Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

consul 1.15.3 #132601

Merged
merged 2 commits into from
Jun 2, 2023
Merged

consul 1.15.3 #132601

merged 2 commits into from
Jun 2, 2023

Conversation

p-linnane
Copy link
Member

Created by brew bump


Created with brew bump-formula-pr.

release notes
## 1.15.3 (June 1, 2023)

BREAKING CHANGES:

  • extensions: The Lua extension now targets local proxy listeners for the configured service's upstreams, rather than remote downstream listeners for the configured service, when ListenerType is set to outbound in extension configuration. See CVE-2023-2816 changelog entry for more details. [GH-17415]

SECURITY:

FEATURES:

  • hcp: Add new metrics sink to collect, aggregate and export server metrics to HCP in OTEL format. [GH-17460]

IMPROVEMENTS:

  • Fixes a performance issue in Raft where commit latency can increase by 100x or more when under heavy load. For more details see NetworkTransport make pipelining configurable and default to max 2 in flight. hashicorp/raft#541. [GH-17081]
  • agent: add a configurable maximimum age (default: 7 days) to prevent servers re-joining a cluster with stale data [GH-17171]
  • agent: add new metrics to track cpu disk and memory usage for server hosts (defaults to: enabled) [GH-17038]
  • connect: update supported envoy versions to 1.22.11, 1.23.8, 1.24.6, 1.25.4 [GH-16889]
  • envoy: add MaxEjectionPercent and BaseEjectionTime to passive health check configs. [GH-15979]
  • hcp: Add support for linking existing Consul clusters to HCP management plane. [GH-16916]
  • logging: change snapshot log header from agent.server.snapshot to agent.server.raft.snapshot [GH-17236]
  • peering: allow re-establishing terminated peering from new token without deleting existing peering first. [GH-16776]
  • peering: gRPC queries for TrustBundleList, TrustBundleRead, PeeringList, and PeeringRead now support blocking semantics, reducing network and CPU demand. The HTTP APIs for Peering List and Read have been updated to support blocking. [GH-17426]
  • raft: Remove expensive reflection from raft/mesh hot path [GH-16552]
  • xds: rename envoy_hcp_metrics_bind_socket_dir to envoy_telemetry_collector_bind_socket_dir to remove HCP naming references. [GH-17327]

BUG FIXES:

  • Fix an bug where decoding some Config structs with unset pointer fields could fail with reflect: call of reflect.Value.Type on zero Value. [GH-17048]
  • acl: (Enterprise only) Check permissions in correct partition/namespace when resolving service in non-default partition/namespace
  • acl: Fix an issue where the anonymous token was synthesized in non-primary datacenters which could cause permission errors when federating clusters with ACL replication enabled. [GH-17231]
  • acls: Fix ACL bug that can result in sidecar proxies having incorrect endpoints.
  • connect: Fix multiple inefficient behaviors when querying service health. [GH-17241]
  • gateways: Fix an bug where targeting a virtual service defined by a service-resolver was broken for HTTPRoutes. [GH-17055]
  • grpc: ensure grpc resolver correctly uses lan/wan addresses on servers [GH-17270]
  • namespaces: adjusts the return type from HTTP list API to return the api module representation of a namespace. This fixes an error with the consul namespace list command when a namespace has a deferred deletion timestamp.
  • peering: Fix issue where modifying the list of exported services did not correctly replicate changes for services that exist in a non-default namespace. [GH-17456]
  • peering: Fix issue where peer streams could incorrectly deregister services in various scenarios. [GH-17235]
  • peering: ensure that merged central configs of peered upstreams for partitioned downstreams work [GH-17179]
  • xds: Fix possible panic that can when generating clusters before the root certificates have been fetched. [GH-17185]

@github-actions github-actions bot added go Go use is a significant feature of the PR or issue bump-formula-pr PR was created using `brew bump-formula-pr` labels Jun 1, 2023
@github-actions
Copy link
Contributor

github-actions bot commented Jun 2, 2023

🤖 An automated task has requested bottles to be published to this PR.

@github-actions github-actions bot added the CI-published-bottle-commits The commits for the built bottles have been pushed to the PR branch. label Jun 2, 2023
@BrewTestBot BrewTestBot enabled auto-merge June 2, 2023 00:58
@BrewTestBot BrewTestBot added this pull request to the merge queue Jun 2, 2023
Merged via the queue into Homebrew:master with commit 864d331 Jun 2, 2023
@p-linnane p-linnane deleted the bump-consul-1.15.3 branch June 2, 2023 03:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bump-formula-pr PR was created using `brew bump-formula-pr` CI-published-bottle-commits The commits for the built bottles have been pushed to the PR branch. go Go use is a significant feature of the PR or issue
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants