seatgeek / hashi-helper

Disaster Recovery and Configuration Management for Consul and Vault
BSD 3-Clause "New" or "Revised" License
187 stars 20 forks source link

Bump github.com/hashicorp/consul/api from 1.8.0 to 1.10.1 #259

Closed dependabot[bot] closed 3 years ago

dependabot[bot] commented 3 years ago

Bumps github.com/hashicorp/consul/api from 1.8.0 to 1.10.1.

Release notes

Sourced from github.com/hashicorp/consul/api's releases.

v1.10.1

1.10.1 (July 15, 2021)

SECURITY:

FEATURES:

  • cli: allow running redirect-traffic command in a provided Linux namespace. [GH-10564]
  • sdk: allow applying iptables rules in a provided Linux namespace. [GH-10564]

IMPROVEMENTS:

  • acl: Return secret ID when listing tokens if accessor has acl:write [GH-10546]
  • structs: prevent service-defaults upstream configs from using wildcard names or namespaces [GH-10475]
  • ui: Move all CSS icons to use standard CSS custom properties rather than SASS variables [GH-10298]

DEPRECATIONS:

  • connect/ca: remove the RotationPeriod field from the Consul CA provider, it was not used for anything. [GH-10552]

BUG FIXES:

  • agent: fix a panic on 32-bit platforms caused by misaligned struct fields used with sync/atomic. [GH-10515]
  • ca: Fixed a bug that returned a malformed certificate chain when the certificate did not having a trailing newline. [GH-10411]
  • checks: fixes the default ServerName used with TLS health checks. [GH-10490]
  • connect/proxy: fixes logic bug preventing builtin/native proxy from starting upstream listeners [GH-10486]
  • streaming: fix a bug that was preventing streaming from being enabled. [GH-10514]
  • ui: (Enterprise only) Ensure permissions are checked based on the actively selected namespace [GH-10608]
  • ui: Ensure in-folder KVs are created in the correct folder [GH-10569]
  • ui: Fix KV editor syntax highlighting [GH-10605]
  • ui: Send service name down to Stats to properly call endpoint for Upstreams and Downstreams metrics [GH-10535]
  • ui: Show ACLs disabled page at Tokens page instead of 403 error when ACLs are disabled [GH-10604]
  • ui: Use the token's namespace instead of the default namespace when not specifying a namespace in the URL [GH-10503]

v1.10.1-beta1

1.10.1-beta1 (July 01, 2021)

IMPROVEMENTS:

  • structs: prevent service-defaults upstream configs from using wildcard names or namespaces [GH-10475]
  • ui: Move all CSS icons to use standard CSS custom properties rather than SASS variables [GH-10298]

BUG FIXES:

  • ca: Fixed a bug that returned a malformed certificate chain when the certificate did not having a trailing newline. [GH-10411]
  • checks: fixes the default ServerName used with TLS health checks. [GH-10490]

... (truncated)

Changelog

Sourced from github.com/hashicorp/consul/api's changelog.

1.10.1 (July 15, 2021)

KNOWN ISSUES:

  • The change to enable streaming by default uncovered an incompatibility between streaming and WAN federation over mesh gateways causing traffic to fall back to attempting a direct WAN connection rather than transiting through the gateways. We currently suggest explicitly setting use_streaming_backend=false if using WAN federation over mesh gateways when upgrading to 1.10.1 and are working to address this issue in a future patch release.

SECURITY:

FEATURES:

  • cli: allow running redirect-traffic command in a provided Linux namespace. [GH-10564]
  • sdk: allow applying iptables rules in a provided Linux namespace. [GH-10564]

IMPROVEMENTS:

  • acl: Return secret ID when listing tokens if accessor has acl:write [GH-10546]
  • structs: prevent service-defaults upstream configs from using wildcard names or namespaces [GH-10475]
  • ui: Move all CSS icons to use standard CSS custom properties rather than SASS variables [GH-10298]

DEPRECATIONS:

  • connect/ca: remove the RotationPeriod field from the Consul CA provider, it was not used for anything. [GH-10552]

BUG FIXES:

  • agent: fix a panic on 32-bit platforms caused by misaligned struct fields used with sync/atomic. [GH-10515]
  • ca: Fixed a bug that returned a malformed certificate chain when the certificate did not having a trailing newline. [GH-10411]
  • checks: fixes the default ServerName used with TLS health checks. [GH-10490]
  • connect/proxy: fixes logic bug preventing builtin/native proxy from starting upstream listeners [GH-10486]
  • streaming: fix a bug that was preventing streaming from being enabled. [GH-10514]
  • ui: (Enterprise only) Ensure permissions are checked based on the actively selected namespace [GH-10608]
  • ui: Ensure in-folder KVs are created in the correct folder [GH-10569]
  • ui: Fix KV editor syntax highlighting [GH-10605]
  • ui: Send service name down to Stats to properly call endpoint for Upstreams and Downstreams metrics [GH-10535]
  • ui: Show ACLs disabled page at Tokens page instead of 403 error when ACLs are disabled [GH-10604]
  • ui: Use the token's namespace instead of the default namespace when not specifying a namespace in the URL [GH-10503]

1.10.0 (June 22, 2021)

BREAKING CHANGES:

  • connect: Disallow wildcard as name for service-defaults. [GH-10069]
  • connect: avoid encoding listener info in ingress and terminating gateway listener stats names. [GH-10404]
  • licensing: (Enterprise Only) Consul Enterprise 1.10 has removed API driven licensing of servers in favor of license loading via configuration. The PUT and DELETE methods on the /v1/operator/license endpoint will now return 405s, the consul license put and consul license reset CLI commands have been removed and the LicensePut and LicenseReset methods in the API client have been altered to always return an error. [GH-10211]
  • licensing: (Enterprise Only) Consul Enterprise client agents now require a valid non-anonymous ACL token for retrieving their license from the servers. Additionally client agents rely on the value of the start_join and retry_join configurations for determining the servers to query for the license. Therefore one must be set to use license auto-retrieval. [GH-10248]
  • licensing: (Enterprise Only) Consul Enterprise has removed support for temporary licensing. All server agents must have a valid license at startup and client agents must have a license at startup or be able to retrieve one from the servers. [GH-10248]

... (truncated)

Commits
  • db839f1 Release v1.10.1
  • 40ac83c update bindata_assetfs.go
  • fc38e8f add changelogs for 1.10.1
  • e3e3137 Merge pull request #10622 from hashicorp/vuln/validate-sans-1.10
  • 803df59 Fixup prepared query ns defaulting
  • 066e950 Add changelog entry
  • d808d78 Merge pull request #10617 from hashicorp/dnephin/config-add-missing-docs
  • 104ee65 xds: ensure single L7 deny intention with default deny policy does not result...
  • e92b9e8 ui: [BUGFIX] Ensure we use the ns query param name when requesting permission...
  • 15f6b10 ui: [BUGFIX] Ensure in-folder KVs are created in the correct folder (#10569)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dependabot[bot] commented 3 years ago

Dependabot tried to add @jippi and @burdandrei as reviewers to this PR, but received the following error from GitHub:

POST https://api.github.com/repos/seatgeek/hashi-helper/pulls/259/requested_reviewers: 422 - Reviews may only be requested from collaborators. One or more of the users or teams you specified is not a collaborator of the seatgeek/hashi-helper repository. // See: https://docs.github.com/rest/reference/pulls#request-reviewers-for-a-pull-request
dependabot[bot] commented 3 years ago

Superseded by #261.