-
Notifications
You must be signed in to change notification settings - Fork 17
chore(deps): update hashicorp/consul docker tag to v1.22.1 #78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/hashicorp-consul-1.x
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Contributor
Author
Branch automerge failureThis PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.
|
4a3e83d to
b30c242
Compare
59c4cc9 to
e336c1b
Compare
deb46ba to
912d508
Compare
fd8aa94 to
d97884e
Compare
d97884e to
03606c9
Compare
03606c9 to
b24b891
Compare
32ad394 to
367cafd
Compare
367cafd to
186e118
Compare
186e118 to
01cdf46
Compare
01cdf46 to
2431514
Compare
0b8d5a4 to
bc0f67a
Compare
bc0f67a to
f277aa8
Compare
f277aa8 to
5a6569e
Compare
d562792 to
de3cc01
Compare
de3cc01 to
a2f054c
Compare
2545b20 to
73f4dd2
Compare
cb9ffbd to
b1de556
Compare
b1de556 to
54316d8
Compare
54316d8 to
0a3a98d
Compare
527e04f to
4fadc8a
Compare
4fadc8a to
d87d49f
Compare
d87d49f to
0563b0b
Compare
0563b0b to
6f34939
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.11.2->1.22.1Release Notes
hashicorp/consul (hashicorp/consul)
v1.22.1Compare Source
1.22.1 (November 16, 2025)
SECURITY:
golang.org/x/cryptofrom v0.42.0 to v0.44.0. This resolves GO-2025-4116IMPROVEMENTS:
reopen()calls with direct property assignment and subclassing to resolve Ember component reopen deprecation warnings [GH-22971]BUG FIXES:
v1.22.0Compare Source
SECURITY:
FEATURES:
IMPROVEMENTS:
consul operator utilization [-today-only] [-message] [-y]to generate a bundle with census utilization snapshot. Main flow is implemented in consul-enterprisehttp: Added a new API Handler for
/v1/operator/utilization. Core functionality to be implemented in consul-enterpriseagent: Always enabled census metrics collection with configurable option to export it to Hashicorp Reporting [GH-22843]
snapshot agentnow supports authenticating to Azure Blob Storage using Azure Managed Service Identities (MSI). [GH-11171]BUG FIXES:
consul operator utilization --helpto show only available options without extra parameters. [GH-22912]v1.21.5Compare Source
SECURITY:
mitchellh/mapstructuretogo-viper/mapstructureto v2 to address CVE-2025-52893. [GH-22581]FEATURES:
max_request_headers_kbto configure maximum header size for requests from downstream to upstream [GH-22604]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in API Gateway config and proxy-defaults [GH-22679]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in Mesh Gateway via service-defaults and proxy-defaults [GH-22722]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in Terminating Gateway service-defaults and proxy-defaults [GH-22680]IMPROVEMENTS:
BUG FIXES:
v1.21.4Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
v1.21.3Compare Source
IMPROVEMENTS:
BUG FIXES:
v1.21.2Compare Source
SECURITY:
CVE-2025-4802
CVE-2024-40896
CVE-2024-12243
CVE-2025-24528
CVE-2025-3277
CVE-2024-12133
CVE-2024-57970
CVE-2025-31115 [GH-22409]
IMPROVEMENTS:
datacenterresulting in non-generation of X.509 certificates when using external CA for agent TLS communication. [GH-22382]BUG FIXES:
v1.21.1Compare Source
FEATURES:
IMPROVEMENTS:
v1.21.0Compare Source
v1.20.6Compare Source
1.20.6 (April 25, 2025)
SECURITY:
golang.org/x/netto v0.38.0 to address GHSA-vvgc-356p-c3xw and GO-2025-3595.Update
github.com/golang-jwt/jwt/v4to v4.5.2 to address GO-2025-3553 and GHSA-mh63-6h87-95cp.Update
Goto v1.23.8 to address GO-2025-3563. [GH-22268]IMPROVEMENTS:
BUG FIXES:
v1.20.5Compare Source
1.20.5 (March 11, 2025)
SECURITY:
golang.org/x/cryptoto v0.35.0 to address GO-2025-3487.Update
golang.org/x/oauth2to v0.27.0 to address GO-2025-3488.Update
github.com/go-jose/go-jose/v3to v3.0.4 to address GO-2025-3485. [GH-22207]BUG FIXES:
v1.20.4Compare Source
1.20.4 (February 20, 2025)
IMPROVEMENTS:
BUG FIXES:
v1.20.3Compare Source
SECURITY:
CVE-2024-45341 and
CVE-2024-45336 [GH-22084]
CVE-2025-22866 [GH-22132]
IMPROVEMENTS:
BUG FIXES:
v1.20.2Compare Source
SECURITY:
github.com/golang-jwt/jwt/v4to v4.5.1 to address GHSA-29wx-vh33-7x7r. [GH-21951]golang.org/x/cryptoto v0.31.0 to address GO-2024-3321. [GH-22001]golang.org/x/netto v0.33.0 to address GO-2024-3333. [GH-22021]registry.access.redhat.com/ubi9-minimalimage to 9.5 to address CVE-2024-3596,CVE-2024-2511,CVE-2024-26458. [GH-22011]FEATURES:
BUG FIXES:
v1.20.1Compare Source
BREAKING CHANGES:
HttpConnectionManager.normalize_pathby default on inbound traffic to mesh proxies. This resolves CVE-2024-10005. [GH-21816]SECURITY:
containsandignoreCaseto L7 Intentions HTTP header matching criteria to support configuration resilient to variable casing and multiple values. This resolves CVE-2024-10006. [GH-21816]http.incoming.requestNormalizationto Mesh configuration entry to support inbound service traffic request normalization. This resolves CVE-2024-10005 and CVE-2024-10006. [GH-21816]IMPROVEMENTS:
v1.20.0Compare Source
SECURITY:
CVE-2024-34155 [GH-21705]
v1.55.5 or higher. This resolves CVEsCVE-2020-8911 and
CVE-2020-8912. [GH-21684]
FEATURES:
IMPROVEMENTS:
BUG FIXES:
v1.19.2Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
v1.19.1Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
This affected Nomad integrations with Consul. [GH-21361]
tag.name.service.consul, were being disregarded. [GH-21361]that was always being logged on each prepared query evaluation. [GH-21381]
v1.19.0Compare Source
BREAKING CHANGES:
consulelement in the metric name have been removed. Please use the same metric without the secondconsulinstead. As an example instead ofconsul.consul.state.config_entriesuseconsul.state.config_entries[GH-20674]SECURITY:
1.27.5 and 1.28.3. This resolves CVECVE-2024-32475 (
auto_sni). [GH-21017]v0.18.7 or higher. This resolves CVECVE-2020-8559. [GH-21017]
FEATURES:
Use
v1dnsin theexperimentsagent config to disable.The legacy server will be removed in a future release of Consul.
See the Consul 1.19.x Release Notes for removed DNS features. [GH-20715]
IMPROVEMENTS:
github.com/envoyproxy/go-control-planeto 0.12.0. [GH-20973]consul-dataplanenow accepts partition, namespace, token as metadata to default those query parameters.consul-dataplanev1.5+ will send this information automatically. [GH-20899]consul snapshot decodeCLI command to output a JSON object stream of all the snapshots data. [GH-20824]telemetry.disable_per_tenancy_usage_metricsin agent configuration to disable setting tenancy labels on usage metrics. This significantly decreases CPU utilization in clusters with many admin partitions or namespaces.DEPRECATIONS:
local_storage,aws_storage,azure_blob_storage, andgoogle_storagein snapshot agent configuration files are now deprecated. Use thebackup_destinationsconfig object instead.BUG FIXES:
v1.18.2Compare Source
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
SECURITY:
alpine:3.19. [GH-20897]vault/apito v1.12.2 to address CVE-2024-28180(removes indirect dependency on impacted
go-jose.v2) [GH-20910]CVE-2024-24787 and
CVE-2024-24788 [GH-21074]
1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3. This resolves CVEsCVE-2024-27919 (
http2). [GH-20956] and CVE-2024-32475 (auto_sni). [GH-21030]v0.18.7 or higher. This resolves CVECVE-2020-8559. [GH-21034]
1.21.9. This resolves CVECVE-2023-45288 (
http2). [GH-20956]v0.24.0. This resolves CVECVE-2023-45288 (
x/net). [GH-20956]IMPROVEMENTS:
BUG FIXES:
DefaultForFailover.DNS requests against sameness groups without this field set will now error as intended.
v1.18.1Compare Source
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
BREAKING CHANGES:
SECURITY:
google.golang.org/protobufto v1.33.0 to address CVE-2024-24786. [GH-20801]alpine3.19. This resolves CVEsCVE-2023-52425
CVE-2023-52426 [GH-20812]
1.21.8. This resolves CVEsCVE-2024-24783 (
crypto/x509).CVE-2023-45290 (
net/http).CVE-2023-45289 (
net/http,net/http/cookiejar).CVE-2024-24785 (
html/template).CVE-2024-24784 (
net/mail). [GH-20812]IMPROVEMENTS:
backup_destinationsconfig file object.BUG FIXES:
v1.18.0Compare Source
BREAKING CHANGES:
telemetry.disable_hostnamewhen determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated astrue, even though its default value isfalse. [GH-20312]SECURITY:
golang.org/x/cryptoto v0.17.0 to address CVE-2023-48795. [GH-20023]FEATURES:
Use
v2dnsin theexperimentsagent config to enable.It will automatically be enabled when using the
resource-apis(Catalog v2) experiment.The new DNS implementation will be the default in Consul 1.19.
See the Consul 1.18.x Release Notes for deprecated DNS features. [GH-20643]
IMPROVEMENTS:
envoy.config.core.v3.HeaderValueOption.append. [GH-20078]envoy.config.route.v3.HeaderMatcher.safe_regex_matchandenvoy.type.matcher.v3.RegexMatcher.google_re2. [GH-20013]BUG FIXES:
v1.17.3Compare Source
SECURITY:
FEATURES:
exported-servicesto list all services exported and their consumers. Refer to the CLI docs for more information. [GH-20331]IMPROVEMENTS:
Internal.ServiceDumpwhen mesh gateway is not used. [GH-20168]Internal.ServiceDumpwatch from proxycfg [GH-20168]CaseInsensitiveflag to service-routers that allows paths and path prefixes to ignore URL upper and lower casing. [GH-19647]BUG FIXES:
httpprotocol fails with a protocol-mismatch error. [GH-20481]v1.17.2Compare Source
KNOWN ISSUES:
SECURITY:
ubi9-minimal:9.3as the base image. [GH-20014]IMPROVEMENTS:
match_subject_alt_namesin favor ofmatch_typed_subject_alt_names. [GH-19954]envoy.config.router.v3.WeightedCluster.total_weight. [GH-20011]envoy.config.cluster.v3.Cluster.http_protocol_options[GH-20010]envoy.config.cluster.v3.Cluster.http2_protocol_options,envoy.config.bootstrap.v3.Admin.access_log_path[GH-19940]envoy.extensions.filters.http.lua.v3.Lua.inline_code[GH-20012]DEPRECATIONS:
-admin-access-log-pathflag fromconsul connect envoycommand in favor of:-admin-access-log-config. [GH-19943]BUG FIXES:
v1.17.1Compare Source
SECURITY:
github.com/golang-jwt/jwt/v4to v4.5.0 to address PRISMA-2022-0270. [GH-19705]CVE-2023-45283: (
path/filepath) recognize ??\ as a Root Local Device path prefix (Windows)CVE-2023-45284: recognize device names with trailing spaces and superscripts (Windows)
CVE-2023-39326: (
net/http) limit chunked data overheadCVE-2023-45285: (
cmd/go) go get may unexpectedly fallback to insecure git [GH-19840]FEATURES:
peering exported-servicesto list services exported to a peer . Refer to the CLI docs for more information. [GH-19821]IMPROVEMENTS:
stats_flush_intervalto 60 seconds when using the Consul Telemetry Collector, unless custom stats sink are present or an explicit flush interval is configured. [GH-19663]BUG FIXES:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.