open-consul/.changelog
hc-github-team-consul-core 66a15c187c
Backport of [CC-5719] Add support for builtin global-read-only policy into release/1.16.x (#18345)
* [OSS] Post Consul 1.16 updates (#17606)

* chore: update dev build to 1.17

* chore(ci): add nightly 1.16 test

Drop the oldest and add the newest running release branch to nightly
builds.

* Add writeAuditRPCEvent to agent_oss (#17607)

* Add writeAuditRPCEvent to agent_oss

* fix the other diffs

* backport change log

* Add Envoy and Consul version constraints to Envoy extensions (#17612)

* [API Gateway] Fix trust domain for external peered services in synthesis code (#17609)

* [API Gateway] Fix trust domain for external peered services in synthesis code

* Add changelog

* backport ent changes to oss (#17614)

* backport ent changes to oss

* Update .changelog/_5669.txt

Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>

---------

Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>

* Update intentions.mdx (#17619)

Make behaviour of L7 intentions clearer

* enterprise changelog update for audit (#17625)

* Update list of Envoy versions (#17546)

* [API Gateway] Fix rate limiting for API gateways (#17631)

* [API Gateway] Fix rate limiting for API gateways

* Add changelog

* Fix failing unit tests

* Fix operator usage tests for api package

* sort some imports that are wonky between oss and ent (#17637)

* PmTLS and tproxy improvements with failover and L7 traffic mgmt for k8s (#17624)

* porting over changes from enterprise repo to oss

* applied feedback on service mesh for k8s overview

* fixed typo

* removed ent-only build script file

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: David Yu <dyu@hashicorp.com>

* Delete check-legacy-links-format.yml (#17647)

* docs: Reference doc updates for permissive mTLS settings (#17371)

* Reference doc updates for permissive mTLS settings
* Document config entry filtering
* Fix minor doc errors (double slashes in link url paths)

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Add generic experiments configuration and use it to enable catalog v2 resources (#17604)

* Add generic experiments configuration and use it to enable catalog v2 resources

* Run formatting with -s as CI will validate that this has been done

* api-gateway: stop adding all header filters to virtual host when generating xDS (#17644)

* Add header filter to api-gateway xDS golden test

* Stop adding all header filters to virtual host when generating xDS for api-gateway

* Regenerate xDS golden file for api-gateway w/ header filter

* fix: add agent info reporting log (#17654)

* Add new Consul 1.16 docs (#17651)

* Merge pull request #5773 from hashicorp/docs/rate-limiting-from-ip-addresses-1.16

updated docs for rate limiting for IP addresses - 1.16

* Merge pull request #5609 from hashicorp/docs/enterprise-utilization-reporting

Add docs for enterprise utilization reporting

* Merge pull request #5734 from hashicorp/docs/envoy-ext-1.16

Docs/envoy ext 1.16

* Merge pull request #5773 from hashicorp/docs/rate-limiting-from-ip-addresses-1.16

updated docs for rate limiting for IP addresses - 1.16

* Merge pull request #5609 from hashicorp/docs/enterprise-utilization-reporting

Add docs for enterprise utilization reporting

* Merge pull request #5734 from hashicorp/docs/envoy-ext-1.16

Docs/envoy ext 1.16

* fix build errors

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Default `ProxyType` for builtin extensions (#17657)

* Post 1.16.0-rc1 updates (#17663)

- Update changelog to include new entries from release
- Update submodule versions to latest published

* Update service-defaults.mdx (#17656)

* docs: Sameness Groups (#17628)

* port from enterprise branch

* Apply suggestions from code review

Co-authored-by: shanafarkas <105076572+shanafarkas@users.noreply.github.com>

* Update website/content/docs/connect/cluster-peering/usage/create-sameness-groups.mdx

* next steps

* Update website/content/docs/connect/cluster-peering/usage/create-sameness-groups.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/k8s/connect/cluster-peering/usage/create-sameness-groups.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

---------

Co-authored-by: shanafarkas <105076572+shanafarkas@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Remove "BETA" marker from config entries (#17670)

* CAPIgw for K8s installation updates for 1.16 (#17627)

* trimmed CRD step and reqs from installation

* updated tech specs

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: Jeff Apple <79924108+Jeff-Apple@users.noreply.github.com>

* added upgrade instruction

* removed tcp port req

* described downtime and DT-less upgrades

* applied additional review feedback

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: Jeff Apple <79924108+Jeff-Apple@users.noreply.github.com>

* additional feedback on API gateway upgrades (#17677)

* additional feedback

* Update website/content/docs/api-gateway/upgrades.mdx

Co-authored-by: Jeff Apple <79924108+Jeff-Apple@users.noreply.github.com>

---------

Co-authored-by: Jeff Apple <79924108+Jeff-Apple@users.noreply.github.com>

* docs: JWT Authorization for intentions (#17643)

* Initial page/nav creation

* configuration entry reference page

* Usage + fixes

* service intentions page

* usage

* description

* config entry updates

* formatting fixes

* Update website/content/docs/connect/config-entries/service-intentions.mdx

Co-authored-by: Paul Glass <pglass@hashicorp.com>

* service intentions review fixes

* Overview page review fixes

* Apply suggestions from code review

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

---------

Co-authored-by: Paul Glass <pglass@hashicorp.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* docs: minor fixes to JWT auth docs (#17680)

* Fixes

* service intentions fixes

* Fix two WAL metrics in docs/agent/telemetry.mdx (#17593)

* updated failover for k8s w-tproxy page title (#17683)

* Add release notes 1.16 rc (#17665)

* Merge pull request #5773 from hashicorp/docs/rate-limiting-from-ip-addresses-1.16

updated docs for rate limiting for IP addresses - 1.16

* Merge pull request #5609 from hashicorp/docs/enterprise-utilization-reporting

Add docs for enterprise utilization reporting

* Merge pull request #5734 from hashicorp/docs/envoy-ext-1.16

Docs/envoy ext 1.16

* Add release notes for 1.16-rc

* Add consul-e license utlization reporting

* Update with rc absolute links

* Update with rc absolute links

* fix typo

* Apply suggestions from code review

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update to use callout component

* address typo

* docs: FIPS 140-2 Compliance (#17668)

* Page + nav + formatting

* link fix

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* link fix

* Apply suggestions from code review

Co-authored-by: Jeff Apple <79924108+Jeff-Apple@users.noreply.github.com>

* Update website/content/docs/enterprise/fips.mdx

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Jeff Apple <79924108+Jeff-Apple@users.noreply.github.com>

* fix apigw install values file

* fix typos in release notes

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: Jeff Apple <79924108+Jeff-Apple@users.noreply.github.com>

* fix release notes links (#17687)

* adding redirects for tproxy and envoy extensions (#17688)

* adding redirects

* Apply suggestions from code review

* Fix FIPS copy (#17691)

* fix release notes links

* fix typos on fips docs

* [NET-4107][Supportability] Log Level set to TRACE and duration set to 5m for consul-debug (#17596)

* changed duration to 5 mins and log level to trace

* documentation update

* change log

* ENT merge of ext-authz extension updates (#17684)

* docs: Update default values for Envoy extension proxy types (#17676)

* fix: stop peering delete routine on leader loss (#17483)

* Refactor disco chain prioritize by locality structs (#17696)

This includes prioritize by localities on disco chain targets rather than
resolvers, allowing different targets within the same partition to have
different policies.

* agent: remove agent cache dependency from service mesh leaf certificate management (#17075)

* agent: remove agent cache dependency from service mesh leaf certificate management

This extracts the leaf cert management from within the agent cache.

This code was produced by the following process:

1. All tests in agent/cache, agent/cache-types, agent/auto-config,
   agent/consul/servercert were run at each stage.

    - The tests in agent matching .*Leaf were run at each stage.

    - The tests in agent/leafcert were run at each stage after they
      existed.

2. The former leaf cert Fetch implementation was extracted into a new
   package behind a "fake RPC" endpoint to make it look almost like all
   other cache type internals.

3. The old cache type was shimmed to use the fake RPC endpoint and
   generally cleaned up.

4. I selectively duplicated all of Get/Notify/NotifyCallback/Prepopulate
   from the agent/cache.Cache implementation over into the new package.
   This was renamed as leafcert.Manager.

    - Code that was irrelevant to the leaf cert type was deleted
      (inlining blocking=true, refresh=false)

5. Everything that used the leaf cert cache type (including proxycfg
   stuff) was shifted to use the leafcert.Manager instead.

6. agent/cache-types tests were moved and gently replumbed to execute
   as-is against a leafcert.Manager.

7. Inspired by some of the locking changes from derek's branch I split
   the fat lock into N+1 locks.

8. The waiter chan struct{} was eventually replaced with a
   singleflight.Group around cache updates, which was likely the biggest
   net structural change.

9. The awkward two layers or logic produced as a byproduct of marrying
   the agent cache management code with the leaf cert type code was
   slowly coalesced and flattened to remove confusion.

10. The .*Leaf tests from the agent package were copied and made to work
    directly against a leafcert.Manager to increase direct coverage.

I have done a best effort attempt to port the previous leaf-cert cache
type's tests over in spirit, as well as to take the e2e-ish tests in the
agent package with Leaf in the test name and copy those into the
agent/leafcert package to get more direct coverage, rather than coverage
tangled up in the agent logic.

There is no net-new test coverage, just coverage that was pushed around
from elsewhere.

* [core]: Pin github action workflows (#17695)

* docs: missing changelog for _5517 (#17706)

* add enterprise notes for IP-based rate limits (#17711)

* add enterprise notes for IP-based rate limits

* Apply suggestions from code review

Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: David Yu <dyu@hashicorp.com>

* added bolded 'Enterprise' in list items.

---------

Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: David Yu <dyu@hashicorp.com>

* Update compatibility.mdx (#17713)

* Remove extraneous version info for Config entries (#17716)

* Update terminating-gateway.mdx
* Update exported-services.mdx
* Update mesh.mdx

* fix: typo in link to section (#17527)

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Bump Alpine to 3.18 (#17719)

* Update Dockerfile

* Create 17719.txt

* NET-1825: New ACL token creation docs (#16465)

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>

* [NET-3865] [Supportability] Additional Information in the output of 'consul operator raft list-peers' (#17582)

* init

* fix tests

* added -detailed in docs

* added change log

* fix doc

* checking for entry in map

* fix tests

* removed detailed flag

* removed detailed flag

* revert unwanted changes

* removed unwanted changes

* updated change log

* pr review comment changes

* pr comment changes single API instead of two

* fix change log

* fix tests

* fix tests

* fix test operator raft endpoint test

* Update .changelog/17582.txt

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* nits

* updated docs

---------

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* OSS merge: Update error handling login when applying extensions (#17740)

* Bump atlassian/gajira-transition from 3.0.0 to 3.0.1 (#17741)

Bumps [atlassian/gajira-transition](https://github.com/atlassian/gajira-transition) from 3.0.0 to 3.0.1.
- [Release notes](https://github.com/atlassian/gajira-transition/releases)
- [Commits](4749176faf...38fc9cd61b)

---
updated-dependencies:
- dependency-name: atlassian/gajira-transition
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* Add truncation to body (#17723)

* docs: Failover overview minor fix (#17743)

* Incorrect symbol

* Clarification

* slight edit for clarity

* docs - update Envoy and Dataplane compat matrix (#17752)

* Update envoy.mdx

added more detail around default versus other compatible versions

* validate localities on agent configs and registration endpoints (#17712)

* Updated docs added explanation. (#17751)

* init

* fix tests

* added -detailed in docs

* added change log

* fix doc

* checking for entry in map

* fix tests

* removed detailed flag

* removed detailed flag

* revert unwanted changes

* removed unwanted changes

* updated change log

* pr review comment changes

* pr comment changes single API instead of two

* fix change log

* fix tests

* fix tests

* fix test operator raft endpoint test

* Update .changelog/17582.txt

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* nits

* updated docs

* explanation added

---------

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* Update index.mdx (#17749)

* added redirects and updated links (#17764)

* Add transparent proxy enhancements changelog (#17757)

* docs - remove use of consul leave during upgrade instructions (#17758)

* Fix issue with streaming service health watches. (#17775)

Fix issue with streaming service health watches.

This commit fixes an issue where the health streams were unaware of service
export changes. Whenever an exported-services config entry is modified, it is
effectively an ACL change.

The bug would be triggered by the following situation:

- no services are exported
- an upstream watch to service X is spawned
- the streaming backend filters out data for service X (due to lack of exports)
- service X is finally exported

In the situation above, the streaming backend does not trigger a refresh of its
data.  This means that any events that were supposed to have been received prior
to the export are NOT backfilled, and the watches never see service X spawning.

We currently have decided to not trigger a stream refresh in this situation due
to the potential for a thundering herd effect (touching exports would cause a
re-fetch of all watches for that partition, potentially).  Therefore, a local
blocking-query approach was added by this commit for agentless.

It's also worth noting that the streaming subscription is currently bypassed
most of the time with agentful, because proxycfg has a `req.Source.Node != ""`
which prevents the `streamingEnabled` check from passing.  This means that while
agents should technically have this same issue, they don't experience it with
mesh health watches.

Note that this is a temporary fix that solves the issue for proxycfg, but not
service-discovery use cases.

* Property Override validation improvements (#17759)

* Reject inbound Prop Override patch with Services

Services filtering is only supported for outbound TrafficDirection patches.

* Improve Prop Override unexpected type validation

- Guard against additional invalid parent and target types
- Add specific error handling for Any fields (unsupported)

* Fixes (#17765)

* Update license get explanation (#17782)

This PR is to clarify what happens if the license get command is run on a follower if the leader hasn't been updated with a newer license.

* Add Patch index to Prop Override validation errors (#17777)

When a patch is found invalid, include its index for easier debugging
when multiple patches are provided.

* Stop referenced jwt providers from being deleted (#17755)

* Stop referenced jwt providers from being deleted

* Implement a Catalog Controllers Lifecycle Integration Test (#17435)

* Implement a Catalog Controllers Lifecycle Integration Test

* Prevent triggering the race detector.

This allows defining some variables for protobuf constants and using those in comparisons. Without that, something internal in the fmt package ended up looking at the protobuf message size cache and triggering the race detector.

* HCP Add node id/name to config (#17750)

* Catalog V2 Container Based Integration Test (#17674)

* Implement the Catalog V2 controller integration container tests

This now allows the container tests to import things from the root module. However for now we want to be very restrictive about which packages we allow importing.

* Add an upgrade test for the new catalog

Currently this should be dormant and not executed. However its put in place to detect breaking changes in the future and show an example of how to do an upgrade test with integration tests structured like catalog v2.

* Make testutil.Retry capable of performing cleanup operations

These cleanup operations are executed after each retry attempt.

* Move TestContext to taking an interface instead of a concrete testing.T

This allows this to be used on a retry.R or generally anything that meets the interface.

* Move to using TestContext instead of background contexts

Also this forces all test methods to implement the Cleanup method now instead of that being an optional interface.


Co-authored-by: Daniel Upton <daniel@floppy.co>

* Fix Docs for Trails Leader By (#17763)

* init

* fix tests

* added -detailed in docs

* added change log

* fix doc

* checking for entry in map

* fix tests

* removed detailed flag

* removed detailed flag

* revert unwanted changes

* removed unwanted changes

* updated change log

* pr review comment changes

* pr comment changes single API instead of two

* fix change log

* fix tests

* fix tests

* fix test operator raft endpoint test

* Update .changelog/17582.txt

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* nits

* updated docs

* explanation added

* fix doc

* fix docs

---------

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* Improve Prop Override docs examples (#17799)

- Provide more realistics examples for setting properties not already
  supported natively by Consul
- Remove superfluous commas from HCL, correct target service name, and
  fix service defaults vs. proxy defaults in examples
- Align existing integration test to updated docs

* Test permissive mTLS filter chain not configured with tproxy disabled (#17747)

* Add documentation for remote debugging of integration tests. (#17800)

* Add documentation for remote debugging of integration tests.

* add link from main docs page.

* changes related to PR feedback

* Clarify limitations of Prop Override extension (#17801)

Explicitly document the limitations of the extension, particularly what
kind of fields it is capable of modifying.

* Fix formatting for webhook-certs Consul tutorial (#17810)

* Fix formatting for webhook-certs Consul tutorial
* Make a small grammar change to also pick up whitespace changes necessary for formatting

---------

Co-authored-by: David Yu <dyu@hashicorp.com>

* Add jwt-authn metrics to jwt-provider docs (#17816)

* [NET-3095] add jwt-authn metrics docs

* Change URLs for redirects from RC to default latest (#17822)

* Set GOPRIVATE for all hashicorp repos in CI (#17817)

Consistently set GOPRIVATE to include all hashicorp repos, s.t. private
modules are successfully pulled in enterprise CI.

* Make locality aware routing xDS changes (#17826)

* Fixup consul-container/test/debugging.md (#17815)

Add missing `-t` flag and fix minor typo.

* fixes #17732 - AccessorID in request body should be optional when updating ACL token (#17739)

* AccessorID in request body should be optional when updating ACL token

* add a test case

* fix test case

* add changelog entry for PR #17739

* CA provider doc updates and Vault provider minor update (#17831)

Update CA provider docs

Clarify that providers can differ between
primary and secondary datacenters

Provide a comparison chart for consul vs
vault CA providers

Loosen Vault CA provider validation for RootPKIPath

Update Vault CA provider documentation

* ext-authz Envoy extension: support `localhost` as a valid target URI. (#17821)

* CI Updates (#17834)

* Ensure that git access to private repos uses the ELEVATED_GITHUB_TOKEN

* Bump the runner size for the protobuf generation check

This has failed previously when the runner process that communicates with GitHub gets starved causing the job to fail.

* counter part of ent pr (#17618)

* watch: support -filter for consul watch: checks, services, nodes, service (#17780)

* watch: support -filter for watch checks

* Add filter for watch nodes, services, and service
- unit test added
- Add changelog
- update doc

* Trigger OSS => ENT merge for all release branches (#17853)

Previously, this only triggered for release/*.*.x branches; however, our release process involves cutting a release/1.16.0 branch, for example, at time of code freeze these days. Any PRs to that branch after code freeze today do not make their way to consul-enterprise. This will make behavior for a .0 branch consistent with current behavior for a .x branch.

* Update service-mesh.mdx (#17845)

Deleted two commas which looks quite like some leftovers.

* Add docs for sameness groups with resolvers. (#17851)

* docs: add note about path prefix matching behavior for HTTPRoute config (#17860)

* Add note about path prefix matching behavior for HTTPRoute config

* Update website/content/docs/connect/gateways/api-gateway/configuration/http-route.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* docs: update upgrade to consul-dataplane docs on k8s (#17852)

* resource: add `AuthorizerContext` helper method (#17393)

* resource: enforce consistent naming of resource types (#17611)

For consistency, resource type names must follow these rules:

- `Group` must be snake case, and in most cases a single word.
- `GroupVersion` must be lowercase, start with a "v" and end with a number.
- `Kind` must be pascal case.

These were chosen because they map to our protobuf type naming
conventions.

* tooling: generate protoset file (#17364)

Extends the `proto` make target to generate a protoset file for use with
grpcurl etc.

* Fix a bug that wrongly trims domains when there is an overlap with DC name (#17160)

* Fix a bug that wrongly trims domains when there is an overlap with DC name

Before this change, when DC name and domain/alt-domain overlap, the domain name incorrectly trimmed from the query.

Example:

Given: datacenter = dc-test, alt-domain = test.consul.
Querying for "test-node.node.dc-test.consul" will faile, because the
code was trimming "test.consul" instead of just ".consul"

This change, fixes the issue by adding dot (.) before trimming

* trimDomain: ensure domain trimmed without modyfing original domains

* update changelog

---------

Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>

* deps: aws-sdk-go v1.44.289 (#17876)

Signed-off-by: Dan Bond <danbond@protonmail.com>

* api-gateway: add operation cannot be fulfilled error to common errors (#17874)

* add error message

* Update website/content/docs/api-gateway/usage/errors.mdx

Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>

* fix formating issues

---------

Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>

* api-gateway: add step to upgrade instructions for creating intentions (#17875)

* Changelog - add 1.13.9, 1.14.8, and 1.15.4 (#17889)

* docs: update config enable_debug (#17866)

* update doc for config enable_debug

* Update website/content/docs/agent/config/config-files.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Update wording on WAN fed and intermediate_pki_path (#17850)

* Allow service identity tokens the ability to read jwt-providers (#17893)

* Allow service identity tokens the ability to read jwt-providers

* more tests

* service_prefix tests

* Update docs (#17476)

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Add emit_tags_as_labels to envoy bootstrap config when using Consul Telemetry Collector (#17888)

* Fix command from kg to kubectl get (#17903)

* Create and update release notes for 1.16 and 1.2 (#17895)

* update release notes for 1.16 and 1.2

* update latest consul core release

* Propose new changes to APIgw upgrade instructions (#17693)

* Propose new changes to APIgw upgrade instructions

* fix build error

* update callouts to render correctly

* Add hideClipboard to log messages

* Added clarification around consul k8s and crds

* Add workflow to verify linux release packages (#17904)

* adding docker files to verify linux packages.

* add verifr-release-linux.yml

* updating name

* pass inputs directly into jobs

* add other linux package platforms

* remove on push

* fix TARGETARCH on debian and ubuntu so it can check arm64 and amd64

* fixing amazon to use the continue line

* add ubuntu i386

* fix comment lines

* working

* remove commented out workflow jobs

* Apply suggestions from code review

Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>

* update fedora and ubuntu to use latest tag

---------

Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>

* Reference hashicorp/consul instead of consul for Docker image (#17914)

* Reference hashicorp/consul instead of consul for Docker image

* Update Make targets that pull consul directly

* Update Consul K8s Upgrade Doc Updates (#17921)

Updating upgrade procedures to encompass expected errors during upgrade process from v1.13.x to v1.14.x.

