open-consul/CHANGELOG.md

412 lines
16 KiB
Markdown
Raw Normal View History

2015-06-02 22:08:48 +00:00
## 0.6.0 (Unreleased)
2015-06-12 17:40:51 +00:00
FEATURES:
* Service ACL's apply to service discovery [GH-1024]
2015-06-02 22:08:48 +00:00
BUG FIXES:
* Allow services with `/` characters in the UI [GH-988]
2015-06-12 17:40:51 +00:00
* Token hiding in HTTP logs bug fixed [GH-1020]
2015-06-22 18:14:30 +00:00
* RFC6598 addresses are accepted as private IP's [GH-1050]
2015-09-10 19:31:13 +00:00
* Tokens passed from the CLI or API work for maint mode [GH-1230]
2015-06-02 22:08:48 +00:00
2015-06-23 19:34:53 +00:00
IMPROVEMENTS:
* Advertised gossip/rpc addresses can now be configured [GH-1004]
2015-08-27 20:35:24 +00:00
* Atlas integration options are reload-able via SIGHUP [GH-1199]
* Atlas endpoint is a configurable option and CLI arg [GH-1201]
2015-06-23 19:34:53 +00:00
2015-06-04 07:04:44 +00:00
MISC:
2015-06-22 18:14:30 +00:00
* Vagrantfile fixed for VMware [GH-1042]
2015-10-15 21:48:59 +00:00
* Data migrator utility removed to reduce cgo dependency. [GH-1309]
2015-06-04 07:04:44 +00:00
2015-05-18 21:04:07 +00:00
## 0.5.2 (May 18, 2015)
FEATURES:
* Include datacenter in the `members` output
* HTTP Health Check sets user agent "Consul Health Check" [GH-951]
BUG FIXES:
* Fixed memory leak caused by blocking query [GH-939]
MISC:
* Remove unused constant [GH-941]
2015-10-15 21:48:59 +00:00
UPGRADE NOTES:
* Consul will refuse to start if the data directory contains an "mdb" folder.
This folder was used in versions of Consul up to 0.5.1. Consul version 0.5.2
included a baked-in utility to automatically upgrade the data format, but
this has been removed in Consul 0.6 to reduce the dependency on cgo.
2015-05-13 16:28:21 +00:00
## 0.5.1 (May 13, 2015)
2015-03-27 20:49:36 +00:00
FEATURES:
* Ability to configure minimum session TTL. [GH-821]
2015-05-12 00:05:28 +00:00
* Ability to set the initial state of a health check when registering [GH-859]
* New `configtest` sub-command to verify config validity [GH-904]
* ACL enforcement is prefix based for service names [GH-905]
* ACLs support upsert for simpler restore and external generation [GH-909]
* ACL tokens can be provided per-service during registration [GH-891]
* Support for distinct LAN and WAN advertise addresses [GH-816]
* Migrating Raft log from LMDB to BoltDB [GH-857]
* `session_ttl_min` is now configurable to reduce the minimum TTL [GH-821]
2015-05-12 01:16:18 +00:00
* Adding `verify_server_hostname` to protect against server forging [GH-927]
2015-03-27 20:49:36 +00:00
BUG FIXES:
* Datacenter is lowercased, fixes DNS lookups [GH-761]
2015-05-12 00:05:28 +00:00
* Deregister all checks when service is deregistered [GH-918]
* Fixing issues with updates of persisted services [GH-910]
* Chained CNAME resolution fixes [GH-862]
* Tokens are filtered out of log messages [GH-860]
* Fixing anti-entropy issue if servers rollback Raft log [GH-850]
* Datacenter name is case insensitive for DNS lookups
* Queries for invalid datacenters do not leak sockets [GH-807]
2015-04-11 01:34:55 +00:00
IMPROVEMENTS:
2015-05-12 00:05:28 +00:00
* HTTP health checks more reliable, avoid KeepAlives [GH-824]
* Improved protection against a passive cluster merge
* SIGTERM is properly handled for graceful shutdown [GH-827]
2015-09-11 19:24:54 +00:00
* Better staggering of deferred updates to checks [GH-884]
2015-05-12 00:05:28 +00:00
* Configurable stats prefix [GH-902]
2015-04-11 01:34:55 +00:00
* Raft uses BoltDB as the backend store. [GH-857]
2015-05-12 00:05:28 +00:00
* API RenewPeriodic more resilient to transient errors [GH-912]
2015-04-11 01:34:55 +00:00
2015-09-11 19:24:54 +00:00
## 0.5.0 (February 19, 2015)
2015-01-22 21:30:37 +00:00
FEATURES:
* Key rotation support for gossip layer. This allows the `encrypt` key
to be changed globally. See "keyring" command. [GH-336]
* Options to join the WAN pool on start (`start_join_wan`, `retry_join_wan`) [GH-477]
* Optional HTTPS interface [GH-478]
* Ephemeral keys via "delete" session behavior. This allows keys to be deleted when
a session is invalidated instead of having the lock released. Adds new "Behavior"
