-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Backport of Add reason why port 53 is not used by default into release/1.14.x #19231
Backport of Add reason why port 53 is not used by default into release/1.14.x #19231
Conversation
enable `consul resource read` command in cli
* change log for audit log * fix file name * breaking change
* Begin adding TCPUseTLS * More TCP with TLS plumbing * Making forward progress * Keep on adding TCP+TLS support for healthchecks * Removed too many lines * Unit tests for TCP+TLS * Update tlsutil/config.go Co-authored-by: Samantha <[email protected]> * Working on the tcp+tls unit test * Updated the runtime integration tests * Progress * Revert this file back to HEAD * Remove debugging lines * Implement TLS enabled TCP socket server and make a successful TCP+TLS healthcheck on it * Update docs * Update agent/agent_test.go Co-authored-by: Samantha <[email protected]> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <[email protected]> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <[email protected]> * Update agent/checks/check.go Co-authored-by: Samantha <[email protected]> * Address comments * Remove extraneous bracket * Update agent/agent_test.go Co-authored-by: Samantha <[email protected]> * Update agent/agent_test.go Co-authored-by: Samantha <[email protected]> * Update website/content/docs/ecs/configuration-reference.mdx Co-authored-by: Samantha <[email protected]> * Update the mockTLSServer * Remove trailing newline * Address comments * Fix merge problem * Add changelog entry --------- Co-authored-by: Samantha <[email protected]>
* fix windows image for enterprise * added quotesT
…e command and using leader version in version (#18680) * init * fix tests * fix tests lint * fix api call inside dc * updated doc * address comments
* update guide to reflect tenancy and scope * Apply suggestions from code review Co-authored-by: Semir Patel <[email protected]> * update ACLHooks signature * Update docs/resources/guide.md Co-authored-by: Semir Patel <[email protected]> --------- Co-authored-by: Semir Patel <[email protected]>
Add support for querying tokens by service name The consul-k8s endpoints controller has a workflow where it fetches all tokens. This is not performant for large clusters, where there may be a sizable number of tokens. This commit attempts to alleviate that problem and introduces a new way to query by the token's service name.
) This PR enables the GetEnvoyBootstrapParams endpoint to construct envoy bootstrap parameters from v2 catalog and mesh resources. * Make bootstrap request and response parameters less specific to services so that we can re-use them for workloads or service instances. * Remove ServiceKind from bootstrap params response. This value was unused previously and is not needed for V2. * Make access logs generation generic so that we can generate them using v1 or v2 resources.
* first commit; reformat PD conf entry * updated proxies overview page * added Deploy SM proxy usage and removed reg index * moved sidecar proxy usage to main proxy folder * recast sidecar reg page as Deploy sidecar services * fix typos * recast SM reg as conf reference- set the sidebar * add redirects * fix links * add PD conf entry usage to appropro pages * edits to proxy conf ref * fix links on index page * example command to write PD conf entry * updated links to old SM proxy reg page * updated links to sidecar service reg page * tryna fix front matter issues * Apply suggestions from code review Co-authored-by: Ronald <[email protected]> * added paragraph about SM proxies to overivew * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> --------- Co-authored-by: Ronald <[email protected]> Co-authored-by: Jeff Boruszak <[email protected]>
…3988) (#18352) * This controller generates and saves ProxyStateTemplate for sidecar proxies. * It currently supports single-port L4 ports only. * It keeps a cache of all destinations to make it easier to compute and retrieve destinations. * It will update the status of the pbmesh.Upstreams resource if anything is invalid. * This commit also changes service endpoints to include workload identity. This made the implementation a bit easier as we don't need to look up as many workloads and instead rely on endpoints data.
* Fixes issues in setting status * Update golden files for changes to xds generation to not use deprecated methods * Fixed default for validation of JWT for route
* fix: NET-1521 show latest config in /v1/agent/self
using 4x large for ent
* [NET-5325] ACL templated policies support in tokens and roles - Add API support for creating tokens/roles with templated-policies - Add CLI support for creating tokens/roles with templated-policies * adding changelog
…18532) Co-authored-by: trujillo-adam <[email protected]>
…18605) Co-authored-by: Matt Keeler <[email protected]>
* feat: implement apply command * fix: resolve lint issues * refactor: use fixed types * fix: ci lint failures after main rebase
…#18646) * Add response header filters to http-route config entry definitions * Map response header filters from config entry when constructing route destination * Support response header modifiers at the service level as well * Update protobuf definitions * Update existing unit tests * Add response filters to route consolidation logic * Make existing unit tests more robust * Add missing docstring * Add changelog entry * Add response filter modifiers to existing integration test * Add more robust testing for response header modifiers in the discovery chain * Add more robust testing for request header modifiers in the discovery chain * Modify test to verify that service filter modifiers take precedence over rule filter modifiers
* [NET-5330] Support templated policies in Binding rules * changelog for templated policy support in binding rules
* Generate deep-copy code * Undo license header removal
#18458) This commit adds support for transparent proxy to the sidecar proxy controller. As we do not yet support inferring destinations from intentions, this assumes that all services in the cluster are destinations.
ea4adcf
to
251075a
Compare
209a8b7
to
3964585
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Auto approved Consul Bot automated PR
🤔 This PR has changes in the |
Backport
This PR is auto-generated from #19222 to be assessed for backporting due to the inclusion of the label backport/1.14.
🚨
The person who merged in the original PR is:
@david-yu
This person should manually cherry-pick the original PR into a new backport PR,
and close this one when the manual backport PR is merged in.
The below text is copied from the body of the original PR.
Description
Add reason in docs why port 53 is not used by default.
Testing & Reproduction steps
Links
PR Checklist
Overview of commits