* Update sameness-group.mdx (#17915)

* Update create-sameness-groups.mdx (#17927)

* deps: coredns v1.10.1 (#17912)

* Ensure RSA keys are at least 2048 bits in length (#17911)

* Ensure RSA keys are at least 2048 bits in length

* Add changelog

* update key length check for FIPS compliance

* Fix no new variables error and failing to return when error exists from
validating

* clean up code for better readability

* actually return value

* tlsutil: Fix check TLS configuration (#17481)

* tlsutil: Fix check TLS configuration
* Rewording docs.
* Update website/content/docs/services/configuration/checks-configuration-reference.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Fix typos and add changelog entry.
---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* docs: Deprecations for connect-native SDK and specific connect native APIs (#17937)

* Update v1_16_x.mdx
* Update connect native golang page

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Revert "Add workflow to verify linux release packages (#17904)" (#17942)

This reverts commit 3368f14fab500ebe9f6aeab5631dd1d5f5a453e5.

* Fixes Secondary ConnectCA update (#17846)

This fixes a bug that was identified which resulted in subsequent
ConnectCA configuration update not to persist in the cluster.

* fixing typo in link to jwt-validations-with-intentions doc (#17955)

* Fix streaming backend link (#17958)

* Fix streaming backend link
* Update health.mdx

* Dynamically create jwks clusters for jwt-providers (#17944)

* website: remove deprecated agent rpc docs (#17962)

* Fix missing BalanceOutboundConnections in v2 catalog. (#17964)

* feature - [NET - 4005]  - [Supportability] Reloadable Configuration - enable_debug (#17565)

* # This is a combination of 9 commits.
# This is the 1st commit message:

init without tests

# This is the commit message #2:

change log

# This is the commit message #3:

fix tests

# This is the commit message #4:

fix tests

# This is the commit message #5:

added tests

# This is the commit message #6:

change log breaking change

# This is the commit message #7:

removed breaking change

# This is the commit message #8:

fix test

# This is the commit message #9:

keeping the test behaviour same

* # This is a combination of 12 commits.
# This is the 1st commit message:

init without tests

# This is the commit message #2:

change log

# This is the commit message #3:

fix tests

# This is the commit message #4:

fix tests

# This is the commit message #5:

added tests

# This is the commit message #6:

change log breaking change

# This is the commit message #7:

removed breaking change

# This is the commit message #8:

fix test

# This is the commit message #9:

keeping the test behaviour same

# This is the commit message #10:

made enable debug atomic bool

# This is the commit message #11:

fix lint

# This is the commit message #12:

fix test true enable debug

* parent 10f500e895d92cc3691ade7b74a33db755d22039
author absolutelightning <ashesh.vidyut@hashicorp.com> 1687352587 +0530
committer absolutelightning <ashesh.vidyut@hashicorp.com> 1687352592 +0530

init without tests

change log

fix tests

fix tests

added tests

change log breaking change

removed breaking change

fix test

keeping the test behaviour same

made enable debug atomic bool

fix lint

fix test true enable debug

using enable debug in agent as atomic bool

test fixes

fix tests

fix tests

added update on correct locaiton

fix tests

fix reloadable config enable debug

fix tests

fix init and acl 403

* revert commit

* Fix formatting codeblocks on APIgw docs (#17970)

* fix formatting codeblocks

* remove unnecessary indents

* Remove POC code (#17974)

* update doc (#17910)

* update doc

* update link

* Remove duplicate and unused newDecodeConfigEntry func (#17979)

* docs: samenessGroup YAML examples (#17984)

* configuration entry syntax

* Example config

* Add changelog entry for 1.16.0 (#17987)

* Fix typo (#17198)

servcies => services

* Expose JWKS cluster config through JWTProviderConfigEntry (#17978)

* Expose JWKS cluster config through JWTProviderConfigEntry

* fix typos, rename trustedCa to trustedCA

* Integration test for ext-authz Envoy extension (#17980)

* Fix incorrect protocol for transparent proxy upstreams. (#17894)

This PR fixes a bug that was introduced in:
https://github.com/hashicorp/consul/pull/16021

A user setting a protocol in proxy-defaults would cause tproxy implicit
upstreams to not honor the upstream service's protocol set in its
`ServiceDefaults.Protocol` field, and would instead always use the
proxy-defaults value.

Due to the fact that upstreams configured with "tcp" can successfully contact
upstream "http" services, this issue was not recognized until recently (a
proxy-defaults with "tcp" and a listening service with "http" would make
successful requests, but not the opposite).

As a temporary work-around, users experiencing this issue can explicitly set
the protocol on the `ServiceDefaults.UpstreamConfig.Overrides`, which should
take precedence.

The fix in this PR removes the proxy-defaults protocol from the wildcard
upstream that tproxy uses to configure implicit upstreams. When the protocol
was included, it would always overwrite the value during discovery chain
compilation, which was not correct. The discovery chain compiler also consumes
proxy defaults to determine the protocol, so simply excluding it from the
wildcard upstream config map resolves the issue.

* feat: include nodes count in operator usage endpoint and cli command (#17939)

* feat: update operator usage api endpoint to include nodes count

* feat: update operator usange cli command to includes nodes count

* [OSS] Improve Gateway Test Coverage of Catalog Health (#18011)

* fix(cli): remove failing check from 'connect envoy' registration for api gateway

* test(integration): add tests to check catalog statsus of gateways on startup

* remove extra sleep comment

* Update test/integration/consul-container/libs/assert/service.go

* changelog

* Fixes Traffic rate limitting docs (#17997)

* Fix removed service-to-service peering links (#17221)

* docs: fix removed service-to-service peering links

* docs: extend peering-via-mesh-gateways intro (thanks @trujillo-adam)

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* docs: Sameness "beta" warning (#18017)

* Warning updates

* .x

* updated typo in tab heading (#18022)

* updated typo in tab heading

* updated tab group typo, too

* Document that DNS lookups can target cluster peers (#17990)

Static DNS lookups, in addition to explicitly targeting a datacenter,
can target a cluster peer. This was added in 95dc0c7b301b70a6b955a8b7c9737c9b86f03df6 but didn't make the documentation.

The driving function for the change is `parseLocality` here: 0b1299c28d/agent/dns_oss.go (L25)

The biggest change in this is to adjust the standard lookup syntax to tie
`.<datacenter>` to `.dc` as required-together, and to append in the similar `.<cluster-peer>.peer` optional argument, both to A record and SRV record lookups.

Co-authored-by: David Yu <dyu@hashicorp.com>

* Add first integration test for jwt auth with intention (#18005)

* fix stand-in text for name field (#18030)

* removed sameness conf entry from failover nav (#18033)

* docs - add service sync annotations and k8s service weight annotation (#18032)

* Docs for https://github.com/hashicorp/consul-k8s/pull/2293
* remove versions for enterprise features since they are old

---------

Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>

* docs - add jobs use case for service mesh k8s (#18037)

* docs - add jobs use case for service mesh k8s
* add code blocks

* address feedback (#18045)

* Add verify server hostname to tls default (#17155)

* [OSS] Fix initial_fetch_timeout to wait for all xDS resources (#18024)

* fix(connect): set initial_fetch_time to wait indefinitely

* changelog

* PR feedback 1

* ui: fix typos for peer service imports (#17999)

* test: fix FIPS inline cert test message (#18076)

* Fix a couple typos in Agent Telemetry Metrics docs (#18080)

* Fix metrics docs

* Add changelog

Signed-off-by: josh <josh.timmons@hashicorp.com>

---------

Signed-off-by: josh <josh.timmons@hashicorp.com>

* docs updates - cluster peering and virtual services (#18069)

* Update route-to-virtual-services.mdx
* Update establish-peering.mdx

* Update service-mesh-compare.mdx (#17279)

grammar change

* Update helm docs on main (#18085)

* ci: use gotestsum v1.10.1 [NET-4042] (#18088)

* Docs: Update proxy lifecycle annotations and consul-dataplane flags (#18075)

* Update proxy lifecycle annotations and consul-dataplane flags

* Pass configured role name to Vault for AWS auth in Connect CA (#17885)

* Docs for dataplane upgrade on k8s (#18051)

* Docs for dataplane upgrade on k8s

---------

Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* docs - update upgrade index page to not recommend consul leave. (#18100)

* Displays Consul version of each nodes in UI nodes section (#17754)

* update UINodes and UINodeInfo response with consul-version info added as NodeMeta, fetched from serf members

* update test cases TestUINodes, TestUINodeInfo

* added nil check for map

* add consul-version in local agent node metadata

* get consul version from serf member and add this as node meta in catalog register request

* updated ui mock response to include consul versions as node meta

* updated ui trans and added version as query param to node list route

* updates in ui templates to display consul version with filter and sorts

* updates in ui - model class, serializers,comparators,predicates for consul version feature

* added change log for Consul Version Feature

* updated to get version from consul service, if for some reason not available from serf

* updated changelog text

* updated dependent testcases

* multiselection version filter

* Update agent/consul/state/catalog.go

comments updated

Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>

---------

Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>

* api gw 1.16 updates (#18081)

* api gw 1.16 updates

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* update CodeBlockConfig filename

* Apply suggestions from code review

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* remove non-standard intentions page

* Update website/content/docs/api-gateway/configuration/index.mdx

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* [NET-4103] ci: build s390x (#18067)

* ci: build s390x

* ci: test s390x

* ci: dev build s390x

* no GOOS

* ent only

* build: publish s390x

* fix syntax error

* fix syntax error again

* fix syntax error again x2

* test branch

* Move s390x conditionals to step level

* remove test branch

---------

Co-authored-by: emilymianeil <eneil@hashicorp.com>

* :ermahgerd "Sevice Mesh" -> "Service Mesh" (#18116)

Just a typo in the docs.

* Split pbmesh.UpstreamsConfiguration as a resource out of pbmesh.Upstreams (#17991)

Configuration that previously was inlined into the Upstreams resource
applies to both explicit and implicit upstreams and so it makes sense to
split it out into its own resource.

It also has other minor changes:
- Renames `proxy.proto` proxy_configuration.proto`
- Changes the type of `Upstream.destination_ref` from `pbresource.ID` to
`pbresource.Reference`
- Adds comments to fields that didn't have them

* [NET-4895] ci - api tests and consul container tests error because of dependency bugs with go 1.20.6.  Pin go to 1.20.5. (#18124)

### Description
The following jobs started failing when go 1.20.6 was released:
- `go-test-api-1-19`
- `go-test-api-1-20`
- `compatibility-integration-tests`
- `upgrade-integration-tests`

`compatibility-integration-tests` and `compatibility-integration-tests`
to this testcontainers issue:
https://github.com/testcontainers/testcontainers-go/issues/1359. This
issue calls for testcontainers to release a new version when one of
their dependencies is fixed. When that is done, we will unpin the go
versions in `compatibility-integration-tests` and
`compatibility-integration-tests`.

### Testing & Reproduction steps

See these jobs broken in CI and then see them work with this PR.

---------

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* Add ingress gateway deprecation notices to docs (#18102)

### Description

This adds notices, that ingress gateway is deprecated, to several places
in the product docs where ingress gateway is the topic.

### Testing & Reproduction steps

Tested with a local copy of the website.

### Links

Deprecation of ingress gateway was announced in the Release Notes for
Consul 1.16 and Consul-K8s 1.2. See:

[https://developer.hashicorp.com/consul/docs/release-notes/consul/v1_16_x#what-s-deprecated](https://developer.hashicorp.com/consul/docs/release-notes/consul/v1_16_x#what-s-deprecated
)

[https://developer.hashicorp.com/consul/docs/release-notes/consul-k8s/v1_2_x#what-s-deprecated](https://developer.hashicorp.com/consul/docs/release-notes/consul-k8s/v1_2_x#what-s-deprecated)

### PR Checklist

* [N/A] updated test coverage
* [X] external facing docs updated
* [X] appropriate backport labels added
* [X] not a security concern

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Add docs for jwt cluster configuration (#18004)

### Description

<!-- Please describe why you're making this change, in plain English.
-->

- Add jwt-provider docs for jwks cluster configuration. The
configuration was added here:
https://github.com/hashicorp/consul/pull/17978

* Docs: fix unmatched bracket for health checks page (#18134)

* NET-4657/add resource service client (#18053)

### Description

<!-- Please describe why you're making this change, in plain English.
-->
Dan had already started on this
[task](https://github.com/hashicorp/consul/pull/17849) which is needed
to start building the HTTP APIs. This just needed some cleanup to get it
ready for review.

Overview:

- Rename `internalResourceServiceClient` to
`insecureResourceServiceClient` for name consistency
- Configure a `secureResourceServiceClient` with auth enabled

### PR Checklist

* [ ] ~updated test coverage~
* [ ] ~external facing docs updated~
* [x] appropriate backport labels added
* [ ] ~not a security concern~

* Fix bug with Vault CA provider (#18112)

Updating RootPKIPath but not IntermediatePKIPath would not update 
leaf signing certs with the new root. Unsure if this happens in practice 
but manual testing showed it is a bug that would break mesh and agent 
connections once the old root is pruned.

* [NET-4897] net/http host header is now verified and request.host that contains socked now error (#18129)

### Description

This is related to https://github.com/hashicorp/consul/pull/18124 where
we pinned the go versions in CI to 1.20.5 and 1.19.10.

go 1.20.6 and 1.19.11 now validate request host headers for validity,
including the hostname cannot be prefixed with slashes.

For local communications (npipe://, unix://), the hostname is not used,
but we need valid and meaningful hostname. Prior versions go Go would
clean the host header, and strip slashes in the process, but go1.20.6
and go1.19.11 no longer do, and reject the host header. Around the
community we are seeing that others are intercepting the req.host and if
it starts with a slash or ends with .sock, they changing the host to
localhost or another dummy value.

[client: define a "dummy" hostname to use for local connections by
thaJeztah · Pull Request #45942 ·
moby/moby](https://github.com/moby/moby/pull/45942)

### Testing & Reproduction steps

Check CI tests.

### Links
* [ ] updated test coverage
* [ ] external facing docs updated
* [ ] appropriate backport labels added
* [ ] not a security concern

* add a conditional around setting LANFilter.AllSegments to make sure it is valid (#18139)

### Description

This is to correct a code problem because this assumes all segments, but
when you get to Enterprise, you can be in partition that is not the
default partition, in which case specifying all segments does not
validate and fails. This is to correct the setting of this filter with
`AllSegments` to `true` to only occur when in the the `default`
partition.

### Testing & Reproduction steps

<!--

* In the case of bugs, describe how to replicate
* If any manual tests were done, document the steps and the conditions
to replicate
* Call out any important/ relevant unit tests, e2e tests or integration
tests you have added or are adding

-->

### Links

<!--

Include any links here that might be helpful for people reviewing your
PR (Tickets, GH issues, API docs, external benchmarks, tools docs, etc).
If there are none, feel free to delete this section.

Please be mindful not to leak any customer or confidential information.
HashiCorp employees may want to use our internal URL shortener to
obfuscate links.

-->

### PR Checklist

* [ ] updated test coverage
* [ ] external facing docs updated
* [ ] appropriate backport labels added
* [ ] not a security concern

* chore: bump upgrade integrations tests to 1.15, 116 [NET-4743] (#18130)

* re org resource type registry (#18133)

* fix: update delegateMock used in ENT (#18149)

### Description

<!-- Please describe why you're making this change, in plain English.
-->
The mock is used in `http_ent_test` file which caused lint failures. For
OSS->ENT parity adding the same change here.

### Links

<!--

Include any links here that might be helpful for people reviewing your
PR (Tickets, GH issues, API docs, external benchmarks, tools docs, etc).
If there are none, feel free to delete this section.

Please be mindful not to leak any customer or confidential information.
HashiCorp employees may want to use our internal URL shortener to
obfuscate links.

-->

Identified in OSS->ENT [merge
PR](https://github.com/hashicorp/consul-enterprise/pull/6328)

### PR Checklist

* [ ] ~updated test coverage~
* [ ] ~external facing docs updated~
* [x] appropriate backport labels added
* [ ] ~not a security concern~

* Use JWT-auth filter in metadata mode & Delegate validation to RBAC filter (#18062)

### Description

<!-- Please describe why you're making this change, in plain English.
-->

- Currently the jwt-auth filter doesn't take into account the service
identity when validating jwt-auth, it only takes into account the path
and jwt provider during validation. This causes issues when multiple
source intentions restrict access to an endpoint with different JWT
providers.
- To fix these issues, rather than use the JWT auth filter for
validation, we use it in metadata mode and allow it to forward the
successful validated JWT token payload to the RBAC filter which will
make the decisions.

This PR ensures requests with and without JWT tokens successfully go
through the jwt-authn filter. The filter however only forwards the data
for successful/valid tokens. On the RBAC filter level, we check the
payload for claims and token issuer + existing rbac rules.

### Testing & Reproduction steps

<!--

* In the case of bugs, describe how to replicate
* If any manual tests were done, document the steps and the conditions
to replicate
* Call out any important/ relevant unit tests, e2e tests or integration
tests you have added or are adding

-->

- This test covers a multi level jwt requirements (requirements at top
level and permissions level). It also assumes you have envoy running,
you have a redis and a sidecar proxy service registered, and have a way
to generate jwks with jwt. I mostly use:
https://www.scottbrady91.com/tools/jwt for this.

- first write your proxy defaults
```
Kind = "proxy-defaults"
name = "global"
config {
  protocol = "http"
}
```
- Create two providers 
```
Kind = "jwt-provider"
Name = "auth0"
Issuer = "https://ronald.local"

JSONWebKeySet = {
    Local = {
     JWKS = "eyJrZXlzIjog....."
    }
}
```

```
Kind = "jwt-provider"
Name = "okta"
Issuer = "https://ronald.local"

JSONWebKeySet = {
   Local = {
     JWKS = "eyJrZXlzIjogW3...."
    }
}
```

- add a service intention
```
Kind = "service-intentions"
Name = "redis"

JWT = {
  Providers = [
    {
      Name = "okta"
    },
  ]
}

Sources = [
  {
    Name = "*"
    Permissions = [{
      Action = "allow"
      HTTP = {
        PathPrefix = "/workspace"
      }
      JWT = {
        Providers = [
          {
            Name = "okta"
            VerifyClaims = [
              {
                  Path = ["aud"]
                  Value = "my_client_app"
              },
              {
                Path = ["sub"]
                Value = "5be86359073c434bad2da3932222dabe"
              }
            ]
          },
        ]
      }

    },
    {
      Action = "allow"
      HTTP = {
        PathPrefix = "/"
      }
      JWT = {
        Providers = [
          {
            Name = "auth0"
          },
        ]
      }

    }]
  }
]
```
- generate 3 jwt tokens: 1 from auth0 jwks, 1 from okta jwks with
different claims than `/workspace` expects and 1 with correct claims
- connect to your envoy (change service and address as needed) to view
logs and potential errors. You can add: `-- --log-level debug` to see
what data is being forwarded
```
consul connect envoy -sidecar-for redis1 -grpc-addr 127.0.0.1:8502
```
- Make the following requests: 
```
curl -s -H "Authorization: Bearer $Auth0_TOKEN" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v

RBAC filter denied

curl -s -H "Authorization: Bearer $Okta_TOKEN_with_wrong_claims" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v

RBAC filter denied

curl -s -H "Authorization: Bearer $Okta_TOKEN_with_correct_claims" --insecure --cert leaf.cert --key leaf.key --cacert connect-ca.pem https://localhost:20000/workspace -v

Successful request
```


### TODO

* [x] Update test coverage
* [ ] update integration tests (follow-up PR)
* [x] appropriate backport labels added

* Support Consul Connect Envoy Command on Windows (#17694)

### Description

Add support for consul connect envoy command on windows. This PR fixes
the comments of PR - https://github.com/hashicorp/consul/pull/15114

### Testing
* Built consul.exe from this branch on windows and hosted here - [AWS
S3](https://asheshvidyut-bucket.s3.ap-southeast-2.amazonaws.com/consul.zip)
* Updated the
[tutorial](https://developer.hashicorp.com/consul/tutorials/developer-mesh/consul-windows-workloads)
and changed the `consul_url.default` value to [AWS
S3](https://asheshvidyut-bucket.s3.ap-southeast-2.amazonaws.com/consul.zip)
* Followed the steps in the tutorial and verified that everything is
working as described.

