pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/sysutils/consul sysutils/consul: Update to 1.2.2
details: https://anonhg.NetBSD.org/pkgsrc/rev/69aa123c5b91
branches: trunk
changeset: 311077:69aa123c5b91
user: fhajny <fhajny%pkgsrc.org@localhost>
date: Tue Jul 31 12:34:55 2018 +0000
description:
sysutils/consul: Update to 1.2.2
## 1.2.2 (July 30, 2018)
SECURITY:
- acl: Fixed an issue where writes operations on the Keyring and
Operator were being allowed with a default allow policy even when
explicitly denied in the policy.
FEATURES:
- **Alias Checks:** Alias checks allow a service or node to alias the
health status of another service or node in the cluster.
- agent: New Cloud Auto-join providers: vSphere and Packet.net.
- cli: Added `-serf-wan-port`, `-serf-lan-port`, and `-server-port`
flags to CLI for cases where these can't be specified in config
files and `-hcl` is too cumbersome.
- connect: The TTL of leaf (service) certificates in Connect is now
configurable.
IMPROVEMENTS:
- proxy: With `-register` flag, heartbeat failures will only log once
service registration succeeds.
- http: 1.0.3 introduced rejection of non-printable chars in HTTP URLs
due to a security vulnerability. Some users who had keys written
with an older version which are now dissallowed were unable to delete
them. A new config option disable_http_unprintable_char_filter is
added to allow those users to remove the offending keys. Leaving this
new option set long term is strongly discouraged as it bypasses
filtering necessary to prevent some known vulnerabilities.
- agent: Allow for advanced configuration of some gossip related
parameters.
- agent: Make some Gossip tuneables configurable via the config file
- ui: Included searching on `.Tags` when using the freetext search
field.
- ui: Service.ID's are now shown in the Service detail page and (only
if it is different from the service name) the Node Detail >
[Services] tab.
BUG FIXES:
- acl/connect: Fix an issue that was causing managed proxies not to
work when ACLs were enabled.
- connect: Fix issue with managed proxies and watches attempting to
use a client addr that is 0.0.0.0 or ::
- connect: Allow Native and Unmanaged proxy configurations via config
file
- connect: Fix bug causing 100% CPU on agent when Connect is disabled
but a proxy is still running
- proxy: Don't restart proxies setup in a config file when Consul
restarts
- ui: Display the Service.IP address instead of the Node.IP address in
the Service detail view.
- ui: Watch for trailing slash stripping 301 redirects and forward the
user to the correct location.
- connect: Fixed an issue in the connect native HTTP client where it
failed to resolve service names.
## 1.2.1 (July 12, 2018)
IMPROVEMENTS:
- acl: Prevented multiple ACL token refresh operations from occurring
simultaneously.
- acl: Add async-cache down policy mode to always do ACL token
refreshes in the background to reduce latency.
- proxy: Pass through HTTP client env vars to managed proxies so that
they can connect back to Consul over HTTPs when not serving HTTP.
- connect: Persist intermediate CAs on leader change.
BUG FIXES:
- api: Intention APIs parse error response body for error message.
- agent: Intention read endpoint returns a 400 on invalid UUID
- agent: Service registration with "services" does not error on
Connect upstream configuration.
- dns: Ensure that TXT RRs dont get put in the Answer section for
A/AAAA queries.
- dns: Ensure that only 1 CNAME is returned when querying for services
that have non-IP service addresses.
- api: Fixed issue where `Lock` and `Semaphore` would return earlier
than their requested timeout when unable to acquire the lock.
- watch: Fix issue with HTTPs only agents not executing watches
properly
- agent: Managed proxies that bind to 0.0.0.0 now get a health check
on a sane IP
- server: (Consul Enterprise) Fixed an issue causing Consul to panic
when network areas were used
- license: (Consul Enterprise) Fixed an issue causing the snapshot
agent to log erroneous licensing errors
diffstat:
sysutils/consul/Makefile | 4 ++--
sysutils/consul/distinfo | 10 +++++-----
2 files changed, 7 insertions(+), 7 deletions(-)
diffs (27 lines):
diff -r 8fabe7f0f092 -r 69aa123c5b91 sysutils/consul/Makefile
--- a/sysutils/consul/Makefile Tue Jul 31 12:32:04 2018 +0000
+++ b/sysutils/consul/Makefile Tue Jul 31 12:34:55 2018 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.34 2018/07/03 12:14:30 fhajny Exp $
+# $NetBSD: Makefile,v 1.35 2018/07/31 12:34:55 fhajny Exp $
-DISTNAME= consul-1.2.0
+DISTNAME= consul-1.2.2
CATEGORIES= sysutils
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff -r 8fabe7f0f092 -r 69aa123c5b91 sysutils/consul/distinfo
--- a/sysutils/consul/distinfo Tue Jul 31 12:32:04 2018 +0000
+++ b/sysutils/consul/distinfo Tue Jul 31 12:34:55 2018 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.26 2018/07/03 12:14:30 fhajny Exp $
+$NetBSD: distinfo,v 1.27 2018/07/31 12:34:55 fhajny Exp $
-SHA1 (consul-1.2.0.tar.gz) = 80b62983aa44a7f90ad1619333a693a1d0af1fd5
-RMD160 (consul-1.2.0.tar.gz) = 97cd544c27de436a6f910f67e4a9cf4d643bb70c
-SHA512 (consul-1.2.0.tar.gz) = 1c018a5f35164a899a086ccdae94cb5e6e2a490e4c788d65b0026dbf448950d0c1038b2d61cb10f5e8c9ad22a1affad64dd4a7086b59dffd115d40aa7b3d0cce
-Size (consul-1.2.0.tar.gz) = 17187054 bytes
+SHA1 (consul-1.2.2.tar.gz) = 14c3e80750b09dc62b8dbdd9d8c267cfb79495be
+RMD160 (consul-1.2.2.tar.gz) = aa80d6911df670cbb443c645cc8c15dbec7bca1d
+SHA512 (consul-1.2.2.tar.gz) = 715f69e7b36d0070ea4e602dc50f51aa2547dbbbbb07cce985da79d1e201c6e84dade8a7c810e3602f88cfbd30e063669076954d2541810a18a0c9e7c9ff8458
+Size (consul-1.2.2.tar.gz) = 15789375 bytes
Home |
Main Index |
Thread Index |
Old Index