pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/sysutils/consul



Module Name:    pkgsrc
Committed By:   fhajny
Date:           Tue Jul 31 12:34:55 UTC 2018

Modified Files:
        pkgsrc/sysutils/consul: Makefile distinfo

Log Message:
sysutils/consul: Update to 1.2.2

## 1.2.2 (July 30, 2018)

SECURITY:
- acl: Fixed an issue where writes operations on the Keyring and
  Operator were being allowed with a default allow policy even when
  explicitly denied in the policy.

FEATURES:

- **Alias Checks:** Alias checks allow a service or node to alias the
  health status of another service or node in the cluster.
- agent: New Cloud Auto-join providers: vSphere and Packet.net.
- cli: Added `-serf-wan-port`, `-serf-lan-port`, and `-server-port`
  flags to CLI for cases where these can't be specified in config
  files and `-hcl` is too cumbersome.
- connect: The TTL of leaf (service) certificates in Connect is now
  configurable.

IMPROVEMENTS:

- proxy: With `-register` flag, heartbeat failures will only log once
  service registration succeeds.
- http: 1.0.3 introduced rejection of non-printable chars in HTTP URLs
  due to a security vulnerability. Some users who had keys written
  with an older version which are now dissallowed were unable to delete
  them. A new config option disable_http_unprintable_char_filter is
  added to allow those users to remove the offending keys. Leaving this
  new option set long term is strongly discouraged as it bypasses
  filtering necessary to prevent some known vulnerabilities.
- agent: Allow for advanced configuration of some gossip related
  parameters.
- agent: Make some Gossip tuneables configurable via the config file
- ui: Included searching on `.Tags` when using the freetext search
  field.
- ui: Service.ID's are now shown in the Service detail page and (only
  if it is different from the service name) the Node Detail >
  [Services] tab.

BUG FIXES:

- acl/connect: Fix an issue that was causing managed proxies not to
  work when ACLs were enabled.
- connect: Fix issue with managed proxies and watches attempting to
  use a client addr that is 0.0.0.0 or ::
- connect: Allow Native and Unmanaged proxy configurations via config
  file
- connect: Fix bug causing 100% CPU on agent when Connect is disabled
  but a proxy is still running
- proxy: Don't restart proxies setup in a config file when Consul
  restarts
- ui: Display the Service.IP address instead of the Node.IP address in
  the Service detail view.
- ui: Watch for trailing slash stripping 301 redirects and forward the
  user to the correct location.
- connect: Fixed an issue in the connect native HTTP client where it
  failed to resolve service names.

## 1.2.1 (July 12, 2018)

IMPROVEMENTS:

- acl: Prevented multiple ACL token refresh operations from occurring
  simultaneously.
- acl: Add async-cache down policy mode to always do ACL token
  refreshes in the background to reduce latency.
- proxy: Pass through HTTP client env vars to managed proxies so that
  they can connect back to Consul over HTTPs when not serving HTTP.
- connect: Persist intermediate CAs on leader change.

BUG FIXES:

- api: Intention APIs parse error response body for error message.
- agent: Intention read endpoint returns a 400 on invalid UUID
- agent: Service registration with "services" does not error on
  Connect upstream configuration.
- dns: Ensure that TXT RRs dont get put in the Answer section for
  A/AAAA queries.
- dns: Ensure that only 1 CNAME is returned when querying for services
  that have non-IP service addresses.
- api: Fixed issue where `Lock` and `Semaphore` would return earlier
  than their requested timeout when unable to acquire the lock.
- watch: Fix issue with HTTPs only agents not executing watches
  properly
- agent: Managed proxies that bind to 0.0.0.0 now get a health check
  on a sane IP
- server: (Consul Enterprise) Fixed an issue causing Consul to panic
  when network areas were used
- license: (Consul Enterprise) Fixed an issue causing the snapshot
  agent to log erroneous licensing errors


To generate a diff of this commit:
cvs rdiff -u -r1.34 -r1.35 pkgsrc/sysutils/consul/Makefile
cvs rdiff -u -r1.26 -r1.27 pkgsrc/sysutils/consul/distinfo

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/sysutils/consul/Makefile
diff -u pkgsrc/sysutils/consul/Makefile:1.34 pkgsrc/sysutils/consul/Makefile:1.35
--- pkgsrc/sysutils/consul/Makefile:1.34        Tue Jul  3 12:14:30 2018
+++ pkgsrc/sysutils/consul/Makefile     Tue Jul 31 12:34:55 2018
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.34 2018/07/03 12:14:30 fhajny Exp $
+# $NetBSD: Makefile,v 1.35 2018/07/31 12:34:55 fhajny Exp $
 
-DISTNAME=      consul-1.2.0
+DISTNAME=      consul-1.2.2
 CATEGORIES=    sysutils
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=hashicorp/}
 

Index: pkgsrc/sysutils/consul/distinfo
diff -u pkgsrc/sysutils/consul/distinfo:1.26 pkgsrc/sysutils/consul/distinfo:1.27
--- pkgsrc/sysutils/consul/distinfo:1.26        Tue Jul  3 12:14:30 2018
+++ pkgsrc/sysutils/consul/distinfo     Tue Jul 31 12:34:55 2018
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.26 2018/07/03 12:14:30 fhajny Exp $
+$NetBSD: distinfo,v 1.27 2018/07/31 12:34:55 fhajny Exp $
 
-SHA1 (consul-1.2.0.tar.gz) = 80b62983aa44a7f90ad1619333a693a1d0af1fd5
-RMD160 (consul-1.2.0.tar.gz) = 97cd544c27de436a6f910f67e4a9cf4d643bb70c
-SHA512 (consul-1.2.0.tar.gz) = 1c018a5f35164a899a086ccdae94cb5e6e2a490e4c788d65b0026dbf448950d0c1038b2d61cb10f5e8c9ad22a1affad64dd4a7086b59dffd115d40aa7b3d0cce
-Size (consul-1.2.0.tar.gz) = 17187054 bytes
+SHA1 (consul-1.2.2.tar.gz) = 14c3e80750b09dc62b8dbdd9d8c267cfb79495be
+RMD160 (consul-1.2.2.tar.gz) = aa80d6911df670cbb443c645cc8c15dbec7bca1d
+SHA512 (consul-1.2.2.tar.gz) = 715f69e7b36d0070ea4e602dc50f51aa2547dbbbbb07cce985da79d1e201c6e84dade8a7c810e3602f88cfbd30e063669076954d2541810a18a0c9e7c9ff8458
+Size (consul-1.2.2.tar.gz) = 15789375 bytes



Home | Main Index | Thread Index | Old Index