### PR Checklist

* [x] updated test coverage
* [ ] external facing docs updated
* [x] appropriate backport labels added
* [x] not a security concern

---------

Co-authored-by: Franco Bruno Lavayen <cocolavayen@gmail.com>
Co-authored-by: Jose Ignacio Lorenzo <74208929+joselo85@users.noreply.github.com>
Co-authored-by: Jose Ignacio Lorenzo <joseignaciolorenzo85@gmail.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>

* Change docs to say 168h instead of 7d for server_rejoin_age_max (#18154)

### Description

Addresses
https://github.com/hashicorp/consul/pull/17171#issuecomment-1636930705

* [OSS] test: improve xDS listener code coverage (#18138)

test: improve xDS listener code coverage

* Re-order expected/actual for assertContainerState in consul container tests (#18157)

Re-order expected/actual, consul container tests

* group and document make file (#17943)

* group and document make file

* Add `testing/deployer` (neé `consul-topology`) [NET-4610] (#17823)

Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: Freddy <freddygv@users.noreply.github.com>

* [NET-4792] Add integrations tests for jwt-auth (#18169)

* Add FIPS reference to consul enterprise docs (#18028)

* Add FIPS reference to consul enterprise docs

* Update website/content/docs/enterprise/index.mdx

Co-authored-by: David Yu <dyu@hashicorp.com>

* remove support for ecs client (fips)

---------

Co-authored-by: David Yu <dyu@hashicorp.com>

* add peering_commontopo tests [NET-3700] (#17951)

Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
Co-authored-by: NiniOak <anita.akaeze@hashicorp.com>

* docs - remove Sentinel from enterprise features list (#18176)

* Update index.mdx
* Update kv.mdx
* Update docs-nav-data.json
* delete sentinel.mdx
* Update redirects.js

---------

Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>

* [NET-4865] Bump golang.org/x/net to 0.12.0 (#18186)

Bump golang.org/x/net to 0.12.0

While not necessary to directly address CVE-2023-29406 (which should be
handled by using a patched version of Go when building), an
accompanying change to HTTP/2 error handling does impact agent code.

See https://go-review.googlesource.com/c/net/+/506995 for the HTTP/2
change.

Bump this dependency across our submodules as well for the sake of
potential indirect consumers of `x/net/http`.

* Call resource mutate hook before validate hook (NET-4907) (#18178)

* [NET-4865] security: Update Go version to 1.20.6 (#18190)

Update Go version to 1.20.6

This resolves [CVE-2023-29406]
(https://nvd.nist.gov/vuln/detail/CVE-2023-29406) for uses of the
`net/http` standard library.

Note that until the follow-up to #18124 is done, the version of Go used
in those impacted tests will need to remain on 1.20.5.

* Improve XDS test coverage: JWT auth edition (#18183)

* Improve XDS test coverage: JWT auth edition

more tests

* test: xds coverage for jwt listeners

---------

Co-authored-by: DanStough <dan.stough@hashicorp.com>

* update readme.md (#18191)

u[date readme.md

* Update submodules to latest following 1.16.0 (#18197)

Align all our internal use of submodules on the latest versions.

* SEC-090: Automated trusted workflow pinning (2023-07-18) (#18174)

Result of tsccr-helper -log-level=info -pin-all-workflows .

Co-authored-by: hashicorp-tsccr[bot] <hashicorp-tsccr[bot]@users.noreply.github.com>

* Fix Backport Assistant PR commenting (#18200)

* Fix Backport Assistant failure PR commenting

For general comments on a PR, it looks like you have to use the `/issue`
endpoint rather than `/pulls`, which requires commit/other
review-specific target details.

This matches the endpoint used in `backport-reminder.yml`.

* Remove Backport Reminder workflow

This is noisy (even when adding multiple labels, individual comments per
label are generated), and likely no longer needed: we haven't had this
work in a long time due to an expired GH token, and we now have better
automation for backport PR assignment.

* resource: Pass resource to Write ACL hook instead of just resource Id [NET-4908] (#18192)

* Explicitly enable WebSocket upgrades (#18150)

This PR explicitly enables WebSocket upgrades in Envoy's UpgradeConfig for all
proxy types. (API Gateway, Ingress, and Sidecar.)

Fixes #8283

* docs: fix the description of client rpc (#18206)

* NET-4804: Add dashboard for monitoring consul-k8s (#18208)

* [OSS] Improve xDS Code Coverage - Clusters  (#18165)

test: improve xDS cluster code coverage

* NET-4222 take config file consul container (#18218)

Net 4222 take config file consul container

* Envoy Integration Test Windows (#18007)

* [CONSUL-395] Update check_hostport and Usage (#40)

* [CONSUL-397] Copy envoy binary from Image (#41)

* [CONSUL-382] Support openssl in unique test dockerfile (#43)

* [CONSUL-405] Add bats to single container (#44)

* [CONSUL-414] Run Prometheus Test Cases and Validate Changes (#46)

* [CONSUL-410] Run Jaeger in Single container (#45)

* [CONSUL-412] Run test-sds-server in single container (#48)

* [CONSUL-408] Clean containers (#47)

* [CONSUL-384] Rebase and sync fork (#50)

* [CONSUL-415] Create Scenarios Troubleshooting Docs (#49)

* [CONSUL-417] Update Docs Single Container (#51)

* [CONSUL-428] Add Socat to single container (#54)

* [CONSUL-424] Replace pkill in kill_envoy function (#52)

* [CONSUL-434] Modify Docker run functions in Helper script (#53)

* [CONSUL-435] Replace docker run in set_ttl_check_state & wait_for_agent_service_register functions (#55)

* [CONSUL-438] Add netcat (nc) in the Single container Dockerfile (#56)

* [CONSUL-429] Replace Docker run with Docker exec (#57)

* [CONSUL-436] Curl timeout and run tests (#58)

* [CONSUL-443] Create dogstatsd Function (#59)

* [CONSUL-431] Update Docs Netcat (#60)

* [CONSUL-439] Parse nc Command in function (#61)

* [CONSUL-463] Review curl Exec and get_ca_root Func (#63)

* [CONSUL-453] Docker hostname in Helper functions (#64)

* [CONSUL-461] Test wipe volumes without extra cont (#66)

* [CONSUL-454] Check ports in the Server and Agent containers (#65)

* [CONSUL-441] Update windows dockerfile with version (#62)

* [CONSUL-466] Review case-grpc Failing Test (#67)

* [CONSUL-494] Review case-cfg-resolver-svc-failover (#68)

* [CONSUL-496] Replace docker_wget & docker_curl (#69)

* [CONSUL-499] Cleanup Scripts - Remove nanoserver (#70)

* [CONSUL-500] Update Troubleshooting Docs (#72)

* [CONSUL-502] Pull & Tag Envoy Windows Image (#73)

* [CONSUL-504] Replace docker run in docker_consul (#76)

* [CONSUL-505] Change admin_bind

* [CONSUL-399] Update envoy to 1.23.1 (#78)

* [CONSUL-510] Support case-wanfed-gw on Windows (#79)

* [CONSUL-506] Update troubleshooting Documentation (#80)

* [CONSUL-512] Review debug_dump_volumes Function (#81)

* [CONSUL-514] Add zipkin to Docker Image (#82)

* [CONSUL-515] Update Documentation (#83)

* [CONSUL-529] Support case-consul-exec (#86)

* [CONSUL-530] Update Documentation (#87)

* [CONSUL-530] Update default consul version 1.13.3

* [CONSUL-539] Cleanup (#91)

* [CONSUL-546] Scripts Clean-up (#92)

* [CONSUL-491] Support admin_access_log_path value for Windows (#71)

* [CONSUL-519] Implement mkfifo Alternative (#84)

* [CONSUL-542] Create OS Specific Files for Envoy Package (#88)

* [CONSUL-543] Create exec_supported.go (#89)

* [CONSUL-544] Test and Build Changes (#90)

* Implement os.DevNull

* using mmap instead of disk files

* fix import in exec-unix

* fix nmap open too many arguemtn

* go fmt on file

* changelog file

* fix go mod

* Update .changelog/17694.txt

Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>

* different mmap library

* fix bootstrap json

* some fixes

* chocolatey version fix and image fix

* using different library

* fix Map funciton call

* fix mmap call

* fix tcp dump

* fix tcp dump

* windows tcp dump

* Fix docker run

* fix tests

* fix go mod

* fix version 16.0

* fix version

* fix version dev

* sleep to debug

* fix sleep

* fix permission issue

* fix permission issue

* fix permission issue

* fix command

* fix command

* fix funciton

* fix assert config entry status command not found

* fix command not found assert_cert_has_cn

* fix command not found assert_upstream_missing

* fix command not found assert_upstream_missing_once

* fix command not found get_upstream_endpoint

* fix command not found get_envoy_public_listener_once

* fix command not found

* fix test cases

* windows integration test workflow github

* made code similar to unix using npipe

* fix go.mod

* fix dialing of npipe

* dont wait

* check size of written json

* fix undefined n

* running

* fix dep

* fix syntax error

* fix workflow file

* windows runner

* fix runner

* fix from json

* fix runs on

* merge connect envoy

* fix cin path

* build

* fix file name

* fix file name

* fix dev build

* remove unwanted code

* fix upload

* fix bin name

* fix path

* checkout current branch

* fix path

* fix tests

* fix shell bash for windows sh files

* fix permission of run-test.sh

* removed docker dev

* added shell bash for tests

* fix tag

* fix win=true

* fix cd

* added dev

* fix variable undefined

* removed failing tests

* fix tcp dump image

* fix curl

* fix curl

* tcp dump path

* fix tcpdump path

* fix curl

* fix curl install

* stop removing intermediate containers

* fix tcpdump docker image

* revert -rm

* --rm=false

* makeing docker image before

* fix tcpdump

* removed case consul exec

* removed terminating gateway simple

* comment case wasm

* removed data dog

* comment out upload coverage

* uncomment case-consul-exec

* comment case consul exec

* if always

* logs

* using consul 1.17.0

* fix quotes

* revert quotes

* redirect to dev null

* Revert version

* revert consul connect

* fix version

* removed envoy connect

* not using function

* change log

* docker logs

* fix logs

* restructure bad authz

* rmeoved dev null

* output

* fix file descriptor

* fix cacert

* fix cacert

* fix ca cert

* cacert does not work in windows curl

* fix func

* removed docker logs

* added sleep

* fix tls

* commented case-consul-exec

* removed echo

* retry docker consul

* fix upload bin

* uncomment consul exec

* copying consul.exe to docker image

* copy fix

* fix paths

* fix path

* github workspace path

* latest version

* Revert "latest version"

This reverts commit 5a7d7b82d9e7553bcb01b02557ec8969f9deba1d.

* commented consul exec

* added ssl revoke best effort

* revert best effort

* removed unused files

* rename var name and change dir

* windows runner

* permission

* needs setup fix

* swtich to github runner

* fix file path

* fix path

* fix path

* fix path

* fix path

* fix path

* fix build paths

* fix tag

* nightly runs

* added matrix in github workflow, renamed files

* fix job

* fix matrix

* removed brackes

* from json

* without using job matrix

* fix quotes

* revert job matrix

* fix workflow

* fix comment

* added comment

* nightly runs

* removed datadog ci as it is already measured in linux one

* running test

* Revert "running test"

This reverts commit 7013d15a23732179d18ec5d17336e16b26fab5d4.

* pr comment fixes

* running test now

* running subset of test

* running subset of test

* job matrix

* shell bash

* removed bash shell

* linux machine for job matrix

* fix output

* added cat to debug

* using ubuntu latest

* fix job matrix

* fix win true

* fix go test

* revert job matrix

---------

Co-authored-by: Jose Ignacio Lorenzo <74208929+joselo85@users.noreply.github.com>
Co-authored-by: Franco Bruno Lavayen <cocolavayen@gmail.com>
Co-authored-by: Ivan K Berlot <ivanberlot@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <20102608+ezfepo@users.noreply.github.com>
Co-authored-by: joselo85 <joseignaciolorenzo85@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <ezequiel.fernandez@southworks.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>

* fix typos and update ecs compat table (#18215)

* fix typos and update ecs compat table

* real info for the ecs compat matrix table

* Update website/content/docs/ecs/compatibility.mdx

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

---------

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* [OSS] proxystate: add proxystate protos (#18216)

* proxystate: add proxystate protos to pbmesh and resolve imports and conflicts between message names

* ci: don't verify s390x (#18224)

* [CC-5718] Remove HCP token requirement during bootstrap (#18140)

* [CC-5718] Remove HCP token requirement during bootstrap

* Re-add error for loading HCP management token

* Remove old comment

* Add changelog entry

* Remove extra validation line

* Apply suggestions from code review

Co-authored-by: lornasong <lornasong@users.noreply.github.com>

---------

Co-authored-by: lornasong <lornasong@users.noreply.github.com>

* [NET-4122] Doc guidance for federation with externalServers (#18207)

Doc guidance for federation with externalServers

Add guidance for proper configuration when joining to a secondary
cluster using WAN fed with external servers also enabled.

Also clarify federation requirements and fix formatting for an
unrelated value.

Update both the Helm chart reference (synced from `consul-k8s`, see
hashicorp/consul-k8s#2583) and the docs on using `externalServers`.

* [OSS] Improve xDS Code Coverage - Endpoints and Misc (#18222)

test: improve xDS endpoints code coverage

* Clarify license reporting timing and GDPR compliance (#18237)

Add Alicia's edits to clarify log timing and other details

* Fix Github Workflow File (#18241)

* [CONSUL-382] Support openssl in unique test dockerfile (#43)

* [CONSUL-405] Add bats to single container (#44)

* [CONSUL-414] Run Prometheus Test Cases and Validate Changes (#46)

* [CONSUL-410] Run Jaeger in Single container (#45)

* [CONSUL-412] Run test-sds-server in single container (#48)

* [CONSUL-408] Clean containers (#47)

* [CONSUL-384] Rebase and sync fork (#50)

* [CONSUL-415] Create Scenarios Troubleshooting Docs (#49)

* [CONSUL-417] Update Docs Single Container (#51)

* [CONSUL-428] Add Socat to single container (#54)

* [CONSUL-424] Replace pkill in kill_envoy function (#52)

* [CONSUL-434] Modify Docker run functions in Helper script (#53)

* [CONSUL-435] Replace docker run in set_ttl_check_state & wait_for_agent_service_register functions (#55)

* [CONSUL-438] Add netcat (nc) in the Single container Dockerfile (#56)

* [CONSUL-429] Replace Docker run with Docker exec (#57)

* [CONSUL-436] Curl timeout and run tests (#58)

* [CONSUL-443] Create dogstatsd Function (#59)

* [CONSUL-431] Update Docs Netcat (#60)

* [CONSUL-439] Parse nc Command in function (#61)

* [CONSUL-463] Review curl Exec and get_ca_root Func (#63)

* [CONSUL-453] Docker hostname in Helper functions (#64)

* [CONSUL-461] Test wipe volumes without extra cont (#66)

* [CONSUL-454] Check ports in the Server and Agent containers (#65)

* [CONSUL-441] Update windows dockerfile with version (#62)

* [CONSUL-466] Review case-grpc Failing Test (#67)

* [CONSUL-494] Review case-cfg-resolver-svc-failover (#68)

* [CONSUL-496] Replace docker_wget & docker_curl (#69)

* [CONSUL-499] Cleanup Scripts - Remove nanoserver (#70)

* [CONSUL-500] Update Troubleshooting Docs (#72)

* [CONSUL-502] Pull & Tag Envoy Windows Image (#73)

* [CONSUL-504] Replace docker run in docker_consul (#76)

* [CONSUL-505] Change admin_bind

* [CONSUL-399] Update envoy to 1.23.1 (#78)

* [CONSUL-510] Support case-wanfed-gw on Windows (#79)

* [CONSUL-506] Update troubleshooting Documentation (#80)

* [CONSUL-512] Review debug_dump_volumes Function (#81)

* [CONSUL-514] Add zipkin to Docker Image (#82)

* [CONSUL-515] Update Documentation (#83)

* [CONSUL-529] Support case-consul-exec (#86)

* [CONSUL-530] Update Documentation (#87)

* [CONSUL-530] Update default consul version 1.13.3

* [CONSUL-539] Cleanup (#91)

* [CONSUL-546] Scripts Clean-up (#92)

* [CONSUL-491] Support admin_access_log_path value for Windows (#71)

* [CONSUL-519] Implement mkfifo Alternative (#84)

* [CONSUL-542] Create OS Specific Files for Envoy Package (#88)

* [CONSUL-543] Create exec_supported.go (#89)

* [CONSUL-544] Test and Build Changes (#90)

* Implement os.DevNull

* using mmap instead of disk files

* fix import in exec-unix

* fix nmap open too many arguemtn

* go fmt on file

* changelog file

* fix go mod

* Update .changelog/17694.txt

Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>

* different mmap library

* fix bootstrap json

* some fixes

* chocolatey version fix and image fix

* using different library

* fix Map funciton call

* fix mmap call

* fix tcp dump

* fix tcp dump

* windows tcp dump

* Fix docker run

* fix tests

* fix go mod

* fix version 16.0

* fix version

* fix version dev

* sleep to debug

* fix sleep

* fix permission issue

* fix permission issue

* fix permission issue

* fix command

* fix command

* fix funciton

* fix assert config entry status command not found

* fix command not found assert_cert_has_cn

* fix command not found assert_upstream_missing

* fix command not found assert_upstream_missing_once

* fix command not found get_upstream_endpoint

* fix command not found get_envoy_public_listener_once

* fix command not found

* fix test cases

* windows integration test workflow github

* made code similar to unix using npipe

* fix go.mod

* fix dialing of npipe

* dont wait

* check size of written json

* fix undefined n

* running

* fix dep

* fix syntax error

* fix workflow file

* windows runner

* fix runner

* fix from json

* fix runs on

* merge connect envoy

* fix cin path

* build

* fix file name

* fix file name

* fix dev build

* remove unwanted code

* fix upload

* fix bin name

* fix path

* checkout current branch

* fix path

* fix tests

* fix shell bash for windows sh files

* fix permission of run-test.sh

* removed docker dev

* added shell bash for tests

* fix tag

* fix win=true

* fix cd

* added dev

* fix variable undefined

* removed failing tests

* fix tcp dump image

* fix curl

* fix curl

* tcp dump path

* fix tcpdump path

* fix curl

* fix curl install

* stop removing intermediate containers

* fix tcpdump docker image

* revert -rm

* --rm=false

* makeing docker image before

* fix tcpdump

* removed case consul exec

* removed terminating gateway simple

* comment case wasm

* removed data dog

* comment out upload coverage

* uncomment case-consul-exec

* comment case consul exec

* if always

* logs

* using consul 1.17.0

* fix quotes

* revert quotes

* redirect to dev null

* Revert version

* revert consul connect

* fix version

* removed envoy connect

* not using function

* change log

* docker logs

* fix logs

* restructure bad authz

* rmeoved dev null

* output

* fix file descriptor

* fix cacert

* fix cacert

* fix ca cert

* cacert does not work in windows curl

* fix func

* removed docker logs

* added sleep

* fix tls

* commented case-consul-exec

* removed echo

* retry docker consul

* fix upload bin

* uncomment consul exec

* copying consul.exe to docker image

* copy fix

* fix paths

* fix path

* github workspace path

* latest version

* Revert "latest version"

This reverts commit 5a7d7b82d9e7553bcb01b02557ec8969f9deba1d.

* commented consul exec

* added ssl revoke best effort

* revert best effort

* removed unused files

* rename var name and change dir

* windows runner

* permission

* needs setup fix

* swtich to github runner

* fix file path

* fix path

* fix path

* fix path

* fix path

* fix path

* fix build paths

* fix tag

* nightly runs

* added matrix in github workflow, renamed files

* fix job

* fix matrix

* removed brackes

* from json

* without using job matrix

* fix quotes

* revert job matrix

* fix workflow

* fix comment

* added comment

* nightly runs

* removed datadog ci as it is already measured in linux one

* running test

* Revert "running test"

This reverts commit 7013d15a23732179d18ec5d17336e16b26fab5d4.

* pr comment fixes

* running test now

* running subset of test

* running subset of test

* job matrix

* shell bash

* removed bash shell

* linux machine for job matrix

* fix output

* added cat to debug

* using ubuntu latest

* fix job matrix

* fix win true

* fix go test

* revert job matrix

* Fix tests

---------

Co-authored-by: Ivan K Berlot <ivanberlot@gmail.com>
Co-authored-by: Jose Ignacio Lorenzo <74208929+joselo85@users.noreply.github.com>
Co-authored-by: Franco Bruno Lavayen <cocolavayen@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <20102608+ezfepo@users.noreply.github.com>
Co-authored-by: joselo85 <joseignaciolorenzo85@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <ezequiel.fernandez@southworks.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>

* NET-4996 - filter go-tests and test-integration workflows from running on docs only and ui only changes (#18236)

* Align build arch matrix with enterprise (#18235)

Ensure that OSS remains in sync w/ Enterprise by aligning the format of
arch matrix args for various build jobs.

* Revert "NET-4996 - filter go-tests and test-integration workflows from running on docs only and ui only changes" (#18248)

Revert "NET-4996 - filter go-tests and test-integration workflows from running on docs only and ui only changes (#18236)"

This reverts commit a11dba710e6ce6f172c0fa6c9b61567cc1efffc8.

* resource: Add scope to resource type registration [NET-4976] (#18214)

Enables querying a resource type's registration to determine if a resource is cluster, partition, or partition and namespace scoped.

* Fix some inconsistencies in jwt docs (#18234)

* NET-1825: More new ACL token creation docs (#18063)

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* [CC-5719] Add support for builtin global-read-only policy

* Add changelog

* Add read-only to docs

* Fix some minor issues.

* Change from ReplaceAll to Sprintf

* Change IsValidPolicy name to return an error instead of bool

* Fix PolicyList test

* Fix other tests

* Apply suggestions from code review

Co-authored-by: Paul Glass <pglass@hashicorp.com>

* Fix state store test for policy list.

* Fix naming issues

* Update acl/validation.go

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* backport of commit d63fa5481dc02c6faae7cc2647b4073b3286af1d

* backport of commit 3d099a6ed8ed10b6dc464c466cb1668914db8f08

---------

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Dan Bond <danbond@protonmail.com>
Signed-off-by: josh <josh.timmons@hashicorp.com>
Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>
Co-authored-by: Ronald <roncodingenthusiast@users.noreply.github.com>
Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
Co-authored-by: Andrew Stucki <andrew.stucki@hashicorp.com>
Co-authored-by: Luke Kysow <1034429+lkysow@users.noreply.github.com>
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Bryce Kalow <bkalow@hashicorp.com>
Co-authored-by: Paul Glass <pglass@hashicorp.com>
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
Co-authored-by: Poonam Jadhav <poonam.jadhav@hashicorp.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>
Co-authored-by: Hariram Sankaran <56744845+ramramhariram@users.noreply.github.com>
Co-authored-by: shanafarkas <105076572+shanafarkas@users.noreply.github.com>
Co-authored-by: Thomas Eckert <teckert@hashicorp.com>
Co-authored-by: Jeff Apple <79924108+Jeff-Apple@users.noreply.github.com>
Co-authored-by: Joshua Timmons <josh.timmons@hashicorp.com>
Co-authored-by: Ashesh Vidyut <134911583+absolutelightning@users.noreply.github.com>
Co-authored-by: Dan Stough <dan.stough@hashicorp.com>
Co-authored-by: Curt Bushko <cbushko@gmail.com>
Co-authored-by: Tobias Birkefeld <t@craxs.de>
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
Co-authored-by: Semir Patel <semir.patel@hashicorp.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: chappie <6537530+chapmanc@users.noreply.github.com>
Co-authored-by: Derek Menteer <105233703+hashi-derek@users.noreply.github.com>
Co-authored-by: John Murret <john.murret@hashicorp.com>
Co-authored-by: Mark Campbell-Vincent <mnmvincent@gmail.com>
Co-authored-by: Daniel Upton <daniel@floppy.co>
Co-authored-by: Steven Zamborsky <97125550+stevenzamborsky@users.noreply.github.com>
Co-authored-by: George Bolo <george.bolo@gmail.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: wangxinyi7 <121973291+wangxinyi7@users.noreply.github.com>
Co-authored-by: cskh <hui.kang@hashicorp.com>
Co-authored-by: V. K <cn007b@gmail.com>
Co-authored-by: Iryna Shustava <ishustava@users.noreply.github.com>
Co-authored-by: Alex Simenduev <shamil.si@gmail.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
Co-authored-by: Dan Bond <danbond@protonmail.com>
Co-authored-by: sarahalsmiller <100602640+sarahalsmiller@users.noreply.github.com>
Co-authored-by: Gerard Nguyen <gerard@hashicorp.com>
Co-authored-by: mr-miles <miles.waller@gmail.com>
Co-authored-by: natemollica-dev <57850649+natemollica-nm@users.noreply.github.com>
Co-authored-by: John Maguire <john.maguire@hashicorp.com>
Co-authored-by: Samantha <hello@entropy.cat>
Co-authored-by: Ranjandas <thejranjan@gmail.com>
Co-authored-by: Evan Phoenix <evan@phx.io>
Co-authored-by: Michael Hofer <karras@users.noreply.github.com>
Co-authored-by: J.C. Jones <james.jc.jones@gmail.com>
Co-authored-by: Fulvio <fulviodenza823@gmail.com>
Co-authored-by: Krastin Krastev <krastin@hashicorp.com>
Co-authored-by: david3a <49253132+david3a@users.noreply.github.com>
Co-authored-by: Nick Irvine <115657443+nfi-hashicorp@users.noreply.github.com>
Co-authored-by: Tom Davies <tom@t-davies.com>
Co-authored-by: Vijay <vijayraghav22@gmail.com>
Co-authored-by: Eddie Rowe <74205376+eddie-rowe@users.noreply.github.com>
Co-authored-by: emilymianeil <eneil@hashicorp.com>
Co-authored-by: nv-hashi <80716011+nv-hashi@users.noreply.github.com>
Co-authored-by: Franco Bruno Lavayen <cocolavayen@gmail.com>
Co-authored-by: Jose Ignacio Lorenzo <74208929+joselo85@users.noreply.github.com>
Co-authored-by: Jose Ignacio Lorenzo <joseignaciolorenzo85@gmail.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
Co-authored-by: NiniOak <anita.akaeze@hashicorp.com>
Co-authored-by: hashicorp-tsccr[bot] <129506189+hashicorp-tsccr[bot]@users.noreply.github.com>
Co-authored-by: hashicorp-tsccr[bot] <hashicorp-tsccr[bot]@users.noreply.github.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: Ivan K Berlot <ivanberlot@gmail.com>
Co-authored-by: Ezequiel Fernández Ponce <20102608+ezfepo@users.noreply.github.com>
Co-authored-by: Ezequiel Fernández Ponce <ezequiel.fernandez@southworks.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
Co-authored-by: Jeremy Jacobson <jjacobson93@users.noreply.github.com>
Co-authored-by: lornasong <lornasong@users.noreply.github.com>
Co-authored-by: Judith Malnick <judith@hashicorp.com>
Co-authored-by: Jeremy Jacobson <jeremy.jacobson@hashicorp.com>
2023-08-01 17:37:13 +00:00
..
4633.txt add changelog (#17528) 2023-05-31 13:29:59 -04:00
5102.txt changelog: add changelog for reporting (#17535) 2023-06-02 08:59:48 -04:00
5200.txt Merge pull request #5200 from hashicorp/NET-3758 (#17102) 2023-04-24 18:23:24 +00:00
7628.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
7899.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
7970.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8158.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8190.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8194.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8211.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8216.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8218.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8221.txt fix 1.9.0-beta1 changelog formatting (#8941) 2020-10-14 09:35:59 -05:00
8222.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8268.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8311.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8343.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8371.txt Introducing changelog-gen (#8387) 2020-08-06 23:15:29 +02:00
8431.txt make h2ping changelog entry conform with changelog template (#10111) 2021-04-29 14:48:16 -04:00
8458.txt Add http2 and grpc support to ingress gateways (#8458) 2020-08-27 15:34:08 -06:00
8470.txt update changelog snippet 2020-08-12 11:21:54 -05:00
8522.txt add primary keys to list keyring (#8522) 2020-08-18 09:50:24 +02:00
8537.txt Retroactively add changelog for PR 8537 2020-08-27 11:53:49 -04:00
8545.txt agent: expose the list of supported envoy versions on /v1/agent/self (#8545) 2020-08-26 10:04:11 -05:00
8547.txt agent: ensure that we normalize bootstrapped config entries (#8547) 2020-08-27 11:37:25 -05:00
8552.txt Added changelog for #8552 2020-08-28 23:01:04 +02:00
8560.txt Update vault CA for latest api client 2020-09-15 13:33:55 -07:00
8564.txt changelog: fixup release-note formatting (#9966) 2021-04-02 14:59:47 -05:00
8569.txt xds: use envoy's rbac filter to handle intentions entirely within envoy (#8569) 2020-08-27 12:20:58 -05:00
8575.txt Add helpers to the API client to help with getting information from `AgentMember` tags (#8575) 2020-08-27 11:00:48 -04:00
8585.txt Create 8585.txt 2020-09-14 14:16:47 -06:00
8588.txt add entry for 8588 (#8650) 2020-09-10 18:53:36 +02:00
8596.txt connect: all config entries pick up a meta field (#8596) 2020-09-02 14:10:25 -05:00
8599.txt AutopilotServerHealth now handles the 429 status code (#8599) 2021-03-12 09:40:49 -05:00
8601.txt connect: fix bug in preventing some namespaced config entry modifications (#8601) 2020-09-02 10:47:19 -05:00
8602.txt api: create fresh http client for unix sockets (#8602) 2020-09-06 12:27:39 -04:00
8603.txt Changelog entry for usage metrics 2020-09-02 10:48:11 -05:00
8606.txt Add support for -ca-path option in the connect envoy command (#8606) 2020-09-08 12:16:16 +02:00
8646.txt Create 8646.txt 2020-09-15 10:05:23 -07:00
8685.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8694.txt changelog: add entries for ui_config and service metrics config (#8919) 2020-10-09 17:31:00 -04:00
8696.txt agent/consuk: Rename RPCRate -> RPCRateLimit 2021-01-14 17:26:00 -05:00
8703.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8704.txt use service datacenter for dns name (#8704) 2020-09-22 20:34:09 +02:00
8726.txt Add changelog file 2020-09-25 12:03:49 -04:00
8731.txt Consul Service meta wrongly computes and exposes non_voter meta (#8731) 2020-10-09 17:18:24 -04:00
8741.txt agent: make the json/hcl decoding of ConnectProxyConfig fully work with CamelCase and snake_case (#8741) 2020-09-24 13:58:52 -05:00
8745.txt server: make sure that the various replication loggers use consistent logging (#8745) 2020-09-24 15:49:38 -05:00
8746.txt agent: enable enable_central_service_config by default (#8746) 2020-10-01 09:19:14 -05:00
8747.txt agent: when enable_central_service_config is enabled ensure agent reload doesn't revert check state to critical (#8747) 2020-09-24 16:24:04 -05:00
8764.txt api: support GetMeta() and GetNamespace() on all config entry kinds (#8764) 2020-09-29 09:11:57 -05:00
8771.txt Add changelog entry 2020-10-20 16:42:06 -04:00
8774.txt Merge pull request #9027 from hashicorp/release/1.8.5 2020-10-26 10:59:48 -04:00
8781.txt Add per-agent reconnect timeouts (#8781) 2020-10-08 15:02:19 -04:00
8784.txt Add changelog note 2020-10-09 08:01:55 -07:00
8786.txt server: ensure that we also shutdown network segment serf instances on server shutdown (#8786) 2020-09-30 16:23:43 -05:00
8787.txt Enhance the output of consul snapshot inspect (#8787) 2020-10-09 14:57:29 -05:00
8788.txt changelog: add entries for UI topology viz (#8918) 2020-10-09 17:29:14 -04:00
8812.txt add changelog 2021-05-18 15:04:12 -04:00
8822.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8834.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8839.txt add missing changelog entry for #8839 2020-10-07 10:22:40 -05:00
8846.txt changelog: add entries for UI topology viz (#8918) 2020-10-09 17:29:14 -04:00
8855.txt command: remove conditional envoy bootstrap generation for versions <=1.10.0 since those are not supported (#8855) 2020-10-07 10:53:23 -05:00
8858.txt changelog: add entries for UI topology viz (#8918) 2020-10-09 17:29:14 -04:00
8875.txt agent: allow the /v1/connect/intentions/match endpoint to use the agent cache (#8875) 2020-10-08 14:51:53 -05:00
8877.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8924.txt Fix: service LocallyRegisteredAsSidecar property is not persisted 2020-10-13 19:38:58 +02:00
9002.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9006.txt cli: Add JSON and Pretty Print formatting for `consul snapshot inspect` (#9006) 2020-10-29 11:31:14 -05:00
9007.txt server: break up Intention.Apply monolithic method (#9007) 2020-11-13 09:15:39 -06:00
9008.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9009.txt changelog: add entry for fixing active CA root unset (#9323) 2020-12-03 13:45:07 -05:00
9024.txt Merge pull request #9027 from hashicorp/release/1.8.5 2020-10-26 10:59:48 -04:00
9036.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
9042.txt Changelog 2021-04-06 17:12:10 +08:00
9059.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9067.txt Fixed failing tests 2020-12-30 14:09:50 -06:00
9081.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9088.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9098.txt Fix some minor wording issues 2020-11-11 11:33:38 -06:00
9099.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9101.txt agent: return the default ACL policy to callers as a header (#9101) 2020-11-12 10:38:32 -06:00
9103.txt Fixup the autopilot changelog (#9145) 2020-11-09 17:29:06 -05:00
9113.txt connect: switch the default gateway port from 443 to 8443 (#9116) 2020-11-06 20:47:29 -05:00
9119.txt Merge pull request #9155 from hashicorp/release/1.9.0-beta3 2020-11-13 16:45:50 -05:00
9141.txt ui: Changelog changes (#9209) 2020-11-17 10:35:56 -05:00
9142.txt Add changelog entry for autopilot state CLI (#9161) 2020-11-11 14:55:12 -05:00
9151.txt server: remove config entry CAS in legacy intention API bridge code (#9151) 2020-11-13 14:42:21 -06:00
9156.txt Add a paramter in state store methods to indicate whether a resource insertion is from a snapshot restoration (#9156) 2020-11-11 11:21:42 -05:00
9181.txt Trim to one deprecation entry 2020-11-13 14:31:14 -08:00
9186.txt server: skip deleted and deleting namespaces when migrating intentions to config entries (#9186) 2020-11-13 13:56:41 -06:00
9191.txt Refactor to call non-voting servers read replicas (#9191) 2020-11-17 10:53:57 -05:00
9198.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
9204.txt Prevent panic if autopilot health is requested prior to leader establishment finishing. (#9204) 2020-11-16 17:08:17 -05:00
9207.txt Add DC and NS support for Envoy metrics (#9207) 2020-11-16 16:37:19 -07:00
9229.txt command: when generating envoy bootstrap configs use the datacenter returned from the agent services endpoint (#9229) 2020-11-19 15:27:31 -06:00
9240.txt Require operator:write to get Connect CA config (#9240) 2020-11-19 10:14:48 -07:00
9247.txt Added changelog entry for 9247 2020-11-20 18:23:01 +01:00
9254.txt server: fix panic when deleting a non existent intention (#9254) 2020-11-24 13:44:20 -05:00
9262.txt docs: deprecate some old filter parameters 2020-11-23 18:23:58 -05:00
9271.txt Add changelog for fixing the namespace replication bug from #9271 (#9347) 2020-12-08 12:04:51 -05:00
9278.txt server: deletions of intentions by name using the intention API is now idempotent (#9278) 2021-01-04 11:27:00 -06:00
9284.txt local: mark service and checks as InSync when added 2020-11-27 15:31:12 -05:00
9296.txt Changelog 2020-11-30 17:27:39 +00:00
9318.txt changelog: add entry for fixing active CA root unset (#9323) 2020-12-03 13:45:07 -05:00
9320.txt Log replication warnings when no error suppression is defined (#9320) 2021-01-08 14:03:06 -06:00
9351.txt acl: global tokens created by auth methods now correctly replicate to secondary datacenters (#9351) 2020-12-09 15:22:29 -06:00
9366.txt server: when wan federating via mesh gateways only do heuristic primary DC bypass on the leader (#9366) 2021-01-22 10:03:24 -06:00
9410.txt ui: [BUGFIX] Ensure namespace is used for node API requests (#9410) 2021-01-04 16:42:44 +00:00
9428.txt connect: connect CA Roots in the primary datacenter should use a SigningKeyID derived from their local intermediate (#9428) 2021-02-08 13:18:51 -06:00
9432.txt ui: [BUGFIX] Request intention listing with ns parameter (#9432) 2021-01-04 17:22:10 +00:00
9436.txt structs: fix caching of ServiceSpecificRequest when ingress=true 2021-01-14 17:01:40 -05:00
9440.txt Fix bug in usage metrics when multiple service instances are changed in a single transaction (#9440) 2021-01-12 15:31:47 -06:00
9442.txt ui: Search/filtering 'Filtered by:' search status (#9442) 2021-01-25 18:13:54 +00:00
9468.txt cli: Add consul intention list command (based on PR #6825) (#9468) 2021-01-12 21:14:31 +01:00
9475.txt Add changelog for 9475 2021-03-16 18:22:25 -04:00
9485.txt chore: Adds changelog entry for accessibility improvements (#9509) 2021-01-08 18:17:01 +00:00
9487.txt Add changelog for #9487 (#9491) 2021-01-05 13:05:42 -05:00
9498.txt Ensure that CA initialization does not block leader election. 2021-01-19 15:27:48 -05:00
9505.txt acl: use the presence of a management policy in the state store as a sign that we already migrated to v2 acls (#9505) 2021-01-05 17:04:27 -06:00
9510.txt [bugfix] Prometheus metrics without warnings 2021-01-06 13:54:05 +01:00
9512.txt [Streaming][bugfix] handle TLS signalisation when TLS is disabled on client side 2021-01-06 17:24:58 +01:00
9513.txt ui: Topology intention saving improvements (#9513) 2021-01-19 15:40:39 +00:00
9519.txt server: use the presense of stored federation state data as a sign that we already activated the federation state feature flag (#9519) 2021-01-25 13:24:32 -06:00
9524.txt chore: Changelog entry for #9524 (#9595) 2021-01-20 15:44:41 +00:00
9527.txt server: add OSS stubs supporting validation of source namespaces in service-intentions config entries (#9527) 2021-01-25 11:27:38 -06:00
9528.txt server: initialize mgw-wanfed to use local gateways more on startup (#9528) 2021-01-25 17:30:38 -06:00
9530.txt Display a warning when rpc.enable_streaming = true is set on a client (#9530) 2021-01-08 15:23:23 -05:00
9553.txt ui: Sidebar navigation / redesign (#9553) 2021-01-26 17:40:33 +00:00
9554.txt connect: add local_request_timeout_ms to configure local_app http timeouts (#9554) 2021-01-25 13:50:00 -06:00
9569.txt Fix -ui-content-path without regex (#9569) 2021-01-20 18:40:46 +00:00
9585.txt Add flags to support CA generation for Connect (#9585) 2021-01-27 08:52:15 +01:00
9589.txt Update topology mapping Refs on all proxy instance deletions (#9589) 2021-01-20 15:17:26 +00:00
9593.txt ui: Changelog for #9593 (#9598) 2021-01-20 18:18:46 +00:00
9594.txt ui: Removing formatting to display LockDelay in nanoseconds (#9594) 2021-01-20 12:03:08 -05:00
9602.txt xds: remove deprecated usages of xDS (#9602) 2021-02-22 15:00:15 -06:00
9617.txt changelog: Auth Method feature release (#9963) 2021-04-01 11:00:43 -04:00
9626.txt Upgrade raft-autopilot and wait for autopilot it to stop when revoking leadership (#9644) 2021-01-27 11:14:52 -05:00
9650.txt xds: deduplicate mesh gateway listeners in a stable way (#9650) 2021-02-05 16:28:07 -06:00
9651.txt xds: prevent LDS flaps in mesh gateways due to unstable datacenter lists (#9651) 2021-02-08 10:19:57 -06:00
9658.txt fix typo in changelog 2021-02-26 17:08:33 -06:00
9660.txt chore: changelog for 9660 (#9668) 2021-01-29 16:08:39 +00:00
9672.txt Add a changelog note 2021-03-11 11:47:35 -08:00
9683.txt changelog: fixup release-note formatting (#9960) 2021-04-01 10:31:48 -04:00
9687.txt ui: Restrict the viewing/editing of certain UI elements based on the users ACLs (#9687) 2021-02-19 16:42:16 +00:00
9689.txt Add changelog entry 2021-02-08 09:45:58 -07:00
9703.txt Updated changelog 2021-02-08 18:16:07 +01:00
9715.txt ui: [BUGFIX] Replace all replaceAll with split.join for older browsers without replaceAll (#9715) 2021-02-11 09:49:39 +00:00
9729.txt ui: Update browser targets to ~2016 browsers (#9729) 2021-02-11 10:03:13 +00:00
9737.txt connect: update supported envoy point releases to 1.16.2, 1.15.3, 1.14.6, 1.13.7 (#9737) 2021-02-10 13:11:15 -06:00
9738.txt Stop background refresh of cached data for requests that result in ACL not found errors (#9738) 2021-02-09 10:15:53 -05:00
9741.txt Add fields to the /acl/auth-methods endpoint. (#9741) 2021-02-17 08:16:57 -08:00
9749.txt ui: [BUGFIX] Ensure we show the correct count of instances for each node (#9749) 2021-02-11 11:36:36 +00:00
9752.txt ui: Remove any trailing fullstop/period DNS characters from Gateways UI API (#9752) 2021-02-25 09:34:47 +00:00
9765.txt xds: only try to create an ipv6 expose checks listener if ipv6 is supported by the kernel (#9765) 2021-02-19 14:38:43 -06:00
9768.txt Add flags to consul connect envoy for metrics merging. (#9768) 2021-03-04 16:15:47 -06:00
9772.txt stream: fix a snapshot cache bug 2021-02-16 12:52:23 -05:00
9792.txt Add a changelog entry 2021-03-11 09:46:53 -08:00
9806.txt connect: if the token given to the vault provider returns no data avoid a panic (#9806) 2021-02-22 14:08:49 -06:00
9819.txt ui: a11y modals (#9819) 2021-03-09 09:30:01 +00:00
9847.txt ui: CSP Improvements (#9847) 2021-03-17 10:46:21 +00:00
9851.txt Fix advertise_addr_wan_ipv6 configuration key 2021-03-09 14:56:44 +01:00
9855.txt Support Incremental xDS mode (#9855) 2021-04-29 13:54:05 -05:00
9864.txt ui: Adds warning icon to side menu when ACLs are disabled (#9864) 2021-03-17 11:23:00 +00:00
9872.txt Add changelog and cleanup todo for beta 2021-03-17 16:45:13 -06:00
9894.txt Add changelog entry 2021-03-17 22:09:02 -06:00
9901.txt ui: Ensure intention form cancel button works (#9901) 2021-03-19 15:14:46 +00:00
9903.txt api: enable query options on agent endpoints 2021-03-19 13:08:26 -05:00
9910.txt cli: Add new `consul connect redirect-traffic` command for applying traffic redirection rules when Transparent Proxy is enabled. (#9910) 2021-04-09 11:48:10 -07:00
9920.txt Allow passing ALPN next protocols down to connect services. Fixes #4466. (#9920) 2021-03-26 11:34:47 +00:00
9923.txt changelog: fixup release-note formatting (#9960) 2021-04-01 10:31:48 -04:00
9924.txt Update metric name 2021-06-14 17:01:16 -04:00
9967.txt api: ensure v1/health/ingress/:service endpoint works properly when streaming is enabled (#9967) 2021-04-05 13:23:00 -05:00
9973.txt connect: add toggle to globally disable wildcard outbound network access when transparent proxy is enabled (#9973) 2021-04-06 13:19:59 -05:00
9978.txt cache: fix bug where TTLs were ignored leading to leaked memory in client agents (#9978) 2021-04-08 11:08:56 +01:00
9979.txt cache: Fix bug where connection errors can cause early cache expiry (#9979) 2021-04-08 11:11:15 +01:00
9980.txt command: when generating envoy bootstrap configs to stdout do not mix informational logs into the json (#9980) 2021-04-07 14:22:52 -05:00
9981.txt Add changelog entry 2021-05-04 12:41:43 -07:00
10002.txt Fix up changelog for 10002 (#10130) 2021-04-27 14:29:48 -04:00
10009.txt add changelog entry 2021-07-14 17:50:00 -04:00
10013.txt Move static token resolution into the ACLResolver (#10013) 2021-04-14 12:39:35 -04:00
10016.txt Add changelog entry 2021-04-15 13:58:28 -06:00
10023.txt Add security release-note changelog entry 2021-04-14 16:40:47 -04:00
10025.txt snapshot: fix saving of auth methods 2021-04-14 16:51:21 -04:00
10039.txt ui: remove old nspace argument from the proxy instance repository (#10039) 2021-04-15 19:18:07 +01:00
10062.txt ui: Adds human formatting to nanosecond based session durations (#10062) 2021-04-28 12:12:56 +01:00
10069.txt Disallow * as service-defaults name (#10069) 2021-04-19 14:23:01 -06:00
10073.txt Update changelog and add telemetry docs (#10107) 2021-04-23 16:05:00 -04:00
10081.txt Update brand assets (#10081) 2021-05-03 16:19:09 +01:00
10089.txt CLI: Allow snapshot inspect to work on internal raft snapshots directly. (#10089) 2021-04-23 16:17:08 +01:00
10091.txt Fix panic bug in snapshot inspect (#10091) 2021-04-23 20:48:10 +01:00
10100.txt ui: Adds CRD popover 'informed action' for intentions managed by CRDs (#10100) 2021-05-04 17:21:54 +01:00
10101.txt connect: update supported envoy versions to 1.18.2, 1.17.2, 1.16.3, and 1.15.4 (#10101) 2021-04-29 15:22:03 -05:00
10112.txt Add changelog 2021-04-27 19:03:17 -04:00
10121.txt ui: Add conditionals to Lock Session list items (#10121) 2021-05-11 11:35:15 -04:00
10122.txt ui: Fix empty SVG height to prevent service mesh from breaking when there are no upstreams (#10122) 2021-04-28 09:22:18 -04:00
10124.txt ui: Update conditional for topology empty state (#10124) 2021-04-28 09:23:02 -04:00
10127.txt Rename "cluster" config entry to "mesh" (#10127) 2021-04-28 16:13:29 -06:00
10129.txt Make Raft trailing logs and snapshot timing reloadable (#10129) 2021-05-04 15:36:53 +01:00
10131.txt xds: ensure that all envoyproxy/go-control-plane protobuf symbols are linked into the final binary (#10131) 2021-04-29 14:58:26 -05:00
10133.txt ui: Update not-defined intention popover and banner (#10133) 2021-04-28 10:31:14 -04:00
10134.txt Implement traffic redirection exclusion based on proxy config and user-provided values (#10134) 2021-04-29 09:21:15 -07:00
10136.txt ui: Add TProxy Mode notice banner to service instance Upstreams tab (#10136) 2021-04-28 14:06:18 -04:00
10149.txt Add changelog 2021-04-29 12:08:03 -04:00
10151.txt ui: Fix text search for upstream instances (#10151) 2021-05-04 17:25:57 +01:00
10152.txt ui: Remove extra nspace value from service upstreams (#10152) 2021-05-04 17:42:13 +01:00
10157.txt ui: Fix nspace spacing issue (#10157) 2021-05-10 11:19:11 +01:00
10161.txt Add changelog 2021-05-04 14:09:14 -04:00
10162.txt Only consider virtual IPs for transparent proxies (#10162) 2021-05-03 14:15:22 -06:00
10163.txt Give descriptive error if auth method not found (#10163) 2021-05-03 13:39:13 -07:00
10173.txt Save exposed ports in agent's store and expose them via API (#10173) 2021-05-12 13:51:39 -07:00
10174.txt ui: Adds ability to show a 'partial' list in list-collections (#10174) 2021-05-07 16:54:45 +01:00
10181.txt ui: Loader amends/improvements (#10181) 2021-05-07 12:23:29 +01:00
10186.txt ui: [BUGFIX] De-duplicate Tag rendering (#10186) 2021-05-07 12:07:11 +01:00
10188.txt Add changelog 2021-05-06 18:35:52 -04:00
10189.txt http: set consistency header properly 2021-05-06 13:19:45 -04:00
10194.txt ui: Serf Health Check warning notice (#10194) 2021-05-13 11:36:51 +01:00
10204.txt Always set the Content-Type header when a body is present (#10204) 2021-05-25 16:03:48 +01:00
10210.txt Add OSS bits for supporting specifying the enterprise license via config 2021-05-20 16:11:33 -04:00
10211.txt Deprecate API driven licensing. 2021-05-21 11:08:50 -04:00
10212.txt ui: Support Route optional parameters/segments (#10212) 2021-05-26 17:43:46 +01:00
10225.txt ui: Miscellaneous Lock Session fixes (#10225) 2021-05-19 11:05:54 +01:00
10231.txt connect: update supported envoy versions to 1.18.3, 1.17.3, 1.16.4, and 1.15.5 (#10231) 2021-05-12 14:06:06 -05:00
10239.txt server: ensure that central service config flattening properly resets the state each time (#10239) 2021-05-14 10:21:44 -05:00
10240.txt agent: ensure we hash the non-deprecated upstream fields on ServiceConfigRequest (#10240) 2021-05-14 10:15:48 -05:00
10243.txt xds: emit a labeled gauge of connected xDS streams by version (#10243) 2021-05-14 13:59:13 -05:00
10248.txt hcs-1936: Prepare for adding license auto-retrieval to auto-config in enterprise 2021-05-24 13:20:30 -04:00
10267.txt Add license inspect command documentation and changelog (#10351) 2021-06-04 14:33:13 -04:00
10270.txt ui: Create and use collapsible notices component (#10270) 2021-05-25 11:02:38 -04:00
10273.txt debug: remove the CLI check for debug_enabled (#10273) 2021-05-27 09:41:53 -04:00
10279.txt generate a single debug file for a long duration capture (#10279) 2021-06-07 13:00:51 -04:00
10287.txt ui: Unix Domain Socket support (#10287) 2021-05-26 17:52:25 +01:00
10298.txt ui: Move all our icons to use CSS custom properties instead of SASS vars (#10298) 2021-06-21 11:54:58 +01:00
10299.txt RPC Timeout/Retries account for blocking requests (#8978) 2021-05-27 17:29:43 -04:00
10301.txt Ensure passthrough clusters can be created (#10301) 2021-05-26 15:05:14 -06:00
10306.txt Bump raft-autopilot version to the latest. (#10306) 2021-05-27 12:59:14 -04:00
10324.txt envoy: fix bootstrap deadlock caused by a full named pipe 2021-05-31 18:53:17 -04:00
10329.txt Add flag for transparent proxies to dial individual instances (#10329) 2021-06-09 14:34:17 -06:00
10330.txt connect/ca: ensure edits to the key type/bits for the connect builtin CA will regenerate the roots (#10330) 2021-07-13 11:12:07 -05:00
10331.txt connect/ca: require new vault mount points when updating the key type/bits for the vault connect CA provider (#10331) 2021-07-13 11:11:46 -05:00
10338.txt Add changelog 2021-06-02 17:39:30 -04:00
10340.txt usagemetrics: add cluster members to metrics API (#10340) 2021-06-03 08:25:53 -07:00
10358.txt fix monitor to only start the monitor in json format when requested (#10358) 2021-06-07 12:08:48 -04:00
10365.txt Revert "Avoid adding original_dst filter when not needed" (#10365) 2021-06-08 13:18:41 -06:00
10368.txt improve monitor performance (#10368) 2021-06-15 12:05:52 -04:00
10381.txt xds: ensure that dependent xDS resources are reconfigured during primary type warming (#10381) 2021-06-14 17:20:27 -05:00
10391.txt proxycfg: Ensure that endpoints for explicit upstreams in other datacenters are watched in transparent mode (#10391) 2021-06-15 11:00:26 -07:00
10394.txt Relax validation for expose.paths config (#10394) 2021-06-14 14:04:11 -06:00
10395.txt grpc: move gRPC INFO logs to be emitted as TRACE logs from Consul (#10395) 2021-06-14 15:13:58 -05:00
10399.txt Add changelog 2021-07-26 17:53:32 -04:00
10401.txt return an empty record when asked for an addr dns with type other then A, AAAA and ANY (#10401) 2021-06-24 20:44:44 -04:00
10404.txt Add changelog entry 2021-06-15 14:15:30 -06:00
10411.txt Format certificates properly (rfc7468) with a trailing new line (#10411) 2021-06-30 20:48:29 -04:00
10423.txt Update .changelog/10423.txt 2021-06-17 12:06:26 -07:00
10424.txt connect/ca: cease including the common name field in generated certs (#10424) 2021-06-25 13:00:00 -05:00
10475.txt structs: prevent service-defaults upstream configs from using wildcard names or namespaces (#10475) 2021-06-23 15:48:54 -05:00
10486.txt connect/proxy: fixes logic bug preventing builtin/native proxy from starting upstream listeners (#10486) 2021-06-24 15:02:34 -05:00
10490.txt tlsutil: fix default server name for health checks 2021-06-24 13:49:58 -04:00
10500.txt check expiry date of the root/intermediate before using it to sign a leaf (#10500) 2021-07-13 12:15:06 -04:00
10503.txt ui: Don't default to the default namespace, use the token default namespace instead (#10503) 2021-07-07 11:46:41 +01:00
10504.txt Add ca certificate metrics (#10504) 2021-07-07 09:41:01 -04:00
10514.txt streaming: fix enable of streaming in the client 2021-06-28 17:23:14 -04:00
10515.txt fix 64-bit aligment for 32-bit platforms 2021-06-29 16:10:21 -04:00
10535.txt Add changelog to backported bug fix for Topology Metrics (#10538) 2021-06-30 16:51:29 -04:00
10546.txt Add support for returning ACL secret IDs for accessors with acl:write (#10546) 2021-07-08 15:13:08 -07:00
10552.txt Add changelog 2021-07-06 17:57:36 -04:00
10559.txt Add changelog for PR 10559 2021-07-06 18:39:40 -04:00
10564.txt cli/sdk: Allow applying redirect-traffic rules in a provided Linux namespace (#10564) 2021-07-13 10:05:48 -06:00
10566.txt Allow configuring graceful stop in testutil (#10566) 2021-09-08 11:12:54 -04:00
10569.txt ui: [BUGFIX] Ensure in-folder KVs are created in the correct folder (#10569) 2021-07-14 18:49:01 +01:00
10581.txt ui: Split up the socket mode from the socket path (#10581) 2021-08-11 13:00:32 -04:00
10598.txt acls: Show `AuthMethodNamespace` when reading/listing ACL token meta (#10598) 2021-07-15 10:38:52 -07:00
10604.txt ui: Show the correct 'ACLs Disabled' page when ACLs are disabled (#10604) 2021-07-14 18:52:13 +01:00
10605.txt ui: [BUGFIX] Fix KV Code Editor syntax loading (#10605) 2021-07-14 18:55:35 +01:00
10608.txt ui: [BUGFIX] Ensure we use the ns query param name when requesting permissions (#10608) 2021-07-15 12:19:07 +01:00
10611.txt Add DNS recursor strategy option (#10611) 2021-07-19 15:22:51 -07:00
10612.txt String type instead of error type and changelog. 2021-08-06 22:35:27 +01:00
10613.txt Add Changelog entry and api package support for HTTP Header manip 2021-09-10 21:09:24 +01:00
10619.txt xds: ensure single L7 deny intention with default deny policy does not result in allow action (CVE-2021-36213) (#10619) 2021-07-15 10:09:00 -05:00
10621.txt Add changelog entry 2021-07-15 09:27:46 -06:00
10630.txt defer setting the state before returning to avoid stuck in `INITIALIZING` state (#10630) 2021-08-05 14:51:19 -04:00
10647.txt Avoid panic on concurrent writes to cached service config map (#10647) 2021-07-20 10:09:29 -06:00
10657.txt config raft apply silent error (#10657) 2021-07-22 10:32:27 -04:00
10688.txt agent: update proxy upstreams to inherit namespace from service (#10688) 2021-07-26 17:12:29 -04:00
10689.txt Log the correlation ID when blocking queries fire (#10689) 2021-07-23 16:36:17 -06:00
10690.txt add support for h2c in h2 ping health checks 2021-10-04 22:51:08 -04:00
10691.txt api: Support QueryOptions on additional agent endpoints (#10691) 2021-07-30 10:07:13 -07:00
10706.txt ui: Fix dropdown option duplications (#10706) 2021-07-27 17:34:11 -04:00
10707.txt add changelog 2021-07-28 17:50:01 -04:00
10717.txt checks: Add Interval and Timeout to API response (#10717) 2021-08-03 15:26:49 -07:00
10732.txt Add changelog 2021-07-30 09:58:11 -07:00
10735.txt ui: Add copy button for Secret ID in Tokens list page (#10735) 2021-07-30 13:52:37 -04:00
10757.txt cli: Use admin bind address in self_admin cluster (#10757) 2021-08-09 17:10:32 -07:00
10758.txt Fixup to support unix domain socket via command line (#10758) 2021-08-12 10:05:22 -07:00
10767.txt ui: Fix Health Checks in K/V form Lock Sessions Info section (#10767) 2021-08-04 12:41:41 -04:00
10768.txt telemetry: add a metric for agent TLS cert expiry 2021-08-04 13:51:44 -04:00
10769.txt ui: Add Vault as a Service External Source (#10769) 2021-08-04 18:22:43 -04:00
10795.txt cli: Test API access using /status/leader in consul watch (#10795) 2021-08-09 09:00:33 -07:00
10804.txt add changelog 2021-08-18 12:54:11 -04:00
10813.txt deps: upgrade gogo-protobuf to v1.3.2 (#10813) 2021-08-12 14:05:46 -04:00
10820.txt cli: Fix broken KV import on Windows (#10820) 2021-08-10 14:42:05 -07:00
10824.txt proxycfg: Lookup the agent token as a default 2021-08-12 15:51:34 -04:00
10835.txt ui: Create Routing Configurations route and page (#10835) 2021-08-16 12:04:04 -04:00
10838.txt grpc: ensure that streaming gRPC requests work over mesh gateway based wan federation (#10838) 2021-08-24 16:28:44 -05:00
10844.txt ci: make changelog-checker only validate PR number against main base (#10844) 2021-08-16 15:40:51 -04:00
10856.txt ci: upgrade to use Go 1.16.7 (#10856) 2021-08-16 12:21:16 -05:00
10858.txt ui: Hide all metrics for ingress gateway services (#10858) 2021-08-26 14:08:31 -04:00
10872.txt ui: Add support in Topology view for Routing Configurations (#10872) 2021-08-26 13:58:06 -04:00
10873.txt Add changelog entry 2021-08-20 17:40:33 -06:00
10894.txt Clarify service and check error messages (use ID) 2022-01-04 11:42:37 -08:00
10895.txt Added changelog for grpc and xds servers panic recovery. 2021-08-22 19:21:42 +01:00
10901.txt ui: [BUGFIX] Properly encode non-URL safe characters in OIDC responses (#10901) 2021-08-24 16:58:45 +01:00
10902.txt ui: Disabling policy form fields from users with 'read' permissions (#10902) 2021-08-25 09:42:05 -04:00
10903.txt Add changelog; Add API package support for new fields. 2021-09-23 10:12:37 +01:00
10913.txt ui: [BUGFIX] Add missing `@` to fix missing non-subset Failovers (#10913) 2021-08-26 17:01:26 +01:00
10914.txt ui: Hide create buttons for policies/roles/namespaces with readonly access (#10914) 2021-09-27 17:20:44 +01:00
10916.txt ui: Always show main navigation Key/Value link (#10916) 2021-09-22 18:23:59 +01:00
10925.txt rpc: authorize raft requests (#10925) 2021-08-26 15:04:32 -07:00
10952.txt Revert early out errors in license API (#10952) 2021-08-31 10:36:35 -06:00
10961.txt connect: update envoy supported versions to latest patch release 2021-08-31 10:39:18 -06:00
10964.txt tls: consider presented intermediates during server connection tls handshake. (#10964) 2021-09-09 21:48:54 +02:00
10969.txt Add failures_before_warning to checks (#10969) 2021-09-14 12:47:52 -04:00
10987.txt xds: fix representation of incremental xDS subscriptions (#10987) 2021-09-21 09:58:56 -05:00
10996.txt Update repo to use go:embed (#10996) 2022-05-31 15:33:56 -04:00
11026.txt sso/oidc: add support for acr_values request parameter (#11026) 2021-09-17 09:10:05 -07:00
11077.txt ui: Gracefully recover from non-existent DC errors (#11077) 2021-09-22 18:26:36 +01:00
11085.txt xds: ensure the active streams counters are 64 bit aligned on 32 bit systems (#11085) 2021-09-20 11:07:11 -05:00
11090.txt Add changelog entry 2021-09-20 12:52:19 -05:00
11095.txt ui: [BUGFIX] Re-enable namespace menus whilst editing intentions (#11095) 2021-09-22 10:21:20 +01:00
11099.txt grpc: strip local ACL tokens from RPCs during forwarding if crossing datacenters (#11099) 2021-09-22 13:14:26 -05:00
11107.txt Add changelog entry for audit logging header extraction improvement 2021-09-22 10:23:01 -04:00
11109.txt connect: Allow upstream listener escape hatch for prepared queries (#11109) 2021-09-22 15:27:10 -04:00
11115.txt add changelog entry 2021-09-22 10:57:36 -07:00
11117.txt ui: Make it hard to not URLEncode DataSource srcs/URIs (#11117) 2021-09-30 15:54:46 +01:00
11130.txt ui: Remove info panel from the nspace menu when editing nspaces (#11130) 2021-09-24 18:05:22 +01:00
11136.txt Add changelog 2021-09-29 12:45:42 -04:00
11138.txt checks: populate interval and timeout when registering services (#11138) 2022-02-18 12:05:33 -08:00
11149.txt ui: Don't show the CRD menu for read-only intentions (#11149) 2021-09-27 17:19:32 +01:00
11163.txt Add Changelog 2021-10-19 20:58:28 +01:00
11200.txt ui: Replaces almost all remaining instances of SASS variables with CSS (#11200) 2021-10-07 19:21:11 +01:00
11216.txt ui: Topology - Fix up Default Allow and Permissive Intentions notices (#11216) 2021-10-12 09:27:06 -04:00
11222.txt Add changelog, website and metric docs 2021-10-05 13:34:24 -05:00
11231.txt fix consul_autopilot_healthy metric emission (#11231) 2021-10-08 10:31:50 -07:00
11232.txt docs: add notice that legacy ACLs have been removed. 2021-10-05 18:30:22 -04:00
11237.txt ui: Fix up blocking reconciliation for multiple models (#11237) 2021-10-07 12:38:04 +01:00
11241.txt fix: only add prom autopilot gauges to servers (#11241) 2021-10-13 09:25:30 -07:00
11245.txt Update filter chain creation for sidecar/ingress listeners (#11245) 2021-11-09 14:43:51 -07:00
11255.txt tlsutil: only AuthorizerServerConn when VerifyIncomingRPC is true 2021-10-27 13:43:25 -04:00
11277.txt connect: Add support for Envoy 1.20 (#11277) 2021-10-27 18:38:10 -07:00
11280.txt ui: Topology view with no dependencies (#11280) 2021-11-05 13:46:41 -04:00
11293.txt added changelog 2021-10-20 16:02:14 +05:30
11298.txt ui: Move the Role remove dialog to use InformedAction (#11298) 2021-10-14 13:54:27 +01:00
11311.txt ui: Ensure we provide an id for filtering policy-tokens (#11311) 2021-10-26 19:00:32 +01:00
11318.txt Fix back compat issues with UDS config (#11318) 2021-10-28 13:31:10 -07:00
11335.txt add path escape and unescape to path params 2022-01-03 08:18:32 -08:00
11348.txt added changelog 2021-10-27 02:33:36 +03:00
11364.txt ci: test against go1.17 2021-10-21 16:18:32 -04:00
11371.txt ui: Add Consul API Gateway as an external source (#11371) 2021-11-10 16:54:12 -05:00
11375.txt update raft to v1.3.2 (#11375) 2021-10-21 13:21:22 -04:00
11376.txt fix leadership transfer on leave suggestions (#11387) 2021-10-21 14:02:26 -04:00
11380.txt ui: Ensure dc selector correctly shows the currently selected dc (#11380) 2021-10-26 19:26:04 +01:00
11399.txt fix autopilot_failure_tolerance, add autopilot metrics test case (#11399) 2021-10-25 10:55:59 -07:00
11409.txt ui: Ensure we check intention service prefix permissions for per service (#11409) 2021-11-04 12:10:28 +00:00
11417.txt Add changelog entry (#11549) 2021-11-10 14:53:52 -05:00
11419.txt Support Check-And-Set deletion of config entries (#11419) 2021-11-01 16:42:01 +00:00
11428.txt add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
11449.txt plumb thru root cert tll to the aws ca provider (#11449) 2021-11-04 12:19:08 -07:00
11461.txt changelog 2021-11-01 22:47:20 +00:00
11472.txt ui: [Port] Ensure the tokens default nspace (and partition) is passed thru to the auth endpoint (#11490) 2021-11-11 12:02:29 +00:00
11474.txt ui: Fix code editor resizing and restyle (#11474) 2021-11-12 15:28:06 +00:00
11475.txt ui: Filter global intentions list by selected partition (#11475) 2021-11-09 17:38:24 +00:00
11477.txt Support Vault Namespaces explicitly in CA config (#11477) 2021-11-05 11:42:28 -05:00
11480.txt command/redirect_traffic: Redirect DNS requests to Consul if -consul-dns-ip is passed in (#11480) 2021-11-10 09:10:48 -05:00
11491.txt Fixup changelog filename (#11501) 2021-11-09 09:32:27 -08:00
11495.txt segments: ensure that the serf_lan_allowed_cidrs applies to network segments (#11495) 2021-11-04 17:17:19 -05:00
11500.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
11505.txt ui: Bump our browser support (#11505) 2021-11-11 13:37:49 +00:00
11507.txt Improved performance of the version.GetHumanVersion function by 50% on memory allocation. (#11507) 2021-12-09 13:14:06 -08:00
11514.txt Add changelog entry 2021-11-08 17:14:27 -07:00
11520.txt ui: Temporarily force all UI capabilities (#11520) 2021-11-10 11:05:27 +00:00
11522.txt xds: prefer fed state gateway definitions if they're fresher (#11522) 2021-11-09 16:45:36 +00:00
11556.txt ui: Adding partitions + icons to upstreams/upstream instances (#11556) 2021-11-17 17:46:50 +00:00
11569.txt Groundwork for exposing when queries are filtered by ACLs (#11569) 2021-12-03 17:11:26 +00:00
11573.txt connect: Support auth methods for the vault connect CA provider (#11573) 2021-11-18 13:15:28 -07:00
11576.txt ingress: allow setting TLS min version and cipher suites in ingress gateway config entries (#11576) 2022-01-11 11:46:42 -05:00
11577.txt ui: Notifications re-organization/re-style (#11577) 2021-11-24 18:14:07 +00:00
11578.txt ui: Fix brand coloring for inline-code plus docs (#11578) 2021-11-23 18:32:11 +00:00
11585.txt api: ensure new partition fields are omit empty for back compat (#11585) 2021-11-16 12:28:34 -06:00
11586.txt deps: update gopsutil to fix Windows ARM and macOS non-Apple LLVM builds (#11586) 2021-11-16 15:40:11 -05:00
11607.txt agent: purge service/check registration files for incorrect partitions on reload (#11607) 2021-11-18 14:44:20 -06:00
11640.txt ui: Add `Service.Namespace` variable to dashboard URL templates (#11640) 2021-11-25 10:47:07 +00:00
11645.txt types: add types/tls.go for strongly-typed TLS versions and cipher suites (#11645) 2021-12-03 20:17:55 -05:00
11665.txt Rename `master` and `agent_master` ACL tokens in the config file format (#11665) 2021-12-01 21:08:14 +00:00
11669.txt Rename `agent_master` ACL token in the API and CLI (#11669) 2021-12-02 17:05:27 +00:00
11670.txt ui: Stop tables overlapping with their headers when scrolling (#11670) 2021-12-06 16:09:15 +00:00
11671.txt ca: fix stored CARoot representation with Vault provider 2021-12-02 12:42:49 -05:00
11672.txt ca: set the correct SigningKeyID after config update with Vault provider 2021-12-02 16:07:11 -05:00
11681.txt ui: Don't cache event sources following a 401 (#11681) 2021-12-01 13:24:52 +00:00
11693.txt add MustRevalidate flag to connect_ca_leaf cache type; always use on non-blocking queries (#11693) 2021-12-02 11:32:15 -08:00
11720.txt Add the changelog entry for bbolt modifications 2021-12-02 16:59:13 -05:00
11722.txt agent: add variation of force-leave that exclusively works on the WAN (#11722) 2021-12-02 17:15:10 -06:00
11724.txt Add changelog note 2021-12-02 15:54:40 -08:00
11725.txt dns: add endpoint for querying service virtual IPs 2021-12-02 16:40:28 -08:00
11742.txt Add support for filtering the 'List Services' API 2022-08-10 16:52:32 -05:00
11744.txt agent/token: rename `agent_master` to `agent_recovery` (internally) (#11744) 2021-12-07 12:12:47 +00:00
11748.txt areas: make the gRPC server tracker network area aware (#11748) 2021-12-06 09:55:54 -06:00
11767.txt ui: Ensure we show a special readonly page for intentions (#11767) 2021-12-13 15:02:36 +00:00
11774.txt ui: Fixup names of Meta for instance search, also add Node (#11774) 2021-12-21 07:00:02 +00:00
11781.txt Add changelog 2021-12-21 16:45:45 -05:00
11791.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
11799.txt Update CI and release go versions to 1.17.5 (#11799) 2021-12-10 14:04:56 -05:00
11801.txt ui: Change the URL prefix of partitions from `-` to `_` (#11801) 2021-12-13 15:39:56 +00:00
11803.txt ui: Add version information back into the footer (#11803) 2021-12-13 15:54:58 +00:00
11804.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
11818.txt http: improve 404 Not Found response message 2021-12-13 11:03:25 -08:00
11820.txt http: improve UI not enabled response message 2021-12-13 08:48:33 -08:00
11821.txt http: WARN if GET request has non-empty body 2022-03-16 14:19:50 -07:00
11824.txt proxycfg: ensure all of the watches are canceled if they are cancelable (#11824) 2021-12-13 15:56:17 -06:00
11826.txt Add changelog entry 2021-12-13 19:03:12 -07:00
11827.txt [OSS] Remove remaining references to master (#11827) 2022-01-20 12:47:50 +00:00
11850.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
11854.txt Update golang.org/x/net to address CVE-2021-44716 2021-12-15 11:58:48 -05:00
11855.txt Move changelog entry to match this PR 2021-12-15 09:16:43 -08:00
11868.txt ui: Fix up missing policy delete warning modal (#11868) 2021-12-21 06:40:55 +00:00
11891.txt ui: Remove any route level auth checks (#11891) 2021-12-21 07:51:52 +00:00
11892.txt ui: Various empty state improvements/fixups (#11892) 2021-12-21 06:49:18 +00:00
11895.txt connect: Upgrade Envoy 1.20 to 1.20.1 (#11895) 2022-01-18 14:35:27 -05:00
11903.txt ui: Ensure service instance data does not get re-written on blocking refresh (#11903) 2022-01-07 19:16:21 +00:00
11905.txt ui: Ensure disconnect error doesn't appear w/auth change on some pages (#11905) 2022-01-04 14:55:32 +00:00
11910.txt ca: add test cases for rotating external trusted CA 2022-02-17 18:21:30 -05:00
11918.txt changelog 2022-01-05 17:51:03 -05:00
11924.txt reset `coalesceTimer` to nil as soon as the event is consumed (#11924) 2022-01-05 12:17:47 -05:00
11926.txt cli: Show node identities in acl token list output (#11926) 2022-01-04 12:44:43 -08:00
11931.txt ui: Fix URL params decoding (#11931) 2022-01-04 16:08:06 +00:00
11937.txt ui: [BUGFIX] Fixes an issue when editing intentions from the service > intentions sub tab (#11937) 2022-01-07 19:09:40 +00:00
11940.txt clone the service under lock to avoid a data race (#11940) 2022-01-06 14:33:06 -05:00
11950.txt api: Return 404 when deregistering a non-existent check (#11950) 2022-01-06 12:38:37 -08:00
11956.txt Add changelog entry 2022-02-02 17:31:08 -08:00
11958.txt upgrade raft to v1.3.3 (#11958) 2022-01-06 14:09:13 -05:00
11959.txt ui: Fix dark borders on certain visualizations (#11959) 2022-01-07 16:15:22 +00:00
11960.txt Fix Windows logging to files (#11960) 2022-01-06 16:07:09 -05:00
11968.txt ui: Remove KV pre-flight auth check (#11968) 2022-01-07 19:26:54 +00:00
11979.txt ui: Ensure the partition is passed through to the request for the SSO auth URL (#11979) 2022-01-11 11:02:46 +00:00
11985.txt ui: Adds a notice for non-primary intention creation (#11985) 2022-01-12 11:50:09 +00:00
12042.txt Update memberlist to 0.3.1 (#12042) 2022-01-12 12:00:18 -05:00
12049.txt Add changelog note 2022-01-12 12:31:28 -08:00
12057.txt update serf to v0.9.7 (#12057) 2022-01-18 13:03:22 -05:00
12079.txt Fix incorrect severity syslog messages (#12079) 2022-04-14 15:51:00 -07:00
12080.txt streaming: split event buffer by key (#12080) 2022-01-28 12:27:00 +00:00
12081.txt ui: Fixup KV folder creation then further creation within that folder (#12081) 2022-01-19 10:09:25 +00:00
12098.txt Support for connect native services in topology view. (#12098) 2022-02-16 16:51:54 -05:00
12110.txt Make blockingQuery efficient with 'not found' results. 2022-02-15 18:24:33 -05:00
12126.txt Add support for 'Partition' and 'RetryJoin' (#12126) 2022-01-20 16:49:36 -05:00
12166.txt acl: remove unused methods on fakes, and add changelog 2022-01-31 17:53:53 -05:00
12174.txt xds: fix for delta xDS reconnect bug in LDS/CDS (#12174) 2022-01-25 11:24:27 -06:00
12176.txt Adding changelog entry 2022-01-24 12:32:22 -08:00
12195.txt Prevent xDS tight loop on cfg errors (#12195) 2022-02-10 15:37:36 -07:00
12209.txt ui: Alias all our Structure Icons to Flight Icons (#12209) 2022-02-02 13:24:47 +00:00
12223.txt Add changelog entry 2022-02-10 17:21:34 -07:00
12236.txt xds: allow only one outstanding delta request at a time (#12236) 2022-02-08 10:36:48 -06:00
12248.txt ui: Exclude Service Health from Node listing page (#12248) 2022-02-11 09:52:27 +00:00
12267.txt add changelog 2022-02-03 17:39:36 -05:00
12277.txt config-entry: fix a panic when registering a service or ingress gateway 2022-02-09 18:49:48 -05:00
12279.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
12298.txt Add changelog file 2022-03-01 09:25:52 +01:00
12302.txt fix race when starting a service while the agent `serviceManager` is … (#12302) 2022-02-10 13:30:49 -05:00
12305.txt ui: Replace CollapsibleNotices with more a11y focussed Disclosure component (#12305) 2022-02-18 17:16:03 +00:00
12307.txt server: partly fix config entry replication issue that prevents replication in some circumstances (#12307) 2022-02-23 17:27:48 -06:00
12308.txt Refactor to make ACL errors more structured. (#12308) 2022-02-11 12:53:23 -08:00
12311.txt add changelog for rpc metric improv project (#12709) 2022-04-07 11:35:06 -07:00
12315.txt ui: Stop ember-data overwriting SyncTimes (#12315) 2022-02-11 13:54:46 +00:00
12316.txt ui: Fixup displaying a Nspace default policy when expanding the preview pane (#12316) 2022-02-18 17:22:05 +00:00
12317.txt ui: Make sure saving intentions from topology includes the partition (#12317) 2022-02-11 13:58:01 +00:00
12321.txt server: conditionally avoid writing a config entry to raft if it was already the same (#12321) 2022-02-14 14:39:12 -06:00
12324.txt local: fixes a data race in anti-entropy sync (#12324) 2022-02-14 10:41:33 -06:00
12325.txt raft: update to v1.3.5 (#12325) 2022-02-14 13:48:52 -06:00
12329.txt auto-reload configuration when config files change (#12329) 2022-03-31 15:11:49 -04:00
12334.txt ui: Transition App Chrome to use new Disclosure Menus (#12334) 2022-02-21 12:22:59 +00:00
12354.txt ui: Add more explanatory texts for empty states (#12354) 2022-04-11 12:49:59 +01:00
12359.txt debug: limit the size of the trace 2022-02-15 14:15:34 -05:00
12362.txt server: suppress spurious blocking query returns where multiple config entries are involved (#12362) 2022-02-25 15:46:34 -06:00
12370.txt Parse datacenter from request (#12370) 2022-02-17 16:41:27 -05:00
12376.txt ci: combine 'enhancement' entry type with 'improvement' (#12376) 2022-02-17 19:21:47 -08:00
12385.txt Add changelog note 2022-02-17 12:17:12 -08:00
12399.txt Add per-node max indexes (#12399) 2022-06-23 11:13:25 -04:00
12400.txt Added changelog 2022-02-25 19:29:00 +05:30
12442.txt Adds changelog 2022-02-25 15:43:06 +00:00
12443.txt connect: Upgrade Envoy 1.20 to 1.20.2 (#12443) 2022-02-24 16:19:39 -08:00
12444.txt catalog: compare node names case insensitively in more places (#12444) 2022-02-24 16:54:47 -06:00
12449.txt Add changelog entry 2022-02-24 17:05:55 -08:00
12461.txt ui: Native CSS Icon Composition (#12461) 2022-03-15 12:54:14 +00:00
12470.txt Bulk acl message fixup oss (#12470) 2022-03-10 18:48:27 -08:00
12478.txt ui: List Primary and Local DCs first in the Datacenter selector (#12478) 2022-03-07 10:54:12 +00:00
12479.txt ui: Fix loading icon size (adds a viewbox) (#12479) 2022-03-07 10:13:56 +00:00
12496.txt raft: upgrade to v1.3.6 (#12496) 2022-03-02 17:00:02 -06:00
12504.txt Support per-listener TLS configuration ⚙️ (#12504) 2022-03-18 10:46:58 +00:00
12511.txt server: ensure that service-defaults meta is incorporated into the discovery chain response (#12511) 2022-03-30 10:04:18 -05:00
12512.txt server: fix spurious blocking query suppression for discovery chains (#12512) 2022-03-03 16:54:41 -06:00
12522.txt agent: convert listener config to TLS types (#12522) 2022-03-24 15:32:25 -04:00
12529.txt Code review changes 2022-03-07 14:39:33 -05:00
12535.txt lib: add validation package + DNS label validation (#12535) 2022-03-17 18:31:28 -07:00
12565.txt Creating a changelog entry for #12565 (#12699) 2022-04-05 15:55:14 -04:00
12567.txt Add source of authority annotations to the PermissionDeniedError output. (#12567) 2022-03-18 10:32:25 -07:00
12573.txt add changelog for rpc metric improv project (#12709) 2022-04-07 11:35:06 -07:00
12583.txt Add IAM Auth Method (#12583) 2022-03-31 10:18:48 -05:00
12601.txt xds: adding control of the mesh-wide min/max TLS versions and cipher suites from the mesh config entry (#12601) 2022-03-30 13:43:59 -05:00
12607.txt Fix leaked Vault LifetimeRenewers (#12607) 2022-03-28 09:58:16 -05:00
12617.txt Enable running autopilot state updates on all servers (#12617) 2022-04-07 10:48:48 -04:00
12640.txt health: ensure /v1/health/service/:service endpoint returns the most recent results when a filter is used with streaming (#12640) 2022-04-27 10:39:45 -05:00
12646.txt Update raft-boltdb to pull in new writeCapacity metric (#12646) 2022-03-30 11:38:44 -04:00
12655.txt Avoid using sys/mounts to enable namespaces (#12655) 2022-03-31 23:35:38 -07:00
12670.txt Add expanded token read flag and endpoint option 2022-03-31 10:49:49 -07:00
12672.txt Add changelog note 2022-03-31 14:05:02 -07:00
12675.txt mark disable_compat_1.9 to deprecate in 1.13, change default to true (#12675) 2022-04-01 10:35:56 -07:00
12678.txt WatchRoots gRPC endpoint (#12678) 2022-04-05 15:26:14 +01:00
12681.txt Tweak the Lambda Envoy configuration generated by the serverless patcher 2022-04-01 11:13:44 -04:00
12685.txt Add a field to disable following redirects on http checks 2022-04-05 16:12:18 -07:00
12695.txt Update .changelog/12695.txt 2022-04-05 09:08:37 -07:00
12711.txt xds: ensure that all connect timeout configs can apply equally to tproxy direct dial connections (#12711) 2022-04-07 16:58:21 -05:00
12722.txt UDP check for service stanza #12221 (#12722) 2022-06-06 15:13:19 -04:00
12725.txt improve error msg for deregister critical service 2022-04-07 14:50:02 -07:00
12727.txt add more labels to RequestRecorder (#12727) 2022-04-12 10:50:25 -07:00
12739.txt deps: update to latest go-discover (#12739) 2022-04-12 13:41:12 -05:00
12774.txt acl: Adjust region handling in AWS IAM auth method (#12774) 2022-04-13 14:31:37 -05:00
12777.txt connect: Add Envoy 1.21.1 to support matrix, remove 1.17.4 (#12777) 2022-04-14 10:44:42 -07:00
12786.txt ui: Adds support for AWS-IAM Auth Methods (#12786) 2022-04-14 17:13:13 +01:00
12787.txt ConnectCA.Sign gRPC Endpoint (#12787) 2022-04-14 14:26:14 +01:00
12791.txt add queryBackend to the api query meta. (#12791) 2022-04-14 12:48:19 -04:00
12793.txt Update 12793.txt 2022-04-14 14:57:47 -07:00
12797.txt acl: Fix tag parsing for IAM users and roles in IAM auth method (#12797) 2022-04-14 16:45:35 -05:00
12805.txt connect: Add Envoy 1.22 to integration tests, remove Envoy 1.18 (#12805) 2022-04-18 09:36:07 -07:00
12807.txt acl: Clarify node/service identities must be lowercase (#12807) 2022-04-21 09:29:16 -07:00
12808.txt Update go version to 1.18.1 2022-04-18 11:41:10 -04:00
12819.txt Implement the ServerDiscovery.WatchServers gRPC endpoint (#12819) 2022-04-21 12:56:18 -04:00
12820.txt ca: fix a bug that caused a non blocking leaf cert query after a blocking leaf cert query to block (#12820) 2022-04-20 12:21:47 -05:00
12825.txt [OSS] gRPC call to get envoy bootstrap params (#12825) 2022-04-19 17:24:21 -07:00
12844.txt update raft to v1.3.8 (#12844) 2022-04-25 10:19:26 -04:00
12846.txt add changelog entry 2022-04-22 13:13:11 -04:00
12865.txt Upgrade Raft to v1.3.9 for saturation metrics (#12865) 2022-04-27 17:17:31 +01:00
12878.txt Docs and changelog edits 2022-05-04 08:50:59 -07:00
12881.txt Validate port on mesh service registration (#12881) 2022-05-05 09:13:30 -07:00
12885.txt Return ACLRemoteError from cache and test it correctly 2022-05-03 10:05:26 -07:00
12890.txt Add changelog entry for #12890 2022-10-05 13:35:07 -04:00
12904.txt Support vault namespaces in connect CA (#12904) 2022-05-04 19:41:55 -07:00
12905.txt Middleware: `RequestRecorder` reports calls below 1ms as decimal value (#12905) 2022-09-15 13:04:37 -04:00
12914.txt api: add the ability to specify a path prefix (#12914) 2022-05-19 16:07:59 -07:00
12935.txt acl: gRPC login and logout endpoints (#12935) 2022-05-04 17:38:45 +01:00
12956.txt Support making requests to lambda from connect proxies. 2022-05-05 17:42:30 -04:00
12961.txt Changelog 2022-05-09 10:07:19 -07:00
13001.txt Add support for merge-central-config query param (#13001) 2022-05-25 13:20:17 -07:00
13012.txt Watch the singular service resolver instead of the list + filtering to 1 (#13012) 2022-05-12 16:34:17 -04:00
13023.txt [1.16.x] Fix topology view when displaying mixed connect-native/normal services. (#18330) 2023-07-31 10:00:40 -04:00
