Skip to content

Releases: hashicorp/consul

v1.17.4 (Enterprise)

27 Mar 21:01
3e2302b
Compare
Choose a tag to compare

1.17.4 Enterprise (March 26, 2024)

This release is created to share the Consul Enterprise changelog and notify consumers of availability. The attached source and assets do not include Consul Enterprise code and should not be used in place of official Docker images or binaries.

SECURITY:

IMPROVEMENTS:

  • api: Randomize the returned server list for the WatchServers gRPC endpoint. [GH-20866]
  • snapshot agent: (Enterprise only) Add support for multiple snapshot destinations using the backup_destinations config file object.

BUG FIXES:

  • connect: Fix issue where Consul-dataplane xDS sessions would not utilize the streaming backend for wan-federated queries. [GH-20868]
  • connect: Fix potential goroutine leak in xDS stream handling. [GH-20866]
  • connect: Fix xDS deadlock that could result in proxies being unable to start. [GH-20867]
  • dns: SERVFAIL when resolving not found PTR records. [GH-20679]
  • ingress-gateway: (Enterprise Only) Fix a bug where on update, Ingress Gateways lost all upstreams for listeners with wildcard services in a different namespace.
  • snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.

v1.16.7 (Enterprise)

27 Mar 21:02
cb00a73
Compare
Choose a tag to compare

1.16.7 Enterprise (March 26, 2024)

This release is created to share the Consul Enterprise changelog and notify consumers of availability. The attached source and assets do not include Consul Enterprise code and should not be used in place of official Docker images or binaries.

SECURITY:

IMPROVEMENTS:

  • api: Randomize the returned server list for the WatchServers gRPC endpoint. [GH-20866]
  • snapshot agent: (Enterprise only) Add support for multiple snapshot destinations using the backup_destinations config file object.

BUG FIXES:

  • connect: Fix issue where Consul-dataplane xDS sessions would not utilize the streaming backend for wan-federated queries. [GH-20868]
  • connect: Fix potential goroutine leak in xDS stream handling. [GH-20866]
  • connect: Fix xDS deadlock that could result in proxies being unable to start. [GH-20867]
  • ingress-gateway: (Enterprise Only) Fix a bug where on update, Ingress Gateways lost all upstreams for listeners with wildcard services in a different namespace.
  • snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.

v1.15.11 (Enterprise)

27 Mar 21:03
4fc9491
Compare
Choose a tag to compare

1.15.11 Enterprise (March 26, 2024)

This release is created to share the Consul Enterprise changelog and notify consumers of availability. The attached source and assets do not include Consul Enterprise code and should not be used in place of official Docker images or binaries.

Enterprise LTS: Consul Enterprise 1.15 is a Long-Term Support (LTS) release.

SECURITY:

IMPROVEMENTS:

  • api: Randomize the returned server list for the WatchServers gRPC endpoint. [GH-20866]

BUG FIXES:

  • connect: Fix issue where Consul-dataplane xDS sessions would not utilize the streaming backend for wan-federated queries. [GH-20868]
  • connect: Fix potential goroutine leak in xDS stream handling. [GH-20866]
  • connect: Fix xDS deadlock that could result in proxies being unable to start. [GH-20867]
  • ingress-gateway: (Enterprise Only) Fix a bug where on update, Ingress Gateways lost all upstreams for listeners with wildcard services in a different namespace.
  • snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.

v1.18.0

27 Feb 21:03
349cec1
Compare
Choose a tag to compare

BREAKING CHANGES:

  • config-entries: Allow disabling request and idle timeouts with negative values in service router and service resolver config entries. [GH-19992]
  • telemetry: Adds fix to always use the value of telemetry.disable_hostname when determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated as true, even though its default value is false. [GH-20312]

SECURITY:

FEATURES:

  • acl: add policy bindtype to binding rules. [GH-19499]
  • agent: Introduces a new agent config default_intention_policy to decouple the default intention behavior from ACLs [GH-20544]
  • agent: (Enterprise Only) Add fault injection filter support for Consul Service Mesh
  • cloud: Adds new API/CLI to initiate and manage linking a Consul cluster to HCP Consul Central [GH-20312]
  • dns: adds experimental support for a refactored DNS server that is v1 and v2 Catalog compatible.
    Use v2dns in the experiments agent config to enable.
    It will automatically be enabled when using the resource-apis (Catalog v2) experiment.
    The new DNS implementation will be the default in Consul 1.19.
    See the Consul 1.18.x Release Notes for deprecated DNS features. [GH-20643]
  • ui: Added a banner to let users link their clusters to HCP [GH-20275]
  • ui: Adds a redirect and warning message around unavailable UI with V2 enabled [GH-20359]
  • ui: adds V2CatalogEnabled to config that is passed to the ui [GH-20353]
  • v2: prevent use of the v2 experiments in secondary datacenters for now [GH-20299]

IMPROVEMENTS:

  • cloud: unconditionally add Access-Control-Expose-Headers HTTP header [GH-20220]
  • connect: Replace usage of deprecated Envoy field envoy.config.core.v3.HeaderValueOption.append. [GH-20078]
  • connect: Replace usage of deprecated Envoy fields envoy.config.route.v3.HeaderMatcher.safe_regex_match and envoy.type.matcher.v3.RegexMatcher.google_re2. [GH-20013]
  • docs: add Link API documentation [GH-20308]
  • resource: lowercase names enforced for v2 resources only. [GH-19218]

BUG FIXES:

  • dns: SERVFAIL when resolving not found PTR records. [GH-20679]
  • raft: Fix panic during downgrade from enterprise to oss. [GH-19311]
  • server: Ensure controllers are automatically restarted on internal stream errors. [GH-20642]
  • server: Ensure internal streams are properly terminated on snapshot restore. [GH-20642]
  • snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.

v1.17.3

13 Feb 22:20
009041f
Compare
Choose a tag to compare

1.17.3 (February 13, 2024)

SECURITY:

FEATURES:

  • cli: Adds new command exported-services to list all services exported and their consumers. Refer to the CLI docs for more information. [GH-20331]

IMPROVEMENTS:

  • ProxyCfg: avoid setting a watch on Internal.ServiceDump when mesh gateway is not used. [GH-20168]
  • ProxyCfg: only return the nodes list when querying the Internal.ServiceDump watch from proxycfg [GH-20168]
  • Upgrade to use Go 1.21.7. [GH-20545]
  • api: add a new api(/v1/exported-services) to list all the exported service and their consumers. [GH-20015]
  • connect: Add CaseInsensitive flag to service-routers that allows paths and path prefixes to ignore URL upper and lower casing. [GH-19647]

BUG FIXES:

  • audit-logs: (Enterprise Only) Fixes non ASCII characters in audit logs because of gzip. [GH-20345]
  • connect: Fix issue where re-persisting existing proxy-defaults using http protocol fails with a protocol-mismatch error. [GH-20481]
  • connect: Fix regression with SAN matching on terminating gateways GH-20360 [GH-20417]
  • connect: Remove code coupling where the xDS capacity controller could negatively affect raft autopilot performance. [GH-20511]
  • logging: add /api prefix to v2 resource endpoint logs [GH-20352]
  • mesh: Fix bug where envoy extensions could not be configured with "permissive" mTLS mode. Note that envoy extensions currently do not apply to non-mTLS traffic in permissive mode. [GH-20406]

v1.16.6

13 Feb 22:20
895390c
Compare
Choose a tag to compare

1.16.6 (February 13, 2024)

SECURITY:

IMPROVEMENTS:

  • ProxyCfg: avoid setting a watch on Internal.ServiceDump when mesh gateway is not used. [GH-20168]
  • ProxyCfg: only return the nodes list when querying the Internal.ServiceDump watch from proxycfg [GH-20168]
  • Upgrade to use Go 1.21.7. [GH-20545]

BUG FIXES:

  • audit-logs: (Enterprise Only) Fixes non ASCII characters in audit logs because of gzip. [GH-20345]
  • connect: Fix issue where re-persisting existing proxy-defaults using http protocol fails with a protocol-mismatch error. [GH-20481]
  • connect: Fix regression with SAN matching on terminating gateways GH-20360 [GH-20417]
  • connect: Remove code coupling where the xDS capacity controller could negatively affect raft autopilot performance. [GH-20511]
  • mesh: Fix bug where envoy extensions could not be configured with "permissive" mTLS mode. Note that envoy extensions currently do not apply to non-mTLS traffic in permissive mode. [GH-20406]

v1.15.10

13 Feb 22:20
a8dca24
Compare
Choose a tag to compare

1.15.10 (February 13, 2024)

SECURITY:

IMPROVEMENTS:

  • ProxyCfg: avoid setting a watch on Internal.ServiceDump when mesh gateway is not used. [GH-20168]
  • ProxyCfg: only return the nodes list when querying the Internal.ServiceDump watch from proxycfg [GH-20168]
  • Upgrade to use Go 1.21.7. [GH-20545]
  • mesh: update supported envoy version 1.28.0 in addition to 1.27.2, 1.26.6 to support LTS release [GH-20323]

BUG FIXES:

  • audit-logs: (Enterprise Only) Fixes non ASCII characters in audit logs because of gzip. [GH-20345]
  • connect: Fix issue where re-persisting existing proxy-defaults using http protocol fails with a protocol-mismatch error. [GH-20481]
  • connect: Remove code coupling where the xDS capacity controller could negatively affect raft autopilot performance. [GH-20511]

v1.18.0-rc1

06 Feb 19:43
Compare
Choose a tag to compare
v1.18.0-rc1 Pre-release
Pre-release

1.18.0-rc1 (February 6, 2024)

