Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
637 commits
Select commit Hold shift + click to select a range
1557e1d
sidecar-proxy controller: Add support for transparent proxy (NET-5069…
ishustava Sep 8, 2023
3e78b4c
Prefix sidecar proxy test files with source and destination. (#18620)
jmurret Sep 8, 2023
24d031d
k8s: Update audit-logging docs to include K8s examples (#18721)
Sep 10, 2023
bf291f5
Fix windows integrations tests machine size (#18736)
asheshvidyut Sep 11, 2023
7429aba
Increase timeout for integration test windows. (#18737)
asheshvidyut Sep 11, 2023
48ef8b6
Net-4292/list command (#18649)
JadhavPoonam Sep 11, 2023
172e915
Added logs for debugging (#18740)
asheshvidyut Sep 11, 2023
a69e901
xds: update golden tests to be deterministic (#18707)
rboyer Sep 11, 2023
b1688ad
Run copyright after running deep-copy as part of the Makefile/CI (#18…
Sep 11, 2023
9776c10
[NET-5333] Add api to read/list and preview templated policies (#18748)
roncodingenthusiast Sep 11, 2023
62062fd
NET-5132 - Configure multiport routing for connect proxies in TProxy …
jmurret Sep 12, 2023
697836b
added time stamps (#18757)
asheshvidyut Sep 12, 2023
264166f
fix: write endpoint errors out gracefully (#18743)
JadhavPoonam Sep 12, 2023
5e7afdf
[NET-5574] Update Go version to 1.20.8 (#18742)
zalimeni Sep 12, 2023
4724a4e
Add Envoy golden test for OTEL access logging extension (#18760)
cthain Sep 12, 2023
89e6725
mesh: create new routes-controller to reconcile xRoute types into a C…
rboyer Sep 12, 2023
78b170a
xds controller: setup watches for and compute leaf cert references in…
ndhanushkodi Sep 12, 2023
a55c4a1
Test: NET-5592 - update Nomad integration testing (#18768)
sophie-gairo Sep 12, 2023
d090668
Add workload identity ACL rules (#18769)
Sep 12, 2023
0b6efbb
Windows Integration Test Changes (#18758)
asheshvidyut Sep 13, 2023
12be06f
Add V2 TCP traffic permissions (#18771)
erichaberkorn Sep 13, 2023
07f54fe
resource: add helper to normalize inner Reference tenancy during muta…
rboyer Sep 13, 2023
09fffd4
Disable docs change CI skip detection (#18775)
zalimeni Sep 13, 2023
426c906
delete command ready (#18679)
xwa153 Sep 13, 2023
4dfca64
Vault CA provider clean up previous default issuers (#18773)
Sep 13, 2023
02259ef
Fix snapshot creation issue. (#18783)
hashi-derek Sep 13, 2023
7f2a1d9
catalog: service endpoints inherits protocol from service when worklo…
ishustava Sep 14, 2023
658c27a
add fuzz tests to resourcehcl package and fix some panics (#18798)
Sep 14, 2023
6748fac
Clean up resources in test (#18799)
Sep 14, 2023
8997d1a
Updates gateway-class-config docs to include fields for privileged co…
missylbytes Sep 14, 2023
e6b3c26
Removes errant word in docs that was breaking the build (#18804)
missylbytes Sep 14, 2023
d667cc3
Fix flaky test (#18805)
Sep 14, 2023
e5808d8
register traffic permission and workload identity types (#18704)
skpratt Sep 14, 2023
8021226
[NET-5329] use acl templated policy under the hood for node/service i…
roncodingenthusiast Sep 14, 2023
1afeb6e
[NET-5334] Added CLI commands for templated policies (#18816)
roncodingenthusiast Sep 14, 2023
66e1cdf
mesh: Wire ComputedRoutes into the ProxyStateTemplate via the sidecar…
rboyer Sep 14, 2023
9c1a1ff
mesh: call the right mapper (#18818)
rboyer Sep 14, 2023
e24b3d9
fix templated policy cli output (#18821)
roncodingenthusiast Sep 15, 2023
d3dad14
resource: default peername to "local" for now (#18822)
analogue Sep 15, 2023
21fdbba
Wire up traffic permissions (#18812)
erichaberkorn Sep 15, 2023
850fbda
added consul and envoy version constraints (#18726)
trujillo-adam Sep 15, 2023
6838441
Default to tcp protocol when workload protocol is unspecified (#18824)
ishustava Sep 15, 2023
753c8f1
Retry and timeout test acceptance test (#18791)
sarahalsmiller Sep 15, 2023
aff13cd
Use embedded strings for templated policies (#18829)
roncodingenthusiast Sep 15, 2023
b2e21c1
consul operator raft transfer-leader should send the id (#17107)
jameshartig Sep 15, 2023
1fda296
Allow empty data writes for resources (#18819)
skpratt Sep 15, 2023
edf56ee
Fix nondeterministic test (#18828)
Sep 15, 2023
5cde50d
mesh: prevent writing a ComputedRoutes with no ported configs (#18833)
rboyer Sep 15, 2023
a89938e
catalog: Default protocol to tcp in catalog.Service if unspecified (#…
ishustava Sep 15, 2023
461549e
Adjust metrics test (#18837)
Sep 15, 2023
5d99fb7
Audit log consul 1.17x changes (#18669)
asheshvidyut Sep 16, 2023
0018b7e
Fixes for integration tests windows for ENT (#18839)
asheshvidyut Sep 18, 2023
bf4e0b1
fix: provide meaningful error messages and add test (#18772)
JadhavPoonam Sep 18, 2023
4435e4a
add v2 tenancy bridge Flag and v2 Tenancy Bridge initial implementati…
Sep 18, 2023
17901ac
docs: Fix typo in description for server_addresses (#18838)
blake Sep 18, 2023
4357362
grafana: display connected consul-dataplanes (#18842)
huikang Sep 18, 2023
132c1ea
Adding Apigee for ext_authz, minor fix in the default ext_authz docs …
gautambaghel Sep 18, 2023
b4d5178
catalog: normalize/default/validate tenancy components of FailoverPol…
rboyer Sep 18, 2023
087539f
Fix gateway services cleanup where proxy deregistration happens after…
Sep 18, 2023
49cb842
Move ACL templated policies to hcl files (#18853)
roncodingenthusiast Sep 18, 2023
696aa1b
mesh: update xds controller to synthesize empty endpoints when no end…
rboyer Sep 18, 2023
dabbc96
mesh: normalize/default/validate tenancy components of mesh internal …
rboyer Sep 18, 2023
62796a1
resource: mutate and validate before acls on write (#18868)
analogue Sep 18, 2023
91e6c3a
Remove flaky test assertions (#18870)
Sep 18, 2023
212793a
mesh: only build tproxy outbound listener once per destination (#18836)
ishustava Sep 19, 2023
6fd33ba
NET-4519 Collecting journald logs in "consul debug" bundle (#18797)
asheshvidyut Sep 19, 2023
9b497f8
CI: lint test-integ (#18875)
huikang Sep 19, 2023
170417a
Honor Default Traffic Permissions in V2 (#18886)
erichaberkorn Sep 19, 2023
f3bf329
docs: Fix HCL, JSON, and YAML syntax errors (#18879)
blake Sep 19, 2023
5843efe
Fix code block examples on dns-static-lookups.mdx (#18880)
blake Sep 19, 2023
a2e50a6
docs: Fix Kubernetes CRD example configs (#18878)
blake Sep 19, 2023
203a368
docs: Apigee extension backport (#18847)
boruszak Sep 19, 2023
70e738c
Add operator audit endpoint changes (#18899)
roncodingenthusiast Sep 19, 2023
a62c75f
docs: Remove YAML service registration examples (#18877)
blake Sep 19, 2023
a071899
Add otel-access-logging Envoy extension integration test (#18898)
cthain Sep 19, 2023
db9ac4d
Add note about service upstream env var dot broken (#18895)
im2nguyen Sep 19, 2023
019c62e
xds: Use downstream protocol when connecting to local app (#18573)
blake Sep 19, 2023
07d916e
resource: ensure resource.AuthorizerContext properly strips the local…
rboyer Sep 19, 2023
5d349cf
docs: Add complete auth method payloads (#18849)
blake Sep 19, 2023
1a3081a
agent/config: prevent startup if resource-apis experiment and cloud a…
nickethier Sep 19, 2023
3a2e620
v2: various fixes to make K8s tproxy multiport acceptance tests and m…
ndhanushkodi Sep 20, 2023
6533e70
Added changelog entries for 1.14.10, 1.15.6, 1.16.2 (#18917)
jm96441n Sep 20, 2023
c829952
[NET-5332] Add nomad server templated policy (#18888)
roncodingenthusiast Sep 20, 2023
d574473
mesh: make FailoverPolicy work in xdsv2 and ProxyStateTemplate (#18900)
rboyer Sep 20, 2023
9e3794e
Fix changelog order (#18918)
jm96441n Sep 20, 2023
341dc28
Add namespace proto and registration (#18848)
Sep 20, 2023
0236c48
Update base ref property name (#18851)
NiniOak Sep 20, 2023
9eaa8eb
dns token (#17936)
johnlanda Sep 20, 2023
700d1bb
NET-5131 - support multiple ported upstreams tests (#18923)
jmurret Sep 20, 2023
1f941e4
Fix for loop in filter_changed_files_go_test script (#18931)
NiniOak Sep 20, 2023
f463ebd
Fix create dns token docs (#18927)
roncodingenthusiast Sep 21, 2023
d4ed304
[NET-5589] Optimize leaf watch diff on xds controller. (#18921)
hashi-derek Sep 21, 2023
bc142cd
NET-4884 - Terminating gateway tests for namespaces & partitions (#18…
curtbushko Sep 21, 2023
f87ae36
Fix V2 Wildcard RBAC Regular Expressions (#18941)
erichaberkorn Sep 21, 2023
276c60a
skip flaky test (#18949)
roncodingenthusiast Sep 21, 2023
cc40e08
docs: Fix invalid JSON in code examples (#18932)
blake Sep 21, 2023
f5985fe
do not trigger integration tests (#18948)
NiniOak Sep 21, 2023
565e793
Dump response body on fail (#18962)
Sep 21, 2023
53fcc5d
Add protoc generator to emit resource type variables (#18957)
mkeeler Sep 21, 2023
4e1e18f
docs: Change heading to filename in CodeBlockConfig (#18951)
blake Sep 21, 2023
5d0edec
docs: Replace unicode quotes with ASCII quotes (#18950)
