Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of Allow dialer to re-establish terminated peering into release/1.14.x #16865

Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
701 commits
Select commit Hold shift + click to select a range
9bb0ecf
[API Gateway] Add integration test for HTTP routes (#16236)
Feb 13, 2023
5b7f36c
integ test: fix retry upstream test (#16246)
huikang Feb 13, 2023
c10ba43
get clusters from route if listener uses RDS (#16243)
Feb 13, 2023
dc2aa36
Update index.mdx (#16247)
nrichu-hcp Feb 13, 2023
8fbd15a
[OSS] Post Consul 1.15 updates (#16256)
DanStough Feb 14, 2023
247211d
add integration tests for troubleshoot (#16223)
Feb 14, 2023
fd61605
upgrade test: fix flaky peering through mesh gateway (#16271)
huikang Feb 15, 2023
dd0ca48
Add inline-certificate as possible payload of config-entry wrapper (#…
nathancoleman Feb 15, 2023
1d9ee50
[OSS] connect: Bump Envoy 1.22.5 to 1.22.7, 1.23.2 to 1.23.4, 1.24.0 …
curtbushko Feb 15, 2023
6599a9b
Fix nil-pointer panics from proxycfg package. (#16277)
hashi-derek Feb 15, 2023
514fb25
Fix infinite recursion in inline-certificate config entry (#16276)
nathancoleman Feb 15, 2023
c5e729e
Docs/reformat service splitters conf entry (#16264)
trujillo-adam Feb 15, 2023
3011228
Fix mesh gateways incorrectly matching peer locality. (#16257)
hashi-derek Feb 16, 2023
388876c
add server side rate-limiter changelog entry (#16292)
dhiaayachi Feb 16, 2023
2460ac9
API Gateway Envoy Golden Listener Tests (#16221)
Feb 16, 2023
8dab825
troubleshoot: fixes and updated messages (#16294)
ndhanushkodi Feb 17, 2023
b3ddd4d
Inline API Gateway TLS cert code (#16295)
Feb 17, 2023
a8dc108
ISSUE_TEMPLATE: Update issue template to include ask for HCL config f…
Feb 17, 2023
e4a992c
Fix hostname alignment checks for HTTPRoutes (#16300)
Feb 17, 2023
ee99d5c
Fix panicky xDS test flakes (#16305)
Feb 17, 2023
58801cc
Add stricter validation and some normalization code for API Gateway C…
Feb 17, 2023
9ed554b
ISSUE TEMPLATE: update issue templates to include comments instead of…
Feb 17, 2023
f143610
[OSS] security: update go to 1.20.1 (#16263)
DanStough Feb 17, 2023
085c0ad
Protobuf Refactoring for Multi-Module Cleanliness (#16302)
mkeeler Feb 17, 2023
c9c49ea
new docs for consul and consul-k8s troubleshoot command (#16284)
Feb 17, 2023
15d2684
Normalize all API Gateway references (#16316)
Feb 17, 2023
4607b53
Fix HTTPRoute and TCPRoute expectation for enterprise metadata (#16322)
Feb 17, 2023
4126088
ISSUE_TEMPLATE: formatting for comments (#16325)
Feb 17, 2023
82b5b4c
fix: revert go mod compat for sdk,api to 1.19 (#16323)
DanStough Feb 18, 2023
8e5942f
fix: add tls config to unix socket when https is used (#16301)
huikang Feb 21, 2023
9d55cd1
fix flakieness (#16338)
xwa153 Feb 21, 2023
8997f2b
chore: document and unit test sdk/testutil/retry (#16049)
nfi-hashicorp Feb 21, 2023
7f9ec78
[API Gateway] Validate listener name is not empty (#16340)
Feb 21, 2023
ad865f5
Fix issue with peer services incorrectly appearing as connect-enabled…
hashi-derek Feb 21, 2023
823fc82
[API Gateway] Turn down controller log levels (#16348)
Feb 22, 2023
18e2ee7
[API Gateway] Fix targeting service splitters in HTTPRoutes (#16350)
Feb 22, 2023
0972697
[API Gateway] Various fixes for Config Entry fields (#16347)
Feb 22, 2023
de17c7c
upgrade test: splitter and resolver config entry in peered cluster (#…
huikang Feb 22, 2023
5309f68
Upgrade Alpine image to 3.17 (#16358)
hashi-derek Feb 22, 2023
b09d04a
Update existing docs from Consul API Gateway -> API Gateway for Kuber…
nathancoleman Feb 22, 2023
84c7b00
initial code (#16296)
NiniOak Feb 22, 2023
c0384c2
Add changelog entry for API Gateway (Beta) (#16369)
nathancoleman Feb 22, 2023
641737f
[API Gateway] Fix infinite loop in controller and binding non-accepte…
Feb 22, 2023
ae9c228
Rate limiter/add ip prefix (#16342)
dhiaayachi Feb 22, 2023
182f6c8
Documentation update: Adding K8S clusters to external Consul servers …
Ranjandas Feb 22, 2023
5400e3d
Add docs for usage endpoint and command (#16258)
kyhavlov Feb 22, 2023
98a771d
NET-2285: Assert total number of expected instances by Consul (#16371)
NiniOak Feb 22, 2023
2e6b7d7
set BRANCH_NAME to release-1.15.x (#16374)
curtbushko Feb 22, 2023
340b562
Docs/rate limiting 1.15 (#16345)
trujillo-adam Feb 22, 2023
0c66bbf
[UI] CC-4031: change from Action, a and button to hds::Button (#16251)
valeriia-ruban Feb 22, 2023
8ac211b
Correct WAL metrics registrations (#16388)
banks Feb 23, 2023
3358d82
chore: remove stable-website (#16386)
DanStough Feb 23, 2023
595131f
Refactor the disco chain -> xds logic (#16392)
erichaberkorn Feb 23, 2023
27af33e
Add envoy extension docs (#16376)
im2nguyen Feb 23, 2023
3de9f7f
upgrade test: peering with resolver and failover (#16391)
huikang Feb 23, 2023
d1294cf
Troubleshoot service to service comms (#16385)
boruszak Feb 23, 2023
cddf86f
Docs/cluster peering 1.15 updates (#16291)
boruszak Feb 23, 2023
7c9801e
Fix rendering error on new operator usage docs (#16393)
nathancoleman Feb 23, 2023
4653d82
add missing field to oss struct (#16401)
skpratt Feb 23, 2023
6b5e48b
fix(docs): correct rate limit metrics (#16400)
JadhavPoonam Feb 23, 2023
a518893
Fix various flaky tests (#16396)
Feb 23, 2023
3c77a89
Native API Gateway Docs (#16365)
Feb 23, 2023
1ed70cf
NET-2286: Add tests to verify traffic redirects between services (#16…
NiniOak Feb 23, 2023
d4dee31
Try DRYing up createCluster in integration tests (#16199)
analogue Feb 23, 2023
ab0d43e
add back staging bits (#16411)
claire-labry Feb 24, 2023
dca7c18
Fix a couple inconsistencies in `operator usage instances` command (#…
kyhavlov Feb 24, 2023
94b3789
NO_JIRA: refactor validate function in traffic mgt tests (#16422)
NiniOak Feb 24, 2023
d99dcd4
Basic gobased API gateway spinup test (#16278)
sarahalsmiller Feb 24, 2023
801a173
Fix attempt for test fail panics in xDS (#16319)
Feb 24, 2023
1ba5e36
update changelog (#16426)
Feb 24, 2023
d9e6748
feat: update alerts to Hds::Alert component (CC-4035) (#16412)
valeriia-ruban Feb 25, 2023
859abf8
fix: ui tests run is fixed (applying class attribute twice to the hbs…
valeriia-ruban Feb 25, 2023
ec4a2e1
Refactor and move wal docs (#16387)
im2nguyen Feb 27, 2023
06ff422
UI: Update Consul UI colors to use HDS colors (#16111)
ellacai Feb 27, 2023
378f017
Add missing link (#16437)
im2nguyen Feb 27, 2023
344411b
docs: remove extra whitespace in frontmatter (#16436)
Feb 27, 2023
1606472
Delete Vagrantfile (#16442)
Feb 27, 2023
c771346
upgrade test: consolidate resolver test cases (#16443)
huikang Feb 27, 2023
a0862e6
UI: Fix rendering issue in search and lists (#16444)
Feb 27, 2023
afbc566
Update docs for consul-k8s 1.1.0 (#16447)
curtbushko Feb 28, 2023
3cbbd63
Update ingress-gateways.mdx (#16330)
amitchahalgits Feb 28, 2023
73b9b40
grpc: fix data race in balancer registration (#16229)
boxofrad Feb 28, 2023
2682021
cli: ensure acl token read -self works (#16445)
rboyer Feb 28, 2023
04f9c6b
docs: Add backwards compatibility for Consul 1.14.x and consul-datapl…
Feb 28, 2023
29db217
gateways: add e2e test for API Gateway HTTPRoute ParentRef change (#1…
mikemorris Feb 28, 2023
6db445b
Gateway Test HTTPPathRewrite (#16418)
sarahalsmiller Feb 28, 2023
ec593c2
cli: remove stray whitespace when loading the consul version from the…
rboyer Feb 28, 2023
23e247d
Docs/services refactor docs day 122022 (#16103)
trujillo-adam Feb 28, 2023
be800f0
docs: clarify license expiration upgrade behavior (#16464)
skpratt Feb 28, 2023
4f2d9a9
add provider ca auth-method support for azure
eikenb Mar 1, 2023
1f422f3
Changed titles for services pages to sentence style cap (#16477)
trujillo-adam Mar 1, 2023
66de1de
docs: Consul 1.15.0 and Consul K8s 1.0 release notes (#16481)
Mar 1, 2023
3970115
fix (cli): return error msg if acl policy not found (#16485)
huikang Mar 1, 2023
5ac1bdd
update services nav titles (#16484)
trujillo-adam Mar 1, 2023
4f8594b
Improve ux to help users avoid overwriting fields of ACL tokens, role…
roncodingenthusiast Mar 1, 2023
367a64f
NET-2292: port ingress-gateway test case "http" from BATS addendum (#…
nfi-hashicorp Mar 1, 2023
21c3095
docs: Update release notes with Envoy compat issue (#16494)
Mar 1, 2023
b177dc4
Suppress AlreadyRegisteredError to fix test retries (#16501)
Mar 2, 2023
321439f
Speed up test by registering services concurrently (#16509)
Mar 2, 2023
4211069
add provider ca support for jwt file base auth
eikenb Mar 2, 2023
bbbdc5f
docs(architecture): remove merge conflict leftovers (#16507)
karras Mar 2, 2023
e8eec1f
add provider ca auth support for kubernetes
eikenb Mar 2, 2023
2b6d35f
Merge pull request #4538 from hashicorp/NET-2396 (#16516)
