Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
80 commits
Select commit Hold shift + click to select a range
a66626a
backport of commit 831457765218143bad33d1a35542227fe65be4f6
Nov 18, 2022
16e7fd4
Merge pull request #1743 from hashicorp/as/system-ca-fix
Nov 18, 2022
3520bf1
Merge pull request #1747 from hashicorp/backport/as/system-ca-fix/loo…
Nov 18, 2022
54ccfec
backport of commit 9d0ea0452fec4946a130f2ed19069adfc6bc54f6
curtbushko Nov 21, 2022
e4cbcc6
backport of commit 40c1024b8678895036e8ee18c6c538acad6f59e3
curtbushko Nov 21, 2022
4bf6e9b
backport of commit c6070da59db14abde1be1913aa0d22ea2d47bc18
curtbushko Nov 21, 2022
6b4c5ec
Merge pull request #1750 from hashicorp/backport/curtbushko/missing-g…
hc-github-team-consul-ecosystem Nov 21, 2022
e230ba8
Prepare for 1.0.1 release (#1752)
curtbushko Nov 21, 2022
509b63b
Backport of Add support for setting the namespace that the CNI plugin…
hc-github-team-consul-ecosystem Nov 30, 2022
9f461d3
Backport of Fix TLS Cert when using `enableAutoEncrypt` into release/…
hc-github-team-consul-ecosystem Nov 30, 2022
24ba122
Merge pull request #1759 from hashicorp/te/root-fix
Dec 1, 2022
8038a3e
Add changes missed in previous backport
Dec 1, 2022
2e25a8d
Merge pull request #1763 from hashicorp/backport/te/root-fix/thankful…
Dec 1, 2022
e1efd26
Release 1.0.2 (#1765)
curtbushko Dec 1, 2022
bd26859
1.0.3 dev mode (#1767)
curtbushko Dec 1, 2022
3f448e6
backport of commit be8d1dd58211372f7b906220fe81a09c78ed1061
brucec5 Dec 6, 2022
d810527
backport of commit 3a2fcb54e65960d328878ba22325d3ecf359496e
brucec5 Dec 6, 2022
255a9ba
backport of commit a7019a0fa1024f748216e9f51c3a03d08d64d075
brucec5 Dec 7, 2022
828cba3
Merge pull request #1777 from hashicorp/backport/feature/global-label…
hc-github-team-consul-ecosystem Dec 7, 2022
7d27f49
backport of commit 5244bdda1ff0a48c214d95cc2407f1954129a1de
Dec 8, 2022
6766e8c
Merge pull request #1781 from hashicorp/backport/dyu-changelog-for-ex…
hc-github-team-consul-ecosystem Dec 8, 2022
e0b22c0
backport of commit a2ba8916201af55cf2f57c8ed84506dcb1345aa9
kyhavlov Dec 16, 2022
79e5a71
backport of commit 730024577108cf318964ddfa1ebdb14a950d22b9
kyhavlov Dec 19, 2022
00fe528
Merge pull request #1807 from hashicorp/backport/kyhavlov/diff-intent…
hc-github-team-consul-ecosystem Dec 19, 2022
fae4f67
backport of commit c355c4e8789e15367d847d0ad5dcd575036ef4e4
Dec 20, 2022
944bdc5
backport of commit 0a44aae30e0ee3703489dd9d8f6a537fe5fab440
Dec 20, 2022
d6607b9
Merge pull request #1811 from hashicorp/backport/dyu/helm-docs/urgent…
hc-github-team-consul-ecosystem Dec 20, 2022
06df858
backport of commit f8b52cd876a8a84046da3b768be67b5eaca0b97e
Dec 21, 2022
44b2190
Merge pull request #1819 from hashicorp/backport/dyu/release-note-fix…
hc-github-team-consul-ecosystem Dec 22, 2022
6256e76
Create annotation to allows users to use proxy health check (#1824) (…
Jan 13, 2023
8c1ea69
Add health checks for services that are synced (#1821) (#1838)
Jan 17, 2023
3afd788
backport of commit f77b0e55257debb899ff21f587f9e61dd045528e
thisisnotashwin Jan 18, 2023
a3d55d0
backport of commit 500a500b41cb191486304fc5b3ebad404586369f
thisisnotashwin Jan 18, 2023
805ac6e
Merge pull request #1842 from hashicorp/backport/ashwin/use-proxy-hea…
thisisnotashwin Jan 19, 2023
3ca55e7
Bump Kubernetes versions for clouds for acceptance tests (#1852) (#1855)
Jan 27, 2023
a84a4f6
Pre-release 1.0.3 (#1858)
curtbushko Jan 30, 2023
4528bd0
set dev mode for 1.0.4 (#1860)
curtbushko Feb 1, 2023
2029531
backport of commit 010c35354d6f7f5ee9c4ea3dedf4b60721263ea2
missylbytes Feb 1, 2023
7d0a826
Exclude openebs namespace from injection. (#1869) (#1874)
Feb 2, 2023
7594b53
backport of commit ef500b3c31e5325e36bf956753842aa00d72a158
jkirschner-hashicorp Feb 3, 2023
02fb868
Merge pull request #1879 from hashicorp/backport/refine-server-tls-va…
thisisnotashwin Feb 6, 2023
59f8ddc
backport of commit 6f3517dfbc3ecbb85513609e9bae91915f75e229
missylbytes Feb 6, 2023
fab4f22
backport of commit 2d222a4600495764fe42c3fd2f541e1b873180b0
missylbytes Feb 6, 2023
e9d79ea
Backport of Dockerfile: Remove gnupg from Consul k8s container into r…
Feb 7, 2023
04ca2a5
Backport of Dockerfile: remove `gnupg` from dev image into release/1.…
Feb 7, 2023
14ba9d7
Pre-release update for 1.0.4 (#1889)
curtbushko Feb 7, 2023
91b7dec
backport of commit 013d7bd1893e2b94d82461b1b28a1a7b9152f95f
im2nguyen Feb 7, 2023
7c39fb7
backport of commit ebee53dfce2d8a697bdca3fa4fff58631e1fafe9
im2nguyen Feb 8, 2023
f94b32b
backport of commit d55062213e7afb6663ac7fb388c89dc9c01fc824
missylbytes Feb 8, 2023
0ad9b6b
Merge pull request #1893 from hashicorp/backport/NET-1750-fix-ACL-ini…
thisisnotashwin Feb 8, 2023
40e9165
Prepare dev for 1.0.5 (#1897)
curtbushko Feb 9, 2023
8b16dd7
backport of commit d16135140e706f94ec64f2c27fc46e78c63bfbc0
lkysow Feb 10, 2023
832eb4c
Update server-acl-init to always check for the deployed serviceAccoun…
Feb 14, 2023
ac2622a
backport of commit 272445a69dfd9abfef43cb02a05c395e6a5026b0
Feb 15, 2023
102ea01
Merge pull request #1916 from hashicorp/backport/mw/update-gha-local-…
thisisnotashwin Feb 16, 2023
eafa624
Backport of Dockerfile: bump Alpine base image to 3.17 into release/1…
Feb 22, 2023
ac5b743
Merge pull request #1940 from hashicorp/backport/lkysow-patch-1/activ…
thisisnotashwin Feb 22, 2023
6c7d0dc
Merge pull request #1951 from hashicorp/backport/update-devdot-links/…
hc-github-team-consul-core Feb 24, 2023
1f2fb16
consul-dataplane: bump consul-dataplane to 1.1.0 for consul k8s 1.0.x…
Feb 28, 2023
b38b1a3
update prepare release to update the changelog (#1960)
wilkermichael Feb 28, 2023
a342e40
Cherrypick terraform checks 1 0 (#1963)
wilkermichael Feb 28, 2023
4f8645c
backport of commit fa4c4be28e47ceecfc729b66732be7cf98fed145
Feb 28, 2023
46d7977
backport of commit b68593fb74dc2a38d28f986aa9e576665de62151
Mar 1, 2023
583daf1
Merge pull request #1967 from hashicorp/backport/net-2420-update-secu…
hc-github-team-consul-core Mar 1, 2023
5c7a02d
Merge pull request #1972 from hashicorp/backport/fix-leap-year-test/n…
hc-github-team-consul-core Mar 2, 2023
065d1a0
backport of commit a020048908eb0b68d81842ac4f1617ab6234192b
Mar 2, 2023
5f36204
Merge pull request #1978 from hashicorp/backport/net-2420-disable-go-…
hc-github-team-consul-core Mar 2, 2023
1f202ee
updated go version to fix cve https://go.dev/issue/58001 (#1976)
wilkermichael Mar 2, 2023
47f5d2e
backport of commit c740fed147777c756d474c6cfcf9a38089f40312
Mar 3, 2023
01b910e
backport of commit d482dd990fda1e0199424f6c9cf4579c7a20f6f5
Mar 3, 2023
33d5468
added changelog files (#1980)
wilkermichael Mar 3, 2023
e801667
Merge pull request #1984 from hashicorp/backport/mw/add-backport-chec…
hc-github-team-consul-core Mar 3, 2023
7f07945
update to consul 1.14.5 (#1992)
wilkermichael Mar 8, 2023
1eecce6
ready for release (#1999)
wilkermichael Mar 8, 2023
1999511
Fix changelog for 1.0.5 (#2001)
wilkermichael Mar 8, 2023
02615a2
ready for 1.0.6 dev (#2003)
wilkermichael Mar 9, 2023
e0d7a50
backport of commit e23dbb65afe8226d756de4510016ac4a7a6f469f
Mar 14, 2023
d28bece
backport of commit 730ab263c8d791011901208c36b8d467ce382135
Mar 14, 2023
f0f255a
Merge pull request #2014 from hashicorp/backport/NET-2966/sni-fix-gat…
Mar 15, 2023
00064e1
values.yaml - set default connect inject init cpu resource limits to …
Mar 15, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .changelog/1770.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
control-plane: server ACL Init always appends both, the secrets from the serviceAccount's secretRefs and the one created by the Helm chart, to support Openshift secret handling.
```
3 changes: 3 additions & 0 deletions .changelog/1934.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
control-plane: update alpine to 3.17 in the Docker image.
```
3 changes: 3 additions & 0 deletions .changelog/1953.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
helm: update `imageConsulDataplane` value to `hashicorp/consul-dataplane:1.1.0`.
```
3 changes: 3 additions & 0 deletions .changelog/1976.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
upgrade to use Go 1.19.6. This resolves vulnerabilities CVE-2022-41724 in crypto/tls and CVE-2022-41723 in net/http.
```
3 changes: 3 additions & 0 deletions .changelog/2008.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
helm: Set default `limits.cpu` resource setting to `null` for `consul-connect-inject-init` container to speed up registration times when onboarding services onto the mesh during the init container lifecycle.
```
3 changes: 3 additions & 0 deletions .changelog/2013.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api-gateway: fix issue where specifying an external server SNI name while using client nodes resulted in a TLS verification error.
```
57 changes: 57 additions & 0 deletions .changelog/changelog.tmpl
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
{{- if index .NotesByType "breaking-change" -}}
BREAKING CHANGES:

{{range index .NotesByType "breaking-change" -}}
* {{ template "note" . }}
{{ end -}}
{{- end -}}

{{- if .NotesByType.security }}
SECURITY:

{{range .NotesByType.security -}}
* {{ template "note" . }}
{{ end -}}
{{- end -}}

{{- if .NotesByType.feature }}
FEATURES:

{{range .NotesByType.feature -}}
* {{ template "note" . }}
{{ end -}}
{{- end -}}

{{- $improvements := combineTypes .NotesByType.improvement .NotesByType.enhancement -}}
{{- if $improvements }}
IMPROVEMENTS:

{{range $improvements | sort -}}
* {{ template "note" . }}
{{ end -}}
{{- end -}}

{{- if .NotesByType.deprecation }}
DEPRECATIONS:

{{range .NotesByType.deprecation -}}
* {{ template "note" . }}
{{ end -}}
{{- end -}}

{{- if .NotesByType.bug }}
BUG FIXES:

{{range .NotesByType.bug -}}
* {{ template "note" . }}
{{ end -}}
{{- end -}}

{{- if .NotesByType.note }}
NOTES:

{{range .NotesByType.note -}}
* {{ template "note" . }}
{{ end -}}
{{- end -}}

3 changes: 3 additions & 0 deletions .changelog/note.tmpl
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
{{- define "note" -}}
{{.Body}}{{if not (stringHasPrefix .Issue "_")}} [[GH-{{- .Issue -}}](https://github.com/hashicorp/consul-k8s/issues/{{- .Issue -}})]{{end}}
{{- end -}}
65 changes: 33 additions & 32 deletions .circleci/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ orbs:
executors:
go:
docker:
- image: docker.mirror.hashicorp.services/cimg/go:1.19.2
- image: docker.mirror.hashicorp.services/cimg/go:1.19.6
environment:
TEST_RESULTS: /tmp/test-results # path to where test results are saved

Expand Down Expand Up @@ -34,9 +34,9 @@ commands:
- run:
name: Install go, gotestsum, kind, kubectl, and helm
command: |
wget https://golang.org/dl/go1.19.2.linux-amd64.tar.gz
sudo rm -rf /usr/local/go && sudo tar -C /usr/local -xzf go1.19.2.linux-amd64.tar.gz
rm go1.19.2.linux-amd64.tar.gz
wget https://golang.org/dl/go1.19.6.linux-amd64.tar.gz
sudo rm -rf /usr/local/go && sudo tar -C /usr/local -xzf go1.19.6.linux-amd64.tar.gz
rm go1.19.6.linux-amd64.tar.gz
echo 'export PATH=$PATH:/usr/local/go/bin' >> $BASH_ENV

wget https://github.com/gotestyourself/gotestsum/releases/download/v1.8.2/gotestsum_1.8.2_linux_amd64.tar.gz
Expand Down Expand Up @@ -573,7 +573,7 @@ jobs:
- checkout
- install-prereqs
- create-kind-clusters:
version: "v1.25.3"
version: "v1.26.0"
- restore_cache:
keys:
- consul-helm-modcache-v2-{{ checksum "acceptance/go.mod" }}
Expand Down Expand Up @@ -606,7 +606,7 @@ jobs:
- checkout
- install-prereqs
- create-kind-clusters:
version: "v1.25.3"
version: "v1.26.0"
- restore_cache:
keys:
- consul-helm-modcache-v2-{{ checksum "acceptance/go.mod" }}
Expand Down Expand Up @@ -723,7 +723,7 @@ jobs:
#############################
# CLOUD ACCEPTANCE TEST JOBS
#############################
acceptance-gke-1-23:
acceptance-gke-1-25:
parallelism: 2
environment:
- TEST_RESULTS: /tmp/test-results
Expand Down Expand Up @@ -773,7 +773,7 @@ jobs:
- run: mkdir -p $TEST_RESULTS

- run-acceptance-tests:
additional-flags: -kubeconfig="$primary_kubeconfig" -secondary-kubeconfig="$secondary_kubeconfig" -enable-pod-security-policies -enable-transparent-proxy -consul-image=hashicorppreview/consul-enterprise:1.14-dev
additional-flags: -kubeconfig="$primary_kubeconfig" -secondary-kubeconfig="$secondary_kubeconfig" -enable-transparent-proxy -consul-image=hashicorppreview/consul-enterprise:1.14-dev

- store_test_results:
path: /tmp/test-results
Expand All @@ -792,7 +792,7 @@ jobs:
fail_only: true
failure_message: "GKE acceptance tests failed. Check the logs at: ${CIRCLE_BUILD_URL}"

acceptance-gke-cni-1-23:
acceptance-gke-cni-1-25:
parallelism: 2
environment:
- TEST_RESULTS: /tmp/test-results
Expand Down Expand Up @@ -842,7 +842,7 @@ jobs:
- run: mkdir -p $TEST_RESULTS

- run-acceptance-tests:
additional-flags: -use-gke -kubeconfig="$primary_kubeconfig" -secondary-kubeconfig="$secondary_kubeconfig" -enable-pod-security-policies -enable-transparent-proxy -enable-cni -consul-image=hashicorppreview/consul-enterprise:1.14-dev
additional-flags: -use-gke -kubeconfig="$primary_kubeconfig" -secondary-kubeconfig="$secondary_kubeconfig" -enable-transparent-proxy -enable-cni -consul-image=hashicorppreview/consul-enterprise:1.14-dev

- store_test_results:
path: /tmp/test-results
Expand All @@ -861,7 +861,7 @@ jobs:
fail_only: true
failure_message: "GKE CNI acceptance tests failed. Check the logs at: ${CIRCLE_BUILD_URL}"

acceptance-aks-1-22:
acceptance-aks-1-24:
parallelism: 3
environment:
- TEST_RESULTS: /tmp/test-results
Expand Down Expand Up @@ -918,7 +918,7 @@ jobs:
fail_only: true
failure_message: "AKS acceptance tests failed. Check the logs at: ${CIRCLE_BUILD_URL}"

acceptance-aks-cni-1-22:
acceptance-aks-cni-1-24:
parallelism: 3
environment:
- TEST_RESULTS: /tmp/test-results
Expand Down Expand Up @@ -974,7 +974,7 @@ jobs:
fail_only: true
failure_message: "AKS CNI acceptance tests failed. Check the logs at: ${CIRCLE_BUILD_URL}"

acceptance-eks-1-21:
acceptance-eks-1-23:
parallelism: 3
environment:
- TEST_RESULTS: /tmp/test-results
Expand Down Expand Up @@ -1037,7 +1037,7 @@ jobs:
fail_only: true
failure_message: "EKS acceptance tests failed. Check the logs at: ${CIRCLE_BUILD_URL}"

acceptance-eks-cni-1-21:
acceptance-eks-cni-1-23:
parallelism: 3
environment:
- TEST_RESULTS: /tmp/test-results
Expand Down Expand Up @@ -1193,7 +1193,7 @@ jobs:
- slack/status:
channel: *slack-channel
fail_only: true
failure_message: "Acceptance tests against Kind with Kubernetes v1.23 with Consul 1.12 nightly failed. Check the logs at: ${CIRCLE_BUILD_URL}"
failure_message: "Acceptance tests against Kind with Kubernetes v1.25 with Consul 1.12 nightly failed. Check the logs at: ${CIRCLE_BUILD_URL}"

acceptance-kind-1-23-consul-compat-nightly-1-13:
environment:
Expand Down Expand Up @@ -1234,7 +1234,7 @@ jobs:
- slack/status:
channel: *slack-channel
fail_only: true
failure_message: "Acceptance tests against Kind with Kubernetes v1.23 with Consul 1.13 nightly failed. Check the logs at: ${CIRCLE_BUILD_URL}"
failure_message: "Acceptance tests against Kind with Kubernetes v1.25 with Consul 1.13 nightly failed. Check the logs at: ${CIRCLE_BUILD_URL}"

########################
# WORKFLOWS
Expand Down Expand Up @@ -1264,16 +1264,17 @@ workflows:
- acceptance:
context: consul-ci
requires:
- dev-upload-docker
- dev-upload-docker
- acceptance-tproxy-cni:
context: consul-ci
requires:
- dev-upload-docker
- dev-upload-docker
- acceptance-tproxy:
context: consul-ci
requires:
- dev-upload-docker


nightly-cleanup:
triggers:
- schedule:
Expand Down Expand Up @@ -1310,15 +1311,15 @@ workflows:
- build-distros-linux
# Disable until we can use UBI images.
# - acceptance-openshift
- acceptance-gke-1-23:
- acceptance-gke-1-25:
requires:
- dev-upload-docker
- acceptance-gke-cni-1-23:
- dev-upload-docker
- acceptance-gke-cni-1-25:
requires:
- acceptance-gke-1-23
- acceptance-gke-1-25
- acceptance-tproxy:
requires:
- dev-upload-docker
- dev-upload-docker

nightly-acceptance-tests-main:
description: |
Expand All @@ -1342,24 +1343,24 @@ workflows:
- build-distros-linux
# Disable until we can use UBI images.
# - acceptance-openshift
- acceptance-gke-1-23:
- acceptance-gke-1-25:
requires:
- dev-upload-docker
- acceptance-gke-cni-1-23:
- acceptance-gke-cni-1-25:
requires:
- acceptance-gke-1-23
- acceptance-eks-1-21:
- acceptance-gke-1-25
- acceptance-eks-1-23:
requires:
- dev-upload-docker
- acceptance-eks-cni-1-21:
- acceptance-eks-cni-1-23:
requires:
- acceptance-eks-1-21
- acceptance-aks-1-22:
- acceptance-eks-1-23
- acceptance-aks-1-24:
requires:
- dev-upload-docker
- acceptance-aks-cni-1-22:
- acceptance-aks-cni-1-24:
requires:
- acceptance-aks-1-22
- acceptance-aks-1-24
- acceptance-tproxy:
requires:
- dev-upload-docker
Expand Down
32 changes: 32 additions & 0 deletions .github/workflows/backport-checker.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
# This workflow checks that there is either a 'pr/no-backport' label applied to a PR
# or there is a backport/<pr number>.txt file associated with a PR for a backport label

name: Backport Checker

on:
pull_request:
types: [opened, synchronize, labeled]
# Runs on PRs to main and all release branches
branches:
- main
- release/*

jobs:
# checks that a backport label is present for a PR
backport-check:
# If there's a `pr/no-backport` label we ignore this check. Also, we ignore PRs created by the bot assigned to `backport-assistant`
if: "! ( contains(github.event.pull_request.labels.*.name, 'pr/no-backport') || github.event.pull_request.user.login == 'hc-github-team-consul-core' )"
runs-on: ubuntu-latest

steps:
- name: Check for Backport Label
run: |
labels="${{join(github.event.pull_request.labels.*.name, ', ') }}"
if [[ "$labels" =~ .*"backport/".* ]]; then
echo "Found backport label!"
exit 0
fi
# Fail status check when no backport label was found on the PR
echo "Did not find a backport label matching the pattern 'backport/*' and the 'pr/no-backport' label was not applied. Reference - https://github.com/hashicorp/consul-k8s/pull/1982"
exit 1

46 changes: 46 additions & 0 deletions .github/workflows/changelog-checker.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
# This workflow checks that there is either a 'pr/no-changelog' label applied to a PR
# or there is a .changelog/<pr number>.txt file associated with a PR for a changelog entry

name: Changelog Checker

on:
pull_request:
types: [opened, synchronize, labeled]
# Runs on PRs to main and all release branches
branches:
- main
- release/*

jobs:
# checks that a .changelog entry is present for a PR
changelog-check:
# If there's a `pr/no-changelog` label we ignore this check. Also, we ignore PRs created by the bot assigned to `backport-assistant`
if: "! ( contains(github.event.pull_request.labels.*.name, 'pr/no-changelog') || github.event.pull_request.user.login == 'hc-github-team-consul-core' )"
runs-on: ubuntu-latest

steps:
- uses: actions/checkout@v2
with:
ref: ${{ github.event.pull_request.head.sha }}
fetch-depth: 0 # by default the checkout action doesn't checkout all branches
- name: Check for changelog entry in diff
run: |
# check if there is a diff in the .changelog directory
# for PRs against the main branch, the changelog file name should match the PR number
if [ "${{ github.event.pull_request.base.ref }}" = "${{ github.event.repository.default_branch }}" ]; then
enforce_matching_pull_request_number="matching this PR number "
changelog_file_path=".changelog/(_)?${{ github.event.pull_request.number }}.txt"
else
changelog_file_path=".changelog/[_0-9]*.txt"
fi

changelog_files=$(git --no-pager diff --name-only HEAD "$(git merge-base HEAD "origin/main")" | egrep ${changelog_file_path})

# If we do not find a file in .changelog/, we fail the check
if [ -z "$changelog_files" ]; then
# Fail status check when no .changelog entry was found on the PR
echo "Did not find a .changelog entry ${enforce_matching_pull_request_number}and the 'pr/no-changelog' label was not applied. Reference - https://github.com/hashicorp/consul-k8s/pull/1947"
exit 1
else
echo "Found .changelog entry in PR!"
fi
Loading