris S. Kim committed Sep 13, 2023
    Configuration menu
    Copy the full SHA
    4f3c71a View commit details
    Browse the repository at this point in the history
  9. backport of commit 4f3c71a

    Chris S. Kim committed Sep 13, 2023
    Configuration menu
    Copy the full SHA
    7fa1034 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    4493ba9 View commit details
    Browse the repository at this point in the history
  11. backport of commit a31aff8

    Chris S. Kim committed Sep 13, 2023
    Configuration menu
    Copy the full SHA
    fad1aa4 View commit details
    Browse the repository at this point in the history