Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of fixes for unsupported partitions field in CRD metadata block into release/1.14.x #16605

Merged
Show file tree
Hide file tree
Changes from 250 commits
Commits
Show all changes
601 commits
Select commit Hold shift + click to select a range
6e425f7
docs: Migrate link formats (#15976)
ashleemboyer Jan 25, 2023
dbaab52
Post upgrade test validation: envoy endpoint and register service (#1…
huikang Jan 25, 2023
e0f4f6c
Run config entry controller routines on leader (#16054)
nathancoleman Jan 25, 2023
f4f62b5
feat: panic handler in rpc rate limit interceptor (#16022)
JadhavPoonam Jan 25, 2023
ebdb8e5
flaky test: use retry long to wait for config entry upgrade (#16068)
huikang Jan 26, 2023
0edebe6
Update service-resolver.mdx (#16073)
danielehc Jan 26, 2023
eb971cb
docs: update Nomad 1.14 upgrade note to detail additonal info. (#16071)
boxofrad Jan 26, 2023
abfdc35
docs: CLI page descriptions for automated checker (#16056)
boruszak Jan 26, 2023
44c6087
docs: Consul at scale guide (#15890)
boruszak Jan 26, 2023
3febdbf
Add trigger for doing reconciliation based on watch sets (#16052)
Jan 26, 2023
94eb953
Fixes (#16086)
boruszak Jan 26, 2023
a1498b0
Mw/lambda envoy extension parse region (#4107) (#16069)
wilkermichael Jan 26, 2023
7814471
Match route and listener protocols when binding (#16057)
Jan 27, 2023
ad43846
Remove legacy acl tokens (#15947)
skpratt Jan 27, 2023
5fa9ab2
integ test: remove hardcoded upstream local bind port and max number …
huikang Jan 27, 2023
ffb8178
Upgrade test: peering control plane traffic through mesh gateway (#16…
huikang Jan 27, 2023
da99514
Add a server-only method for updating ConfigEntry Statuses (#16053)
Jan 27, 2023
8728a44
troubleshoot: service to service validation (#16096)
ndhanushkodi Jan 27, 2023
6026528
Changelog for Consul 1.14.4, 1.13.6, and 1.12.9 (#16098)
analogue Jan 27, 2023
997c44d
add missing field to oss struct (#16094)
skpratt Jan 28, 2023
9da61c1
Upgrade test: retain sidecar containers during upgrade. (#16100)
huikang Jan 30, 2023
9004163
Update docs for tls commands (#16077)
Jan 30, 2023
1b02749
Add extension validation on config save and refactor extensions. (#16…
hashi-derek Jan 30, 2023
9db5b7d
feat: apply retry policy to read only grpc endpoints (#16085)
JadhavPoonam Jan 31, 2023
f6da81c
improvement: prevent filter being added twice from any enovy extensio…
huikang Jan 31, 2023
b19c5a9
Add Envoy extension metrics. (#16114)
hashi-derek Jan 31, 2023
d53c331
Add a flag for enabling debug logs to the `connect envoy` command (#1…
kyhavlov Jan 31, 2023
1fbfb59
APIGateway HTTPRoute scaffolding (#15859)
Feb 1, 2023
08a19e5
NO_JIRA: Add function to get container status before making api call …
NiniOak Feb 1, 2023
06338c8
Add unit test and update golden files. (#16115)
hashi-derek Feb 1, 2023
6e814c5
add troubleshoot cli (#16070)
Feb 1, 2023
6e8716c
Ent merge move envoy extension proto (#16126)
wilkermichael Feb 1, 2023
b15a6e0
update troubleshoot CLI (#16129)
Feb 1, 2023
5737b55
Docs: change connect to SM for mTLS page (#16082)
nrichu-hcp Feb 2, 2023
71b5a4b
validate certs and get stats (#16139)
Feb 2, 2023
8d4c3aa
refactor: move service to service validation to troubleshoot package …
ndhanushkodi Feb 3, 2023
e40b731
rate: add prometheus definitions, docs, and clearer names (#15945)
boxofrad Feb 3, 2023
a884d0d
Use agent token for service/check deregistration during anti-entropy …
Feb 3, 2023
fcf1822
add assertions (#16087)
NiniOak Feb 3, 2023
2f149d6
[OSS] Add Peer field to service-defaults upstream overrides (#15956)
hashi-derek Feb 3, 2023
143b2bc
API Gateway Controller Logic (#16058)
sarahalsmiller Feb 3, 2023
f1d18f1
docs(service-defaults): upstream overrides for peered services (#16122)
DanStough Feb 3, 2023
5c836f2
fix goroutine leak in renew testing (#16142)
eikenb Feb 3, 2023
92ac3c2
docs: use proxy health checks when enabled (#16033)
thisisnotashwin Feb 3, 2023
edef990
command: Fix logger not initializing properly in envoy command (#16148)
kyhavlov Feb 3, 2023
9e184e1
Update helm docs based on consul-k8s release/1.0.x branch (#16157)
curtbushko Feb 4, 2023
a010902
Remove legacy acl policies (#15922)
skpratt Feb 6, 2023
674c557
Set `codegen-tools` to be a dependency of `deep-copy` (#16124)
