Bump github.com/hashicorp/consul/api from 1.15.2 to 1.15.3 #93

Merged
dependabot[bot] merged 1 commits from dependabot/go_modules/github.com/hashicorp/consul/api-1.15.3 into v3 2022-11-14 13:49:57 +03:00
dependabot[bot] commented 2022-10-20 20:18:58 +03:00 (Migrated from github.com)

Bumps github.com/hashicorp/consul/api from 1.15.2 to 1.15.3.

Changelog

Sourced from github.com/hashicorp/consul/api's changelog.

1.11.10 (September 22, 2022)

BUG FIXES:

  • kvs: Fixed a bug where query options were not being applied to KVS.Get RPC operations. [GH-13344]

1.13.2 (September 20, 2022)

BREAKING CHANGES:

  • ca: If using Vault as the service mesh CA provider, the Vault policy used by Consul now requires the update capability on the intermediate PKI's tune mount configuration endpoint, such as /sys/mounts/connect_inter/tune. The breaking nature of this change will be resolved in an upcoming 1.13 patch release. Refer to upgrade guidance for more information.

SECURITY:

  • auto-config: Added input validation for auto-config JWT authorization checks. Prior to this change, it was possible for malicious actors to construct requests which incorrectly pass custom JWT claim validation for the AutoConfig.InitialConfiguration endpoint. Now, only a subset of characters are allowed for the input before evaluating the bexpr. [GH-14577]
  • connect: Added URI length checks to ConnectCA CSR requests. Prior to this change, it was possible for a malicious actor to designate multiple SAN URI values in a call to the ConnectCA.Sign endpoint. The endpoint now only allows for exactly one SAN URI to be specified. [GH-14579]

FEATURES:

  • cli: Adds new subcommands for peering workflows. Refer to the CLI docs for more information. [GH-14423]
  • connect: Server address changes are streamed to peers [GH-14285]
  • service-defaults: Added support for local_request_timeout_ms and local_connect_timeout_ms in servicedefaults config entry [GH-14395]

IMPROVEMENTS:

  • connect: Bump latest Envoy to 1.23.1 in test matrix [GH-14573]
  • connect: expose new tracing configuration on envoy [GH-13998]
  • envoy: adds additional Envoy outlier ejection parameters to passive health check configurations. [GH-14238]
  • metrics: add labels of segment, partition, network area, network (lan or wan) to serf and memberlist metrics [GH-14161]
  • peering: Validate peering tokens for server name conflicts [GH-14563]
  • snapshot agent: (Enterprise only) Add support for path-based addressing when using s3 backend.
  • ui: Reuse connections for requests to /v1/internal/ui/metrics-proxy/ [GH-14521]

BUG FIXES:

  • agent: Fixes an issue where an agent that fails to start due to bad addresses won't clean up any existing listeners [GH-14081]
  • api: Fix a breaking change caused by renaming QueryDatacenterOptions to QueryFailoverOptions. This adds QueryDatacenterOptions back as an alias to QueryFailoverOptions and marks it as deprecated. [GH-14378]
  • ca: Fixed a bug with the Vault CA provider where the intermediate PKI mount and leaf cert role were not being updated when the CA configuration was changed. [GH-14516]
  • cli: When launching a sidecar proxy with consul connect envoy or consul connect proxy, the -sidecar-for service ID argument is now treated as case-insensitive. [GH-14034]
  • connect: Fix issue where auto_config and auto_encrypt could unintentionally enable TLS for gRPC xDS connections. [GH-14269]
  • connect: Fixed a bug where old root CAs would be removed from the primary datacenter after switching providers and restarting the cluster. [GH-14598]
  • connect: Fixed an issue where intermediate certificates could build up in the root CA because they were never being pruned after expiring. [GH-14429]
  • connect: Fixed some spurious issues during peering establishment when a follower is dialed [GH-14119]
  • envoy: validate name before deleting proxy default configurations. [GH-14290]
  • peering: Fix issue preventing deletion and recreation of peerings in TERMINATED state. [GH-14364]
  • rpc: Adds max jitter to client deadlines to prevent i/o deadline errors on blocking queries [GH-14233]
  • tls: undo breaking change that prevented setting TLS for gRPC when using config flags available in Consul v1.11. [GH-14668]

... (truncated)

Commits
  • 19a8c37 Uncomment api go.mod replace.
  • b29e589 Stage 1.13.3
  • b8e4378 backport of commit a548634862b3ec7a0e6aa4b4ad4b271056351158 (#15058)
  • 9de04ef backport of commit d122108992b6facf4ad02931772c09e96ab53237 (#15049)
  • d4a20c2 Merge pull request #15040 from hashicorp/backport/kisunji/NET-1092/evenly-das...
  • 8e72969 Fix imports
  • ddf010d Remove unused methods from template
  • 262760a Refactor client RPC timeouts (#14965)
  • 9206f89 Backport of test: possibly fix flaky TestEnvoy/case-ingress-gateway-multiple-...
  • 10f9d8e backport of commit 52957fcb179026c5fa82f84076fe4f5a6d5c4287 (#15031)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
Bumps [github.com/hashicorp/consul/api](https://github.com/hashicorp/consul) from 1.15.2 to 1.15.3. <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/hashicorp/consul/blob/main/CHANGELOG.md">github.com/hashicorp/consul/api's changelog</a>.</em></p> <blockquote> <h2>1.11.10 (September 22, 2022)</h2> <p>BUG FIXES:</p> <ul> <li>kvs: Fixed a bug where query options were not being applied to KVS.Get RPC operations. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/13344">GH-13344</a>]</li> </ul> <h2>1.13.2 (September 20, 2022)</h2> <p>BREAKING CHANGES:</p> <ul> <li>ca: If using Vault as the service mesh CA provider, the Vault policy used by Consul now requires the <code>update</code> capability on the intermediate PKI's tune mount configuration endpoint, such as <code>/sys/mounts/connect_inter/tune</code>. The breaking nature of this change will be resolved in an upcoming 1.13 patch release. Refer to <a href="https://www.consul.io/docs/upgrading/upgrade-specific#modify-vault-policy-for-vault-ca-provider">upgrade guidance</a> for more information.</li> </ul> <p>SECURITY:</p> <ul> <li>auto-config: Added input validation for auto-config JWT authorization checks. Prior to this change, it was possible for malicious actors to construct requests which incorrectly pass custom JWT claim validation for the <code>AutoConfig.InitialConfiguration</code> endpoint. Now, only a subset of characters are allowed for the input before evaluating the bexpr. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14577">GH-14577</a>]</li> <li>connect: Added URI length checks to ConnectCA CSR requests. Prior to this change, it was possible for a malicious actor to designate multiple SAN URI values in a call to the <code>ConnectCA.Sign</code> endpoint. The endpoint now only allows for exactly one SAN URI to be specified. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14579">GH-14579</a>]</li> </ul> <p>FEATURES:</p> <ul> <li>cli: Adds new subcommands for <code>peering</code> workflows. Refer to the <a href="https://www.consul.io/commands/peering">CLI docs</a> for more information. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14423">GH-14423</a>]</li> <li>connect: Server address changes are streamed to peers [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14285">GH-14285</a>]</li> <li>service-defaults: Added support for <code>local_request_timeout_ms</code> and <code>local_connect_timeout_ms</code> in servicedefaults config entry [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14395">GH-14395</a>]</li> </ul> <p>IMPROVEMENTS:</p> <ul> <li>connect: Bump latest Envoy to 1.23.1 in test matrix [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14573">GH-14573</a>]</li> <li>connect: expose new tracing configuration on envoy [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/13998">GH-13998</a>]</li> <li>envoy: adds additional Envoy outlier ejection parameters to passive health check configurations. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14238">GH-14238</a>]</li> <li>metrics: add labels of segment, partition, network area, network (lan or wan) to serf and memberlist metrics [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14161">GH-14161</a>]</li> <li>peering: Validate peering tokens for server name conflicts [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14563">GH-14563</a>]</li> <li>snapshot agent: <strong>(Enterprise only)</strong> Add support for path-based addressing when using s3 backend.</li> <li>ui: Reuse connections for requests to /v1/internal/ui/metrics-proxy/ [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14521">GH-14521</a>]</li> </ul> <p>BUG FIXES:</p> <ul> <li>agent: Fixes an issue where an agent that fails to start due to bad addresses won't clean up any existing listeners [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14081">GH-14081</a>]</li> <li>api: Fix a breaking change caused by renaming <code>QueryDatacenterOptions</code> to <code>QueryFailoverOptions</code>. This adds <code>QueryDatacenterOptions</code> back as an alias to <code>QueryFailoverOptions</code> and marks it as deprecated. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14378">GH-14378</a>]</li> <li>ca: Fixed a bug with the Vault CA provider where the intermediate PKI mount and leaf cert role were not being updated when the CA configuration was changed. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14516">GH-14516</a>]</li> <li>cli: When launching a sidecar proxy with <code>consul connect envoy</code> or <code>consul connect proxy</code>, the <code>-sidecar-for</code> service ID argument is now treated as case-insensitive. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14034">GH-14034</a>]</li> <li>connect: Fix issue where <code>auto_config</code> and <code>auto_encrypt</code> could unintentionally enable TLS for gRPC xDS connections. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14269">GH-14269</a>]</li> <li>connect: Fixed a bug where old root CAs would be removed from the primary datacenter after switching providers and restarting the cluster. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14598">GH-14598</a>]</li> <li>connect: Fixed an issue where intermediate certificates could build up in the root CA because they were never being pruned after expiring. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14429">GH-14429</a>]</li> <li>connect: Fixed some spurious issues during peering establishment when a follower is dialed [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14119">GH-14119</a>]</li> <li>envoy: validate name before deleting proxy default configurations. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14290">GH-14290</a>]</li> <li>peering: Fix issue preventing deletion and recreation of peerings in TERMINATED state. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14364">GH-14364</a>]</li> <li>rpc: Adds max jitter to client deadlines to prevent i/o deadline errors on blocking queries [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14233">GH-14233</a>]</li> <li>tls: undo breaking change that prevented setting TLS for gRPC when using config flags available in Consul v1.11. [<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14668">GH-14668</a>]</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/hashicorp/consul/commit/19a8c3734adb79a1839cfd1760e13b812bdaa49b"><code>19a8c37</code></a> Uncomment api go.mod replace.</li> <li><a href="https://github.com/hashicorp/consul/commit/b29e5894f2322c9294b1f03c9b264ae2e6ae0eb0"><code>b29e589</code></a> Stage 1.13.3</li> <li><a href="https://github.com/hashicorp/consul/commit/b8e43784c9cd96679e1a59443c19b169d904db14"><code>b8e4378</code></a> backport of commit a548634862b3ec7a0e6aa4b4ad4b271056351158 (<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/15058">#15058</a>)</li> <li><a href="https://github.com/hashicorp/consul/commit/9de04ef8d7493e68db56ab06542b187b1172ef4a"><code>9de04ef</code></a> backport of commit d122108992b6facf4ad02931772c09e96ab53237 (<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/15049">#15049</a>)</li> <li><a href="https://github.com/hashicorp/consul/commit/d4a20c272555405a7e71cab3b67e65633999a25c"><code>d4a20c2</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/15040">#15040</a> from hashicorp/backport/kisunji/NET-1092/evenly-das...</li> <li><a href="https://github.com/hashicorp/consul/commit/8e729690629ec79db3cbf7629c00fc80252e78ff"><code>8e72969</code></a> Fix imports</li> <li><a href="https://github.com/hashicorp/consul/commit/ddf010deaa60154d29ca7c9857eaf7fbd7e697d1"><code>ddf010d</code></a> Remove unused methods from template</li> <li><a href="https://github.com/hashicorp/consul/commit/262760a71dcc30118f6b9c0c1c4c661259e57a57"><code>262760a</code></a> Refactor client RPC timeouts (<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/14965">#14965</a>)</li> <li><a href="https://github.com/hashicorp/consul/commit/9206f8940ee5cf74651a4ed9eb5917051a37a353"><code>9206f89</code></a> Backport of test: possibly fix flaky TestEnvoy/case-ingress-gateway-multiple-...</li> <li><a href="https://github.com/hashicorp/consul/commit/10f9d8edfd5d6bdcc8637f1772d8ee335957fbdc"><code>10f9d8e</code></a> backport of commit 52957fcb179026c5fa82f84076fe4f5a6d5c4287 (<a href="https://github-redirect.dependabot.com/hashicorp/consul/issues/15031">#15031</a>)</li> <li>Additional commits viewable in <a href="https://github.com/hashicorp/consul/compare/api/v1.15.2...api/v1.15.3">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=github.com/hashicorp/consul/api&package-manager=go_modules&previous-version=1.15.2&new-version=1.15.3)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details>
github-actions[bot] (Migrated from github.com) reviewed 2022-10-20 20:19:15 +03:00
github-actions[bot] (Migrated from github.com) reviewed 2022-11-14 07:09:22 +03:00
github-actions[bot] (Migrated from github.com) approved these changes 2022-11-14 07:25:35 +03:00
Sign in to join this conversation.
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: unistack-org/micro-config-consul#93
No description provided.