Releases: hashicorp/consul
v1.17.4 (Enterprise)
1.17.4 Enterprise (March 26, 2024)
This release is created to share the Consul Enterprise changelog and notify consumers of availability. The attached source and assets do not include Consul Enterprise code and should not be used in place of official Docker images or binaries.
SECURITY:
- Update
google.golang.org/protobuf
to v1.33.0 to address CVE-2024-24786. [GH-20801] - Update the Consul Build Go base image to
alpine3.19
. This resolves CVEs
CVE-2023-52425
CVE-2023-52426 [GH-20812] - Upgrade to use Go
1.21.8
. This resolves CVEs
CVE-2024-24783 (crypto/x509
).
CVE-2023-45290 (net/http
).
CVE-2023-45289 (net/http
,net/http/cookiejar
).
CVE-2024-24785 (html/template
).
CVE-2024-24784 (net/mail
). [GH-20812]
IMPROVEMENTS:
- api: Randomize the returned server list for the WatchServers gRPC endpoint. [GH-20866]
- snapshot agent: (Enterprise only) Add support for multiple snapshot destinations using the
backup_destinations
config file object.
BUG FIXES:
- connect: Fix issue where Consul-dataplane xDS sessions would not utilize the streaming backend for wan-federated queries. [GH-20868]
- connect: Fix potential goroutine leak in xDS stream handling. [GH-20866]
- connect: Fix xDS deadlock that could result in proxies being unable to start. [GH-20867]
- dns: SERVFAIL when resolving not found PTR records. [GH-20679]
- ingress-gateway: (Enterprise Only) Fix a bug where on update, Ingress Gateways lost all upstreams for listeners with wildcard services in a different namespace.
- snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.
v1.16.7 (Enterprise)
1.16.7 Enterprise (March 26, 2024)
This release is created to share the Consul Enterprise changelog and notify consumers of availability. The attached source and assets do not include Consul Enterprise code and should not be used in place of official Docker images or binaries.
SECURITY:
- Update
google.golang.org/protobuf
to v1.33.0 to address CVE-2024-24786. [GH-20801] - Update the Consul Build Go base image to
alpine3.19
. This resolves CVEs
CVE-2023-52425
CVE-2023-52426 [GH-20812] - Upgrade to use Go
1.21.8
. This resolves CVEs
CVE-2024-24783 (crypto/x509
).
CVE-2023-45290 (net/http
).
CVE-2023-45289 (net/http
,net/http/cookiejar
).
CVE-2024-24785 (html/template
).
CVE-2024-24784 (net/mail
). [GH-20812]
IMPROVEMENTS:
- api: Randomize the returned server list for the WatchServers gRPC endpoint. [GH-20866]
- snapshot agent: (Enterprise only) Add support for multiple snapshot destinations using the
backup_destinations
config file object.
BUG FIXES:
- connect: Fix issue where Consul-dataplane xDS sessions would not utilize the streaming backend for wan-federated queries. [GH-20868]
- connect: Fix potential goroutine leak in xDS stream handling. [GH-20866]
- connect: Fix xDS deadlock that could result in proxies being unable to start. [GH-20867]
- ingress-gateway: (Enterprise Only) Fix a bug where on update, Ingress Gateways lost all upstreams for listeners with wildcard services in a different namespace.
- snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.
v1.15.11 (Enterprise)
1.15.11 Enterprise (March 26, 2024)
This release is created to share the Consul Enterprise changelog and notify consumers of availability. The attached source and assets do not include Consul Enterprise code and should not be used in place of official Docker images or binaries.
Enterprise LTS: Consul Enterprise 1.15 is a Long-Term Support (LTS) release.
SECURITY:
- Update
google.golang.org/protobuf
to v1.33.0 to address CVE-2024-24786. [GH-20801]
IMPROVEMENTS:
- api: Randomize the returned server list for the WatchServers gRPC endpoint. [GH-20866]
BUG FIXES:
- connect: Fix issue where Consul-dataplane xDS sessions would not utilize the streaming backend for wan-federated queries. [GH-20868]
- connect: Fix potential goroutine leak in xDS stream handling. [GH-20866]
- connect: Fix xDS deadlock that could result in proxies being unable to start. [GH-20867]
- ingress-gateway: (Enterprise Only) Fix a bug where on update, Ingress Gateways lost all upstreams for listeners with wildcard services in a different namespace.
- snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.
v1.18.0
BREAKING CHANGES:
- config-entries: Allow disabling request and idle timeouts with negative values in service router and service resolver config entries. [GH-19992]
- telemetry: Adds fix to always use the value of
telemetry.disable_hostname
when determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated astrue
, even though its default value isfalse
. [GH-20312]
SECURITY:
- Update
golang.org/x/crypto
to v0.17.0 to address CVE-2023-48795. [GH-20023] - connect: Update supported envoy versions to 1.24.12, 1.25.11, 1.26.6, 1.27.2 to address CVE-2023-44487 [GH-19306]
- mesh: Update Envoy versions to 1.28.1, 1.27.3, and 1.26.7 to address CVE-2024-23324, CVE-2024-23325, CVE-2024-23322, CVE-2024-23323, CVE-2024-23327, CVE-2023-44487, GH-20589], CVE-2023-44487, and [GH-19879]
FEATURES:
- acl: add policy bindtype to binding rules. [GH-19499]
- agent: Introduces a new agent config default_intention_policy to decouple the default intention behavior from ACLs [GH-20544]
- agent: (Enterprise Only) Add fault injection filter support for Consul Service Mesh
- cloud: Adds new API/CLI to initiate and manage linking a Consul cluster to HCP Consul Central [GH-20312]
- dns: adds experimental support for a refactored DNS server that is v1 and v2 Catalog compatible.
Usev2dns
in theexperiments
agent config to enable.
It will automatically be enabled when using theresource-apis
(Catalog v2) experiment.
The new DNS implementation will be the default in Consul 1.19.
See the Consul 1.18.x Release Notes for deprecated DNS features. [GH-20643] - ui: Added a banner to let users link their clusters to HCP [GH-20275]
- ui: Adds a redirect and warning message around unavailable UI with V2 enabled [GH-20359]
- ui: adds V2CatalogEnabled to config that is passed to the ui [GH-20353]
- v2: prevent use of the v2 experiments in secondary datacenters for now [GH-20299]
IMPROVEMENTS:
- cloud: unconditionally add Access-Control-Expose-Headers HTTP header [GH-20220]
- connect: Replace usage of deprecated Envoy field
envoy.config.core.v3.HeaderValueOption.append
. [GH-20078] - connect: Replace usage of deprecated Envoy fields
envoy.config.route.v3.HeaderMatcher.safe_regex_match
andenvoy.type.matcher.v3.RegexMatcher.google_re2
. [GH-20013] - docs: add Link API documentation [GH-20308]
- resource: lowercase names enforced for v2 resources only. [GH-19218]
BUG FIXES:
- dns: SERVFAIL when resolving not found PTR records. [GH-20679]
- raft: Fix panic during downgrade from enterprise to oss. [GH-19311]
- server: Ensure controllers are automatically restarted on internal stream errors. [GH-20642]
- server: Ensure internal streams are properly terminated on snapshot restore. [GH-20642]
- snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.
v1.17.3
1.17.3 (February 13, 2024)
SECURITY:
- mesh: Update Envoy versions to 1.27.3 and 1.26.7 to address CVE-2024-23324, CVE-2024-23325, CVE-2024-23322, CVE-2024-23323, CVE-2024-23327, and CVE-2023-44487 [GH-20587]
FEATURES:
- cli: Adds new command
exported-services
to list all services exported and their consumers. Refer to the CLI docs for more information. [GH-20331]
IMPROVEMENTS:
- ProxyCfg: avoid setting a watch on
Internal.ServiceDump
when mesh gateway is not used. [GH-20168] - ProxyCfg: only return the nodes list when querying the
Internal.ServiceDump
watch from proxycfg [GH-20168] - Upgrade to use Go 1.21.7. [GH-20545]
- api: add a new api(/v1/exported-services) to list all the exported service and their consumers. [GH-20015]
- connect: Add
CaseInsensitive
flag to service-routers that allows paths and path prefixes to ignore URL upper and lower casing. [GH-19647]
BUG FIXES:
- audit-logs: (Enterprise Only) Fixes non ASCII characters in audit logs because of gzip. [GH-20345]
- connect: Fix issue where re-persisting existing proxy-defaults using
http
protocol fails with a protocol-mismatch error. [GH-20481] - connect: Fix regression with SAN matching on terminating gateways GH-20360 [GH-20417]
- connect: Remove code coupling where the xDS capacity controller could negatively affect raft autopilot performance. [GH-20511]
- logging: add /api prefix to v2 resource endpoint logs [GH-20352]
- mesh: Fix bug where envoy extensions could not be configured with "permissive" mTLS mode. Note that envoy extensions currently do not apply to non-mTLS traffic in permissive mode. [GH-20406]
v1.16.6
1.16.6 (February 13, 2024)
SECURITY:
- mesh: Update Envoy version to 1.26.7 to address CVE-2024-23324, CVE-2024-23325, CVE-2024-23322, CVE-2024-23323, CVE-2024-23327, and CVE-2023-44487 [GH-20586]
IMPROVEMENTS:
- ProxyCfg: avoid setting a watch on
Internal.ServiceDump
when mesh gateway is not used. [GH-20168] - ProxyCfg: only return the nodes list when querying the
Internal.ServiceDump
watch from proxycfg [GH-20168] - Upgrade to use Go 1.21.7. [GH-20545]
BUG FIXES:
- audit-logs: (Enterprise Only) Fixes non ASCII characters in audit logs because of gzip. [GH-20345]
- connect: Fix issue where re-persisting existing proxy-defaults using
http
protocol fails with a protocol-mismatch error. [GH-20481] - connect: Fix regression with SAN matching on terminating gateways GH-20360 [GH-20417]
- connect: Remove code coupling where the xDS capacity controller could negatively affect raft autopilot performance. [GH-20511]
- mesh: Fix bug where envoy extensions could not be configured with "permissive" mTLS mode. Note that envoy extensions currently do not apply to non-mTLS traffic in permissive mode. [GH-20406]
v1.15.10
1.15.10 (February 13, 2024)
SECURITY:
- mesh: Update Envoy versions to 1.28.1, 1.27.3, and 1.26.7 to address CVE-2024-23324, CVE-2024-23325, CVE-2024-23322, CVE-2024-23323, CVE-2024-23327, and CVE-2023-44487 [GH-20590]
IMPROVEMENTS:
- ProxyCfg: avoid setting a watch on
Internal.ServiceDump
when mesh gateway is not used. [GH-20168] - ProxyCfg: only return the nodes list when querying the
Internal.ServiceDump
watch from proxycfg [GH-20168] - Upgrade to use Go 1.21.7. [GH-20545]
- mesh: update supported envoy version 1.28.0 in addition to 1.27.2, 1.26.6 to support LTS release [GH-20323]
BUG FIXES:
- audit-logs: (Enterprise Only) Fixes non ASCII characters in audit logs because of gzip. [GH-20345]
- connect: Fix issue where re-persisting existing proxy-defaults using
http
protocol fails with a protocol-mismatch error. [GH-20481] - connect: Remove code coupling where the xDS capacity controller could negatively affect raft autopilot performance. [GH-20511]
v1.18.0-rc1
1.18.0-rc1 (February 6, 2024)
BREAKING CHANGES:
- config-entries: Allow disabling request and idle timeouts with negative values in service router and service resolver config entries. [GH-19992]
- telemetry: Adds fix to always use the value of
telemetry.disable_hostname
when determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated astrue
, even though its default value isfalse
. [GH-20312]
SECURITY:
- Update