Feb 6, 2023
24c4312
feat: client RPC is retries on ErrRetryElsewhere error and forwardReq…
JadhavPoonam Feb 6, 2023
b8b37c2
refactor: remove troubleshoot module dependency on consul top level m…
ndhanushkodi Feb 6, 2023
98cf66d
Document how numRetries can't be set to 0 (#16123)
lkysow Feb 6, 2023
a837984
docs: refine server TLS Vault PKI role config (#16166)
jkirschner-hashicorp Feb 6, 2023
54f198f
Add links in release-notes for the last five patch releases (#16109)
analogue Feb 6, 2023
f58d5bb
NET-2087: Restart proxy sidecar during cluster upgrade (#16140)
NiniOak Feb 6, 2023
8b98c1a
docs(service-resolver): clarify the default time unit in service-reso…
huikang Feb 6, 2023
c680a35
Net 2229/rpc reduce max retries 2 (#16165)
dhiaayachi Feb 6, 2023
e42ab7e
Remove empty tags 2 (#16113)
dhiaayachi Feb 6, 2023
906ebb9
change log level (#16128)
xwa153 Feb 6, 2023
cd42f7c
Rotate Circle CI SSH Key (#16178)
Feb 6, 2023
e85fdfd
revert ui changes (#16180)
skpratt Feb 6, 2023
3be514a
exclude inbound/outbound listeners from upstreams output (#16184)
Feb 7, 2023
57a9119
Add missing doc for gRPC TLS (#16161)
dttung2905 Feb 7, 2023
9edb625
docs: update redirected links (#16179)
Feb 7, 2023
9881aa3
add cert tests (#16192)
Feb 7, 2023
9199e99
Update token language to distinguish Accessor and Secret ID usage (#1…
skpratt Feb 7, 2023
b415178
Upgrade test: verify the agent token is working after upgrade (#16164)
huikang Feb 7, 2023
1e7e52e
revert method name change in xds server protocol for version compatib…
skpratt Feb 7, 2023
ed7367b
remove redundant vault api retry logic (#16143)
eikenb Feb 7, 2023
0a54480
get upstream IPs (#16197)
Feb 7, 2023
256320b
Bump github.com/prometheus/client_golang from 1.4.0 to 1.14.0 (#15292)
dependabot[bot] Feb 7, 2023
e91bc9c
feat: envoy extension - http local rate limit (#16196)
huikang Feb 8, 2023
5397e9e
Adding experimental support for a more efficient LogStore implementat…
banks Feb 8, 2023
df03b45
Add additional controller implementations (#16188)
Feb 8, 2023
898e59b
Add the `operator usage instances` command and api endpoint (#16205)
kyhavlov Feb 8, 2023
1f25289
troubleshoot: output messages for the troubleshoot proxy command (#16…
ndhanushkodi Feb 8, 2023
72a7366
Implement APIGateway proxycfg snapshot (#16194)
nathancoleman Feb 8, 2023
33881cf
UI: Update padding for the content wrapper (#16209)
Feb 8, 2023
ad7b71d
troubleshoot: handle tproxy dialed directly case (#16210)
ndhanushkodi Feb 8, 2023
6f0b226
ACL error improvements: incomplete bootstrapping and non-existent tok…
skpratt Feb 8, 2023
f5391ef
update troubleshoot CLI, update flags and upstreams output (#16211)
Feb 9, 2023
d72ad5f
Merge pull request #4216 from hashicorp/NET-2252-add-assert-fortionam…
NiniOak Feb 9, 2023
0891b45
Clean-up Gateway Controller Binding Logic (#16214)
Feb 9, 2023
f4210d4
Add basic smoke test to make sure an APIGateway runs (#16217)
Feb 9, 2023
e81a0c2
API Gateway to Ingress Gateway Snapshot Translation and Routes to Vir…
Feb 9, 2023
dae88b1
Fix typo in checks.mdx (#16187)
oneoneonepig Feb 9, 2023
ba862ab
troubleshoot basic envoy stats for an upstream (#16215)
Feb 9, 2023
99cf421
Add some fixes to allow for registering via consul connect envoy -gat…
Feb 9, 2023
db2bd40
Synthesize anonymous token pre-bootstrap when needed (#16200)
skpratt Feb 9, 2023
3b9c569
Simple API Gateway e2e test for tcp routes (#16222)
Feb 9, 2023
78a4b5f
update the api in envoyextensions and troubleshoot modules (#16226)
ndhanushkodi Feb 9, 2023
4f2ce60
Fix peering acceptors in secondary datacenters. (#16230)
hashi-derek Feb 10, 2023
318ba21
[API Gateway] Add integration test for conflicted TCP listeners (#16225)
Feb 10, 2023
80fb18a
troubleshoot: make output have tables and colors (#16235)
ndhanushkodi Feb 10, 2023
4c848a5
Fix missing references to enterprise metadata (#16237)
Feb 10, 2023
8ff2974
[API Gateway] Update simple test to leverage intentions and multiple …
Feb 10, 2023
663a564
[UI]: update Ember to 3.27 (#16227)
valeriia-ruban Feb 10, 2023
a464c15
ui: add vercel info to the ui readme (#16239)
Feb 13, 2023
8979e64
Bump x/time to 0.3.0 and fix related breakage linked to RPCRateLimit …
analogue Feb 13, 2023
3f22879
UI: CC-4032 - Update sidebar width (#16204)
Feb 13, 2023
ab5dac3
upgrade test: peering with http router config entry (#16231)
