Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump github.com/hashicorp/consul/api from 1.7.0 to 1.8.0 #160

Conversation

dependabot-preview[bot]
Copy link
Contributor

Bumps github.com/hashicorp/consul/api from 1.7.0 to 1.8.0.

Release notes

Sourced from github.com/hashicorp/consul/api's releases.

v1.8.0

1.8.0 (June 18, 2020)

BREAKING CHANGES:

  • acl: Remove deprecated acl_enforce_version_8 option [GH-7991]

FEATURES:

  • Terminating Gateway: Envoy can now be run as a gateway to enable services in a Consul service mesh to connect to external services through their local proxy. Terminating gateways unlock several of the benefits of a service mesh in the cases where a sidecar proxy cannot be deployed alongside services such as legacy applications or managed cloud databases.

  • Ingress Gateway: Envoy can now be run as a gateway to ingress traffic into the Consul service mesh, enabling a more incremental transition for applications.

  • WAN Federation over Mesh Gateways: Allows Consul datacenters to federate by forwarding WAN gossip and RPC traffic through Mesh Gateways rather than requiring the servers to be exposed to the WAN directly.

  • JSON Web Token (JWT) Auth Method: Allows exchanging a signed JWT from a trusted external identity provider for a Consul ACL token.

  • Single Sign-On (SSO) [Enterprise]: Lets an operator configure Consul to use an external OpenID Connect (OIDC) provider to automatically handle the lifecycle of creating, distributing and managing ACL tokens for performing CLI operations or accessing the UI.

  • Audit Logging [Enterprise]: Adds instrumentation to record a trail of events (both attempted and authorized) by users of Consul’s HTTP API for purposes of regulatory compliance.

  • acl: add DisplayName field to auth methods [GH-7769]

  • acl: add MaxTokenTTL field to auth methods [GH-7779]

  • agent/xds: add support for configuring passive health checks [GH-7713]

  • cli: Add -config flag to "acl authmethod update/create" [GH-7776]

  • ui: Help menu to provide further documentation/learn links [GH-7310]

  • ui: (Consul Enterprise only) SSO support [GH-7742] [GH-7771] [GH-7790]

  • ui: Support for termininating and ingress gateways [GH-7858] [GH-7865]

IMPROVEMENTS:

  • acl: change authmethod.Validator to take a logger [GH-7758]
  • agent: show warning when enable_script_checks is enabled without safety net [GH-7437]
  • api: Added filtering support to the v1/connect/intentions endpoint. [GH-7478]
  • auto_encrypt: add validations for auto_encrypt.{tls,allow_tls} [GH-7704]
  • build: switched to compile with Go 1.14.1 [GH-7481]
  • config: validate system limits against limits.http_max_conns_per_client [GH-7434]
  • connect: support envoy 1.12.3, 1.13.1, and 1.14.1. Envoy 1.10 is no longer officially supported. [GH-7380],[GH-7624]
  • connect: add DNSSAN and IPSAN to cache key for ConnectCALeafRequest [GH-7597]
  • connect: Added a new expose CLI command for ingress gateways [GH-8099]
  • license: (Consul Enterprise only) Update licensing to align with the current modules licensing structure.
  • logging: catch problems with the log destination earlier by creating the file immediately [GH-7469]
  • proxycfg: support path exposed with non-HTTP2 protocol [GH-7510]
  • tls: remove old ciphers [GH-7282]
  • ui: Show the last 8 characters of AccessorIDs in listing views [GH-7327]
  • ui: Make all tabs within the UI linkable/bookmarkable and include in history [GH-7592]
  • ui: Redesign of all service pages [GH-7605] [GH-7632] [GH-7655] [GH-7683]
  • ui: Show intentions per individual service [GH-7615]
  • ui: Improved login/logout flow [GH-7790]
  • ui: Revert search to search as you type, add sort control for the service listing page [GH-7489]
  • ui: Omit proxy services from the service listing view and mark services as being proxied [GH-7820]
  • ui: Display proxies in a proxy info tab with the service instance detail page [GH-7745]
  • ui: Add live updates/blocking queries to gateway listings [GH-7967]
  • ui: Improved 'empty states' [GH-7940]
  • ui: Add ability to sort services based on health [GH-7989]
  • ui: Add explanatory tooltip panels for gateway services [GH-8048](hashicorp/consul#8048)
Changelog

Sourced from github.com/hashicorp/consul/api's changelog.

1.8.0 (June 18, 2020)

BREAKING CHANGES:

  • acl: Remove deprecated acl_enforce_version_8 option [GH-7991]

FEATURES:

  • Terminating Gateway: Envoy can now be run as a gateway to enable services in a Consul service mesh to connect to external services through their local proxy. Terminating gateways unlock several of the benefits of a service mesh in the cases where a sidecar proxy cannot be deployed alongside services such as legacy applications or managed cloud databases.

  • Ingress Gateway: Envoy can now be run as a gateway to ingress traffic into the Consul service mesh, enabling a more incremental transition for applications.

