Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of Vault CA provider clean up previous default issuers into release/1.16.x #18782

Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
417 commits
Select commit Hold shift + click to select a range
5208ea9
NET-4657/add resource service client (#18053)
JadhavPoonam Jul 14, 2023
747a4c7
Fix bug with Vault CA provider (#18112)
Jul 14, 2023
5af7390
[NET-4897] net/http host header is now verified and request.host that…
jmurret Jul 14, 2023
691bc96
add a conditional around setting LANFilter.AllSegments to make sure i…
jmurret Jul 14, 2023
05b665e
chore: bump upgrade integrations tests to 1.15, 116 [NET-4743] (#18130)
nfi-hashicorp Jul 14, 2023
e719478
re org resource type registry (#18133)
wangxinyi7 Jul 15, 2023
5930518
fix: update delegateMock used in ENT (#18149)
JadhavPoonam Jul 17, 2023
bcc6a9d
Use JWT-auth filter in metadata mode & Delegate validation to RBAC fi…
roncodingenthusiast Jul 17, 2023
f7c5ba5
Support Consul Connect Envoy Command on Windows (#17694)
absolutelightning Jul 17, 2023
e52ea0e
Change docs to say 168h instead of 7d for server_rejoin_age_max (#18154)
Jul 17, 2023
33d898b
[OSS] test: improve xDS listener code coverage (#18138)
DanStough Jul 17, 2023
03cf37e
Re-order expected/actual for assertContainerState in consul container…
roncodingenthusiast Jul 17, 2023
07fce86
group and document make file (#17943)
wangxinyi7 Jul 17, 2023
6200536
Add `testing/deployer` (neé `consul-topology`) [NET-4610] (#17823)
nfi-hashicorp Jul 17, 2023
9214457
[NET-4792] Add integrations tests for jwt-auth (#18169)
roncodingenthusiast Jul 18, 2023
548a5ca
Add FIPS reference to consul enterprise docs (#18028)
im2nguyen Jul 18, 2023
cd3fc9e
add peering_commontopo tests [NET-3700] (#17951)
nfi-hashicorp Jul 18, 2023
2e326e2
docs - remove Sentinel from enterprise features list (#18176)
Jul 19, 2023
29cdb75
[NET-4865] Bump golang.org/x/net to 0.12.0 (#18186)
zalimeni Jul 19, 2023
003370d
Call resource mutate hook before validate hook (NET-4907) (#18178)
analogue Jul 19, 2023
e8dd04d
[NET-4865] security: Update Go version to 1.20.6 (#18190)
zalimeni Jul 19, 2023
18bc041
Improve XDS test coverage: JWT auth edition (#18183)
roncodingenthusiast Jul 19, 2023
271e5af
update readme.md (#18191)
NiniOak Jul 19, 2023
72999bb
Update submodules to latest following 1.16.0 (#18197)
zalimeni Jul 19, 2023
1ef5dfc
SEC-090: Automated trusted workflow pinning (2023-07-18) (#18174)
hashicorp-tsccr[bot] Jul 19, 2023
1c7fcdf
Fix Backport Assistant PR commenting (#18200)
zalimeni Jul 20, 2023
ada767f
resource: Pass resource to Write ACL hook instead of just resource Id…
analogue Jul 20, 2023
2c5a09b
Explicitly enable WebSocket upgrades (#18150)
blake Jul 20, 2023
5cd2876
docs: fix the description of client rpc (#18206)
huikang Jul 20, 2023
7e6ce76
NET-4804: Add dashboard for monitoring consul-k8s (#18208)
huikang Jul 20, 2023
2793761
[OSS] Improve xDS Code Coverage - Clusters (#18165)
DanStough Jul 20, 2023
c2066b9
NET-4222 take config file consul container (#18218)
huikang Jul 21, 2023
47d445d
Envoy Integration Test Windows (#18007)
absolutelightning Jul 21, 2023
926db9c
fix typos and update ecs compat table (#18215)
trujillo-adam Jul 21, 2023
c932d79
[OSS] proxystate: add proxystate protos (#18216)
ndhanushkodi Jul 21, 2023
7e01fcf
ci: don't verify s390x (#18224)
loshz Jul 21, 2023
6671d7e
[CC-5718] Remove HCP token requirement during bootstrap (#18140)
jjacobson93 Jul 21, 2023
c138f24
[NET-4122] Doc guidance for federation with externalServers (#18207)
zalimeni Jul 21, 2023
8e3a1dd
[OSS] Improve xDS Code Coverage - Endpoints and Misc (#18222)
DanStough Jul 21, 2023
7ce539e
Clarify license reporting timing and GDPR compliance (#18237)
judithpatudith Jul 21, 2023
2b0d64e
Fix Github Workflow File (#18241)
absolutelightning Jul 22, 2023
a11dba7
NET-4996 - filter go-tests and test-integration workflows from runnin…
jmurret Jul 23, 2023
8b46bac
Align build arch matrix with enterprise (#18235)
zalimeni Jul 24, 2023
639210e
Revert "NET-4996 - filter go-tests and test-integration workflows fro…
jmurret Jul 24, 2023
efb45fe
resource: Add scope to resource type registration [NET-4976] (#18214)
analogue Jul 24, 2023
b162c51
Fix some inconsistencies in jwt docs (#18234)
jm96441n Jul 24, 2023
b7cdd18
NET-1825: More new ACL token creation docs (#18063)
Jul 24, 2023
4d3f9a1
grafana: add the panel resource usage of connect injector (#18247)
huikang Jul 24, 2023
9a82df2
[NET-3700] Backfill changelog entry for c2bbe67 and 7402d06 (#18259)
zalimeni Jul 24, 2023
319a223
NET-4897 - update comment to include the current issue url from the g…
jmurret Jul 24, 2023
090e869
fix typos, style, and improper links (#18269)
trujillo-adam Jul 24, 2023
31d2813
member cli: add -filter expression to flags (#18223)
huikang Jul 25, 2023
9b540e2
go-tests: disable s390x (#18273)
loshz Jul 25, 2023
02cf177
docs: Update ext-authz documentation for kubernetes (#18281)
gautambaghel Jul 26, 2023
d147c3e
docs: Consul on Kubernetes specific upgrade info (#18230)
boruszak Jul 26, 2023
e37f702
Fix typo in Envoy extensions doc (#18284)
zalimeni Jul 26, 2023
e29ceab
docs: K8s secondary DC requirements (#18280)
boruszak Jul 26, 2023
5caa0ae
api-gateway: subscribe to bound-api-gateway only after receiving api-…
nathancoleman Jul 26, 2023
09b251f
Update K8s changelog to address cloud auto-join change in 1.0.0 (#18293)
Jul 26, 2023
cf4deeb
Update list of Envoy versions (#18300)
zalimeni Jul 26, 2023
cbfeb6c
[NET-4904] Update list of Envoy versions in docs (#18306)
zalimeni Jul 27, 2023
449e050
Update actions for TSCCR (#18317)
curtbushko Jul 28, 2023
6ada2e0
Fix topology view when displaying mixed connect-native/normal service…
apollo13 Jul 31, 2023
356b29b
Stop JWT provider from being written in non default namespace (#18325)
roncodingenthusiast Jul 31, 2023
18a5edd
docs: Fix some comments (#17118)
cuishuang Jul 31, 2023
b1b05f0
[NET-4703] Prevent partial application of Envoy extensions (#18068)
zalimeni Jul 31, 2023
3894940
docs: Simplify example jq commands by removing pipes (#18327)
blake Jul 31, 2023
bb6fc63
fix typo in create a mesh token docs (#18337)
roncodingenthusiast Aug 1, 2023
6424ef6
[CC-5719] Add support for builtin global-read-only policy (#18319)
jjacobson93 Aug 1, 2023
e459399
[NET-5121] proxystate: move protos to subdirectory to avoid conflicts…
ndhanushkodi Aug 1, 2023
13ce787
resource: adding various helpers for working with resources (#18342)
rboyer Aug 1, 2023
2a8bf5d
Wasm integration tests for local and remote wasm files (#17756)
johnlanda Aug 1, 2023
828567c
[HCP Telemetry] Periodic Refresh for Dynamic Telemetry Configuration …
Achooo Aug 1, 2023
67fc93e
NET-4240 - Snapshots are failing on Windows (#18302)
absolutelightning Aug 2, 2023
a33001f
Register ProxyStateTemplate Resource (#18316)
ishustava Aug 2, 2023
905e371
[NET-5146] security: Update Go version to 1.20.7 and `x/net` to 0.13.…
zalimeni Aug 2, 2023
9c227e2
mesh: adding the protobuf types and resources backing mesh config v2 …
rboyer Aug 3, 2023
284e3bd
[OSS] test: xds coverage for routes (#18369)
DanStough Aug 3, 2023
8e5e16d
Fix policy lookup to allow for slashes (#18347)
jjacobson93 Aug 3, 2023
89aac4b
add some initial CODEOWNERS (#18346)
rboyer Aug 3, 2023
0a48a24
Add redirects for mesh-gateway docs (#18377)
im2nguyen Aug 4, 2023
1f28ac2
expose grpc as http endpoint (#18221)
wangxinyi7 Aug 4, 2023
1ebd001
bimapper: fix a bug and add some more test coverage (#18387)
rboyer Aug 4, 2023
38c356c
[docs] Fix ServiceDefaults example in distributed tracing (#17212)
ilpianista Aug 4, 2023
417ae9f
Fix #17730 - Dev mode has new line (#18367)
absolutelightning Aug 5, 2023
48effe5
chore: make go-mod-tidy (#18388)
rboyer Aug 7, 2023
63cc037
resource: Make resource read tenancy aware (#18397)
analogue Aug 7, 2023
96ce4da
Not using chmod - fixed integration test for Enterprise (#18401)
absolutelightning Aug 8, 2023
2096f23
replaced ordered list of rate limit ops with flow diagram (#18398)
trujillo-adam Aug 8, 2023
7902ae2
Upgrade test: remove outdated test and disable log due to verbosity (…
huikang Aug 8, 2023
43d8898
bump testcontainers-go from 0.22.0 and remove pinned go version in in…
huikang Aug 8, 2023
91d331b
Add ServiceEndpoints Mutation hook tests (#18404)
mkeeler Aug 8, 2023
bfc519f
catalog: add FailoverPolicy mutation and validation hooks (#18390)
rboyer Aug 8, 2023
e235c8b
NET-5115 Add retry + timeout filters for api-gateway (#18324)
sarahalsmiller Aug 8, 2023
42efc11
catalog: adding a controller to reconcile FailoverPolicy resources (#…
rboyer Aug 9, 2023
facd5b0
fix the error in ent repo (#18421)
wangxinyi7 Aug 9, 2023
948ce8b
build: updates for 1.16.1 release (#18415)
DanStough Aug 9, 2023
bb1a288
update ECS links (#18419)
eddie-rowe Aug 9, 2023
10f69d8
docs: fix incorrect proxy-defaults config in Lua Envoy extension (#18…
nvanthao Aug 10, 2023
bee12c6
resource: Make resource write tenancy aware (#18423)
analogue Aug 10, 2023
05604ee
[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#…
zalimeni Aug 10, 2023
6c8ca0f