blake Sep 21, 2023
0a11499
net-5689 fix disabling panic threshold logic (#18958)
ndhanushkodi Sep 21, 2023
d2be757
tenancy: split up tenancy `types.go` into CE version (#18966)
analogue Sep 22, 2023
eb7e203
[NET-5589] Add jitter to xds v2 leaf cert watches (#18940)
hashi-derek Sep 22, 2023
5b3ab2e
Fix docs for log file name changes (#18913)
asheshvidyut Sep 22, 2023
ef6f249
resource: allow for the ACLs.Read hook to request the entire data pay…
rboyer Sep 22, 2023
ec6189f
catalog: add ACL checks for FailoverPolicy resources (#18919)
rboyer Sep 22, 2023
de231bb
catalog: fix for new method argument (#18978)
rboyer Sep 22, 2023
d88888e
catalog,mesh,auth: Bump versions to v2beta1 (#18930)
ishustava Sep 22, 2023
20b86ce
[Docs] Add note to jwt docs to specify the need for ACLs (#18942)
roncodingenthusiast Sep 22, 2023
c814bb0
remove now orphaned generated v1alpha1 pb.go files (#18982)
rboyer Sep 22, 2023
7688178
peerstream: fix flaky test related to autopilot integration (#18979)
rboyer Sep 22, 2023
43a8dbb
mesh: add ACL checks for DestinationPolicy resources (#18920)
rboyer Sep 22, 2023
633c6c9
mesh: add ACL checks for xRoute resources (#18926)
rboyer Sep 22, 2023
4d6ff29
Traffic Permissions Validations (#18907)
erichaberkorn Sep 22, 2023
4e77482
feat: remove resource api client from api module (#18984)
JadhavPoonam Sep 22, 2023
11d6b0d
mesh: store bound reference pointers on a ComputedRoutes resource and…
rboyer Sep 22, 2023
d3bb5ff
Add CLI support for json (#18991)
Sep 22, 2023
9e48607
mesh: compute more of the xRoute features into ComputedRoutes (#18980)
rboyer Sep 22, 2023
e6b724d
catalog,mesh,auth: Move resource types to the proto-public module (#1…
ishustava Sep 22, 2023
ca75338
mesh: update various protobuf comments for mesh types (#18993)
rboyer Sep 22, 2023
58d0617
docs: add changelog (#18994)
ndhanushkodi Sep 25, 2023
aedc03b
api: add Token field to ServiceRegisterOpts (#18983)
tgross Sep 25, 2023
e5f5fc9
api: add `CheckRegisterOpts` method to Agent API (#18943)
tgross Sep 25, 2023
bd2fdb7
grafana: fix a query metrics from ent and add consul version (#18998)
huikang Sep 25, 2023
202090e
v2 explicit destination traffic permissions (#18823)
skpratt Sep 25, 2023
3ea6afb
mesh: rename Upstreams and UpstreamsConfiguration to Destinations* (#…
ishustava Sep 25, 2023
06c15d0
auth: register auth controllers with the server (#19000)
ishustava Sep 25, 2023
d85fc53
acl: default tenancy with the no-auth ACL resolver (#19006)
ishustava Sep 26, 2023
6f0df20
NET-5657 - consul-containers test for explicit upstreams (#18952)
jmurret Sep 26, 2023
2240e74
Skip the catalog v2 upgrade test (#19005)
mkeeler Sep 26, 2023
2306248
Fix type of datacenter in Service Resolvers Config Entry (#19004)
asheshvidyut Sep 27, 2023
fbc2b93
docs: Rename Consul OSS to Consul CE (#19009)
blake Sep 27, 2023
e6a111a
Update release notes to indicate folks should upgrade to to 1.16.2 or…
Sep 27, 2023
7ce6eba
Handle Traffic Permissions With Empty Sources Properly (#19024)
erichaberkorn Sep 28, 2023
5e45db1
Include RequestTimeout in marshal/unmarshal of ServiceResolverConfigE…
cthain Sep 29, 2023
9a48266
remove log (#19029)
ndhanushkodi Sep 29, 2023
21ea527
TrafficPermissions: add ACL hooks (#19023)
skpratt Oct 2, 2023
a62cfd9
docs: fix the description of meshgateway.mode=local in peering doc (#…
huikang Oct 2, 2023
2467660
Remove explicit -p from CI tests (#18999)
Oct 3, 2023
9addd9e
[NET-5788] Fix needed for JWTAuth in Consul Enterprise (#19038)
sarahalsmiller Oct 3, 2023
6c92dd1
NET-5600/container-test-acl-enabled (#18887)
JadhavPoonam Oct 3, 2023
df930a5
chore: fix ce/ent drift in sdk and testing/deployer submodules (#19041)
rboyer Oct 3, 2023
41e6f6c
Reduce number of ports that consul test agents take (#19047)
Oct 3, 2023
d67e5c6
NET-5590 - authorization: check for identity:write in CA certs, xds s…
jmurret Oct 3, 2023
f2b7b45
Fix Traffic Permissions Default Deny (#19028)
erichaberkorn Oct 4, 2023
b43cde5
Add workload identity hooks (#19045)
Oct 4, 2023
1a9666c
Remove parallel flag (#19057)
Oct 4, 2023
9656fd1
Fix Explicit Destination Integration Test (#19060)
erichaberkorn Oct 4, 2023
cf9e1b6
Add upgrade warnings (#19061)
Oct 4, 2023
344f463
chor: update rule to run frontend github tasks when changes are made …
valeriia-ruban Oct 4, 2023
af9a486
Fixes docs of Consul Debug - Adds info about Since Flag (#19056)
asheshvidyut Oct 5, 2023
788c586
Docs/ce 477 dataplanes on ecs (#19010)
trujillo-adam Oct 5, 2023
079c9d6
docs: clarify the requriment for cross-partition network (#19052)
huikang Oct 5, 2023
ca4ff6b
Bump up compatibility test runner (#19081)
Oct 5, 2023
ad26494
[CE] Add workload bind type and templated policy (#19077)
Oct 5, 2023
aa526db
Retry flaky tests (#19088)
Oct 5, 2023
342306c
Allow connections through Terminating Gateways from peered clusters N…
Oct 5, 2023
754ab9a
mesh: ensure we add the virtual port number for L7 implicit upstreams…
rboyer Oct 5, 2023
677e16a
Replace `hub` with `gh` for member roles on JIRA sync checks (#19089)
Oct 5, 2023
ed882e2
Make raft-wal default when `resource-apis` is active (#19090)
Oct 6, 2023
ad3aab1
Add traffic permissions integration tests. (#19008)
erichaberkorn Oct 6, 2023
af3439b
Ensure that upstream configuration is properly normalized. (#19076)
hashi-derek Oct 6, 2023
a9747dc
Docs/ce 470 locality aware (#19071)
trujillo-adam Oct 6, 2023
4713317
protohcl: allow attribute syntax for all map fields (#19108)
mkeeler Oct 6, 2023
a30ccdf
NET-4135 - Fix NodeMeta filtering Catalog List Services API (#18322)
asheshvidyut Oct 8, 2023
b9314de
Stop windows integration tests (#19118)
asheshvidyut Oct 9, 2023
d6200fa
Minor update to ratelimit wording (#19106)
Oct 10, 2023
dcdf2fc
Update Vault CA provider namespace configuration (#19095)
cthain Oct 10, 2023
92ce814
Remove old build tags (#19128)
Oct 10, 2023
2265905
Activate verifier when running WAL with experimental features (#19102)
Oct 10, 2023
830c4ea
v2tenancy: cluster scoped reads (#19082)
analogue Oct 10, 2023
8bebfc1
[NET-5457] Fix CE code for jwt multiple virtual hosts bug (#19123)
jm96441n Oct 10, 2023
78938c1
Docs/api-gw-jwts-openshift-1-17-x (#19035)
trujillo-adam Oct 10, 2023
679b0f6
docs: Sameness groups GA (#19103)
boruszak Oct 10, 2023
c35df12
mesh: Add ComputedProxyConfiguration and a controller that computes i…
ishustava Oct 10, 2023
d6b61da
docs: Multi-port and catalog changes (#19050)
boruszak Oct 10, 2023
1b35c81
Add 1.17 release notes (#19135)
im2nguyen Oct 11, 2023
ab1e08f
fix flaking container tests (#19134)
Oct 11, 2023
b9ab63c
server: when the v2 catalog experiment is enabled reject api and rpc …
rboyer Oct 11, 2023
6cbd417
NET-5822 - Add default outbound router in TProxy (#19087)
jmurret Oct 11, 2023
5146810
cli: do not hide the resource HCL parsing error and replace it with a…
rboyer Oct 11, 2023
ca1a755
fix broken link (#19140)
trujillo-adam Oct 11, 2023
7a323c4
[NET-5457] Golden Files for Multiple Virtual Hosts (#19131)
jm96441n Oct 11, 2023
eb06db0
sdk: update testutil.WaitForLeader to not use the v1 catalog api (#19…
rboyer Oct 11, 2023
c26d5cf
test: fix container test enterprise drift (#19101)
rboyer Oct 11, 2023
4996eee
Fix BUSL license checker to skip >= 1.17.x target branches (#19152) (…
analogue Oct 11, 2023
60b75a5
mesh: implement exposed paths (#19044)
ishustava Oct 12, 2023
6da4798
NET-5799 - ensure catalog controllers and dependency mappers function…
jmurret Oct 12, 2023
29ba5b5
catalog: block unsupported failover policy settings for now (#19168)
rboyer Oct 12, 2023
197bcd4
Refactor connect_auth.go into agent_endpoint.go (#19166)
Oct 12, 2023
ad06c96
mesh: add computed destinations with a controller that computes them …
ishustava Oct 12, 2023
54a12ab
mesh: sidecar proxy controller improvements (#19083)
ishustava Oct 12, 2023
25283f0
get-envoy-bootstrap-params: when v2 is enabled, use computed proxy co…
ishustava Oct 12, 2023
67393b5
Update metdata for locality-aware usage page (#19180)
trujillo-adam Oct 12, 2023
9500711
Add 1.17 upgrade-specific note for upstream normalization. (#19181)
hashi-derek Oct 12, 2023
dbca544
NET-5951 - Unique route names for implicit routes (#19174)
jmurret Oct 12, 2023
a39eec0
mesh: fix race in the sidecar-proxy controller test (#19183)
ishustava Oct 12, 2023
e3cb4ec
mesh: properly handle missing workload protocols (#19172)
ishustava Oct 12, 2023
95d9b2c
[NET-4931] xdsv2, sidecarproxycontroller, l4 trafficpermissions: supp…
ndhanushkodi Oct 12, 2023
a50a9e9
Net-5771/apply command stdin input (#19084)
JadhavPoonam Oct 13, 2023
c2a0d4f
Create DeepCopy() and Json Marshal/Unmarshal for proto-public (#19015)
Oct 13, 2023
76c60fd
Golden File Tests for TermGW w/ Cluster Peering (#19096)