NiniOak Mar 2, 2023
358c35e
Merge pull request #4584 from hashicorp/refactor_cluster_config (#16517)
NiniOak Mar 2, 2023
4b661d1
Add ServiceResolver RequestTimeout for route timeouts to make Termina…
Mar 3, 2023
5deffbd
Fix issue where terminating gateway service resolvers weren't properl…
Mar 3, 2023
5f81662
Add support for failover policies (#16505)
erichaberkorn Mar 3, 2023
c517f07
modified unsupported envoy version error (#16518)
wilkermichael Mar 3, 2023
84156af
Remove private prefix from proto-gen-rpc-glue e2e test (#16433)
mkeeler Mar 3, 2023
cc0765b
Fix resolution of service resolvers with subsets for external upstrea…
Mar 3, 2023
43bd351
fixed broken links associated with cluster peering updates (#16523)
trujillo-adam Mar 3, 2023
56ffee6
add provider ca support for approle auth-method
eikenb Mar 3, 2023
8910002
update connect/ca's vault AuthMethod conf section (#16346)
eikenb Mar 3, 2023
9a485cd
proxycfg: ensure that an irrecoverable error in proxycfg closes the x…
rboyer Mar 3, 2023
129eca8
NET-2903 Normalize weight for http routes (#16512)
missylbytes Mar 3, 2023
897e5ef
Add some basic UI improvements for api-gateway services (#16508)
Mar 3, 2023
9e93a30
fixes empty link in DNS usage page (#16534)
trujillo-adam Mar 3, 2023
fc23232
NET-2904 Fixes API Gateway Route Service Weight Division Error
missylbytes Mar 6, 2023
bf501a3
Improve ux around ACL token to help users avoid overwriting node/serv…
roncodingenthusiast Mar 6, 2023
8daddff
Follow-up fixes to consul connect envoy command (#16530)
Mar 6, 2023
9d8e00d
Merge pull request #4573 from hashicorp/NET-2841 (#16544)
NiniOak Mar 6, 2023
94ecb9c
upgrade test: discovery chain across partition (#16543)
huikang Mar 6, 2023
6166889
Update the consul-k8s cli docs for the new `proxy log` subcommand (#1…
jm96441n Mar 6, 2023
7ea2bd6
Delete test-link-rewrites.yml (#16546)
ashleemboyer Mar 6, 2023
63204b5
feat: update notification to use hds toast component (#16519)
valeriia-ruban Mar 6, 2023
f135b14
Fix flakey tests related to ACL token updates (#16545)
roncodingenthusiast Mar 6, 2023
f5641ff
support vault auth config for alicloud ca provider
eikenb Mar 7, 2023
a5b8256
Update docs to reflect functionality (#16549)
im2nguyen Mar 7, 2023
b649a5e
upgrade test: use retry with ModifyIndex and remove ent test file (#1…
huikang Mar 7, 2023
dbaf8bf
add agent locality and replicate it across peer streams (#16522)
erichaberkorn Mar 7, 2023
58016d1
docs: Document config entry permissions (#16556)
Mar 7, 2023
3d75ab8
Broken link fixes (#16566)
eddie-rowe Mar 7, 2023
280bdd3
NET-2954: Improve integration tests CI execution time (#16565)
NiniOak Mar 8, 2023
89de91b
fix bug that can lead to peering service deletes impacting the state …
erichaberkorn Mar 8, 2023
e5c2818
Update changelog with patch releases (#16576)
analogue Mar 8, 2023
9a5cb20
Bump submodules from latest 1.15.1 patch release (#16578)
analogue Mar 8, 2023
e2c4a78
website: adds content-check command and README update (#16579)
Mar 8, 2023
47db3d7
added a backport-checker GitHub action (#16567)
wilkermichael Mar 9, 2023
040647e
auto-updated agent/uiserver/dist/ from commit 63204b518 (#16587)
Mar 9, 2023
176945a
GRPC stub for the ResourceService (#16528)
analogue Mar 9, 2023
e6aeb31
UI: Fix htmlsafe errors throughout the app (#16574)
Mar 9, 2023
fa93a0d
Add namespace file with build tag for OSS gateway tests (#16590)
jm96441n Mar 9, 2023
40312ac
JIRA pr check: Filter out OSS/ENT merges (#16593)
Mar 9, 2023
57e2493
allow setting locality on services and nodes (#16581)
erichaberkorn Mar 10, 2023
e298f50
Add Peer Locality to Discovery Chains (#16588)
erichaberkorn Mar 10, 2023
5190269
fixes for unsupported partitions field in CRD metadata block (#16604)
trujillo-adam Mar 10, 2023
a01920b
Create a weekly 404 checker for all Consul docs content (#16603)
eddie-rowe Mar 10, 2023
726c97b
Consul WAN Fed with Vault Secrets Backend document updates (#16597)
natemollica-nm Mar 10, 2023
f95ffe0
Allow HCP metrics collection for Envoy proxies
Achooo Mar 10, 2023
7cb2af1
Add copywrite setup file (#16602)
roncodingenthusiast Mar 13, 2023
f2902e6
Add sameness-group configuration entry. (#16608)
hashi-derek Mar 13, 2023
d5677e5
Preserve CARoots when updating Vault CA configuration (#16592)
Mar 13, 2023
9d21736
Add UI copyright headers files (#16614)