NET-4984: Update APIGW Config Entries for JWT Auth (#18366)
jm96441n Aug 10, 2023
6981658
k8s compat - Openshift versions (#18307)
Aug 10, 2023
df11e4e
APIGW: Update HTTPRouteConfigEntry for JWT Auth (#18422)
jm96441n Aug 10, 2023
5fb9df1
[COMPLIANCE] License changes (#18443)
hashicorp-copywrite[bot] Aug 11, 2023
5717cbd
Net-2708/delete resource endpoint (#18420)
JadhavPoonam Aug 11, 2023
b4cdfbb
Disable deep-copy codegen verification for now. (#18446)
mkeeler Aug 11, 2023
66bcaa3
build: upgrade to latest buf v1.26.0 (#18426)
rboyer Aug 11, 2023
4a0afb5
NET-4952 Add docs for export command (#18425)
nathancoleman Aug 11, 2023
559c61e
Net-2712/resource hcl parsing (#18250)
JadhavPoonam Aug 11, 2023
cda884a
read endpoint (#18268)
wangxinyi7 Aug 11, 2023
f88d4fe
Net-2707/list resource endpoint (#18444)
JadhavPoonam Aug 15, 2023
d565056
Fix incorrect yaml in examples (#18463)
lkysow Aug 15, 2023
0e94f48
NET-5187: Upgrade test timeout due to log producer errors (#18461)
NiniOak Aug 15, 2023
6b7ccd0
[NET-4799] [OSS] xdsv2: listeners L4 support for connect proxies (#18…
ndhanushkodi Aug 15, 2023
217107f
resource: Make resource list tenancy aware (#18475)
analogue Aug 15, 2023
adf8ddb
[COMPLIANCE] License update (#18479)
hashicorp-copywrite[bot] Aug 16, 2023
b8acd78
docs: specify manual server metadata intervention (#18477)
loshz Aug 16, 2023
5ca8cd6
docs: Update OpenShift compatibility (#18478)
Aug 16, 2023
e6c1c47
resource: Make resource delete tenancy aware (#18476)
analogue Aug 16, 2023
9e9800e
Add license-checker action that fails when any backported file contai…
nathancoleman Aug 16, 2023
aa21b12
docs: Update K8s TGW tutorial to reliably obtain role ID (#18474)
blake Aug 16, 2023
d488fc7
NET-5371 License checker pt2 (#18491)
nathancoleman Aug 16, 2023
ea7b419
README - Update KV use case to Dynamic App Configuration (#18301)
Aug 16, 2023
cbedbc0
README - re-order badges and update hub link (#18498)
Aug 17, 2023
61b7c0d
[NET-5163] Support locality testing in consul-container (#18484)
zalimeni Aug 17, 2023
b80c525
NET-4853 - xds v2 - implement base connect proxy functionality for cl…
jmurret Aug 17, 2023
c533a51
Fix HCL (#18513)
lkysow Aug 17, 2023
92cfb4a
NET-4932 - xds v2 - implement base connect proxy functionality for en…
jmurret Aug 17, 2023
97b41d9
Support custom watches on controller (#18439)
thisisnotashwin Aug 17, 2023
9ea182f
NET-4858 - xds v2 - implement base connect proxy functionality for ro…
jmurret Aug 17, 2023
cc596ce
bimapper: allow to untrack links and support reference or id (#18451)
ishustava Aug 18, 2023
0b580ff
bimapper: fix data race (#18519)
ishustava Aug 18, 2023
d3837e3
CI Split integration tests to run nightly and every PR (#18518)
huikang Aug 18, 2023
5af4bbb
Fix broken links caught in weekly report (#18522)
im2nguyen Aug 18, 2023
587663d
Create nightly test-integration for consul release branch (#18530)
huikang Aug 21, 2023
eab88bf
docs: Fix spelling errors across various pages on the site (#18533)
blake Aug 21, 2023
e5842cd
Make proto-public license MPL (#18531)
analogue Aug 21, 2023
217d305
NET-4943 - Implement ProxyTracker (#18535)
jmurret Aug 21, 2023
6d22179
resource: Make resource watchlist tenancy aware (#18539)
analogue Aug 21, 2023
547f4f8
Reduce required type arguments for DecodedResource (#18540)
mkeeler Aug 22, 2023
53e28a4
OSS -> CE (community edition) changes (#18517)
analogue Aug 22, 2023
c4b3234
CI: fix envoy versions in CI of release branch (#18538)
huikang Aug 22, 2023
570c84d
catalog: add failover mode enum validation (#18545)
rboyer Aug 22, 2023
55723c5
mesh: add validation for the new pbmesh resources (#18410)
rboyer Aug 22, 2023
0d60380
xds controller: resolve ServiceEndpoints references in ProxyStateTemp…
thisisnotashwin Aug 22, 2023
17667a1
mesh: adding type aliases for mesh resource usage (#18448)
rboyer Aug 22, 2023
4f9955d
Update trust bundle into proxy-state-template (#18550)
thisisnotashwin Aug 22, 2023
5b88aae
catalog: validating Protocol and Health enums on Service, Workload, a…
rboyer Aug 22, 2023
8a93124
chore: fix missing/incorrect license headers (#18555)
rboyer Aug 22, 2023
a1755d1
fix for , non presence of consul-version meta (#18464)
vijayraghav-io Aug 22, 2023
a1cd3f8
feat: add experiments flag to testserver sdk (#18541)
DanStough Aug 23, 2023
b37587b
bug: prevent go routine leakage due to existing DeferCheck (#18558)
huikang Aug 23, 2023
63fa78a
NET-5382 & PLAT-1159: Do not trigger workflow if only doc files are i…
NiniOak Aug 23, 2023
34eb700
UI: community verbiage (#18560)
natmegs Aug 23, 2023