huikang Feb 13, 2023
9bb0ecf
[API Gateway] Add integration test for HTTP routes (#16236)
Feb 13, 2023
5b7f36c
integ test: fix retry upstream test (#16246)
huikang Feb 13, 2023
c10ba43
get clusters from route if listener uses RDS (#16243)
Feb 13, 2023
dc2aa36
Update index.mdx (#16247)
nrichu-hcp Feb 13, 2023
8fbd15a
[OSS] Post Consul 1.15 updates (#16256)
DanStough Feb 14, 2023
247211d
add integration tests for troubleshoot (#16223)
Feb 14, 2023
fd61605
upgrade test: fix flaky peering through mesh gateway (#16271)
huikang Feb 15, 2023
dd0ca48
Add inline-certificate as possible payload of config-entry wrapper (#…
nathancoleman Feb 15, 2023
1d9ee50
[OSS] connect: Bump Envoy 1.22.5 to 1.22.7, 1.23.2 to 1.23.4, 1.24.0 …
curtbushko Feb 15, 2023
6599a9b
Fix nil-pointer panics from proxycfg package. (#16277)
hashi-derek Feb 15, 2023
514fb25
Fix infinite recursion in inline-certificate config entry (#16276)
nathancoleman Feb 15, 2023
c5e729e
Docs/reformat service splitters conf entry (#16264)
trujillo-adam Feb 15, 2023
3011228
Fix mesh gateways incorrectly matching peer locality. (#16257)
hashi-derek Feb 16, 2023
388876c
add server side rate-limiter changelog entry (#16292)
dhiaayachi Feb 16, 2023
2460ac9
API Gateway Envoy Golden Listener Tests (#16221)
Feb 16, 2023
8dab825
troubleshoot: fixes and updated messages (#16294)
ndhanushkodi Feb 17, 2023
b3ddd4d
Inline API Gateway TLS cert code (#16295)
Feb 17, 2023
a8dc108
ISSUE_TEMPLATE: Update issue template to include ask for HCL config f…
Feb 17, 2023
e4a992c
Fix hostname alignment checks for HTTPRoutes (#16300)
Feb 17, 2023
ee99d5c
Fix panicky xDS test flakes (#16305)
Feb 17, 2023
58801cc
Add stricter validation and some normalization code for API Gateway C…
Feb 17, 2023
9ed554b
ISSUE TEMPLATE: update issue templates to include comments instead of…
Feb 17, 2023
f143610
[OSS] security: update go to 1.20.1 (#16263)
DanStough Feb 17, 2023
085c0ad
Protobuf Refactoring for Multi-Module Cleanliness (#16302)
mkeeler Feb 17, 2023
c9c49ea
new docs for consul and consul-k8s troubleshoot command (#16284)
Feb 17, 2023
15d2684
Normalize all API Gateway references (#16316)
Feb 17, 2023
4607b53
Fix HTTPRoute and TCPRoute expectation for enterprise metadata (#16322)
Feb 17, 2023
4126088
ISSUE_TEMPLATE: formatting for comments (#16325)
Feb 17, 2023
82b5b4c
fix: revert go mod compat for sdk,api to 1.19 (#16323)
DanStough Feb 18, 2023
8e5942f
fix: add tls config to unix socket when https is used (#16301)
huikang Feb 21, 2023
9d55cd1
fix flakieness (#16338)
xwa153 Feb 21, 2023
8997f2b
chore: document and unit test sdk/testutil/retry (#16049)
nfi-hashicorp Feb 21, 2023
7f9ec78
[API Gateway] Validate listener name is not empty (#16340)
Feb 21, 2023
ad865f5
Fix issue with peer services incorrectly appearing as connect-enabled…
hashi-derek Feb 21, 2023
823fc82
[API Gateway] Turn down controller log levels (#16348)
Feb 22, 2023
18e2ee7
[API Gateway] Fix targeting service splitters in HTTPRoutes (#16350)
Feb 22, 2023
0972697
[API Gateway] Various fixes for Config Entry fields (#16347)
Feb 22, 2023
de17c7c
upgrade test: splitter and resolver config entry in peered cluster (#…
huikang Feb 22, 2023
5309f68
Upgrade Alpine image to 3.17 (#16358)
hashi-derek Feb 22, 2023
b09d04a
Update existing docs from Consul API Gateway -> API Gateway for Kuber…
nathancoleman Feb 22, 2023
84c7b00
initial code (#16296)
NiniOak Feb 22, 2023
c0384c2
Add changelog entry for API Gateway (Beta) (#16369)
nathancoleman Feb 22, 2023
641737f
[API Gateway] Fix infinite loop in controller and binding non-accepte…
Feb 22, 2023
ae9c228
Rate limiter/add ip prefix (#16342)
dhiaayachi Feb 22, 2023
182f6c8
Documentation update: Adding K8S clusters to external Consul servers …
Ranjandas Feb 22, 2023
5400e3d
Add docs for usage endpoint and command (#16258)
kyhavlov Feb 22, 2023
98a771d
NET-2285: Assert total number of expected instances by Consul (#16371)
NiniOak Feb 22, 2023
2e6b7d7
set BRANCH_NAME to release-1.15.x (#16374)
curtbushko Feb 22, 2023
340b562
Docs/rate limiting 1.15 (#16345)
trujillo-adam Feb 22, 2023
0c66bbf
[UI] CC-4031: change from Action, a and button to hds::Button (#16251)
valeriia-ruban Feb 22, 2023
8ac211b
Correct WAL metrics registrations (#16388)
banks Feb 23, 2023
3358d82
chore: remove stable-website (#16386)
DanStough Feb 23, 2023
595131f
Refactor the disco chain -> xds logic (#16392)
erichaberkorn Feb 23, 2023
27af33e
Add envoy extension docs (#16376)
im2nguyen Feb 23, 2023
3de9f7f
upgrade test: peering with resolver and failover (#16391)
huikang Feb 23, 2023
d1294cf
Troubleshoot service to service comms (#16385)
boruszak Feb 23, 2023
cddf86f
Docs/cluster peering 1.15 updates (#16291)
boruszak Feb 23, 2023
7c9801e
Fix rendering error on new operator usage docs (#16393)
nathancoleman Feb 23, 2023
4653d82
add missing field to oss struct (#16401)
skpratt Feb 23, 2023
6b5e48b
fix(docs): correct rate limit metrics (#16400)
JadhavPoonam Feb 23, 2023
a518893
Fix various flaky tests (#16396)
Feb 23, 2023
3c77a89
Native API Gateway Docs (#16365)
Feb 23, 2023
1ed70cf
NET-2286: Add tests to verify traffic redirects between services (#16…
NiniOak Feb 23, 2023
d4dee31
Try DRYing up createCluster in integration tests (#16199)
analogue Feb 23, 2023
ab0d43e
add back staging bits (#16411)
claire-labry Feb 24, 2023
dca7c18
Fix a couple inconsistencies in `operator usage instances` command (#…
kyhavlov Feb 24, 2023
94b3789
NO_JIRA: refactor validate function in traffic mgt tests (#16422)
NiniOak Feb 24, 2023
d99dcd4
Basic gobased API gateway spinup test (#16278)
sarahalsmiller Feb 24, 2023
801a173
Fix attempt for test fail panics in xDS (#16319)
Feb 24, 2023
1ba5e36
update changelog (#16426)
Feb 24, 2023
d9e6748
feat: update alerts to Hds::Alert component (CC-4035) (#16412)
valeriia-ruban Feb 25, 2023
859abf8
fix: ui tests run is fixed (applying class attribute twice to the hbs…
valeriia-ruban Feb 25, 2023
ec4a2e1
Refactor and move wal docs (#16387)
im2nguyen Feb 27, 2023
06ff422
UI: Update Consul UI colors to use HDS colors (#16111)
ellacai Feb 27, 2023
378f017
Add missing link (#16437)
im2nguyen Feb 27, 2023
344411b
docs: remove extra whitespace in frontmatter (#16436)
Feb 27, 2023
1606472
Delete Vagrantfile (#16442)
Feb 27, 2023
c771346
upgrade test: consolidate resolver test cases (#16443)
huikang Feb 27, 2023
a0862e6
UI: Fix rendering issue in search and lists (#16444)
Feb 27, 2023
afbc566
Update docs for consul-k8s 1.1.0 (#16447)
curtbushko Feb 28, 2023
3cbbd63
Update ingress-gateways.mdx (#16330)
amitchahalgits Feb 28, 2023
73b9b40
grpc: fix data race in balancer registration (#16229)
boxofrad Feb 28, 2023
2682021
cli: ensure acl token read -self works (#16445)
rboyer Feb 28, 2023
04f9c6b
docs: Add backwards compatibility for Consul 1.14.x and consul-datapl…
Feb 28, 2023
29db217
gateways: add e2e test for API Gateway HTTPRoute ParentRef change (#1…
mikemorris Feb 28, 2023
6db445b
Gateway Test HTTPPathRewrite (#16418)
sarahalsmiller Feb 28, 2023
ec593c2
cli: remove stray whitespace when loading the consul version from the…
rboyer Feb 28, 2023
23e247d
Docs/services refactor docs day 122022 (#16103)
trujillo-adam Feb 28, 2023
be800f0
docs: clarify license expiration upgrade behavior (#16464)
skpratt Feb 28, 2023
4f2d9a9
add provider ca auth-method support for azure
eikenb Mar 1, 2023
1f422f3
Changed titles for services pages to sentence style cap (#16477)
trujillo-adam Mar 1, 2023
66de1de
docs: Consul 1.15.0 and Consul K8s 1.0 release notes (#16481)
Mar 1, 2023
3970115
fix (cli): return error msg if acl policy not found (#16485)
huikang Mar 1, 2023
5ac1bdd
update services nav titles (#16484)
trujillo-adam Mar 1, 2023
4f8594b
Improve ux to help users avoid overwriting fields of ACL tokens, role…
roncodingenthusiast Mar 1, 2023
367a64f
NET-2292: port ingress-gateway test case "http" from BATS addendum (#…
nfi-hashicorp Mar 1, 2023
21c3095
docs: Update release notes with Envoy compat issue (#16494)
Mar 1, 2023
b177dc4
Suppress AlreadyRegisteredError to fix test retries (#16501)
Mar 2, 2023
321439f
Speed up test by registering services concurrently (#16509)
Mar 2, 2023
4211069
add provider ca support for jwt file base auth
eikenb Mar 2, 2023
bbbdc5f
docs(architecture): remove merge conflict leftovers (#16507)
karras Mar 2, 2023
e8eec1f
add provider ca auth support for kubernetes
eikenb Mar 2, 2023
2b6d35f
Merge pull request #4538 from hashicorp/NET-2396 (#16516)
NiniOak Mar 2, 2023
358c35e
Merge pull request #4584 from hashicorp/refactor_cluster_config (#16517)
NiniOak Mar 2, 2023
4b661d1
Add ServiceResolver RequestTimeout for route timeouts to make Termina…
Mar 3, 2023
5deffbd
Fix issue where terminating gateway service resolvers weren't properl…
Mar 3, 2023
5f81662
Add support for failover policies (#16505)
erichaberkorn Mar 3, 2023
c517f07
modified unsupported envoy version error (#16518)
wilkermichael Mar 3, 2023
84156af
Remove private prefix from proto-gen-rpc-glue e2e test (#16433)
mkeeler Mar 3, 2023
cc0765b
Fix resolution of service resolvers with subsets for external upstrea…
Mar 3, 2023
43bd351
fixed broken links associated with cluster peering updates (#16523)
trujillo-adam Mar 3, 2023
56ffee6
add provider ca support for approle auth-method
eikenb Mar 3, 2023
8910002
update connect/ca's vault AuthMethod conf section (#16346)
eikenb Mar 3, 2023
9a485cd
proxycfg: ensure that an irrecoverable error in proxycfg closes the x…
rboyer Mar 3, 2023
129eca8
NET-2903 Normalize weight for http routes (#16512)
missylbytes Mar 3, 2023
897e5ef
Add some basic UI improvements for api-gateway services (#16508)
Mar 3, 2023
9e93a30
fixes empty link in DNS usage page (#16534)
trujillo-adam Mar 3, 2023
fc23232
NET-2904 Fixes API Gateway Route Service Weight Division Error
missylbytes Mar 6, 2023
bf501a3
Improve ux around ACL token to help users avoid overwriting node/serv…
roncodingenthusiast Mar 6, 2023
8daddff
Follow-up fixes to consul connect envoy command (#16530)
Mar 6, 2023
9d8e00d
Merge pull request #4573 from hashicorp/NET-2841 (#16544)
NiniOak Mar 6, 2023
94ecb9c
upgrade test: discovery chain across partition (#16543)
huikang Mar 6, 2023
6166889
Update the consul-k8s cli docs for the new `proxy log` subcommand (#1…
jm96441n Mar 6, 2023
7ea2bd6
Delete test-link-rewrites.yml (#16546)
ashleemboyer Mar 6, 2023
63204b5
feat: update notification to use hds toast component (#16519)
valeriia-ruban Mar 6, 2023
f135b14
Fix flakey tests related to ACL token updates (#16545)
roncodingenthusiast Mar 6, 2023
f5641ff
support vault auth config for alicloud ca provider
eikenb Mar 7, 2023
a5b8256
Update docs to reflect functionality (#16549)
im2nguyen Mar 7, 2023
b649a5e
upgrade test: use retry with ModifyIndex and remove ent test file (#1…
huikang Mar 7, 2023
dbaf8bf
add agent locality and replicate it across peer streams (#16522)
erichaberkorn Mar 7, 2023
58016d1
docs: Document config entry permissions (#16556)
Mar 7, 2023
3d75ab8
Broken link fixes (#16566)
eddie-rowe Mar 7, 2023
280bdd3
NET-2954: Improve integration tests CI execution time (#16565)
NiniOak Mar 8, 2023
89de91b
fix bug that can lead to peering service deletes impacting the state …
erichaberkorn Mar 8, 2023
e5c2818
Update changelog with patch releases (#16576)
analogue Mar 8, 2023
9a5cb20
Bump submodules from latest 1.15.1 patch release (#16578)
analogue Mar 8, 2023
e2c4a78
website: adds content-check command and README update (#16579)
Mar 8, 2023
47db3d7
added a backport-checker GitHub action (#16567)
wilkermichael Mar 9, 2023
040647e
auto-updated agent/uiserver/dist/ from commit 63204b518 (#16587)
Mar 9, 2023
176945a
GRPC stub for the ResourceService (#16528)
analogue Mar 9, 2023
e6aeb31
UI: Fix htmlsafe errors throughout the app (#16574)
Mar 9, 2023
fa93a0d
Add namespace file with build tag for OSS gateway tests (#16590)
jm96441n Mar 9, 2023
40312ac
JIRA pr check: Filter out OSS/ENT merges (#16593)
Mar 9, 2023
57e2493
allow setting locality on services and nodes (#16581)
erichaberkorn Mar 10, 2023
e298f50
Add Peer Locality to Discovery Chains (#16588)
erichaberkorn Mar 10, 2023
b7eae1e
fixes for unsupported partitions field in CRD metadata block
trujillo-adam Mar 10, 2023
92ea609
backport of commit b7eae1ebb3b2948d07bf5930e278453ddd6eb9e7
trujillo-adam Mar 10, 2023
39b0661
Merge b7eae1ebb3b2948d07bf5930e278453ddd6eb9e7 into backport/docs/rem…
hc-github-team-consul-core Mar 10, 2023
0f571a0
backport of commit 32bdd2cc35c653d70e466f0ef7b4576ac203bd3f
trujillo-adam Mar 10, 2023
e574ae5
Merge branch 'release/1.14.x' into backport/docs/remove-partition-fro…
trujillo-adam Mar 10, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
3 changes: 3 additions & 0 deletions .changelog/13782.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
deps: update to latest go-discover to provide ECS auto-discover capabilities.
