CyanAsterisk / FreeCar

Time-sharing car rental system suite based on CloudWeGo series framework
GNU General Public License v3.0
242 stars 41 forks source link

chore(deps): bump github.com/hashicorp/consul/api from 1.18.0 to 1.20.0 #141

Closed dependabot[bot] closed 1 year ago

dependabot[bot] commented 1 year ago

Bumps github.com/hashicorp/consul/api from 1.18.0 to 1.20.0.

Changelog

Sourced from github.com/hashicorp/consul/api's changelog.

1.15.2 (March 30, 2023)

FEATURES:

  • xds: Allow for configuring connect proxies to send service mesh telemetry to an HCP metrics collection service. [GH-16585]

BUG FIXES:

  • audit-logging: (Enterprise only) Fix a bug where /agent/monitor and /agent/metrics endpoints return a Streaming not supported error when audit logs are enabled. This also fixes the delay receiving logs when running consul monitor against an agent with audit logs enabled. [GH-16700]
  • ca: Fixes a bug where updating Vault CA Provider config would cause TLS issues in the service mesh [GH-16592]
  • cache: revert cache refactor which could cause blocking queries to never return [GH-16818]
  • gateway: (Enterprise only) Fix bug where namespace/partition would fail to unmarshal for TCPServices. [GH-16781]
  • gateway: (Enterprise only) Fix bug where namespace/partition would fail to unmarshal. [GH-16651]
  • gateway: (Enterprise only) Fix bug where parent refs and service refs for a route in the same namespace as the route would fallback to the default namespace if the namespace was not specified in the configuration rather than falling back to the routes namespace. [GH-16789]
  • gateway: (Enterprise only) Fix bug where routes defined in a different namespace than a gateway would fail to register. [GH-16677].
  • gateways: Adds validation to ensure the API Gateway has a listener defined when created [GH-16649]
  • gateways: Fixes a bug API gateways using HTTP listeners were taking upwards of 15 seconds to get configured over xDS. [GH-16661]
  • peering: (Consul Enterprise only) Fix issue where connect-enabled services with peer upstreams incorrectly required service:write access in the default namespace to query data, which was too restrictive. Now having service:write to any namespace is sufficient to query the peering data.
  • peering: (Consul Enterprise only) Fix issue where resolvers, routers, and splitters referencing peer targets may not work correctly for non-default partitions and namespaces. Enterprise customers leveraging peering are encouraged to upgrade both servers and agents to avoid this problem.
  • peering: Fix issue resulting in prepared query failover to cluster peers never un-failing over. [GH-16729]
  • peering: Fixes a bug that can lead to peering service deletes impacting the state of local services [GH-16570]
  • peering: Fixes a bug where the importing partition was not added to peered failover targets, which causes issues when the importing partition is a non-default partition. [GH-16675]
  • raft_logstore: Fixes a bug where restoring a snapshot when using the experimental WAL storage backend causes a panic. [GH-16647]
  • ui: fix PUT token request with adding missed AccessorID property to requestBody [GH-16660]
  • ui: fix rendering issues on Overview and empty-states by addressing isHTMLSafe errors [GH-16574]

1.14.6 (March 30, 2023)

BUG FIXES:

  • audit-logging: (Enterprise only) Fix a bug where /agent/monitor and /agent/metrics endpoints return a Streaming not supported error when audit logs are enabled. This also fixes the delay receiving logs when running consul monitor against an agent with audit logs enabled. [GH-16700]
  • ca: Fixes a bug where updating Vault CA Provider config would cause TLS issues in the service mesh [GH-16592]
  • peering: (Consul Enterprise only) Fix issue where connect-enabled services with peer upstreams incorrectly required service:write access in the default namespace to query data, which was too restrictive. Now having service:write to any namespace is sufficient to query the peering data.
  • peering: (Consul Enterprise only) Fix issue where resolvers, routers, and splitters referencing peer targets may not work correctly for non-default partitions and namespaces. Enterprise customers leveraging peering are encouraged to upgrade both servers and agents to avoid this problem.
  • peering: Fix issue resulting in prepared query failover to cluster peers never un-failing over. [GH-16729]
  • peering: Fixes a bug that can lead to peering service deletes impacting the state of local services [GH-16570]
  • peering: Fixes a bug where the importing partition was not added to peered failover targets, which causes issues when the importing partition is a non-default partition. [GH-16693]
  • ui: fix PUT token request with adding missed AccessorID property to requestBody [GH-16660]

1.15.1 (March 7, 2023)

IMPROVEMENTS:

  • cli: added -append-policy-id, -append-policy-name, -append-role-name, and -append-role-id flags to the consul token update command. These flags allow updates to a token's policies/roles without having to override them completely. [GH-16288]
  • cli: added -append-service-identity and -append-node-identity flags to the consul token update command. These flags allow updates to a token's node identities/service identities without having to override them. [GH-16506]
  • connect: Bump Envoy 1.22.5 to 1.22.7, 1.23.2 to 1.23.4, 1.24.0 to 1.24.2, add 1.25.1, remove 1.21.5 [GH-16274]
  • mesh: Add ServiceResolver RequestTimeout for route timeouts to make request timeouts configurable [GH-16495]
  • ui: support filtering API gateways in the ui and displaying their documentation links [GH-16508]

... (truncated)

Commits
  • 4697059 Bump consul/sdk to v0.13.1
  • caf85ac Backport of Update docs to reflect functionality into release/1.15.x (#16555)
  • dd740f0 Backport of Fix flakey tests related to ACL token updates into release/1.15.x...
  • e66f26b Backport of Update the consul-k8s cli docs for the new proxy log subcommand...
  • 494fba2 Backport of Follow-up fixes to consul connect envoy command into release/1.15...
  • 583466b Backport of Improve ux around ACL token to help users avoid overwriting node/...
  • 88496d7 NET-2904 Fixes API Gateway Route Service Weight Division Error (#16540)
  • a95d028 backport of commit 5dca39b8137daf740f18b6d86f1d48081c317815 (#16536)
  • e69ed7a Backport of Add some basic UI improvements for api-gateway services into rele...
  • 2f8de3c Backport of NET-2903 Normalize weight for http routes into release/1.15.x (#1...
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)