open-consul/.changelog
hc-github-team-consul-core d5da2485a4
Backport of Include RequestTimeout in marshal/unmarshal of ServiceResolverConfigE… into release/1.16.x (#19034)
* Net-2712/resource hcl parsing (#18250)

* Initial protohcl implementation

Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
Co-authored-by: Daniel Upton <daniel@floppy.co>

* resourcehcl: implement resource decoding on top of protohcl

Co-authored-by: Daniel Upton <daniel@floppy.co>

* fix: resolve ci failures

* test: add additional unmarshalling tests

* refactor: update function test to clean protohcl package imports

---------

Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
Co-authored-by: Daniel Upton <daniel@floppy.co>

* read endpoint (#18268)

implement http read endpoint to expose resource grpc service read method

* Net-2707/list resource endpoint (#18444)

feat: list resources endpoint

* Fix incorrect yaml in examples (#18463)

* NET-5187: Upgrade test timeout due to log producer errors (#18461)

Stop log producer before restarting container

* [NET-4799] [OSS] xdsv2: listeners L4 support for connect proxies (#18436)

* refactor to avoid future import cycles

* resource: Make resource list tenancy aware (#18475)

* [COMPLIANCE] License update (#18479)

Update BUSL LICENSE to include licensed product and version.

Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>

* docs: specify manual server metadata intervention (#18477)

* docs: Update OpenShift compatibility  (#18478)

Update compatibility.mdx

* resource: Make resource delete tenancy aware (#18476)

resource: Make resource delete tenancy awarae

* Add license-checker action that fails when any backported file contains BUSL header (#18485)

* Add license-checker action that fails when any backported file contains BUSL header

* Quote echoed variable to retain line breaks

* Add ticket to reference for more details

* docs: Update K8s TGW tutorial to reliably obtain role ID (#18474)

The `grep` command used to obtain the ID for the terminating gateway
role is not reliable in all scenarios. For example, if there is a
similarly named role, the command may return the wrong role ID for the
active terminating gateway instance.

This commit updates the command to use jq to obtain the role ID. If
multiple roles are found, jq will raise an error informing the user
that it cannot reliably determine the role ID.

* NET-5371 License checker pt2 (#18491)

* Update grep command to work on ubuntu

* Run license checker when new commits are pushed to PR

* README - Update KV use case to Dynamic App Configuration  (#18301)

* Update README.md
* Update kv.mdx
* Add BUSL badge

* README - re-order badges and update hub link (#18498)

Update README.md

* [NET-5163] Support locality testing in consul-container (#18484)

* Support locality testing in consul-container

Support including locality in client sidecar config.

Also align test config structs with Ent to avoid future conflicts.

* Refactor consul-container fortio helpers

Refactor fortio test helpers to separate HTTP retries from waiting on
fortio result changes due to e.g. service startup and failovers.

* NET-4853 - xds v2 - implement base connect proxy functionality for clusters (#18499)

* Fix HCL (#18513)

* Fix HCL

* Update create-sameness-groups.mdx

* NET-4932 - xds v2 - implement base connect proxy functionality for endpoints (#18500)

* NET-4853 - xds v2 - implement base connect proxy functionality for clusters

* NET-4853 - xds v2 - implement base connect proxy functionality for clusters

* NET-4932 - xds v2 - implement base connect proxy functionality for endpoints

* Update endpoints_test.go

* gofmt

* Update naming.go

* Support custom watches on controller (#18439)

* Support custom watches on controller
* refactor mapper methods

* NET-4858 - xds v2 - implement base connect proxy functionality for routes (#18501)

* NET-4853 - xds v2 - implement base connect proxy functionality for clusters

* NET-4853 - xds v2 - implement base connect proxy functionality for clusters

* NET-4932 - xds v2 - implement base connect proxy functionality for endpoints

* Update endpoints_test.go

* gofmt

* NET-4858 - Make connect proxy route tests pass using xds v2

* Update endpoints_test.go

* Update naming.go

* use alsoRunTestForV2

* remove unused makeAddress

* gofmt

* fixing clusters

* bimapper: allow to untrack links and support reference or id (#18451)

* bimapper: fix data race (#18519)

* CI Split integration tests to run nightly and every PR (#18518)

* CI Split integration tests to run nightly and every PR

* Checkout release branch for nightly test

* Fix broken links caught in weekly report (#18522)

* fix broken link caught in weekly report

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Create nightly test-integration for consul release branch (#18530)

* Create nightly test-integration for consul release branch

* test

* fix

* docs: Fix spelling errors across various pages on the site (#18533)

This commit fixes numerous spelling errors across the site and also
removes unnecessary whitespace that was present in the edited files.

* Make proto-public license MPL (#18531)

* Make proto-public license MPL

* Add proto-public dir to exclusion list in .copywrite.hcl

* NET-4943 - Implement ProxyTracker (#18535)

* resource: Make resource watchlist tenancy aware (#18539)

* Reduce required type arguments for DecodedResource (#18540)

* OSS -> CE (community edition) changes (#18517)

* CI: fix envoy versions in CI of release branch (#18538)

* CI: fix envoy versions in CI of release branch

* - remove steps sds for 1.15 nightly run
- checkout the release branch

* add default name

* fix

* Update go-tests.yml

* fix checkout code

* add comments and revert schedule

* catalog: add failover mode enum validation (#18545)

* mesh: add validation for the new pbmesh resources (#18410)

Adds validation for HTTPRoute, GRPCRoute, TCPRoute, DestinationPolicy, and ComputedRoutes.

* xds controller: resolve ServiceEndpoints references in ProxyStateTemp… (#18544)

xds controller: resolve ServiceEndpoints references in ProxyStateTemplate

* mesh: adding type aliases for mesh resource usage (#18448)

Introduces some simple type aliases for DecodedResource[*X] wrappers for each type which cut down on the verbosity

* Update trust bundle into proxy-state-template (#18550)

* catalog: validating Protocol and Health enums on Service, Workload, and ServiceEndpoints (#18554)

* chore: fix missing/incorrect license headers (#18555)

* fix for , non presence of consul-version meta (#18464)

* fix for #18406 , non presence of consul-version meta

* removed redundant checks

* updated mock-api to mimic api response for synthetic nodes

* added test to test getDistinctConsulVersions method with synthetic-node case

* updated typo in comments

* added change log

* feat: add experiments flag to testserver sdk (#18541)

* bug: prevent go routine leakage due to existing DeferCheck (#18558)

* bug: prevent go routine leakage due to existing DeferCheck

* add changelog

* NET-5382 & PLAT-1159: Do not trigger workflow if only doc files are in commit history (#18528)

NET-5382: Do not run workflow runs if at least one path matches

* UI: community verbiage (#18560)

* chore: update community verbiage

* chore: add changelog entry

* Fix Windows FIPS Build (#18357)

* Fix Windows FIPS Build

* create new file for windows arm

* removed build tag

* fix buidl tags

* fix multiple go build

* CE port of enterprise extension (#18572)

CE commit

* resource: Make resource listbyowner tenancy aware (#18566)

* NET-5147: Added placeholder structs for JWT functionality (#18575)

* Added placeholder structs for JWT functionality

* Added watches for CE vs ENT

* Add license header

* Undo plumbing work

* Add context arg

* resource: Make resource writestatus tenancy aware (#18577)

* NET-5338 - NET-5338 - Run a v2 mode xds server (#18579)

* NET-5338 - NET-5338 - Run a v2 mode xds server

* fix linting

* CI: send slack notification on failed nightly job (#18578)

* CE commit (#18583)

* Fix broken link on sameness group page (#18511)

fix broken link

* Fix typo in permissive mTLS docs (#18551)

Update onboarding-tproxy-mode.mdx

* Set concurrency for workflows (#18567)

* Set concurrency for workflows

* test: run automated tests against Vault 1.11 - 1.14 (#18590)

Begin to test against Vault 1.14. Drop tests against Vault 1.10.

* Reduce the frequency of metric exports to minutely (#18584)

* NET-4944 - wire up controllers with proxy tracker (#18603)

Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com>

* Watch the ProxyTracker from xDS controller (#18611)

* Distinguish v2 catalog Protocol unset from default (#18612)

Even though we intend to default to TCP when this field is not
explicitly provided, uncluding an `UNSPECIFIED` default enum value allows us
to create inheritance chains, e.g. service to workload.

* Added OpenTelemetry Access Logging Envoy extension (#18336)

* [HCP Telemetry] Move first TelemetryConfig Fetch into the TelemetryConfigProvider (#18318)

* Add Enabler interface to turn sink on/off

* Use h for hcpProviderImpl vars, fix PR feeback and fix errors

* Keep nil check in exporter and fix tests

* Clarify comment and fix function name

* Use disable instead of enable

* Fix errors nit in otlp_transform

* Add test for refreshInterval of updateConfig

* Add disabled field in MetricsConfig struct

* Fix PR feedback: improve comment and remove double colons

* Fix deps test which requires a maybe

* Update hcp-sdk-go to v0.61.0

* use disabled flag in telemetry_config.go

* Handle 4XX errors in telemetry_provider

* Fix deps test

* Check 4XX instead

* Run make go-mod-tidy

* update comments and docs about running envoy integration tests with the ENVOY_VERSION set. (#18614)

update ENVOY_VERSION and documentation of it used in the bats envoy tests.

Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com>

* delete all v2 resources type when deleting a namespace (CE) (#18621)

* add namespace scope to ServiceV1Alpha1Type

* add CE portion of namespace deletion

* resource: Allow nil tenancy (#18618)

* PLAT-1192 - Run CI on smaller instances (#18624)

Use smaller runners

* NET-3181 - Allow log file naming like Nomad (#18617)

* fixes file name for consul

* added log file

* added tests for rename method

* Add the plumbing for APIGW JWT work (#18609)

* Add the plumbing for APIGW JWT work

* Remove unneeded import

* Add deep equal function for HTTPMatch

* Added plumbing for status conditions

* Remove unneeded comment

* Fix comments

* Add calls in xds listener for apigateway to setup listener jwt auth

* docs: admin partition and DNS clarification (#18613)

* fix: make UNSPECIFIED protocol pass validation (#18634)

We explicitly enumerate the allowed protocols in validation, so this
change is necessary to use the new enum value.

Also add tests for enum validators to ensure they stay aligned to
protos unless we explicitly want them to diverge.

* NET 1594 - Snapshot Agent Filename Should Include Consul Version / Datacenter (#18625)

* init

* tests added and few fixes

* revert arg message

* changelog added

* removed var declaration

* fix CI

* fix test

* added node name and status

* updated save.mdx

* added example

* fix tense

* fix description

* Net 3181 consul gh issue 15709 allow log file naming like nomad - fix bug (#18631)

* fixes file name for consul

* added log file

* added tests for rename method

* append instead of trunc

* fix file truncate issue

* added changelog

* fix for build destros ci

* removed changelog

* solaris

* resource: Require scope for resource registration (#18635)

* [NET-4958] Fix issue where envoy endpoints would fail to populate after snapshot restore (#18636)

Fix issue where agentless endpoints would fail to populate after snapshot restore.

Fixes an issue that was introduced in #17775. This issue happens because
a long-lived pointer to the state store is held, which is unsafe to do.
Snapshot restorations will swap out this state store, meaning that the
proxycfg watches would break for agentless.

* Add extra logging for mesh health endpoints. (#18647)

* feat: Change global-read-only policy to non editable (#18602)

* remove stray FIPS file (#18651)

* Add known issue notice for #18636. (#18650)

* fix: remove Intention test with latency to make consul-enterprise rep… (#18654)

fix: remove Intention test with latency to make consul-enterprise repo tests work

* fix: add telemetry bind socket to proxyConfiguration proto (#18652)

* feat: copy edits for built-in policy alert (#18655)

* test: fix snapshot save w/ append test for ENT (#18656)

* Net 2714/xw cli read command (#18462)

enable `consul resource read` command in cli

* change log for audit log (#18668)

* change log for audit log

* fix file name

* breaking change

* Add TCP+TLS Healthchecks (#18381)

* Begin adding TCPUseTLS

* More TCP with TLS plumbing

* Making forward progress

* Keep on adding TCP+TLS support for healthchecks

* Removed too many lines

* Unit tests for TCP+TLS

* Update tlsutil/config.go

Co-authored-by: Samantha <hello@entropy.cat>

* Working on the tcp+tls unit test

* Updated the runtime integration tests

* Progress

* Revert this file back to HEAD

* Remove debugging lines

* Implement TLS enabled TCP socket server and make a successful TCP+TLS healthcheck on it

* Update docs

* Update agent/agent_test.go

Co-authored-by: Samantha <hello@entropy.cat>

* Update website/content/docs/ecs/configuration-reference.mdx

Co-authored-by: Samantha <hello@entropy.cat>

* Update website/content/docs/ecs/configuration-reference.mdx

Co-authored-by: Samantha <hello@entropy.cat>

* Update agent/checks/check.go

Co-authored-by: Samantha <hello@entropy.cat>

* Address comments

* Remove extraneous bracket

* Update agent/agent_test.go

Co-authored-by: Samantha <hello@entropy.cat>

* Update agent/agent_test.go

Co-authored-by: Samantha <hello@entropy.cat>

* Update website/content/docs/ecs/configuration-reference.mdx

Co-authored-by: Samantha <hello@entropy.cat>

* Update the mockTLSServer

* Remove trailing newline

* Address comments

* Fix merge problem

* Add changelog entry

---------

Co-authored-by: Samantha <hello@entropy.cat>

* Fix windows Ent runner (#18683)

* fix windows image for enterprise

* added quotesT

* Removed nodename and status from consul snapshot save -append-filename command and using leader version in version (#18680)

* init

* fix tests

* fix tests lint

* fix api call inside dc

* updated doc

* address comments

* update guide to reflect tenancy and scope (#18687)

* update guide to reflect tenancy and scope

* Apply suggestions from code review

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* update ACLHooks signature

* Update docs/resources/guide.md

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

---------

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* Add support for querying tokens by service name. (#18667)

Add support for querying tokens by service name

The consul-k8s endpoints controller has a workflow where it fetches all tokens.
This is not performant for large clusters, where there may be a sizable number
of tokens. This commit attempts to alleviate that problem and introduces a new
way to query by the token's service name.

* restore common-topo peering integration tests, but nightly [NET-5476] (#18673)

* dataplane: Allow getting bootstrap parameters when using V2 APIs (#18504)

This PR enables the GetEnvoyBootstrapParams endpoint to construct envoy bootstrap parameters from v2 catalog and mesh resources.

   * Make bootstrap request and response parameters less specific to services so that we can re-use them for workloads or service instances.
   * Remove ServiceKind from bootstrap params response. This value was unused previously and is not needed for V2.
   * Make access logs generation generic so that we can generate them using v1 or v2 resources.

* switch all client nodes in dc2 to dataplane [NET-4299] (#18608)

* Reformat proxy docs refresh (#18623)

* first commit; reformat PD conf entry

* updated proxies overview page

* added Deploy SM proxy usage and removed reg index

* moved sidecar proxy usage to main proxy folder

* recast sidecar reg page as Deploy sidecar services

* fix typos

* recast SM reg as conf reference- set the sidebar

* add redirects

* fix links

* add PD conf entry usage to appropro pages

* edits to proxy conf ref

* fix links on index page

* example command to write PD conf entry

* updated links to old SM proxy reg page

* updated links to sidecar service reg page

* tryna fix front matter issues

* Apply suggestions from code review

Co-authored-by: Ronald  <roncodingenthusiast@users.noreply.github.com>

* added paragraph about SM proxies to overivew

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Ronald <roncodingenthusiast@users.noreply.github.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* sidecar-proxy controller: L4 controller with explicit upstreams (NET-3988) (#18352)

* This controller generates and saves ProxyStateTemplate for sidecar proxies.
* It currently supports single-port L4 ports only.
* It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
* It will update the status of the pbmesh.Upstreams resource if anything is invalid.
* This commit also changes service endpoints to include workload identity. This made the implementation a bit easier as we don't need to look up as many workloads and instead rely on endpoints data.

* test: update sidecarproxy/builder golden tests to use determinstic golden data (#18703)

* [APIGW] NET-5017 JWT Cleanup/Status Conditions (#18700)

* Fixes issues in setting status

* Update golden files for changes to xds generation to not use deprecated
methods

* Fixed default for validation of JWT for route

* Added changelog for jwt features (#18709)

* fix: NET-1521 show latest config in /v1/agent/self (#18681)

* fix: NET-1521 show latest config in /v1/agent/self

* Using larger machine for Enterprise (#18713)

using 4x large for ent

* [NET-5325] ACL templated policies support in tokens and roles (#18708)

* [NET-5325] ACL templated policies support in tokens and roles
- Add API support for creating tokens/roles with templated-policies
- Add CLI support for creating tokens/roles with templated-policies

* adding changelog

* Adds PassiveHealthCheck Fields to ServiceDefaults and IngressGateway (#18532)

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Instantiate secure resource service client after the grpc server (#18712)

* ENT port: test-integ/peering: peer through mesh gateway [NET-4609] (#18605)

Co-authored-by: Matt Keeler <mjkeeler7@gmail.com>

* [CC-6039] Update builtin policy descriptions (#18705)

* Net-2713/resource apply command (#18610)

* feat: implement apply command

* fix: resolve lint issues

* refactor: use fixed types

* fix: ci lint failures after main rebase

* NET-5530 Support response header modifiers on http-route config entry (#18646)

* Add response header filters to http-route config entry definitions

* Map response header filters from config entry when constructing route destination

* Support response header modifiers at the service level as well

* Update protobuf definitions

* Update existing unit tests

* Add response filters to route consolidation logic

* Make existing unit tests more robust

* Add missing docstring

* Add changelog entry

* Add response filter modifiers to existing integration test

* Add more robust testing for response header modifiers in the discovery chain

* Add more robust testing for request header modifiers in the discovery chain

* Modify test to verify that service filter modifiers take precedence over rule filter modifiers

* fix: emit consul version metric on a regular interval (#18724)

* [NET-5330] Support templated policies in Binding rules (#18719)

* [NET-5330] Support templated policies in Binding rules

* changelog for templated policy support in binding rules

* NET-5530 Generate deep-copy code (#18730)

* Generate deep-copy code

* Undo license header removal

* sidecar-proxy controller: Add support for transparent proxy (NET-5069) (#18458)

This commit adds support for transparent proxy to the sidecar proxy controller. As we do not yet support inferring destinations from intentions, this assumes that all services in the cluster are destinations.

* Prefix sidecar proxy test files with source and destination. (#18620)

* mesh-controller: handle L4 protocols for a proxy without upstreams

* sidecar-controller: Support explicit destinations for L4 protocols and single ports.

* This controller generates and saves ProxyStateTemplate for sidecar proxies.
* It currently supports single-port L4 ports only.
* It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
* It will update the status of the pbmesh.Upstreams resource if anything is invalid.

* endpoints-controller: add workload identity to the service endpoints resource

* small fixes

* review comments

* Address PR comments

* sidecar-proxy controller: Add support for transparent proxy

This currently does not support inferring destinations from intentions.

* PR review comments

* mesh-controller: handle L4 protocols for a proxy without upstreams

* sidecar-controller: Support explicit destinations for L4 protocols and single ports.

* This controller generates and saves ProxyStateTemplate for sidecar proxies.
* It currently supports single-port L4 ports only.
* It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
* It will update the status of the pbmesh.Upstreams resource if anything is invalid.

* endpoints-controller: add workload identity to the service endpoints resource

* small fixes

* review comments

* Make sure endpoint refs route to mesh port instead of an app port

* Address PR comments

* fixing copyright

* tidy imports

* sidecar-proxy controller: Add support for transparent proxy

This currently does not support inferring destinations from intentions.

* tidy imports

* add copyright headers

* Prefix sidecar proxy test files with source and destination.

* Update controller_test.go

---------

Co-authored-by: Iryna Shustava <iryna@hashicorp.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com>

* k8s: Update audit-logging docs to include K8s examples (#18721)

Update audit-logging.mdx

* Fix windows integrations tests machine size (#18736)

fix windows integrations tests machine size

* Increase timeout for integration test windows. (#18737)

increase timeout

* Net-4292/list command (#18649)

* feat: implement list command

* refactor: apply command file parsing

* Added logs for debugging (#18740)

* added logs

* added echo

* removed pull request

* xds: update golden tests to be deterministic (#18707)

* Run copyright after running deep-copy as part of the Makefile/CI (#18741)

* execute copyright headers after performing deep-copy generation.

* fix copyright install

* Apply suggestions from code review

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* Apply suggestions from code review

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* rename steps to match codegen naming

* remove copywrite install category

---------

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* [NET-5333] Add api to read/list and preview templated policies (#18748)

* NET-5132 - Configure multiport routing for connect proxies in TProxy mode (#18606)

* mesh-controller: handle L4 protocols for a proxy without upstreams

* sidecar-controller: Support explicit destinations for L4 protocols and single ports.

* This controller generates and saves ProxyStateTemplate for sidecar proxies.
* It currently supports single-port L4 ports only.
* It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
* It will update the status of the pbmesh.Upstreams resource if anything is invalid.

* endpoints-controller: add workload identity to the service endpoints resource

* small fixes

* review comments

* Address PR comments

* sidecar-proxy controller: Add support for transparent proxy

This currently does not support inferring destinations from intentions.

* PR review comments

* mesh-controller: handle L4 protocols for a proxy without upstreams

* sidecar-controller: Support explicit destinations for L4 protocols and single ports.

* This controller generates and saves ProxyStateTemplate for sidecar proxies.
* It currently supports single-port L4 ports only.
* It keeps a cache of all destinations to make it easier to compute and retrieve destinations.
* It will update the status of the pbmesh.Upstreams resource if anything is invalid.

* endpoints-controller: add workload identity to the service endpoints resource

* small fixes

* review comments

* Make sure endpoint refs route to mesh port instead of an app port

* Address PR comments

* fixing copyright

* tidy imports

* sidecar-proxy controller: Add support for transparent proxy

This currently does not support inferring destinations from intentions.

* tidy imports

* add copyright headers

* Prefix sidecar proxy test files with source and destination.

* Update controller_test.go

* NET-5132 - Configure multiport routing for connect proxies in TProxy mode

* formatting golden files

* reverting golden files and adding changes in manually.  build implicit destinations still has some issues.

* fixing files that were incorrectly repeating the outbound listener

* PR comments

* extract AlpnProtocol naming convention to getAlpnProtocolFromPortName(portName)

* removing address level filtering.

* adding license to resources_test.go

---------

Co-authored-by: Iryna Shustava <iryna@hashicorp.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com>

* added time stamps (#18757)

* fix: write endpoint errors out gracefully (#18743)

* [NET-5574] Update Go version to 1.20.8 (#18742)

Update Go version to 1.20.8

This resolves several CVEs (see changelog entry).

* Add Envoy golden test for OTEL access logging extension (#18760)

* mesh: create new routes-controller to reconcile xRoute types into a ComputedRoutes resource (#18460)

This new controller produces an intermediate output (ComputedRoutes) that is meant to summarize all relevant xRoutes and related mesh configuration in an easier-to-use format for downstream use to construct the ProxyStateTemplate.

It also applies status updates to the xRoute resource types to indicate that they are themselves semantically valid inputs.

* xds controller: setup watches for and compute leaf cert references in ProxyStateTemplate, and wire up leaf cert manager dependency (#18756)

* Refactors the leafcert package to not have a dependency on agent/consul and agent/cache to avoid import cycles. This way the xds controller can just import the leafcert package to use the leafcert manager.

The leaf cert logic in the controller:
* Sets up watches for leaf certs that are referenced in the ProxyStateTemplate (which generates the leaf certs too).
* Gets the leaf cert from the leaf cert cache
* Stores the leaf cert in the ProxyState that's pushed to xds
* For the cert watches, this PR also uses a bimapper + a thin wrapper to map leaf cert events to related ProxyStateTemplates

Since bimapper uses a resource.Reference or resource.ID to map between two resource types, I've created an internal type for a leaf certificate to use for the resource.Reference, since it's not a v2 resource.
The wrapper allows mapping events to resources (as opposed to mapping resources to resources)

The controller tests:
Unit: Ensure that we resolve leaf cert references
Lifecycle: Ensure that when the CA is updated, the leaf cert is as well

Also adds a new spiffe id type, and adds workload identity and workload identity URI to leaf certs. This is so certs are generated with the new workload identity based SPIFFE id.

* Pulls out some leaf cert test helpers into a helpers file so it
can be used in the xds controller tests.
* Wires up leaf cert manager dependency
* Support getting token from proxytracker
* Add workload identity spiffe id type to the authorize and sign functions



---------

Co-authored-by: John Murret <john.murret@hashicorp.com>

* Test: NET-5592 - update Nomad integration testing (#18768)

NET-5592 - update Nomad integration testing

* Add workload identity ACL rules (#18769)

* Windows Integration Test Changes  (#18758)

* some changes to debug

* revert machines

* increased timeout

* added sleep 10 seconds before test start

* chagne envoy version

* removed sleep

* revert timeout

* replace position

* removed date

* Revert "[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437)"

This reverts commit 05604eeec1186a4c8a6156e7519a579171659c1a.

* fix build

* Revert "replace position"

This reverts commit 48e6af46a8daae186c283f30d316b1104906993e.

* Revert "Revert "[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#18437)""

This reverts commit d7c568e2be727b72e6827225782e0e17ac06b74a.

* comment out api gateway http hostnames test

* fix import

* revert integ test run on PR

* Add V2 TCP traffic permissions (#18771)

Add support for TCP traffic permissions

* resource: add helper to normalize inner Reference tenancy during mutate (#18765)

When one resource contains an inner field that is of type *pbresource.Reference we want the
Tenancy to be reasonably defaulted by the following rules:

1. The final values will be limited by the scope of the referenced type.
2. Values will be inferred from the parent's tenancy, and if that is insufficient then using
   the default tenancy for the type's scope.
3. Namespace will only be used from a parent if the reference and the parent share a
   partition, otherwise the default namespace will be used.

Until we tackle peering, this hard codes an assumption of peer name being local. The
logic for defaulting may need adjustment when that is addressed.

* Disable docs change CI skip detection (#18775)

There's currently a bug that causes CI to be skipped on all non-PR
changes. Until that's fixed and we can be certain the check will fail CI
or default to running tests in the case of errors, disabling this check.

* delete command ready (#18679)

* delete command for resource management

* Vault CA provider clean up previous default issuers (#18773)

* Fix snapshot creation issue. (#18783)

The renaming of files from oss -> ce caused incorrect snapshots
to be created due to ce writes now happening prior to ent writes.
When this happens various entities will attempt to be restored
from the snapshot prior to a partition existing and will cause a
panic to occur.

* catalog: service endpoints inherits protocol from service when workload doesn't have one (#18792)

* add fuzz tests to resourcehcl package and fix some panics  (#18798)

* add a simple fuzz test for the resourcehcl package and fix some panics uncovered by the test

* fix default for null values

* Clean up resources in test (#18799)

* Updates gateway-class-config docs to include fields for privileged container port-mapping and Openshift Security Context Constraints

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* Removes errant word in docs that was breaking the build (#18804)

* Fix flaky test (#18805)

* register traffic permission and workload identity types (#18704)

* add workload identity and traffic permission protos

* register new types

* add generated pb code

* fix exports.go path

* add proto newlines

* fix type name

Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>

* address review

* fix protos and add tests

* fix validation constraints

* add tests

---------

Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>

* [NET-5329] use acl templated policy under the hood for node/service identities (#18813)

* [NET-5334] Added CLI commands for templated policies (#18816)

* mesh: Wire ComputedRoutes into the ProxyStateTemplate via the sidecar controller (#18752)

Reworks the sidecar controller to accept ComputedRoutes as an input and use it to generate appropriate ProxyStateTemplate resources containing L4/L7 mesh configuration.

* mesh: call the right mapper (#18818)

* fix templated policy cli output (#18821)

* resource: default peername to "local" for now (#18822)

* Wire up traffic permissions (#18812)

Wire up traffic permissions

* added consul and envoy version constraints (#18726)

* added consul and envoy version constraints

* fixed Destination configuraiton and added tproxy requirement

* Apply suggestions from code review

Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>

---------

Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>

* Default to tcp protocol when workload protocol is unspecified (#18824)

* Retry and timeout test acceptance test (#18791)

* retry and timeout test

* add docker mirrior

* checkpoint

* add in error

* add in delay

* up error rate

* fix status code

* Use embedded strings for templated policies (#18829)

* consul operator raft transfer-leader should send the id (#17107)

Fixes #16955

Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>

* Allow empty data writes for resources (#18819)

* allow nil data writes for resources

* update demo to test valid type with no data

* Fix nondeterministic test (#18828)

* mesh: prevent writing a ComputedRoutes with no ported configs (#18833)

* catalog: Default protocol to tcp in catalog.Service if unspecified (#18832)

* Adjust metrics test (#18837)

* Audit log consul 1.17x changes (#18669)

* audit log consul 1.17x changes

* added some details

* verbose

* Fixes for integration tests windows for ENT (#18839)

* fixes for integration tests

* fix runner size for enterprise

* fix spacing

* fix spacing

* removed branch test run

* fix: provide meaningful error messages and add test (#18772)

* fix: provide meaningful error messages and add test

* fix: return error instead of warning when extra args are provided

* add v2 tenancy bridge Flag and v2 Tenancy Bridge initial implementation (#18830)

* add v2 tenancy bridge and a feature flag for v2 tenancy

* move tenancy bridge v2 under resource package

* docs: Fix typo in description for server_addresses (#18838)

Change 'If not port' to 'If no port'.

Resolves #18553

* grafana: display connected consul-dataplanes (#18842)

* Adding Apigee for ext_authz, minor fix in the default ext_authz docs (#18796)

* adding apigee for ext_authz, minor fix

* adding the Apigee docs to nav

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: Blake Covarrubias <blake.covarrubias@gmail.com>

* addressing feedback

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: Blake Covarrubias <blake.covarrubias@gmail.com>

* catalog: normalize/default/validate tenancy components of FailoverPolicy internal References (#18825)

FailoverPolicy resources contain inner Reference fields. We want to ensure 
that components of those reference Tenancy fields left unspecified are defaulted 
using the tenancy of the enclosing FailoverPolicy resource.

As the underlying helper being used to do the normalization calls the function 
modified in #18822, it also means that the PeerName field will be set to "local" for 
now automatically to avoid "local" != "" issues downstream.

* Fix gateway services cleanup where proxy deregistration happens after service deregistration (#18831)

* Fix gateway services cleanup where proxy deregistration happens after service deregistration

* Add test

* Add changelog

* Fix comment

* Move ACL templated policies to hcl files (#18853)

* mesh: update xds controller to synthesize empty endpoints when no endpoints ref is found (#18835)

* mesh: normalize/default/validate tenancy components of mesh internal References (#18827)

HTTPRoute, GRPCRoute, TCPRoute, and Upstreams resources contain inner
Reference fields. We want to ensure that components of those reference Tenancy
fields left unspecified are defaulted using the tenancy of the enclosing resource.

As the underlying helper being used to do the normalization calls the function
modified in #18822, it also means that the PeerName field will be set to "local" for
now automatically to avoid "local" != "" issues downstream.

* resource: mutate and validate before acls on write (#18868)

* Remove flaky test assertions (#18870)

* mesh: only build tproxy outbound listener once per destination (#18836)

Previously, when using implicit upstreams, we'd build outbound listener per destination instead of one for all destinations. This will result in port conflicts when trying to send this config to envoy.

This PR also makes sure that leaf and root references are always added (before we would only add it if there are inbound non-mesh ports).

Also, black-hole traffic when there are no inbound ports other than mesh

* NET-4519 Collecting journald logs in "consul debug" bundle (#18797)

* debug since

* fix docs

* chagelog added

* fix go mod

* debug test fix

* fix test

* tabs test fix

* Update .changelog/18797.txt

Co-authored-by: Ganesh S <ganesh.seetharaman@hashicorp.com>

---------

Co-authored-by: Ganesh S <ganesh.seetharaman@hashicorp.com>

* CI: lint test-integ (#18875)

* CI: lint test-integ

* fix lint error

* Honor Default Traffic Permissions in V2 (#18886)

wire up v2 default traffic permissions

* docs: Fix HCL, JSON, and YAML syntax errors (#18879)

This commit fixes syntax errors in HCL, JSON, and YAML example
configurations. In some cases, it replaces the code example with the
proper format for the code block.

Also fixes HCL formatting and misc opportunistic updates to codeblock.

Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>

* Fix code block examples on dns-static-lookups.mdx (#18880)

HCL and JSON configuration examples were being displayed in the same
code block. This commit separates the configurations to properly
display them as independent configuration examples.

* docs: Fix Kubernetes CRD example configs (#18878)

Fixes configuration examples for several Consul Kubernetes CRDs. The
CRDs were missing required fields such as `apiVersion`, `metadata`,
and `spec`.

Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>

* docs: Apigee extension backport (#18847)

* commit

* link text edits

* Add operator audit endpoint changes (#18899)

* docs: Remove YAML service registration examples (#18877)

Remove YAML service registration examples and replace them with JSON.
This is because YAML is not a supported configuration format for the
Consul's agent configuration, nor is it supported by the HTTP API.

This commit replaces the YAML examples with JSON and adds additional
JSON examples where they were missing.

* Add otel-access-logging Envoy extension integration test (#18898)

* Add note about service upstream env var dot broken (#18895)

* add note about service upstream env var dot broken

* Apply suggestions from code review

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

---------

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>

* xds: Use downstream protocol when connecting to local app (#18573)

Configure Envoy to use the same HTTP protocol version used by the
downstream caller when forwarding requests to a local application that
is configured with the protocol set to either `http2` or `grpc`.

This allows upstream applications that support both HTTP/1.1 and
HTTP/2 on a single port to receive requests using either protocol. This
is beneficial when the application primarily communicates using HTTP/2,
but also needs to support HTTP/1.1, such as to respond to Kubernetes
HTTP readiness/liveness probes.

Co-authored-by: Derek Menteer <derek.menteer@hashicorp.com>

* resource: ensure resource.AuthorizerContext properly strips the local… (#18908)

resource: ensure resource.AuthorizerContext properly strips the local peer name

* docs: Add complete auth method payloads (#18849)

This commit modifies the example payloads for various auth methods to
remove 'other fields' and instead use complete example payloads.

* agent/config: prevent startup if resource-apis experiment and cloud are enabled (#18876)

* v2: various fixes to make K8s tproxy multiport acceptance tests and manual explicit upstreams (single port) tests pass (#18874)

Adding coauthors who mobbed/paired at various points throughout last week.
Co-authored-by: Dan Stough <dan.stough@hashicorp.com>
Co-authored-by: Iryna Shustava <iryna@hashicorp.com>
Co-authored-by: John Murret <john.murret@hashicorp.com>
Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>
Co-authored-by: Ashwin Venkatesh <ashwin@hashicorp.com>
Co-authored-by: Michael Wilkerson <mwilkerson@hashicorp.com>

* Added changelog entries for 1.14.10, 1.15.6, 1.16.2 (#18917)

* [NET-5332] Add nomad server templated policy (#18888)

* [NET-5332] Add nomad server templated policy

* slksfd

* mesh: make FailoverPolicy work in xdsv2 and ProxyStateTemplate (#18900)

Ensure that configuring a FailoverPolicy for a service that is reachable via a xRoute or a direct upstream causes an envoy aggregate cluster to be created for the original cluster name, but with separate clusters for each one of the possible destinations.

* Fix changelog order (#18918)

* Fix changelog order

* fix ordering or entries

* Add namespace proto and registration (#18848)

* add namespace proto and registration

* fix proto generation

* add missing copywrite headers

* fix proto linter errors

* fix exports and Type export

* add mutate hook and more validation

* add more validation rules and tests

* Apply suggestions from code review

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* fix owner error and add test

* remove ACL for now

* add tests around space suffix prefix.

* only fait when ns and ap are default, add test for it

---------

Co-authored-by: Semir Patel <semir.patel@hashicorp.com>

* Update base ref property name (#18851)

* Update base ref property name

* Test skip ci (#18924)

test_push_merge

* cleanup test push code

* dns token (#17936)

* dns token

fix whitespace for docs and comments

fix test cases

fix test cases

remove tabs in help text

Add changelog

Peering dns test

Peering dns test

Partial implementation of Peered DNS test

Swap to new topology lib

expose dns port for integration tests on client

remove partial test implementation

remove extra port exposure

remove changelog from the ent pr

Add dns token to set-agent-token switch

Add enterprise golden file

Use builtin/dns template in tests

Update ent dns policy

Update ent dns template test

remove local gen certs

fix templated policy specs

* add changelog

* go mod tidy

* NET-5131 - support multiple ported upstreams tests (#18923)

* add multiple upstream ports to golden file test for destination builder

* NET-5131 - add unit tests for multiple ported upstreams

* fix merge conflicts

* Fix for loop in filter_changed_files_go_test script (#18931)

* iterate through array

* remove comment

* Fix create dns token docs (#18927)

* [NET-5589] Optimize leaf watch diff on xds controller. (#18921)

Optimize leaf watch diff on xds controller.

* NET-4884 - Terminating gateway tests for namespaces & partitions (#18820)

* Add gateway test to CE

* Fix V2 Wildcard RBAC Regular Expressions (#18941)

fix wildcard rbac regular expressions

* skip flaky test (#18949)

* docs: Fix invalid JSON in code examples (#18932)

This commit fixes invalid JSON in various code examples.

* do not trigger integration tests (#18948)

* Dump response body on fail (#18962)

* Add protoc generator to emit resource type variables (#18957)

The annotations include a little more data than is strictly necessary because we will also have a protoc generator for openapi output.

* docs: Change heading to filename in CodeBlockConfig (#18951)

Change various CodeBlockConfig objects to use the `filename` attribute
instead of `heading` when the code block references a named file.

* docs: Replace unicode quotes with ASCII quotes (#18950)

Replaces unicode quotation marks with ASCII quotation marks.

For code examples, this fixes HCL decoding errors that would otherwise
be raised when attempting to read the file.

* net-5689 fix disabling panic threshold logic (#18958)

* tenancy: split up tenancy `types.go` into CE version (#18966)

* [NET-5589] Add jitter to xds v2 leaf cert watches (#18940)

Add jitter to xds v2 leaf cert watches.

* Fix docs for log file name changes (#18913)

* fix docs

* Update website/content/docs/agent/config/cli-flags.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Update website/content/docs/agent/config/cli-flags.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Update website/content/docs/agent/config/cli-flags.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* resource: allow for the ACLs.Read hook to request the entire data payload to perform the authz check (#18925)

The ACLs.Read hook for a resource only allows for the identity of a 
resource to be passed in for use in authz consideration. For some 
resources we wish to allow for the current stored value to dictate how 
to enforce the ACLs (such as reading a list of applicable services from 
the payload and allowing service:read on any of them to control reading the enclosing resource).