golang.org/x/crypto
to v0.17.0 to address CVE-2023-48795. [GH-20023] - connect: update supported envoy versions to 1.24.12, 1.25.11, 1.26.6, 1.27.2 to address CVE-2023-44487 [GH-19306]
- mesh: update supported envoy version 1.28.0 in addition to 1.25.11, 1.26.6, 1.27.2, 1.28.0 to address CVE-2023-44487 [GH-19879]
FEATURES:
- acl: add policy bindtype to binding rules. [GH-19499]
- agent: add fault injection filter support [GH-7513]
- cloud: Adds new API/CLI to initiate and manage linking a Consul cluster to HCP Consul Central [GH-20312]
- ui: Added a banner to let users link their clusters to HCP [GH-20275]
- ui: Adds a redirect and warning message around unavailable UI with V2 enabled [GH-20359]
- ui: adds V2CatalogEnabled to config that is passed to the ui [GH-20353]
- v2: prevent use of the v2 experiments in secondary datacenters for now [GH-20299]
IMPROVEMENTS:
- ProxyCfg: avoid setting a watch on
Internal.ServiceDump
when mesh gateway is not used. [GH-20168] - ProxyCfg: only return the nodes list when querying the
Internal.ServiceDump
watch from proxycfg [GH-20168] - api: add a new api(/v1/exported-services) to list all the exported service and their consumers. [GH-20015]
- cloud: unconditionally add Access-Control-Expose-Headers HTTP header [GH-20220]
- connect: Add
CaseInsensitive
flag to service-routers that allows paths and path prefixes to ignore URL upper and lower casing. [GH-19647] - connect: Replace usage of deprecated Envoy field
envoy.config.core.v3.HeaderValueOption.append
. [GH-20078] - connect: Replace usage of deprecated Envoy fields
envoy.config.route.v3.HeaderMatcher.safe_regex_match
andenvoy.type.matcher.v3.RegexMatcher.google_re2
. [GH-20013] - resource: lowercase names enforced for v2 resources only. [GH-19218]
BUG FIXES:
- connect: Fix regression with SAN matching on terminating gateways GH-20360 [GH-20417]
- logging: add /api prefix to v2 resource endpoint logs [GH-20352]
- mesh: Fix bug where envoy extensions could not be configured with "permissive" mTLS mode. Note that envoy extensions currently do not apply to non-mTLS traffic in permissive mode. [GH-20406]
- raft: Fix panic during downgrade from enterprise to oss. [GH-19311]
v1.17.2
1.17.2 (January 23, 2024)
KNOWN ISSUES:
- connect: Consul versions 1.17.2 and 1.16.5 perform excessively strict TLS SAN verification on terminating gateways, which prevents connections outside of the mesh to upstream services. Terminating gateway users are advised to avoid deploying these Consul versions. A fix will be present in a future release of Consul 1.17.3 and 1.16.6. [GH-20360]
SECURITY:
- Upgrade OpenShift container images to use
ubi9-minimal:9.3
as the base image. [GH-20014]
IMPROVEMENTS:
- connect: Remove usage of deprecated Envoy field
match_subject_alt_names
in favor ofmatch_typed_subject_alt_names
. [GH-19954] - connect: replace usage of deprecated Envoy field
envoy.config.router.v3.WeightedCluster.total_weight
. [GH-20011] - xds: Replace usage of deprecated Envoy field
envoy.config.cluster.v3.Cluster.http_protocol_options
[GH-20010] - xds: remove usages of deprecated Envoy fields:
envoy.config.cluster.v3.Cluster.http2_protocol_options
,envoy.config.bootstrap.v3.Admin.access_log_path
[GH-19940] - xds: replace usage of deprecated Envoy field
envoy.extensions.filters.http.lua.v3.Lua.inline_code
[GH-20012]
DEPRECATIONS:
- cli: Deprecate the
-admin-access-log-path
flag fromconsul connect envoy
command in favor of:-admin-access-log-config
. [GH-19943]
BUG FIXES:
- prepared-query: (Enterprise-only) Fix issue where sameness-group failover targets to peers would attempt to query data from the default partition, rather than the sameness-group's partition always.
- ui: update token list on Role details page to show only linked tokens [GH-19912]
v1.15.9
1.15.9 (January 23, 2024)
SECURITY:
- Update RSA key generation to use a key size of at least 2048 bits. [GH-20112]
- Upgrade OpenShift container images to use
ubi9-minimal:9.3
as the base image. [GH-20014]
IMPROVEMENTS:
- Upgrade to use Go 1.21.6. [GH-20062]
BUG FIXES:
- ui: update token list on Role details page to show only linked tokens [GH-19912]