Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump github.com/hashicorp/consul from 1.15.2 to 1.15.3 in /consul-lambda #75

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 6, 2023

Bumps github.com/hashicorp/consul from 1.15.2 to 1.15.3.

Release notes

Sourced from github.com/hashicorp/consul's releases.

v1.15.3

1.15.3 (June 1, 2023)

BREAKING CHANGES:

  • extensions: The Lua extension now targets local proxy listeners for the configured service's upstreams, rather than remote downstream listeners for the configured service, when ListenerType is set to outbound in extension configuration. See CVE-2023-2816 changelog entry for more details. [GH-17415]

SECURITY:

FEATURES:

  • hcp: Add new metrics sink to collect, aggregate and export server metrics to HCP in OTEL format. [GH-17460]

IMPROVEMENTS:

  • Fixes a performance issue in Raft where commit latency can increase by 100x or more when under heavy load. For more details see hashicorp/raft#541. [GH-17081]
  • agent: add a configurable maximimum age (default: 7 days) to prevent servers re-joining a cluster with stale data [GH-17171]
  • agent: add new metrics to track cpu disk and memory usage for server hosts (defaults to: enabled) [GH-17038]
  • connect: update supported envoy versions to 1.22.11, 1.23.8, 1.24.6, 1.25.4 [GH-16889]
  • envoy: add MaxEjectionPercent and BaseEjectionTime to passive health check configs. [GH-15979]
  • hcp: Add support for linking existing Consul clusters to HCP management plane. [GH-16916]
  • logging: change snapshot log header from agent.server.snapshot to agent.server.raft.snapshot [GH-17236]
  • peering: allow re-establishing terminated peering from new token without deleting existing peering first. [GH-16776]
  • peering: gRPC queries for TrustBundleList, TrustBundleRead, PeeringList, and PeeringRead now support blocking semantics, reducing network and CPU demand. The HTTP APIs for Peering List and Read have been updated to support blocking. [GH-17426]
  • raft: Remove expensive reflection from raft/mesh hot path [GH-16552]
  • xds: rename envoy_hcp_metrics_bind_socket_dir to envoy_telemetry_collector_bind_socket_dir to remove HCP naming references. [GH-17327]

BUG FIXES:

  • Fix an bug where decoding some Config structs with unset pointer fields could fail with reflect: call of reflect.Value.Type on zero Value. [GH-17048]
  • acl: (Enterprise only) Check permissions in correct partition/namespace when resolving service in non-default partition/namespace
  • acl: Fix an issue where the anonymous token was synthesized in non-primary datacenters which could cause permission errors when federating clusters with ACL replication enabled. [GH-17231]
  • acls: Fix ACL bug that can result in sidecar proxies having incorrect endpoints.
  • connect: Fix multiple inefficient behaviors when querying service health. [GH-17241]
  • gateways: Fix an bug where targeting a virtual service defined by a service-resolver was broken for HTTPRoutes. [GH-17055]
  • grpc: ensure grpc resolver correctly uses lan/wan addresses on servers [GH-17270]
  • namespaces: adjusts the return type from HTTP list API to return the api module representation of a namespace. This fixes an error with the consul namespace list command when a namespace has a deferred deletion timestamp.
  • peering: Fix issue where modifying the list of exported services did not correctly replicate changes for services that exist in a non-default namespace. [GH-17456]
  • peering: Fix issue where peer streams could incorrectly deregister services in various scenarios. [GH-17235]
  • peering: ensure that merged central configs of peered upstreams for partitioned downstreams work [GH-17179]
  • xds: Fix possible panic that can when generating clusters before the root certificates have been fetched. [GH-17185]
Changelog

Sourced from github.com/hashicorp/consul's changelog.

