Releases: hashicorp/consul
Releases · hashicorp/consul
v1.19.1
1.19.1 (July 11, 2024)
SECURITY:
- Upgrade envoy module dependencies to version 1.27.7, 1.28.5 and 1.29.7 or higher to resolve CVE-2024-39305 [GH-21524]
- Upgrade go version to 1.22.5 to address CVE-2024-24791 [GH-21507]
- Upgrade go-retryablehttp to address CVE-2024-6104 [GH-21384]
- agent: removed reflected cross-site scripting vulnerability [GH-21342]
- ui: Pin and namespace sub-module dependencies related to the Consul UI [GH-21378]
IMPROVEMENTS:
- mesh: update supported envoy version 1.29.5 in addition to 1.28.4, 1.27.6. [GH-21277]
BUG FIXES:
- core: Fix multiple incorrect type conversion for potential overflows [GH-21251]
- core: Fix panic runtime error on AliasCheck [GH-21339]
- dns: Fix a regression where DNS SRV questions were returning duplicate hostnames instead of encoded IPs.
This affected Nomad integrations with Consul. [GH-21361] - dns: Fix a regression where DNS tags using the standard lookup syntax,
tag.name.service.consul
, were being disregarded. [GH-21361] - dns: Fixes a spam log message "Failed to parse TTL for prepared query..."
that was always being logged on each prepared query evaluation. [GH-21381] - terminating-gateway: (Enterprise Only) Fixed issue where enterprise metadata applied to linked services was the terminating-gateways enterprise metadata and not the linked services enterprise metadata. [GH-21382]
- txn: Fix a bug where mismatched Consul server versions could result in undetected data loss for when using newer Transaction verbs. [GH-21519]
v1.18.3 (Enterprise)
1.18.3 Enterprise (July 11, 2024)
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
SECURITY:
- Upgrade envoy module dependencies to version 1.27.7, 1.28.5 and 1.29.7 or higher to resolve CVE-2024-39305 [GH-21524]
- Upgrade go version to 1.22.5 to address CVE-2024-24791 [GH-21507]
- Upgrade go-retryablehttp to address CVE-2024-6104 [GH-21384]
- agent: removed reflected cross-site scripting vulnerability [GH-21342]
- ui: Pin and namespace sub-module dependencies related to the Consul UI [GH-21378]
IMPROVEMENTS:
- mesh: update supported envoy version 1.29.4
- mesh: update supported envoy version 1.29.5 in addition to 1.28.4, 1.27.6. [GH-21277]
- upgrade go version to v1.22.3. [GH-21113]
- upgrade go version to v1.22.4. [GH-21265]
BUG FIXES:
- core: Fix multiple incorrect type conversion for potential overflows [GH-21251]
- core: Fix panic runtime error on AliasCheck [GH-21339]
- dns: Fixes a spam log message "Failed to parse TTL for prepared query..."
that was always being logged on each prepared query evaluation. [GH-21381] - terminating-gateway: (Enterprise Only) Fixed issue where enterprise metadata applied to linked services was the terminating-gateways enterprise metadata and not the linked services enterprise metadata. [GH-21382]
- txn: Fix a bug where mismatched Consul server versions could result in undetected data loss for when using newer Transaction verbs. [GH-21519]
- v2dns: Fix a regression where DNS SRV questions were returning duplicate hostnames instead of encoded IPs.
This affected Nomad integrations with Consul. [GH-21361] - v2dns: Fix a regression where DNS tags using the standard lookup syntax,
tag.name.service.consul
, were being disregarded. [GH-21361]
v1.17.6 (Enterprise)
1.17.6 Enterprise (July 11, 2024)
SECURITY:
- Upgrade envoy module dependencies to version 1.27.7, 1.28.5 and 1.29.7 or higher to resolve CVE-2024-39305 [GH-21524]
- Upgrade go version to 1.22.5 to address CVE-2024-24791 [GH-21507]
- Upgrade go-retryablehttp to address CVE-2024-6104 [GH-21384]
- agent: removed reflected cross-site scripting vulnerability [GH-21342]
- ui: Pin and namespace sub-module dependencies related to the Consul UI [GH-21378]
IMPROVEMENTS:
BUG FIXES:
- core: Fix panic runtime error on AliasCheck [GH-21339]
- terminating-gateway: (Enterprise Only) Fixed issue where enterprise metadata applied to linked services was the terminating-gateways enterprise metadata and not the linked services enterprise metadata. [GH-21382]
- txn: Fix a bug where mismatched Consul server versions could result in undetected data loss for when using newer Transaction verbs. [GH-21519]
v1.15.13 (Enterprise)
1.15.13 Enterprise (July 11, 2024)
Enterprise LTS: Consul Enterprise 1.15 is a Long-Term Support (LTS) release.
SECURITY:
- Upgrade envoy module dependencies to version 1.27.7, 1.28.5 and 1.29.7 or higher to resolve CVE-2024-39305 [GH-21524]
- Upgrade go version to 1.22.5 to address CVE-2024-24791 [GH-21507]
- Upgrade go-retryablehttp to address CVE-2024-6104 [GH-21384]
- agent: removed reflected cross-site scripting vulnerability [GH-21342]
- ui: Pin and namespace sub-module dependencies related to the Consul UI [GH-21378]
IMPROVEMENTS:
- mesh: update supported envoy version 1.29.4
- upgrade go version to v1.22.3. [GH-21113]
- upgrade go version to v1.22.4. [GH-21265]
BUG FIXES:
- core: Fix panic runtime error on AliasCheck [GH-21339]
- terminating-gateway: (Enterprise Only) Fixed issue where enterprise metadata applied to linked services was the terminating-gateways enterprise metadata and not the linked services enterprise metadata. [GH-21382]
- txn: Fix a bug where mismatched Consul server versions could result in undetected data loss for when using newer Transaction verbs. [GH-21519]
v1.19.0
1.19.0 (June 12, 2024)
BREAKING CHANGES:
- telemetry: State store usage metrics with a double
consul
element in the metric name have been removed. Please use the same metric without the secondconsul
instead. As an example instead ofconsul.consul.state.config_entries
useconsul.state.config_entries
[GH-20674]
SECURITY:
- Upgrade to support Envoy
1.27.5 and 1.28.3
. This resolves CVE
CVE-2024-32475 (auto_sni
). [GH-21017] - Upgrade to support k8s.io/apimachinery
v0.18.7 or higher
. This resolves CVE
CVE-2020-8559. [GH-21017]
FEATURES:
- dns: queries now default to a refactored DNS server that is v1 and v2 Catalog compatible.
Usev1dns
in theexperiments
agent config to disable.
The legacy server will be removed in a future release of Consul.
See the Consul 1.19.x Release Notes for removed DNS features. [GH-20715] - gateways: api-gateway can leverage listener TLS certificates available on the gateway's local filesystem by specifying the public certificate and private key path in the new file-system-certificate configuration entry [GH-20873]
IMPROVEMENTS:
- dns: new version was not supporting partition or namespace being set to 'default' in CE version. [GH-21230]
- mesh: update supported envoy version 1.29.4 in addition to 1.28.3, 1.27.5, 1.26.8. [GH-21142]
- upgrade go version to v1.22.4. [GH-21265]
- Upgrade
github.com/envoyproxy/go-control-plane
to 0.12.0. [GH-20973] - dns: DNS-over-grpc when using
consul-dataplane
now accepts partition, namespace, token as metadata to default those query parameters.
consul-dataplane
v1.5+ will send this information automatically. [GH-20899] - snapshot: Add
consul snapshot decode
CLI command to output a JSON object stream of all the snapshots data. [GH-20824] - telemetry: Add
telemetry.disable_per_tenancy_usage_metrics
in agent configuration to disable setting tenancy labels on usage metrics. This significantly decreases CPU utilization in clusters with many admin partitions or namespaces. - telemetry: Improved the performance usage metrics emission by not outputting redundant metrics. [GH-20674]
DEPRECATIONS:
- snapshot agent: (Enterprise only) Top level single snapshot destinations
local_storage
,aws_storage
,azure_blob_storage
, andgoogle_storage
in snapshot agent configuration files are now deprecated. Use thebackup_destinations
config object instead.
BUG FIXES:
- docs: Consul DNS Forwarding configuration for OpenShift update for Resolve Consul DNS Requests in Kubernetes [GH-20439]
- hcp: fix error logs when failing to push metrics [GH-20514]
- streaming: Handle ACL errors consistently when blocking query timeout is reached. [GH-20876]
v1.18.2
1.18.2 (May 14, 2024)
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
SECURITY:
- Bump Dockerfile base image to
alpine:3.19
. [GH-20897] - Update
vault/api
to v1.12.2 to address CVE-2024-28180
(removes indirect dependency on impactedgo-jose.v2
) [GH-20910] - Upgrade Go to use 1.21.10. This addresses CVEs
CVE-2024-24787 and
CVE-2024-24788 [GH-21074] - Upgrade to support Envoy
1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3
. This resolves CVEs
CVE-2024-27919 (http2
). [GH-20956] and CVE-2024-32475 (auto_sni
). [GH-21030] - Upgrade to support k8s.io/apimachinery
v0.18.7 or higher
. This resolves CVE
CVE-2020-8559. [GH-21034] - Upgrade to use Go
1.21.9
. This resolves CVE
CVE-2023-45288 (http2
). [GH-20956] - Upgrade to use golang.org/x/net
v0.24.0
. This resolves CVE
CVE-2023-45288 (x/net
). [GH-20956]
IMPROVEMENTS:
- gateways: service defaults configuration entries can now be used to set default upstream limits for mesh-gateways [GH-20945]
- connect: Add ability to disable Auto Host Header Rewrite on Terminating Gateway at the service level [GH-20802]
BUG FIXES:
- dns: fix a bug with sameness group queries in DNS where responses did not respect
DefaultForFailover
.
DNS requests against sameness groups without this field set will now error as intended. - error running consul server in 1.18.0: failed to configure SCADA provider user's home directory path: $HOME is not defined [GH-20926]
- server: fix Ent snapshot restore on CE when CE downgrade is enabled [GH-20977]
- xds: Make TCP external service registered with terminating gateway reachable from peered cluster [GH-19881]
v1.17.5 (Enterprise)
1.17.5 Enterprise (May 14, 2024)
SECURITY:
- Bump Dockerfile base image to
alpine:3.19
. [GH-20897] - Update
vault/api
to v1.12.2 to address CVE-2024-28180
(removes indirect dependency on impactedgo-jose.v2
) [GH-20910] - Upgrade Go to use 1.21.10. This addresses CVEs
CVE-2024-24787 and
CVE-2024-24788 [GH-21074] - Upgrade to support Envoy
1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3
. This resolves CVEs
CVE-2024-27919 (http2
). [GH-20956] and CVE-2024-32475 (auto_sni
). [GH-21030] - Upgrade to support k8s.io/apimachinery
v0.18.7 or higher
. This resolves CVE
CVE-2020-8559. [GH-21033] - Upgrade to use Go
1.21.9
. This resolves CVE
CVE-2023-45288 (http2
). [GH-20956] - Upgrade to use golang.org/x/net
v0.24.0
. This resolves CVE
CVE-2023-45288 (x/net
). [GH-20956] - security: Remove
coredns/coredns
dependency to address CVE-2024-0874 [GH-9243]
BUG FIXES:
- dns: fix a bug with sameness group queries in DNS where responses did not respect
DefaultForFailover
.
DNS requests against sameness groups without this field set will now error as intended. - xds: Make TCP external service registered with terminating gateway reachable from peered cluster [GH-19881]
v1.16.8 (Enterprise)
1.16.8 Enterprise (May 14, 2024)
SECURITY:
- Bump Dockerfile base image to
alpine:3.19
. [GH-20897] - Update
vault/api
to v1.12.2 to address CVE-2024-28180
(removes indirect dependency on impactedgo-jose.v2
) [GH-20910] - Upgrade Go to use 1.21.10. This addresses CVEs
CVE-2024-24787 and
CVE-2024-24788 [GH-21074] - Upgrade to support Envoy
1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3
. This resolves CVEs
CVE-2024-27919 (http2
). [GH-20956] and CVE-2024-32475 (auto_sni
). [GH-21030] - Upgrade to support k8s.io/apimachinery
v0.18.7 or higher
. This resolves CVE
CVE-2020-8559. [GH-21032] - Upgrade to use Go
1.21.9
. This resolves CVE
CVE-2023-45288 (http2
). [GH-20956] - Upgrade to use golang.org/x/net
v0.24.0
. This resolves CVE
CVE-2023-45288 (x/net
). [GH-20956] - security: Remove
coredns/coredns
dependency to address CVE-2024-0874 [GH-9244]
BUG FIXES:
- dns: fix a bug with sameness group queries in DNS where responses did not respect
DefaultForFailover
.