field to Session which is configurable. [GH-487]
* Reverse DNS lookups via PTR for IPv4 and IPv6 [GH-475]
* API added checks and services are persisted. This means services and
checks will survive a crash or restart. [GH-497]
* ACLs can now protect service registration. Users in blacklist mode should
allow registrations before upgrading to prevent a service disruption. [GH-506] [GH-465]
* Sessions support a heartbeat failure detector via use of TTLs. This adds a new
"TTL" field to Sessions and a `/v1/session/renew` endpoint. Heartbeats act like a
failure detector (health check), but are managed by the servers. [GH-524] [GH-172]
* Support for service specific IP addresses. This allows the service to advertise an
address that is different from the agent. [GH-229] [GH-570]
* Support KV Delete with Check-And-Set [GH-589]
* Merge `armon/consul-api` into `api` as official Go client.
* Support for distributed locks and semaphores in API client [GH-594] [GH-600]
* Support for native HTTP health checks [GH-592]
* Support for node and service maintanence modes [GH-606]
* Added new "consul maint" command to easily toggle maintanence modes [GH-625]
* Added new "consul lock" command for simple highly-available deployments.
This lets Consul manage the leader election and easily handle N+1 deployments
without the applications being Consul aware. [GH-619]
* Multiple checks can be associated with a service [GH-591] [GH-230]
BUG FIXES:
* Fixed X-Consul-Index calculation for KV ListKeys
* Fixed errors under extremely high read parallelism
* Fixed issue causing event watches to not fire reliably [GH-479]
* Fixed non-monotonic X-Consul-Index with key deletion [GH-577] [GH-195]
* Fixed use of default instead of custom TLD in some DNS responses [GH-582]
* Fixed memory leaks in API client when an error response is returned [GH-608]
* Fixed issues with graceful leave in single-node bootstrap cluster [GH-621]
* Fixed issue preventing node reaping [GH-371]
2015-01-22 21:42:22 +00:00
* Fixed gossip stability at very large scale
2015-02-16 22:30:40 +00:00
* Fixed string of rpc error: rpc error: ... no known leader. [GH-611]
2015-09-11 19:24:54 +00:00
* Fixed panic in `exec` during cancellation
2015-02-17 20:02:39 +00:00
* Fixed health check state reset caused by SIGHUP [GH-693]
2015-02-19 20:01:13 +00:00
* Fixed bug in UI when multiple datacenters exist.
2015-01-22 21:30:37 +00:00
IMPROVEMENTS:
* Support "consul exec" in foreign datacenter [GH-584]
* Improved K/V blocking query performance [GH-578]
* CLI respects CONSUL_RPC_ADDR environment variable to load parameter [GH-542]
* Added support for multiple DNS recursors [GH-448]
2015-09-11 19:24:54 +00:00
* Added support for defining multiple services per configuration file [GH-433]
* Added support for defining multiple checks per configuration file [GH-433]
2015-01-22 21:30:37 +00:00
* Allow mixing of service and check definitions in a configuration file [GH-433]
* Allow notes for checks in service definition file [GH-449]
* Random stagger for agent checks to prevent thundering herd [GH-546]
* More useful metrics are sent to statsd/statsite
* Added configuration to set custom HTTP headers (CORS) [GH-558]
* Reject invalid configurations to simplify validation [GH-576]
* Guard against accidental cluster mixing [GH-580] [GH-260]
* Added option to filter DNS results on warning [GH-595]
* Improve write throughput with raft log caching [GH-604]
* Added ability to bind RPC and HTTP listeners to UNIX sockets [GH-587] [GH-612]
2015-01-23 21:28:51 +00:00
* K/V HTTP endpoint returns 400 on conflicting flags [GH-634] [GH-432]
2015-01-22 21:30:37 +00:00
MISC:
* UI confirms before deleting key sub-tree [GH-520]
* More useful output in "consul version" [GH-480]
* Many documentation improvements
* Reduce log messages when quorum member is logs [GH-566]
2015-01-25 21:59:30 +00:00
UPGRADE NOTES:
* If `acl_default_policy` is "deny", ensure tokens are updated to enable
service registration to avoid a service disruption. The new ACL policy
can be submitted with 0.4 before upgrading to 0.5 where it will be
enforced.
