Skip to content

Commit

Permalink
backport of commit 87038bb
Browse files Browse the repository at this point in the history
  • Loading branch information
hashi-derek committed Nov 14, 2022
1 parent 706866f commit da0f328
Show file tree
Hide file tree
Showing 326 changed files with 5,275 additions and 3,482 deletions.
3 changes: 0 additions & 3 deletions .changelog/14832.txt

This file was deleted.

3 changes: 0 additions & 3 deletions .changelog/14833.txt

This file was deleted.

3 changes: 0 additions & 3 deletions .changelog/14956.txt

This file was deleted.

4 changes: 0 additions & 4 deletions .changelog/15001.txt

This file was deleted.

7 changes: 0 additions & 7 deletions .changelog/15297.txt

This file was deleted.

230 changes: 0 additions & 230 deletions .github/workflows/nightly-test-1.14.x.yaml

This file was deleted.

1 change: 0 additions & 1 deletion .golangci.yml
Expand Up @@ -83,7 +83,6 @@ linters-settings:
forbidigo:
# Forbid the following identifiers (list of regexp).
forbid:
- '\bioutil\b(# Use io and os packages instead of ioutil)?'
- '\brequire\.New\b(# Use package-level functions with explicit TestingT)?'
- '\bassert\.New\b(# Use package-level functions with explicit TestingT)?'
# Exclude godoc examples from forbidigo checks.
Expand Down
6 changes: 3 additions & 3 deletions CHANGELOG.md
Expand Up @@ -75,7 +75,7 @@ BUG FIXES:

BREAKING CHANGES:

* ca: If using Vault as the service mesh CA provider, the Vault policy used by Consul now requires the `update` capability on the intermediate PKI's tune mount configuration endpoint, such as `/sys/mounts/connect_inter/tune`. The breaking nature of this change is resolved in 1.13.3. Refer to [upgrade guidance](https://www.consul.io/docs/upgrading/upgrade-specific#modify-vault-policy-for-vault-ca-provider) for more information.
* ca: If using Vault as the service mesh CA provider, the Vault policy used by Consul now requires the `update` capability on the intermediate PKI's tune mount configuration endpoint, such as `/sys/mounts/connect_inter/tune`. The breaking nature of this change will be resolved in an upcoming 1.13 patch release. Refer to [upgrade guidance](https://www.consul.io/docs/upgrading/upgrade-specific#modify-vault-policy-for-vault-ca-provider) for more information.

SECURITY:

Expand Down Expand Up @@ -121,7 +121,7 @@ BUG FIXES:

BREAKING CHANGES:

* ca: If using Vault as the service mesh CA provider, the Vault policy used by Consul now requires the `update` capability on the intermediate PKI's tune mount configuration endpoint, such as `/sys/mounts/connect_inter/tune`. The breaking nature of this change is resolved in 1.12.6. Refer to [upgrade guidance](https://www.consul.io/docs/upgrading/upgrade-specific#modify-vault-policy-for-vault-ca-provider) for more information.
* ca: If using Vault as the service mesh CA provider, the Vault policy used by Consul now requires the `update` capability on the intermediate PKI's tune mount configuration endpoint, such as `/sys/mounts/connect_inter/tune`. The breaking nature of this change will be resolved in an upcoming 1.12 patch release. Refer to [upgrade guidance](https://www.consul.io/docs/upgrading/upgrade-specific#modify-vault-policy-for-vault-ca-provider) for more information.

SECURITY:

Expand Down Expand Up @@ -149,7 +149,7 @@ BUG FIXES:

BREAKING CHANGES:

* ca: If using Vault as the service mesh CA provider, the Vault policy used by Consul now requires the `update` capability on the intermediate PKI's tune mount configuration endpoint, such as `/sys/mounts/connect_inter/tune`. The breaking nature of this change is resolved in 1.11.11. Refer to [upgrade guidance](https://www.consul.io/docs/upgrading/upgrade-specific#modify-vault-policy-for-vault-ca-provider) for more information.
* ca: If using Vault as the service mesh CA provider, the Vault policy used by Consul now requires the `update` capability on the intermediate PKI's tune mount configuration endpoint, such as `/sys/mounts/connect_inter/tune`. The breaking nature of this change will be resolved in an upcoming 1.11 patch release. Refer to [upgrade guidance](https://www.consul.io/docs/upgrading/upgrade-specific#modify-vault-policy-for-vault-ca-provider) for more information.

SECURITY:

Expand Down
16 changes: 7 additions & 9 deletions agent/acl_test.go
Expand Up @@ -51,14 +51,6 @@ func NewTestACLAgent(t *testing.T, name string, hcl string, resolveAuthz authzRe
dataDir := testutil.TempDir(t, "acl-agent")

logBuffer := testutil.NewLogBuffer(t)

logger := hclog.NewInterceptLogger(&hclog.LoggerOptions{
Name: name,
Level: testutil.TestLogLevel,
Output: logBuffer,
TimeFormat: "04:05.000",
})

loader := func(source config.Source) (config.LoadResult, error) {
dataDir := fmt.Sprintf(`data_dir = "%s"`, dataDir)
opts := config.LoadOpts{
Expand All @@ -71,9 +63,15 @@ func NewTestACLAgent(t *testing.T, name string, hcl string, resolveAuthz authzRe
}
return result, err
}
bd, err := NewBaseDeps(loader, logBuffer, logger)
bd, err := NewBaseDeps(loader, logBuffer)
require.NoError(t, err)

bd.Logger = hclog.NewInterceptLogger(&hclog.LoggerOptions{
Name: name,
Level: testutil.TestLogLevel,
Output: logBuffer,
TimeFormat: "04:05.000",
})
bd.MetricsConfig = &lib.MetricsConfig{
Handler: metrics.NewInmemSink(1*time.Second, time.Minute),
}
Expand Down

0 comments on commit da0f328

Please sign in to comment.