```
4 changes: 4 additions & 0 deletions .changelog/14340.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:feature
connect: Add local_idle_timeout_ms to allow configuring the Envoy route idle timeout on local_app
connect: Add IdleTimeout to service-router to allow configuring the Envoy route idle timeout
```
6 changes: 3 additions & 3 deletions .changelog/14679.txt
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
```release-note:improvement
dns: **(Enterprise Only)** All enterprise locality labels are now optional in DNS lookups. For example, service lookups support the following format: <tag>.]<service>.service[.<namespace>.ns][.<partition>.ap][.<datacenter>.dc]<domain>`.
```
```release-note:improvement
dns: **(Enterprise Only)** All enterprise locality labels are now optional in DNS lookups. For example, service lookups support the following format: `[<tag>.]<service>.service[.<namespace>.ns][.<partition>.ap][.<datacenter>.dc]<domain>`.
```
1 change: 0 additions & 1 deletion .changelog/14930.txt

This file was deleted.

6 changes: 6 additions & 0 deletions .changelog/15050.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note:feature
cli: Add `-consul-dns-port` flag to the `consul connect redirect-traffic` command to allow forwarding DNS traffic to a specific Consul DNS port.
```
```release-note:feature
sdk: Configure `iptables` to forward DNS traffic to a specific DNS port.
```
3 changes: 3 additions & 0 deletions .changelog/15083.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: fixed bug where endpoint updates for new xDS clusters could block for 15s before being sent to Envoy.
```
3 changes: 3 additions & 0 deletions .changelog/15090.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:note
deps: Upgrade to use Go 1.19.2
```
6 changes: 6 additions & 0 deletions .changelog/15093.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note: improvement
connect: Add Envoy 1.24.0 to support matrix
```
```release-note: breaking-change
connect: Removes support for Envoy 1.20
```
3 changes: 3 additions & 0 deletions .changelog/15108.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: when wan address is set, peering stream should use the wan address.
```
3 changes: 3 additions & 0 deletions .changelog/15155.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
debug: fixed bug that caused consul debug CLI to error on ACL-disabled clusters
```
3 changes: 3 additions & 0 deletions .changelog/15160.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: fix nil pointer in calling handleUpdateService
```
3 changes: 3 additions & 0 deletions .changelog/15178.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix a bug that resulted in /v1/agent/metrics returning an error.
```
3 changes: 3 additions & 0 deletions .changelog/15186.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where mesh-gateway settings were not properly inherited from configuration entries.
```
3 changes: 3 additions & 0 deletions .changelog/15233.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note: improvement
integ test: fix flakiness due to test condition from retry app endoint
```
3 changes: 3 additions & 0 deletions .changelog/15253.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fixed issue where using Vault 1.11+ as CA provider would eventually break Intermediate CAs [[GH-15217](https://github.com/hashicorp/consul/issues/15217)]
```
3 changes: 3 additions & 0 deletions .changelog/15272.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
proxycfg(mesh-gateway): Fix issue where deregistered services are not removed from mesh-gateway clusters.
```
7 changes: 7 additions & 0 deletions .changelog/15302.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
```release-note:breaking-change
config: update 1.14 config defaults: Enable `peering` and `connect` by default.
```

```release-note:breaking-change
config: update 1.14 config defaults: Set gRPC TLS port default value to 8503
```
3 changes: 3 additions & 0 deletions .changelog/15317.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvements
acl: Allow reading imported services and nodes from cluster peers with read all permissions
```
3 changes: 3 additions & 0 deletions .changelog/15320.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: strip port from DNS SANs for ingress gateway leaf certificate to avoid an invalid hostname error when using the Vault provider.