roncodingenthusiast Mar 14, 2023
a915d0c
Docs discovery typo (#16628)
bdronneau Mar 14, 2023
8f75d99
Fix issue with trust bundle read ACL check. (#16630)
hashi-derek Mar 14, 2023
5a3fec6
Basic resource type registry (#16622)
analogue Mar 14, 2023
724b752
Backport ENT-4704 (#16612)
freddygv Mar 14, 2023
ad25ba3
feat: update typography to consume hds styles (#16577)
valeriia-ruban Mar 15, 2023
e557fb4
Add known issues to Raft WAL docs. (#16600)
banks Mar 15, 2023
48f0a28
Tune 404 checker to exclude false-positives and use intended file pat…
eddie-rowe Mar 15, 2023
ff5887a
Update e2e tests for namespaces (#16627)
jm96441n Mar 15, 2023
152c753
net 2731 ip config entry OSS version (#16642)
xwa153 Mar 15, 2023
57e034b
fix confusing spiffe ids in golden tests (#16643)
erichaberkorn Mar 15, 2023
c26b6bc
First cluster grpc service should be NodePort for the second cluster …
vjwilson1987 Mar 16, 2023
197ed67
Add in query options for catalog service existing in a specific (#16652)
jm96441n Mar 16, 2023
b473151
fix: add AccessorID property to PUT token request (#16660)
valeriia-ruban Mar 17, 2023
eaa39f4
add sameness group support to service resolver failover and redirects…
erichaberkorn Mar 17, 2023
33a2058
Fix incorrect links on Envoy extensions documentation (#16666)
joatmon08 Mar 17, 2023
501b87f
[API Gateway] Fix invalid cluster causing gateway programming delay (…
Mar 17, 2023
22cf122
Bump tomhjp/gh-action-jira-search from 0.2.1 to 0.2.2 (#16667)
dependabot[bot] Mar 18, 2023
2ee3336
build(deps): bump atlassian/gajira-transition from 2.0.1 to 3.0.1 (#1…
dependabot[bot] Mar 18, 2023
b9d8552
Snapshot restore tests (#16647)
dhiaayachi Mar 18, 2023
7477f52
add sameness groups to discovery chains (#16671)
erichaberkorn Mar 20, 2023
9c64731
feat: add category annotation to RPC and gRPC methods (#16646)
JadhavPoonam Mar 20, 2023
0b4dc25
Update GH actions to create Jira issue automatically (#16656)
im2nguyen Mar 20, 2023
606f8fb
Adds check to verify that the API Gateway is being created with at le…
missylbytes Mar 20, 2023
1ef9f4d
Fix route subscription when using namespaces (#16677)
jm96441n Mar 20, 2023
b9bd2c3
peering: peering partition failover fixes (#16673)
ndhanushkodi Mar 20, 2023
b4598a7
fix jira sync actions, remove custom fields (#16686)
im2nguyen Mar 20, 2023
e39e7d1
Docs/update jira sync pr issue (#16688)
im2nguyen Mar 20, 2023
cb26004
Docs: Jira sync Update issuetype to bug (#16689)
im2nguyen Mar 20, 2023
46af09b
build(deps): bump tomhjp/gh-action-jira-create from 0.2.0 to 0.2.1 (#…
dependabot[bot] Mar 20, 2023
4f445a7
build(deps): bump tomhjp/gh-action-jira-comment from 0.1.0 to 0.2.0 (…
dependabot[bot] Mar 20, 2023
0fc8a3e
NET-2397: Add readme.md to upgrade test subdirectory (#16610)
NiniOak Mar 20, 2023
2f13f75
chore: replace hardcoded node name with a constant (#16692)
huikang Mar 20, 2023
c8d9cad
Fix broken links from api docs (#16695)
im2nguyen Mar 20, 2023
7eb3dcb
Update WAL Known issues (#16676)
banks Mar 20, 2023
d75f2ba
UI: update Ember to 3.28.6 (#16616)
valeriia-ruban Mar 20, 2023
1f4c590
Regen helm docs (#16701)
lkysow Mar 21, 2023
8dd1d73
Remove unused are hosts set check (#16691)
jm96441n Mar 21, 2023
eca8b02
[NET-3029] Migrate build-distros to GHA (#16669)
loshz Mar 21, 2023
93a3a76
Update envoy extension docs, service-defaults, add multi-config examp…
im2nguyen Mar 21, 2023
036ee56
fix build workflow (#16719)
loshz Mar 21, 2023
8f7e4d4
Helm docs without developer.hashicorp.com prefix (#16711)
lkysow Mar 21, 2023
769d950
add extra resiliency to snapshot restore test (#16712)
dhiaayachi Mar 21, 2023
7f6f689
fix: gracefully fail on invalid port number (#16721)
huikang Mar 22, 2023
e818fde
Copyright headers for config files git + circleci (#16703)
roncodingenthusiast Mar 22, 2023
3c5c53a
fix bug where pqs that failover to a cluster peer dont un-fail over (…
erichaberkorn Mar 22, 2023
495ad4c
add enterprise xds tests (#16738)
erichaberkorn Mar 22, 2023
3ba0eb5
delete config when nil (#16690)
dhiaayachi Mar 22, 2023
4845816
Changelog for audit logging fix. (#16700)
lkysow Mar 22, 2023
e3fd7d3
Use GH issues type for edu board (#16750)
im2nguyen Mar 23, 2023
3df2719
fix: remove unused tenancy category from rate limit spec (#16740)
JadhavPoonam Mar 23, 2023
d61f3da
Remove version bump from CRT workflow (#16728)