13051.txt Update go-grpc/grpc to resolve conection memory leak 2022-06-08 11:29:29 +01:00
13062.txt upgrade serf to v0.9.8 (#13062) 2022-05-16 14:13:23 -04:00
13071.txt When a host header is defined override `req.Host` in the metrics ui (#13071) 2022-05-13 14:05:22 -04:00
13091.txt Retry on bad dogstatsd connection (#13091) 2022-05-19 16:03:46 -04:00
13118.txt config: prevent top-level `verify_incoming` enabling mTLS on gRPC port (#13118) 2022-05-18 16:15:57 +01:00
13127.txt fix: multiple grpc/http2 services for ingress listeners 2022-05-26 10:43:58 -04:00
13143.txt Specify go_package explicitly 2022-05-24 10:22:53 -07:00
13183.txt ui: Icon related fixups (#13183) 2022-05-25 14:28:42 +01:00
13256.txt Revert getPathSuffixUnescaped (#13256) 2022-06-01 13:17:14 -04:00
13304.txt Add isLeader metric to track if a server is a leader (#13304) 2022-06-03 13:07:37 -04:00
13344.txt Fix KVSGet method to handle QueryOptions properly (#13344) 2022-06-02 12:26:18 -04:00
13357.txt Add changelog 2022-06-09 17:04:05 -07:00
13388.txt chore: changelog 2022-06-07 18:48:39 +01:00
13394.txt ui: upgrade ember composable helper (#13394) 2022-06-08 16:07:51 +01:00
13409.txt ui: Fix intl keys in order to render correct messages for empty states (#13409) 2022-06-16 12:07:04 +01:00
13421.txt Add changelog note 2022-06-10 12:05:05 -07:00
13431.txt connect: Update Envoy support matrix to latest patch releases (#13431) 2022-06-14 13:19:09 -07:00
13450.txt [OSS] Support merge-central-config option in node services list API (#13450) 2022-06-15 08:30:31 -07:00
13481.txt Add changelog note 2022-06-16 18:26:25 -07:00
13493.txt Fix Consul KV CLI 'GET' flags 'keys' and 'recurse' to be set together (#13493) 2022-08-25 18:21:49 -04:00
13532.txt no 1.9 style metrics (#13532) 2022-06-29 09:46:37 -07:00
13607.txt Fix spelling mistake in serverless patcher (#13607) 2022-06-29 15:21:21 -04:00
13613.txt chore: changelog for destinations 2022-08-02 10:48:00 -04:00
13658.txt Changelog entry 2022-07-04 10:48:36 +01:00
13677.txt feat(cli): enable to delete config entry from an input file (#13677) 2022-07-11 10:13:40 -04:00
13686.txt ui: CopyableCode component (#13686) 2022-07-07 17:42:47 +01:00
13687.txt server: broadcast the public grpc port using lan serf and update the consul service in the catalog with the same data (#13687) 2022-07-07 13:55:41 -05:00
13699.txt Add changelog note 2022-07-08 15:23:00 -07:00
13722.txt Changelog entry 2022-07-14 18:22:12 +01:00
13782.txt Update go-discover to support ECS discovery (#13782) 2023-01-12 12:06:29 -06:00
13787.txt Fix panic on acl token read with -self and -expanded 2022-07-18 15:52:05 -07:00
13807.txt connect: Add support for Envoy 1.23, remove 1.19 (#13807) 2022-07-19 14:51:04 -07:00
13847.txt Add changelog note 2022-07-22 10:33:50 -07:00
13958.txt Update ingress/terminating wildcard logic and handle destinations 2022-08-05 07:56:10 -07:00
13998.txt Change changelog message 2022-08-30 17:00:11 +02:00
14021.txt ui: Ensure we dispatch validation state (#14021) 2022-08-08 11:12:40 +01:00
14034.txt Allow uppercase in proxy launch -sidecar-for arg 2022-08-05 10:55:22 -07:00
14081.txt Close active listeners on error 2022-08-09 12:22:39 -04:00
14119.txt Add changelog entry for peering fix (#14160) 2022-08-11 16:23:02 -07:00
14132.txt Leadership transfer cmd (#14132) 2022-11-14 15:35:12 -05:00
14149.txt Handle breaking change for ServiceVirtualIP restore (#14149) 2022-08-11 14:47:10 -04:00
14161.txt feat(telemetry): add labels to serf and memberlist metrics (#14161) 2022-08-11 22:09:56 -04:00
14162.txt Add `Targets` field to service resolver failovers. (#14162) 2022-08-15 09:20:25 -04:00
14178.txt Refactor failover code to use Envoy's aggregate clusters (#14178) 2022-08-12 14:30:46 -04:00
14233.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
14238.txt Add additional parameters to envoy passive health check config (#14238) 2022-09-01 09:59:11 -07:00
14244.txt Remove empty tags 2 (#16113) 2023-02-06 11:12:43 -08:00
14269.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
14285.txt Add changelog 2022-08-22 13:42:13 -04:00
14290.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
14340.txt Add support for configuring Envoys route idle_timeout (#14340) 2022-11-29 17:43:15 -05:00
14343.txt ui: Use credentials for all HTTP API requests (#14343) 2022-09-01 18:15:06 +01:00
14356.txt Configure Envoy alpn_protocols based on service protocol (#14356) 2022-10-10 13:13:56 -07:00
14364.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
14373.txt Update max_ejection_percent on outlier detection for peered clusters to 100% (#14373) 2022-08-29 13:46:41 -04:00
14378.txt Fix a breaking change to the API package introduced in #13835 (#14378) 2022-08-29 16:59:27 -04:00
14395.txt Config-entry: Support proxy config in service-defaults (#14395) 2022-09-12 10:41:58 -04:00
14396.txt Finish up cluster peering failover (#14396) 2022-08-30 11:46:34 -04:00
14397.txt xDS Load Balancing (#14397) 2022-09-09 15:02:01 +01:00
14423.txt feat(cli): add initial peering cli commands 2022-09-01 17:20:13 -04:00
14429.txt changelog: fix missing backtick (#14663) 2022-09-16 11:30:06 -07:00
14433.txt Use proxy address for default check (#14433) 2022-09-01 14:03:35 -07:00
14437.txt Allow Operator Generated bootstrap token (#14437) 2023-01-04 20:19:33 +00:00
14445.txt Implement Cluster Peering Redirects (#14445) 2022-09-09 13:58:28 -04:00
14465.txt Support RFC 2782 for prepared query DNS lookups (#14465) 2022-11-20 17:21:24 -05:00
14474.txt Add kv txn get-not-exists operation. 2022-09-06 10:28:59 -05:00
14475.txt add non-double-prefixed metrics (#14193) 2022-09-09 12:13:43 -05:00
14495.txt ui: Detect token in a cookie and passthrough (#14495) 2022-09-08 11:43:39 +01:00
14516.txt Update intermediate pki mount/role when reconfiguring Vault provider 2022-09-13 15:42:26 -07:00
14521.txt Reuse http.DefaultTransport in UIMetricsProxy (#14521) 2022-09-08 11:02:05 -04:00
14527.txt ui: Amends to existing topology notice/banner texts (#14527) 2022-09-29 09:39:06 -07:00
14556.txt Add changelog entry 2022-09-16 17:57:10 -06:00
14563.txt feat(peering): validate server name conflicts on establish 2022-09-14 11:37:30 -04:00
14573.txt connect: Bump latest Envoy to 1.23.1 in test matrix (#14573) 2022-09-14 13:20:16 -07:00
14577.txt Add input validation for auto-config JWT authorization checks. 2022-09-13 11:16:36 -05:00
14579.txt Add CSR check for number of URIs. (#14579) 2022-09-13 14:21:47 -05:00
14598.txt Add changelog note 2022-09-15 12:59:16 -07:00
14599.txt increase the size of txn to support vault (#14599) 2022-09-19 09:07:19 -07:00
14604.txt ui: Add merge-central-config to relevant HTTP requests (#14604) 2022-09-20 10:33:19 +01:00
14606.txt ui: Completely remove the Overview routes when running the UI in HCP (#14606) 2022-09-14 19:39:50 +01:00
14616.txt Add envoy connection balancing. (#14616) 2022-09-26 11:29:06 -05:00
14619.txt [BUGFIX] Do not use interval as timeout (#14619) 2022-09-15 12:39:48 -04:00
14679.txt Consul 1.14 post-release updates (#15382) 2022-11-15 14:22:43 -06:00
14723.txt add HCP integration component (#14723) 2022-09-26 14:58:15 -04:00
14724.txt Support Stale Queries for Trust Bundle Lookups (#14724) 2022-09-28 09:56:59 -07:00
14747.txt Add changelog entry 2022-10-10 13:35:12 -06:00
14749.txt feat(ingress gateway: support configuring limits in ingress-gateway c… (#14749) 2022-09-28 14:56:46 -04:00
14751.txt Fix explicit tproxy listeners with discovery chains. (#14751) 2022-10-05 14:38:25 -05:00
14796.txt Add changelog entry 2022-10-07 09:54:08 -06:00
14797.txt Add exported services event to cluster peering replication. (#14797) 2022-09-29 15:37:19 -04:00
14800.txt Extend tcp keepalive settings to work for terminating gateways as well 2022-10-14 17:05:46 -07:00
14811.txt Adding changelog 2022-09-29 22:25:10 -07:00
14817.txt Make the mesh gateway changes to allow `local` mode for cluster peering data plane traffic (#14817) 2022-10-06 09:54:14 -04:00
14831.txt connect: Bump Envoy 1.20 to 1.20.7, 1.21 to 1.21.5 and 1.22 to 1.22.5 (#14831) 2022-10-04 13:15:01 -07:00
14832.txt autoencrypt: helpful error for clients with wrong dc (#14832) 2022-10-25 10:13:41 -07:00
14833.txt config entry: hardcode proxy-defaults name as global (#14833) 2022-10-25 10:55:15 -07:00
14854.txt Rename `PeerName` to `Peer` on prepared queries and exported services (#14854) 2022-10-04 14:46:15 -04:00
14869.txt Merge central config for GetEnvoyBootstrapParams (#14869) 2022-10-10 12:40:27 -05:00
14873.txt Upgrade serf to v0.10.1 and memberlist to v0.5.0 to get memberlist size metrics and broadcast queue depth metric (#14873) 2022-10-04 17:51:37 -06:00
14885.txt fix: missing UDP field in checkType (#14885) 2022-10-05 15:57:21 -04:00
14889.txt Add remote peer partition and datacenter info. 2022-10-13 10:37:41 -05:00
14897.txt bump raft version to v1.3.11 (#14897) 2022-10-12 08:51:52 -04:00
14903.txt ui: Remove node name from agentless service instance (#14903) 2022-10-07 04:01:34 -06:00
14908.txt cache: prevent goroutine leak in agent cache (#14908) 2022-10-17 14:38:10 -05:00
14916.txt bug: fix goroutine leaks caused by incorrect usage of `WatchCh` (#14916) 2022-10-13 12:04:27 +01:00
14921.txt ui: hide node name and meta on agentless instances (#14921) 2022-10-11 09:59:53 -06:00
14922.txt gRPC server metrics (#14922) 2022-10-11 17:00:32 -05:00
14924.txt Service http checks data source for agentless proxies (#14924) 2022-10-12 07:49:56 -07:00
14933.txt cli: Add -node-name flag to redirect-traffic command (#14933) 2022-10-12 11:53:41 -06:00
14934.txt perf: remove expensive reflection from xDS hot path (#14934) 2022-10-14 10:26:42 +01:00
14935.txt Add changelog entry 2022-10-13 16:09:32 -06:00
14936.txt adding configuration option cloud.scada_address (#14936) 2022-10-13 11:31:28 +02:00
14947.txt Add changelog for peers detail page 2022-10-13 16:45:03 +02:00
14956.txt cache: refactor agent cache fetching to prevent unnecessary fetches on error (#14956) 2022-10-25 10:27:26 -05:00
14957.txt Add consul.xds.server.streamStart metric (#14957) 2022-10-12 14:17:58 -05:00
14960.txt proxycfg: rate-limit delivery of config snapshots (#14960) 2022-10-14 15:52:00 +01:00
14962.txt xds: properly merge central config for "agentless" services (#14962) 2022-10-13 12:04:59 +01:00
14965.txt Refactor client RPC timeouts (#14965) 2022-10-18 15:05:09 -04:00
14970.txt Add changelog 2022-10-12 17:16:01 -06:00
14971.txt Add changelog 2022-10-13 10:43:57 -06:00
14981.txt Add changelog entry 2022-10-13 16:03:15 -06:00
14986.txt Add changelog entry 2022-10-13 18:54:39 -06:00
15001.txt ingress-gateways: don't log error when registering gateway (#15001) 2022-10-25 10:55:44 -07:00
15005.txt ca: fix a masked bug in leaf cert generation that would not be notified of root cert rotation after the first one (#15005) 2022-10-17 13:24:27 -05:00
15035.txt Warn instead of returning an error when intermediate mount tune permission is missing 2022-10-18 12:01:25 -07:00
15050.txt cli/sdk: Allow redirection to a different consul dns port (#15050) 2022-10-21 13:15:32 -06:00
15065.txt changelog 2022-10-19 16:37:50 -04:00
15068.txt Add changelog 2022-10-20 14:32:42 -04:00
15083.txt Avoid blocking child type updates on parent ack (#15083) 2022-11-07 18:10:42 -07:00
15090.txt Add changelog 2022-10-24 16:12:08 -04:00
15093.txt connect: Add Envoy 1.24 to integration tests, remove Envoy 1.20 (#15093) 2022-10-31 10:50:45 -05:00
15107.txt fix: return error when config file with unknown extension is passed (#15107) 2023-01-04 16:57:00 -08:00
15108.txt fix(peering): replicating wan address (#15108) 2022-10-24 15:44:57 -04:00
15155.txt Allow consul debug on non-ACL consul servers (#15155) 2022-10-27 09:25:18 -04:00
15160.txt fix(peering): nil pointer in calling handleUpdateService (#15160) 2022-10-26 11:50:34 -04:00
15178.txt Fix peering metrics bug (#15178) 2022-10-28 10:51:12 -04:00
15186.txt Fix mesh gateway configuration with proxy-defaults (#15186) 2022-11-09 10:14:29 -06:00
15233.txt integ test: reduce flakiness due to compound output from retry (#15233) 2022-11-02 14:08:17 -04:00
15253.txt Clarify Vault CA changelog entry (#15662) 2022-12-02 20:16:49 -05:00
15272.txt fix(mesh-gateway): remove deregistered service from mesh gateway (#15272) 2022-11-07 20:30:15 -05:00
15274.txt Fixing CLI ACL token processing unexpected precedence (#15274) 2022-12-02 12:19:52 -05:00
15297.txt removes ioutil usage everywhere which was deprecated in go1.16 (#15297) 2022-11-10 10:26:01 -06:00
15302.txt update config defaults, add docs (#15302) 2022-11-09 09:29:55 -08:00
15317.txt update ACLs for cluster peering (#15317) 2022-11-09 13:02:58 -08:00
15320.txt connect: strip port from DNS SANs for ingress gateway leaf cert (#15320) 2022-11-14 10:27:03 -08:00
15339.txt Prevent serving TLS via ports.grpc (#15339) 2022-11-11 14:29:22 -06:00
15346.txt grpc/acl: relax permissions required for "core" endpoints (#15346) 2023-01-04 12:40:34 +00:00
15356.txt Ensure that NodeDump imported nodes are filtered (#15356) 2022-11-14 12:35:20 -07:00
15370.txt auto-config: relax node name validation for JWT authorization (#15370) 2022-11-14 18:24:40 -06:00
15423.txt Fix SDK to support older versions of Consul. (#15423) 2022-11-18 10:32:01 -06:00
15466.txt Fix issue with connect Envoy choosing incorrect TLS settings. (#15466) 2022-11-18 14:36:20 -06:00
15503.txt fix(peering): increase the gRPC limit to 8MB (#15503) 2022-11-28 17:48:43 -05:00
15525.txt Fix Vault managed intermediate PKI bug (#15525) 2022-11-28 16:17:58 -05:00
15541.txt Use rpcHoldTimeout to calculate blocking timeout (#15541) 2022-11-24 10:13:02 -05:00
15555.txt ui: Add ServerExternalAddresses to peer token create form (#15555) 2022-11-30 11:42:36 -07:00
15596.txt Add peering `.service` and `.node` DNS lookups. (#15596) 2022-11-29 12:23:18 -06:00
15598.txt Deprecate -join and -join-wan (#15598) 2022-12-14 20:28:25 +00:00
15610.txt Remove log line about server mgmt token init (#15610) 2022-11-29 17:56:03 -05:00
15614.txt feat(ingress-gateway): support outlier detection of upstream service for ingress gateway (#15614) 2022-12-13 11:51:37 -05:00
15615.txt peering: better represent non-passing states during peer check flattening (#15615) 2022-11-30 11:29:21 -06:00
15654.txt Export peering cli (#15654) 2023-05-31 14:27:35 -04:00
15659.txt connect: Add support for ConsulResolver to specifies a filter expression (#15659) 2022-12-14 12:41:07 -08:00
15661.txt Detect Vault 1.11+ import in secondary datacenters and update default issuer (#15661) 2022-12-05 15:39:21 -06:00
15669.txt connect: ensure all vault connect CA tests use limited privilege tokens (#15669) 2022-12-06 10:06:36 -06:00
15690.txt Fix local mesh gateway with peering discovery chains. (#15690) 2022-12-07 13:07:42 -06:00
15697.txt Enforce lowercase peer names. (#15697) 2023-01-13 14:20:28 -06:00
15701.txt Add custom balancer to always remove subConns (#15701) 2022-12-19 17:39:31 +00:00
15705.txt [OSS] security: update x/net module (#15737) 2022-12-08 16:45:44 -05:00
15710.txt Remove the `connect.enable_serverless_plugin` agent configuration option (#15710) 2022-12-08 14:46:42 -05:00
15737.txt [OSS] security: update x/net module (#15737) 2022-12-08 16:45:44 -05:00
15760.txt Fix DialedDirectly configuration for Consul dataplane. (#15760) 2022-12-13 09:16:31 -06:00
15769.txt agent: Fix assignment of error when auto-reloading cert and key file changes. (#15769) 2022-12-12 12:24:39 -07:00
15789.txt xds: don't attempt to load-balance sessions for local proxies (#15789) 2023-01-18 12:33:21 -06:00
15794.txt Error out `consul connect envoy` if agent explicitly disabled grpc (#15794) 2022-12-19 14:37:27 -05:00
15817.txt extensions: refactor serverless plugin to use extensions from config entry fields (#15817) 2022-12-19 12:19:37 -08:00
15818.txt Enhancement: Consul Compatibility Checking (#15818) 2022-12-20 09:58:19 -08:00
15828.txt Add new config_file_service_registration token (#15828) 2023-01-10 10:24:02 -06:00
15833.txt Fix incorrect protocol check on discovery chains with peer targets. (#15833) 2022-12-20 10:15:03 -06:00
15864.txt docs(access logs): new docs for access logging (#15948) 2023-01-11 16:41:02 +00:00
15865.txt Fix issue with incorrect proxycfg watch on upstream peer-targets. (#15865) 2023-01-03 10:44:08 -06:00
15866.txt Fix agent cache incorrectly notifying unchanged protobufs. (#15866) 2023-01-03 10:11:56 -06:00
15884.txt Output user-friendly name for anonymous token (#15884) 2023-01-09 12:28:53 -06:00
15892.txt grpc: switch servers and retry on error (#15892) 2023-01-05 10:21:27 +00:00
15906.txt Add the Lua Envoy extension (#15906) 2023-01-06 12:13:40 -05:00
15913.txt Fix issue where TLS configuration was ignored for unix sockets in consul connect envoy. (#15913) 2023-01-06 12:34:49 -06:00
15922.txt Remove legacy acl policies (#15922) 2023-02-06 15:35:52 +00:00
15947.txt Remove legacy acl tokens (#15947) 2023-01-27 09:17:07 -06:00
15956.txt [OSS] Add Peer field to service-defaults upstream overrides (#15956) 2023-02-03 10:51:53 -05:00
15967.txt Warn if ACL is enabled but no token is provided to Envoy (#15967) 2023-01-16 12:31:56 -05:00
15970.txt Support Vault agent auth config for AWS/GCP CA provider auth (#15970) 2023-01-18 11:53:04 -08:00
15979.txt Support Envoy's MaxEjectionPercent and BaseEjectionTime config entries for passive health checks (#15979) 2023-04-26 15:59:48 -07:00
15987.txt api: enable query options on agent force-leave endpoint (#15987) 2023-04-18 11:31:48 -05:00
15988.txt Add a flag for enabling debug logs to the `connect envoy` command (#15988) 2023-01-31 13:30:20 -08:00
16000.txt Fix configuration merging for implicit tproxy upstreams. (#16000) 2023-01-18 13:43:53 -06:00
16009.txt Warn when the token query param is used for auth (#16009) 2023-01-24 16:21:41 +00:00
16015.txt Add support for envoy readiness flags (#16015) 2023-01-19 16:54:11 -05:00
16024.txt Apply agent partition to load services and agent api (#16024) 2023-01-20 12:59:26 -05:00
16044.txt Update token language to distinguish Accessor and Secret ID usage (#16044) 2023-02-07 12:26:30 -06:00
16097.txt Use agent token for service/check deregistration during anti-entropy (#16097) 2023-02-03 08:45:11 -06:00
16105.txt ACL error improvements: incomplete bootstrapping and non-existent token (#16105) 2023-02-08 23:49:44 +00:00
16176.txt Adding experimental support for a more efficient LogStore implementation (#16176) 2023-02-08 16:50:22 +00:00
16204.txt UI: CC-4032 - Update sidebar width (#16204) 2023-02-13 11:48:31 -07:00
16205.txt Add the `operator usage instances` command and api endpoint (#16205) 2023-02-08 12:07:21 -08:00
16224.txt support vault auth config for alicloud ca provider 2023-03-07 03:02:05 +00:00
16227.txt [UI]: update Ember to 3.27 (#16227) 2023-02-10 13:32:19 -08:00
16230.txt Fix peering acceptors in secondary datacenters. (#16230) 2023-02-10 09:47:17 -06:00
16251.txt [UI] CC-4031: change from Action, a and button to hds::Button (#16251) 2023-02-22 13:05:15 -08:00
16257.txt Fix mesh gateways incorrectly matching peer locality. (#16257) 2023-02-16 09:22:41 -06:00
16259.txt add provider ca support for approle auth-method 2023-03-03 19:29:53 +00:00
16262.txt add provider ca auth support for kubernetes 2023-03-02 22:05:40 +00:00
16263.txt [OSS] security: update go to 1.20.1 (#16263) 2023-02-17 15:04:12 -05:00
16266.txt add provider ca support for jwt file base auth 2023-03-02 20:33:06 +00:00
16274.txt [OSS] connect: Bump Envoy 1.22.5 to 1.22.7, 1.23.2 to 1.23.4, 1.24.0 to 1.24.2, add 1.25.1, remove 1.21.5 (#16274) 2023-02-15 11:45:43 -05:00
16284.txt new docs for consul and consul-k8s troubleshoot command (#16284) 2023-02-17 13:25:49 -08:00
16288.txt Improve ux to help users avoid overwriting fields of ACL tokens, roles and policies (#16288) 2023-03-01 15:00:37 -05:00
16292.txt add server side rate-limiter changelog entry (#16292) 2023-02-16 19:21:50 +00:00
16298.txt add provider ca auth-method support for azure 2023-03-01 00:07:33 +00:00
16301.txt fix: add tls config to unix socket when https is used (#16301) 2023-02-21 08:28:13 -05:00
16339.txt Fix issue with peer services incorrectly appearing as connect-enabled. (#16339) 2023-02-21 13:59:36 -06:00
16358.txt Upgrade Alpine image to 3.17 (#16358) 2023-02-22 10:09:41 -06:00
16369.txt Add changelog entry for API Gateway (Beta) (#16369) 2023-02-22 13:10:05 -06:00
16412.txt feat: update alerts to Hds::Alert component (CC-4035) (#16412) 2023-02-24 20:07:12 -08:00
16428.txt fix: ui tests run is fixed (applying class attribute twice to the hbs element caused the issue (#16428) 2023-02-24 23:46:45 -08:00
16444.txt UI: Fix rendering issue in search and lists (#16444) 2023-02-27 16:31:47 -07:00
16445.txt cli: ensure acl token read -self works (#16445) 2023-02-28 10:58:29 -06:00
16485.txt fix (cli): return error msg if acl policy not found (#16485) 2023-03-01 19:50:03 +00:00
16495.txt Add ServiceResolver RequestTimeout for route timeouts to make TerminatingGateway upstream timeouts configurable (#16495) 2023-03-03 09:37:12 -05:00
16497.txt proxycfg: ensure that an irrecoverable error in proxycfg closes the xds session and triggers a replacement proxycfg watcher (#16497) 2023-03-03 14:27:53 -06:00
16498.txt Fix issue where terminating gateway service resolvers weren't properly cleaned up (#16498) 2023-03-03 09:56:57 -05:00
16499.txt Fix resolution of service resolvers with subsets for external upstreams (#16499) 2023-03-03 14:17:11 -05:00
16506.txt Improve ux around ACL token to help users avoid overwriting node/service identities (#16506) 2023-03-06 15:00:39 +00:00
16508.txt Add some basic UI improvements for api-gateway services (#16508) 2023-03-03 16:59:04 -05:00
16512.txt NET-2903 Normalize weight for http routes (#16512) 2023-03-03 16:39:59 -05:00
16519.txt feat: update notification to use hds toast component (#16519) 2023-03-06 14:10:09 -08:00
16530.txt Follow-up fixes to consul connect envoy command (#16530) 2023-03-06 10:32:06 -05:00
16531.txt NET-2904 Fixes API Gateway Route Service Weight Division Error 2023-03-06 08:41:57 -05:00
16552.txt perf: Remove expensive reflection from raft/mesh hot path (#16552) 2023-05-26 11:42:05 -06:00
16570.txt fix bug that can lead to peering service deletes impacting the state of local services (#16570) 2023-03-08 11:24:03 -05:00
16574.txt UI: Fix htmlsafe errors throughout the app (#16574) 2023-03-09 12:43:35 -07:00
16577.txt feat: update typography to consume hds styles (#16577) 2023-03-14 19:49:14 -07:00
16585.txt Allow HCP metrics collection for Envoy proxies 2023-03-10 13:52:54 -07:00
16592.txt Preserve CARoots when updating Vault CA configuration (#16592) 2023-03-13 17:32:59 -04:00
16647.txt Snapshot restore tests (#16647) 2023-03-18 14:43:22 -06:00
16649.txt Adds check to verify that the API Gateway is being created with at least one listener 2023-03-20 12:37:30 -04:00
16660.txt fix: add AccessorID property to PUT token request (#16660) 2023-03-16 18:57:59 -07:00
16661.txt [API Gateway] Fix invalid cluster causing gateway programming delay (#16661) 2023-03-17 13:31:04 -04:00
16673.txt peering: peering partition failover fixes (#16673) 2023-03-20 10:00:29 -07:00
16700.txt Changelog for audit logging fix. (#16700) 2023-03-22 13:06:53 -07:00
16729.txt fix bug where pqs that failover to a cluster peer dont un-fail over (#16729) 2023-03-22 09:24:13 -04:00
16754.txt Bump the golang.org/x/net to 0.7.0 to address CVE-2022-41723 (#16754) 2023-04-18 17:31:08 +00:00
16776.txt Allow dialer to re-establish terminated peering (#16776) 2023-04-03 12:07:45 -06:00
16781.txt Fix struct tags for TCPService enterprise meta (#16781) 2023-03-27 16:17:04 +00:00
16789.txt Update normalization of route refs (#16789) 2023-03-28 11:23:49 -04:00
16818.txt Revert "cache: refactor agent cache fetching to prevent unnecessary f… (#16818) (#17046) 2023-04-19 13:17:21 -05:00
16845.txt Resolves issue-16844 - systemd notify by default (#16845) 2023-06-02 10:04:48 -07:00
16871.txt Memdb Txn Commit race condition fix (#16871) 2023-04-12 13:18:01 -04:00
16877.txt Wasm Envoy HTTP extension (#16877) 2023-04-06 14:12:07 -07:00
16889.txt Update list of Envoy versions (#16889) 2023-04-12 17:43:15 -04:00
16916.txt Update HCP bootstrapping to support existing clusters (#16916) 2023-04-27 22:27:39 +02:00
16957.txt Remove deprecated service-defaults upstream behavior. (#16957) 2023-04-11 10:20:33 -05:00
17035.txt Permissive mTLS (#17035) 2023-04-19 14:45:00 -05:00
17038.txt hoststats: add package for collecting host statistics including cpu memory and disk usage (#17038) 2023-05-30 18:43:29 +00:00
17048.txt Avoid decoding nil pointer in map walker (#17048) 2023-04-19 10:23:38 -07:00
17055.txt [API Gateway] Fix use of virtual resolvers in HTTPRoutes (#17055) 2023-05-31 16:58:40 -04:00
17066.txt Remove artificial ACLTokenMaxTTL limit for configuring acl token expiry (#17066) 2023-04-28 10:57:30 -05:00
17075.txt Backport of agent: remove agent cache dependency from service mesh leaf certificate management into release/1.16.x (#17704) 2023-06-13 16:12:43 +00:00
17081.txt Bump raft to 1.5.0 (#17081) 2023-04-21 20:13:55 +01:00
17086.txt Add ACLs Enabled field to consul agent startup status message (#17086) 2023-05-16 13:47:02 -05:00
17115.txt APIGW: Update how status conditions for certificates are handled (#17115) 2023-04-27 15:54:44 +00:00
17138.txt enable auto-tidy expired issuers in vault (as CA) 2023-05-03 20:30:37 +00:00
17160.txt Fix a bug that wrongly trims domains when there is an overlap with DC 1.16.x (#18164) 2023-07-18 10:03:41 -04:00
17171.txt agent: prevent very old servers re-joining a cluster with stale data (#17171) 2023-05-15 04:05:47 -07:00
17179.txt peering: ensure that merged central configs of peered upstreams for partitioned downstreams work (#17179) 2023-04-28 12:36:08 -05:00
17183.txt Permissive mTLS: Config entry filtering and CLI warnings (#17183) 2023-04-28 12:51:36 -05:00
17185.txt fix panic in `injectSANMatcher` when `tlsContext` is `nil` (#17185) 2023-04-28 16:27:57 -04:00
17231.txt Only synthesize anonymous token in primary DC (#17231) 2023-05-23 09:38:04 -05:00
17235.txt Fix issue with peer stream node cleanup. (#17235) 2023-05-08 13:13:25 -05:00
17236.txt snapshot: some improvments to the snapshot process (#17236) 2023-05-09 15:28:52 -04:00
17240.txt security: update go version to 1.20.4 (#17240) 2023-05-08 11:57:11 -06:00
17241.txt Fix multiple issues related to proxycfg health queries. (#17241) 2023-05-09 12:37:58 -05:00
17270.txt grpc: ensure grpc resolver correctly uses lan/wan addresses on servers (#17270) 2023-05-11 11:08:57 -05:00
17327.txt Rename hcp-metrics-collector to consul-telemetry-collector (#17327) 2023-05-16 14:36:05 -04:00
17415.txt Disable remote proxy patching except AWS Lambda (#17415) 2023-05-23 11:55:06 +00:00
17424.txt Fix ACL check on health endpoint (#17424) 2023-05-24 16:35:55 -05:00
17426.txt [OSS] gRPC Blocking Queries (#17426) 2023-05-23 17:29:10 -04:00
17452.txt [NET-3092] JWT Verify claims handling (#17452) 2023-05-30 13:38:33 -04:00
17456.txt Fix namespaced peer service updates / deletes. (#17456) 2023-05-24 16:32:45 -05:00
17460.txt HCP Telemetry Feature (#17460) 2023-05-29 16:11:08 -04:00
17483.txt backport of commit 38a42074efae2ba85663f696a971fdd1cc334681 (#17702) 2023-06-13 14:45:44 +00:00
17487.txt Add `builtin/property-override` Envoy Extension (#17487) 2023-05-26 19:52:09 +00:00
17495.txt Add `builtin/ext-authz` Envoy Extension (#17495) 2023-05-26 12:22:54 -07:00
17505.txt Enable Network filters for Wasm Envoy Extension (#17505) 2023-05-30 07:17:33 -07:00
17513.txt build(deps): update UBI base image to 9.2 (#17513) 2023-05-30 12:48:13 -04:00
17525.txt Accept ap, datacenter, and namespace query params (#17525) 2023-05-31 11:50:24 -04:00
17546.txt backport of commit 6fc8624ccfb8eb0318726d5ed81546481f250cbc (#17632) 2023-06-09 02:50:07 +00:00
17565.txt Backport of feature - [NET - 4005] - [Supportability] Reloadable Configuration - enable_debug into release/1.16.x (#17969) 2023-06-30 18:40:20 +05:30
17566.txt Fix up case where subscription is terminated due to ACLs changing or a snapshot restore occurring (#17566) 2023-06-05 13:10:17 -04:00
17577.txt Fix metric names in Consul agent telemetry docs (#17577) 2023-06-06 14:42:30 -04:00
17581.txt Fix subscribing/fetching objects not in the default partition (#17581) 2023-06-06 09:09:33 -04:00
17582.txt Backport of [NET-3865] [Supportability] Additional Information in the output of 'consul operator raft list-peers' into release/1.16.x (#17738) 2023-06-21 11:26:48 +05:30
17596.txt Backport of [NET-4107][Supportability] Log Level set to TRACE and duration set to 5m for consul-debug into release/1.16.x (#17728) 2023-06-20 13:48:33 -07:00
17609.txt Backport of [API Gateway] Fix trust domain for external peered services in synthesis code into release/1.16.x (#17616) 2023-06-08 18:11:44 +00:00
17631.txt Backport of [API Gateway] Fix rate limiting for API gateways into release/1.16.x (#17635) 2023-06-09 12:40:03 +00:00
17719.txt Backport of Bump Alpine to 3.18 into release/1.16.x (#17725) 2023-06-14 01:17:02 +00:00
17739.txt Backport of fixes #17732 - AccessorID in request body should be optional when updating ACL token into release/1.16.x (#17833) 2023-06-21 18:53:18 +00:00
17754.txt Backport of Displays Consul version of each nodes in UI nodes section into release/1.16.x (#18113) 2023-07-17 17:27:50 +00:00
17755.txt Backport of Stop referenced jwt providers from being deleted into release/1.16.x (#17789) 2023-06-16 11:03:16 -04:00
17757.txt backport of commit 03702a8e7391719bd71a1c0b199b0dde8ad9155f (#17768) 2023-06-15 17:13:33 +00:00
17759.txt Backport of Property Override validation improvements into release/1.16.x (#17778) 2023-06-15 18:20:16 +00:00
17775.txt Backport of Fix issue with streaming service health watches. into release/1.16.x (#17776) 2023-06-15 18:06:09 +00:00
17780.txt Backport of watch: support -filter for consul watch: checks, services, nodes, service into release/1.16.x (#17965) 2023-06-30 12:59:28 -07:00
17846.txt Backport of Fixes Secondary ConnectCA update into release/1.16.x (#17954) 2023-06-29 14:43:21 +00:00
17885.txt Backport of Passes configured role name to Vault for AWS auth in Connect CA into release/1.16.x (#18099) 2023-07-12 15:43:36 +00:00
17888.txt Backport of Add emit_tags_as_labels to envoy bootstrap config when using Consul Telemetry Collector into release/1.16.x (#17901) 2023-06-27 16:51:00 +00:00
17894.txt backport of commit fe5c145cddd89da804d0de7d19bdc5d0d276df3b (#18010) 2023-07-05 14:50:59 +00:00
17911.txt Backport of Ensure RSA keys are at least 2048 bits in length into release/1.16.x (#17935) 2023-06-28 17:36:38 +00:00
17939.txt Backport of feat: include nodes count in operator usage endpoint and cli command into release/1.16.x (#18012) 2023-07-05 15:37:51 +00:00
17978.txt Expose JWKS cluster config through JWTProviderConfigEntry (#17978) (#18002) 2023-07-04 09:53:12 -04:00
18011.txt Backport of [OSS] Improve Gateway Test Coverage of Catalog Health into release/1.16.x (#18014) 2023-07-05 15:36:32 -04:00
18024.txt Backport of [OSS] Fix initial_fetch_timeout to wait for all xDS resources into release/1.16.x (#18065) 2023-07-10 21:27:56 +00:00
18068.txt Backport of [NET-4703] Prevent partial application of Envoy extensions into release/1.16.x (#18332) 2023-07-31 19:37:54 +00:00
18080.txt Backport of Fix a couple typos in Agent Telemetry Metrics docs into release/1.16.x (#18084) 2023-07-11 20:33:39 +00:00
18112.txt Backport of Fix bug with Vault CA provider into release/1.16.x (#18161) 2023-07-17 18:46:33 +00:00
18140.txt Backport of [CC-5718] Remove HCP token requirement during bootstrap into release/1.16.x (#18229) 2023-07-21 17:53:53 +00:00
18150.txt Backport of Explicitly enable WebSocket upgrades into release/1.16.x (#18211) 2023-07-20 14:57:13 -07:00
18184.txt Backport of [NET-3700] Backfill changelog entry for c2bbe67 and 7402d06 into release/1.16.x (#18260) 2023-07-24 19:09:16 +00:00
18186.txt Backport of [NET-4865] Bump golang.org/x/net to 0.12.0 into release/1.16.x (#18189) 2023-07-19 12:22:18 -04:00
18190.txt Backport of [NET-4865] security: Update Go version to 1.20.6 into release/1.16.x (#18195) 2023-07-19 21:57:40 +00:00
18223.txt Backport of member cli: add -filter expression to flags into release/1.16.x (#18276) 2023-07-25 14:57:08 -04:00
18291.txt Backport of NET-5049: subscribe to bound-api-gateway only after receiving api-gateway into release/1.16.x (#18295) 2023-07-26 20:18:00 +00:00
18303.txt [NET-4904] Update list of Envoy versions on 1.16.x (#18303) 2023-07-27 08:43:11 -07:00
18319.txt Backport of [CC-5719] Add support for builtin global-read-only policy into release/1.16.x (#18345) 2023-08-01 17:37:13 +00:00
18325.txt Backport of Stop JWT provider from being written in non default namespace into release/1.16.x (#18331) 2023-07-31 13:31:52 +00:00
_619.txt Create _619.txt 2020-10-09 10:51:37 -04:00
_666.txt Add a paramter in state store methods to indicate whether a resource insertion is from a snapshot restoration (#9156) 2020-11-11 11:21:42 -05:00
_683.txt Add changelog entry for namespace licensing fix (#9203) 2020-11-16 15:45:55 -05:00
_745.txt Add changelog entry for change to the temporary client license duration (#9642) 2021-01-26 16:15:05 -05:00
_795.txt Add component name to entry 2021-04-14 19:41:04 -04:00
_855.txt Add changelog for enterprise change 2021-04-14 11:50:15 -04:00
_907.txt Add changelog entry for network area timeout updates (#10241) 2021-05-13 15:05:38 -06:00
_917.txt Add changelog 2021-05-20 12:57:15 -04:00
_923.txt changelog: add entry for network areas WAN config fix 2021-05-26 17:49:19 -04:00
_938.txt Add license inspect command documentation and changelog (#10351) 2021-06-04 14:33:13 -04:00
_1085.txt Add changelog entry 2021-08-25 19:46:21 -06:00
_1093.txt Add changelog entry 2021-08-25 19:46:21 -06:00
_1200.txt add changelog entry for enterprise fix (#11226) 2021-10-05 14:44:53 -05:00
_1238.txt Add changelog entry 2021-11-11 16:09:00 -05:00
_1292.txt add changelog entry (#11494) 2021-11-04 16:52:54 -05:00
_1321.txt changelog: entry for enterprise licensing bug fix (#11551) 2021-11-11 13:39:05 +00:00
_1328.txt changelog: entry for snapshot agent `license_path` bug (#11561) 2021-11-16 23:07:14 +00:00
_1330.txt changelog sync (#11565) 2021-11-12 16:10:36 -06:00
_1368.txt fix changelog file name (#11710) 2021-12-02 11:41:08 -05:00
_1424.txt [sync ent] increase segment max limit to 4*64, make configurable (#1424) (#11795) 2021-12-09 15:36:11 -08:00
_1502.txt update changelog (#12128) 2022-01-19 17:28:53 -06:00
_1563.txt add changelog entry for enterprise only change (#12425) 2022-02-23 14:23:48 -06:00
_1595.txt update changelog (#12495) 2022-03-02 16:44:13 -06:00
_1679.txt peering: initial sync (#12842) 2022-04-21 17:34:40 -05:00
_1728.txt add changelog for enterprise fix (#12761) 2022-04-12 16:01:35 -04:00
_1737.txt add changelog for enterprise bug fix (#12772) 2022-04-13 10:42:32 -04:00
_2271.txt Add support for S3 path based addressing 2022-08-29 14:46:02 -06:00
_3550.txt Add changelog (#15327) 2022-11-14 11:23:02 -05:00
_3556.txt Add changelog for snapshot agent updates (#15516) 2022-11-22 06:11:46 -08:00
_3557.txt Consul 1.14 post-release updates (#15382) 2022-11-15 14:22:43 -06:00
_3729.txt [OSS] Add boilerplate for proto files implementing BlockableQuery (#15554) 2022-11-25 15:46:56 -05:00
_3783.txt added changelog for enterprise only change (#15621) 2022-11-30 11:39:20 -08:00
_3846.txt docs: update changelog from 1.14.3, 1.13.5, 1.12.8 (#15804) 2022-12-14 18:47:35 -05:00
_4696.txt Fix issue with trust bundle read ACL check. (#16630) 2023-03-14 12:24:33 -05:00
_4734.txt add order by locality failover to Consul enterprise (#16791) 2023-03-30 10:08:38 -04:00
_4821.txt changes to support new PQ enterprise fields (#16793) 2023-03-27 15:40:49 -07:00
_4832.txt Change partition for peers in discovery chain targets (#16769) 2023-03-24 15:40:19 -05:00
_5517.txt backport of commit 845265dbce244db407dea9c81fc4a76813c411be (#17709) 2023-06-13 19:34:31 +00:00
_5614.txt backport of commit 38a42074efae2ba85663f696a971fdd1cc334681 (#17702) 2023-06-13 14:45:44 +00:00
_5669.txt Backport of backport ent changes to oss into release/1.16.x (#17617) 2023-06-08 16:45:28 +00:00
_5740.txt Backport of Add writeAuditRPCEvent to agent_oss into release/1.16.x (#17608) 2023-06-07 19:01:05 -04:00
_5750.txt Backport of Add writeAuditRPCEvent to agent_oss into release/1.16.x (#17608) 2023-06-07 19:01:05 -04:00
_5805.txt backport of commit beef7233cb7483c8ba19140e66fcbec187620c80 (#17629) 2023-06-09 00:06:35 +00:00
_8621.txt Adds changelog entry for snapshot agent improvement (#8622) 2020-09-04 14:07:57 -06:00
_8825.txt Add streaming changelog file 2020-10-13 18:16:33 -04:00
_8984.txt changelog: update to hashicorp/sentinel@v0.16.0 in Enterprise (#8984) 2020-10-26 12:32:44 -04:00
_12855.txt changelog: snapshot-agent acl token fix for CLI and ENV 2022-04-25 16:46:55 -04:00
_16677.txt Fix route subscription when using namespaces (#16677) 2023-03-20 12:42:30 -04:00
_releases-111.txt changelog: add note about packaging EULA and ToE alongside Enterprise binaries 2021-06-16 16:58:08 -04:00
changelog.tmpl ci: combine 'enhancement' entry type with 'improvement' (#12376) 2022-02-17 19:21:47 -08:00
note.tmpl changelog: fixup note.tmpl syntax 2020-10-09 22:44:51 -04:00