* Servers running 0.5.X cannot be mixed with older servers. (Any client
version is fine). There is a 15 minute upgrade window where mixed
versions are allowed before older servers will panic due to an unsupported
internal command. This is due to the new KV tombstones which are internal
to servers.
2014-10-20 17:20:13 +00:00
## 0.4.1 (October 20, 2014)
2014-10-16 00:35:28 +00:00
FEATURES:
* Adding flags for `-retry-join` to attempt a join with
configurable retry behavior. [GH-395]
BUG FIXES:
2014-10-16 00:35:28 +00:00
* Fixed ACL token in UI
* Fixed ACL reloading in UI [GH-323]
* Fixed long session names in UI [GH-353]
* Fixed exit code from remote exec [GH-346]
* Fixing only a single watch being run by an agent [GH-337]
* Fixing potential race in connection multiplexing
2014-10-16 00:35:28 +00:00
* Fixing issue with Session ID and ACL ID generation. [GH-391]
* Fixing multiple headers for /v1/event/list endpoint [GH-361]
* Fixing graceful leave of leader causing invalid Raft peers [GH-360]
2014-10-16 00:35:28 +00:00
* Fixing bug with closing TLS connction on error
* Fixing issue with node reaping [GH-371]
* Fixing aggressive deadlock time [GH-389]
* Fixing syslog filter level [GH-272]
* Serf snapshot compaction works on Windows [GH-332]
* Raft snapshots work on Windows [GH-265]
* Consul service entry clean by clients now possible
2014-10-18 01:48:51 +00:00
* Fixing improper deserialization
2014-10-16 00:35:28 +00:00
2014-10-16 00:36:05 +00:00
IMPROVEMENTS:
2014-10-16 00:35:28 +00:00
* Use "critical" health state instead of "unknown" [GH-341]
* Consul service can be targed for exec [GH-344]
* Provide debug logging for session invalidation [GH-390]
* Added "Deregister" button to UI [GH-364]
* Added `enable_truncate` DNS configuration flag [GH-376]
* Reduce mmap() size on 32bit systems [GH-265]
* Temporary state is cleaned after an abort [GH-338] [GH-178]
MISC:
* Health state "unknown" being deprecated
2014-09-05 17:55:22 +00:00
## 0.4.0 (September 5, 2014)
2014-09-01 23:24:31 +00:00
FEATURES:
* Fine-grained ACL system to restrict access to KV store. Clients
use tokens which can be restricted to (read, write, deny) permissions
using longest-prefix matches.
* Watch mechanisms added to invoke a handler when data changes in consul.
Used with the `consul watch` command, or by specifying `watches` in
an agent configuration.
* Event system added to support custom user events. Events are fired using
the `consul event` command. They are handled using a standard watch.
2014-09-01 23:47:36 +00:00
* Remote execution using `consul exec`. This allows for command execution on remote
2014-09-01 23:24:31 +00:00
instances mediated through Consul.
* RFC-2782 style DNS lookups supported
* UI improvements, including support for ACLs.
2014-07-23 21:45:03 +00:00
IMPROVEMENTS:
* DNS case-insensitivity [GH-189]
2014-09-01 23:24:31 +00:00
* Support for HTTP `?pretty` parameter to pretty format JSON output.
* Use $SHELL when invoking handlers. [GH-237]
* Agent takes the `-encrypt` CLI Flag [GH-245]
2014-09-02 18:26:08 +00:00
* New `statsd_add` config for Statsd support. [GH-247]
2014-09-02 19:52:52 +00:00
* New `addresses` config for providing an override to `client_addr` for
DNS, HTTP, or RPC endpoints. [GH-301] [GH-253]
2014-09-02 21:37:22 +00:00
* Support [Checkpoint](http://checkpoint.hashicorp.com) for security bulletins
and update announcements.