BREAKING CHANGES:

  • config-entries: Allow disabling request and idle timeouts with negative values in service router and service resolver config entries. [GH-19992]
  • telemetry: Adds fix to always use the value of telemetry.disable_hostname when determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated as true, even though its default value is false. [GH-20312]

SECURITY:

FEATURES:

  • acl: add policy bindtype to binding rules. [GH-19499]
  • agent: add fault injection filter support [GH-7513]
  • cloud: Adds new API/CLI to initiate and manage linking a Consul cluster to HCP Consul Central [GH-20312]
  • ui: Added a banner to let users link their clusters to HCP [GH-20275]
  • ui: Adds a redirect and warning message around unavailable UI with V2 enabled [GH-20359]
  • ui: adds V2CatalogEnabled to config that is passed to the ui [GH-20353]
  • v2: prevent use of the v2 experiments in secondary datacenters for now [GH-20299]

IMPROVEMENTS:

  • ProxyCfg: avoid setting a watch on Internal.ServiceDump when mesh gateway is not used. [GH-20168]
  • ProxyCfg: only return the nodes list when querying the Internal.ServiceDump watch from proxycfg [GH-20168]
  • api: add a new api(/v1/exported-services) to list all the exported service and their consumers. [GH-20015]
  • cloud: unconditionally add Access-Control-Expose-Headers HTTP header [GH-20220]
  • connect: Add CaseInsensitive flag to service-routers that allows paths and path prefixes to ignore URL upper and lower casing. [GH-19647]
  • connect: Replace usage of deprecated Envoy field envoy.config.core.v3.HeaderValueOption.append. [GH-20078]
  • connect: Replace usage of deprecated Envoy fields envoy.config.route.v3.HeaderMatcher.safe_regex_match and envoy.type.matcher.v3.RegexMatcher.google_re2. [GH-20013]
  • resource: lowercase names enforced for v2 resources only. [GH-19218]

BUG FIXES:

  • connect: Fix regression with SAN matching on terminating gateways GH-20360 [GH-20417]
  • logging: add /api prefix to v2 resource endpoint logs [GH-20352]
  • mesh: Fix bug where envoy extensions could not be configured with "permissive" mTLS mode. Note that envoy extensions currently do not apply to non-mTLS traffic in permissive mode. [GH-20406]
  • raft: Fix panic during downgrade from enterprise to oss. [GH-19311]

v1.17.2

23 Jan 20:20
7736539
Compare
Choose a tag to compare

1.17.2 (January 23, 2024)

KNOWN ISSUES:

  • connect: Consul versions 1.17.2 and 1.16.5 perform excessively strict TLS SAN verification on terminating gateways, which prevents connections outside of the mesh to upstream services. Terminating gateway users are advised to avoid deploying these Consul versions. A fix will be present in a future release of Consul 1.17.3 and 1.16.6. [GH-20360]

SECURITY:

  • Upgrade OpenShift container images to use ubi9-minimal:9.3 as the base image. [GH-20014]

IMPROVEMENTS:

  • connect: Remove usage of deprecated Envoy field match_subject_alt_names in favor of match_typed_subject_alt_names. [GH-19954]
  • connect: replace usage of deprecated Envoy field envoy.config.router.v3.WeightedCluster.total_weight. [GH-20011]
  • xds: Replace usage of deprecated Envoy field envoy.config.cluster.v3.Cluster.http_protocol_options [GH-20010]
  • xds: remove usages of deprecated Envoy fields: envoy.config.cluster.v3.Cluster.http2_protocol_options, envoy.config.bootstrap.v3.Admin.access_log_path [GH-19940]
  • xds: replace usage of deprecated Envoy field envoy.extensions.filters.http.lua.v3.Lua.inline_code [GH-20012]

DEPRECATIONS:

  • cli: Deprecate the -admin-access-log-path flag from consul connect envoy command in favor of: -admin-access-log-config. [GH-19943]

BUG FIXES:

  • prepared-query: (Enterprise-only) Fix issue where sameness-group failover targets to peers would attempt to query data from the default partition, rather than the sameness-group's partition always.
  • ui: update token list on Role details page to show only linked tokens [GH-19912]

v1.15.9

23 Jan 20:23
4a692f1
Compare
Choose a tag to compare

1.15.9 (January 23, 2024)

SECURITY:

  • Update RSA key generation to use a key size of at least 2048 bits. [GH-20112]
  • Upgrade OpenShift container images to use ubi9-minimal:9.3 as the base image. [GH-20014]

IMPROVEMENTS:

BUG FIXES:

  • ui: update token list on Role details page to show only linked tokens [GH-19912]