nathancoleman Mar 23, 2023
0b1dc4e
tests instantiating clients w/o shutting down (#16755)
eikenb Mar 24, 2023
a6831da
RELENG-471: Remove obsolete load-test workflow (#16737)
shore Mar 24, 2023
a168d0e
add failover policy to ProxyConfigEntry in api (#16759)
Mar 24, 2023
ce6e278
Fix broken links in Consul docs (#16640)
eddie-rowe Mar 24, 2023
2236975
Change partition for peers in discovery chain targets (#16769)
hashi-derek Mar 24, 2023
90bbae5
Docs/intentions refactor docs day 2022 (#16758)
trujillo-adam Mar 24, 2023
81df781
Add storage backend interface and in-memory implementation (#16538)
boxofrad Mar 27, 2023
d4603a4
Fix bug in changelog checker where bash variable is not quoted (#16681)
jm96441n Mar 27, 2023
3415689
Read(...) endpoint for the resource service (#16655)
analogue Mar 27, 2023
c085b1e
Fix Edu Jira automation (#16778)
im2nguyen Mar 27, 2023
351bdc3
Fix struct tags for TCPService enterprise meta (#16781)
jm96441n Mar 27, 2023
9217ac1
Expand route flattening test for multiple namespaces (#16745)
jm96441n Mar 27, 2023
032aba3
WatchList(..) endpoint for the resource service (#16726)
analogue Mar 27, 2023
42c5b29
Allocate virtual ip for resolver/router/splitter config entries (#16760)
kyhavlov Mar 27, 2023
10df4d8
add ip rate limiter controller OSS parts (#16790)
dhiaayachi Mar 27, 2023
440f112
Resource service List(..) endpoint (#16753)
analogue Mar 27, 2023
e5d58c5
changes to support new PQ enterprise fields (#16793)
wilkermichael Mar 27, 2023
12be12f
add scripts for testing locally consul-ui-toolkit (#16794)
valeriia-ruban Mar 28, 2023
c833464
Update normalization of route refs (#16789)
jm96441n Mar 28, 2023
94ec4eb
copyright headers for agent folder (#16704)
roncodingenthusiast Mar 28, 2023
4c070c3
Copyright headers for command folder (#16705)
roncodingenthusiast Mar 28, 2023
4b2137c
Add copyright headers for acl, api and bench folders (#16706)
roncodingenthusiast Mar 28, 2023
a3973a8
Github Actions Migration - move go-tests workflows to GHA (#16761)
jmurret Mar 28, 2023
b646746
Copyright headers for missing files/folders (#16708)
roncodingenthusiast Mar 28, 2023
3e69ff1
fix: export ReadWriteRatesConfig struct as it needs to referenced fro…
JadhavPoonam Mar 29, 2023
4c038df
docs: Updates to support HCP Consul cluster peering release (#16774)
boruszak Mar 29, 2023
32358dd
port ENT ingress gateway upgrade tests [NET-2294] [NET-2296] (#16804)
nfi-hashicorp Mar 29, 2023
39a0c4f
[COMPLIANCE] Add Copyright and License Headers (#16807)
hashicorp-copywrite[bot] Mar 29, 2023
0d1d2fc
add order by locality failover to Consul enterprise (#16791)
erichaberkorn Mar 30, 2023
aab9397
ci: changes resulting from running on consul-enterprise (#16816)
jmurret Mar 30, 2023
4ae5992
port ENT upgrade tests flattening (#16824)
nfi-hashicorp Mar 30, 2023
cc23b0e
docs: raise awareness of GH-16779 (#16823)
jkirschner-hashicorp Mar 30, 2023
99ba13b
updating command to reflect the additional package exclusions in Circ…
jmurret Mar 31, 2023
651549c
storage: fix resource leak in Watch (#16817)
boxofrad Mar 31, 2023
bf64a33
Remove UI brand-loader copyright headers as they do not render approp…
roncodingenthusiast Mar 31, 2023
8d40cf9
Add sameness-group to exported-services config entries (#16836)
hashi-derek Mar 31, 2023
a6d69ad
Add default resolvers to disco chains based on the default sameness g…
erichaberkorn Mar 31, 2023
3e6f8b7
[NET-3029] Migrate dev-* jobs to GHA (#16792)
loshz Mar 31, 2023
fc64a70
add region field (#16825)
Mar 31, 2023
a5397b1
Connect CA Primary Provider refactor (#16749)
Apr 3, 2023
f54e310
Update changelog with patch releases (#16856)
zalimeni Apr 3, 2023
71c32b4
Fix typo on cli-flags.mdx (#16843)
ramramhariram Apr 3, 2023
ea94152
Allow re-establishing a terminated peering
freddygv Mar 24, 2023
0ad3aac
backport of commit ea941524972371f19fde314aa7fa1b5a2dd7e571
freddygv Mar 24, 2023
d12df0f
Merge ea941524972371f19fde314aa7fa1b5a2dd7e571 into backport/peering/…
hc-github-team-consul-core Apr 3, 2023
779e28d
backport of commit da7507f11935b6aac6058e4b4a18e7cba28e9607
freddygv Apr 3, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
3 changes: 3 additions & 0 deletions .changelog/13782.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
deps: update to latest go-discover to provide ECS auto-discover capabilities.
```
4 changes: 4 additions & 0 deletions .changelog/14340.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:feature
connect: Add local_idle_timeout_ms to allow configuring the Envoy route idle timeout on local_app
connect: Add IdleTimeout to service-router to allow configuring the Envoy route idle timeout
```
6 changes: 3 additions & 3 deletions .changelog/14679.txt
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
```release-note:improvement
dns: **(Enterprise Only)** All enterprise locality labels are now optional in DNS lookups. For example, service lookups support the following format: <tag>.]<service>.service[.<namespace>.ns][.<partition>.ap][.<datacenter>.dc]<domain>`.
```
```release-note:improvement
dns: **(Enterprise Only)** All enterprise locality labels are now optional in DNS lookups. For example, service lookups support the following format: `[<tag>.]<service>.service[.<namespace>.ns][.<partition>.ap][.<datacenter>.dc]<domain>`.
```
1 change: 0 additions & 1 deletion .changelog/14930.txt

This file was deleted.

6 changes: 6 additions & 0 deletions .changelog/15050.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note:feature
cli: Add `-consul-dns-port` flag to the `consul connect redirect-traffic` command to allow forwarding DNS traffic to a specific Consul DNS port.
```
```release-note:feature
sdk: Configure `iptables` to forward DNS traffic to a specific DNS port.
```
3 changes: 3 additions & 0 deletions .changelog/15083.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: fixed bug where endpoint updates for new xDS clusters could block for 15s before being sent to Envoy.
```
3 changes: 3 additions & 0 deletions .changelog/15090.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:note
deps: Upgrade to use Go 1.19.2
```
6 changes: 6 additions & 0 deletions .changelog/15093.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note: improvement
connect: Add Envoy 1.24.0 to support matrix
```
```release-note: breaking-change
connect: Removes support for Envoy 1.20
```
3 changes: 3 additions & 0 deletions .changelog/15108.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: when wan address is set, peering stream should use the wan address.
```
3 changes: 3 additions & 0 deletions .changelog/15155.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
debug: fixed bug that caused consul debug CLI to error on ACL-disabled clusters
```
3 changes: 3 additions & 0 deletions .changelog/15160.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: fix nil pointer in calling handleUpdateService
```
3 changes: 3 additions & 0 deletions .changelog/15178.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix a bug that resulted in /v1/agent/metrics returning an error.
```
3 changes: 3 additions & 0 deletions .changelog/15186.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where mesh-gateway settings were not properly inherited from configuration entries.
```
3 changes: 3 additions & 0 deletions .changelog/15233.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note: improvement
integ test: fix flakiness due to test condition from retry app endoint
```
3 changes: 3 additions & 0 deletions .changelog/15253.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fixed issue where using Vault 1.11+ as CA provider would eventually break Intermediate CAs [[GH-15217](https://github.com/hashicorp/consul/issues/15217)]
```
3 changes: 3 additions & 0 deletions .changelog/15272.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
proxycfg(mesh-gateway): Fix issue where deregistered services are not removed from mesh-gateway clusters.
```
7 changes: 7 additions & 0 deletions .changelog/15302.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
```release-note:breaking-change
config: update 1.14 config defaults: Enable `peering` and `connect` by default.
```

```release-note:breaking-change
config: update 1.14 config defaults: Set gRPC TLS port default value to 8503
```
3 changes: 3 additions & 0 deletions .changelog/15317.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvements
acl: Allow reading imported services and nodes from cluster peers with read all permissions
```
3 changes: 3 additions & 0 deletions .changelog/15320.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: strip port from DNS SANs for ingress gateway leaf certificate to avoid an invalid hostname error when using the Vault provider.
```
2 changes: 1 addition & 1 deletion .changelog/14294.txt → .changelog/15339.txt
Original file line number Diff line number Diff line change
Expand Up @@ -2,5 +2,5 @@
config: Add new `ports.grpc_tls` configuration option.
Introduce a new port to better separate TLS config from the existing `ports.grpc` config.
The new `ports.grpc_tls` only supports TLS encrypted communication.
The existing `ports.grpc` currently supports both plain-text and tls communication, but tls support will be removed in a future release.
The existing `ports.grpc` now only supports plain-text communication.
```
3 changes: 3 additions & 0 deletions .changelog/15346.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:enhancement
acl: relax permissions on the `WatchServers`, `WatchRoots` and `GetSupportedDataplaneFeatures` gRPC endpoints to accept *any* valid ACL token
```
3 changes: 3 additions & 0 deletions .changelog/15356.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
Ensure that data imported from peers is filtered by ACLs at the UI Nodes/Services endpoints [CVE-2022-3920](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3920)
```
3 changes: 3 additions & 0 deletions .changelog/15370.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
auto-config: Relax the validation on auto-config JWT authorization to allow non-whitespace, non-quote characters in node names.
