chore(deps): update hashicorp/consul docker tag to v1.22.4#78
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
chore(deps): update hashicorp/consul docker tag to v1.22.4#78renovate[bot] wants to merge 1 commit intomasterfrom
renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
Contributor
Author
Branch automerge failureThis PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.
|
4a3e83d to
b30c242
Compare
59c4cc9 to
e336c1b
Compare
deb46ba to
912d508
Compare
fd8aa94 to
d97884e
Compare
d97884e to
03606c9
Compare
03606c9 to
b24b891
Compare
32ad394 to
367cafd
Compare
367cafd to
186e118
Compare
186e118 to
01cdf46
Compare
01cdf46 to
2431514
Compare
2545b20 to
73f4dd2
Compare
cb9ffbd to
b1de556
Compare
b1de556 to
54316d8
Compare
54316d8 to
0a3a98d
Compare
527e04f to
4fadc8a
Compare
4fadc8a to
d87d49f
Compare
0563b0b to
6f34939
Compare
6f34939 to
6ce9448
Compare
2799c2b to
5bc8394
Compare
5bc8394 to
8c07f3d
Compare
e8a05f8 to
d92a1f9
Compare
d92a1f9 to
75b017e
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.11.2→1.22.4Release Notes
hashicorp/consul (hashicorp/consul)
v1.22.4Compare Source
1.22.4 (February 18, 2026)
SECURITY:
alpine3.23[GH-23194]IMPROVEMENTS:
--aws-iam-endpointflag toconsul logincommand for AWS IAM auth method to support custom IAM endpoint configuration [GH-23109]v1.22.3Compare Source
SECURITY:
alpine3.23.2[GH-23138]IMPROVEMENTS:
consul services imported-servicesand new api(/v1/exported-services) command to list services imported by partitions within a local datacenter [GH-12045]v1.22.2Compare Source
1.22.2 (December 15, 2025)
SECURITY:
IMPROVEMENTS:
BUG FIXES:
consul config writecommand to provide actionable guidance when config entries cannot be modified due to references by gateways or routers. [GH-22921]v1.22.1Compare Source
SECURITY:
golang.org/x/cryptofrom v0.42.0 to v0.44.0. This resolves GO-2025-4116IMPROVEMENTS:
reopen()calls with direct property assignment and subclassing to resolve Ember component reopen deprecation warnings [GH-22971]BUG FIXES:
v1.22.0Compare Source
SECURITY:
FEATURES:
IMPROVEMENTS:
consul operator utilization [-today-only] [-message] [-y]to generate a bundle with census utilization snapshot. Main flow is implemented in consul-enterprisehttp: Added a new API Handler for
/v1/operator/utilization. Core functionality to be implemented in consul-enterpriseagent: Always enabled census metrics collection with configurable option to export it to Hashicorp Reporting [GH-22843]
snapshot agentnow supports authenticating to Azure Blob Storage using Azure Managed Service Identities (MSI). [GH-11171]BUG FIXES:
consul operator utilization --helpto show only available options without extra parameters. [GH-22912]v1.21.5Compare Source
SECURITY:
mitchellh/mapstructuretogo-viper/mapstructureto v2 to address CVE-2025-52893. [GH-22581]FEATURES:
max_request_headers_kbto configure maximum header size for requests from downstream to upstream [GH-22604]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in API Gateway config and proxy-defaults [GH-22679]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in Mesh Gateway via service-defaults and proxy-defaults [GH-22722]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in Terminating Gateway service-defaults and proxy-defaults [GH-22680]IMPROVEMENTS:
BUG FIXES:
v1.21.4Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
v1.21.3Compare Source
IMPROVEMENTS:
BUG FIXES:
v1.21.2Compare Source
SECURITY:
CVE-2025-4802
CVE-2024-40896
CVE-2024-12243
CVE-2025-24528
CVE-2025-3277
CVE-2024-12133
CVE-2024-57970
CVE-2025-31115 [GH-22409]
IMPROVEMENTS:
datacenterresulting in non-generation of X.509 certificates when using external CA for agent TLS communication. [GH-22382]BUG FIXES:
v1.21.1Compare Source
FEATURES:
IMPROVEMENTS:
v1.21.0Compare Source
v1.20.6Compare Source
1.20.6 (April 25, 2025)
SECURITY:
golang.org/x/netto v0.38.0 to address GHSA-vvgc-356p-c3xw and GO-2025-3595.Update
github.com/golang-jwt/jwt/v4to v4.5.2 to address GO-2025-3553 and GHSA-mh63-6h87-95cp.Update
Goto v1.23.8 to address GO-2025-3563. [GH-22268]IMPROVEMENTS:
BUG FIXES:
v1.20.5Compare Source
1.20.5 (March 11, 2025)
SECURITY:
golang.org/x/cryptoto v0.35.0 to address GO-2025-3487.Update
golang.org/x/oauth2to v0.27.0 to address GO-2025-3488.Update
github.com/go-jose/go-jose/v3to v3.0.4 to address GO-2025-3485. [GH-22207]BUG FIXES:
v1.20.4Compare Source
1.20.4 (February 20, 2025)
IMPROVEMENTS:
BUG FIXES:
v1.20.3Compare Source
SECURITY:
CVE-2024-45341 and
CVE-2024-45336 [GH-22084]
CVE-2025-22866 [GH-22132]
IMPROVEMENTS:
BUG FIXES:
v1.20.2Compare Source
SECURITY:
github.com/golang-jwt/jwt/v4to v4.5.1 to address GHSA-29wx-vh33-7x7r. [GH-21951]golang.org/x/cryptoto v0.31.0 to address GO-2024-3321. [GH-22001]golang.org/x/netto v0.33.0 to address GO-2024-3333. [GH-22021]registry.access.redhat.com/ubi9-minimalimage to 9.5 to address CVE-2024-3596,CVE-2024-2511,CVE-2024-26458. [GH-22011]FEATURES:
BUG FIXES:
v1.20.1Compare Source
BREAKING CHANGES:
HttpConnectionManager.normalize_pathby default on inbound traffic to mesh proxies. This resolves CVE-2024-10005. [GH-21816]SECURITY:
containsandignoreCaseto L7 Intentions HTTP header matching criteria to support configuration resilient to variable casing and multiple values. This resolves CVE-2024-10006. [GH-21816]http.incoming.requestNormalizationto Mesh configuration entry to support inbound service traffic request normalization. This resolves CVE-2024-10005 and CVE-2024-10006. [GH-21816]IMPROVEMENTS:
v1.20.0Compare Source
SECURITY:
CVE-2024-34155 [GH-21705]
v1.55.5 or higher. This resolves CVEsCVE-2020-8911 and
CVE-2020-8912. [GH-21684]
FEATURES:
IMPROVEMENTS:
BUG FIXES:
v1.19.2Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
v1.19.1Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
This affected Nomad integrations with Consul. [GH-21361]
tag.name.service.consul, were being disregarded. [GH-21361]that was always being logged on each prepared query evaluation. [GH-21381]
v1.19.0Compare Source
BREAKING CHANGES:
consulelement in the metric name have been removed. Please use the same metric without the secondconsulinstead. As an example instead ofconsul.consul.state.config_entriesuseconsul.state.config_entries[GH-20674]SECURITY:
1.27.5 and 1.28.3. This resolves CVECVE-2024-32475 (
auto_sni). [GH-21017]v0.18.7 or higher. This resolves CVECVE-2020-8559. [GH-21017]
FEATURES:
Use
v1dnsin theexperimentsagent config to disable.The legacy server will be removed in a future release of Consul.