1.15.3 (June 1, 2023)

BREAKING CHANGES:

  • extensions: The Lua extension now targets local proxy listeners for the configured service's upstreams, rather than remote downstream listeners for the configured service, when ListenerType is set to outbound in extension configuration. See CVE-2023-2816 changelog entry for more details. [GH-17415]

SECURITY:

FEATURES:

  • hcp: Add new metrics sink to collect, aggregate and export server metrics to HCP in OTEL format. [GH-17460]

IMPROVEMENTS:

  • Fixes a performance issue in Raft where commit latency can increase by 100x or more when under heavy load. For more details see hashicorp/raft#541. [GH-17081]
  • agent: add a configurable maximimum age (default: 7 days) to prevent servers re-joining a cluster with stale data [GH-17171]
  • agent: add new metrics to track cpu disk and memory usage for server hosts (defaults to: enabled) [GH-17038]
  • connect: update supported envoy versions to 1.22.11, 1.23.8, 1.24.6, 1.25.4 [GH-16889]
  • envoy: add MaxEjectionPercent and BaseEjectionTime to passive health check configs. [GH-15979]
  • hcp: Add support for linking existing Consul clusters to HCP management plane. [GH-16916]
  • logging: change snapshot log header from agent.server.snapshot to agent.server.raft.snapshot [GH-17236]
  • peering: allow re-establishing terminated peering from new token without deleting existing peering first. [GH-16776]
  • peering: gRPC queries for TrustBundleList, TrustBundleRead, PeeringList, and PeeringRead now support blocking semantics, reducing network and CPU demand. The HTTP APIs for Peering List and Read have been updated to support blocking. [GH-17426]
  • raft: Remove expensive reflection from raft/mesh hot path [GH-16552]
  • xds: rename envoy_hcp_metrics_bind_socket_dir to envoy_telemetry_collector_bind_socket_dir to remove HCP naming references. [GH-17327]

BUG FIXES:

  • Fix an bug where decoding some Config structs with unset pointer fields could fail with reflect: call of reflect.Value.Type on zero Value. [GH-17048]
  • acl: (Enterprise only) Check permissions in correct partition/namespace when resolving service in non-default partition/namespace
  • acl: Fix an issue where the anonymous token was synthesized in non-primary datacenters which could cause permission errors when federating clusters with ACL replication enabled. [GH-17231]
  • acls: Fix ACL bug that can result in sidecar proxies having incorrect endpoints.
  • connect: Fix multiple inefficient behaviors when querying service health. [GH-17241]
  • gateways: Fix an bug where targeting a virtual service defined by a service-resolver was broken for HTTPRoutes. [GH-17055]

... (truncated)

Commits
  • 7ce982c remove reverted feature changelog
  • 23f4653 stage 1.15.3
  • f3b1433 backport of commit cd05b8b921d967f3dde0331cc7d70dc0a3804a4b (#17543)
  • aca09d2 Manual backport 1.15.x of Avoid panic applying TProxy Envoy extensions (#17539)
  • 7d94518 Backport of [API Gateway] Fix use of virtual resolvers in HTTPRoutes into rel...
  • f9d3f8a Backport of hoststats: add package for collecting host statistics including c...
  • d991db5 backport of commit 65d5aeaaac207e134a6ab2f0742e8d5a34c90154 (#17531)
  • fe5a963 backport of commit 94998bec4bad67d29efb2cbcd95ac9c827908d23 (#17518)
  • 1330cc0 backport of commit 87e1f041781a18b55b0841febd53db7c8cc7257f (#17516)
  • c0ee120 backport of commit 2d9ed7c43e0b1e33c56a39fb1d6ba66751cab66f (#17510)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/hashicorp/consul](https://github.com/hashicorp/consul) from 1.15.2 to 1.15.3.
- [Release notes](https://github.com/hashicorp/consul/releases)
- [Changelog](https://github.com/hashicorp/consul/blob/main/CHANGELOG.md)
- [Commits](hashicorp/consul@v1.15.2...v1.15.3)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/consul
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot requested review from a team and kisunji and removed request for a team June 6, 2023 02:05
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jun 6, 2023
@dependabot dependabot bot had a problem deploying to dockerhub/hashicorpdev June 6, 2023 02:10 Failure
@kisunji kisunji requested a review from cthain June 15, 2023 18:28
@cthain
Copy link
Contributor

cthain commented Jun 15, 2023

🤔 May have to take care of this manually because the CI tests are failing. I'll take a look.

@kisunji kisunji removed their request for review June 19, 2023 20:00
@cthain
Copy link
Contributor

cthain commented Jul 12, 2023

There are a couple of issues with CI:

  1. It looks like the golangci-lint step is timing out so we may have to increase the window.
  2. dependabot doesn't have access to the project secrets, so it can't run the ent tests since they need a Consul license.

I'm going to merge this and will fix any problems in a follow up.

@cthain cthain merged commit 69827da into main Jul 12, 2023
@cthain cthain deleted the dependabot/go_modules/consul-lambda/github.com/hashicorp/consul-1.15.3 branch July 12, 2023 13:46
aahel pushed a commit that referenced this pull request Aug 29, 2023
…bda (#75)

Bumps [github.com/hashicorp/consul](https://github.com/hashicorp/consul) from 1.15.2 to 1.15.3.
- [Release notes](https://github.com/hashicorp/consul/releases)
- [Changelog](https://github.com/hashicorp/consul/blob/main/CHANGELOG.md)
- [Commits](hashicorp/consul@v1.15.2...v1.15.3)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/consul
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
aahel pushed a commit that referenced this pull request Mar 4, 2024
…bda (#75)

Bumps [github.com/hashicorp/consul](https://github.com/hashicorp/consul) from 1.15.2 to 1.15.3.
- [Release notes](https://github.com/hashicorp/consul/releases)
- [Changelog](https://github.com/hashicorp/consul/blob/main/CHANGELOG.md)
- [Commits](hashicorp/consul@v1.15.2...v1.15.3)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/consul
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
aahel added a commit that referenced this pull request Mar 5, 2024
* bump version of setup-terraform and remove gotestsum retries

* Update SSM Set to allow for Advanced Tier Parameters (#78)

* Bump github.com/hashicorp/consul from 1.15.2 to 1.15.3 in /consul-lambda (#75)

Bumps [github.com/hashicorp/consul](https://github.com/hashicorp/consul) from 1.15.2 to 1.15.3.
- [Release notes](https://github.com/hashicorp/consul/releases)
- [Changelog](https://github.com/hashicorp/consul/blob/main/CHANGELOG.md)
- [Commits](hashicorp/consul@v1.15.2...v1.15.3)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/consul
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* Bump google.golang.org/grpc from 1.50.1 to 1.53.0 in /test/acceptance (#79)

Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.50.1 to 1.53.0.
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.50.1...v1.53.0)

---
updated-dependencies:
- dependency-name: google.golang.org/grpc
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* Ajsanon/ux updates (#80)

* Lambda Reg UX changes to simplify for users

* - added pull through cache
- removed all provisioners and used providers

* bumped lambda_registrator_image tag

* fixed terraform fmt

* moved providers to examples/lambda providers.tf

* fixed provider and other minor fixes

* added pull_through var in examples

* fixed terraform lint

* fix minor fmt issues

* review fixes

* minor name change

* fix tf lint

* variable name changes

* added changelog

---------

Co-authored-by: AJ Sanon <aj.sanon@hashicorp.com>

* Revert "Ajsanon/ux updates (#80)" (#81)

This reverts commit db2b43a.

* Add support for pushing `consul-lambda-registrator` public image to p… (#82)

* Add support for pushing `consul-lambda-registrator` public image to private ecr repo through terraform

* fmt tf

* minor readme fix

* addressed review comments

* added fixes and fixed acceptance test

* updated aws provider version

* updated aws provider version

* added force_delete to aws_ecr_repository in test

* fmt tf

* Update modules/lambda-registrator/main.tf

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* Update modules/lambda-registrator/main.tf

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* Update modules/lambda-registrator/variables.tf

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* grouped data sources together

* added review changes

* add some fixes

* test fixes

* minor test fix

* added default "" to test ecr_image_uri

* fmt tf

* Update modules/lambda-registrator/main.tf

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* added validation test

* fixed tf fmt and made validation test parallel

* removed validation test from basic test

* added test case to validate when privateEcrReponame is set

* updated enable_auto_publish_ecr_image var description

* fixed tf fmt

* Update modules/lambda-registrator/variables.tf

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* changed consul_image version in basic_test

---------

Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>

* Update to use CRT prepare workflow

This update, moves consul-dataplane to use the prepare workflow. This workflow encapsulates several previous workflows, running jobs in parallel to reduce the artifact processing time. See https://hashicorp.atlassian.net/wiki/spaces/RELENG/pages/2489712686/Dec+7th+2022+-+Introducing+the+new+Prepare+workflow for more info.