```
3 changes: 3 additions & 0 deletions .changelog/15423.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
sdk: Fix SDK testutil backwards compatibility by only configuring grpc_tls port for new Consul versions.
```
3 changes: 3 additions & 0 deletions .changelog/15466.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
cli: Fix issue where `consul connect envoy` incorrectly uses the HTTPS API configuration for xDS connections.
```
3 changes: 3 additions & 0 deletions .changelog/15503.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: fix the limit of replication gRPC message; set to 8MB
```
3 changes: 3 additions & 0 deletions .changelog/15525.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ca: Fixed issue where using Vault as Connect CA with Vault-managed policies would error on start-up if the intermediate PKI mount existed but was empty
```
3 changes: 3 additions & 0 deletions .changelog/15541.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
agent: Fixed issue where blocking queries with short waits could timeout on the client
```
3 changes: 3 additions & 0 deletions .changelog/15555.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
ui: Add field for fallback server addresses to peer token generation form
```
3 changes: 3 additions & 0 deletions .changelog/15596.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
dns: Add support for cluster peering `.service` and `.node` DNS queries.
```
3 changes: 3 additions & 0 deletions .changelog/15610.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
acl: avoid debug log spam in secondary datacenter servers due to management token not being initialized.
```
3 changes: 3 additions & 0 deletions .changelog/15615.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: better represent non-passing states during peer check flattening
```
3 changes: 3 additions & 0 deletions .changelog/15659.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: Add support for ConsulResolver to specifies a filter expression
```
3 changes: 3 additions & 0 deletions .changelog/15661.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fixed issue where using Vault 1.11+ as CA provider in a secondary datacenter would eventually break Intermediate CAs
```
3 changes: 3 additions & 0 deletions .changelog/15669.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: ensure all vault connect CA tests use limited privilege tokens
```
3 changes: 3 additions & 0 deletions .changelog/15690.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix peering failovers ignoring local mesh gateway configuration.
```
3 changes: 3 additions & 0 deletions .changelog/15697.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:breaking-change
peering: Newly created peering connections must use only lowercase characters in the `name` field. Existing peerings with uppercase characters will not be modified, but they may encounter issues in various circumstances. To maintain forward compatibility and avoid issues, it is recommended to destroy and re-create any invalid peering connections so that they do not have a name containing uppercase characters.
```
3 changes: 3 additions & 0 deletions .changelog/15701.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
grpc: Use new balancer implementation to reduce periodic WARN logs when shuffling servers.
```
3 changes: 3 additions & 0 deletions .changelog/15705.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
Upgrade to use Go 1.19.4. This resolves a vulnerability where restricted files can be read on Windows. [CVE-2022-41720](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41720)
```
4 changes: 4 additions & 0 deletions .changelog/15737.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:security
Upgrades `golang.org/x/net` to prevent a denial of service by excessive memory usage caused by HTTP2 requests. [CVE-2022-41717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41717)
```

3 changes: 3 additions & 0 deletions .changelog/15760.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where DialedDirectly configuration was not used by Consul Dataplane.
```
3 changes: 3 additions & 0 deletions .changelog/15769.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
agent: Fix assignment of error when auto-reloading cert and key file changes.
```
3 changes: 3 additions & 0 deletions .changelog/15789.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
xds: fix bug where sessions for locally-managed services could fail with "this server has too many xDS streams open"
```
3 changes: 3 additions & 0 deletions .changelog/15833.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where service-resolver protocol checks incorrectly errored for failover peer targets.
```
3 changes: 3 additions & 0 deletions .changelog/15865.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where watches on upstream failover peer targets did not always query the correct data.
```
3 changes: 3 additions & 0 deletions .changelog/15866.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
agent: Fix issue where the agent cache would incorrectly mark protobuf objects as updated.
```
3 changes: 3 additions & 0 deletions .changelog/15913.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
cli: Fix issue where `consul connect envoy` was unable to configure TLS over unix-sockets to gRPC.
```
3 changes: 3 additions & 0 deletions .changelog/15988.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvements
cli: Added a flag, `-enable-config-gen-logging`, to the `connect envoy` command to display log messages when generating the bootstrap config.
```
3 changes: 3 additions & 0 deletions .changelog/16000.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:breaking-change
connect: Fix configuration merging for transparent proxy upstreams. Proxy-defaults and service-defaults config entries were not correctly merged for implicit upstreams in transparent proxy mode and would result in some configuration not being applied. To avoid issues when upgrading, ensure that any proxy-defaults or service-defaults have correct configuration for upstreams, since all fields will now be properly used to configure proxies.
```
3 changes: 3 additions & 0 deletions .changelog/16015.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
connect: add flags `envoy-ready-bind-port` and `envoy-ready-bind-address` to the `consul connect envoy` command that allows configuration of readiness probe on proxy for any service kind.
```
4 changes: 4 additions & 0 deletions .changelog/16024.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:improvement
partitiion: **(Consul Enterprise only)** when loading service from on-disk config file or sending API request to agent endpoint,
if the partition is unspecified, consul will default the partition in the request to agent's partition
```
3 changes: 3 additions & 0 deletions .changelog/16230.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix issue where secondary wan-federated datacenters could not be used as peering acceptors.
```
3 changes: 3 additions & 0 deletions .changelog/16257.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix issue where mesh gateways would use the wrong address when contacting a remote peer with the same datacenter name.