DNS requests against sameness groups without this field set will now error as intended. - xds: Make TCP external service registered with terminating gateway reachable from peered cluster [GH-19881]
v1.15.12 (Enterprise)
1.15.12 Enterprise (May 14, 2024)
Enterprise LTS: Consul Enterprise 1.15 is a Long-Term Support (LTS) release.
SECURITY:
- Bump Dockerfile base image to
alpine:3.19
. [GH-20897] - Update
vault/api
to v1.12.2 to address CVE-2024-28180
(removes indirect dependency on impactedgo-jose.v2
) [GH-20910] - Upgrade Go to use 1.21.10. This addresses CVEs
CVE-2024-24787 and
CVE-2024-24788 [GH-21074] - Upgrade to support Envoy
1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3
. This resolves CVEs
CVE-2024-27919 (http2
). [GH-20956] and CVE-2024-32475 (auto_sni
). [GH-21030] - Upgrade to support k8s.io/apimachinery
v0.18.7 or higher
. This resolves CVE
CVE-2020-8559. [GH-21030] - Upgrade to use Go
1.21.9
. This resolves CVE
CVE-2023-45288 (http2
). [GH-20956] - Upgrade to use golang.org/x/net
v0.24.0
. This resolves CVE
CVE-2023-45288 (x/net
). [GH-20956] - security: Remove
coredns/coredns
dependency to address CVE-2024-0874 [GH-9245]
BUG FIXES:
- xds: Make TCP external service registered with terminating gateway reachable from peered cluster [GH-19881]
v1.18.1
1.18.1 (March 26, 2024)
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
BREAKING CHANGES:
- ui: Adds a "Link to HCP Consul Central" modal with integration to side-nav and link to HCP banner. There will be an option to disable the Link to HCP banner from the UI in a follow-up release. [GH-20474]
SECURITY:
- Update
google.golang.org/protobuf
to v1.33.0 to address CVE-2024-24786. [GH-20801] - Update the Consul Build Go base image to
alpine3.19
. This resolves CVEs
CVE-2023-52425
CVE-2023-52426 [GH-20812] - Upgrade to use Go
1.21.8
. This resolves CVEs
CVE-2024-24783 (crypto/x509
).
CVE-2023-45290 (net/http
).
CVE-2023-45289 (net/http
,net/http/cookiejar
).
CVE-2024-24785 (html/template
).
CVE-2024-24784 (net/mail
). [GH-20812]
IMPROVEMENTS:
- api: Randomize the returned server list for the WatchServers gRPC endpoint. [GH-20866]
- partitions: (Enterprise only) Allow disabling of Gossip per Partition [GH-20669]
- snapshot agent: (Enterprise only) Add support for multiple snapshot destinations using the
backup_destinations
config file object. - xds: Improved the performance of xDS server side load balancing. Its slightly improved in Consul CE with drastic CPU usage reductions in Consul Enterprise. [GH-20672]
BUG FIXES:
- audit-logs: (Enterprise Only) Fixes non ASCII characters in audit logs because of gzip. [GH-20345]
- connect: Fix issue where Consul-dataplane xDS sessions would not utilize the streaming backend for wan-federated queries. [GH-20868]
- connect: Fix potential goroutine leak in xDS stream handling. [GH-20866]
- connect: Fix xDS deadlock that could result in proxies being unable to start. [GH-20867]
- ingress-gateway: (Enterprise Only) Fix a bug where on update, Ingress Gateways lost all upstreams for listeners with wildcard services in a different namespace.