See the Consul 1.19.x Release Notes for removed DNS features. [GH-20715]
IMPROVEMENTS:
github.com/envoyproxy/go-control-planeto 0.12.0. [GH-20973]consul-dataplanenow accepts partition, namespace, token as metadata to default those query parameters.consul-dataplanev1.5+ will send this information automatically. [GH-20899]consul snapshot decodeCLI command to output a JSON object stream of all the snapshots data. [GH-20824]telemetry.disable_per_tenancy_usage_metricsin agent configuration to disable setting tenancy labels on usage metrics. This significantly decreases CPU utilization in clusters with many admin partitions or namespaces.DEPRECATIONS:
local_storage,aws_storage,azure_blob_storage, andgoogle_storagein snapshot agent configuration files are now deprecated. Use thebackup_destinationsconfig object instead.BUG FIXES:
v1.18.2Compare Source
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
SECURITY:
alpine:3.19. [GH-20897]vault/apito v1.12.2 to address CVE-2024-28180(removes indirect dependency on impacted
go-jose.v2) [GH-20910]CVE-2024-24787 and
CVE-2024-24788 [GH-21074]
1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3. This resolves CVEsCVE-2024-27919 (
http2). [GH-20956] and CVE-2024-32475 (auto_sni). [GH-21030]v0.18.7 or higher. This resolves CVECVE-2020-8559. [GH-21034]
1.21.9. This resolves CVECVE-2023-45288 (
http2). [GH-20956]v0.24.0. This resolves CVECVE-2023-45288 (
x/net). [GH-20956]IMPROVEMENTS:
BUG FIXES:
DefaultForFailover.DNS requests against sameness groups without this field set will now error as intended.
v1.18.1Compare Source
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
BREAKING CHANGES:
SECURITY:
google.golang.org/protobufto v1.33.0 to address CVE-2024-24786. [GH-20801]alpine3.19. This resolves CVEsCVE-2023-52425
CVE-2023-52426 [GH-20812]
1.21.8. This resolves CVEsCVE-2024-24783 (
crypto/x509).CVE-2023-45290 (
net/http).CVE-2023-45289 (
net/http,net/http/cookiejar).CVE-2024-24785 (
html/template).CVE-2024-24784 (
net/mail). [GH-20812]IMPROVEMENTS:
backup_destinationsconfig file object.BUG FIXES:
v1.18.0Compare Source
BREAKING CHANGES:
telemetry.disable_hostnamewhen determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated astrue, even though its default value isfalse. [GH-20312]SECURITY:
golang.org/x/cryptoto v0.17.0 to address CVE-2023-48795. [GH-20023]FEATURES:
Use
v2dnsin theexperimentsagent config to enable.It will automatically be enabled when using the
resource-apis(Catalog v2) experiment.The new DNS implementation will be the default in Consul 1.19.
See the Consul 1.18.x Release Notes for deprecated DNS features. [GH-20643]
IMPROVEMENTS:
envoy.config.core.v3.HeaderValueOption.append. [GH-20078]envoy.config.route.v3.HeaderMatcher.safe_regex_matchandenvoy.type.matcher.v3.RegexMatcher.google_re2. [GH-20013]BUG FIXES:
v1.17.3Compare Source
SECURITY:
FEATURES:
exported-servicesto list all services exported and their consumers. Refer to the CLI docs for more information. [GH-20331]IMPROVEMENTS:
Internal.ServiceDumpwhen mesh gateway is not used. [GH-20168]Internal.ServiceDumpwatch from proxycfg [GH-20168]CaseInsensitiveflag to service-routers that allows paths and path prefixes to ignore URL upper and lower casing. [GH-19647]BUG FIXES:
httpprotocol fails with a protocol-mismatch error. [GH-20481]v1.17.2Compare Source
KNOWN ISSUES:
SECURITY:
ubi9-minimal:9.3as the base image. [GH-20014]IMPROVEMENTS:
match_subject_alt_namesin favor ofmatch_typed_subject_alt_names. [GH-19954]envoy.config.router.v3.WeightedCluster.total_weight. [GH-20011]envoy.config.cluster.v3.Cluster.http_protocol_options[GH-20010]envoy.config.cluster.v3.Cluster.http2_protocol_options,envoy.config.bootstrap.v3.Admin.access_log_path[GH-19940]envoy.extensions.filters.http.lua.v3.Lua.inline_code[GH-20012]DEPRECATIONS:
-admin-access-log-pathflag fromconsul connect envoycommand in favor of:-admin-access-log-config. [GH-19943]BUG FIXES:
v1.17.1Compare Source
SECURITY:
github.com/golang-jwt/jwt/v4to v4.5.0 to address PRISMA-2022-0270. [GH-19705]CVE-2023-45283: (
path/filepath) recognize ??\ as a Root Local Device path prefix (Windows)CVE-2023-45284: recognize device names with trailing spaces and superscripts (Windows)
CVE-2023-39326: (
net/http) limit chunked dataConfiguration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.