chore(deps): update hashicorp/consul docker tag to v1.22.3#21
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update hashicorp/consul docker tag to v1.22.3#21renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
de1314f to
418f8b0
Compare
418f8b0 to
343cea1
Compare
Welcome to Codecov 🎉Once you merge this PR into your default branch, you're all set! Codecov will compare coverage reports and display results in all future pull requests. Thanks for integrating Codecov - We've got you covered ☂️ |
343cea1 to
e831c20
Compare
e831c20 to
39fc6e8
Compare
39fc6e8 to
4991bd6
Compare
4991bd6 to
73706a2
Compare
73706a2 to
1132981
Compare
1132981 to
443ff44
Compare
443ff44 to
d80c6a7
Compare
d80c6a7 to
7e3ff8e
Compare
7e3ff8e to
9951ede
Compare
9951ede to
c4774dd
Compare
c4774dd to
ae7a6f7
Compare
ae7a6f7 to
f1a3950
Compare
f1a3950 to
55ff3b0
Compare
6022c58 to
286b2a7
Compare
286b2a7 to
e722405
Compare
e722405 to
51cfd35
Compare
51cfd35 to
7070a70
Compare
7070a70 to
651a6bc
Compare
651a6bc to
c3546cc
Compare
c3546cc to
68d4c96
Compare
68d4c96 to
bdab2da
Compare
bdab2da to
37d973c
Compare
37d973c to
e88025f
Compare
e88025f to
b36c630
Compare
b36c630 to
00fb597
Compare
00fb597 to
02e2583
Compare
02e2583 to
285ab48
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.10.0→1.22.3Release Notes
hashicorp/consul (hashicorp/consul)
v1.22.3Compare Source
SECURITY:
alpine3.23.2[GH-23138]IMPROVEMENTS:
consul services imported-servicesand new api(/v1/exported-services) command to list services imported by partitions within a local datacenter [GH-12045]v1.22.2Compare Source
1.22.2 (December 15, 2025)
SECURITY:
IMPROVEMENTS:
BUG FIXES:
consul config writecommand to provide actionable guidance when config entries cannot be modified due to references by gateways or routers. [GH-22921]v1.22.1Compare Source
SECURITY:
golang.org/x/cryptofrom v0.42.0 to v0.44.0. This resolves GO-2025-4116IMPROVEMENTS:
reopen()calls with direct property assignment and subclassing to resolve Ember component reopen deprecation warnings [GH-22971]BUG FIXES:
v1.22.0Compare Source
SECURITY:
FEATURES:
IMPROVEMENTS:
consul operator utilization [-today-only] [-message] [-y]to generate a bundle with census utilization snapshot. Main flow is implemented in consul-enterprisehttp: Added a new API Handler for
/v1/operator/utilization. Core functionality to be implemented in consul-enterpriseagent: Always enabled census metrics collection with configurable option to export it to Hashicorp Reporting [GH-22843]
snapshot agentnow supports authenticating to Azure Blob Storage using Azure Managed Service Identities (MSI). [GH-11171]BUG FIXES:
consul operator utilization --helpto show only available options without extra parameters. [GH-22912]v1.21.5Compare Source
SECURITY:
mitchellh/mapstructuretogo-viper/mapstructureto v2 to address CVE-2025-52893. [GH-22581]FEATURES:
max_request_headers_kbto configure maximum header size for requests from downstream to upstream [GH-22604]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in API Gateway config and proxy-defaults [GH-22679]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in Mesh Gateway via service-defaults and proxy-defaults [GH-22722]max_request_headers_kbto configure maximum header size for requests from downstream to upstream in Terminating Gateway service-defaults and proxy-defaults [GH-22680]IMPROVEMENTS:
BUG FIXES:
v1.21.4Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
v1.21.3Compare Source
IMPROVEMENTS:
BUG FIXES:
v1.21.2Compare Source
SECURITY:
CVE-2025-4802
CVE-2024-40896
CVE-2024-12243
CVE-2025-24528
CVE-2025-3277
CVE-2024-12133
CVE-2024-57970
CVE-2025-31115 [GH-22409]
IMPROVEMENTS:
datacenterresulting in non-generation of X.509 certificates when using external CA for agent TLS communication. [GH-22382]BUG FIXES:
v1.21.1Compare Source
FEATURES:
IMPROVEMENTS:
v1.21.0Compare Source
v1.20.6Compare Source
1.20.6 (April 25, 2025)
SECURITY:
golang.org/x/netto v0.38.0 to address GHSA-vvgc-356p-c3xw and GO-2025-3595.Update
github.com/golang-jwt/jwt/v4to v4.5.2 to address GO-2025-3553 and GHSA-mh63-6h87-95cp.Update
Goto v1.23.8 to address GO-2025-3563. [GH-22268]IMPROVEMENTS:
BUG FIXES:
v1.20.5Compare Source
1.20.5 (March 11, 2025)
SECURITY:
golang.org/x/cryptoto v0.35.0 to address GO-2025-3487.Update
golang.org/x/oauth2to v0.27.0 to address GO-2025-3488.Update
github.com/go-jose/go-jose/v3to v3.0.4 to address GO-2025-3485. [GH-22207]BUG FIXES:
v1.20.4Compare Source
1.20.4 (February 20, 2025)
IMPROVEMENTS:
BUG FIXES:
v1.20.3Compare Source
SECURITY:
CVE-2024-45341 and
CVE-2024-45336 [GH-22084]
CVE-2025-22866 [GH-22132]
IMPROVEMENTS:
BUG FIXES:
v1.20.2Compare Source
SECURITY:
github.com/golang-jwt/jwt/v4to v4.5.1 to address GHSA-29wx-vh33-7x7r. [GH-21951]golang.org/x/cryptoto v0.31.0 to address GO-2024-3321. [GH-22001]golang.org/x/netto v0.33.0 to address GO-2024-3333. [GH-22021]registry.access.redhat.com/ubi9-minimalimage to 9.5 to address CVE-2024-3596,CVE-2024-2511,CVE-2024-26458. [GH-22011]FEATURES:
BUG FIXES:
v1.20.1Compare Source
BREAKING CHANGES:
HttpConnectionManager.normalize_pathby default on inbound traffic to mesh proxies. This resolves CVE-2024-10005. [GH-21816]SECURITY:
containsandignoreCaseto L7 Intentions HTTP header matching criteria to support configuration resilient to variable casing and multiple values. This resolves CVE-2024-10006. [GH-21816]http.incoming.requestNormalizationto Mesh configuration entry to support inbound service traffic request normalization. This resolves CVE-2024-10005 and CVE-2024-10006. [GH-21816]IMPROVEMENTS:
v1.20.0Compare Source
SECURITY:
CVE-2024-34155 [GH-21705]
v1.55.5 or higher. This resolves CVEsCVE-2020-8911 and
CVE-2020-8912. [GH-21684]
FEATURES:
IMPROVEMENTS:
BUG FIXES:
v1.19.2Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
v1.19.1Compare Source
SECURITY:
IMPROVEMENTS:
BUG FIXES:
This affected Nomad integrations with Consul. [GH-21361]
tag.name.service.consul, were being disregarded. [GH-21361]that was always being logged on each prepared query evaluation. [GH-21381]
v1.19.0Compare Source
BREAKING CHANGES:
consulelement in the metric name have been removed. Please use the same metric without the secondconsulinstead. As an example instead ofconsul.consul.state.config_entriesuseconsul.state.config_entries[GH-20674]SECURITY:
1.27.5 and 1.28.3. This resolves CVECVE-2024-32475 (
auto_sni). [GH-21017]v0.18.7 or higher. This resolves CVECVE-2020-8559. [GH-21017]
FEATURES:
Use
v1dnsin theexperimentsagent config to disable.The legacy server will be removed in a future release of Consul.
See the Consul 1.19.x Release Notes for removed DNS features. [GH-20715]
IMPROVEMENTS:
github.com/envoyproxy/go-control-planeto 0.12.0. [GH-20973]consul-dataplanenow accepts partition, namespace, token as metadata to default those query parameters.consul-dataplanev1.5+ will send this information automatically. [GH-20899]consul snapshot decodeCLI command to output a JSON object stream of all the snapshots data. [GH-20824]telemetry.disable_per_tenancy_usage_metricsin agent configuration to disable setting tenancy labels on usage metrics. This significantly decreases CPU utilization in clusters with many admin partitions or namespaces.DEPRECATIONS:
local_storage,aws_storage,azure_blob_storage, andgoogle_storagein snapshot agent configuration files are now deprecated. Use thebackup_destinationsconfig object instead.BUG FIXES:
v1.18.2Compare Source
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
SECURITY:
alpine:3.19. [GH-20897]vault/apito v1.12.2 to address CVE-2024-28180(removes indirect dependency on impacted
go-jose.v2) [GH-20910]CVE-2024-24787 and
CVE-2024-24788 [GH-21074]
1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3. This resolves CVEsCVE-2024-27919 (
http2). [GH-20956] and CVE-2024-32475 (auto_sni). [GH-21030]v0.18.7 or higher. This resolves CVECVE-2020-8559. [GH-21034]
1.21.9. This resolves CVECVE-2023-45288 (
http2). [GH-20956]v0.24.0. This resolves CVECVE-2023-45288 (
x/net). [GH-20956]IMPROVEMENTS:
BUG FIXES:
DefaultForFailover.DNS requests against sameness groups without this field set will now error as intended.
v1.18.1Compare Source
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
BREAKING CHANGES:
SECURITY:
google.golang.org/protobufto v1.33.0 to address CVE-2024-24786. [GH-20801]alpine3.19. This resolves CVEsCVE-2023-52425
CVE-2023-52426 [GH-20812]
1.21.8. This resolves CVEsCVE-2024-24783 (
crypto/x509).CVE-2023-45290 (
net/http).CVE-2023-45289 (
net/http,net/http/cookiejar).CVE-2024-24785 (
html/template).CVE-2024-24784 (
net/mail). [GH-20812]IMPROVEMENTS:
backup_destinationsconfig file object.BUG FIXES:
v1.18.0Compare Source
BREAKING CHANGES:
telemetry.disable_hostnamewhen determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated astrue, even though its default value isfalse. [GH-20312]SECURITY:
golang.org/x/cryptoto v0.17.0 to address CVE-2023-48795. [GH-20023]FEATURES:
Use
v2dnsin theexperimentsagent config to enable.It will automatically be enabled when using the
resource-apis(Catalog v2) experiment.The new DNS implementation will be the default in Consul 1.19.
See the Consul 1.18.x Release Notes for deprecated DNS features. [GH-20643]
IMPROVEMENTS:
envoy.config.core.v3.HeaderValueOption.append. [GH-20078]envoy.config.route.v3.HeaderMatcher.safe_regex_matchandenvoy.type.matcher.v3.RegexMatcher.google_re2. [GH-20013]BUG FIXES:
v1.17.3Compare Source
SECURITY:
FEATURES:
exported-servicesto list all services exported and their consumers. Refer to the CLI docs for more information. [GH-20331]IMPROVEMENTS:
Internal.ServiceDumpwhen mesh gateway is not used. [GH-20168]Internal.ServiceDumpwatch from proxycfg [GH-20168]CaseInsensitiveflag to service-routers that allows paths and path prefixes to ignore URL upper and lower casing. [GH-19647]BUG FIXES:
httpprotocol fails with a protocol-mismatch error. [GH-20481]v1.17.2Compare Source
KNOWN ISSUES:
SECURITY:
ubi9-minimal:9.3as the base image. [GH-20014]IMPROVEMENTS:
match_subject_alt_namesin favor ofmatch_typed_subject_alt_names. [GH-19954]envoy.config.router.v3.WeightedCluster.total_weight. [GH-20011]envoy.config.cluster.v3.Cluster.http_protocol_options[GH-20010]envoy.config.cluster.v3.Cluster.http2_protocol_options,envoy.config.bootstrap.v3.Admin.access_log_path[GH-19940]envoy.extensions.filters.http.lua.v3.Lua.inline_code[GH-20012]DEPRECATIONS:
-admin-access-log-pathflag fromconsul connect envoycommand in favor of:-admin-access-log-config. [GH-19943]BUG FIXES:
v1.17.1Compare Source
SECURITY:
github.com/golang-jwt/jwt/v4to v4.5.0 to address PRISMA-2022-0270. [GH-19705]CVE-2023-45283: (
path/filepath) recognize ??\ as a Root Local Device path prefix (Windows)CVE-2023-45284: recognize device names with trailing spaces and superscripts (Windows)
CVE-2023-39326: (
net/http) limit chunked data overheadCVE-2023-45285: (
cmd/go) go get may unexpectedly fallback to insecure git [GH-19840]FEATURES:
peering exported-servicesto list services exported to a peer . Refer to the CLI docs for more information. [GH-19821]IMPROVEMENTS:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.