2014-07-23 21:45:03 +00:00
2014-08-19 17:53:57 +00:00
BUG FIXES:
2014-09-01 23:24:31 +00:00
* Fixed race condition in `-bootstrap-expect` [GH-254]
2014-08-19 17:53:57 +00:00
* Require PUT to /v1/session/destroy [GH-285]
2014-09-01 23:24:31 +00:00
* Fixed registration race condition [GH-300] [GH-279]
2014-08-19 17:53:57 +00:00
2014-09-02 21:52:30 +00:00
UPGRADE NOTES:
* ACL support should not be enabled until all server nodes are running
Consul 0.4. Mixed server versions with ACL support enabled may result in
panics.
2014-07-21 14:58:37 +00:00
## 0.3.1 (July 21, 2014)
FEATURES:
* Improved bootstrapping process, thanks to @robxu9
2014-06-18 17:35:42 +00:00
BUG FIXES:
* Fixed issue with service re-registration [GH-216]
* Fixed handling of `-rejoin` flag
2014-07-21 14:58:37 +00:00
* Restored 0.2 TLS behavior, thanks to @nelhage [GH-233]
* Fix the statsite flags, thanks to @nelhage [GH-243]
* Fixed filters on criticial / non-passing checks [GH-241]
2014-09-01 23:47:36 +00:00
* Fixed initial log compaction crash [GH-297]
2014-06-18 17:35:42 +00:00
IMPROVEMENTS:
2014-07-21 14:58:37 +00:00
* UI Improvements
2014-06-18 17:35:42 +00:00
* Improved handling of Serf snapshot data
* Increase reliability of failure detector
2014-07-21 14:58:37 +00:00
* More useful logging messages
2014-06-18 17:35:42 +00:00
2014-06-13 17:11:53 +00:00
## 0.3.0 (June 13, 2014)
2014-05-21 19:11:34 +00:00
FEATURES:
2014-06-11 22:38:54 +00:00
* Better, faster, cleaner UI [GH-194] [GH-196]
2014-05-21 19:11:34 +00:00
* Sessions, which act as a binding layer between
2014-06-11 22:38:54 +00:00
nodes, checks and KV data. [GH-162]
2014-05-21 19:11:34 +00:00
* Key locking. KV data integrates with sessions to
2014-06-11 22:38:54 +00:00
enable distributed locking. [GH-162]
* DNS lookups can do stale reads and TTLs. [GH-200]
* Added new /v1/agent/self endpoint [GH-173]
* `reload` command can be used to trigger configuration
reload from the CLI [GH-142]
2014-05-21 19:11:34 +00:00
IMPROVEMENTS:
2014-06-11 22:38:54 +00:00
* `members` has a much cleaner output format [GH-143]
* `info` includes build version information
* Sorted results for datacneter list [GH-198]
* Switch multiplexing to yamux
* Allow multiple CA certis in ca_file [GH-174]
2014-05-21 19:11:34 +00:00
* Enable logging to syslog. [GH-105]
* Allow raw key value lookup [GH-150]
* Log encryption enabled [GH-151]
* Support `-rejoin` to rejoin a cluster after a previous leave. [GH-110]
* Support the "any" wildcard for v1/health/state/ [GH-152]
2014-06-11 22:38:54 +00:00
* Defer sync of health check output [GH-157]
* Provide output for serfHealth check [GH-176]
* Datacenter name is validated [GH-169]
* Configurable syslog facilities [GH-170]
* Pipelining replication of writes
* Raft group commits
* Increased stability of leader terms
* Prevent previously left nodes from causing re-elections
BUG FIXES:
* Fixed memory leak in in-memory stats system
* Fixing race between RPC and Raft init [GH-160]
* Server-local RPC is avoids network [GH-148]
* Fixing builds for older OSX [GH-147]
MISC:
* Fixed missing prefixes on some log messages
* Removed the `-role` filter of `members` command
* Lots of docs fixes
2014-05-21 19:11:34 +00:00
2014-05-20 19:36:08 +00:00
## 0.2.1 (May 20, 2014)
2014-05-04 21:45:33 +00:00
IMPROVEMENTS:
* Improved the URL formatting for the key/value editor in the Web UI.
Importantly, the editor now allows editing keys with dashes in the
name. [GH-119]
2014-05-05 14:22:20 +00:00
* The web UI now has cancel and delete folder actions in the key/value
editor. [GH-124], [GH-122]
2014-05-06 18:00:43 +00:00
* Add flag to agent to write pid to a file. [GH-106]
2014-05-20 19:33:27 +00:00
* Time out commands if Raft exceeds command enqueue timeout
* Adding support for the `-advertise` CLI flag. [GH-156]
* Fixing potential name conflicts on the WAN gossip ring [GH-158]
* /v1/catalog/services returns an empty slice instead of null. [GH-145]
* `members` command returns exit code 2 if no results. [GH-116]
2014-05-04 21:45:33 +00:00
BUG FIXES:
2015-09-11 19:24:54 +00:00
* Renaming "separator" to "separator". This is the correct spelling,
but both spellings are respected for backwards compatibility. [GH-101]
* Private IP is properly found on Windows clients.
* Windows agents won't show "failed to decode" errors on every RPC
request.
2014-05-20 19:33:27 +00:00
* Fixed memory leak with RPC clients. [GH-149]
* Serf name conflict resoultion disabled. [GH-97]
* Raft deadlock possibility fixed. [GH-141]
MISC:
* Updating to latest version of LMDB
* Reduced the limit of KV entries to 512KB. [GH-123].
* Warn if any Raft log exceeds 1MB
* Lots of docs fixes
2014-05-01 17:28:34 +00:00
## 0.2.0 (May 1, 2014)
2014-05-01 02:04:56 +00:00
FEATURES:
2014-05-01 17:28:34 +00:00
* Adding Web UI for Consul. This is enabled by providing the `-ui-dir` flag
2014-05-01 17:52:31 +00:00
with the path to the web directory. The UI is visited at the standard HTTP
address (Defaults to http://127.0.0.1:8500/). There is a demo
2014-05-01 17:28:34 +00:00
[available here](http://demo.consul.io).
2014-05-01 02:04:56 +00:00
* Adding new read consistency modes. `?consistent` can be used for strongly
2014-05-01 17:52:31 +00:00
consistent reads without caveats. `?stale` can be used for stale reads to
allow for higher throughput and read scalability. [GH-68]
2014-05-01 02:04:56 +00:00
* /v1/health/service/ endpoint can take an optional `?passing` flag
2014-05-01 17:52:31 +00:00
to filter to only nodes with passing results. [GH-57]
2014-05-01 17:28:34 +00:00
* The KV endpoint suports listing keys with the `?keys` query parameter,
and limited up to a separator using `?separator=`.
2014-05-01 17:28:34 +00:00
2014-05-01 02:04:56 +00:00
IMPROVEMENTS:
* Health check output goes into separate `Output` field instead
2014-05-01 17:52:31 +00:00
of overriding `Notes`. [GH-59]
2014-05-01 02:04:56 +00:00
* Adding a minimum check interval to prevent checks with extremely
2014-05-01 17:52:31 +00:00
low intervals fork bombing. [GH-64]
2014-05-01 02:04:56 +00:00
* Raft peer set cleared on leave. [GH-69]
* Case insensitive parsing checks. [GH-78]
* Increase limit of DB size and Raft log on 64bit systems. [GH-81]
* Output of health checks limited to 4K. [GH-83]
* More warnings if GOMAXPROCS == 1 [GH-87]
* Added runtime information to `consul info`
2014-04-16 23:34:35 +00:00
2014-04-17 18:44:08 +00:00
BUG FIXES:
2014-04-16 23:34:35 +00:00
2014-05-01 02:04:56 +00:00
* Fixed 404 on /v1/agent/service/deregister and
2014-05-01 17:52:31 +00:00
/v1/agent/check/deregister. [GH-95]
2014-05-01 02:04:56 +00:00
* Fixed JSON parsing for /v1/agent/check/register [GH-60]
* DNS parser can handler period in a tag name. [GH-39]
2014-04-17 18:44:08 +00:00
* "application/json" content-type is sent on HTTP requests. [GH-45]
2014-05-01 02:04:56 +00:00
* Work around for LMDB delete issue. [GH-85]
* Fixed tag gossip propagation for rapid restart. [GH-86]
2014-05-01 02:04:56 +00:00
MISC:
* More conservative timing values for Raft
* Provide a warning if attempting to commit a very large Raft entry
* Improved timeliness of registration when server is in bootstrap mode. [GH-72]
2014-04-16 23:33:49 +00:00
## 0.1.0 (April 17, 2014)
2014-04-16 23:33:30 +00:00
* Initial release