```
2 changes: 1 addition & 1 deletion .changelog/14294.txt → .changelog/15339.txt
Original file line number Diff line number Diff line change
Expand Up @@ -2,5 +2,5 @@
config: Add new `ports.grpc_tls` configuration option.
Introduce a new port to better separate TLS config from the existing `ports.grpc` config.
The new `ports.grpc_tls` only supports TLS encrypted communication.
The existing `ports.grpc` currently supports both plain-text and tls communication, but tls support will be removed in a future release.
The existing `ports.grpc` now only supports plain-text communication.
```
3 changes: 3 additions & 0 deletions .changelog/15346.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:enhancement
acl: relax permissions on the `WatchServers`, `WatchRoots` and `GetSupportedDataplaneFeatures` gRPC endpoints to accept *any* valid ACL token
```
3 changes: 3 additions & 0 deletions .changelog/15356.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
Ensure that data imported from peers is filtered by ACLs at the UI Nodes/Services endpoints [CVE-2022-3920](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3920)
```
3 changes: 3 additions & 0 deletions .changelog/15370.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
auto-config: Relax the validation on auto-config JWT authorization to allow non-whitespace, non-quote characters in node names.
```
3 changes: 3 additions & 0 deletions .changelog/15423.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
sdk: Fix SDK testutil backwards compatibility by only configuring grpc_tls port for new Consul versions.
```
3 changes: 3 additions & 0 deletions .changelog/15466.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
cli: Fix issue where `consul connect envoy` incorrectly uses the HTTPS API configuration for xDS connections.
```
3 changes: 3 additions & 0 deletions .changelog/15503.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: fix the limit of replication gRPC message; set to 8MB
```
3 changes: 3 additions & 0 deletions .changelog/15525.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ca: Fixed issue where using Vault as Connect CA with Vault-managed policies would error on start-up if the intermediate PKI mount existed but was empty
```
3 changes: 3 additions & 0 deletions .changelog/15541.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
agent: Fixed issue where blocking queries with short waits could timeout on the client
```
3 changes: 3 additions & 0 deletions .changelog/15555.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
ui: Add field for fallback server addresses to peer token generation form
```
3 changes: 3 additions & 0 deletions .changelog/15596.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
dns: Add support for cluster peering `.service` and `.node` DNS queries.
```
3 changes: 3 additions & 0 deletions .changelog/15610.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
acl: avoid debug log spam in secondary datacenter servers due to management token not being initialized.
```
3 changes: 3 additions & 0 deletions .changelog/15615.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: better represent non-passing states during peer check flattening
```
3 changes: 3 additions & 0 deletions .changelog/15659.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: Add support for ConsulResolver to specifies a filter expression
```
3 changes: 3 additions & 0 deletions .changelog/15661.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fixed issue where using Vault 1.11+ as CA provider in a secondary datacenter would eventually break Intermediate CAs
```
3 changes: 3 additions & 0 deletions .changelog/15669.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: ensure all vault connect CA tests use limited privilege tokens
```
3 changes: 3 additions & 0 deletions .changelog/15690.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix peering failovers ignoring local mesh gateway configuration.
```
3 changes: 3 additions & 0 deletions .changelog/15697.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:breaking-change
peering: Newly created peering connections must use only lowercase characters in the `name` field. Existing peerings with uppercase characters will not be modified, but they may encounter issues in various circumstances. To maintain forward compatibility and avoid issues, it is recommended to destroy and re-create any invalid peering connections so that they do not have a name containing uppercase characters.
```
3 changes: 3 additions & 0 deletions .changelog/15701.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
grpc: Use new balancer implementation to reduce periodic WARN logs when shuffling servers.
```
3 changes: 3 additions & 0 deletions .changelog/15705.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
Upgrade to use Go 1.19.4. This resolves a vulnerability where restricted files can be read on Windows. [CVE-2022-41720](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41720)
```
4 changes: 4 additions & 0 deletions .changelog/15737.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:security
Upgrades `golang.org/x/net` to prevent a denial of service by excessive memory usage caused by HTTP2 requests. [CVE-2022-41717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41717)
```

3 changes: 3 additions & 0 deletions .changelog/15760.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where DialedDirectly configuration was not used by Consul Dataplane.
```
3 changes: 3 additions & 0 deletions .changelog/15769.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
agent: Fix assignment of error when auto-reloading cert and key file changes.
```
3 changes: 3 additions & 0 deletions .changelog/15789.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
xds: fix bug where sessions for locally-managed services could fail with "this server has too many xDS streams open"
```
3 changes: 3 additions & 0 deletions .changelog/15833.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where service-resolver protocol checks incorrectly errored for failover peer targets.
```
3 changes: 3 additions & 0 deletions .changelog/15865.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where watches on upstream failover peer targets did not always query the correct data.
```
3 changes: 3 additions & 0 deletions .changelog/15866.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
agent: Fix issue where the agent cache would incorrectly mark protobuf objects as updated.
```
3 changes: 3 additions & 0 deletions .changelog/15913.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
cli: Fix issue where `consul connect envoy` was unable to configure TLS over unix-sockets to gRPC.
```
3 changes: 3 additions & 0 deletions .changelog/15988.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvements
cli: Added a flag, `-enable-config-gen-logging`, to the `connect envoy` command to display log messages when generating the bootstrap config.
```
3 changes: 3 additions & 0 deletions .changelog/16000.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:breaking-change
connect: Fix configuration merging for transparent proxy upstreams. Proxy-defaults and service-defaults config entries were not correctly merged for implicit upstreams in transparent proxy mode and would result in some configuration not being applied. To avoid issues when upgrading, ensure that any proxy-defaults or service-defaults have correct configuration for upstreams, since all fields will now be properly used to configure proxies.
```
3 changes: 3 additions & 0 deletions .changelog/16015.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
connect: add flags `envoy-ready-bind-port` and `envoy-ready-bind-address` to the `consul connect envoy` command that allows configuration of readiness probe on proxy for any service kind.
```
4 changes: 4 additions & 0 deletions .changelog/16024.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:improvement
partitiion: **(Consul Enterprise only)** when loading service from on-disk config file or sending API request to agent endpoint,
if the partition is unspecified, consul will default the partition in the request to agent's partition
```
3 changes: 3 additions & 0 deletions .changelog/16230.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix issue where secondary wan-federated datacenters could not be used as peering acceptors.
```
3 changes: 3 additions & 0 deletions .changelog/16257.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix issue where mesh gateways would use the wrong address when contacting a remote peer with the same datacenter name.
```
4 changes: 4 additions & 0 deletions .changelog/16263.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:security
Upgrade to use Go 1.20.1.
This resolves vulnerabilities [CVE-2022-41724](https://go.dev/issue/58001) in `crypto/tls` and [CVE-2022-41723](https://go.dev/issue/57855) in `net/http`.
```
3 changes: 3 additions & 0 deletions .changelog/16339.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix bug where services were incorrectly imported as connect-enabled.
```
3 changes: 3 additions & 0 deletions .changelog/16358.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
container: Upgrade container image to use to Alpine 3.17.
```
3 changes: 3 additions & 0 deletions .changelog/16495.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
mesh: Add ServiceResolver RequestTimeout for route timeouts to make request timeouts configurable
```
3 changes: 3 additions & 0 deletions .changelog/16498.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
proxycfg: fix a bug where terminating gateways were not cleaning up deleted service resolvers for their referenced services
```
3 changes: 3 additions & 0 deletions .changelog/16499.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
mesh: Fix resolution of service resolvers with subsets for external upstreams
```
3 changes: 3 additions & 0 deletions .changelog/16570.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fixes a bug that can lead to peering service deletes impacting the state of local services
```
3 changes: 3 additions & 0 deletions .changelog/_3550.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
namespace: **(Enterprise Only)** Fixed a bug where a client may incorrectly log that namespaces were not enabled in the local datacenter
```
3 changes: 3 additions & 0 deletions .changelog/_3556.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
snapshot: **(Enterprise Only)** Add support for the snapshot agent to use an IAM role for authentication/authorization when managing snapshots in S3.
```
3 changes: 3 additions & 0 deletions .changelog/_3557.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
dns/peering: **(Enterprise Only)** Support addresses in the formats `<servicename>.virtual.<namespace>.ns.<partition>.ap.<peername>.peer.consul` and `<servicename>.virtual.<partition>.ap.<peername>.peer.consul`. This longer form address that allows specifying `.peer` would need to be used for tproxy DNS requests made within non-default partitions for imported services.
```
3 changes: 3 additions & 0 deletions .changelog/_3729.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
namespace: **(Enterprise Only)** Fix a bug that caused blocking queries during namespace replication to timeout
```
3 changes: 3 additions & 0 deletions .changelog/_3783.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
cli: **(Enterprise Only)** Fix issue where `consul partition update` subcommand was not registered and therefore not available through the cli.
```
3 changes: 3 additions & 0 deletions .changelog/_3846.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
agent: **(Enterprise Only)** Ensure configIntentionsConvertToList does not compare empty strings with populated strings when filtering intentions created prior to AdminPartitions.
```
2 changes: 1 addition & 1 deletion .circleci/bash_env.sh
Original file line number Diff line number Diff line change
Expand Up @@ -6,5 +6,5 @@ export GIT_DIRTY=$(test -n "`git status --porcelain`" && echo "+CHANGES" || true
export GIT_IMPORT=github.com/hashicorp/consul/version
# we're using this for build date because it's stable across platform builds
# the env -i and -noprofile are used to ensure we don't try to recursively call this profile when starting bash
export GIT_DATE=$(env -i /bin/bash --noprofile -norc ${CIRCLE_WORKING_DIRECTORY}/build-support/scripts/build-date.sh)
export GIT_DATE=$(env -i /bin/bash --noprofile -norc /home/circleci/project/build-support/scripts/build-date.sh)
export GOLDFLAGS="-X ${GIT_IMPORT}.GitCommit=${GIT_COMMIT}${GIT_DIRTY} -X ${GIT_IMPORT}.BuildDate=${GIT_DATE}"
Loading