  • WAN Federation over Mesh Gateways: Allows Consul datacenters to federate by forwarding WAN gossip and RPC traffic through Mesh Gateways rather than requiring the servers to be exposed to the WAN directly.

  • JSON Web Token (JWT) Auth Method: Allows exchanging a signed JWT from a trusted external identity provider for a Consul ACL token.

  • Single Sign-On (SSO) [Enterprise]: Lets an operator configure Consul to use an external OpenID Connect (OIDC) provider to automatically handle the lifecycle of creating, distributing and managing ACL tokens for performing CLI operations or accessing the UI.

  • Audit Logging [Enterprise]: Adds instrumentation to record a trail of events (both attempted and authorized) by users of Consul’s HTTP API for purposes of regulatory compliance.

  • acl: add DisplayName field to auth methods [GH-7769]

  • acl: add MaxTokenTTL field to auth methods [GH-7779]

  • agent/xds: add support for configuring passive health checks [GH-7713]

  • cli: Add -config flag to "acl authmethod update/create" [GH-7776]

  • serf: allow to restrict servers that can join a given Serf Consul cluster. [GH-7628]

  • ui: Help menu to provide further documentation/learn links [GH-7310]

  • ui: (Consul Enterprise only) SSO support [GH-7742] [GH-7771] [GH-7790]

  • ui: Support for termininating and ingress gateways [GH-7858] [GH-7865]

IMPROVEMENTS:

  • acl: change authmethod.Validator to take a logger [GH-7758]
  • agent: show warning when enable_script_checks is enabled without safety net [GH-7437]
  • api: Added filtering support to the v1/connect/intentions endpoint. [GH-7478]
  • auto_encrypt: add validations for auto_encrypt.{tls,allow_tls} [GH-7704]
  • build: switched to compile with Go 1.14.1 [GH-7481]
  • config: validate system limits against limits.http_max_conns_per_client [GH-7434]
  • connect: support envoy 1.12.3, 1.13.1, and 1.14.1. Envoy 1.10 is no longer officially supported. [GH-7380],[GH-7624]
  • connect: add DNSSAN and IPSAN to cache key for ConnectCALeafRequest [GH-7597]
  • connect: Added a new expose CLI command for ingress gateways [GH-8099]
  • license: (Consul Enterprise only) Update licensing to align with the current modules licensing structure.
  • logging: catch problems with the log destination earlier by creating the file immediately [GH-7469]
  • proxycfg: support path exposed with non-HTTP2 protocol [GH-7510]
  • tls: remove old ciphers [GH-7282]
  • ui: Show the last 8 characters of AccessorIDs in listing views [GH-7327]
  • ui: Make all tabs within the UI linkable/bookmarkable and include in history [GH-7592]
  • ui: Redesign of all service pages [GH-7605] [GH-7632] [GH-7655] [GH-7683]
  • ui: Show intentions per individual service [GH-7615]
  • ui: Improved login/logout flow [GH-7790]
  • ui: Revert search to search as you type, add sort control for the service listing page [GH-7489]
  • ui: Omit proxy services from the service listing view and mark services as being proxied [GH-7820]
  • ui: Display proxies in a proxy info tab with the service instance detail page [GH-7745]
  • ui: Add live updates/blocking queries to gateway listings [GH-7967]
  • ui: Improved 'empty states' [GH-7940]
  • ui: Add ability to sort services based on health [GH-7989]
  • ui: Add explanatory tooltip panels for gateway services [GH-8048](hashicorp/consul#8048)
Commits
  • 3111cb8 Release v1.8.0
  • f3b7cf6 update bindata_assetfs.go
  • 4102fb2 Bump GOLANG_IMAGE to 1.14.4 to get patch for runtime issue
  • 874bd29 Run make update-vendor and remove submodule references
  • 9ce1ace Bump api and sdk modules
  • 4ec1d1d Bump sdk module version to 0.5.0
  • d940553 Update CHANGELOG for 1.8.0 GA (#8143)
  • 42a058f Putting source back into Dev Mode
  • 44e17c8 Release v1.8.0-rc1
  • 7fa405f update bindata_assetfs.go
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.

Dependabot will not automatically merge this PR because it includes a minor update to a production dependency.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language
  • @dependabot badge me will comment on this PR with code to add a "Dependabot enabled" badge to your readme

Additionally, you can set the following in your Dependabot dashboard:

  • Update frequency (including time of day and day of week)
  • Pull request limits (per update run and/or open at any time)
  • Automerge options (never/patch/minor, and dev/runtime dependencies)
  • Out-of-range updates (receive only lockfile updates, if desired)
  • Security updates (receive only security updates, if desired)

@dependabot-preview dependabot-preview bot added the dependencies Pull requests that update a dependency file label Nov 25, 2020
@codeclimate
Copy link

codeclimate bot commented Nov 25, 2020

Code Climate has analyzed commit 0788ec8 and detected 0 issues on this pull request.

View more on Code Climate.

@dependabot-preview
Copy link
Contributor Author

Superseded by #166.

@dependabot-preview dependabot-preview bot deleted the dependabot/go_modules/github.com/hashicorp/consul/api-1.8.0 branch December 11, 2020 04:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants