All Versions
136
Latest Version
Avg Release Cycle
24 days
Latest Release
50 days ago

Changelog History
Page 1

  • v1.10.2 Changes

    August 27, 2021

    KNOWN ISSUES:

    • ๐Ÿš€ tls: The fix for CVE-2021-37219 introduced an issue that could prevent TLS certificate validation when intermediate CA certificates used to sign server certificates are transmitted in the TLS session but are not present in all Consul server's configured CA certificates. This has the effect of preventing Raft RPCs between the affected servers. As a work around until the next patch releases, ensure that all intermediate CA certificates are present in all Consul server configurations prior to using certificates that they have signed.

    ๐Ÿ”’ SECURITY:

    ๐Ÿ”‹ FEATURES:

    • ๐Ÿ‘ connect: add support for unix domain socket config via API/CLI [GH-10758]
    • ๐Ÿ”ง ui: Adding support in Topology view for Routing Configurations [GH-10872]
    • ๐Ÿ”ง ui: Create Routing Configurations route and page [GH-10835]
    • ๐Ÿ’ป ui: Splitting up the socket mode and socket path in the Upstreams Instance List [GH-10581]

    ๐Ÿ‘Œ IMPROVEMENTS:

    • areas: (Enterprise only) Add 15s timeout to opening streams over pooled connections.
    • areas: (Enterprise only) Apply backpressure to area gossip packet ingestion when more than 512 packets are waiting to be ingested.
    • areas: (Enterprise only) Make implementation of WriteToAddress non-blocking to avoid slowing down memberlist's packetListen routine.
    • โฑ checks: Add Interval and Timeout to API response. [GH-10717]
    • ci: make changelog-checker only validate PR number against main base [GH-10844]
    • โฌ†๏ธ ci: upgrade to use Go 1.16.7 [GH-10856]
    • โšก๏ธ deps: update to gogo/protobuf v1.3.2 [GH-10813]
    • ๐Ÿ”ง proxycfg: log correlation IDs for the proxy configuration snapshot's blocking queries. [GH-10689]

    ๐Ÿ› BUG FIXES:

    • 0๏ธโƒฃ acl: fixes a bug that prevented the default user token from being used to authorize service registration for connect proxies. [GH-10824]
    • ๐Ÿ›  ca: fixed a bug when ca provider fail and provider state is stuck in INITIALIZING state. [GH-10630]
    • ca: report an error when setting the ca config fail because of an index check. [GH-10657]
    • ๐Ÿ”ง cli: Ensure the metrics endpoint is accessible when Envoy is configured to use 0๏ธโƒฃ a non-default admin bind address. [GH-10757]
    • cli: Fix a bug which prevented initializing a watch when using a namespaced token. [GH-10795]
    • ๐Ÿ cli: Fix broken KV import command on Windows. [GH-10820]
    • connect: ensure SAN validation for prepared queries validates against all possible prepared query targets [GH-10873]
    • connect: fix crash that would result from multiple instances of a service resolving service config on a single agent. [GH-10647]
    • connect: proxy upstreams inherit namespace from service if none are defined. [GH-10688]
    • ๐Ÿ›  dns: fixes a bug with edns truncation where the response could exceed the size limit in some cases. [GH-10009]
    • grpc: ensure that streaming gRPC requests work over mesh gateway based wan federation [GH-10838]
    • ๐ŸŒฒ http: log cancelled requests as such at the INFO level, instead of logging them as errored requests. [GH-10707]
    • 0๏ธโƒฃ streaming: set the default wait timeout for health queries [GH-10707]
    • ๐Ÿ›  txn: fixes Txn.Apply to properly authorize service registrations. [GH-10798]
    • ๐Ÿ’ป ui: Disabling policy form fields from users with 'read' permissions [GH-10902]
    • ๐Ÿ”’ ui: Fix Health Checks in K/V form Lock Sessions Info section [GH-10767]
    • ๐Ÿ’ป ui: Fix dropdown option duplication in the new intentions form [GH-10706]
    • ๐Ÿ’ป ui: Hide all metrics for ingress gateway services [GH-10858]
    • ๐Ÿ’ป ui: Properly encode non-URL safe characters in OIDC responses [GH-10901]
    • ๐Ÿ’ป ui: fixes a bug with some service failovers not showing the routing tab visualization [GH-10913]
  • v1.10.1 Changes

    July 15, 2021

    KNOWN ISSUES:

    • The change to enable streaming by default uncovered an incompatibility between streaming and WAN federation over mesh gateways causing traffic to fall back to attempting a direct WAN connection rather than transiting through the gateways. We currently suggest explicitly setting use_streaming_backend=false if using WAN federation over mesh gateways when upgrading to 1.10.1 and are working to address this issue in a future patch release.

    ๐Ÿ”’ SECURITY:

    • xds: ensure envoy verifies the subject alternative name for upstreams CVE-2021-32574 [GH-10621]
    • 0๏ธโƒฃ xds: ensure single L7 deny intention with default deny policy does not result in allow action CVE-2021-36213 [GH-10619]

    ๐Ÿ”‹ FEATURES:

    • ๐Ÿง cli: allow running redirect-traffic command in a provided Linux namespace. [GH-10564]
    • ๐Ÿง sdk: allow applying iptables rules in a provided Linux namespace. [GH-10564]

    ๐Ÿ‘Œ IMPROVEMENTS:

    • acl: Return secret ID when listing tokens if accessor has acl:write [GH-10546]
    • 0๏ธโƒฃ structs: prevent service-defaults upstream configs from using wildcard names or namespaces [GH-10475]
    • ๐Ÿšš ui: Move all CSS icons to use standard CSS custom properties rather than SASS variables [GH-10298]

    ๐Ÿ—„ DEPRECATIONS:

    • ๐Ÿšš connect/ca: remove the RotationPeriod field from the Consul CA provider, it was not used for anything. [GH-10552]

    ๐Ÿ› BUG FIXES:

    • ๐Ÿ”€ agent: fix a panic on 32-bit platforms caused by misaligned struct fields used with sync/atomic. [GH-10515]
    • ๐Ÿ›  ca: Fixed a bug that returned a malformed certificate chain when the certificate did not having a trailing newline. [GH-10411]
    • 0๏ธโƒฃ checks: fixes the default ServerName used with TLS health checks. [GH-10490]
    • ๐Ÿ›  connect/proxy: fixes logic bug preventing builtin/native proxy from starting upstream listeners [GH-10486]
    • streaming: fix a bug that was preventing streaming from being enabled. [GH-10514]
    • ui: (Enterprise only) Ensure permissions are checked based on the actively selected namespace [GH-10608]
    • ๐Ÿ’ป ui: Ensure in-folder KVs are created in the correct folder [GH-10569]
    • ๐Ÿ’ป ui: Fix KV editor syntax highlighting [GH-10605]
    • ๐Ÿ’ป ui: Send service name down to Stats to properly call endpoint for Upstreams and Downstreams metrics [GH-10535]
    • ๐Ÿ’ป ui: Show ACLs disabled page at Tokens page instead of 403 error when ACLs are disabled [GH-10604]
    • 0๏ธโƒฃ ui: Use the token's namespace instead of the default namespace when not specifying a namespace in the URL [GH-10503]
  • v1.10.0 Changes

    June 22, 2021

    ๐Ÿ’ฅ BREAKING CHANGES:

    • 0๏ธโƒฃ connect: Disallow wildcard as name for service-defaults. [GH-10069]
    • connect: avoid encoding listener info in ingress and terminating gateway listener stats names. [GH-10404]
    • licensing: (Enterprise Only) Consul Enterprise 1.10 has removed API driven licensing of servers in favor of license loading via configuration. The PUT and DELETE methods on the /v1/operator/license endpoint will now return 405s, the consul license put and consul license reset CLI commands have been removed and the LicensePut and LicenseReset methods in the API client have been altered to always return an error. [GH-10211]
    • licensing: (Enterprise Only) Consul Enterprise client agents now require a valid non-anonymous ACL token for retrieving their license from the servers. Additionally client agents rely on the value of the start_join and retry_join configurations for determining the servers to query for the license. Therefore one must be set to use license auto-retrieval. [GH-10248]
    • licensing: (Enterprise Only) Consul Enterprise has removed support for temporary licensing. All server agents must have a valid license at startup and client agents must have a license at startup or be able to retrieve one from the servers. [GH-10248]

    ๐Ÿ”‹ FEATURES:

    • checks: add H2 ping health checks. [GH-8431]
    • cli: Add additional flags to the consul connect redirect-traffic command to allow excluding inbound and outbound ports, outbound CIDRs, and additional user IDs from traffic redirection. [GH-10134]
    • cli: Add new consul connect redirect-traffic command for applying traffic redirection rules when Transparent Proxy is enabled. [GH-9910]
    • cli: Add prefix option to kv import command [GH-9792]
    • cli: Automatically exclude ports from envoy_prometheus_bind_addr, envoy_stats_bind_addr, and ListenerPort from Expose config from inbound traffic redirection rules if proxy-id flag is provided to the consul connect redirect-traffic command. [GH-10134]
    • cli: snapshot inspect command provides KV usage breakdown [GH-9098]
    • ๐Ÿ‘ cli: snapshot inspect command supports JSON output [GH-9006]
    • connect: Add local_request_timeout_ms to allow configuring the Envoy request timeout on local_app [GH-9554]
    • ๐Ÿ‘ connect: add support for unix domain sockets addresses for service upstreams and downstreams [GH-9981]
    • connect: add toggle to globally disable wildcard outbound network access when transparent proxy is enabled [GH-9973]
    • connect: generate upstream service labels for terminating gateway listener stats. [GH-10404]
    • ๐Ÿ“ฆ sdk: Add new iptables package for applying traffic redirection rules with iptables. [GH-9910]
    • ๐Ÿ“ฆ sdk: Allow excluding inbound and outbound ports, outbound CIDRs, and additional user IDs from traffic redirection in the iptables package. [GH-10134]
    • ๐Ÿ’ป ui: Add Unix Domain Socket support [GH-10287]
    • ๐Ÿ’ป ui: Create a collapsible notices component for the Topology tab [GH-10270]
    • ๐Ÿ’ป ui: Read-only ACL Auth Methods view [GH-9617]
    • โšก๏ธ ui: Transparent Proxy - Service mesh visualization updates [GH-10002]
    • xds: emit a labeled gauge of connected xDS streams by version [GH-10243]
    • ๐Ÿ‘ xds: exclusively support the Incremental xDS protocol when using xDS v3 [GH-9855]

    ๐Ÿ‘Œ IMPROVEMENTS:

    • acl: extend the auth-methods list endpoint to include MaxTokenTTL and TokenLocality fields. [GH-9741]
    • acl: use the presence of a management policy in the state store as a sign that we already migrated to v2 acls [GH-9505]
    • ๐Ÿ”ง agent: Save exposed Envoy ports to the agent's state when Expose.Checks is true in proxy's configuration. [GH-10173]
    • api: Add ExposedPort to the health check API resource. [GH-10173]
    • api: Enable setting query options on agent endpoints. [GH-9903]
    • api: The Content-Type header is now always set when a body is present in a request. [GH-10204]
    • cli: snapshot inspect command can now inspect raw snapshots from a server's data dir. [GH-10089]
    • cli: the consul connect envoy --envoy_statsd_url flag will now resolve the $HOST_IP environment variable, as part of a full url. [GH-8564]
    • command: Exclude exposed Envoy ports from traffic redirection when providing -proxy-id and Expose.Checks is set. [GH-10173]
    • ๐Ÿ‘ connect: Add support for transparently proxying traffic through Envoy. [experimental] [GH-9894]
    • ๐Ÿ”ง connect: Allow per-upstream configuration to be set in service-defaults. [experimental] [GH-9872]
    • connect: Ensures passthrough tproxy cluster is created even when mesh config doesn't exist. [GH-10301]
    • ๐Ÿ‘ connect: Support dialing individual service IP addresses through transparent proxies. [GH-10329]
    • ๐Ÿ‘ connect: The builtin connect proxy no longer advertises support for h2 via ALPN. [GH-4466]. [GH-9920]
    • โšก๏ธ connect: Update the service mesh visualization to account for transparent proxies. [GH-10016]
    • connect: adds new flags prometheus-backend-port and prometheus-scrape-port to consul connect envoy to support envoy_prometheus_bind_addr pointing to the merged metrics port when using Consul Connect on K8s. [GH-9768]
    • connect: allow exposing duplicate HTTP paths through a proxy instance. [GH-10394]
    • connect: rename cluster config entry to mesh. [GH-10127]
    • connect: restrict transparent proxy mode to only match on the tagged virtual IP address. [GH-10162]
    • โšก๏ธ connect: update supported envoy versions to 1.18.2, 1.17.2, 1.16.3, 1.15.4 [GH-10101]
    • โšก๏ธ connect: update supported envoy versions to 1.18.3, 1.17.3, 1.16.4, and 1.15.5 [GH-10231]
    • ๐Ÿ”Š debug: capture a single stream of logs, and single pprof profile and trace for the whole duration [GH-10279]
    • ๐Ÿšš grpc: move gRPC INFO logs to be emitted as TRACE logs from Consul [GH-10395]
    • licensing: (Enterprise Only) Consul Enterprise has gained the consul license inspect CLI command for inspecting a license without applying it..
    • licensing: (Enterprise Only) Consul Enterprise has gained the ability to autoload a license via configuration. This can be specified with the license_path configuration, the CONSUL_LICENSE environment variable or the CONSUL_LICENSE_PATH environment variable [GH-10210]
    • licensing: (Enterprise Only) Consul Enterprise has gained the ability update its license via a configuration reload. The same environment variables and configurations will be used to determine the new license. [GH-10267]
    • โšก๏ธ monitoring: optimize the monitoring endpoint to avoid losing logs when under high load. [GH-10368]
    • ๐Ÿ”Š raft: allow reloading of raft trailing logs and snapshot timing to allow recovery from some replication failure modes. ๐Ÿ“š telemetry: add metrics and documentation for monitoring for replication issues. [GH-10129]
    • streaming: change use_streaming_backend to default to true so that streaming is used by default when it is supported. [GH-10149]
    • ๐Ÿšš ui: Add 'optional route segments' and move namespaces to use them [GH-10212]
    • ๐Ÿ’ป ui: Adding a notice about how TransparentProxy mode affects the Upstreams list at the top of tab view [GH-10136]
    • ๐Ÿ’ป ui: Improve loader centering with new side navigation [GH-10181]
    • ๐Ÿšš ui: Move to a sidebar based main navigation [GH-9553]
    • ๐Ÿš‘ ui: Show a message to explain that health checks may be out of date if the serf health check is in a critical state [GH-10194]
    • โšก๏ธ ui: Updating the wording for the banner and the popover for a service with an upstream that is not explicitly defined. [GH-10133]
    • ๐Ÿ›ฐ ui: Use older (~2016) native ES6 features to reduce transpilation and UI JS payload [GH-9729]
    • ๐Ÿ’ป ui: add permanently visible indicator when ACLs are disabled [GH-9864]
    • ๐Ÿ”Š ui: improve accessibility of modal dialogs [GH-9819]
    • ๐Ÿ’ป ui: restrict the viewing/editing of certain UI elements based on the users ACL token [GH-9687]
    • โšก๏ธ ui: updates the ui with the new consul brand assets [GH-10081]
    • ๐Ÿ‘ xds: add support for envoy 1.17.0 [GH-9658]
    • 0๏ธโƒฃ xds: default to speaking xDS v3, but allow for v2 to be spoken upon request [GH-9658]
    • xds: ensure that all envoyproxy/go-control-plane protobuf symbols are linked into the final binary [GH-10131]
    • ๐Ÿšš xds: remove deprecated usages of xDS and drop support for envoy 1.13.x [GH-9602]

    ๐Ÿ› BUG FIXES:

    • checks: add TLSServerName field to allow setting the TLS server name for HTTPS health checks. [GH-9475]
    • config: Fixed a bug where rpc_max_conns_per_client could not be changed by reloading the config. [GH-8696]
    • connect: Fix bug that prevented transparent proxies from working when mesh config restricted routing to catalog destinations. [GH-10365]
    • ๐Ÿ›  memberlist: fixes a couple bugs which allowed malformed input to cause a crash in a Consul client or server. [GH-10161]
    • ๐Ÿ”Š monitor: fix monitor to produce json format logs when requested [GH-10358]
    • proxycfg: Ensure that endpoints for explicit upstreams in other datacenters are watched in transparent mode. [GH-10391]
    • ๐Ÿšš proxycfg: avoid panic when transparent proxy upstream is added and then removed. [GH-10423]
    • ๐Ÿ›  streaming: fixes a bug that would cause context cancellation errors when a cache entry expired while requests were active. [GH-10112]
    • streaming: lookup in health properly handle case-sensitivity and perform filtering based on tags and node-meta [GH-9703]
    • ๐Ÿ›  telemetry: fixes a bug with Prometheus metrics where Gauges and Summaries were incorrectly being expired. [GH-10161]
    • ๐Ÿ’ป ui: Adding conditional to prevent Service Mesh from breaking when there are no Upstreams [GH-10122]
    • ๐Ÿ’ป ui: Fix text searching through upstream instances. [GH-10151]
    • โšก๏ธ ui: Update conditional for topology empty state [GH-10124]
    • ๐Ÿ’ป ui: ensure proxy instance API requests perform blocking queries correctly [GH-10039]
    • xds: (beta-only) ensure that dependent xDS resources are reconfigured during primary type warming [GH-10381]

    NOTES:

    • legal: (Enterprise only) Enterprise binary downloads will now include a copy of the EULA and Terms of Evaluation in the zip archive
  • v1.10.0-rc Changes

    June 16, 2021

    ๐Ÿ’ฅ BREAKING CHANGES:

    • connect: avoid encoding listener info in ingress and terminating gateway listener stats names. [GH-10404]

    ๐Ÿ”‹ FEATURES:

    • connect: generate upstream service labels for terminating gateway listener stats. [GH-10404]

    ๐Ÿ‘Œ IMPROVEMENTS:

    • connect: allow exposing duplicate HTTP paths through a proxy instance. [GH-10394]
    • ๐Ÿšš grpc: move gRPC INFO logs to be emitted as TRACE logs from Consul [GH-10395]
    • โšก๏ธ monitoring: optimize the monitoring endpoint to avoid losing logs when under high load. [GH-10368]

    ๐Ÿ› BUG FIXES:

    • proxycfg: Ensure that endpoints for explicit upstreams in other datacenters are watched in transparent mode. [GH-10391]
    • xds: (beta-only) ensure that dependent xDS resources are reconfigured during primary type warming [GH-10381]

    NOTES:

    • legal: (Enterprise only) Enterprise binary downloads will now include a copy of the EULA and Terms of Evaluation in the zip archive
  • v1.10.0-beta4 Changes

    June 10, 2021

    ๐Ÿ‘Œ IMPROVEMENTS:

    • ๐Ÿ‘ connect: Support dialing individual service IP addresses through transparent proxies. [GH-10329]
    • ๐Ÿ”Š debug: capture a single stream of logs, and single pprof profile and trace for the whole duration [GH-10279]
    • licensing: (Enterprise Only) Consul Enterprise has gained the consul license inspect CLI command for inspecting a license without applying it..
    • telemetry: The usage data in the metrics API now includes cluster member counts, reporting clients on a per segment basis. [GH-10340]

    ๐Ÿ› BUG FIXES:

    • ๐ŸŒฒ agent: fix logging output by removing leading whitespace from every log line [GH-10338]
    • autopilot: (Enterprise only) Fixed an issue where autopilot could cause a new leader to demote the wrong voter when redundancy zones are in use and the previous leader failed. [GH-10306]
    • ๐Ÿšš cli: removes the need to set debug_enabled=true to collect debug data from the CLI. Now the CLI behaves the same way as the API and accepts either an ACL token with operator:read, or debug_enabled=true. [GH-10273]
    • connect: Fix bug that prevented transparent proxies from working when mesh config restricted routing to catalog destinations. [GH-10365]
    • ๐Ÿ›  envoy: fixes a bug where a large envoy config could cause the consul connect envoy command to deadlock when attempting to start envoy. [GH-10324]
    • ๐Ÿ”Š monitor: fix monitor to produce json format logs when requested [GH-10358]
  • v1.10.0-beta3 Changes

    May 27, 2021

    ๐Ÿ’ฅ BREAKING CHANGES:

    • licensing: (Enterprise Only) Consul Enterprise 1.10 has removed API driven licensing of servers in favor of license loading via configuration. The PUT and DELETE methods on the /v1/operator/license endpoint will now return 405s, the consul license put and consul license reset CLI commands have been removed and the LicensePut and LicenseReset methods in the API client have been altered to always return an error. [GH-10211]
    • licensing: (Enterprise Only) Consul Enterprise client agents now require a valid non-anonymous ACL token for retrieving their license from the servers. Additionally client agents rely on the value of the start_join and retry_join configurations for determining the servers to query for the license. Therefore one must be set to use license auto-retrieval. [GH-10248]
    • licensing: (Enterprise Only) Consul Enterprise has removed support for temporary licensing. All server agents must have a valid license at startup and client agents must have a license at startup or be able to retrieve one from the servers. [GH-10248]

    ๐Ÿ”‹ FEATURES:

    • ๐Ÿ’ป ui: Add Unix Domain Socket support [GH-10287]
    • xds: emit a labeled gauge of connected xDS streams by version [GH-10243]

    ๐Ÿ‘Œ IMPROVEMENTS:

    • ๐Ÿ”ง agent: Save exposed Envoy ports to the agent's state when Expose.Checks is true in proxy's configuration. [GH-10173]
    • api: Add ExposedPort to the health check API resource. [GH-10173]
    • api: The Content-Type header is now always set when a body is present in a request. [GH-10204]
    • areas: (Enterprise only) Use server agent's gossip_wan config when setting memberlist configuration for network areas. Previously they used memberlists WAN defaults.
    • command: Exclude exposed Envoy ports from traffic redirection when providing -proxy-id and Expose.Checks is set. [GH-10173]
    • connect: Avoid adding original_dst listener filter when it won't be used. [GH-10302]
    • connect: Ensures passthrough tproxy cluster is created even when mesh config doesn't exist. [GH-10301]
    • โšก๏ธ connect: update supported envoy versions to 1.18.3, 1.17.3, 1.16.4, and 1.15.5 [GH-10231]
    • licensing: (Enterprise Only) Consul Enterprise has gained the ability to autoload a license via configuration. This can be specified with the license_path configuration, the CONSUL_LICENSE environment variable or the CONSUL_LICENSE_PATH environment variable [GH-10210]
    • licensing: (Enterprise Only) Consul Enterprise has gained the ability update its license via a configuration reload. The same environment variables and configurations will be used to determine the new license. [GH-10267]
    • ๐Ÿšš ui: Add 'optional route segments' and move namespaces to use them [GH-10212]
    • ๐Ÿ’ป ui: Improve loader centering with new side navigation [GH-10181]
    • ๐Ÿ’ป ui: Only show a partial list of intention permissions, with the option to show all [GH-10174]
    • ๐Ÿš‘ ui: Show a message to explain that health checks may be out of date if the serf health check is in a critical state [GH-10194]

    ๐Ÿ› BUG FIXES:

    • ๐Ÿ—„ agent: ensure we hash the non-deprecated upstream fields on ServiceConfigRequest [GH-10240]
    • 0๏ธโƒฃ api: include the default value of raft settings in the output of /v1/agent/self [GH-8812]
    • areas: (Enterprise only) Revert to the 10s dial timeout used before connection pooling was introduced in 1.7.3.
    • areas: (Enterprise only) Selectively merge gossip_wan config for network areas to avoid attempting to enable gossip encryption where it was not intended or necessary.
    • http: fix a bug that caused the X-Consul-Effective-Consistency header to be missing on request for service health [GH-10189]
    • 0๏ธโƒฃ local: agents will no longer persist the default user token along with a service or check. [GH-10188]
    • namespaces: (Enterprise only) fixes a problem where the logs would contain many warnings about namespaces not being licensed.
    • server: ensure that central service config flattening properly resets the state each time [GH-10239]
    • ๐Ÿ”’ ui: Add conditionals to lock sessions tab [GH-10121]
    • ๐Ÿ’ป ui: De-duplicate tags in rendered tag listings [GH-10186]
    • ๐Ÿ’ป ui: Don't render a DOM element for empty namespace descriptions [GH-10157]
    • ๐Ÿ’ป ui: Reflect the change of Session API response shape for Checks in post 1.7 Consul [GH-10225]
  • v1.10.0-beta2 Changes

    May 05, 2021

    ๐Ÿ’ฅ BREAKING CHANGES:

    • 0๏ธโƒฃ connect: Disallow wildcard as name for service-defaults. [GH-10069]

    ๐Ÿ”‹ FEATURES:

    • cli: Add additional flags to the consul connect redirect-traffic command to allow excluding inbound and outbound ports, outbound CIDRs, and additional user IDs from traffic redirection. [GH-10134]
    • cli: Automatically exclude ports from envoy_prometheus_bind_addr, envoy_stats_bind_addr, and ListenerPort from Expose config from inbound traffic redirection rules if proxy-id flag is provided to the consul connect redirect-traffic command. [GH-10134]
    • ๐Ÿ‘ connect: add support for unix domain sockets addresses for service upstreams and downstreams [GH-9981]
    • ๐Ÿ“ฆ sdk: Allow excluding inbound and outbound ports, outbound CIDRs, and additional user IDs from traffic redirection in the iptables package. [GH-10134]
    • ๐Ÿ‘ xds: exclusively support the Incremental xDS protocol when using xDS v3 [GH-9855]

    ๐Ÿ‘Œ IMPROVEMENTS:

    • acl: Give more descriptive error if auth method not found. [GH-10163]
    • cli: snapshot inspect command can now inspect raw snapshots from a server's data dir. [GH-10089]
    • connect: rename cluster config entry to mesh. [GH-10127]
    • connect: restrict transparent proxy mode to only match on the tagged virtual IP address. [GH-10162]
    • โšก๏ธ connect: update supported envoy versions to 1.18.2, 1.17.2, 1.16.3, 1.15.4 [GH-10101]
    • ๐Ÿ”Š raft: allow reloading of raft trailing logs and snapshot timing to allow recovery from some replication failure modes. ๐Ÿ“š telemetry: add metrics and documentation for monitoring for replication issues. [GH-10129]
    • streaming: change use_streaming_backend to default to true so that streaming is used by default when it is supported. [GH-10149]
    • telemetry: Add new metrics for status of secondary datacenter replication. [GH-10073]
    • ๐Ÿ’ป ui: Added CRD popover 'informed action' for intentions managed by CRDs [GH-10100]
    • ๐Ÿ”’ ui: Added humanized formatting to lock session durations [GH-10062]
    • ๐Ÿ’ป ui: Adding a notice about how TransparentProxy mode affects the Upstreams list at the top of tab view [GH-10136]
    • โšก๏ธ ui: Updating the wording for the banner and the popover for a service with an upstream that is not explicitly defined. [GH-10133]
    • โšก๏ธ ui: updates the ui with the new consul brand assets [GH-10081]
    • xds: ensure that all envoyproxy/go-control-plane protobuf symbols are linked into the final binary [GH-10131]

    ๐Ÿ› BUG FIXES:

    • cli: snapshot inspect command would panic on invalid input. [GH-10091]
    • ๐Ÿ›  memberlist: fixes a couple bugs which allowed malformed input to cause a crash in a Consul client or server. [GH-10161]
    • ๐Ÿ›  streaming: fixes a bug that would cause context cancellation errors when a cache entry expired while requests were active. [GH-10112]
    • ๐Ÿ›  telemetry: fixes a bug with Prometheus metrics where Gauges and Summaries were incorrectly being expired. [GH-10161]
    • ๐Ÿ’ป ui: Adding conditional to prevent Service Mesh from breaking when there are no Upstreams [GH-10122]
    • ๐Ÿ’ป ui: Fix text searching through upstream instances. [GH-10151]
    • ๐Ÿšš ui: Removes the extra rendering of namespace in service upstream list [GH-10152]
    • โšก๏ธ ui: Update conditional for topology empty state [GH-10124]
  • v1.10.0-beta1 Changes

    April 16, 2021

    ๐Ÿ”’ SECURITY:

    • โž• Add content-type headers to raw KV responses to prevent XSS attacks CVE-2020-25864 [GH-10023]
    • ๐Ÿ“œ audit-logging: Parse endpoint URL to prevent requests from bypassing the audit log CVE-2021-28156

    ๐Ÿ”‹ FEATURES:

    • checks: add H2 ping health checks. [GH-8431]
    • cli: Add new consul connect redirect-traffic command for applying traffic redirection rules when Transparent Proxy is enabled. [GH-9910]
    • cli: Add prefix option to kv import command [GH-9792]
    • cli: snapshot inspect command provides KV usage breakdown [GH-9098]
    • ๐Ÿ‘ cli: snapshot inspect command supports JSON output [GH-9006]
    • connect: Add local_request_timeout_ms to allow configuring the Envoy request timeout on local_app [GH-9554]
    • connect: add toggle to globally disable wildcard outbound network access when transparent proxy is enabled [GH-9973]
    • ๐Ÿ“ฆ sdk: Add new iptables package for applying traffic redirection rules with iptables. [GH-9910]
    • โšก๏ธ ui: Transparent Proxy - Service mesh visualization updates [GH-10002]
    • ๐Ÿ’ป ui: Read-only ACL Auth Methods view [GH-9617]

    ๐Ÿ‘Œ IMPROVEMENTS:

    • acl: extend the auth-methods list endpoint to include MaxTokenTTL and TokenLocality fields. [GH-9741]
    • acl: use the presence of a management policy in the state store as a sign that we already migrated to v2 acls [GH-9505]
    • api: Enable setting query options on agent endpoints. [GH-9903]
    • ๐Ÿ“œ api: AutopilotServerHelath now handles the 429 status code returned by the v1/operator/autopilot/health endpoint and still returned the parsed reply which will indicate server healthiness [GH-8599]
    • cli: added a -force-without-cross-signing flag to the ca set-config command. ๐Ÿ‘ connect/ca: The ForceWithoutCrossSigning field will now work as expected for CA providers that support cross signing. [GH-9672]
    • cli: the consul connect envoy --envoy_statsd_url flag will now resolve the $HOST_IP environment variable, as part of a full url. [GH-8564]
    • 0๏ธโƒฃ client: when a client agent is attempting to dereigster a service, anddoes not have access to the ACL token used to register a service, attempt to use the agent token instead of the default user token. If no agent token is set, fall back to the default user token. [GH-9683]
    • ๐Ÿ‘ connect: Add support for transparently proxying traffic through Envoy. [experimental] [GH-9894]
    • ๐Ÿ”ง connect: Allow per-upstream configuration to be set in service-defaults. [experimental] [GH-9872]
    • connect: Automatically rewrite the Host header for Terminating Gateway HTTP services [GH-9042]
    • ๐Ÿ‘ connect: The builtin connect proxy no longer advertises support for h2 via ALPN. [GH-4466]. [GH-9920]
    • โšก๏ธ connect: Update the service mesh visualization to account for transparent proxies. [GH-10016]
    • connect: adds new flags prometheus-backend-port and prometheus-scrape-port to consul connect envoy to support envoy_prometheus_bind_addr pointing to the merged metrics port when using Consul Connect on K8s. [GH-9768]
    • ๐Ÿšš ui: Move to a sidebar based main navigation [GH-9553]
    • ๐Ÿ›ฐ ui: Use older (~2016) native ES6 features to reduce transpilation and UI JS payload [GH-9729]
    • ๐Ÿ’ป ui: add permanently visible indicator when ACLs are disabled [GH-9864]
    • ๐Ÿ”Š ui: improve accessibility of modal dialogs [GH-9819]
    • ๐Ÿ’ป ui: restrict the viewing/editing of certain UI elements based on the users ACL token [GH-9687]
    • ๐Ÿ”’ ui: support stricter content security policies [GH-9847]
    • ๐Ÿ‘ xds: add support for envoy 1.17.0 [GH-9658]
    • 0๏ธโƒฃ xds: default to speaking xDS v3, but allow for v2 to be spoken upon request [GH-9658]
    • ๐Ÿšš xds: remove deprecated usages of xDS and drop support for envoy 1.13.x [GH-9602]

    ๐Ÿ› BUG FIXES:

    • api: ensure v1/health/ingress/:service endpoint works properly when streaming is enabled [GH-9967]
    • ๐Ÿ›  areas: Fixes a bug which would prevent newer servers in a network areas from connecting to servers running a version of Consul prior to 1.7.3.
    • ๐Ÿ›  audit-logging: (Enterprise only) Fixed an issue that resulted in usage of the agent master token or managed service provider tokens from being resolved properly. [GH-10013]
    • cache: fix a bug in the client agent cache where streaming could potentially leak resources. [GH-9978]. [GH-9978]
    • cache: fix a bug in the client agent cache where streaming would disconnect every 20 minutes and cause delivery delays. [GH-9979]. [GH-9979]
    • checks: add TLSServerName field to allow setting the TLS server name for HTTPS health checks. [GH-9475]
    • ๐Ÿ”Š command: when generating envoy bootstrap configs to stdout do not mix informational logs into the json [GH-9980]
    • config: Fixed a bug where rpc_max_conns_per_client could not be changed by reloading the config. [GH-8696]
    • โž• config: correct config key from advertise_addr_ipv6 to advertise_addr_wan_ipv6 [GH-9851]
    • ๐Ÿ”Š http: fix a bug in Consul Enterprise that would cause the UI to believe namespaces were supported, resulting in warning logs and incorrect UI behaviour. [GH-9923]
    • ๐Ÿ›  snapshot: fixes a bug that would cause snapshots to be missing all but the first ACL Auth Method. [GH-10025]
    • streaming: lookup in health properly handle case-sensitivity and perform filtering based on tags and node-meta [GH-9703]
    • ๐Ÿ’ป ui: Fix intention form cancel button [GH-9901]
    • ๐Ÿ’ป ui: ensure proxy instance API requests perform blocking queries correctly [GH-10039]
  • v1.9.9 Changes

    August 27, 2021

    KNOWN ISSUES:

    • ๐Ÿš€ tls: The fix for CVE-2021-37219 introduced an issue that could prevent TLS certificate validation when intermediate CA certificates used to sign server certificates are transmitted in the TLS session but are not present in all Consul server's configured CA certificates. This has the effect of preventing Raft RPCs between the affected servers. As a work around until the next patch releases, ensure that all intermediate CA certificates are present in all Consul server configurations prior to using certificates that they have signed.

    ๐Ÿ”’ SECURITY:

    ๐Ÿ‘Œ IMPROVEMENTS:

    • areas: (Enterprise only) Add 15s timeout to opening streams over pooled connections.
    • areas: (Enterprise only) Apply backpressure to area gossip packet ingestion when more than 512 packets are waiting to be ingested.
    • areas: (Enterprise only) Make implementation of WriteToAddress non-blocking to avoid slowing down memberlist's packetListen routine.
    • โšก๏ธ deps: update to gogo/protobuf v1.3.2 [GH-10813]

    ๐Ÿ› BUG FIXES:

    • 0๏ธโƒฃ acl: fixes a bug that prevented the default user token from being used to authorize service registration for connect proxies. [GH-10824]
    • ๐Ÿ›  ca: fixed a bug when ca provider fail and provider state is stuck in INITIALIZING state. [GH-10630]
    • ca: report an error when setting the ca config fail because of an index check. [GH-10657]
    • ๐Ÿ”ง cli: Ensure the metrics endpoint is accessible when Envoy is configured to use 0๏ธโƒฃ a non-default admin bind address. [GH-10757]
    • cli: Fix a bug which prevented initializing a watch when using a namespaced token. [GH-10795]
    • connect: proxy upstreams inherit namespace from service if none are defined. [GH-10688]
    • ๐Ÿ›  dns: fixes a bug with edns truncation where the response could exceed the size limit in some cases. [GH-10009]
    • ๐Ÿ›  txn: fixes Txn.Apply to properly authorize service registrations. [GH-10798]
    • ๐Ÿ’ป ui: Fix dropdown option duplication in the new intentions form [GH-10706]
    • ๐Ÿ’ป ui: Hide all metrics for ingress gateway services [GH-10858]
    • ๐Ÿ’ป ui: Properly encode non-URL safe characters in OIDC responses [GH-10901]
    • ๐Ÿ’ป ui: fixes a bug with some service failovers not showing the routing tab visualization [GH-10913]
  • v1.9.8 Changes

    July 15, 2021

    ๐Ÿ”’ SECURITY:

    • xds: ensure envoy verifies the subject alternative name for upstreams CVE-2021-32574 [GH-10621]
    • 0๏ธโƒฃ xds: ensure single L7 deny intention with default deny policy does not result in allow action CVE-2021-36213 [GH-10619]

    ๐Ÿ› BUG FIXES:

    • ๐Ÿ›  ca: Fixed a bug that returned a malformed certificate chain when the certificate did not having a trailing newline. [GH-10411]
    • ๐Ÿ’ป ui: Send service name down to Stats to properly call endpoint for Upstreams and Downstreams metrics [GH-10535]