v1.22.4
Breaking Changes📦 consul-connectView on GitHub →
⚠ 1 breaking✨ 1 features🐛 2 fixes🔧 3 symbols
Summary
This patch release focuses heavily on security by upgrading Go and configuring HTTP server timeouts, alongside dependency updates for AWS SDK v2 migration and minor bug fixes.
⚠️ Breaking Changes
- The underlying AWS SDK used for AWS integrations has been migrated from aws-sdk-go (v1) to aws-sdk-go-v2. This may require updates to any custom code interacting directly with the Consul AWS SDK bindings or related dependencies like consul-awsauth and go-secure-stdlib/awsutil.
Migration Steps
- Review custom code that interacts with AWS SDK components used by Consul, as they have been upgraded to aws-sdk-go-v2.
✨ New Features
- Added the `--aws-iam-endpoint` flag to the `consul login` command when using the AWS IAM auth method to allow configuration of a custom IAM endpoint.
🐛 Bug Fixes
- Fixed "duplicate matcher" errors in Envoy when multiple file-system certificates were configured on a single TLS listener by consolidating certificates into a single filter chain.
- Fixed a failure in the Vault provider when signing an intermediate CA with `isCA=true` in the Certificate Signing Request (CSR).