Oct 13, 2023
5fbf0c0
Add namespace read write tests (#19173)
Oct 13, 2023
f0e4897
mesh: ensure that xRoutes have ParentRefs that have matching Tenancy …
rboyer Oct 13, 2023
99f7a12
catalog: add metadata filtering to refine workload selectors (#19198)
rboyer Oct 13, 2023
20d1fb8
server: run the api checks against the path without params (#19205)
rboyer Oct 13, 2023
3d1a606
Clone proto into deepcopy correctly (#19204)
Oct 13, 2023
9b0f4b7
chore: update version and nightly CI for 1.17 (#19208)
zalimeni Oct 13, 2023
e94d6ce
mesh: add validation hook to proxy configuration (#19186)
ishustava Oct 13, 2023
2ea33e9
mesh: add more validations to Destinations resource (#19202)
ishustava Oct 13, 2023
105ebfd
catalog, mesh: implement missing ACL hooks (#19143)
ishustava Oct 13, 2023
a7fbd00
NET-5073 - ProxyConfiguration: implement various connection options (…
jmurret Oct 14, 2023
3716b69
Relplat 897 copywrite bot workarounds (#19200)
modrake Oct 16, 2023
6c7d075
mesh: add xRoute ACL hook tenancy tests (#19177)
rboyer Oct 16, 2023
ad17769
resource: enforce lowercase v2 resource names (#19218)
analogue Oct 16, 2023
df8ea43
mesh: add DestinationPolicy ACL hook tenancy tests (#19178)
rboyer Oct 16, 2023
6741392
catalog: add FailoverPolicy ACL hook tenancy test (#19179)
rboyer Oct 16, 2023
dcd5930
docs: Multi-port corrections (#19224)
boruszak Oct 16, 2023
b81c862
Add reason why port 53 is not used by default (#19222)
Oct 16, 2023
4c5a46e
v2tenancy: rename v1alpha1 -> v2beta1 (#19227)
analogue Oct 16, 2023
8eb074e
[NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17…
zalimeni Oct 16, 2023
9f4f99c
NET-6097 - sidecar proxy controller - give name to first failover pol…
jmurret Oct 17, 2023
a6c990c
Cc 5545: Upgrade HDS packages and modifiers (#19226)
chris-hut Oct 17, 2023
b78465b
[NET-5810] CE changes for multiple virtual hosts (#19246)
jm96441n Oct 17, 2023
61bd08c
Net 4893- Ensure we're testing all the latest versions of Vault/Nomad…
sophie-gairo Oct 17, 2023
9976e08
docs: Fix example control-plane-request-limit HCL and JSON (#19105)
blake Oct 17, 2023
9b719e6
test: add 1.17 nightly integrations test (#19253)
DanStough Oct 17, 2023
51b58cd
fix expose paths (#19257)
ndhanushkodi Oct 17, 2023
c4d6d4d
docs: Multiport HCP constraint update (#19261)
boruszak Oct 17, 2023
16f0a24
docs: Fix multi-port install (#19262)
Oct 17, 2023
f45be22
Prevent circular dependencies between v2 resources and generate a mer…
erichaberkorn Oct 18, 2023
a94c013
build(docker): always publish full and minor version tags for dev ima…
DanStough Oct 18, 2023
d52ee6a
fix nightly integration test: envoy version and n-2 version (#19286)
huikang Oct 18, 2023
5e517c5
[NET-6221] Ensure LB policy set for locality-aware routing (CE) (#19283)
zalimeni Oct 19, 2023
2bd38d8
fix: allow snake case keys for ip based rate limit config entry (#19277)
JadhavPoonam Oct 19, 2023
e5a49bf
reformatted the JSON schema server conf ref (#19288)
trujillo-adam Oct 19, 2023
dfea3a0
acls,catalog,mesh: properly authorize workload selectors on writes (#…
ishustava Oct 19, 2023
ef27bc2
NET-6239: Temporarily disable verify envoy check (#19299)
NiniOak Oct 19, 2023
681aef3
Update supported Envoy versions (#19276)
cthain Oct 19, 2023
def66dd
mesh: provide missing domain to route configurations in ProxyStateTem…
ndhanushkodi Oct 19, 2023
6ffcf28
enable verify envoy script (#19303)
NiniOak Oct 19, 2023
8a6a858
Re-add retry logic to Vault token renewal
Oct 18, 2023
e669b10
backport of commit 8a6a85858481143f6e84396f42c3ec19d098da49
Oct 18, 2023
7cbb653
backport of commit a4dff427442e706981e89d8016fd1f86d56388a7
Oct 19, 2023
e229698
backport of commit cb7e5ded36266e2035ffcdaf0e98c6e0f0f6742c
Oct 19, 2023
14f7640
backport of commit fcc9ee6542f3c6f60ab2e7d3ce18f6f78f1e8371
Oct 20, 2023
5144d2a
backport of commit 61d1c264d8866ddfe83f098fe93afdb6ce87dc7f
Oct 20, 2023
93e9b2d
Merge 8a6a85858481143f6e84396f42c3ec19d098da49 into backport/kisunji/…
hc-github-team-consul-core Oct 20, 2023
b7c104c
backport of commit 1922b5f5396e55cafca6f40e1df1f0696015de25
Oct 18, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
3 changes: 3 additions & 0 deletions .changelog/13023.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
ui: the topology view now properly displays services with mixed connect and non-connect instances.
```
3 changes: 3 additions & 0 deletions .changelog/17075.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
agent: remove agent cache dependency from service mesh leaf certificate management
```
3 changes: 3 additions & 0 deletions .changelog/17160.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
Fix a bug that wrongly trims domains when there is an overlap with DC name.
```
3 changes: 3 additions & 0 deletions .changelog/17483.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
peering: Fix a bug that caused server agents to continue cleaning up peering resources even after loss of leadership.
```
3 changes: 3 additions & 0 deletions .changelog/17546.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: update supported envoy versions to 1.23.10, 1.24.8, 1.25.7, 1.26.2
```
3 changes: 3 additions & 0 deletions .changelog/17565.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
reloadable config: Made enable_debug config reloadable and enable pprof command to work when config toggles to true
```
3 changes: 3 additions & 0 deletions .changelog/17582.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
cli: `consul operator raft list-peers` command shows the number of commits each follower is trailing the leader by to aid in troubleshooting.
```
3 changes: 3 additions & 0 deletions .changelog/17596.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
debug: change default setting of consul debug command. now default duration is 5ms and default log level is 'TRACE'
```
4 changes: 4 additions & 0 deletions .changelog/17609.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
gateways: Fixed a bug in API gateways where binding a route that only targets a service imported from a peer results
in the programmed gateway having no routes.
```
3 changes: 3 additions & 0 deletions .changelog/17631.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
gateways: Fixed a bug where API gateways were not being taken into account in determining xDS rate limits.
```
3 changes: 3 additions & 0 deletions .changelog/17719.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
Bump Dockerfile base image to `alpine:3.18`.
```
3 changes: 3 additions & 0 deletions .changelog/17739.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
http: fixed API endpoint `PUT /acl/token/:AccessorID` (update token), no longer requires `AccessorID` in the request body. Web UI can now update tokens.
```
3 changes: 3 additions & 0 deletions .changelog/17754.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
ui: consul version is displayed in nodes list with filtering and sorting based on versions
```
3 changes: 3 additions & 0 deletions .changelog/17755.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
mesh: Stop jwt providers referenced by intentions from being deleted.
```
3 changes: 3 additions & 0 deletions .changelog/17757.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: Improve transparent proxy support for virtual services and failovers.
```
3 changes: 3 additions & 0 deletions .changelog/17759.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
extensions: Improve validation and error feedback for `property-override` builtin Envoy extension
```
3 changes: 3 additions & 0 deletions .changelog/17775.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where changes to service exports were not reflected in proxies.
```
3 changes: 3 additions & 0 deletions .changelog/17780.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
cli: `consul watch` command uses `-filter` expression to filter response from checks, services, nodes, and service.
```
3 changes: 3 additions & 0 deletions .changelog/17846.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect/ca: Fixes a bug preventing CA configuration updates in secondary datacenters
```
2 changes: 2 additions & 0 deletions .changelog/17885.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
```release-note:bug
ca: Fixed a bug where the Vault provider was not passing the configured role param for AWS auth
3 changes: 3 additions & 0 deletions .changelog/17888.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: Add capture group labels from Envoy cluster FQDNs to Envoy exported metric labels
```
3 changes: 3 additions & 0 deletions .changelog/17894.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix incorrect protocol config merging for transparent proxy implicit upstreams.
```
4 changes: 4 additions & 0 deletions .changelog/17911.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
gateway: Fixes a bug where envoy would silently reject RSA keys that are smaller than 2048 bits,
we now reject those earlier in the process when we validate the certificate.
```
4 changes: 4 additions & 0 deletions .changelog/17939.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:improvement
http: GET API `operator/usage` endpoint now returns node count
cli: `consul operator usage` command now returns node count
```
3 changes: 3 additions & 0 deletions .changelog/17978.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
mesh: Expose remote jwks cluster configuration through jwt-provider config entry
```
4 changes: 4 additions & 0 deletions .changelog/18011.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
connect: Removes the default health check from the `consul connect envoy` command when starting an API Gateway.
This health check would always fail.
```
3 changes: 3 additions & 0 deletions .changelog/18024.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: fix a bug with Envoy potentially starting with incomplete configuration by not waiting enough for initial xDS configuration.
```
3 changes: 3 additions & 0 deletions .changelog/18068.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
xds: Prevent partial application of non-Required Envoy extensions in the case of failure.
```
3 changes: 3 additions & 0 deletions .changelog/18080.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
Fix some typos in metrics docs
```
3 changes: 3 additions & 0 deletions .changelog/18112.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ca: Fixes a Vault CA provider bug where updating RootPKIPath but not IntermediatePKIPath would not renew leaf signing certificates
```
3 changes: 3 additions & 0 deletions .changelog/18140.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
hcp: Removes requirement for HCP to provide a management token
```
3 changes: 3 additions & 0 deletions .changelog/18150.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
xds: Explicitly enable WebSocket connection upgrades in HTTP connection manager
```
3 changes: 3 additions & 0 deletions .changelog/18168.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
hcp: Add dynamic configuration support for the export of server metrics to HCP.
```
3 changes: 3 additions & 0 deletions .changelog/18184.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api: Fix client deserialization errors by marking new Enterprise-only prepared query fields as omit empty
```
3 changes: 3 additions & 0 deletions .changelog/18186.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
Upgrade golang.org/x/net to address [CVE-2023-29406](https://nvd.nist.gov/vuln/detail/CVE-2023-29406)
```
5 changes: 5 additions & 0 deletions .changelog/18190.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
```release-note:security
Upgrade to use Go 1.20.6.
This resolves [CVE-2023-29406](https://github.com/advisories/GHSA-f8f7-69v5-w4vx)(`net/http`) for uses of the standard library.
A separate change updates dependencies on `golang.org/x/net` to use `0.12.0`.
```
3 changes: 3 additions & 0 deletions .changelog/18223.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
cli: `consul members` command uses `-filter` expression to filter members based on bexpr.
```
3 changes: 3 additions & 0 deletions .changelog/18291.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api-gateway: fix race condition in proxy config generation when Consul is notified of the bound-api-gateway config entry before it is notified of the api-gateway config entry.
```
4 changes: 4 additions & 0 deletions .changelog/18302.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
snapshot: fix access denied and handle is invalid when we call snapshot save on windows - skip sync() for folders in windows in
https://github.com/rboyer/safeio/pull/3
```
3 changes: 3 additions & 0 deletions .changelog/18303.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
connect: update supported envoy versions to 1.23.12, 1.24.10, 1.25.9, 1.26.4
```
6 changes: 6 additions & 0 deletions .changelog/18319.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note:improvement
acl: added builtin ACL policy that provides global read-only access (builtin/global-read-only)
```
```release-note:improvement
acl: allow for a single slash character in policy names
```
3 changes: 3 additions & 0 deletions .changelog/18322.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
catalog api: fixes a bug with catalog api where filter query parameter was not working correctly for the `/v1/catalog/services` endpoint
```
3 changes: 3 additions & 0 deletions .changelog/18325.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
mesh: **(Enterprise Only)** Require that `jwt-provider` config entries are created in the `default` namespace.
```
7 changes: 7 additions & 0 deletions .changelog/18358.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
```release-note:security
Upgrade to use Go 1.20.7.
This resolves vulnerability [CVE-2023-29409](https://nvd.nist.gov/vuln/detail/CVE-2023-29409)(`crypto/tls`).
```
```release-note:security
Update `golang.org/x/net` to v0.13.0 to address [CVE-2023-3978](https://nvd.nist.gov/vuln/detail/CVE-2023-3978).
```
6 changes: 6 additions & 0 deletions .changelog/18381.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note:improvement
checks: It is now possible to configure agent TCP checks to use TLS with
optional server SNI and mutual authentication. To use TLS with a TCP check, the
check must enable the `tcp_use_tls` boolean. By default the agent will use the
TLS configuration in the `tls.default` stanza.
```
3 changes: 3 additions & 0 deletions .changelog/18437.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
Inherit locality from services when registering sidecar proxies.
```
3 changes: 3 additions & 0 deletions .changelog/18464.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
UI : Nodes list view was breaking for synthetic-nodes. Fix handles non existence of consul-version meta for node.
```
3 changes: 3 additions & 0 deletions .changelog/18558.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
check: prevent go routine leakage when existing Defercheck of same check id is not nil
```
3 changes: 3 additions & 0 deletions .changelog/18584.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
Reduce the frequency of metric exports from Consul to HCP from every 10s to every 1m
```
4 changes: 4 additions & 0 deletions .changelog/18617.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:improvement
log: Currently consul logs files like this consul-{timestamp}.log. This change makes sure that there is always
consul.log file with the latest logs in it.
```
5 changes: 5 additions & 0 deletions .changelog/18625.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
```release-note:improvement
Adds flag -append-filename (which works on values version, dc, node and status) to consul snapshot save command.
Adding the flag -append-filename version,dc,node,status will add consul version, consul datacenter, node name and leader/follower
(status) in the file name given in the snapshot save command before the file extension.
```
3 changes: 3 additions & 0 deletions .changelog/18636.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
connect: Fix issue where Envoy endpoints would not populate correctly after a snapshot restore.
```
3 changes: 3 additions & 0 deletions .changelog/18667.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
api: Add support for listing ACL tokens by service name.
```
3 changes: 3 additions & 0 deletions .changelog/18681.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api: Fix `/v1/agent/self` not returning latest configuration
```
3 changes: 3 additions & 0 deletions .changelog/18724.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
telemetry: emit consul version metric on a regular interval.
```
8 changes: 8 additions & 0 deletions .changelog/18742.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
```release-note:security
Upgrade to use Go 1.20.8. This resolves CVEs
[CVE-2023-39320](https://github.com/advisories/GHSA-rxv8-v965-v333) (`cmd/go`),
[CVE-2023-39318](https://github.com/advisories/GHSA-vq7j-gx56-rxjh) (`html/template`),
[CVE-2023-39319](https://github.com/advisories/GHSA-vv9m-32rr-3g55) (`html/template`),
[CVE-2023-39321](https://github.com/advisories/GHSA-9v7r-x7cv-v437) (`crypto/tls`), and
[CVE-2023-39322](https://github.com/advisories/GHSA-892h-r6cr-53g4) (`crypto/tls`)
```
3 changes: 3 additions & 0 deletions .changelog/18773.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ca: Vault provider now cleans up the previous Vault issuer and key when generating a new leaf signing certificate [[GH-18779](https://github.com/hashicorp/consul/issues/18779)]
```
3 changes: 3 additions & 0 deletions .changelog/18797.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
command: Adds -since flag in consul debug command which internally calls hcdiag for debug information in the past.
```
3 changes: 3 additions & 0 deletions .changelog/18831.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
gateways: Fix a bug where gateway to service mappings weren't being cleaned up properly when externally registered proxies were being deregistered.
```
3 changes: 3 additions & 0 deletions .changelog/18959.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
gateways: Fix a bug where a service in a peered datacenter could not access an external node service through a terminating gateway
```
3 changes: 3 additions & 0 deletions .changelog/19031.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api: add custom marshal/unmarshal for ServiceResolverConfigEntry.RequestTimeout so config entries that set this field can be read using the API.
```
3 changes: 3 additions & 0 deletions .changelog/19095.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
ca: ensure Vault CA provider respects Vault Enterprise namespace configuration.
```
3 changes: 3 additions & 0 deletions .changelog/19120.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
api-gateway: fix matching for different hostnames on the same listener
```
9 changes: 9 additions & 0 deletions .changelog/19225.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
```release-note:security
Upgrade Go to 1.20.10.
This resolves vulnerability [CVE-2023-39325](https://nvd.nist.gov/vuln/detail/CVE-2023-39325)
/ [CVE-2023-44487](https://nvd.nist.gov/vuln/detail/CVE-2023-44487)(`net/http`).
```
```release-note:security
Update `golang.org/x/net` to v0.17.0 to address [CVE-2023-39325](https://nvd.nist.gov/vuln/detail/CVE-2023-39325)
/ [CVE-2023-44487](https://nvd.nist.gov/vuln/detail/CVE-2023-44487)(`x/net/http2`).
```
3 changes: 3 additions & 0 deletions .changelog/19273.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
connect: update supported envoy versions to 1.24.12, 1.25.11, 1.26.6 to address [CVE-2023-44487](https://github.com/envoyproxy/envoy/security/advisories/GHSA-jhv4-f7mr-xx76)
```
7 changes: 7 additions & 0 deletions .changelog/19285.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
```release-note:bug
ca: Fix bug with Vault CA provider where token renewal goroutines could leak if CA failed to initialize.
```

```release-note:bug
ca: Fix bug with Vault CA provider where renewing a retracted token would cause retries in a tight loop, degrading performance.
```
3 changes: 3 additions & 0 deletions .changelog/_5517.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
namespaces: **(Enterprise only)** fixes a bug where agent health checks stop syncing for all services on a node if the namespace of any service has been removed from the server.
```
4 changes: 4 additions & 0 deletions .changelog/_5614.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
```release-note:bug
namespaces: **(Enterprise only)** fixes a bug where namespaces are stuck in a deferred deletion state indefinitely under some conditions.
Also fixes the Consul query metadata present in the HTTP headers of the namespace read and list endpoints.
```
3 changes: 3 additions & 0 deletions .changelog/_5669.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
audit-logging: **(Enterprise only)** enable error response and request body logging
```
3 changes: 3 additions & 0 deletions .changelog/_5740.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
api: (Enterprise only) Add `POST /v1/operator/audit-hash` endpoint to calculate the hash of the data used by the audit log hash function and salt.
```
3 changes: 3 additions & 0 deletions .changelog/_5750.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:feature
cli: (Enterprise only) Add a new `consul operator audit hash` command to retrieve and compare the hash of the data used by the audit log hash function and salt.
```
3 changes: 3 additions & 0 deletions .changelog/_5805.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:security
audit-logging: **(Enterprise only)** limit `v1/operator/audit-hash` endpoint to ACL token with `operator:read` privileges.
```
3 changes: 3 additions & 0 deletions .changelog/_7406.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
server: **(Enterprise Only)** Fixed an issue where snake case keys were rejected when configuring the control-plane-request-limit config entry
```
31 changes: 31 additions & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
Expand Up @@ -8,3 +8,34 @@
# release configuration
/.release/ @hashicorp/release-engineering @hashicorp/github-consul-core
/.github/workflows/build.yml @hashicorp/release-engineering @hashicorp/github-consul-core


# Staff Engineer Review (protocol buffer definitions)
/proto-public/ @hashicorp/consul-core-staff
/proto/ @hashicorp/consul-core-staff

# Staff Engineer Review (v1 architecture shared components)
/agent/cache/ @hashicorp/consul-core-staff
/agent/consul/fsm/ @hashicorp/consul-core-staff
/agent/consul/leader*.go @hashicorp/consul-core-staff
/agent/consul/server*.go @hashicorp/consul-core-staff
/agent/consul/state/ @hashicorp/consul-core-staff
/agent/consul/stream/ @hashicorp/consul-core-staff
/agent/submatview/ @hashicorp/consul-core-staff
/agent/blockingquery/ @hashicorp/consul-core-staff

# Staff Engineer Review (raft/autopilot)
/agent/consul/autopilotevents/ @hashicorp/consul-core-staff
/agent/consul/autopilot*.go @hashicorp/consul-core-staff

# Staff Engineer Review (v2 architecture shared components)
/internal/controller/ @hashicorp/consul-core-staff
/internal/resource/ @hashicorp/consul-core-staff
/internal/storage/ @hashicorp/consul-core-staff
/agent/consul/controller/ @hashicorp/consul-core-staff
/agent/grpc-external/services/resource/ @hashicorp/consul-core-staff

# Staff Engineer Review (v1 security)
/acl/ @hashicorp/consul-core-staff
/agent/xds/rbac*.go @hashicorp/consul-core-staff
/agent/xds/jwt*.go @hashicorp/consul-core-staff
Loading