* [COMPLIANCE] Add Copyright and License Headers (#83)

Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>

* Bump golang.org/x/net from 0.7.0 to 0.17.0 in /test/acceptance (#85)

Bumps [golang.org/x/net](https://github.com/golang/net) from 0.7.0 to 0.17.0.
- [Commits](golang/net@v0.7.0...v0.17.0)

---
updated-dependencies:
- dependency-name: golang.org/x/net
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* NET-7753 - Support for arm64 builds (#90)

* support for arm64 init

* fix runs on

* fix runs on

* fix lint-consul-retry

* removed arch

* add self hosted machine

* fix os

* fix platform

* fix -race

* session manager fix

* unzip with overwrite flag

* fix vpc issue

* arm self hosted

* remvoed -override

* using docker/setup-qemu-action (#91)

* using docker/setup-qemu-action

* minor fix

* minor fix

* minor fix

* refactor

* added emulation to terrafrom-ci

* remveod unused env variable

* changed working directory for unit tests

* not pushing arm image to hashicorpdev

* building arm and amd binaries for extension and lambda for acc test

* minor workflow fix

* temp change

* passing arch to lambda funcs

* fmt tf

* passing arch through preexisting lambda

* fix tf

* changed lambda runtime

* changed lambda binary name bootstrap

* fix go build

* reverted extension build changes

* increased lambda timeout

* removed timeout from lambda func

* fmt tf

* changed lambda handler

* updated aws -lambda-go lib

* minor refactor

* removed unused step matrix strategy and added some comments

* setting unique name for private ecr repo

* setting arch for buildig registrator image

* temp fix

* building arm

* docker buildx setup

* fixed docker build

* fix makefile

* fix makefile

* bumped aws-lambda-go lib version

* temp fix

* makefile change

* test

* modifief registrator tf to support arch

* added back other tc

* increased timeout

* changhed timeout

* adjusted timeout

* increased timeout

* bumped consul image version

* removed emulation from acc test

* fix tf ci

* fix tf ci

* increased lambda timeout

* increade timeout

* making registrator amd64

* temp removed arm regist

* readded emulation

* reverted some changes

* restored eralier version of consul

* added arm reg

* passed arch to reg

* tf fmt

* removed arch in ecr tf

* removed arch

* only amd

* add max paralle 1

* fix arch

* fix makefile

* added buildx

* added back emulation

* max p 1

* only arm

* increase timeout

* dummy commit to trigger CI

* using different docker tga

* fix arch in docker tag

* docker push correct arch

* fix output

* fix image tag

* fixed arch var

* added multiarch build

* fmt tf

* fix docker build

* build fix

* increased timeout

* skipped test

* removed arch unit tests

* removed specifying arch in registrator module

* removed passing arch to registrator

* readded reg arch

* fixed p[assing arch

* reenabled arm test for autopublish

* fmt tf

* fixed validation

---------

Co-authored-by: aahel <aahel.guha@hashicorp.com>

* prerelease version change

* updated changelog

---------

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: Chris Thain <chris.m.thain@gmail.com>
Co-authored-by: Ryan Eskin <55214537+reskin89@users.noreply.github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: AJ Sanon <aj.sanon@hashicorp.com>
Co-authored-by: Chris Thain <32781396+cthain@users.noreply.github.com>
Co-authored-by: Sarah Thompson <sthompson@hashicorp.com>
Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
Co-authored-by: Ashesh Vidyut <134911583+absolutelightning@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant