All Versions
183
Latest Version
Avg Release Cycle
29 days
Latest Release
1027 days ago
Changelog History
Page 8
Changelog History
Page 8
-
v1.8.14 Changes
July 15, 2021๐ SECURITY:
- xds: ensure envoy verifies the subject alternative name for upstreams CVE-2021-32574 [GH-10621]
๐ BUG FIXES:
- ๐ ca: Fixed a bug that returned a malformed certificate chain when the certificate did not having a trailing newline. [GH-10411]
-
v1.8.13 Changes
June 21, 2021๐ IMPROVEMENTS:
- ๐ debug: capture a single stream of logs, and single pprof profile and trace for the whole duration [GH-10279]
- licensing: (Enterprise Only) In order to have forward compatibility with Consul Enterprise v1.10, the ability to parse licenses from the configuration or environment has been added. This can be specified with the
license_path
configuration, theCONSUL_LICENSE
environment variable or theCONSUL_LICENSE_PATH
environment variable. On server agents this configuration will be ignored. Client agents and the snapshot agent will use the configured license instead of automatically retrieving one. [GH-10442] - โก๏ธ monitoring: optimize the monitoring endpoint to avoid losing logs when under high load. [GH-10368]
๐ BUG FIXES:
-
v1.8.12 Changes
June 04, 2021๐ BUG FIXES:
- ๐ฒ agent: fix logging output by removing leading whitespace from every log line [GH-10338]
- ๐ cli: removes the need to set debug_enabled=true to collect debug data from the CLI. Now the CLI behaves the same way as the API and accepts either an ACL token with operator:read, or debug_enabled=true. [GH-10273]
- ๐ envoy: fixes a bug where a large envoy config could cause the
consul connect envoy
command to deadlock when attempting to start envoy. [GH-10324] - namespaces: (Enterprise only) fixes a problem where the logs would contain many warnings about namespaces not being licensed.
-
v1.8.11 Changes
June 03, 2021๐ IMPROVEMENTS:
- areas: (Enterprise only) Use server agent's gossip_wan config when setting memberlist configuration for network areas. Previously they used memberlists WAN defaults.
- cli: added a
-force-without-cross-signing
flag to theca set-config
command. ๐ connect/ca: The ForceWithoutCrossSigning field will now work as expected for CA providers that support cross signing. [GH-9672] - โก๏ธ connect: update supported envoy versions to 1.14.7, 1.13.7, 1.12.7, 1.11.2 [GH-10106]
- telemetry: Add new metrics for status of secondary datacenter replication. [GH-10073]
๐ BUG FIXES:
- ๐ agent: ensure we hash the non-deprecated upstream fields on ServiceConfigRequest [GH-10240]
- 0๏ธโฃ api: include the default value of raft settings in the output of /v1/agent/self [GH-8812]
- areas: (Enterprise only) Revert to the 10s dial timeout used before connection pooling was introduced in 1.7.3.
- areas: (Enterprise only) Selectively merge gossip_wan config for network areas to avoid attempting to enable gossip encryption where it was not intended or necessary.
- 0๏ธโฃ local: agents will no longer persist the default user token along with a service or check. [GH-10188]
- server: ensure that central service config flattening properly resets the state each time [GH-10239]
-
v1.8.10 Changes
April 15, 2021๐ SECURITY:
- โ Add content-type headers to raw KV responses to prevent XSS attacks CVE-2020-25864 [GH-10023]
- ๐ audit-logging: Parse endpoint URL to prevent requests from bypassing the audit log CVE-2021-28156
๐ BUG FIXES:
- ๐ areas: Fixes a bug which would prevent newer servers in a network areas from connecting to servers running a version of Consul prior to 1.7.3.
- ๐ audit-logging: (Enterprise only) Fixed an issue that resulted in usage of the agent master token or managed service provider tokens from being resolved properly. [GH-10013]
- ๐ command: when generating envoy bootstrap configs to stdout do not mix informational logs into the json [GH-9980]
- โ config: correct config key from
advertise_addr_ipv6
toadvertise_addr_wan_ipv6
[GH-9851] - ๐ snapshot: fixes a bug that would cause snapshots to be missing all but the first ACL Auth Method. [GH-10025]
-
v1.8.9 Changes
March 04, 2021๐ IMPROVEMENTS:
- ๐ cli: Add new
-cluster-id
andcommon-name
toconsul tls ca create
to support creating a CA for Consul Connect. [GH-9585] - connect: if the token given to the vault provider returns no data avoid a panic [GH-9806]
- ๐ connect: update supported envoy point releases to 1.14.6, 1.13.7, 1.12.7, 1.11.2 [GH-9739]
- license: (Enterprise only) Temporary client license duration was increased from 30m to 6h.
- server: use the presense of stored federation state data as a sign that we already activated the federation state feature flag [GH-9519]
- ๐ xds: only try to create an ipv6 expose checks listener if ipv6 is supported by the kernel [GH-9765]
๐ BUG FIXES:
- ๐ api: Remove trailing periods from the gateway internal HTTP API endpoint [GH-9752]
- ๐ cache: Prevent spamming the logs for days when a cached request encounters an "ACL not found" error. [GH-9738]
- connect: connect CA Roots in the primary datacenter should use a SigningKeyID derived from their local intermediate [GH-9428]
- proxycfg: avoid potential deadlock in delivering proxy snapshot to watchers. [GH-9689]
- 0๏ธโฃ server: When wan federating via mesh gateways after initial federation default to using the local mesh gateways unless the heuristic indicates a bypass is required. [GH-9528]
- server: When wan federating via mesh gateways only do heuristic primary DC bypass on the leader. [GH-9366]
- xds: deduplicate mesh gateway listeners by address in a stable way to prevent some LDS churn [GH-9650]
- xds: prevent LDS flaps in mesh gateways due to unstable datacenter lists; also prevent some flaps in terminating gateways as well [GH-9651]
- ๐ cli: Add new
-
v1.8.8 Changes
January 22, 2021๐ BUG FIXES:
- ๐ connect: Fixed a bug in the AWS PCA Connect CA provider that could cause the intermediate PKI path to be deleted after reconfiguring the CA [GH-9498]
- ๐ connect: Fixed a bug in the Vault Connect CA provider that could cause the intermediate PKI path to be deleted after reconfiguring the CA [GH-9498]
- โก๏ธ connect: Fixed an issue that would prevent updating the Connect CA configuration if the CA provider didn't complete initialization previously. [GH-9498]
- ๐ leader: Fixed a bug that could cause Connect CA initialization failures from allowing leader establishment to complete resulting in potentially infinite leader elections. [GH-9498]
- rpc: Prevent misleading RPC error claiming the lack of a leader when Raft is ok but there are issues with client agents gossiping with the leader. [GH-9487]
- ๐ป ui: ensure namespace is used for node API requests [GH-9488]
-
v1.8.7 Changes
December 10, 20201.8.7 (December 10, 2020)
๐ BUG FIXES:
- acl: global tokens created by auth methods now correctly replicate to secondary datacenters [GH-9351]
- โก๏ธ connect: fixes a case when updating the CA config in a secondary datacenter to correctly trigger the creation of a new intermediate certificate [GH-9009]
- connect: only unset the active root in a secondary datacenter when a new one is replacing it [GH-9318]
- ๐ license: (Enterprise only) Fixed an issue where the UI would see Namespaces and SSO as licensed when they were not.
- license: (Enterprise only) Fixed an issue where warnings about Namespaces being unlicensed would be emitted erroneously.
- namespace: (Enterprise Only) Fixed a bug that could case snapshot restoration to fail when it contained a namespace marked for deletion while still containing other resources in that namespace. [GH-9156]
- namespace: (Enterprise Only) Fixed an issue where namespaced services and checks were not being deleted when the containing namespace was deleted.
- namespaces: (Enterprise only) Prevent stalling of replication in secondary datacenters due to conflicts between the namespace replicator and other replicators. [GH-9271]
-
v1.8.7-beta1 Changes
December 03, 20201.8.7-beta1 (December 03, 2020)
๐ BUG FIXES:
- โก๏ธ connect: fixes a case when updating the CA config in a secondary datacenter to correctly trigger the creation of a new intermediate certificate [GH-9009]
- connect: only unset the active root in a secondary datacenter when a new one is replacing it [GH-9318]
- ๐ license: (Enterprise only) Fixed an issue where the UI would see Namespaces and SSO as licensed when they were not.
- license: (Enterprise only) Fixed an issue where warnings about Namespaces being unlicensed would be emitted erroneously.
- namespace: (Enterprise Only) Fixed a bug that could case snapshot restoration to fail when it contained a namespace marked for deletion while still containing other resources in that namespace. [GH-9156]
- namespace: (Enterprise Only) Fixed an issue where namespaced services and checks were not being deleted when the containing namespace was deleted.
-
v1.8.6 Changes
November 19, 20201.8.6 (November 19, 2020)
๐ SECURITY:
- ๐ง Increase the permissions to read from the
/connect/ca/configuration
endpoint tooperator:write
. Previously Connect CA configuration, including the private key, set via this endpoint could be read back by an operator withoperator:read
privileges. CVE-2020-28053 [GH-9240]
- ๐ง Increase the permissions to read from the