All Versions
183
Latest Version
Avg Release Cycle
29 days
Latest Release
581 days ago
Changelog History
Page 5
Changelog History
Page 5
-
v1.10.0-beta3 Changes
May 27, 2021๐ฅ BREAKING CHANGES:
- licensing: (Enterprise Only) Consul Enterprise 1.10 has removed API driven licensing of servers in favor of license loading via configuration. The
PUT
andDELETE
methods on the/v1/operator/license
endpoint will now return 405s, theconsul license put
andconsul license reset
CLI commands have been removed and theLicensePut
andLicenseReset
methods in the API client have been altered to always return an error. [GH-10211] - licensing: (Enterprise Only) Consul Enterprise client agents now require a valid non-anonymous ACL token for retrieving their license from the servers. Additionally client agents rely on the value of the
start_join
andretry_join
configurations for determining the servers to query for the license. Therefore one must be set to use license auto-retrieval. [GH-10248] - licensing: (Enterprise Only) Consul Enterprise has removed support for temporary licensing. All server agents must have a valid license at startup and client agents must have a license at startup or be able to retrieve one from the servers. [GH-10248]
๐ FEATURES:
- ๐ป ui: Add Unix Domain Socket support [GH-10287]
- xds: emit a labeled gauge of connected xDS streams by version [GH-10243]
๐ IMPROVEMENTS:
- ๐ง agent: Save exposed Envoy ports to the agent's state when
Expose.Checks
is true in proxy's configuration. [GH-10173] - api: Add
ExposedPort
to the health check API resource. [GH-10173] - api: The
Content-Type
header is now always set when a body is present in a request. [GH-10204] - areas: (Enterprise only) Use server agent's gossip_wan config when setting memberlist configuration for network areas. Previously they used memberlists WAN defaults.
- command: Exclude exposed Envoy ports from traffic redirection when providing
-proxy-id
andExpose.Checks
is set. [GH-10173] - connect: Avoid adding original_dst listener filter when it won't be used. [GH-10302]
- connect: Ensures passthrough tproxy cluster is created even when mesh config doesn't exist. [GH-10301]
- โก๏ธ connect: update supported envoy versions to 1.18.3, 1.17.3, 1.16.4, and 1.15.5 [GH-10231]
- licensing: (Enterprise Only) Consul Enterprise has gained the ability to autoload a license via configuration. This can be specified with the
license_path
configuration, theCONSUL_LICENSE
environment variable or theCONSUL_LICENSE_PATH
environment variable [GH-10210] - licensing: (Enterprise Only) Consul Enterprise has gained the ability update its license via a configuration reload. The same environment variables and configurations will be used to determine the new license. [GH-10267]
- ๐ ui: Add 'optional route segments' and move namespaces to use them [GH-10212]
- ๐ป ui: Improve loader centering with new side navigation [GH-10181]
- ๐ป ui: Only show a partial list of intention permissions, with the option to show all [GH-10174]
- ๐ ui: Show a message to explain that health checks may be out of date if the serf health check is in a critical state [GH-10194]
๐ BUG FIXES:
- ๐ agent: ensure we hash the non-deprecated upstream fields on ServiceConfigRequest [GH-10240]
- 0๏ธโฃ api: include the default value of raft settings in the output of /v1/agent/self [GH-8812]
- areas: (Enterprise only) Revert to the 10s dial timeout used before connection pooling was introduced in 1.7.3.
- areas: (Enterprise only) Selectively merge gossip_wan config for network areas to avoid attempting to enable gossip encryption where it was not intended or necessary.
- http: fix a bug that caused the
X-Consul-Effective-Consistency
header to be missing on request for service health [GH-10189] - 0๏ธโฃ local: agents will no longer persist the default user token along with a service or check. [GH-10188]
- namespaces: (Enterprise only) fixes a problem where the logs would contain many warnings about namespaces not being licensed.
- server: ensure that central service config flattening properly resets the state each time [GH-10239]
- ๐ ui: Add conditionals to lock sessions tab [GH-10121]
- ๐ป ui: De-duplicate tags in rendered tag listings [GH-10186]
- ๐ป ui: Don't render a DOM element for empty namespace descriptions [GH-10157]
- ๐ป ui: Reflect the change of Session API response shape for Checks in post 1.7 Consul [GH-10225]
- licensing: (Enterprise Only) Consul Enterprise 1.10 has removed API driven licensing of servers in favor of license loading via configuration. The
-
v1.10.0-beta2 Changes
May 05, 2021๐ฅ BREAKING CHANGES:
- 0๏ธโฃ connect: Disallow wildcard as name for service-defaults. [GH-10069]
๐ FEATURES:
- cli: Add additional flags to the
consul connect redirect-traffic
command to allow excluding inbound and outbound ports, outbound CIDRs, and additional user IDs from traffic redirection. [GH-10134] - cli: Automatically exclude ports from
envoy_prometheus_bind_addr
,envoy_stats_bind_addr
, andListenerPort
fromExpose
config from inbound traffic redirection rules ifproxy-id
flag is provided to theconsul connect redirect-traffic
command. [GH-10134] - ๐ connect: add support for unix domain sockets addresses for service upstreams and downstreams [GH-9981]
- ๐ฆ sdk: Allow excluding inbound and outbound ports, outbound CIDRs, and additional user IDs from traffic redirection in the
iptables
package. [GH-10134] - ๐ xds: exclusively support the Incremental xDS protocol when using xDS v3 [GH-9855]
๐ IMPROVEMENTS:
- acl: Give more descriptive error if auth method not found. [GH-10163]
- cli: snapshot inspect command can now inspect raw snapshots from a server's data dir. [GH-10089]
- connect: rename cluster config entry to mesh. [GH-10127]
- connect: restrict transparent proxy mode to only match on the tagged virtual IP address. [GH-10162]
- โก๏ธ connect: update supported envoy versions to 1.18.2, 1.17.2, 1.16.3, 1.15.4 [GH-10101]
- ๐ raft: allow reloading of raft trailing logs and snapshot timing to allow recovery from some replication failure modes. ๐ telemetry: add metrics and documentation for monitoring for replication issues. [GH-10129]
- streaming: change
use_streaming_backend
to default to true so that streaming is used by default when it is supported. [GH-10149] - telemetry: Add new metrics for status of secondary datacenter replication. [GH-10073]
- ๐ป ui: Added CRD popover 'informed action' for intentions managed by CRDs [GH-10100]
- ๐ ui: Added humanized formatting to lock session durations [GH-10062]
- ๐ป ui: Adding a notice about how TransparentProxy mode affects the Upstreams list at the top of tab view [GH-10136]
- โก๏ธ ui: Updating the wording for the banner and the popover for a service with an upstream that is not explicitly defined. [GH-10133]
- โก๏ธ ui: updates the ui with the new consul brand assets [GH-10081]
- xds: ensure that all envoyproxy/go-control-plane protobuf symbols are linked into the final binary [GH-10131]
๐ BUG FIXES:
- cli: snapshot inspect command would panic on invalid input. [GH-10091]
- ๐ memberlist: fixes a couple bugs which allowed malformed input to cause a crash in a Consul client or server. [GH-10161]
- ๐ streaming: fixes a bug that would cause context cancellation errors when a cache entry expired while requests were active. [GH-10112]
- ๐ telemetry: fixes a bug with Prometheus metrics where Gauges and Summaries were incorrectly being expired. [GH-10161]
- ๐ป ui: Adding conditional to prevent Service Mesh from breaking when there are no Upstreams [GH-10122]
- ๐ป ui: Fix text searching through upstream instances. [GH-10151]
- ๐ ui: Removes the extra rendering of namespace in service upstream list [GH-10152]
- โก๏ธ ui: Update conditional for topology empty state [GH-10124]
-
v1.10.0-beta1 Changes
April 16, 2021๐ SECURITY:
- โ Add content-type headers to raw KV responses to prevent XSS attacks CVE-2020-25864 [GH-10023]
- ๐ audit-logging: Parse endpoint URL to prevent requests from bypassing the audit log CVE-2021-28156
๐ FEATURES:
- checks: add H2 ping health checks. [GH-8431]
- cli: Add new
consul connect redirect-traffic
command for applying traffic redirection rules when Transparent Proxy is enabled. [GH-9910] - cli: Add prefix option to kv import command [GH-9792]
- cli: snapshot inspect command provides KV usage breakdown [GH-9098]
- ๐ cli: snapshot inspect command supports JSON output [GH-9006]
- connect: Add local_request_timeout_ms to allow configuring the Envoy request timeout on local_app [GH-9554]
- connect: add toggle to globally disable wildcard outbound network access when transparent proxy is enabled [GH-9973]
- ๐ฆ sdk: Add new
iptables
package for applying traffic redirection rules with iptables. [GH-9910] - โก๏ธ ui: Transparent Proxy - Service mesh visualization updates [GH-10002]
- ๐ป ui: Read-only ACL Auth Methods view [GH-9617]
๐ IMPROVEMENTS:
- acl: extend the auth-methods list endpoint to include MaxTokenTTL and TokenLocality fields. [GH-9741]
- acl: use the presence of a management policy in the state store as a sign that we already migrated to v2 acls [GH-9505]
- api: Enable setting query options on agent endpoints. [GH-9903]
- ๐ api:
AutopilotServerHelath
now handles the 429 status code returned by the v1/operator/autopilot/health endpoint and still returned the parsed reply which will indicate server healthiness [GH-8599] - cli: added a
-force-without-cross-signing
flag to theca set-config
command. ๐ connect/ca: The ForceWithoutCrossSigning field will now work as expected for CA providers that support cross signing. [GH-9672] - cli: the
consul connect envoy --envoy_statsd_url
flag will now resolve the$HOST_IP
environment variable, as part of a full url. [GH-8564] - 0๏ธโฃ client: when a client agent is attempting to dereigster a service, anddoes not have access to the ACL token used to register a service, attempt to use the agent token instead of the default user token. If no agent token is set, fall back to the default user token. [GH-9683]
- ๐ connect: Add support for transparently proxying traffic through Envoy. [experimental] [GH-9894]
- ๐ง connect: Allow per-upstream configuration to be set in service-defaults. [experimental] [GH-9872]
- connect: Automatically rewrite the Host header for Terminating Gateway HTTP services [GH-9042]
- ๐ connect: The builtin connect proxy no longer advertises support for h2 via ALPN. [GH-4466]. [GH-9920]
- โก๏ธ connect: Update the service mesh visualization to account for transparent proxies. [GH-10016]
- connect: adds new flags
prometheus-backend-port
andprometheus-scrape-port
toconsul connect envoy
to support envoy_prometheus_bind_addr pointing to the merged metrics port when using Consul Connect on K8s. [GH-9768] - ๐ ui: Move to a sidebar based main navigation [GH-9553]
- ๐ฐ ui: Use older (~2016) native ES6 features to reduce transpilation and UI JS payload [GH-9729]
- ๐ป ui: add permanently visible indicator when ACLs are disabled [GH-9864]
- ๐ ui: improve accessibility of modal dialogs [GH-9819]
- ๐ป ui: restrict the viewing/editing of certain UI elements based on the users ACL token [GH-9687]
- ๐ ui: support stricter content security policies [GH-9847]
- ๐ xds: add support for envoy 1.17.0 [GH-9658]
- 0๏ธโฃ xds: default to speaking xDS v3, but allow for v2 to be spoken upon request [GH-9658]
- ๐ xds: remove deprecated usages of xDS and drop support for envoy 1.13.x [GH-9602]
๐ BUG FIXES:
- api: ensure v1/health/ingress/:service endpoint works properly when streaming is enabled [GH-9967]
- ๐ areas: Fixes a bug which would prevent newer servers in a network areas from connecting to servers running a version of Consul prior to 1.7.3.
- ๐ audit-logging: (Enterprise only) Fixed an issue that resulted in usage of the agent master token or managed service provider tokens from being resolved properly. [GH-10013]
- cache: fix a bug in the client agent cache where streaming could potentially leak resources. [GH-9978]. [GH-9978]
- cache: fix a bug in the client agent cache where streaming would disconnect every 20 minutes and cause delivery delays. [GH-9979]. [GH-9979]
- checks: add TLSServerName field to allow setting the TLS server name for HTTPS health checks. [GH-9475]
- ๐ command: when generating envoy bootstrap configs to stdout do not mix informational logs into the json [GH-9980]
- config: Fixed a bug where
rpc_max_conns_per_client
could not be changed by reloading the config. [GH-8696] - โ config: correct config key from
advertise_addr_ipv6
toadvertise_addr_wan_ipv6
[GH-9851] - ๐ http: fix a bug in Consul Enterprise that would cause the UI to believe namespaces were supported, resulting in warning logs and incorrect UI behaviour. [GH-9923]
- ๐ snapshot: fixes a bug that would cause snapshots to be missing all but the first ACL Auth Method. [GH-10025]
- streaming: lookup in health properly handle case-sensitivity and perform filtering based on tags and node-meta [GH-9703]
- ๐ป ui: Fix intention form cancel button [GH-9901]
- ๐ป ui: ensure proxy instance API requests perform blocking queries correctly [GH-10039]
-
v1.9.17 Changes
April 13, 2022๐ SECURITY:
- ๐ agent: Added a new check field,
disable_redirects
, that allows for disabling the following of redirects for HTTP checks. The intention is to default this to true in a future release so that redirects must explicitly be enabled. [GH-12685] - ๐ง connect: Properly set SNI when configured for services behind a terminating gateway. [GH-12672]
๐ DEPRECATIONS:
- tls: With the upgrade to Go 1.17, the ordering of
tls_cipher_suites
will no longer be honored, andtls_prefer_server_cipher_suites
is now ignored. [GH-12767]
๐ BUG FIXES:
- ๐ง connect/ca: cancel old Vault renewal on CA configuration. Provide a 1 - 6 second backoff on repeated token renewal requests to prevent overwhelming Vault. [GH-12607]
- ๐ memberlist: fixes a bug which prevented members from joining a cluster with large amounts of churn [GH-253] [GH-12046]
- ๐ replication: Fixed a bug which could prevent ACL replication from continuing successfully after a leader election. [GH-12565]
- ๐ agent: Added a new check field,
-
v1.9.16 Changes
February 28, 2022๐ FEATURES:
- ๐ ca: support using an external root CA with the vault CA provider [GH-11910]
๐ IMPROVEMENTS:
- sentinel: (Enterprise Only) Sentinel now uses SHA256 to generate policy ids
- server: conditionally avoid writing a config entry to raft if it was already the same [GH-12321]
๐ BUG FIXES:
- ๐ agent: Parse datacenter from Create/Delete requests for AuthMethods and BindingRules. [GH-12370]
- areas: (Enterprise Only) Fixes a bug when using Yamux pool ( for servers version 1.7.3 and later), the entire pool was locked while connecting to a remote location, which could potentially take a long time. [GH-1368]
- server: (Enterprise only) Namespace deletion will now attempt to delete as many namespaced config entries as possible instead of halting on the first deletion that failed.
- server: partly fix config entry replication issue that prevents replication in some circumstances [GH-12307]
- 0๏ธโฃ ui: Ensure we always display the Policy default preview in the Namespace editing form [GH-12316]
-
v1.9.15 Changes
February 11, 2022๐ IMPROVEMENTS:
- sentinel: (Enterprise Only) Sentinel now uses SHA256 to generate policy ids
๐ BUG FIXES:
- ๐ Fix a data race when a service is added while the agent is shutting down.. [GH-12302]
- areas: (Enterprise Only) Fixes a bug when using Yamux pool ( for servers version 1.7.3 and later), the entire pool was locked while connecting to a remote location, which could potentially take a long time. [GH-1368]
- config-entry: fix a panic when creating an ingress gateway config-entry and a proxy service instance, where both provided the same upstream and downstream mapping. [GH-12277]
- config: include all config errors in the error message, previously some could be hidden. [GH-11918]
- snapshot: the
snapshot save
command now saves the snapshot with read permission for only the current user. [GH-11918]
-
v1.9.14 Changes
January 12, 2022๐ SECURITY:
- namespaces: (Enterprise only) Creating or editing namespaces that include default ACL policies or ACL roles now requires
acl:write
permission in the default namespace. This change fixes CVE-2021-41805.
๐ BUG FIXES:
- ๐ ca: fixes a bug that caused non blocking leaf cert queries to return the same cached response regardless of ca rotation or leaf cert expiry [GH-11693]
- ๐ ca: fixes a bug that caused the intermediate cert used to sign leaf certs to be missing from the /connect/ca/roots API response when the Vault provider was used. [GH-11671]
- cli: Display assigned node identities in output of
consul acl token list
. [GH-11926] - cli: when creating a private key, save the file with mode 0600 so that only the user has read permission. [GH-11781]
- snapshot: (Enterprise only) fixed a bug where the snapshot agent would ignore the
license_path
setting in config files - ๐ป ui: Differentiate between Service Meta and Node Meta when choosing search fields in Service Instance listings [GH-11774]
- ๐ป ui: Fixes an issue where under some circumstances after logging we present the ๐ฒ data loaded previous to you logging in. [GH-11681]
- ๐ป ui: Fixes an issue where under some circumstances the namespace selector could 0๏ธโฃ become 'stuck' on the default namespace [GH-11830]
- ui: Include
Service.Namespace
into available variables fordashboard_url_templates
[GH-11640] - ๐ป ui: Prevent disconnection notice appearing with auth change on certain pages [GH-11905]
- xds: fix a deadlock when the snapshot channel already have a snapshot to be consumed. [GH-11924]
- namespaces: (Enterprise only) Creating or editing namespaces that include default ACL policies or ACL roles now requires
-
v1.9.13 Changes
December 15, 2021๐ SECURITY:
- โฌ๏ธ ci: Upgrade golang.org/x/net to address CVE-2021-44716 [GH-11858]
-
v1.9.12 Changes
December 13, 2021๐ SECURITY:
- โฌ๏ธ ci: Upgrade to Go 1.16.12 to address CVE-2021-44716 [GH-11807]
-
v1.9.11 Changes
November 11, 2021๐ SECURITY:
- agent: Use SHA256 instead of MD5 to generate persistence file names. [GH-11491]
- namespaces: (Enterprise only) Creating or editing namespaces that include default ACL policies or ACL roles now requires
acl:write
permission in the default namespace. This change fixes CVE-2021-41805.
๐ IMPROVEMENTS:
- ๐ ci: Artifact builds will now only run on merges to the release branches or to
main
[GH-11417] - ๐ง ci: The Linux packages are now available for all supported Linux architectures including arm, arm64, 386, and amd64 [GH-11417]
- ๐ ci: The Linux packaging service configs and pre/post install scripts are now available under [.release/linux] [GH-11417]
- ๐ง telemetry: Add new metrics for the count of connect service instances and configuration entries. [GH-11222]
๐ BUG FIXES:
- ๐ acl: fixes the fallback behaviour of down_policy with setting extend-cache/async-cache when the token is not cached. [GH-11136]
- rpc: only attempt to authorize the DNSName in the client cert when verify_incoming_rpc=true [GH-11255]
- server: (Enterprise only) Ensure that servers leave network segments when leaving other gossip pools
- ๐ ui: Fixed styling of Role remove dialog on the Token edit page [GH-11298]
- ๐ xds: fixes a bug where replacing a mesh gateway node used for WAN federation (with another that has a different IP) could leave gateways in the other DC unable to re-establish the connection [GH-11522]