This change update the interface to usually accept a *pbresource.ID, 
but if the hook decides it needs more data it returns a sentinel error 
and the resource service knows to defer the authz check until after
 fetching the data from storage.

* catalog: add ACL checks for FailoverPolicy resources (#18919)

FailoverPolicy resources are name-aligned with the Service they control.
They also contain a list of possible failover destinations that are References
 to other Services.

The ACLs should be:

- list: (default)
- read: service:<resource_name>:read
- write: service:<resource_name>:write + service:<destination_name>:read (for any destination)

* catalog: fix for new method argument (#18978)

* catalog,mesh,auth: Bump versions to v2beta1 (#18930)

* [Docs] Add note to jwt docs to specify the need for ACLs (#18942)

* remove now orphaned generated v1alpha1 pb.go files (#18982)

* peerstream: fix flaky test related to autopilot integration (#18979)

* mesh: add ACL checks for DestinationPolicy resources (#18920)

DestinationPolicy resources are name-aligned with the Service they control.

The ACLs should be:

- list: (default)
- read: service:<resource_name>:read
- write: service:<resource_name>:write

* mesh: add ACL checks for xRoute resources (#18926)

xRoute resources are not name-aligned with the Services they control. They
have a list of "parent ref" services that they alter traffic flow for, and they
contain a list of "backend ref" services that they direct that traffic to.

The ACLs should be:

- list: (default)
- read:
  - ALL service:<parent_ref_service>:read
- write:
  - ALL service:<parent_ref_service>:write
  - ALL service:<backend_ref_service>:read

* Traffic Permissions Validations (#18907)

add TP validations and mutation and add CTP validations

* feat: remove resource api client from api module (#18984)

* feat: remove resource api client from api module

* fix: go mod clean up

* mesh: store bound reference pointers on a ComputedRoutes resource and use during reconcile (#18965)

xRoute resource types contain a slice of parentRefs to services that they 
manipulate traffic for. All xRoutes that have a parentRef to given Service 
will be merged together to generate a ComputedRoutes resource 
name-aligned with that Service.

This means that a write of an xRoute with 2 parent ref pointers will cause 
at most 2 reconciles for ComputedRoutes.

If that xRoute's list of parentRefs were ever to be reduced, or otherwise
 lose an item, that subsequent map event will only emit events for the current 
set of refs. The removed ref will not cause the generated ComputedRoutes 
related to that service to be re-reconciled to omit the influence of that xRoute.

To combat this, we will store on the ComputedRoutes resource a 
BoundResources []*pbresource.Reference field with references to all 
resources that were used to influence the generated output.

When the routes controller reconciles, it will use a bimapper to index this
 influence, and the dependency mappers for the xRoutes will look 
themselves up in that index to discover additional (former) ComputedRoutes
 that need to be notified as well.

* Add CLI support for json (#18991)

* add cli support for json format

* add tests for json parsing

* make owner and id pointers.

* add copyright header

* remove print

---------

Co-authored-by: Poonam Jadhav <poonam.jadhav@hashicorp.com>

* mesh: compute more of the xRoute features into ComputedRoutes (#18980)

Convert more of the xRoutes features that were skipped in an earlier PR into ComputedRoutes and make them work:

- DestinationPolicy defaults
- more timeouts
- load balancer policy
- request/response header mutations
- urlrewrite
- GRPCRoute matches

* catalog,mesh,auth: Move resource types to the proto-public module (#18935)

* mesh: update various protobuf comments for mesh types (#18993)

* docs: add changelog (#18994)

* api: add Token field to ServiceRegisterOpts (#18983)

Ongoing work to support Nomad Workload Identity for authenticating with Consul
will mean that Nomad's service registration sync with Consul will want to use
Consul tokens scoped to individual workloads for registering services and
checks. The `ServiceRegisterOpts` type in the API doesn't have an option to pass
the token in, which prevent us from sharing the same Consul connection for all
workloads. Add a `Token` field to match the behavior of `ServiceDeregisterOpts`.

* api: add `CheckRegisterOpts` method to Agent API (#18943)

Ongoing work to support Nomad Workload Identity for authenticating with Consul
will mean that Nomad's service registration sync with Consul will want to use
Consul tokens scoped to individual workloads for registering services and
checks. The `CheckRegister` method in the API doesn't have an option to pass the
token in, which prevent us from sharing the same Consul connection for all
workloads. Add a `CheckRegisterOpts` to match the behavior of
`ServiceRegisterOpts`.

* grafana: fix a query metrics from ent and add consul version (#18998)

* v2 explicit destination traffic permissions (#18823)

* workload identity boilerplate

* notes from discussion with Iryna

* WIP traffic permissions controller poc

* workload identity, traffic permissions validation, errors, types

* traffic permissions mapper framing, traffic permissions controller updates.

* more roughing out of the controller

* cleanup

* controller and mapper logic

* tests

* refactor mapper logic, add tests

* clean up tenancy and integration test stubs

* consolidate mapping

* cleanup cache leak, revert bimapper changes

* address review comments

* test fix and rebase

* use resource helper

---------

Co-authored-by: John Landa <john.landa@hashicorp.com>

* mesh: rename Upstreams and UpstreamsConfiguration to Destinations* (#18995)

* auth: register auth controllers with the server (#19000)

* acl: default tenancy with the no-auth ACL resolver (#19006)

When using the no-auth acl resolver (the case for most controllers and the get-envoy-boostrap-params endpoint), ResolveTokenAndDefaultMeta
method only returns an acl resolver. However, the resource service relies on the ent meta to be filled in to do the tenancy defaulting and
inheriting it from the token when one is present.

So this change makes sure that the ent meta defaulting always happens in the ACL resolver.

* NET-5657 - consul-containers test for explicit upstreams (#18952)

* Explicit container test

* remove static resources

* fix passing serviceBindPorts

* WIP

* fix explicit upstream test

* use my image in CI until dataplane is fixed.

* gofmt

* fixing reference to v2beta1 in test-containers

* WIP

* remove bad references

* add missing license headers

* allow access internal/resource/resourcetest

* fix check-allowed-imports to append array items

* use preview image for dataplane

* revert some inadverntent comment updates in peering_topology

* add building local consul-dataplane image to compatibility-tests CI

* fix substitution in CI

* change upstreams to destinations based on incoming change

* fixing use of upstreams in resource update

* remove commented out lines and enable envoy concurrency on dataplane.

* changes to addess PR feedback

* small fixes

---------

Co-authored-by: Eric <eric@haberkorn.co>

* Skip the catalog v2 upgrade test (#19005)

We intentionally broke api compatibility here as we are not yet maintaining backwards compat for the v2 apis

* Fix type of datacenter in Service Resolvers Config Entry (#19004)

* docs: Rename Consul OSS to Consul CE (#19009)

Rename references of Consul OSS to Consul Community Edition (CE).

Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>

* Update release notes to indicate folks should upgrade to to 1.16.2 or later  (#19002)

* Update v1_16_x.mdx

* Update upgrade-specific.mdx

* Update website/content/docs/upgrading/upgrade-specific.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Handle Traffic Permissions With Empty Sources Properly (#19024)

Fix issues with empty sources

* Validate that each permission on traffic permissions resources has at least one source.
* Don't construct RBAC policies when there aren't any principals. This resulted in Envoy rejecting xDS updates with a validation error.

```
error=
  | rpc error: code = Internal desc = Error adding/updating listener(s) public_listener: Proto constraint validation failed (RBACValidationError.Rules: embedded message failed validation | caused by RBACValidationError.Policies[consul-intentions-layer4-1]: embedded message failed validation | caused by PolicyValidationError.Principals: value must contain at least 1 item(s)): rules {
```

* Include RequestTimeout in marshal/unmarshal of ServiceResolverConfigEntry

* backport of commit 4ad1a8760d1276ec2f2ce7b9be741badb7abb1f6

* backport of commit 9109bdd79163dbdda4ef1e7dc7e990ba2cab8858

---------

Co-authored-by: Poonam Jadhav <poonam.jadhav@hashicorp.com>
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
Co-authored-by: Daniel Upton <daniel@floppy.co>
Co-authored-by: wangxinyi7 <121973291+wangxinyi7@users.noreply.github.com>
Co-authored-by: Luke Kysow <1034429+lkysow@users.noreply.github.com>
Co-authored-by: Anita Akaeze <anita.akaeze@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
Co-authored-by: Semir Patel <semir.patel@hashicorp.com>
Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
Co-authored-by: Dan Bond <danbond@protonmail.com>
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>
Co-authored-by: John Murret <john.murret@hashicorp.com>
Co-authored-by: Ashwin Venkatesh <ashwin@hashicorp.com>
Co-authored-by: Iryna Shustava <ishustava@users.noreply.github.com>
Co-authored-by: cskh <hui.kang@hashicorp.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
Co-authored-by: Vijay <vijayraghav22@gmail.com>
Co-authored-by: Dan Stough <dan.stough@hashicorp.com>
Co-authored-by: Natalie Smith <nataliemegans@gmail.com>
Co-authored-by: Ashesh Vidyut <134911583+absolutelightning@users.noreply.github.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: John Maguire <john.maguire@hashicorp.com>
Co-authored-by: Curt Bushko <cbushko@gmail.com>
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
Co-authored-by: Joshua Timmons <josh.timmons@hashicorp.com>
Co-authored-by: Hardik Shingala <34568645+hdkshingala@users.noreply.github.com>
Co-authored-by: Ashvitha <ashvitha.sridharan@hashicorp.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
Co-authored-by: Derek Menteer <105233703+hashi-derek@users.noreply.github.com>
Co-authored-by: Valeriia Ruban <valeriia.ruban@hashicorp.com>
Co-authored-by: skpratt <sarah.pratt@hashicorp.com>
Co-authored-by: Phil Porada <pgporada@users.noreply.github.com>
Co-authored-by: Samantha <hello@entropy.cat>
Co-authored-by: Nick Irvine <115657443+nfi-hashicorp@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Ronald <roncodingenthusiast@users.noreply.github.com>
Co-authored-by: Gerard Nguyen <gerard@hashicorp.com>
Co-authored-by: Melisa Griffin <missylbytes@users.noreply.github.com>
Co-authored-by: Matt Keeler <mjkeeler7@gmail.com>
Co-authored-by: Jeremy Jacobson <jjacobson93@users.noreply.github.com>
Co-authored-by: Iryna Shustava <iryna@hashicorp.com>
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>
Co-authored-by: Sophie Gairo <97480023+sophie-gairo@users.noreply.github.com>
Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
Co-authored-by: sarahalsmiller <100602640+sarahalsmiller@users.noreply.github.com>
Co-authored-by: James Hartig <me@jameshartig.com>
Co-authored-by: Gautam <gautambaghel93@gmail.com>
Co-authored-by: Blake Covarrubias <blake.covarrubias@gmail.com>
Co-authored-by: Andrew Stucki <andrew.stucki@hashicorp.com>
Co-authored-by: Ganesh S <ganesh.seetharaman@hashicorp.com>
Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
Co-authored-by: Derek Menteer <derek.menteer@hashicorp.com>
Co-authored-by: Nick Ethier <nethier@hashicorp.com>
Co-authored-by: John Landa <jonathanlanda@gmail.com>
Co-authored-by: Tim Gross <tgross@hashicorp.com>
Co-authored-by: John Landa <john.landa@hashicorp.com>
Co-authored-by: Eric <eric@haberkorn.co>
Co-authored-by: Chris Thain <chris.m.thain@gmail.com>
2023-09-29 17:57:36 +00:00
..
4633.txt add changelog (#17528) 2023-05-31 13:29:59 -04:00
5102.txt changelog: add changelog for reporting (#17535) 2023-06-02 08:59:48 -04:00
5200.txt Merge pull request #5200 from hashicorp/NET-3758 (#17102) 2023-04-24 18:23:24 +00:00
7628.txt
7899.txt
7970.txt
8158.txt
8190.txt
8194.txt
8211.txt
8216.txt
8218.txt
8221.txt fix 1.9.0-beta1 changelog formatting (#8941) 2020-10-14 09:35:59 -05:00
8222.txt
8268.txt
8311.txt
8343.txt
8371.txt
8431.txt make h2ping changelog entry conform with changelog template (#10111) 2021-04-29 14:48:16 -04:00
8458.txt
8470.txt
8522.txt
8537.txt
8545.txt
8547.txt
8552.txt
8560.txt Update vault CA for latest api client 2020-09-15 13:33:55 -07:00
8564.txt changelog: fixup release-note formatting (#9966) 2021-04-02 14:59:47 -05:00
8569.txt
8575.txt
8585.txt Create 8585.txt 2020-09-14 14:16:47 -06:00
8588.txt add entry for 8588 (#8650) 2020-09-10 18:53:36 +02:00
8596.txt
8599.txt AutopilotServerHealth now handles the 429 status code (#8599) 2021-03-12 09:40:49 -05:00
8601.txt
8602.txt api: create fresh http client for unix sockets (#8602) 2020-09-06 12:27:39 -04:00
8603.txt
8606.txt Add support for -ca-path option in the connect envoy command (#8606) 2020-09-08 12:16:16 +02:00
8646.txt Create 8646.txt 2020-09-15 10:05:23 -07:00
8685.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8694.txt changelog: add entries for ui_config and service metrics config (#8919) 2020-10-09 17:31:00 -04:00
8696.txt agent/consuk: Rename RPCRate -> RPCRateLimit 2021-01-14 17:26:00 -05:00
8703.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8704.txt use service datacenter for dns name (#8704) 2020-09-22 20:34:09 +02:00
8726.txt Add changelog file 2020-09-25 12:03:49 -04:00
8731.txt Consul Service meta wrongly computes and exposes non_voter meta (#8731) 2020-10-09 17:18:24 -04:00
8741.txt agent: make the json/hcl decoding of ConnectProxyConfig fully work with CamelCase and snake_case (#8741) 2020-09-24 13:58:52 -05:00
8745.txt server: make sure that the various replication loggers use consistent logging (#8745) 2020-09-24 15:49:38 -05:00
8746.txt agent: enable enable_central_service_config by default (#8746) 2020-10-01 09:19:14 -05:00
8747.txt agent: when enable_central_service_config is enabled ensure agent reload doesn't revert check state to critical (#8747) 2020-09-24 16:24:04 -05:00
8764.txt api: support GetMeta() and GetNamespace() on all config entry kinds (#8764) 2020-09-29 09:11:57 -05:00
8771.txt Add changelog entry 2020-10-20 16:42:06 -04:00
8774.txt Merge pull request #9027 from hashicorp/release/1.8.5 2020-10-26 10:59:48 -04:00
8781.txt Add per-agent reconnect timeouts (#8781) 2020-10-08 15:02:19 -04:00
8784.txt Add changelog note 2020-10-09 08:01:55 -07:00
8786.txt server: ensure that we also shutdown network segment serf instances on server shutdown (#8786) 2020-09-30 16:23:43 -05:00
8787.txt Enhance the output of consul snapshot inspect (#8787) 2020-10-09 14:57:29 -05:00
8788.txt changelog: add entries for UI topology viz (#8918) 2020-10-09 17:29:14 -04:00
8812.txt add changelog 2021-05-18 15:04:12 -04:00
8822.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8834.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8839.txt add missing changelog entry for #8839 2020-10-07 10:22:40 -05:00
8846.txt changelog: add entries for UI topology viz (#8918) 2020-10-09 17:29:14 -04:00
8855.txt command: remove conditional envoy bootstrap generation for versions <=1.10.0 since those are not supported (#8855) 2020-10-07 10:53:23 -05:00
8858.txt changelog: add entries for UI topology viz (#8918) 2020-10-09 17:29:14 -04:00
8875.txt agent: allow the /v1/connect/intentions/match endpoint to use the agent cache (#8875) 2020-10-08 14:51:53 -05:00
8877.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
8924.txt Fix: service LocallyRegisteredAsSidecar property is not persisted 2020-10-13 19:38:58 +02:00
9002.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9006.txt cli: Add JSON and Pretty Print formatting for `consul snapshot inspect` (#9006) 2020-10-29 11:31:14 -05:00
9007.txt server: break up Intention.Apply monolithic method (#9007) 2020-11-13 09:15:39 -06:00
9008.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9009.txt changelog: add entry for fixing active CA root unset (#9323) 2020-12-03 13:45:07 -05:00
9024.txt Merge pull request #9027 from hashicorp/release/1.8.5 2020-10-26 10:59:48 -04:00
9036.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
9042.txt Changelog 2021-04-06 17:12:10 +08:00
9059.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9067.txt Fixed failing tests 2020-12-30 14:09:50 -06:00
9081.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9088.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9098.txt Fix some minor wording issues 2020-11-11 11:33:38 -06:00
9099.txt changelog: add entries for 1.9.0-beta2 (#9129) 2020-11-06 17:18:47 -05:00
9101.txt agent: return the default ACL policy to callers as a header (#9101) 2020-11-12 10:38:32 -06:00
9103.txt Fixup the autopilot changelog (#9145) 2020-11-09 17:29:06 -05:00
9113.txt connect: switch the default gateway port from 443 to 8443 (#9116) 2020-11-06 20:47:29 -05:00
9119.txt Merge pull request #9155 from hashicorp/release/1.9.0-beta3 2020-11-13 16:45:50 -05:00
9141.txt ui: Changelog changes (#9209) 2020-11-17 10:35:56 -05:00
9142.txt Add changelog entry for autopilot state CLI (#9161) 2020-11-11 14:55:12 -05:00
9151.txt server: remove config entry CAS in legacy intention API bridge code (#9151) 2020-11-13 14:42:21 -06:00
9156.txt Add a paramter in state store methods to indicate whether a resource insertion is from a snapshot restoration (#9156) 2020-11-11 11:21:42 -05:00
9181.txt Trim to one deprecation entry 2020-11-13 14:31:14 -08:00
9186.txt server: skip deleted and deleting namespaces when migrating intentions to config entries (#9186) 2020-11-13 13:56:41 -06:00
9191.txt Refactor to call non-voting servers read replicas (#9191) 2020-11-17 10:53:57 -05:00
9198.txt Merge pull request #9270 from hashicorp/release/1.9.0 2020-11-24 17:36:47 -05:00
9204.txt Prevent panic if autopilot health is requested prior to leader establishment finishing. (#9204) 2020-11-16 17:08:17 -05:00
9207.txt Add DC and NS support for Envoy metrics (#9207) 2020-11-16 16:37:19 -07:00
9229.txt command: when generating envoy bootstrap configs use the datacenter returned from the agent services endpoint (#9229) 2020-11-19 15:27:31 -06:00
9240.txt Require operator:write to get Connect CA config (#9240) 2020-11-19 10:14:48 -07:00
9247.txt Added changelog entry for 9247 2020-11-20 18:23:01 +01:00
9254.txt server: fix panic when deleting a non existent intention (#9254) 2020-11-24 13:44:20 -05:00
9262.txt docs: deprecate some old filter parameters 2020-11-23 18:23:58 -05:00
9271.txt Add changelog for fixing the namespace replication bug from #9271 (#9347) 2020-12-08 12:04:51 -05:00
9278.txt server: deletions of intentions by name using the intention API is now idempotent (#9278) 2021-01-04 11:27:00 -06:00
9284.txt local: mark service and checks as InSync when added 2020-11-27 15:31:12 -05:00
9296.txt Changelog 2020-11-30 17:27:39 +00:00
9318.txt changelog: add entry for fixing active CA root unset (#9323) 2020-12-03 13:45:07 -05:00
9320.txt Log replication warnings when no error suppression is defined (#9320) 2021-01-08 14:03:06 -06:00
9351.txt acl: global tokens created by auth methods now correctly replicate to secondary datacenters (#9351) 2020-12-09 15:22:29 -06:00
9366.txt server: when wan federating via mesh gateways only do heuristic primary DC bypass on the leader (#9366) 2021-01-22 10:03:24 -06:00
9410.txt ui: [BUGFIX] Ensure namespace is used for node API requests (#9410) 2021-01-04 16:42:44 +00:00
9428.txt connect: connect CA Roots in the primary datacenter should use a SigningKeyID derived from their local intermediate (#9428) 2021-02-08 13:18:51 -06:00
9432.txt ui: [BUGFIX] Request intention listing with ns parameter (#9432) 2021-01-04 17:22:10 +00:00
9436.txt structs: fix caching of ServiceSpecificRequest when ingress=true 2021-01-14 17:01:40 -05:00
9440.txt Fix bug in usage metrics when multiple service instances are changed in a single transaction (#9440) 2021-01-12 15:31:47 -06:00
9442.txt ui: Search/filtering 'Filtered by:' search status (#9442) 2021-01-25 18:13:54 +00:00
9468.txt cli: Add consul intention list command (based on PR #6825) (#9468) 2021-01-12 21:14:31 +01:00
9475.txt Add changelog for 9475 2021-03-16 18:22:25 -04:00
9485.txt chore: Adds changelog entry for accessibility improvements (#9509) 2021-01-08 18:17:01 +00:00
9487.txt Add changelog for #9487 (#9491) 2021-01-05 13:05:42 -05:00
9498.txt Ensure that CA initialization does not block leader election. 2021-01-19 15:27:48 -05:00
9505.txt acl: use the presence of a management policy in the state store as a sign that we already migrated to v2 acls (#9505) 2021-01-05 17:04:27 -06:00
9510.txt [bugfix] Prometheus metrics without warnings 2021-01-06 13:54:05 +01:00
9512.txt [Streaming][bugfix] handle TLS signalisation when TLS is disabled on client side 2021-01-06 17:24:58 +01:00
9513.txt ui: Topology intention saving improvements (#9513) 2021-01-19 15:40:39 +00:00
9519.txt server: use the presense of stored federation state data as a sign that we already activated the federation state feature flag (#9519) 2021-01-25 13:24:32 -06:00
9524.txt chore: Changelog entry for #9524 (#9595) 2021-01-20 15:44:41 +00:00
9527.txt server: add OSS stubs supporting validation of source namespaces in service-intentions config entries (#9527) 2021-01-25 11:27:38 -06:00
9528.txt server: initialize mgw-wanfed to use local gateways more on startup (#9528) 2021-01-25 17:30:38 -06:00
9530.txt Display a warning when rpc.enable_streaming = true is set on a client (#9530) 2021-01-08 15:23:23 -05:00
9553.txt ui: Sidebar navigation / redesign (#9553) 2021-01-26 17:40:33 +00:00
9554.txt connect: add local_request_timeout_ms to configure local_app http timeouts (#9554) 2021-01-25 13:50:00 -06:00
9569.txt Fix -ui-content-path without regex (#9569) 2021-01-20 18:40:46 +00:00
9585.txt Add flags to support CA generation for Connect (#9585) 2021-01-27 08:52:15 +01:00
9589.txt Update topology mapping Refs on all proxy instance deletions (#9589) 2021-01-20 15:17:26 +00:00
9593.txt ui: Changelog for #9593 (#9598) 2021-01-20 18:18:46 +00:00
9594.txt ui: Removing formatting to display LockDelay in nanoseconds (#9594) 2021-01-20 12:03:08 -05:00
9602.txt xds: remove deprecated usages of xDS (#9602) 2021-02-22 15:00:15 -06:00
9617.txt changelog: Auth Method feature release (#9963) 2021-04-01 11:00:43 -04:00
9626.txt Upgrade raft-autopilot and wait for autopilot it to stop when revoking leadership (#9644) 2021-01-27 11:14:52 -05:00
9650.txt xds: deduplicate mesh gateway listeners in a stable way (#9650) 2021-02-05 16:28:07 -06:00
9651.txt xds: prevent LDS flaps in mesh gateways due to unstable datacenter lists (#9651) 2021-02-08 10:19:57 -06:00
9658.txt fix typo in changelog 2021-02-26 17:08:33 -06:00
9660.txt chore: changelog for 9660 (#9668) 2021-01-29 16:08:39 +00:00
9672.txt Add a changelog note 2021-03-11 11:47:35 -08:00
9683.txt changelog: fixup release-note formatting (#9960) 2021-04-01 10:31:48 -04:00
9687.txt ui: Restrict the viewing/editing of certain UI elements based on the users ACLs (#9687) 2021-02-19 16:42:16 +00:00
9689.txt Add changelog entry 2021-02-08 09:45:58 -07:00
9703.txt Updated changelog 2021-02-08 18:16:07 +01:00
9715.txt ui: [BUGFIX] Replace all replaceAll with split.join for older browsers without replaceAll (#9715) 2021-02-11 09:49:39 +00:00
9729.txt ui: Update browser targets to ~2016 browsers (#9729) 2021-02-11 10:03:13 +00:00
9737.txt connect: update supported envoy point releases to 1.16.2, 1.15.3, 1.14.6, 1.13.7 (#9737) 2021-02-10 13:11:15 -06:00
9738.txt Stop background refresh of cached data for requests that result in ACL not found errors (#9738) 2021-02-09 10:15:53 -05:00
9741.txt Add fields to the /acl/auth-methods endpoint. (#9741) 2021-02-17 08:16:57 -08:00
9749.txt ui: [BUGFIX] Ensure we show the correct count of instances for each node (#9749) 2021-02-11 11:36:36 +00:00
9752.txt ui: Remove any trailing fullstop/period DNS characters from Gateways UI API (#9752) 2021-02-25 09:34:47 +00:00
9765.txt xds: only try to create an ipv6 expose checks listener if ipv6 is supported by the kernel (#9765) 2021-02-19 14:38:43 -06:00
9768.txt Add flags to consul connect envoy for metrics merging. (#9768) 2021-03-04 16:15:47 -06:00
9772.txt stream: fix a snapshot cache bug 2021-02-16 12:52:23 -05:00
9792.txt Add a changelog entry 2021-03-11 09:46:53 -08:00
9806.txt connect: if the token given to the vault provider returns no data avoid a panic (#9806) 2021-02-22 14:08:49 -06:00
9819.txt ui: a11y modals (#9819) 2021-03-09 09:30:01 +00:00
9847.txt ui: CSP Improvements (#9847) 2021-03-17 10:46:21 +00:00
9851.txt Fix advertise_addr_wan_ipv6 configuration key 2021-03-09 14:56:44 +01:00
9855.txt Support Incremental xDS mode (#9855) 2021-04-29 13:54:05 -05:00
9864.txt ui: Adds warning icon to side menu when ACLs are disabled (#9864) 2021-03-17 11:23:00 +00:00
9872.txt Add changelog and cleanup todo for beta 2021-03-17 16:45:13 -06:00
9894.txt Add changelog entry 2021-03-17 22:09:02 -06:00
9901.txt ui: Ensure intention form cancel button works (#9901) 2021-03-19 15:14:46 +00:00
9903.txt api: enable query options on agent endpoints 2021-03-19 13:08:26 -05:00
9910.txt cli: Add new `consul connect redirect-traffic` command for applying traffic redirection rules when Transparent Proxy is enabled. (#9910) 2021-04-09 11:48:10 -07:00
9920.txt Allow passing ALPN next protocols down to connect services. Fixes #4466. (#9920) 2021-03-26 11:34:47 +00:00
9923.txt changelog: fixup release-note formatting (#9960) 2021-04-01 10:31:48 -04:00
9924.txt Update metric name 2021-06-14 17:01:16 -04:00
9967.txt api: ensure v1/health/ingress/:service endpoint works properly when streaming is enabled (#9967) 2021-04-05 13:23:00 -05:00
9973.txt connect: add toggle to globally disable wildcard outbound network access when transparent proxy is enabled (#9973) 2021-04-06 13:19:59 -05:00
9978.txt cache: fix bug where TTLs were ignored leading to leaked memory in client agents (#9978) 2021-04-08 11:08:56 +01:00
9979.txt cache: Fix bug where connection errors can cause early cache expiry (#9979) 2021-04-08 11:11:15 +01:00
9980.txt command: when generating envoy bootstrap configs to stdout do not mix informational logs into the json (#9980) 2021-04-07 14:22:52 -05:00
9981.txt Add changelog entry 2021-05-04 12:41:43 -07:00
10002.txt Fix up changelog for 10002 (#10130) 2021-04-27 14:29:48 -04:00
10009.txt add changelog entry 2021-07-14 17:50:00 -04:00
10013.txt Move static token resolution into the ACLResolver (#10013) 2021-04-14 12:39:35 -04:00
10016.txt Add changelog entry 2021-04-15 13:58:28 -06:00
10023.txt Add security release-note changelog entry 2021-04-14 16:40:47 -04:00
10025.txt snapshot: fix saving of auth methods 2021-04-14 16:51:21 -04:00
10039.txt ui: remove old nspace argument from the proxy instance repository (#10039) 2021-04-15 19:18:07 +01:00
10062.txt ui: Adds human formatting to nanosecond based session durations (#10062) 2021-04-28 12:12:56 +01:00
10069.txt Disallow * as service-defaults name (#10069) 2021-04-19 14:23:01 -06:00
10073.txt Update changelog and add telemetry docs (#10107) 2021-04-23 16:05:00 -04:00
10081.txt Update brand assets (#10081) 2021-05-03 16:19:09 +01:00
10089.txt CLI: Allow snapshot inspect to work on internal raft snapshots directly. (#10089) 2021-04-23 16:17:08 +01:00
10091.txt Fix panic bug in snapshot inspect (#10091) 2021-04-23 20:48:10 +01:00
10100.txt ui: Adds CRD popover 'informed action' for intentions managed by CRDs (#10100) 2021-05-04 17:21:54 +01:00
10101.txt connect: update supported envoy versions to 1.18.2, 1.17.2, 1.16.3, and 1.15.4 (#10101) 2021-04-29 15:22:03 -05:00
10112.txt Add changelog 2021-04-27 19:03:17 -04:00
10121.txt ui: Add conditionals to Lock Session list items (#10121) 2021-05-11 11:35:15 -04:00
10122.txt ui: Fix empty SVG height to prevent service mesh from breaking when there are no upstreams (#10122) 2021-04-28 09:22:18 -04:00
10124.txt ui: Update conditional for topology empty state (#10124) 2021-04-28 09:23:02 -04:00
10127.txt Rename "cluster" config entry to "mesh" (#10127) 2021-04-28 16:13:29 -06:00
10129.txt Make Raft trailing logs and snapshot timing reloadable (#10129) 2021-05-04 15:36:53 +01:00
10131.txt xds: ensure that all envoyproxy/go-control-plane protobuf symbols are linked into the final binary (#10131) 2021-04-29 14:58:26 -05:00
10133.txt ui: Update not-defined intention popover and banner (#10133) 2021-04-28 10:31:14 -04:00
10134.txt Implement traffic redirection exclusion based on proxy config and user-provided values (#10134) 2021-04-29 09:21:15 -07:00
10136.txt ui: Add TProxy Mode notice banner to service instance Upstreams tab (#10136) 2021-04-28 14:06:18 -04:00
10149.txt Add changelog 2021-04-29 12:08:03 -04:00
10151.txt ui: Fix text search for upstream instances (#10151) 2021-05-04 17:25:57 +01:00
10152.txt ui: Remove extra nspace value from service upstreams (#10152) 2021-05-04 17:42:13 +01:00
10157.txt ui: Fix nspace spacing issue (#10157) 2021-05-10 11:19:11 +01:00
10161.txt Add changelog 2021-05-04 14:09:14 -04:00
10162.txt Only consider virtual IPs for transparent proxies (#10162) 2021-05-03 14:15:22 -06:00
10163.txt Give descriptive error if auth method not found (#10163) 2021-05-03 13:39:13 -07:00
10173.txt Save exposed ports in agent's store and expose them via API (#10173) 2021-05-12 13:51:39 -07:00
10174.txt ui: Adds ability to show a 'partial' list in list-collections (#10174) 2021-05-07 16:54:45 +01:00
10181.txt ui: Loader amends/improvements (#10181) 2021-05-07 12:23:29 +01:00
10186.txt ui: [BUGFIX] De-duplicate Tag rendering (#10186) 2021-05-07 12:07:11 +01:00
10188.txt Add changelog 2021-05-06 18:35:52 -04:00
10189.txt http: set consistency header properly 2021-05-06 13:19:45 -04:00
10194.txt ui: Serf Health Check warning notice (#10194) 2021-05-13 11:36:51 +01:00
10204.txt Always set the Content-Type header when a body is present (#10204) 2021-05-25 16:03:48 +01:00
10210.txt Add OSS bits for supporting specifying the enterprise license via config 2021-05-20 16:11:33 -04:00
10211.txt Deprecate API driven licensing. 2021-05-21 11:08:50 -04:00
10212.txt ui: Support Route optional parameters/segments (#10212) 2021-05-26 17:43:46 +01:00
10225.txt ui: Miscellaneous Lock Session fixes (#10225) 2021-05-19 11:05:54 +01:00
10231.txt connect: update supported envoy versions to 1.18.3, 1.17.3, 1.16.4, and 1.15.5 (#10231) 2021-05-12 14:06:06 -05:00
10239.txt server: ensure that central service config flattening properly resets the state each time (#10239) 2021-05-14 10:21:44 -05:00
10240.txt agent: ensure we hash the non-deprecated upstream fields on ServiceConfigRequest (#10240) 2021-05-14 10:15:48 -05:00
10243.txt xds: emit a labeled gauge of connected xDS streams by version (#10243) 2021-05-14 13:59:13 -05:00
10248.txt hcs-1936: Prepare for adding license auto-retrieval to auto-config in enterprise 2021-05-24 13:20:30 -04:00
10267.txt Add license inspect command documentation and changelog (#10351) 2021-06-04 14:33:13 -04:00
10270.txt ui: Create and use collapsible notices component (#10270) 2021-05-25 11:02:38 -04:00
10273.txt debug: remove the CLI check for debug_enabled (#10273) 2021-05-27 09:41:53 -04:00
10279.txt generate a single debug file for a long duration capture (#10279) 2021-06-07 13:00:51 -04:00
10287.txt ui: Unix Domain Socket support (#10287) 2021-05-26 17:52:25 +01:00
10298.txt ui: Move all our icons to use CSS custom properties instead of SASS vars (#10298) 2021-06-21 11:54:58 +01:00
10299.txt RPC Timeout/Retries account for blocking requests (#8978) 2021-05-27 17:29:43 -04:00
10301.txt Ensure passthrough clusters can be created (#10301) 2021-05-26 15:05:14 -06:00
10306.txt Bump raft-autopilot version to the latest. (#10306) 2021-05-27 12:59:14 -04:00
10324.txt envoy: fix bootstrap deadlock caused by a full named pipe 2021-05-31 18:53:17 -04:00
10329.txt Add flag for transparent proxies to dial individual instances (#10329) 2021-06-09 14:34:17 -06:00
10330.txt connect/ca: ensure edits to the key type/bits for the connect builtin CA will regenerate the roots (#10330) 2021-07-13 11:12:07 -05:00
10331.txt connect/ca: require new vault mount points when updating the key type/bits for the vault connect CA provider (#10331) 2021-07-13 11:11:46 -05:00
10338.txt Add changelog 2021-06-02 17:39:30 -04:00
10340.txt usagemetrics: add cluster members to metrics API (#10340) 2021-06-03 08:25:53 -07:00
10358.txt fix monitor to only start the monitor in json format when requested (#10358) 2021-06-07 12:08:48 -04:00
10365.txt Revert "Avoid adding original_dst filter when not needed" (#10365) 2021-06-08 13:18:41 -06:00
10368.txt improve monitor performance (#10368) 2021-06-15 12:05:52 -04:00
10381.txt xds: ensure that dependent xDS resources are reconfigured during primary type warming (#10381) 2021-06-14 17:20:27 -05:00
10391.txt proxycfg: Ensure that endpoints for explicit upstreams in other datacenters are watched in transparent mode (#10391) 2021-06-15 11:00:26 -07:00
10394.txt Relax validation for expose.paths config (#10394) 2021-06-14 14:04:11 -06:00
10395.txt grpc: move gRPC INFO logs to be emitted as TRACE logs from Consul (#10395) 2021-06-14 15:13:58 -05:00
10399.txt Add changelog 2021-07-26 17:53:32 -04:00
10401.txt return an empty record when asked for an addr dns with type other then A, AAAA and ANY (#10401) 2021-06-24 20:44:44 -04:00
10404.txt Add changelog entry 2021-06-15 14:15:30 -06:00
10411.txt Format certificates properly (rfc7468) with a trailing new line (#10411) 2021-06-30 20:48:29 -04:00
10423.txt Update .changelog/10423.txt 2021-06-17 12:06:26 -07:00
10424.txt connect/ca: cease including the common name field in generated certs (#10424) 2021-06-25 13:00:00 -05:00
10475.txt structs: prevent service-defaults upstream configs from using wildcard names or namespaces (#10475) 2021-06-23 15:48:54 -05:00
10486.txt connect/proxy: fixes logic bug preventing builtin/native proxy from starting upstream listeners (#10486) 2021-06-24 15:02:34 -05:00
10490.txt tlsutil: fix default server name for health checks 2021-06-24 13:49:58 -04:00
10500.txt check expiry date of the root/intermediate before using it to sign a leaf (#10500) 2021-07-13 12:15:06 -04:00
10503.txt ui: Don't default to the default namespace, use the token default namespace instead (#10503) 2021-07-07 11:46:41 +01:00
10504.txt Add ca certificate metrics (#10504) 2021-07-07 09:41:01 -04:00
10514.txt streaming: fix enable of streaming in the client 2021-06-28 17:23:14 -04:00
10515.txt fix 64-bit aligment for 32-bit platforms 2021-06-29 16:10:21 -04:00
10535.txt Add changelog to backported bug fix for Topology Metrics (#10538) 2021-06-30 16:51:29 -04:00
10546.txt Add support for returning ACL secret IDs for accessors with acl:write (#10546) 2021-07-08 15:13:08 -07:00
10552.txt Add changelog 2021-07-06 17:57:36 -04:00
10559.txt Add changelog for PR 10559 2021-07-06 18:39:40 -04:00
10564.txt cli/sdk: Allow applying redirect-traffic rules in a provided Linux namespace (#10564) 2021-07-13 10:05:48 -06:00
10566.txt Allow configuring graceful stop in testutil (#10566) 2021-09-08 11:12:54 -04:00
10569.txt ui: [BUGFIX] Ensure in-folder KVs are created in the correct folder (#10569) 2021-07-14 18:49:01 +01:00
10581.txt ui: Split up the socket mode from the socket path (#10581) 2021-08-11 13:00:32 -04:00
10598.txt acls: Show `AuthMethodNamespace` when reading/listing ACL token meta (#10598) 2021-07-15 10:38:52 -07:00
10604.txt ui: Show the correct 'ACLs Disabled' page when ACLs are disabled (#10604) 2021-07-14 18:52:13 +01:00
10605.txt ui: [BUGFIX] Fix KV Code Editor syntax loading (#10605) 2021-07-14 18:55:35 +01:00
10608.txt ui: [BUGFIX] Ensure we use the ns query param name when requesting permissions (#10608) 2021-07-15 12:19:07 +01:00
10611.txt Add DNS recursor strategy option (#10611) 2021-07-19 15:22:51 -07:00
10612.txt String type instead of error type and changelog. 2021-08-06 22:35:27 +01:00
10613.txt Add Changelog entry and api package support for HTTP Header manip 2021-09-10 21:09:24 +01:00
10619.txt xds: ensure single L7 deny intention with default deny policy does not result in allow action (CVE-2021-36213) (#10619) 2021-07-15 10:09:00 -05:00
10621.txt Add changelog entry 2021-07-15 09:27:46 -06:00
10630.txt defer setting the state before returning to avoid stuck in `INITIALIZING` state (#10630) 2021-08-05 14:51:19 -04:00
10647.txt Avoid panic on concurrent writes to cached service config map (#10647) 2021-07-20 10:09:29 -06:00
10657.txt config raft apply silent error (#10657) 2021-07-22 10:32:27 -04:00
10688.txt agent: update proxy upstreams to inherit namespace from service (#10688) 2021-07-26 17:12:29 -04:00
10689.txt Log the correlation ID when blocking queries fire (#10689) 2021-07-23 16:36:17 -06:00
10690.txt add support for h2c in h2 ping health checks 2021-10-04 22:51:08 -04:00
10691.txt api: Support QueryOptions on additional agent endpoints (#10691) 2021-07-30 10:07:13 -07:00
10706.txt ui: Fix dropdown option duplications (#10706) 2021-07-27 17:34:11 -04:00
10707.txt add changelog 2021-07-28 17:50:01 -04:00
10717.txt checks: Add Interval and Timeout to API response (#10717) 2021-08-03 15:26:49 -07:00
10732.txt Add changelog 2021-07-30 09:58:11 -07:00
10735.txt ui: Add copy button for Secret ID in Tokens list page (#10735) 2021-07-30 13:52:37 -04:00
10757.txt cli: Use admin bind address in self_admin cluster (#10757) 2021-08-09 17:10:32 -07:00
10758.txt Fixup to support unix domain socket via command line (#10758) 2021-08-12 10:05:22 -07:00
10767.txt ui: Fix Health Checks in K/V form Lock Sessions Info section (#10767) 2021-08-04 12:41:41 -04:00
10768.txt telemetry: add a metric for agent TLS cert expiry 2021-08-04 13:51:44 -04:00
10769.txt ui: Add Vault as a Service External Source (#10769) 2021-08-04 18:22:43 -04:00
10795.txt cli: Test API access using /status/leader in consul watch (#10795) 2021-08-09 09:00:33 -07:00
10804.txt add changelog 2021-08-18 12:54:11 -04:00
10813.txt deps: upgrade gogo-protobuf to v1.3.2 (#10813) 2021-08-12 14:05:46 -04:00
10820.txt cli: Fix broken KV import on Windows (#10820) 2021-08-10 14:42:05 -07:00
10824.txt proxycfg: Lookup the agent token as a default 2021-08-12 15:51:34 -04:00
10835.txt ui: Create Routing Configurations route and page (#10835) 2021-08-16 12:04:04 -04:00
10838.txt grpc: ensure that streaming gRPC requests work over mesh gateway based wan federation (#10838) 2021-08-24 16:28:44 -05:00
10844.txt ci: make changelog-checker only validate PR number against main base (#10844) 2021-08-16 15:40:51 -04:00
10856.txt ci: upgrade to use Go 1.16.7 (#10856) 2021-08-16 12:21:16 -05:00
10858.txt ui: Hide all metrics for ingress gateway services (#10858) 2021-08-26 14:08:31 -04:00
10872.txt ui: Add support in Topology view for Routing Configurations (#10872) 2021-08-26 13:58:06 -04:00
10873.txt Add changelog entry 2021-08-20 17:40:33 -06:00
10894.txt Clarify service and check error messages (use ID) 2022-01-04 11:42:37 -08:00
10895.txt Added changelog for grpc and xds servers panic recovery. 2021-08-22 19:21:42 +01:00
10901.txt ui: [BUGFIX] Properly encode non-URL safe characters in OIDC responses (#10901) 2021-08-24 16:58:45 +01:00
10902.txt ui: Disabling policy form fields from users with 'read' permissions (#10902) 2021-08-25 09:42:05 -04:00
10903.txt Add changelog; Add API package support for new fields. 2021-09-23 10:12:37 +01:00
10913.txt ui: [BUGFIX] Add missing `@` to fix missing non-subset Failovers (#10913) 2021-08-26 17:01:26 +01:00
10914.txt ui: Hide create buttons for policies/roles/namespaces with readonly access (#10914) 2021-09-27 17:20:44 +01:00
10916.txt ui: Always show main navigation Key/Value link (#10916) 2021-09-22 18:23:59 +01:00
10925.txt rpc: authorize raft requests (#10925) 2021-08-26 15:04:32 -07:00
10952.txt Revert early out errors in license API (#10952) 2021-08-31 10:36:35 -06:00
10961.txt connect: update envoy supported versions to latest patch release 2021-08-31 10:39:18 -06:00
10964.txt tls: consider presented intermediates during server connection tls handshake. (#10964) 2021-09-09 21:48:54 +02:00
10969.txt Add failures_before_warning to checks (#10969) 2021-09-14 12:47:52 -04:00
10987.txt xds: fix representation of incremental xDS subscriptions (#10987) 2021-09-21 09:58:56 -05:00
10996.txt Update repo to use go:embed (#10996) 2022-05-31 15:33:56 -04:00
11026.txt sso/oidc: add support for acr_values request parameter (#11026) 2021-09-17 09:10:05 -07:00
11077.txt ui: Gracefully recover from non-existent DC errors (#11077) 2021-09-22 18:26:36 +01:00
11085.txt xds: ensure the active streams counters are 64 bit aligned on 32 bit systems (#11085) 2021-09-20 11:07:11 -05:00
11090.txt Add changelog entry 2021-09-20 12:52:19 -05:00
11095.txt ui: [BUGFIX] Re-enable namespace menus whilst editing intentions (#11095) 2021-09-22 10:21:20 +01:00
11099.txt grpc: strip local ACL tokens from RPCs during forwarding if crossing datacenters (#11099) 2021-09-22 13:14:26 -05:00
11107.txt Add changelog entry for audit logging header extraction improvement 2021-09-22 10:23:01 -04:00
11109.txt connect: Allow upstream listener escape hatch for prepared queries (#11109) 2021-09-22 15:27:10 -04:00
11115.txt add changelog entry 2021-09-22 10:57:36 -07:00
11117.txt ui: Make it hard to not URLEncode DataSource srcs/URIs (#11117) 2021-09-30 15:54:46 +01:00
11130.txt ui: Remove info panel from the nspace menu when editing nspaces (#11130) 2021-09-24 18:05:22 +01:00
11136.txt Add changelog 2021-09-29 12:45:42 -04:00
11138.txt checks: populate interval and timeout when registering services (#11138) 2022-02-18 12:05:33 -08:00
11149.txt ui: Don't show the CRD menu for read-only intentions (#11149) 2021-09-27 17:19:32 +01:00
11163.txt Add Changelog 2021-10-19 20:58:28 +01:00
11200.txt ui: Replaces almost all remaining instances of SASS variables with CSS (#11200) 2021-10-07 19:21:11 +01:00
11216.txt ui: Topology - Fix up Default Allow and Permissive Intentions notices (#11216) 2021-10-12 09:27:06 -04:00
11222.txt Add changelog, website and metric docs 2021-10-05 13:34:24 -05:00
11231.txt fix consul_autopilot_healthy metric emission (#11231) 2021-10-08 10:31:50 -07:00
11232.txt docs: add notice that legacy ACLs have been removed. 2021-10-05 18:30:22 -04:00
11237.txt ui: Fix up blocking reconciliation for multiple models (#11237) 2021-10-07 12:38:04 +01:00
11241.txt fix: only add prom autopilot gauges to servers (#11241) 2021-10-13 09:25:30 -07:00
11245.txt Update filter chain creation for sidecar/ingress listeners (#11245) 2021-11-09 14:43:51 -07:00
11255.txt tlsutil: only AuthorizerServerConn when VerifyIncomingRPC is true 2021-10-27 13:43:25 -04:00
11277.txt connect: Add support for Envoy 1.20 (#11277) 2021-10-27 18:38:10 -07:00
11280.txt ui: Topology view with no dependencies (#11280) 2021-11-05 13:46:41 -04:00
11293.txt added changelog 2021-10-20 16:02:14 +05:30
11298.txt ui: Move the Role remove dialog to use InformedAction (#11298) 2021-10-14 13:54:27 +01:00
11311.txt ui: Ensure we provide an id for filtering policy-tokens (#11311) 2021-10-26 19:00:32 +01:00
11318.txt Fix back compat issues with UDS config (#11318) 2021-10-28 13:31:10 -07:00
11335.txt add path escape and unescape to path params 2022-01-03 08:18:32 -08:00
11348.txt added changelog 2021-10-27 02:33:36 +03:00
11364.txt ci: test against go1.17 2021-10-21 16:18:32 -04:00
11371.txt ui: Add Consul API Gateway as an external source (#11371) 2021-11-10 16:54:12 -05:00
11375.txt update raft to v1.3.2 (#11375) 2021-10-21 13:21:22 -04:00
11376.txt fix leadership transfer on leave suggestions (#11387) 2021-10-21 14:02:26 -04:00
11380.txt ui: Ensure dc selector correctly shows the currently selected dc (#11380) 2021-10-26 19:26:04 +01:00
11399.txt fix autopilot_failure_tolerance, add autopilot metrics test case (#11399) 2021-10-25 10:55:59 -07:00
11409.txt ui: Ensure we check intention service prefix permissions for per service (#11409) 2021-11-04 12:10:28 +00:00
11417.txt Add changelog entry (#11549) 2021-11-10 14:53:52 -05:00
11419.txt Support Check-And-Set deletion of config entries (#11419) 2021-11-01 16:42:01 +00:00
11428.txt add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
11449.txt plumb thru root cert tll to the aws ca provider (#11449) 2021-11-04 12:19:08 -07:00
11461.txt changelog 2021-11-01 22:47:20 +00:00
11472.txt ui: [Port] Ensure the tokens default nspace (and partition) is passed thru to the auth endpoint (#11490) 2021-11-11 12:02:29 +00:00
11474.txt ui: Fix code editor resizing and restyle (#11474) 2021-11-12 15:28:06 +00:00
11475.txt ui: Filter global intentions list by selected partition (#11475) 2021-11-09 17:38:24 +00:00
11477.txt Support Vault Namespaces explicitly in CA config (#11477) 2021-11-05 11:42:28 -05:00
11480.txt command/redirect_traffic: Redirect DNS requests to Consul if -consul-dns-ip is passed in (#11480) 2021-11-10 09:10:48 -05:00
11491.txt Fixup changelog filename (#11501) 2021-11-09 09:32:27 -08:00
11495.txt segments: ensure that the serf_lan_allowed_cidrs applies to network segments (#11495) 2021-11-04 17:17:19 -05:00
11500.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
11505.txt ui: Bump our browser support (#11505) 2021-11-11 13:37:49 +00:00
11507.txt Improved performance of the version.GetHumanVersion function by 50% on memory allocation. (#11507) 2021-12-09 13:14:06 -08:00
11514.txt Add changelog entry 2021-11-08 17:14:27 -07:00
11520.txt ui: Temporarily force all UI capabilities (#11520) 2021-11-10 11:05:27 +00:00
11522.txt xds: prefer fed state gateway definitions if they're fresher (#11522) 2021-11-09 16:45:36 +00:00
11556.txt ui: Adding partitions + icons to upstreams/upstream instances (#11556) 2021-11-17 17:46:50 +00:00
11569.txt Groundwork for exposing when queries are filtered by ACLs (#11569) 2021-12-03 17:11:26 +00:00
11573.txt connect: Support auth methods for the vault connect CA provider (#11573) 2021-11-18 13:15:28 -07:00
11576.txt ingress: allow setting TLS min version and cipher suites in ingress gateway config entries (#11576) 2022-01-11 11:46:42 -05:00
11577.txt ui: Notifications re-organization/re-style (#11577) 2021-11-24 18:14:07 +00:00
11578.txt ui: Fix brand coloring for inline-code plus docs (#11578) 2021-11-23 18:32:11 +00:00
11585.txt api: ensure new partition fields are omit empty for back compat (#11585) 2021-11-16 12:28:34 -06:00
11586.txt deps: update gopsutil to fix Windows ARM and macOS non-Apple LLVM builds (#11586) 2021-11-16 15:40:11 -05:00
11607.txt agent: purge service/check registration files for incorrect partitions on reload (#11607) 2021-11-18 14:44:20 -06:00
11640.txt ui: Add `Service.Namespace` variable to dashboard URL templates (#11640) 2021-11-25 10:47:07 +00:00
11645.txt types: add types/tls.go for strongly-typed TLS versions and cipher suites (#11645) 2021-12-03 20:17:55 -05:00
11665.txt Rename `master` and `agent_master` ACL tokens in the config file format (#11665) 2021-12-01 21:08:14 +00:00
11669.txt Rename `agent_master` ACL token in the API and CLI (#11669) 2021-12-02 17:05:27 +00:00
11670.txt ui: Stop tables overlapping with their headers when scrolling (#11670) 2021-12-06 16:09:15 +00:00
11671.txt ca: fix stored CARoot representation with Vault provider 2021-12-02 12:42:49 -05:00
11672.txt ca: set the correct SigningKeyID after config update with Vault provider 2021-12-02 16:07:11 -05:00
11681.txt ui: Don't cache event sources following a 401 (#11681) 2021-12-01 13:24:52 +00:00
11693.txt add MustRevalidate flag to connect_ca_leaf cache type; always use on non-blocking queries (#11693) 2021-12-02 11:32:15 -08:00
11720.txt Add the changelog entry for bbolt modifications 2021-12-02 16:59:13 -05:00
11722.txt agent: add variation of force-leave that exclusively works on the WAN (#11722) 2021-12-02 17:15:10 -06:00
11724.txt Add changelog note 2021-12-02 15:54:40 -08:00
11725.txt dns: add endpoint for querying service virtual IPs 2021-12-02 16:40:28 -08:00
11742.txt Add support for filtering the 'List Services' API 2022-08-10 16:52:32 -05:00
11744.txt agent/token: rename `agent_master` to `agent_recovery` (internally) (#11744) 2021-12-07 12:12:47 +00:00
11748.txt areas: make the gRPC server tracker network area aware (#11748) 2021-12-06 09:55:54 -06:00
11767.txt ui: Ensure we show a special readonly page for intentions (#11767) 2021-12-13 15:02:36 +00:00
11774.txt ui: Fixup names of Meta for instance search, also add Node (#11774) 2021-12-21 07:00:02 +00:00
11781.txt Add changelog 2021-12-21 16:45:45 -05:00
11791.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
11799.txt Update CI and release go versions to 1.17.5 (#11799) 2021-12-10 14:04:56 -05:00
11801.txt ui: Change the URL prefix of partitions from `-` to `_` (#11801) 2021-12-13 15:39:56 +00:00
11803.txt ui: Add version information back into the footer (#11803) 2021-12-13 15:54:58 +00:00
11804.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
11818.txt http: improve 404 Not Found response message 2021-12-13 11:03:25 -08:00
11820.txt http: improve UI not enabled response message 2021-12-13 08:48:33 -08:00
11821.txt http: WARN if GET request has non-empty body 2022-03-16 14:19:50 -07:00
11824.txt proxycfg: ensure all of the watches are canceled if they are cancelable (#11824) 2021-12-13 15:56:17 -06:00
11826.txt Add changelog entry 2021-12-13 19:03:12 -07:00
11827.txt [OSS] Remove remaining references to master (#11827) 2022-01-20 12:47:50 +00:00
11850.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
11854.txt Update golang.org/x/net to address CVE-2021-44716 2021-12-15 11:58:48 -05:00
11855.txt Move changelog entry to match this PR 2021-12-15 09:16:43 -08:00
11868.txt ui: Fix up missing policy delete warning modal (#11868) 2021-12-21 06:40:55 +00:00
11891.txt ui: Remove any route level auth checks (#11891) 2021-12-21 07:51:52 +00:00
11892.txt ui: Various empty state improvements/fixups (#11892) 2021-12-21 06:49:18 +00:00
11895.txt connect: Upgrade Envoy 1.20 to 1.20.1 (#11895) 2022-01-18 14:35:27 -05:00
11903.txt ui: Ensure service instance data does not get re-written on blocking refresh (#11903) 2022-01-07 19:16:21 +00:00
11905.txt ui: Ensure disconnect error doesn't appear w/auth change on some pages (#11905) 2022-01-04 14:55:32 +00:00
11910.txt ca: add test cases for rotating external trusted CA 2022-02-17 18:21:30 -05:00
11918.txt changelog 2022-01-05 17:51:03 -05:00
11924.txt reset `coalesceTimer` to nil as soon as the event is consumed (#11924) 2022-01-05 12:17:47 -05:00
11926.txt cli: Show node identities in acl token list output (#11926) 2022-01-04 12:44:43 -08:00
11931.txt ui: Fix URL params decoding (#11931) 2022-01-04 16:08:06 +00:00
11937.txt ui: [BUGFIX] Fixes an issue when editing intentions from the service > intentions sub tab (#11937) 2022-01-07 19:09:40 +00:00
11940.txt clone the service under lock to avoid a data race (#11940) 2022-01-06 14:33:06 -05:00
11950.txt api: Return 404 when deregistering a non-existent check (#11950) 2022-01-06 12:38:37 -08:00
11956.txt Add changelog entry 2022-02-02 17:31:08 -08:00
11958.txt upgrade raft to v1.3.3 (#11958) 2022-01-06 14:09:13 -05:00
11959.txt ui: Fix dark borders on certain visualizations (#11959) 2022-01-07 16:15:22 +00:00
11960.txt Fix Windows logging to files (#11960) 2022-01-06 16:07:09 -05:00
11968.txt ui: Remove KV pre-flight auth check (#11968) 2022-01-07 19:26:54 +00:00
11979.txt ui: Ensure the partition is passed through to the request for the SSO auth URL (#11979) 2022-01-11 11:02:46 +00:00
11985.txt ui: Adds a notice for non-primary intention creation (#11985) 2022-01-12 11:50:09 +00:00
12042.txt Update memberlist to 0.3.1 (#12042) 2022-01-12 12:00:18 -05:00
12049.txt Add changelog note 2022-01-12 12:31:28 -08:00
12057.txt update serf to v0.9.7 (#12057) 2022-01-18 13:03:22 -05:00
12079.txt Fix incorrect severity syslog messages (#12079) 2022-04-14 15:51:00 -07:00
12080.txt streaming: split event buffer by key (#12080) 2022-01-28 12:27:00 +00:00
12081.txt ui: Fixup KV folder creation then further creation within that folder (#12081) 2022-01-19 10:09:25 +00:00
12098.txt Support for connect native services in topology view. (#12098) 2022-02-16 16:51:54 -05:00
12110.txt Make blockingQuery efficient with 'not found' results. 2022-02-15 18:24:33 -05:00
12126.txt Add support for 'Partition' and 'RetryJoin' (#12126) 2022-01-20 16:49:36 -05:00
12166.txt acl: remove unused methods on fakes, and add changelog 2022-01-31 17:53:53 -05:00
12174.txt xds: fix for delta xDS reconnect bug in LDS/CDS (#12174) 2022-01-25 11:24:27 -06:00
12176.txt Adding changelog entry 2022-01-24 12:32:22 -08:00
12195.txt Prevent xDS tight loop on cfg errors (#12195) 2022-02-10 15:37:36 -07:00
12209.txt ui: Alias all our Structure Icons to Flight Icons (#12209) 2022-02-02 13:24:47 +00:00
12223.txt Add changelog entry 2022-02-10 17:21:34 -07:00
12236.txt xds: allow only one outstanding delta request at a time (#12236) 2022-02-08 10:36:48 -06:00
12248.txt ui: Exclude Service Health from Node listing page (#12248) 2022-02-11 09:52:27 +00:00
12267.txt add changelog 2022-02-03 17:39:36 -05:00
12277.txt config-entry: fix a panic when registering a service or ingress gateway 2022-02-09 18:49:48 -05:00
12279.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
12298.txt Add changelog file 2022-03-01 09:25:52 +01:00
12302.txt fix race when starting a service while the agent `serviceManager` is … (#12302) 2022-02-10 13:30:49 -05:00
12305.txt ui: Replace CollapsibleNotices with more a11y focussed Disclosure component (#12305) 2022-02-18 17:16:03 +00:00
12307.txt server: partly fix config entry replication issue that prevents replication in some circumstances (#12307) 2022-02-23 17:27:48 -06:00
12308.txt Refactor to make ACL errors more structured. (#12308) 2022-02-11 12:53:23 -08:00
12311.txt add changelog for rpc metric improv project (#12709) 2022-04-07 11:35:06 -07:00
12315.txt ui: Stop ember-data overwriting SyncTimes (#12315) 2022-02-11 13:54:46 +00:00
12316.txt ui: Fixup displaying a Nspace default policy when expanding the preview pane (#12316) 2022-02-18 17:22:05 +00:00
12317.txt ui: Make sure saving intentions from topology includes the partition (#12317) 2022-02-11 13:58:01 +00:00
12321.txt server: conditionally avoid writing a config entry to raft if it was already the same (#12321) 2022-02-14 14:39:12 -06:00
12324.txt local: fixes a data race in anti-entropy sync (#12324) 2022-02-14 10:41:33 -06:00
12325.txt raft: update to v1.3.5 (#12325) 2022-02-14 13:48:52 -06:00
12329.txt auto-reload configuration when config files change (#12329) 2022-03-31 15:11:49 -04:00
12334.txt ui: Transition App Chrome to use new Disclosure Menus (#12334) 2022-02-21 12:22:59 +00:00
12354.txt ui: Add more explanatory texts for empty states (#12354) 2022-04-11 12:49:59 +01:00
12359.txt debug: limit the size of the trace 2022-02-15 14:15:34 -05:00
12362.txt server: suppress spurious blocking query returns where multiple config entries are involved (#12362) 2022-02-25 15:46:34 -06:00
12370.txt Parse datacenter from request (#12370) 2022-02-17 16:41:27 -05:00
12376.txt ci: combine 'enhancement' entry type with 'improvement' (#12376) 2022-02-17 19:21:47 -08:00
12385.txt Add changelog note 2022-02-17 12:17:12 -08:00
12399.txt Add per-node max indexes (#12399) 2022-06-23 11:13:25 -04:00
12400.txt Added changelog 2022-02-25 19:29:00 +05:30
12442.txt Adds changelog 2022-02-25 15:43:06 +00:00
12443.txt connect: Upgrade Envoy 1.20 to 1.20.2 (#12443) 2022-02-24 16:19:39 -08:00
12444.txt catalog: compare node names case insensitively in more places (#12444) 2022-02-24 16:54:47 -06:00
12449.txt Add changelog entry 2022-02-24 17:05:55 -08:00
12461.txt ui: Native CSS Icon Composition (#12461) 2022-03-15 12:54:14 +00:00
12470.txt Bulk acl message fixup oss (#12470) 2022-03-10 18:48:27 -08:00
12478.txt ui: List Primary and Local DCs first in the Datacenter selector (#12478) 2022-03-07 10:54:12 +00:00
12479.txt ui: Fix loading icon size (adds a viewbox) (#12479) 2022-03-07 10:13:56 +00:00
12496.txt raft: upgrade to v1.3.6 (#12496) 2022-03-02 17:00:02 -06:00
12504.txt Support per-listener TLS configuration ⚙️ (#12504) 2022-03-18 10:46:58 +00:00
12511.txt server: ensure that service-defaults meta is incorporated into the discovery chain response (#12511) 2022-03-30 10:04:18 -05:00
12512.txt server: fix spurious blocking query suppression for discovery chains (#12512) 2022-03-03 16:54:41 -06:00
12522.txt agent: convert listener config to TLS types (#12522) 2022-03-24 15:32:25 -04:00
12529.txt Code review changes 2022-03-07 14:39:33 -05:00
12535.txt lib: add validation package + DNS label validation (#12535) 2022-03-17 18:31:28 -07:00
12565.txt Creating a changelog entry for #12565 (#12699) 2022-04-05 15:55:14 -04:00
12567.txt Add source of authority annotations to the PermissionDeniedError output. (#12567) 2022-03-18 10:32:25 -07:00
12573.txt add changelog for rpc metric improv project (#12709) 2022-04-07 11:35:06 -07:00
12583.txt Add IAM Auth Method (#12583) 2022-03-31 10:18:48 -05:00
12601.txt xds: adding control of the mesh-wide min/max TLS versions and cipher suites from the mesh config entry (#12601) 2022-03-30 13:43:59 -05:00
12607.txt Fix leaked Vault LifetimeRenewers (#12607) 2022-03-28 09:58:16 -05:00
12617.txt Enable running autopilot state updates on all servers (#12617) 2022-04-07 10:48:48 -04:00
12640.txt health: ensure /v1/health/service/:service endpoint returns the most recent results when a filter is used with streaming (#12640) 2022-04-27 10:39:45 -05:00
12646.txt Update raft-boltdb to pull in new writeCapacity metric (#12646) 2022-03-30 11:38:44 -04:00
12655.txt Avoid using sys/mounts to enable namespaces (#12655) 2022-03-31 23:35:38 -07:00
12670.txt Add expanded token read flag and endpoint option 2022-03-31 10:49:49 -07:00
12672.txt Add changelog note 2022-03-31 14:05:02 -07:00
12675.txt mark disable_compat_1.9 to deprecate in 1.13, change default to true (#12675) 2022-04-01 10:35:56 -07:00
12678.txt WatchRoots gRPC endpoint (#12678) 2022-04-05 15:26:14 +01:00
12681.txt Tweak the Lambda Envoy configuration generated by the serverless patcher 2022-04-01 11:13:44 -04:00
12685.txt Add a field to disable following redirects on http checks 2022-04-05 16:12:18 -07:00
12695.txt Update .changelog/12695.txt 2022-04-05 09:08:37 -07:00
12711.txt xds: ensure that all connect timeout configs can apply equally to tproxy direct dial connections (#12711) 2022-04-07 16:58:21 -05:00
12722.txt UDP check for service stanza #12221 (#12722) 2022-06-06 15:13:19 -04:00
12725.txt improve error msg for deregister critical service 2022-04-07 14:50:02 -07:00
12727.txt add more labels to RequestRecorder (#12727) 2022-04-12 10:50:25 -07:00
12739.txt deps: update to latest go-discover (#12739) 2022-04-12 13:41:12 -05:00
12774.txt acl: Adjust region handling in AWS IAM auth method (#12774) 2022-04-13 14:31:37 -05:00
12777.txt connect: Add Envoy 1.21.1 to support matrix, remove 1.17.4 (#12777) 2022-04-14 10:44:42 -07:00
12786.txt ui: Adds support for AWS-IAM Auth Methods (#12786) 2022-04-14 17:13:13 +01:00
12787.txt ConnectCA.Sign gRPC Endpoint (#12787) 2022-04-14 14:26:14 +01:00
12791.txt add queryBackend to the api query meta. (#12791) 2022-04-14 12:48:19 -04:00
12793.txt Update 12793.txt 2022-04-14 14:57:47 -07:00
12797.txt acl: Fix tag parsing for IAM users and roles in IAM auth method (#12797) 2022-04-14 16:45:35 -05:00
12805.txt connect: Add Envoy 1.22 to integration tests, remove Envoy 1.18 (#12805) 2022-04-18 09:36:07 -07:00
12807.txt acl: Clarify node/service identities must be lowercase (#12807) 2022-04-21 09:29:16 -07:00
12808.txt Update go version to 1.18.1 2022-04-18 11:41:10 -04:00
12819.txt Implement the ServerDiscovery.WatchServers gRPC endpoint (#12819) 2022-04-21 12:56:18 -04:00
12820.txt ca: fix a bug that caused a non blocking leaf cert query after a blocking leaf cert query to block (#12820) 2022-04-20 12:21:47 -05:00
12825.txt [OSS] gRPC call to get envoy bootstrap params (#12825) 2022-04-19 17:24:21 -07:00
12844.txt update raft to v1.3.8 (#12844) 2022-04-25 10:19:26 -04:00
12846.txt add changelog entry 2022-04-22 13:13:11 -04:00
12865.txt Upgrade Raft to v1.3.9 for saturation metrics (#12865) 2022-04-27 17:17:31 +01:00
12878.txt Docs and changelog edits 2022-05-04 08:50:59 -07:00
12881.txt Validate port on mesh service registration (#12881) 2022-05-05 09:13:30 -07:00
12885.txt Return ACLRemoteError from cache and test it correctly 2022-05-03 10:05:26 -07:00
12890.txt Add changelog entry for #12890 2022-10-05 13:35:07 -04:00
12904.txt Support vault namespaces in connect CA (#12904) 2022-05-04 19:41:55 -07:00
12905.txt Middleware: `RequestRecorder` reports calls below 1ms as decimal value (#12905) 2022-09-15 13:04:37 -04:00
12914.txt api: add the ability to specify a path prefix (#12914) 2022-05-19 16:07:59 -07:00
12935.txt acl: gRPC login and logout endpoints (#12935) 2022-05-04 17:38:45 +01:00
12956.txt Support making requests to lambda from connect proxies. 2022-05-05 17:42:30 -04:00
12961.txt Changelog 2022-05-09 10:07:19 -07:00
13001.txt Add support for merge-central-config query param (#13001) 2022-05-25 13:20:17 -07:00
13012.txt Watch the singular service resolver instead of the list + filtering to 1 (#13012) 2022-05-12 16:34:17 -04:00
13023.txt [1.16.x] Fix topology view when displaying mixed connect-native/normal services. (#18330) 2023-07-31 10:00:40 -04:00
13051.txt Update go-grpc/grpc to resolve conection memory leak 2022-06-08 11:29:29 +01:00
13062.txt upgrade serf to v0.9.8 (#13062) 2022-05-16 14:13:23 -04:00
13071.txt When a host header is defined override `req.Host` in the metrics ui (#13071) 2022-05-13 14:05:22 -04:00
13091.txt Retry on bad dogstatsd connection (#13091) 2022-05-19 16:03:46 -04:00
13118.txt config: prevent top-level `verify_incoming` enabling mTLS on gRPC port (#13118) 2022-05-18 16:15:57 +01:00
13127.txt fix: multiple grpc/http2 services for ingress listeners 2022-05-26 10:43:58 -04:00
13143.txt Specify go_package explicitly 2022-05-24 10:22:53 -07:00
13183.txt ui: Icon related fixups (#13183) 2022-05-25 14:28:42 +01:00
13256.txt Revert getPathSuffixUnescaped (#13256) 2022-06-01 13:17:14 -04:00
13304.txt Add isLeader metric to track if a server is a leader (#13304) 2022-06-03 13:07:37 -04:00
13344.txt Fix KVSGet method to handle QueryOptions properly (#13344) 2022-06-02 12:26:18 -04:00
13357.txt Add changelog 2022-06-09 17:04:05 -07:00
13388.txt chore: changelog 2022-06-07 18:48:39 +01:00
13394.txt ui: upgrade ember composable helper (#13394) 2022-06-08 16:07:51 +01:00
13409.txt ui: Fix intl keys in order to render correct messages for empty states (#13409) 2022-06-16 12:07:04 +01:00
13421.txt Add changelog note 2022-06-10 12:05:05 -07:00
13431.txt connect: Update Envoy support matrix to latest patch releases (#13431) 2022-06-14 13:19:09 -07:00
13450.txt [OSS] Support merge-central-config option in node services list API (#13450) 2022-06-15 08:30:31 -07:00
13481.txt Add changelog note 2022-06-16 18:26:25 -07:00
13493.txt Fix Consul KV CLI 'GET' flags 'keys' and 'recurse' to be set together (#13493) 2022-08-25 18:21:49 -04:00
13532.txt no 1.9 style metrics (#13532) 2022-06-29 09:46:37 -07:00
13607.txt Fix spelling mistake in serverless patcher (#13607) 2022-06-29 15:21:21 -04:00
13613.txt chore: changelog for destinations 2022-08-02 10:48:00 -04:00
13658.txt Changelog entry 2022-07-04 10:48:36 +01:00
13677.txt feat(cli): enable to delete config entry from an input file (#13677) 2022-07-11 10:13:40 -04:00
13686.txt ui: CopyableCode component (#13686) 2022-07-07 17:42:47 +01:00
13687.txt server: broadcast the public grpc port using lan serf and update the consul service in the catalog with the same data (#13687) 2022-07-07 13:55:41 -05:00
13699.txt Add changelog note 2022-07-08 15:23:00 -07:00
13722.txt Changelog entry 2022-07-14 18:22:12 +01:00
13782.txt Update go-discover to support ECS discovery (#13782) 2023-01-12 12:06:29 -06:00
13787.txt Fix panic on acl token read with -self and -expanded 2022-07-18 15:52:05 -07:00
13807.txt connect: Add support for Envoy 1.23, remove 1.19 (#13807) 2022-07-19 14:51:04 -07:00
13847.txt Add changelog note 2022-07-22 10:33:50 -07:00
13958.txt Update ingress/terminating wildcard logic and handle destinations 2022-08-05 07:56:10 -07:00
13998.txt Change changelog message 2022-08-30 17:00:11 +02:00
14021.txt ui: Ensure we dispatch validation state (#14021) 2022-08-08 11:12:40 +01:00
14034.txt Allow uppercase in proxy launch -sidecar-for arg 2022-08-05 10:55:22 -07:00
14081.txt Close active listeners on error 2022-08-09 12:22:39 -04:00
14119.txt Add changelog entry for peering fix (#14160) 2022-08-11 16:23:02 -07:00
14132.txt Leadership transfer cmd (#14132) 2022-11-14 15:35:12 -05:00
14149.txt Handle breaking change for ServiceVirtualIP restore (#14149) 2022-08-11 14:47:10 -04:00
14161.txt feat(telemetry): add labels to serf and memberlist metrics (#14161) 2022-08-11 22:09:56 -04:00
14162.txt Add `Targets` field to service resolver failovers. (#14162) 2022-08-15 09:20:25 -04:00
14178.txt Refactor failover code to use Envoy's aggregate clusters (#14178) 2022-08-12 14:30:46 -04:00
14233.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
14238.txt Add additional parameters to envoy passive health check config (#14238) 2022-09-01 09:59:11 -07:00
14244.txt Remove empty tags 2 (#16113) 2023-02-06 11:12:43 -08:00
14269.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
14285.txt Add changelog 2022-08-22 13:42:13 -04:00
14290.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
14340.txt Add support for configuring Envoys route idle_timeout (#14340) 2022-11-29 17:43:15 -05:00
14343.txt ui: Use credentials for all HTTP API requests (#14343) 2022-09-01 18:15:06 +01:00
14356.txt Configure Envoy alpn_protocols based on service protocol (#14356) 2022-10-10 13:13:56 -07:00
14364.txt docs: fix missing bugfix changelog entries 2022-09-22 16:10:40 -04:00
14373.txt Update max_ejection_percent on outlier detection for peered clusters to 100% (#14373) 2022-08-29 13:46:41 -04:00
14378.txt Fix a breaking change to the API package introduced in #13835 (#14378) 2022-08-29 16:59:27 -04:00
14395.txt Config-entry: Support proxy config in service-defaults (#14395) 2022-09-12 10:41:58 -04:00
14396.txt Finish up cluster peering failover (#14396) 2022-08-30 11:46:34 -04:00
14397.txt xDS Load Balancing (#14397) 2022-09-09 15:02:01 +01:00
14423.txt feat(cli): add initial peering cli commands 2022-09-01 17:20:13 -04:00
14429.txt changelog: fix missing backtick (#14663) 2022-09-16 11:30:06 -07:00
14433.txt Use proxy address for default check (#14433) 2022-09-01 14:03:35 -07:00
14437.txt Allow Operator Generated bootstrap token (#14437) 2023-01-04 20:19:33 +00:00
14445.txt Implement Cluster Peering Redirects (#14445) 2022-09-09 13:58:28 -04:00
14465.txt Support RFC 2782 for prepared query DNS lookups (#14465) 2022-11-20 17:21:24 -05:00
14474.txt Add kv txn get-not-exists operation. 2022-09-06 10:28:59 -05:00
14475.txt add non-double-prefixed metrics (#14193) 2022-09-09 12:13:43 -05:00
14495.txt ui: Detect token in a cookie and passthrough (#14495) 2022-09-08 11:43:39 +01:00
14516.txt Update intermediate pki mount/role when reconfiguring Vault provider 2022-09-13 15:42:26 -07:00
14521.txt Reuse http.DefaultTransport in UIMetricsProxy (#14521) 2022-09-08 11:02:05 -04:00
14527.txt ui: Amends to existing topology notice/banner texts (#14527) 2022-09-29 09:39:06 -07:00
14556.txt Add changelog entry 2022-09-16 17:57:10 -06:00
14563.txt feat(peering): validate server name conflicts on establish 2022-09-14 11:37:30 -04:00
14573.txt connect: Bump latest Envoy to 1.23.1 in test matrix (#14573) 2022-09-14 13:20:16 -07:00
14577.txt Add input validation for auto-config JWT authorization checks. 2022-09-13 11:16:36 -05:00
14579.txt Add CSR check for number of URIs. (#14579) 2022-09-13 14:21:47 -05:00
14598.txt Add changelog note 2022-09-15 12:59:16 -07:00
14599.txt increase the size of txn to support vault (#14599) 2022-09-19 09:07:19 -07:00
14604.txt ui: Add merge-central-config to relevant HTTP requests (#14604) 2022-09-20 10:33:19 +01:00
14606.txt ui: Completely remove the Overview routes when running the UI in HCP (#14606) 2022-09-14 19:39:50 +01:00
14616.txt Add envoy connection balancing. (#14616) 2022-09-26 11:29:06 -05:00
14619.txt [BUGFIX] Do not use interval as timeout (#14619) 2022-09-15 12:39:48 -04:00
14679.txt Consul 1.14 post-release updates (#15382) 2022-11-15 14:22:43 -06:00
14723.txt add HCP integration component (#14723) 2022-09-26 14:58:15 -04:00
14724.txt Support Stale Queries for Trust Bundle Lookups (#14724) 2022-09-28 09:56:59 -07:00
14747.txt Add changelog entry 2022-10-10 13:35:12 -06:00
14749.txt feat(ingress gateway: support configuring limits in ingress-gateway c… (#14749) 2022-09-28 14:56:46 -04:00
14751.txt Fix explicit tproxy listeners with discovery chains. (#14751) 2022-10-05 14:38:25 -05:00
14796.txt Add changelog entry 2022-10-07 09:54:08 -06:00
14797.txt Add exported services event to cluster peering replication. (#14797) 2022-09-29 15:37:19 -04:00
14800.txt Extend tcp keepalive settings to work for terminating gateways as well 2022-10-14 17:05:46 -07:00
14811.txt Adding changelog 2022-09-29 22:25:10 -07:00
14817.txt Make the mesh gateway changes to allow `local` mode for cluster peering data plane traffic (#14817) 2022-10-06 09:54:14 -04:00
14831.txt connect: Bump Envoy 1.20 to 1.20.7, 1.21 to 1.21.5 and 1.22 to 1.22.5 (#14831) 2022-10-04 13:15:01 -07:00
14832.txt autoencrypt: helpful error for clients with wrong dc (#14832) 2022-10-25 10:13:41 -07:00
14833.txt config entry: hardcode proxy-defaults name as global (#14833) 2022-10-25 10:55:15 -07:00
14854.txt Rename `PeerName` to `Peer` on prepared queries and exported services (#14854) 2022-10-04 14:46:15 -04:00
14869.txt Merge central config for GetEnvoyBootstrapParams (#14869) 2022-10-10 12:40:27 -05:00
14873.txt Upgrade serf to v0.10.1 and memberlist to v0.5.0 to get memberlist size metrics and broadcast queue depth metric (#14873) 2022-10-04 17:51:37 -06:00
14885.txt fix: missing UDP field in checkType (#14885) 2022-10-05 15:57:21 -04:00
14889.txt Add remote peer partition and datacenter info. 2022-10-13 10:37:41 -05:00
14897.txt bump raft version to v1.3.11 (#14897) 2022-10-12 08:51:52 -04:00
14903.txt ui: Remove node name from agentless service instance (#14903) 2022-10-07 04:01:34 -06:00
14908.txt cache: prevent goroutine leak in agent cache (#14908) 2022-10-17 14:38:10 -05:00
14916.txt bug: fix goroutine leaks caused by incorrect usage of `WatchCh` (#14916) 2022-10-13 12:04:27 +01:00
14921.txt ui: hide node name and meta on agentless instances (#14921) 2022-10-11 09:59:53 -06:00
14922.txt gRPC server metrics (#14922) 2022-10-11 17:00:32 -05:00
14924.txt Service http checks data source for agentless proxies (#14924) 2022-10-12 07:49:56 -07:00
14933.txt cli: Add -node-name flag to redirect-traffic command (#14933) 2022-10-12 11:53:41 -06:00
14934.txt perf: remove expensive reflection from xDS hot path (#14934) 2022-10-14 10:26:42 +01:00
14935.txt Add changelog entry 2022-10-13 16:09:32 -06:00
14936.txt adding configuration option cloud.scada_address (#14936) 2022-10-13 11:31:28 +02:00
14947.txt Add changelog for peers detail page 2022-10-13 16:45:03 +02:00
14956.txt cache: refactor agent cache fetching to prevent unnecessary fetches on error (#14956) 2022-10-25 10:27:26 -05:00
14957.txt Add consul.xds.server.streamStart metric (#14957) 2022-10-12 14:17:58 -05:00
14960.txt proxycfg: rate-limit delivery of config snapshots (#14960) 2022-10-14 15:52:00 +01:00
14962.txt xds: properly merge central config for "agentless" services (#14962) 2022-10-13 12:04:59 +01:00
14965.txt Refactor client RPC timeouts (#14965) 2022-10-18 15:05:09 -04:00
14970.txt Add changelog 2022-10-12 17:16:01 -06:00
14971.txt Add changelog 2022-10-13 10:43:57 -06:00
14981.txt Add changelog entry 2022-10-13 16:03:15 -06:00
14986.txt Add changelog entry 2022-10-13 18:54:39 -06:00
15001.txt ingress-gateways: don't log error when registering gateway (#15001) 2022-10-25 10:55:44 -07:00
15005.txt ca: fix a masked bug in leaf cert generation that would not be notified of root cert rotation after the first one (#15005) 2022-10-17 13:24:27 -05:00
15035.txt Warn instead of returning an error when intermediate mount tune permission is missing 2022-10-18 12:01:25 -07:00
15050.txt cli/sdk: Allow redirection to a different consul dns port (#15050) 2022-10-21 13:15:32 -06:00
15065.txt changelog 2022-10-19 16:37:50 -04:00
15068.txt Add changelog 2022-10-20 14:32:42 -04:00
15083.txt Avoid blocking child type updates on parent ack (#15083) 2022-11-07 18:10:42 -07:00
15090.txt Add changelog 2022-10-24 16:12:08 -04:00
15093.txt connect: Add Envoy 1.24 to integration tests, remove Envoy 1.20 (#15093) 2022-10-31 10:50:45 -05:00
15107.txt fix: return error when config file with unknown extension is passed (#15107) 2023-01-04 16:57:00 -08:00
15108.txt fix(peering): replicating wan address (#15108) 2022-10-24 15:44:57 -04:00
15155.txt Allow consul debug on non-ACL consul servers (#15155) 2022-10-27 09:25:18 -04:00
15160.txt fix(peering): nil pointer in calling handleUpdateService (#15160) 2022-10-26 11:50:34 -04:00
15178.txt Fix peering metrics bug (#15178) 2022-10-28 10:51:12 -04:00
15186.txt Fix mesh gateway configuration with proxy-defaults (#15186) 2022-11-09 10:14:29 -06:00
15233.txt integ test: reduce flakiness due to compound output from retry (#15233) 2022-11-02 14:08:17 -04:00
15253.txt Clarify Vault CA changelog entry (#15662) 2022-12-02 20:16:49 -05:00
15272.txt fix(mesh-gateway): remove deregistered service from mesh gateway (#15272) 2022-11-07 20:30:15 -05:00
15274.txt Fixing CLI ACL token processing unexpected precedence (#15274) 2022-12-02 12:19:52 -05:00
15297.txt removes ioutil usage everywhere which was deprecated in go1.16 (#15297) 2022-11-10 10:26:01 -06:00
15302.txt update config defaults, add docs (#15302) 2022-11-09 09:29:55 -08:00
15317.txt update ACLs for cluster peering (#15317) 2022-11-09 13:02:58 -08:00
15320.txt connect: strip port from DNS SANs for ingress gateway leaf cert (#15320) 2022-11-14 10:27:03 -08:00
15339.txt Prevent serving TLS via ports.grpc (#15339) 2022-11-11 14:29:22 -06:00
15346.txt grpc/acl: relax permissions required for "core" endpoints (#15346) 2023-01-04 12:40:34 +00:00
15356.txt Ensure that NodeDump imported nodes are filtered (#15356) 2022-11-14 12:35:20 -07:00
15370.txt auto-config: relax node name validation for JWT authorization (#15370) 2022-11-14 18:24:40 -06:00
15423.txt Fix SDK to support older versions of Consul. (#15423) 2022-11-18 10:32:01 -06:00
15466.txt Fix issue with connect Envoy choosing incorrect TLS settings. (#15466) 2022-11-18 14:36:20 -06:00
15503.txt fix(peering): increase the gRPC limit to 8MB (#15503) 2022-11-28 17:48:43 -05:00
15525.txt Fix Vault managed intermediate PKI bug (#15525) 2022-11-28 16:17:58 -05:00
15541.txt Use rpcHoldTimeout to calculate blocking timeout (#15541) 2022-11-24 10:13:02 -05:00
15555.txt ui: Add ServerExternalAddresses to peer token create form (#15555) 2022-11-30 11:42:36 -07:00
15596.txt Add peering `.service` and `.node` DNS lookups. (#15596) 2022-11-29 12:23:18 -06:00
15598.txt Deprecate -join and -join-wan (#15598) 2022-12-14 20:28:25 +00:00
15610.txt Remove log line about server mgmt token init (#15610) 2022-11-29 17:56:03 -05:00
15614.txt feat(ingress-gateway): support outlier detection of upstream service for ingress gateway (#15614) 2022-12-13 11:51:37 -05:00
15615.txt peering: better represent non-passing states during peer check flattening (#15615) 2022-11-30 11:29:21 -06:00
15654.txt Export peering cli (#15654) 2023-05-31 14:27:35 -04:00
15659.txt connect: Add support for ConsulResolver to specifies a filter expression (#15659) 2022-12-14 12:41:07 -08:00
15661.txt Detect Vault 1.11+ import in secondary datacenters and update default issuer (#15661) 2022-12-05 15:39:21 -06:00
15669.txt connect: ensure all vault connect CA tests use limited privilege tokens (#15669) 2022-12-06 10:06:36 -06:00
15690.txt Fix local mesh gateway with peering discovery chains. (#15690) 2022-12-07 13:07:42 -06:00
15697.txt Enforce lowercase peer names. (#15697) 2023-01-13 14:20:28 -06:00
15701.txt Add custom balancer to always remove subConns (#15701) 2022-12-19 17:39:31 +00:00
15705.txt [OSS] security: update x/net module (#15737) 2022-12-08 16:45:44 -05:00
15710.txt Remove the `connect.enable_serverless_plugin` agent configuration option (#15710) 2022-12-08 14:46:42 -05:00
15737.txt [OSS] security: update x/net module (#15737) 2022-12-08 16:45:44 -05:00
15760.txt Fix DialedDirectly configuration for Consul dataplane. (#15760) 2022-12-13 09:16:31 -06:00
15769.txt agent: Fix assignment of error when auto-reloading cert and key file changes. (#15769) 2022-12-12 12:24:39 -07:00
15789.txt xds: don't attempt to load-balance sessions for local proxies (#15789) 2023-01-18 12:33:21 -06:00
15794.txt Error out `consul connect envoy` if agent explicitly disabled grpc (#15794) 2022-12-19 14:37:27 -05:00
15817.txt extensions: refactor serverless plugin to use extensions from config entry fields (#15817) 2022-12-19 12:19:37 -08:00
15818.txt Enhancement: Consul Compatibility Checking (#15818) 2022-12-20 09:58:19 -08:00
15828.txt Add new config_file_service_registration token (#15828) 2023-01-10 10:24:02 -06:00
15833.txt Fix incorrect protocol check on discovery chains with peer targets. (#15833) 2022-12-20 10:15:03 -06:00
15864.txt docs(access logs): new docs for access logging (#15948) 2023-01-11 16:41:02 +00:00
15865.txt Fix issue with incorrect proxycfg watch on upstream peer-targets. (#15865) 2023-01-03 10:44:08 -06:00
15866.txt Fix agent cache incorrectly notifying unchanged protobufs. (#15866) 2023-01-03 10:11:56 -06:00
15884.txt Output user-friendly name for anonymous token (#15884) 2023-01-09 12:28:53 -06:00
15892.txt grpc: switch servers and retry on error (#15892) 2023-01-05 10:21:27 +00:00
15906.txt Add the Lua Envoy extension (#15906) 2023-01-06 12:13:40 -05:00
15913.txt Fix issue where TLS configuration was ignored for unix sockets in consul connect envoy. (#15913) 2023-01-06 12:34:49 -06:00
15922.txt Remove legacy acl policies (#15922) 2023-02-06 15:35:52 +00:00
15947.txt Remove legacy acl tokens (#15947) 2023-01-27 09:17:07 -06:00
15956.txt [OSS] Add Peer field to service-defaults upstream overrides (#15956) 2023-02-03 10:51:53 -05:00
15967.txt Warn if ACL is enabled but no token is provided to Envoy (#15967) 2023-01-16 12:31:56 -05:00
15970.txt Support Vault agent auth config for AWS/GCP CA provider auth (#15970) 2023-01-18 11:53:04 -08:00
15979.txt Support Envoy's MaxEjectionPercent and BaseEjectionTime config entries for passive health checks (#15979) 2023-04-26 15:59:48 -07:00
15987.txt api: enable query options on agent force-leave endpoint (#15987) 2023-04-18 11:31:48 -05:00
15988.txt Add a flag for enabling debug logs to the `connect envoy` command (#15988) 2023-01-31 13:30:20 -08:00
16000.txt Fix configuration merging for implicit tproxy upstreams. (#16000) 2023-01-18 13:43:53 -06:00
16009.txt Warn when the token query param is used for auth (#16009) 2023-01-24 16:21:41 +00:00
16015.txt Add support for envoy readiness flags (#16015) 2023-01-19 16:54:11 -05:00
16024.txt Apply agent partition to load services and agent api (#16024) 2023-01-20 12:59:26 -05:00
16044.txt Update token language to distinguish Accessor and Secret ID usage (#16044) 2023-02-07 12:26:30 -06:00
16097.txt Use agent token for service/check deregistration during anti-entropy (#16097) 2023-02-03 08:45:11 -06:00
16105.txt ACL error improvements: incomplete bootstrapping and non-existent token (#16105) 2023-02-08 23:49:44 +00:00
16176.txt Adding experimental support for a more efficient LogStore implementation (#16176) 2023-02-08 16:50:22 +00:00
16204.txt UI: CC-4032 - Update sidebar width (#16204) 2023-02-13 11:48:31 -07:00
16205.txt Add the `operator usage instances` command and api endpoint (#16205) 2023-02-08 12:07:21 -08:00
16224.txt support vault auth config for alicloud ca provider 2023-03-07 03:02:05 +00:00
16227.txt [UI]: update Ember to 3.27 (#16227) 2023-02-10 13:32:19 -08:00
16230.txt Fix peering acceptors in secondary datacenters. (#16230) 2023-02-10 09:47:17 -06:00
16251.txt [UI] CC-4031: change from Action, a and button to hds::Button (#16251) 2023-02-22 13:05:15 -08:00
16257.txt Fix mesh gateways incorrectly matching peer locality. (#16257) 2023-02-16 09:22:41 -06:00
16259.txt add provider ca support for approle auth-method 2023-03-03 19:29:53 +00:00
16262.txt add provider ca auth support for kubernetes 2023-03-02 22:05:40 +00:00
16263.txt [OSS] security: update go to 1.20.1 (#16263) 2023-02-17 15:04:12 -05:00
16266.txt add provider ca support for jwt file base auth 2023-03-02 20:33:06 +00:00
16274.txt [OSS] connect: Bump Envoy 1.22.5 to 1.22.7, 1.23.2 to 1.23.4, 1.24.0 to 1.24.2, add 1.25.1, remove 1.21.5 (#16274) 2023-02-15 11:45:43 -05:00
16284.txt new docs for consul and consul-k8s troubleshoot command (#16284) 2023-02-17 13:25:49 -08:00
16288.txt Improve ux to help users avoid overwriting fields of ACL tokens, roles and policies (#16288) 2023-03-01 15:00:37 -05:00
16292.txt add server side rate-limiter changelog entry (#16292) 2023-02-16 19:21:50 +00:00
16298.txt add provider ca auth-method support for azure 2023-03-01 00:07:33 +00:00
16301.txt fix: add tls config to unix socket when https is used (#16301) 2023-02-21 08:28:13 -05:00
16339.txt Fix issue with peer services incorrectly appearing as connect-enabled. (#16339) 2023-02-21 13:59:36 -06:00
16358.txt Upgrade Alpine image to 3.17 (#16358) 2023-02-22 10:09:41 -06:00
16369.txt Add changelog entry for API Gateway (Beta) (#16369) 2023-02-22 13:10:05 -06:00
16412.txt feat: update alerts to Hds::Alert component (CC-4035) (#16412) 2023-02-24 20:07:12 -08:00
16428.txt fix: ui tests run is fixed (applying class attribute twice to the hbs element caused the issue (#16428) 2023-02-24 23:46:45 -08:00
16444.txt UI: Fix rendering issue in search and lists (#16444) 2023-02-27 16:31:47 -07:00
16445.txt cli: ensure acl token read -self works (#16445) 2023-02-28 10:58:29 -06:00
16485.txt fix (cli): return error msg if acl policy not found (#16485) 2023-03-01 19:50:03 +00:00
16495.txt Add ServiceResolver RequestTimeout for route timeouts to make TerminatingGateway upstream timeouts configurable (#16495) 2023-03-03 09:37:12 -05:00
16497.txt proxycfg: ensure that an irrecoverable error in proxycfg closes the xds session and triggers a replacement proxycfg watcher (#16497) 2023-03-03 14:27:53 -06:00
16498.txt Fix issue where terminating gateway service resolvers weren't properly cleaned up (#16498) 2023-03-03 09:56:57 -05:00
16499.txt Fix resolution of service resolvers with subsets for external upstreams (#16499) 2023-03-03 14:17:11 -05:00
16506.txt Improve ux around ACL token to help users avoid overwriting node/service identities (#16506) 2023-03-06 15:00:39 +00:00
16508.txt Add some basic UI improvements for api-gateway services (#16508) 2023-03-03 16:59:04 -05:00
16512.txt NET-2903 Normalize weight for http routes (#16512) 2023-03-03 16:39:59 -05:00
16519.txt feat: update notification to use hds toast component (#16519) 2023-03-06 14:10:09 -08:00
16530.txt Follow-up fixes to consul connect envoy command (#16530) 2023-03-06 10:32:06 -05:00
16531.txt NET-2904 Fixes API Gateway Route Service Weight Division Error 2023-03-06 08:41:57 -05:00
16552.txt perf: Remove expensive reflection from raft/mesh hot path (#16552) 2023-05-26 11:42:05 -06:00
16570.txt fix bug that can lead to peering service deletes impacting the state of local services (#16570) 2023-03-08 11:24:03 -05:00
16574.txt UI: Fix htmlsafe errors throughout the app (#16574) 2023-03-09 12:43:35 -07:00
16577.txt feat: update typography to consume hds styles (#16577) 2023-03-14 19:49:14 -07:00
16585.txt Allow HCP metrics collection for Envoy proxies 2023-03-10 13:52:54 -07:00
16592.txt Preserve CARoots when updating Vault CA configuration (#16592) 2023-03-13 17:32:59 -04:00
16647.txt Snapshot restore tests (#16647) 2023-03-18 14:43:22 -06:00
16649.txt Adds check to verify that the API Gateway is being created with at least one listener 2023-03-20 12:37:30 -04:00
16660.txt fix: add AccessorID property to PUT token request (#16660) 2023-03-16 18:57:59 -07:00
16661.txt [API Gateway] Fix invalid cluster causing gateway programming delay (#16661) 2023-03-17 13:31:04 -04:00
16673.txt peering: peering partition failover fixes (#16673) 2023-03-20 10:00:29 -07:00
16700.txt Changelog for audit logging fix. (#16700) 2023-03-22 13:06:53 -07:00
16729.txt fix bug where pqs that failover to a cluster peer dont un-fail over (#16729) 2023-03-22 09:24:13 -04:00
16754.txt Bump the golang.org/x/net to 0.7.0 to address CVE-2022-41723 (#16754) 2023-04-18 17:31:08 +00:00
16776.txt Allow dialer to re-establish terminated peering (#16776) 2023-04-03 12:07:45 -06:00
16781.txt Fix struct tags for TCPService enterprise meta (#16781) 2023-03-27 16:17:04 +00:00
16789.txt Update normalization of route refs (#16789) 2023-03-28 11:23:49 -04:00
16818.txt Revert "cache: refactor agent cache fetching to prevent unnecessary f… (#16818) (#17046) 2023-04-19 13:17:21 -05:00
16845.txt Resolves issue-16844 - systemd notify by default (#16845) 2023-06-02 10:04:48 -07:00
16871.txt Memdb Txn Commit race condition fix (#16871) 2023-04-12 13:18:01 -04:00
16877.txt Wasm Envoy HTTP extension (#16877) 2023-04-06 14:12:07 -07:00
16889.txt Update list of Envoy versions (#16889) 2023-04-12 17:43:15 -04:00
16916.txt Update HCP bootstrapping to support existing clusters (#16916) 2023-04-27 22:27:39 +02:00
16957.txt Remove deprecated service-defaults upstream behavior. (#16957) 2023-04-11 10:20:33 -05:00
17035.txt Permissive mTLS (#17035) 2023-04-19 14:45:00 -05:00
17038.txt hoststats: add package for collecting host statistics including cpu memory and disk usage (#17038) 2023-05-30 18:43:29 +00:00
17048.txt Avoid decoding nil pointer in map walker (#17048) 2023-04-19 10:23:38 -07:00
17055.txt [API Gateway] Fix use of virtual resolvers in HTTPRoutes (#17055) 2023-05-31 16:58:40 -04:00
17066.txt Remove artificial ACLTokenMaxTTL limit for configuring acl token expiry (#17066) 2023-04-28 10:57:30 -05:00
17075.txt Backport of agent: remove agent cache dependency from service mesh leaf certificate management into release/1.16.x (#17704) 2023-06-13 16:12:43 +00:00
17081.txt Bump raft to 1.5.0 (#17081) 2023-04-21 20:13:55 +01:00
17086.txt Add ACLs Enabled field to consul agent startup status message (#17086) 2023-05-16 13:47:02 -05:00
17115.txt APIGW: Update how status conditions for certificates are handled (#17115) 2023-04-27 15:54:44 +00:00
17138.txt enable auto-tidy expired issuers in vault (as CA) 2023-05-03 20:30:37 +00:00
17160.txt Fix a bug that wrongly trims domains when there is an overlap with DC 1.16.x (#18164) 2023-07-18 10:03:41 -04:00
17171.txt agent: prevent very old servers re-joining a cluster with stale data (#17171) 2023-05-15 04:05:47 -07:00
17179.txt peering: ensure that merged central configs of peered upstreams for partitioned downstreams work (#17179) 2023-04-28 12:36:08 -05:00
17183.txt Permissive mTLS: Config entry filtering and CLI warnings (#17183) 2023-04-28 12:51:36 -05:00
17185.txt fix panic in `injectSANMatcher` when `tlsContext` is `nil` (#17185) 2023-04-28 16:27:57 -04:00
17231.txt Only synthesize anonymous token in primary DC (#17231) 2023-05-23 09:38:04 -05:00
17235.txt Fix issue with peer stream node cleanup. (#17235) 2023-05-08 13:13:25 -05:00
17236.txt snapshot: some improvments to the snapshot process (#17236) 2023-05-09 15:28:52 -04:00
17240.txt security: update go version to 1.20.4 (#17240) 2023-05-08 11:57:11 -06:00
17241.txt Fix multiple issues related to proxycfg health queries. (#17241) 2023-05-09 12:37:58 -05:00
17270.txt grpc: ensure grpc resolver correctly uses lan/wan addresses on servers (#17270) 2023-05-11 11:08:57 -05:00
17327.txt Rename hcp-metrics-collector to consul-telemetry-collector (#17327) 2023-05-16 14:36:05 -04:00
17415.txt Disable remote proxy patching except AWS Lambda (#17415) 2023-05-23 11:55:06 +00:00
17424.txt Fix ACL check on health endpoint (#17424) 2023-05-24 16:35:55 -05:00
17426.txt [OSS] gRPC Blocking Queries (#17426) 2023-05-23 17:29:10 -04:00
17452.txt [NET-3092] JWT Verify claims handling (#17452) 2023-05-30 13:38:33 -04:00
17456.txt Fix namespaced peer service updates / deletes. (#17456) 2023-05-24 16:32:45 -05:00
17460.txt HCP Telemetry Feature (#17460) 2023-05-29 16:11:08 -04:00
17483.txt backport of commit 38a42074efae2ba85663f696a971fdd1cc334681 (#17702) 2023-06-13 14:45:44 +00:00
17487.txt Add `builtin/property-override` Envoy Extension (#17487) 2023-05-26 19:52:09 +00:00
17495.txt Add `builtin/ext-authz` Envoy Extension (#17495) 2023-05-26 12:22:54 -07:00
17505.txt Enable Network filters for Wasm Envoy Extension (#17505) 2023-05-30 07:17:33 -07:00
17513.txt build(deps): update UBI base image to 9.2 (#17513) 2023-05-30 12:48:13 -04:00
17525.txt Accept ap, datacenter, and namespace query params (#17525) 2023-05-31 11:50:24 -04:00
17546.txt backport of commit 6fc8624ccfb8eb0318726d5ed81546481f250cbc (#17632) 2023-06-09 02:50:07 +00:00
17565.txt Backport of feature - [NET - 4005] - [Supportability] Reloadable Configuration - enable_debug into release/1.16.x (#17969) 2023-06-30 18:40:20 +05:30
17566.txt Fix up case where subscription is terminated due to ACLs changing or a snapshot restore occurring (#17566) 2023-06-05 13:10:17 -04:00
17577.txt Fix metric names in Consul agent telemetry docs (#17577) 2023-06-06 14:42:30 -04:00
17581.txt Fix subscribing/fetching objects not in the default partition (#17581) 2023-06-06 09:09:33 -04:00
17582.txt Backport of [NET-3865] [Supportability] Additional Information in the output of 'consul operator raft list-peers' into release/1.16.x (#17738) 2023-06-21 11:26:48 +05:30
17596.txt Backport of [NET-4107][Supportability] Log Level set to TRACE and duration set to 5m for consul-debug into release/1.16.x (#17728) 2023-06-20 13:48:33 -07:00
17609.txt Backport of [API Gateway] Fix trust domain for external peered services in synthesis code into release/1.16.x (#17616) 2023-06-08 18:11:44 +00:00
17631.txt Backport of [API Gateway] Fix rate limiting for API gateways into release/1.16.x (#17635) 2023-06-09 12:40:03 +00:00
17719.txt Backport of Bump Alpine to 3.18 into release/1.16.x (#17725) 2023-06-14 01:17:02 +00:00
17739.txt Backport of fixes #17732 - AccessorID in request body should be optional when updating ACL token into release/1.16.x (#17833) 2023-06-21 18:53:18 +00:00
17754.txt Backport of Displays Consul version of each nodes in UI nodes section into release/1.16.x (#18113) 2023-07-17 17:27:50 +00:00
17755.txt Backport of Stop referenced jwt providers from being deleted into release/1.16.x (#17789) 2023-06-16 11:03:16 -04:00
17757.txt backport of commit 03702a8e7391719bd71a1c0b199b0dde8ad9155f (#17768) 2023-06-15 17:13:33 +00:00
17759.txt Backport of Property Override validation improvements into release/1.16.x (#17778) 2023-06-15 18:20:16 +00:00
17775.txt Backport of Fix issue with streaming service health watches. into release/1.16.x (#17776) 2023-06-15 18:06:09 +00:00
17780.txt Backport of watch: support -filter for consul watch: checks, services, nodes, service into release/1.16.x (#17965) 2023-06-30 12:59:28 -07:00
17846.txt Backport of Fixes Secondary ConnectCA update into release/1.16.x (#17954) 2023-06-29 14:43:21 +00:00
17885.txt Backport of Passes configured role name to Vault for AWS auth in Connect CA into release/1.16.x (#18099) 2023-07-12 15:43:36 +00:00
17888.txt Backport of Add emit_tags_as_labels to envoy bootstrap config when using Consul Telemetry Collector into release/1.16.x (#17901) 2023-06-27 16:51:00 +00:00
17894.txt backport of commit fe5c145cddd89da804d0de7d19bdc5d0d276df3b (#18010) 2023-07-05 14:50:59 +00:00
17911.txt Backport of Ensure RSA keys are at least 2048 bits in length into release/1.16.x (#17935) 2023-06-28 17:36:38 +00:00
17939.txt Backport of feat: include nodes count in operator usage endpoint and cli command into release/1.16.x (#18012) 2023-07-05 15:37:51 +00:00
17978.txt Expose JWKS cluster config through JWTProviderConfigEntry (#17978) (#18002) 2023-07-04 09:53:12 -04:00
18011.txt Backport of [OSS] Improve Gateway Test Coverage of Catalog Health into release/1.16.x (#18014) 2023-07-05 15:36:32 -04:00
18024.txt Backport of [OSS] Fix initial_fetch_timeout to wait for all xDS resources into release/1.16.x (#18065) 2023-07-10 21:27:56 +00:00
18068.txt Backport of [NET-4703] Prevent partial application of Envoy extensions into release/1.16.x (#18332) 2023-07-31 19:37:54 +00:00
18080.txt Backport of Fix a couple typos in Agent Telemetry Metrics docs into release/1.16.x (#18084) 2023-07-11 20:33:39 +00:00
18112.txt Backport of Fix bug with Vault CA provider into release/1.16.x (#18161) 2023-07-17 18:46:33 +00:00
18140.txt Backport of [CC-5718] Remove HCP token requirement during bootstrap into release/1.16.x (#18229) 2023-07-21 17:53:53 +00:00
18150.txt Backport of Explicitly enable WebSocket upgrades into release/1.16.x (#18211) 2023-07-20 14:57:13 -07:00
18168.txt Backport of [HCP Telemetry] Periodic Refresh for Dynamic Telemetry Configuration into release/1.16.x (#18359) 2023-08-02 13:37:39 -04:00
18184.txt Backport of [NET-3700] Backfill changelog entry for c2bbe67 and 7402d06 into release/1.16.x (#18260) 2023-07-24 19:09:16 +00:00
18186.txt Backport of [NET-4865] Bump golang.org/x/net to 0.12.0 into release/1.16.x (#18189) 2023-07-19 12:22:18 -04:00
18190.txt Backport of [NET-4865] security: Update Go version to 1.20.6 into release/1.16.x (#18195) 2023-07-19 21:57:40 +00:00
18223.txt Backport of member cli: add -filter expression to flags into release/1.16.x (#18276) 2023-07-25 14:57:08 -04:00
18291.txt Backport of NET-5049: subscribe to bound-api-gateway only after receiving api-gateway into release/1.16.x (#18295) 2023-07-26 20:18:00 +00:00
18302.txt Backport of NET-4240 - Snapshots are failing on Windows into release/1.16.x (#18356) 2023-08-02 13:40:59 +05:30
18303.txt [NET-4904] Update list of Envoy versions on 1.16.x (#18303) 2023-07-27 08:43:11 -07:00
18319.txt Backport of [CC-5719] Add support for builtin global-read-only policy into release/1.16.x (#18345) 2023-08-01 17:37:13 +00:00
18325.txt Backport of Stop JWT provider from being written in non default namespace into release/1.16.x (#18331) 2023-07-31 13:31:52 +00:00
18358.txt Backport of [NET-5146] security: Update Go version to 1.20.7 and `x/net` to 0.13.0 into release/1.16.x (#18363) 2023-08-02 18:36:08 +00:00
18381.txt Manual Backport of Add TCP+TLS Healthchecks into release/1.16.x (#18678) 2023-09-05 14:13:59 -07:00
18437.txt Backport of [NET-5217] [OSS] Derive sidecar proxy locality from parent service into release/1.16.x (#18438) 2023-08-10 18:47:38 +00:00
18464.txt fix for , non presence of consul-version meta (#18464) (#18561) 2023-08-23 08:34:36 -07:00
18558.txt Backport of bug: prevent go routine leakage due to existing DeferCheck into release/1.16.x (#18565) 2023-08-23 15:04:19 +00:00
18584.txt Reduce the frequency of metric exports to minutely (#18584) (#18601) 2023-08-28 20:44:14 +00:00
18617.txt Backport of NET-3181 - Allow log file naming like Nomad into release/1.16.x (#18630) 2023-09-04 16:20:53 +05:30
18625.txt Backport of NET 1594 - Snapshot Agent Filename Should Include Consul Version / Datacenter into release/1.16.x (#18638) 2023-09-04 06:49:09 +00:00
18636.txt Backport of [NET-4958] Fix issue where envoy endpoints would fail to populate after snapshot restore into release/1.16.x (#18645) 2023-09-01 15:42:42 +00:00
18667.txt [NET-5399] Add support for querying tokens by service name. (#18689) 2023-09-06 13:16:27 -05:00
18681.txt Show latest config in /v1/agent/self (#18716) 2023-09-12 09:38:17 -04:00
18724.txt Backport of fix: emit consul version metric on a regular interval into release/1.16.x (#18728) 2023-09-08 18:55:29 +00:00
18742.txt Backport of [NET-5574] Update Go version to 1.20.8 into release/1.16.x (#18763) 2023-09-12 15:57:34 +00:00
18773.txt [1.16.x] Vault CA provider clean up previous default issuers (#18773) (#18784) 2023-09-13 17:39:33 -04:00
18797.txt NET-4519 Collecting journald logs in "consul debug" bundle (#18797) (#18884) 2023-09-19 17:37:11 +05:30
18831.txt Backport of Fix gateway services cleanup where proxy deregistration happens after service deregistration into release/1.16.x (#18861) 2023-09-18 16:52:21 -04:00
19031.txt Backport of Include RequestTimeout in marshal/unmarshal of ServiceResolverConfigE… into release/1.16.x (#19034) 2023-09-29 17:57:36 +00:00
_619.txt Create _619.txt 2020-10-09 10:51:37 -04:00
_666.txt Add a paramter in state store methods to indicate whether a resource insertion is from a snapshot restoration (#9156) 2020-11-11 11:21:42 -05:00
_683.txt Add changelog entry for namespace licensing fix (#9203) 2020-11-16 15:45:55 -05:00
_745.txt Add changelog entry for change to the temporary client license duration (#9642) 2021-01-26 16:15:05 -05:00
_795.txt Add component name to entry 2021-04-14 19:41:04 -04:00
_855.txt Add changelog for enterprise change 2021-04-14 11:50:15 -04:00
_907.txt Add changelog entry for network area timeout updates (#10241) 2021-05-13 15:05:38 -06:00
_917.txt Add changelog 2021-05-20 12:57:15 -04:00
_923.txt changelog: add entry for network areas WAN config fix 2021-05-26 17:49:19 -04:00
_938.txt Add license inspect command documentation and changelog (#10351) 2021-06-04 14:33:13 -04:00
_1085.txt Add changelog entry 2021-08-25 19:46:21 -06:00
_1093.txt Add changelog entry 2021-08-25 19:46:21 -06:00
_1200.txt add changelog entry for enterprise fix (#11226) 2021-10-05 14:44:53 -05:00
_1238.txt Add changelog entry 2021-11-11 16:09:00 -05:00
_1292.txt add changelog entry (#11494) 2021-11-04 16:52:54 -05:00
_1321.txt changelog: entry for enterprise licensing bug fix (#11551) 2021-11-11 13:39:05 +00:00
_1328.txt changelog: entry for snapshot agent `license_path` bug (#11561) 2021-11-16 23:07:14 +00:00
_1330.txt changelog sync (#11565) 2021-11-12 16:10:36 -06:00
_1368.txt fix changelog file name (#11710) 2021-12-02 11:41:08 -05:00
_1424.txt [sync ent] increase segment max limit to 4*64, make configurable (#1424) (#11795) 2021-12-09 15:36:11 -08:00
_1502.txt update changelog (#12128) 2022-01-19 17:28:53 -06:00
_1563.txt add changelog entry for enterprise only change (#12425) 2022-02-23 14:23:48 -06:00
_1595.txt update changelog (#12495) 2022-03-02 16:44:13 -06:00
_1679.txt peering: initial sync (#12842) 2022-04-21 17:34:40 -05:00
_1728.txt add changelog for enterprise fix (#12761) 2022-04-12 16:01:35 -04:00
_1737.txt add changelog for enterprise bug fix (#12772) 2022-04-13 10:42:32 -04:00
_2271.txt Add support for S3 path based addressing 2022-08-29 14:46:02 -06:00
_3550.txt Add changelog (#15327) 2022-11-14 11:23:02 -05:00
_3556.txt Add changelog for snapshot agent updates (#15516) 2022-11-22 06:11:46 -08:00
_3557.txt Consul 1.14 post-release updates (#15382) 2022-11-15 14:22:43 -06:00
_3729.txt [OSS] Add boilerplate for proto files implementing BlockableQuery (#15554) 2022-11-25 15:46:56 -05:00
_3783.txt added changelog for enterprise only change (#15621) 2022-11-30 11:39:20 -08:00
_3846.txt docs: update changelog from 1.14.3, 1.13.5, 1.12.8 (#15804) 2022-12-14 18:47:35 -05:00
_4696.txt Fix issue with trust bundle read ACL check. (#16630) 2023-03-14 12:24:33 -05:00
_4734.txt add order by locality failover to Consul enterprise (#16791) 2023-03-30 10:08:38 -04:00
_4821.txt changes to support new PQ enterprise fields (#16793) 2023-03-27 15:40:49 -07:00
_4832.txt Change partition for peers in discovery chain targets (#16769) 2023-03-24 15:40:19 -05:00
_5517.txt backport of commit 845265dbce244db407dea9c81fc4a76813c411be (#17709) 2023-06-13 19:34:31 +00:00
_5614.txt backport of commit 38a42074efae2ba85663f696a971fdd1cc334681 (#17702) 2023-06-13 14:45:44 +00:00
_5669.txt Backport of backport ent changes to oss into release/1.16.x (#17617) 2023-06-08 16:45:28 +00:00
_5740.txt Backport of Add writeAuditRPCEvent to agent_oss into release/1.16.x (#17608) 2023-06-07 19:01:05 -04:00
_5750.txt Backport of Add writeAuditRPCEvent to agent_oss into release/1.16.x (#17608) 2023-06-07 19:01:05 -04:00
_5805.txt backport of commit beef7233cb7483c8ba19140e66fcbec187620c80 (#17629) 2023-06-09 00:06:35 +00:00
_8621.txt Adds changelog entry for snapshot agent improvement (#8622) 2020-09-04 14:07:57 -06:00
_8825.txt Add streaming changelog file 2020-10-13 18:16:33 -04:00
_8984.txt changelog: update to hashicorp/sentinel@v0.16.0 in Enterprise (#8984) 2020-10-26 12:32:44 -04:00
_12855.txt changelog: snapshot-agent acl token fix for CLI and ENV 2022-04-25 16:46:55 -04:00
_16677.txt Fix route subscription when using namespaces (#16677) 2023-03-20 12:42:30 -04:00
_releases-111.txt changelog: add note about packaging EULA and ToE alongside Enterprise binaries 2021-06-16 16:58:08 -04:00
changelog.tmpl ci: combine 'enhancement' entry type with 'improvement' (#12376) 2022-02-17 19:21:47 -08:00
note.tmpl changelog: fixup note.tmpl syntax 2020-10-09 22:44:51 -04:00