seatgeek / hashi-helper

Disaster Recovery and Configuration Management for Consul and Vault
BSD 3-Clause "New" or "Revised" License
187 stars 20 forks source link

Bump github.com/hashicorp/consul/api from 1.8.0 to 1.11.0 #261

Closed dependabot[bot] closed 2 years ago

dependabot[bot] commented 3 years ago

Bumps github.com/hashicorp/consul/api from 1.8.0 to 1.11.0.

Release notes

Sourced from github.com/hashicorp/consul/api's releases.

v1.11.0-alpha

1.11.0-alpha (September 16, 2021)

SECURITY:

FEATURES:

  • config: add agent config flag for enterprise clients to indicate they wish to join a particular partition [GH-10572]
  • connect: include optional partition prefixes in SPIFFE identifiers [GH-10507]
  • partitions: (Enterprise only) Adds admin partitions, a new feature to enhance Consul's multitenancy capabilites.
  • ui: Add UI support to use Vault as an external source for a service [GH-10769]
  • ui: Adds a copy button to each composite row in tokens list page, if Secret ID returns an actual ID [GH-10735]

IMPROVEMENTS:

  • acl: replication routine to report the last error message. [GH-10612]
  • api: Enable setting query options on agent health and maintenance endpoints. [GH-10691]
  • checks: add failures_before_warning setting for interval checks. [GH-10969]
  • config: (Enterprise Only) Allow specifying permission mode for audit logs. [GH-10732]
  • config: add dns_config.recursor_strategy flag to control the order which DNS recursors are queried [GH-10611]
  • connect/ca: cease including the common name field in generated x509 non-CA certificates [GH-10424]
  • connect: Support manipulating HTTP headers in the mesh. [GH-10613]
  • connect: update supported envoy versions to 1.18.4, 1.17.4, 1.16.5 [GH-10961]
  • debug: Add a new /v1/agent/metrics/stream API endpoint for streaming of metrics [GH-10399]
  • debug: rename cluster capture target to members, to be more consistent with the terms used by the API. [GH-10804]
  • structs: prohibit config entries from referencing more than one partition at a time [GH-10478]
  • telemetry: add a new agent.tls.cert.expiry metric for tracking when the Agent TLS certificate expires. [GH-10768]
  • telemetry: add a new mesh.active-root-ca.expiry metric for tracking when the root certificate expires. [GH-9924]

DEPRECATIONS:

  • config: the ports.grpc and addresses.grpc configuration settings have been renamed to ports.xds and addresses.xds to better match their function. [GH-10588]

BUG FIXES:

  • api: Fix default values used for optional fields in autopilot configuration update (POST to /v1/operator/autopilot/configuration) [GH-10558] [GH-10559]
  • api: Revert early out errors from license APIs to allow v1.10+ clients to manage licenses on older servers [GH-10952]
  • check root and intermediate CA expiry before using it to sign a leaf certificate. [GH-10500]
  • connect/ca: ensure edits to the key type/bits for the connect builtin CA will regenerate the roots [GH-10330]
  • connect/ca: require new vault mount points when updating the key type/bits for the vault connect CA provider [GH-10331]
  • dns: return an empty answer when asked for an addr dns with type other then A and AAAA. [GH-10401]
  • tls: consider presented intermediates during server connection tls handshake. [GH-10964]
  • use the MaxQueryTime instead of RPCHoldTimeout for blocking RPC queries [GH-8978]. [GH-10299]

v1.10.3

1.10.3 (September 27, 2021)

... (truncated)

Changelog

Sourced from github.com/hashicorp/consul/api's changelog.

UNRELEASED

1.11.0-alpha (September 16, 2021)

SECURITY:

FEATURES:

  • config: add agent config flag for enterprise clients to indicate they wish to join a particular partition [GH-10572]
  • connect: include optional partition prefixes in SPIFFE identifiers [GH-10507]
  • partitions: (Enterprise only) Adds admin partitions, a new feature to enhance Consul's multitenancy capabilites.
  • ui: Add UI support to use Vault as an external source for a service [GH-10769]
  • ui: Adds a copy button to each composite row in tokens list page, if Secret ID returns an actual ID [GH-10735]

IMPROVEMENTS:

  • acl: replication routine to report the last error message. [GH-10612]
  • api: Enable setting query options on agent health and maintenance endpoints. [GH-10691]
  • checks: add failures_before_warning setting for interval checks. [GH-10969]
  • config: (Enterprise Only) Allow specifying permission mode for audit logs. [GH-10732]
  • config: add dns_config.recursor_strategy flag to control the order which DNS recursors are queried [GH-10611]
  • connect/ca: cease including the common name field in generated x509 non-CA certificates [GH-10424]
  • connect: Support manipulating HTTP headers in the mesh. [GH-10613]
  • connect: update supported envoy versions to 1.18.4, 1.17.4, 1.16.5 [GH-10961]
  • debug: Add a new /v1/agent/metrics/stream API endpoint for streaming of metrics [GH-10399]
  • debug: rename cluster capture target to members, to be more consistent with the terms used by the API. [GH-10804]
  • structs: prohibit config entries from referencing more than one partition at a time [GH-10478]
  • telemetry: add a new agent.tls.cert.expiry metric for tracking when the Agent TLS certificate expires. [GH-10768]
  • telemetry: add a new mesh.active-root-ca.expiry metric for tracking when the root certificate expires. [GH-9924]

DEPRECATIONS:

  • config: the ports.grpc and addresses.grpc configuration settings have been renamed to ports.xds and addresses.xds to better match their function. [GH-10588]

BUG FIXES:

  • api: Fix default values used for optional fields in autopilot configuration update (POST to /v1/operator/autopilot/configuration) [GH-10558] [GH-10559]
  • api: Revert early out errors from license APIs to allow v1.10+ clients to manage licenses on older servers [GH-10952]
  • check root and intermediate CA expiry before using it to sign a leaf certificate. [GH-10500]
  • connect/ca: ensure edits to the key type/bits for the connect builtin CA will regenerate the roots [GH-10330]
  • connect/ca: require new vault mount points when updating the key type/bits for the vault connect CA provider [GH-10331]
  • dns: return an empty answer when asked for an addr dns with type other then A and AAAA. [GH-10401]
  • tls: consider presented intermediates during server connection tls handshake. [GH-10964]
  • use the MaxQueryTime instead of RPCHoldTimeout for blocking RPC queries [GH-8978]. [GH-10299]

1.10.3 (September 27, 2021)

... (truncated)

Commits
  • 2783959 ui: Hide create buttons for policies/roles/namespaces with readonly access (#...
  • cc06fb4 ui: Don't show the CRD menu for read-only intentions (#11149)
  • 8ef239f ui: Ensure we clean up javascript based DataSources (#10915)
  • e11aa82 ui: Adds a set of basic unit tests for abilities (#11132)
  • fe0c5a8 docs: Decode K8s secrets with base64decode function
  • 0aef2dc ui: Use last-child for selecting the desired nspace instead of nth-child (#11...
  • e5a5312 ui: Remove refresh-route action for session invalidation (#11105)
  • 9d6155f [1.10.x] grpc: strip local ACL tokens from RPCs during forwarding if crossing...
  • 6dcf27a Merge pull request #11121 from hashicorp/backport/1.10.x/11090
  • c8405a1 docs: Fix grammatical errors in glossary (#10751)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dependabot[bot] commented 3 years ago

Dependabot tried to add @jippi and @burdandrei as reviewers to this PR, but received the following error from GitHub:

POST https://api.github.com/repos/seatgeek/hashi-helper/pulls/261/requested_reviewers: 422 - Reviews may only be requested from collaborators. One or more of the users or teams you specified is not a collaborator of the seatgeek/hashi-helper repository. // See: https://docs.github.com/rest/reference/pulls#request-reviewers-for-a-pull-request
dependabot[bot] commented 2 years ago

Superseded by #262.