2cc2c6b
Fix Windows FIPS Build (#18357)
absolutelightning Aug 24, 2023
82993fc
CE port of enterprise extension (#18572)
Aug 24, 2023
067a011
resource: Make resource listbyowner tenancy aware (#18566)
analogue Aug 24, 2023
59ab57f
NET-5147: Added placeholder structs for JWT functionality (#18575)
jm96441n Aug 24, 2023
2225bf0
resource: Make resource writestatus tenancy aware (#18577)
analogue Aug 24, 2023
051f250
NET-5338 - NET-5338 - Run a v2 mode xds server (#18579)
jmurret Aug 24, 2023
c8ef063
CI: send slack notification on failed nightly job (#18578)
huikang Aug 25, 2023
ecdcde4
CE commit (#18583)
Aug 25, 2023
2f58e05
Fix broken link on sameness group page (#18511)
im2nguyen Aug 28, 2023
0e17e98
Fix typo in permissive mTLS docs (#18551)
im2nguyen Aug 28, 2023
7bc30e9
Set concurrency for workflows (#18567)
curtbushko Aug 28, 2023
180c1e2
test: run automated tests against Vault 1.11 - 1.14 (#18590)
jkirschner-hashicorp Aug 28, 2023
48c8a83
Reduce the frequency of metric exports to minutely (#18584)
Aug 28, 2023
0e60650
NET-4944 - wire up controllers with proxy tracker (#18603)
jmurret Aug 29, 2023
797e42d
Watch the ProxyTracker from xDS controller (#18611)
thisisnotashwin Aug 29, 2023
f8812ed
Distinguish v2 catalog Protocol unset from default (#18612)
zalimeni Aug 29, 2023
58e5658
Added OpenTelemetry Access Logging Envoy extension (#18336)
hdkshingala Aug 30, 2023
0f48b7a
[HCP Telemetry] Move first TelemetryConfig Fetch into the TelemetryCo…
Achooo Aug 30, 2023
255aa15
update comments and docs about running envoy integration tests with t…
jmurret Aug 30, 2023
f8d77f0
delete all v2 resources type when deleting a namespace (CE) (#18621)
dhiaayachi Aug 31, 2023
7b9e243
resource: Allow nil tenancy (#18618)
analogue Aug 31, 2023
f2ce472
PLAT-1192 - Run CI on smaller instances (#18624)
curtbushko Aug 31, 2023
d45c3c2
NET-3181 - Allow log file naming like Nomad (#18617)
absolutelightning Aug 31, 2023
9876923
Add the plumbing for APIGW JWT work (#18609)
jm96441n Aug 31, 2023
892ba52
docs: admin partition and DNS clarification (#18613)
jkirschner-hashicorp Aug 31, 2023
699aa47
fix: make UNSPECIFIED protocol pass validation (#18634)
zalimeni Aug 31, 2023
78e3cbe
NET 1594 - Snapshot Agent Filename Should Include Consul Version / Da…
absolutelightning Sep 1, 2023
13eefbb
Net 3181 consul gh issue 15709 allow log file naming like nomad - fix…
absolutelightning Sep 1, 2023
b96cff7
resource: Require scope for resource registration (#18635)
analogue Sep 1, 2023
b56fbc7
[NET-4958] Fix issue where envoy endpoints would fail to populate aft…
hashi-derek Sep 1, 2023
a698142
Add extra logging for mesh health endpoints. (#18647)
hashi-derek Sep 1, 2023
82c2281
feat: Change global-read-only policy to non editable (#18602)
valeriia-ruban Sep 1, 2023
cd3bfc5
remove stray FIPS file (#18651)
skpratt Sep 1, 2023
9915b47
Add known issue notice for #18636. (#18650)
hashi-derek Sep 1, 2023
99845eb
fix: remove Intention test with latency to make consul-enterprise rep…
valeriia-ruban Sep 1, 2023
22df51f
fix: add telemetry bind socket to proxyConfiguration proto (#18652)
DanStough Sep 1, 2023
a2f3d13
feat: copy edits for built-in policy alert (#18655)
valeriia-ruban Sep 1, 2023
ac867d6
test: fix snapshot save w/ append test for ENT (#18656)
DanStough Sep 1, 2023
df9d12a
Net 2714/xw cli read command (#18462)
wangxinyi7 Sep 5, 2023
0c18404
change log for audit log (#18668)
absolutelightning Sep 5, 2023
7ea9867
Add TCP+TLS Healthchecks (#18381)
pgporada Sep 5, 2023
ac27585
Fix windows Ent runner (#18683)
absolutelightning Sep 6, 2023
60b0485
Removed nodename and status from consul snapshot save -append-filenam…
absolutelightning Sep 6, 2023
ec507fe
update guide to reflect tenancy and scope (#18687)
dhiaayachi Sep 6, 2023
56917eb
Add support for querying tokens by service name. (#18667)
hashi-derek Sep 6, 2023
80d72e7
restore common-topo peering integration tests, but nightly [NET-5476]…
nfi-hashicorp Sep 6, 2023
4eb2197
dataplane: Allow getting bootstrap parameters when using V2 APIs (#18…
ishustava Sep 6, 2023
373c7dc
switch all client nodes in dc2 to dataplane [NET-4299] (#18608)
nfi-hashicorp Sep 6, 2023
a17f4a0
Reformat proxy docs refresh (#18623)
trujillo-adam Sep 6, 2023
3c70e14
sidecar-proxy controller: L4 controller with explicit upstreams (NET-…
ishustava Sep 7, 2023
acd9b3d
test: update sidecarproxy/builder golden tests to use determinstic go…
rboyer Sep 7, 2023
2c244b6
[APIGW] NET-5017 JWT Cleanup/Status Conditions (#18700)
jm96441n Sep 7, 2023
2e7d951
Added changelog for jwt features (#18709)
jm96441n Sep 7, 2023
56d6e54
fix: NET-1521 show latest config in /v1/agent/self (#18681)
nvanthao Sep 7, 2023
993fe9a
Using larger machine for Enterprise (#18713)
absolutelightning Sep 8, 2023
bbef879
[NET-5325] ACL templated policies support in tokens and roles (#18708)
roncodingenthusiast Sep 8, 2023
9adb617
Adds PassiveHealthCheck Fields to ServiceDefaults and IngressGateway …
missylbytes Sep 8, 2023
bbc2763
Instantiate secure resource service client after the grpc server (#18…
ishustava Sep 8, 2023
3569d70
ENT port: test-integ/peering: peer through mesh gateway [NET-4609] (#…
nfi-hashicorp Sep 8, 2023
876c662
[CC-6039] Update builtin policy descriptions (#18705)
jjacobson93 Sep 8, 2023
235988b
Net-2713/resource apply command (#18610)
JadhavPoonam Sep 8, 2023
e5d26a1
NET-5530 Support response header modifiers on http-route config entry…
nathancoleman Sep 8, 2023
576ffdf
fix: emit consul version metric on a regular interval (#18724)
analogue Sep 8, 2023
40d7ebc
[NET-5330] Support templated policies in Binding rules (#18719)
roncodingenthusiast Sep 8, 2023
ed79c60
NET-5530 Generate deep-copy code (#18730)
nathancoleman Sep 8, 2023
1557e1d
sidecar-proxy controller: Add support for transparent proxy (NET-5069…
ishustava Sep 8, 2023
3e78b4c
Prefix sidecar proxy test files with source and destination. (#18620)
jmurret Sep 8, 2023
24d031d
k8s: Update audit-logging docs to include K8s examples (#18721)
Sep 10, 2023
bf291f5
Fix windows integrations tests machine size (#18736)
absolutelightning Sep 11, 2023
7429aba
Increase timeout for integration test windows. (#18737)
absolutelightning Sep 11, 2023
48ef8b6
Net-4292/list command (#18649)
JadhavPoonam Sep 11, 2023
172e915
Added logs for debugging (#18740)
absolutelightning Sep 11, 2023
a69e901
xds: update golden tests to be deterministic (#18707)
rboyer Sep 11, 2023
b1688ad
Run copyright after running deep-copy as part of the Makefile/CI (#18…
dhiaayachi Sep 11, 2023
9776c10
[NET-5333] Add api to read/list and preview templated policies (#18748)
roncodingenthusiast Sep 11, 2023
62062fd
NET-5132 - Configure multiport routing for connect proxies in TProxy …
jmurret Sep 12, 2023
697836b
added time stamps (#18757)
absolutelightning Sep 12, 2023
264166f
fix: write endpoint errors out gracefully (#18743)
JadhavPoonam Sep 12, 2023
5e7afdf
[NET-5574] Update Go version to 1.20.8 (#18742)
zalimeni Sep 12, 2023
4724a4e
Add Envoy golden test for OTEL access logging extension (#18760)
cthain Sep 12, 2023
89e6725
mesh: create new routes-controller to reconcile xRoute types into a C…
rboyer Sep 12, 2023
78b170a
xds controller: setup watches for and compute leaf cert references in…
ndhanushkodi Sep 12, 2023
a55c4a1
Test: NET-5592 - update Nomad integration testing (#18768)
sophie-gairo Sep 12, 2023
d090668
Add workload identity ACL rules (#18769)
Sep 12, 2023
0b6efbb
Windows Integration Test Changes (#18758)
absolutelightning Sep 13, 2023
12be06f
Add V2 TCP traffic permissions (#18771)
erichaberkorn Sep 13, 2023
07f54fe
resource: add helper to normalize inner Reference tenancy during muta…
rboyer Sep 13, 2023
09fffd4
Disable docs change CI skip detection (#18775)
zalimeni Sep 13, 2023
edcd84e
Added cleanup of previous default issuers
Sep 12, 2023
aec9a72
Add changelog
Sep 12, 2023
9bbe1b5
Delete corresponding key
Sep 13, 2023
4f3c71a
Update changelog
Sep 13, 2023
7fa1034
backport of commit 4f3c71ac2680573091d6de865a65c0df5c87275e
Sep 13, 2023
4493ba9
Merge 4f3c71ac2680573091d6de865a65c0df5c87275e into backport/kisunji/…
hc-github-team-consul-core Sep 13, 2023
fad1aa4
backport of commit a31aff8212355c1fc52bb1d868c7a144bfb8d57b
Sep 13, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
3 changes: 3 additions & 0 deletions .changelog/13023.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
ui: the topology view now properly displays services with mixed connect and non-connect instances.
```
3 changes: 3 additions & 0 deletions .changelog/17075.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
agent: remove agent cache dependency from service mesh leaf certificate management
```
3 changes: 3 additions & 0 deletions .changelog/17160.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
Fix a bug that wrongly trims domains when there is an overlap with DC name.
```
3 changes: 3 additions & 0 deletions .changelog/17483.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix a bug that caused server agents to continue cleaning up peering resources even after loss of leadership.
```
3 changes: 3 additions & 0 deletions .changelog/17546.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: update supported envoy versions to 1.23.10, 1.24.8, 1.25.7, 1.26.2
```
3 changes: 3 additions & 0 deletions .changelog/17565.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
reloadable config: Made enable_debug config reloadable and enable pprof command to work when config toggles to true
```
3 changes: 3 additions & 0 deletions .changelog/17582.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
cli: `consul operator raft list-peers` command shows the number of commits each follower is trailing the leader by to aid in troubleshooting.
```
3 changes: 3 additions & 0 deletions .changelog/17596.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
debug: change default setting of consul debug command. now default duration is 5ms and default log level is 'TRACE'
```
4 changes: 4 additions & 0 deletions .changelog/17609.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
gateways: Fixed a bug in API gateways where binding a route that only targets a service imported from a peer results
in the programmed gateway having no routes.
```
3 changes: 3 additions & 0 deletions .changelog/17631.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
gateways: Fixed a bug where API gateways were not being taken into account in determining xDS rate limits.
```
3 changes: 3 additions & 0 deletions .changelog/17719.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
Bump Dockerfile base image to `alpine:3.18`.
```
3 changes: 3 additions & 0 deletions .changelog/17739.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
http: fixed API endpoint `PUT /acl/token/:AccessorID` (update token), no longer requires `AccessorID` in the request body. Web UI can now update tokens.
```
3 changes: 3 additions & 0 deletions .changelog/17754.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
ui: consul version is displayed in nodes list with filtering and sorting based on versions
```
3 changes: 3 additions & 0 deletions .changelog/17755.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
mesh: Stop jwt providers referenced by intentions from being deleted.
```
3 changes: 3 additions & 0 deletions .changelog/17757.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: Improve transparent proxy support for virtual services and failovers.
```
3 changes: 3 additions & 0 deletions .changelog/17759.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
extensions: Improve validation and error feedback for `property-override` builtin Envoy extension
```
3 changes: 3 additions & 0 deletions .changelog/17775.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where changes to service exports were not reflected in proxies.
```
3 changes: 3 additions & 0 deletions .changelog/17780.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
cli: `consul watch` command uses `-filter` expression to filter response from checks, services, nodes, and service.
```
3 changes: 3 additions & 0 deletions .changelog/17846.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect/ca: Fixes a bug preventing CA configuration updates in secondary datacenters
```
2 changes: 2 additions & 0 deletions .changelog/17885.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
```release-note:bug
ca: Fixed a bug where the Vault provider was not passing the configured role param for AWS auth
3 changes: 3 additions & 0 deletions .changelog/17888.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: Add capture group labels from Envoy cluster FQDNs to Envoy exported metric labels
```
3 changes: 3 additions & 0 deletions .changelog/17894.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix incorrect protocol config merging for transparent proxy implicit upstreams.
```
4 changes: 4 additions & 0 deletions .changelog/17911.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
gateway: Fixes a bug where envoy would silently reject RSA keys that are smaller than 2048 bits,
we now reject those earlier in the process when we validate the certificate.
```
4 changes: 4 additions & 0 deletions .changelog/17939.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:improvement
http: GET API `operator/usage` endpoint now returns node count
cli: `consul operator usage` command now returns node count
```
3 changes: 3 additions & 0 deletions .changelog/17978.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
mesh: Expose remote jwks cluster configuration through jwt-provider config entry
```
4 changes: 4 additions & 0 deletions .changelog/18011.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
connect: Removes the default health check from the `consul connect envoy` command when starting an API Gateway.
This health check would always fail.
```
3 changes: 3 additions & 0 deletions .changelog/18024.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: fix a bug with Envoy potentially starting with incomplete configuration by not waiting enough for initial xDS configuration.
```
3 changes: 3 additions & 0 deletions .changelog/18068.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
xds: Prevent partial application of non-Required Envoy extensions in the case of failure.
```
3 changes: 3 additions & 0 deletions .changelog/18080.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
Fix some typos in metrics docs
```
3 changes: 3 additions & 0 deletions .changelog/18112.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ca: Fixes a Vault CA provider bug where updating RootPKIPath but not IntermediatePKIPath would not renew leaf signing certificates
```
3 changes: 3 additions & 0 deletions .changelog/18140.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
hcp: Removes requirement for HCP to provide a management token
```
3 changes: 3 additions & 0 deletions .changelog/18150.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
xds: Explicitly enable WebSocket connection upgrades in HTTP connection manager
```
3 changes: 3 additions & 0 deletions .changelog/18168.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
hcp: Add dynamic configuration support for the export of server metrics to HCP.
```
3 changes: 3 additions & 0 deletions .changelog/18184.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api: Fix client deserialization errors by marking new Enterprise-only prepared query fields as omit empty
```
3 changes: 3 additions & 0 deletions .changelog/18186.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
Upgrade golang.org/x/net to address [CVE-2023-29406](https://nvd.nist.gov/vuln/detail/CVE-2023-29406)
```
5 changes: 5 additions & 0 deletions .changelog/18190.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
```release-note:security
Upgrade to use Go 1.20.6.
This resolves [CVE-2023-29406](https://github.com/advisories/GHSA-f8f7-69v5-w4vx)(`net/http`) for uses of the standard library.
A separate change updates dependencies on `golang.org/x/net` to use `0.12.0`.
```
3 changes: 3 additions & 0 deletions .changelog/18223.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
cli: `consul members` command uses `-filter` expression to filter members based on bexpr.
```
3 changes: 3 additions & 0 deletions .changelog/18291.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api-gateway: fix race condition in proxy config generation when Consul is notified of the bound-api-gateway config entry before it is notified of the api-gateway config entry.
```
4 changes: 4 additions & 0 deletions .changelog/18302.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
snapshot: fix access denied and handle is invalid when we call snapshot save on windows - skip sync() for folders in windows in
https://github.com/rboyer/safeio/pull/3
```
3 changes: 3 additions & 0 deletions .changelog/18303.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: update supported envoy versions to 1.23.12, 1.24.10, 1.25.9, 1.26.4
```
6 changes: 6 additions & 0 deletions .changelog/18319.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note:improvement
acl: added builtin ACL policy that provides global read-only access (builtin/global-read-only)
```
```release-note:improvement
acl: allow for a single slash character in policy names
```
3 changes: 3 additions & 0 deletions .changelog/18325.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
mesh: **(Enterprise Only)** Require that `jwt-provider` config entries are created in the `default` namespace.
```
7 changes: 7 additions & 0 deletions .changelog/18358.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
```release-note:security
Upgrade to use Go 1.20.7.
This resolves vulnerability [CVE-2023-29409](https://nvd.nist.gov/vuln/detail/CVE-2023-29409)(`crypto/tls`).
```
```release-note:security
Update `golang.org/x/net` to v0.13.0 to address [CVE-2023-3978](https://nvd.nist.gov/vuln/detail/CVE-2023-3978).
```
6 changes: 6 additions & 0 deletions .changelog/18381.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note:improvement
checks: It is now possible to configure agent TCP checks to use TLS with
optional server SNI and mutual authentication. To use TLS with a TCP check, the
check must enable the `tcp_use_tls` boolean. By default the agent will use the
TLS configuration in the `tls.default` stanza.
```
3 changes: 3 additions & 0 deletions .changelog/18437.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
Inherit locality from services when registering sidecar proxies.
```
3 changes: 3 additions & 0 deletions .changelog/18464.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
UI : Nodes list view was breaking for synthetic-nodes. Fix handles non existence of consul-version meta for node.
```
3 changes: 3 additions & 0 deletions .changelog/18558.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
check: prevent go routine leakage when existing Defercheck of same check id is not nil
```
3 changes: 3 additions & 0 deletions .changelog/18584.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
Reduce the frequency of metric exports from Consul to HCP from every 10s to every 1m
```
4 changes: 4 additions & 0 deletions .changelog/18617.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:improvement
log: Currently consul logs files like this consul-{timestamp}.log. This change makes sure that there is always
consul.log file with the latest logs in it.
```
5 changes: 5 additions & 0 deletions .changelog/18625.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
```release-note:improvement
Adds flag -append-filename (which works on values version, dc, node and status) to consul snapshot save command.
Adding the flag -append-filename version,dc,node,status will add consul version, consul datacenter, node name and leader/follower
(status) in the file name given in the snapshot save command before the file extension.
```
3 changes: 3 additions & 0 deletions .changelog/18636.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where Envoy endpoints would not populate correctly after a snapshot restore.
```
3 changes: 3 additions & 0 deletions .changelog/18667.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
api: Add support for listing ACL tokens by service name.
```
3 changes: 3 additions & 0 deletions .changelog/18681.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api: Fix `/v1/agent/self` not returning latest configuration
```
3 changes: 3 additions & 0 deletions .changelog/18724.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
telemetry: emit consul version metric on a regular interval.
```
8 changes: 8 additions & 0 deletions .changelog/18742.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
```release-note:security
Upgrade to use Go 1.20.8. This resolves CVEs
[CVE-2023-39320](https://github.com/advisories/GHSA-rxv8-v965-v333) (`cmd/go`),
[CVE-2023-39318](https://github.com/advisories/GHSA-vq7j-gx56-rxjh) (`html/template`),
[CVE-2023-39319](https://github.com/advisories/GHSA-vv9m-32rr-3g55) (`html/template`),
[CVE-2023-39321](https://github.com/advisories/GHSA-9v7r-x7cv-v437) (`crypto/tls`), and
[CVE-2023-39322](https://github.com/advisories/GHSA-892h-r6cr-53g4) (`crypto/tls`)
```
3 changes: 3 additions & 0 deletions .changelog/18773.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ca: Vault provider now cleans up the previous Vault issuer and key when generating a new leaf signing certificate [[GH-18779](https://github.com/hashicorp/consul/issues/18779)]
```
3 changes: 3 additions & 0 deletions .changelog/_5517.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
namespaces: **(Enterprise only)** fixes a bug where agent health checks stop syncing for all services on a node if the namespace of any service has been removed from the server.
```
4 changes: 4 additions & 0 deletions .changelog/_5614.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
namespaces: **(Enterprise only)** fixes a bug where namespaces are stuck in a deferred deletion state indefinitely under some conditions.
Also fixes the Consul query metadata present in the HTTP headers of the namespace read and list endpoints.
```
3 changes: 3 additions & 0 deletions .changelog/_5669.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
audit-logging: **(Enterprise only)** enable error response and request body logging
```
3 changes: 3 additions & 0 deletions .changelog/_5740.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
api: (Enterprise only) Add `POST /v1/operator/audit-hash` endpoint to calculate the hash of the data used by the audit log hash function and salt.
```
3 changes: 3 additions & 0 deletions .changelog/_5750.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
cli: (Enterprise only) Add a new `consul operator audit hash` command to retrieve and compare the hash of the data used by the audit log hash function and salt.
```
3 changes: 3 additions & 0 deletions .changelog/_5805.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
audit-logging: **(Enterprise only)** limit `v1/operator/audit-hash` endpoint to ACL token with `operator:read` privileges.