```
4 changes: 4 additions & 0 deletions .changelog/16263.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:security
Upgrade to use Go 1.20.1.
This resolves vulnerabilities [CVE-2022-41724](https://go.dev/issue/58001) in `crypto/tls` and [CVE-2022-41723](https://go.dev/issue/57855) in `net/http`.
```
3 changes: 3 additions & 0 deletions .changelog/16339.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix bug where services were incorrectly imported as connect-enabled.
```
3 changes: 3 additions & 0 deletions .changelog/16358.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
container: Upgrade container image to use to Alpine 3.17.
```
3 changes: 3 additions & 0 deletions .changelog/16495.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
mesh: Add ServiceResolver RequestTimeout for route timeouts to make request timeouts configurable
```
3 changes: 3 additions & 0 deletions .changelog/16498.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
proxycfg: fix a bug where terminating gateways were not cleaning up deleted service resolvers for their referenced services
```
3 changes: 3 additions & 0 deletions .changelog/16499.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
mesh: Fix resolution of service resolvers with subsets for external upstreams
```
3 changes: 3 additions & 0 deletions .changelog/16570.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fixes a bug that can lead to peering service deletes impacting the state of local services
```
3 changes: 3 additions & 0 deletions .changelog/16592.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ca: Fixes a bug where updating Vault CA Provider config would cause TLS issues in the service mesh
```
3 changes: 3 additions & 0 deletions .changelog/16660.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ui: fix PUT token request with adding missed AccessorID property to requestBody
```
3 changes: 3 additions & 0 deletions .changelog/16693.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fixes a bug where the importing partition was not added to peered failover targets, which causes issues when the importing partition is a non-default partition.
```
3 changes: 3 additions & 0 deletions .changelog/16700.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
audit-logging: (Enterprise only) Fix a bug where `/agent/monitor` and `/agent/metrics` endpoints return a `Streaming not supported` error when audit logs are enabled. This also fixes the delay receiving logs when running `consul monitor` against an agent with audit logs enabled.
```
3 changes: 3 additions & 0 deletions .changelog/16729.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix issue resulting in prepared query failover to cluster peers never un-failing over.
```
3 changes: 3 additions & 0 deletions .changelog/16776.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
peering: allow re-establishing terminated peering from new token without deleting existing peering first.
```
3 changes: 3 additions & 0 deletions .changelog/_3550.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
namespace: **(Enterprise Only)** Fixed a bug where a client may incorrectly log that namespaces were not enabled in the local datacenter
```
3 changes: 3 additions & 0 deletions .changelog/_3556.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
snapshot: **(Enterprise Only)** Add support for the snapshot agent to use an IAM role for authentication/authorization when managing snapshots in S3.
```
3 changes: 3 additions & 0 deletions .changelog/_3557.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
dns/peering: **(Enterprise Only)** Support addresses in the formats `<servicename>.virtual.<namespace>.ns.<partition>.ap.<peername>.peer.consul` and `<servicename>.virtual.<partition>.ap.<peername>.peer.consul`. This longer form address that allows specifying `.peer` would need to be used for tproxy DNS requests made within non-default partitions for imported services.
```
3 changes: 3 additions & 0 deletions .changelog/_3729.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
namespace: **(Enterprise Only)** Fix a bug that caused blocking queries during namespace replication to timeout
```
3 changes: 3 additions & 0 deletions .changelog/_3783.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
cli: **(Enterprise Only)** Fix issue where `consul partition update` subcommand was not registered and therefore not available through the cli.
```
3 changes: 3 additions & 0 deletions .changelog/_3846.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
agent: **(Enterprise Only)** Ensure configIntentionsConvertToList does not compare empty strings with populated strings when filtering intentions created prior to AdminPartitions.
```
3 changes: 3 additions & 0 deletions .changelog/_4696.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: **(Consul Enterprise only)** Fix issue where connect-enabled services with peer upstreams incorrectly required `service:write` access in the `default` namespace to query data, which was too restrictive. Now having `service:write` to any namespace is sufficient to query the peering data.
```
3 changes: 3 additions & 0 deletions .changelog/_4832.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: **(Consul Enterprise only)** Fix issue where resolvers, routers, and splitters referencing peer targets may not work correctly for non-default partitions and namespaces. Enterprise customers leveraging peering are encouraged to upgrade both servers and agents to avoid this problem.
```
2 changes: 1 addition & 1 deletion .circleci/bash_env.sh
Original file line number Diff line number Diff line change
Expand Up @@ -6,5 +6,5 @@ export GIT_DIRTY=$(test -n "`git status --porcelain`" && echo "+CHANGES" || true
export GIT_IMPORT=github.com/hashicorp/consul/version
# we're using this for build date because it's stable across platform builds
# the env -i and -noprofile are used to ensure we don't try to recursively call this profile when starting bash
export GIT_DATE=$(env -i /bin/bash --noprofile -norc ${CIRCLE_WORKING_DIRECTORY}/build-support/scripts/build-date.sh)
export GIT_DATE=$(env -i /bin/bash --noprofile -norc /home/circleci/project/build-support/scripts/build-date.sh)
export GOLDFLAGS="-X ${GIT_IMPORT}.GitCommit=${GIT_COMMIT}${GIT_DIRTY} -X ${GIT_IMPORT}.BuildDate=${GIT_DATE}"
Loading