```
31 changes: 31 additions & 0 deletions .github/CODEOWNERS
Validating CODEOWNERS rules …
Original file line number Diff line number Diff line change
Expand Up @@ -8,3 +8,34 @@
# release configuration
/.release/ @hashicorp/release-engineering @hashicorp/github-consul-core
/.github/workflows/build.yml @hashicorp/release-engineering @hashicorp/github-consul-core


# Staff Engineer Review (protocol buffer definitions)
/proto-public/ @hashicorp/consul-core-staff
/proto/ @hashicorp/consul-core-staff

# Staff Engineer Review (v1 architecture shared components)
/agent/cache/ @hashicorp/consul-core-staff
/agent/consul/fsm/ @hashicorp/consul-core-staff
/agent/consul/leader*.go @hashicorp/consul-core-staff
/agent/consul/server*.go @hashicorp/consul-core-staff
/agent/consul/state/ @hashicorp/consul-core-staff
/agent/consul/stream/ @hashicorp/consul-core-staff
/agent/submatview/ @hashicorp/consul-core-staff
/agent/blockingquery/ @hashicorp/consul-core-staff

# Staff Engineer Review (raft/autopilot)
/agent/consul/autopilotevents/ @hashicorp/consul-core-staff
/agent/consul/autopilot*.go @hashicorp/consul-core-staff

# Staff Engineer Review (v2 architecture shared components)
/internal/controller/ @hashicorp/consul-core-staff
/internal/resource/ @hashicorp/consul-core-staff
/internal/storage/ @hashicorp/consul-core-staff
/agent/consul/controller/ @hashicorp/consul-core-staff
/agent/grpc-external/services/resource/ @hashicorp/consul-core-staff

# Staff Engineer Review (v1 security)
/acl/ @hashicorp/consul-core-staff
/agent/xds/rbac*.go @hashicorp/consul-core-staff
/agent/xds/jwt*.go @hashicorp/consul-core-staff
34 changes: 34 additions & 0 deletions .github/scripts/filter_changed_files_go_test.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
#!/bin/bash

# Get the list of changed files
files_to_check=$(git diff --name-only origin/$GITHUB_BASE_REF)

# Define the directories to check
skipped_directories=("docs/" "ui/" "website/" "grafana/")

# Initialize a variable to track directories outside the skipped ones
other_directories=""
trigger_ci=true

# # Loop through the changed files and find directories/files outside the skipped ones
# for file_to_check in $files_to_check; do
# file_is_skipped=false
# for dir in "${skipped_directories[@]}"; do
# if [[ "$file_to_check" == "$dir"* ]] || [[ "$file_to_check" == *.md && "$dir" == *"/" ]]; then
# file_is_skipped=true
# break
# fi
# done
# if [ "$file_is_skipped" = "false" ]; then
# other_directories+="$(dirname "$file_to_check")\n"
# trigger_ci=true
# echo "Non doc file(s) changed - triggered ci: $trigger_ci"
# echo -e $other_directories
# echo "trigger-ci=$trigger_ci" >>"$GITHUB_OUTPUT"
# exit 0 ## if file is outside of the skipped_directory exit script
# fi
# done

# echo "Only doc file(s) changed - triggered ci: $trigger_ci"
echo "Doc file(s) change detection is currently disabled - triggering ci"
echo "trigger-ci=$trigger_ci" >>"$GITHUB_OUTPUT"
30 changes: 15 additions & 15 deletions .github/scripts/get_runner_classes.sh
Original file line number Diff line number Diff line change
Expand Up @@ -8,19 +8,19 @@
set -euo pipefail

case "$GITHUB_REPOSITORY" in
*-enterprise)
# shellcheck disable=SC2129
echo "compute-small=['self-hosted', 'linux', 'small']" >> "$GITHUB_OUTPUT"
echo "compute-medium=['self-hosted', 'linux', 'medium']" >> "$GITHUB_OUTPUT"
echo "compute-large=['self-hosted', 'linux', 'large']" >> "$GITHUB_OUTPUT"
# m5d.8xlarge is equivalent to our xl custom runner in OSS
echo "compute-xl=['self-hosted', 'ondemand', 'linux', 'type=m5d.8xlarge']" >> "$GITHUB_OUTPUT"
;;
*)
# shellcheck disable=SC2129
echo "compute-small=['custom-linux-s-consul-latest']" >> "$GITHUB_OUTPUT"
echo "compute-medium=['custom-linux-m-consul-latest']" >> "$GITHUB_OUTPUT"
echo "compute-large=['custom-linux-l-consul-latest']" >> "$GITHUB_OUTPUT"
echo "compute-xl=['custom-linux-xl-consul-latest']" >> "$GITHUB_OUTPUT"
;;
*-enterprise)
# shellcheck disable=SC2129
echo "compute-small=['self-hosted', 'linux', 'small']" >>"$GITHUB_OUTPUT"
echo "compute-medium=['self-hosted', 'linux', 'medium']" >>"$GITHUB_OUTPUT"
echo "compute-large=['self-hosted', 'linux', 'large']" >>"$GITHUB_OUTPUT"
# m5d.8xlarge is equivalent to our xl custom runner in CE
echo "compute-xl=['self-hosted', 'ondemand', 'linux', 'type=m6a.2xlarge']" >>"$GITHUB_OUTPUT"
;;
*)
# shellcheck disable=SC2129
echo "compute-small=['custom-linux-s-consul-latest']" >>"$GITHUB_OUTPUT"
echo "compute-medium=['custom-linux-m-consul-latest']" >>"$GITHUB_OUTPUT"
echo "compute-large=['custom-linux-l-consul-latest']" >>"$GITHUB_OUTPUT"
echo "compute-xl=['custom-linux-xl-consul-latest']" >>"$GITHUB_OUTPUT"
;;
esac
Loading
Loading